Omada SDN Controller User Guide REV5.12
Omada SDN Controller User Guide REV5.12
Omada SDN Controller User Guide REV5.12
Intended Readers
This User Guide is intended for network managers familiar with IT concepts and network terminologies.
Conventions
■ Features available in Omada SDN Controller may vary due to your region, controller version, and
device model. All images, steps, and descriptions in this guide are only examples and may not reflect
your actual experience.
■ The information in this document is subject to change without notice. Every effort has been made
in the preparation of this document to ensure accuracy of the contents, but all statements, information,
and recommendations in this document do not constitute the warranty of any kind, express or implied.
Users must take full responsibility for their application of any products.
■ This guide uses the specific formats to highlight special messages. The following table lists the
notice icons that are used throughout this guide.
Note The note contains the helpful information for a better use of the controller.
Configuration Guidelines Provide tips for you to learn about the feature and its configurations.
More Information
■ For technical support, the latest version of the User Guide and other information, please visit
https://www.tp-link.com/support.
■ To ask questions, find answers, and communicate with TP-Link users or engineers, please visit
https://community.tp-link.com to join TP-Link Community.
CONTENTS
With a reliable network management platform powered by TP-Link Omada SDN Controller, you can
develop comprehensive, software-defined networking across demanding, high-traffic environments
with robust wired and wireless solutions.
• 1. 2 Core Components
Chapter 1 Omada SDN Controller Solution Overview
1. 1 Overview
Omada SDN Controller Solution is designed to provide business-class networking solutions for
demanding, high-traffic environments such as campuses, hotels, malls, and offices. It simplifies
deploying and managing large-scale enterprise networks and offers easy maintenance, ongoing
monitoring, and flexible scalability.
Site D
Site C
Router
Switch
SDN Controller
Site A
AP AP
Router
Router Switch
Switch
Router
Switch
AP AP AP
AP AP AP
AP AP AP AP
The interconnected elements that work together to deliver a unified enterprise network include: SDN
Controller, gateways, switches, access points, and client devices. Beginning with a base of client
devices, each element adds functionality and complexity as the network is developing, interconnecting
with the elements above and below it to create a comprehensive, secure wired and wireless solution.
The SDN Controller is a command center and management platform at the heart of the network. With
a single platform, the network administrators configure and manage enterprise networks comprised of
routers, switches, and wireless access points in batches. This unleashes new levels of management to
avoid complex and costly over-provisioning.
2
Chapter 1 Omada SDN Controller Solution Overview
1. 2 Core Components
An Omada SDN network consists of the following core components:
■ SDN Controller — A command center and management platform at the heart of network solution
for the enterprise. With a single platform, the network administrators configure and manage all Omada
products which have all your needs covered in terms of routing, switching and Wi-Fi.
■ Gateways — Boast excellent data processing capabilities and an array of powerful functions,
including IPsec/OpenVPN/PPTP/L2TP VPN, Load Balance, and Bandwidth Control, which are ideal
for the business network where a large number of users require a stable, secure connection.
■ Switches — Offer flexible and cost-effective network solution with powerful Layer 2 features and
PoE options. Advanced features such as Access Control, QoS, LAG and Spanning Tree will satisfy
advanced business networks.
■ Access Points — Satisfy the mainstream Wi-Fi Standard and address your high-density access
needs with TP-Link’s innovation to help you build the versatile and reliable wireless network for all
business applications.
SDN Controller
Tailored to different needs and budgets, Omada SDN Controller offers diverse deployment solutions.
Omada Software Controller, Hardware Controller, and Cloud-Based Controller each has their own set
of advantages and applications.
3
Chapter 1 Omada SDN Controller Solution Overview
Internet
SafeStream Gateway
JetStream Switch
Software Controller
...
Access Points
Internet
SafeStream Gateway
JetStream Switch
Hardware Controller
...
Access Points
4
Chapter 1 Omada SDN Controller Solution Overview
Cloud Server
Internet
JetStream Switch
...
Access Points
The controllers differ in forms, but they have almost the same browser–based management interface
and serve the same functions of network management. In this guide, Omada Software Controller, Omada
Hardware Controller, and Omada Cloud-Based Controller are referred to as the controller, unless we
mention otherwise.
Gateways
TP-Link’s Omada Router supports Gigabit Ethernet connections on both WAN and LAN ports which
keep the data moving at top speed. Including all the routing and network segmentation functions that a
business router must have, SafeStream VPN Router will be the backbone of the SDN network. Moreover,
the router provides a secure and easy approach to deploy site-to-site VPN tunnels and access for
remote clients.
Managing the gateway centrally through Omada SDN Controller is available on certain models only.
Please check the Omada Cloud SDN Platform Compatibility List for more information.
Switches
TP-Link’s JetStream Switch provides high-performance and enterprise-level security strategies and
lots of advanced features, which is ideal access-edge for the SDN network.
Managing the switch centrally through Omada SDN Controller is available on certain models only.
Please check the Omada Cloud SDN Platform Compatibility List for more information.
Access Points
TP-Link’s Omada Access Point provides business-class Wi-Fi with superior performance and range
which guarantees reliable wireless connectivity for the SDN network.
Managing the access points centrally through Omada SDN Controller is available on certain models
only. Please check the Omada Cloud SDN Platform Compatibility List for more information.
5
2
Get Started with Omada SDN
Controller
This chapter guides you on how to get started with Omada SDN Controller to configure the network.
Omada Software Controller, Omada Hardware Controller, and Omada Cloud-Based Controller differ in
forms, but they have almost the same browser–based management interface for network management.
Therefore, they have almost the same initial setup steps, including building your network topology,
deploying your controller, and logging in to the controller. The chapter includes the following sections:
Internet
SafeStream Gateway
JetStream Switch
SDN Controller
Unified Gateways
Management from Switches
One Interface Access Points
Note:
When using the Omada SDN Controller, we recommend that you deploy the full topology with Omada-supported TP-Link devices. If you
use third-party devices, Omada SDN Controller cannot discover and manage them.
7
Chapter 2 Get Started with Omada SDN Controller
Omada Software Controller can be hosted on any computers with Windows systems on your network.
Make sure your PC’s hardware and system meet the following requirements, then properly install the
Software Controller.
■ Hardware Requirements
To guarantee operational stability, we recommend that you use the hardware which meets or
exceeds the following specifications:
CPU: Intel Core i3-8100, i5-6500, or i7-4700 with 2 or more cores and 4 or more threads.
Memory: 16 GB RAM or more.
■ System Requirements
Operating System: Microsoft Windows 7/8/10/Server. (We recommend that you deploy the
controller on a 64-bit operating system to guarantee the software stability.)
Web Browser: Mozilla Firefox 32 (or above), Google Chrome 37 (or above), Opera 24 (or above), or
Microsoft Internet Explorer 11 (or above).
Two versions of installation package are provided: .tar.gz file and .deb file. Both of them can be used in
multiple versions of Linux operating system, including Ubuntu, CentOS, Fedora, and Debian.
Make sure your PC’s hardware and system meet the following requirements, then choose the proper
installation files to install the Software Controller.
■ Hardware Requirements
To guarantee operational stability, we recommend that you use the hardware which meets or
exceeds the following specifications:
CPU: Intel Core i3-8100, i5-6500, or i7-4700 with 2 or more cores and 4 or more threads.
Memory: 16 GB RAM or more.
■ System Requirements
Operating System: 64-bit Linux operating system, including Ubuntu 14.04/16.04/17.04/18.04,
CentOS 6.x/7.x, Fedora 20 (or above), and Debian 9.8.
8
Chapter 2 Get Started with Omada SDN Controller
Web Browser: Mozilla Firefox 32 (or above), Google Chrome 37 (or above), Opera 24 (or above), or
Microsoft Internet Explorer 11 (or above).
If dependencies are missing during the installation, you can use the command: apt-fix-broken
install to fix the problem.
After installing the controller, use the following commands to check and change the status of the
controller.
9
Chapter 2 Get Started with Omada SDN Controller
• To uninstall the Controller, go to the installation path: /opt/tplink/EAPController, and run the command: sudo bash ./uninstall.sh.
• During uninstallation, you can choose whether to back up the database. The backup folder is /opt/tplink/eap_db_backup.
• During installation, you will be asked whether to restore the database if there is any backup database in the folder /opt/tplink/
eap_db_backup.
Double-click the icon and the following window will pop up. After a while, your web browser will
automatically open.
10
Chapter 2 Get Started with Omada SDN Controller
Note:
• If your browser does not open automatically, click Launch. You can also launch a web browser and enter http://127.0.0.1:8088
in the address bar.
• If your web browser opens but prompts a problem with the website’s security certificate, click Continue.
In the web browser, you can see the configuration page. Follow the setup wizard to complete the basic
settings for the Controller.
1. Click Let’s Get Started.
11
Chapter 2 Get Started with Omada SDN Controller
a. Create an Administrator username and password for login to the controller. Specify the email
address for resetting your password in case that you forget the password. After logging into the
Controller, set a mail server so that you can receive emails and reset your password. For how to
set a mail server, refer to 8. 6. 3 Notifications.
b. If you want to access the controller to manage networks remotely, enable Cloud Access, and
bind your TP-Link ID to your Controller. For more details about cloud access, please refer to 5. 2
Manage Your Controller Remotely via Cloud Access.
c. Read and agree to TP-Link’s Terms of Use.
d. Click Next.
12
Chapter 2 Get Started with Omada SDN Controller
3. Choose how would you like to set up your new controller. You can configure a new setup or restore
from backup file.
13
Chapter 2 Get Started with Omada SDN Controller
Once the basic configurations are finished, the browser will be redirected to the following page. Log in to
the management interface using the username and password you have set in the basic configurations.
Note:
In addition to the Controller Host, other hosts in the same LAN can also manage EAPs via remote access to the Controller Host. For
example, if the IP address of the Controller Host is 192.168.0.100 and the Controller is running normally on this host, you can enter
https://192.168.0.100:8043, or http://192.168.0.100:8088 in the web browser of other hosts in the same LAN to log in to the the Controller
and manage EAPs. Or you can log in to the Controller using other management devices through Cloud service.
14
Chapter 2 Get Started with Omada SDN Controller
Internet
SafeStream Gateway
JetStream Switch
Note:
When using the Omada SDN Controller, we recommend that you deploy the full topology with Omada-supported TP-Link devices. If you
use third-party devices, Omada SDN Controller cannot discover and manage them.
15
Chapter 2 Get Started with Omada SDN Controller
Follow the steps below to enter the management interface of the Hardware Controller:
1. Make sure that your management device has the route to access the controller.
2. Check the DHCP server (typically a router) for the IP Address of the controller. If the controller fails
to get a dynamic IP address from the DHCP server, the default fallback IP address 192.168.0.253,
is used.
3. Launch a web browser and type the IP address of the controller in the address bar, then press Enter
(Windows) or Return (Mac).
In the web browser, you can see the configuration page. Follow the setup wizard to complete the basic
settings for the Controller.
1. Click Let’s Get Started.
16
Chapter 2 Get Started with Omada SDN Controller
a. Create an Administrator username and password for login to the controller. Specify the email
address for resetting your password in case that you forget the password. After logging into the
Controller, set a mail server so that you can receive emails and reset your password. For how to
set a mail server, refer to 8. 6. 3 Notifications.
b. If you want to access the controller to manage networks remotely, enable Cloud Access, and
bind your TP-Link ID to your Controller. For more details about cloud access, please refer to 5. 2
Manage Your Controller Remotely via Cloud Access.
c. Read and agree to TP-Link’s Terms of Use.
d. Click Next.
17
Chapter 2 Get Started with Omada SDN Controller
3. Choose how would you like to set up your new controller. You can configure a new setup or restore
from backup file.
18
Chapter 2 Get Started with Omada SDN Controller
Once the basic configurations are finished, the browser will be redirected to the following page. Log in to
the management interface using the username and password you have set in the basic configurations.
Note:
In addition to the Controller Host, other hosts in the same LAN can also manage EAPs via remote access to the Controller Host. For
example, if the IP address of the Controller Host is 192.168.0.100 and the Controller is running normally on this host, you can enter
https://192.168.0.100:8043, or http://192.168.0.100:8088 in the web browser of other hosts in the same LAN to log in to the Controller
and manage EAPs. Or you can log in to the Controller using other management devices through Cloud service.
19
Chapter 2 Get Started with Omada SDN Controller
20
3
Manage Omada Managed Devices and
Sites
Start managing your network by creating sites and adopting devices so that you can configure and
monitor your devices centrally while keeping things organized. The chapter includes the following
sections:
• 3. 1 Create Sites
• 3. 2 Adopt Devices
Chapter 3 Manage Omada Managed Devices and Sites
3. 1 Create Sites
Overview
Different sites are logically separated network locations, like different subsidiary companies or
departments. It’s best practice to create one site for each LAN (Local Area Network) and add all the
devices within the network to the site, including the router, switches and APs.
Site D
Site C
Router
Switch
Site A
AP AP
Router
Router Switch
LAN 5
Switch
LAN 2 Router
Switch
LAN 1 AP AP AP
AP AP AP
AP AP AP AP
Devices at one site need unified configurations, whereas those at different sites are not relative. To
make the best of a site, configure features simultaneously for multiple devices at the site, such as VLAN
and PoE Schedule for switches, and SSID and WLAN Schedule for APs, rather than set them up one by
one.
Configuration
22
Chapter 3 Manage Omada Managed Devices and Sites
Create a Site View and Edit the Site Go Into the Site
To create a site, choose one from the following methods according to your needs.
23
Chapter 3 Manage Omada Managed Devices and Sites
2. Enter a Site Name to identify the new site. Click Apply. The new site will be added to the Site List
and the drop-down list of Organization.
24
Chapter 3 Manage Omada Managed Devices and Sites
Create a Site View and Edit the Site Go Into the Site
After you create the site, you can view the site status in the Site List. You can click the icons in the
ACTION column to edit, copy, delete and launch the site.
Create a Site View and Edit the Site Go Into the Site
To monitor and configure a site, you need first go into the site.
Click the icon of the site in the Site List to go into the site. Alternatively, select the site from the drop-
down list of Organization.
The Organization field indicates the site which you are currently in. Some configuration items in the menu
are applied to the site which you are currently in, whereas others are applied to the whole controller.
25
Chapter 3 Manage Omada Managed Devices and Sites
3. 2 Adopt Devices
Overview
After you create a site, add your devices to the site by making the controller adopt them. Make sure that
your devices in each LAN are added to the corresponding site so that they can be managed centrally.
Site D
Site C
Router
Switch
Site A
AP AP
Router
Router Switch
LAN 5
Switch
LAN 2 Router
Switch
LAN 1 AP AP AP
AP AP AP
AP AP AP AP
Configuration
26
Chapter 3 Manage Omada Managed Devices and Sites
Prepare for Communication Prepare for Device Discovery Adopt the Devices
Note:
If the controller and devices are in the same LAN, subnet and VLAN, skip this step.
Make sure that the controller can communicate with the devices. Otherwise, the controller cannot
discover or adopt the devices by any means. If the controller and devices are in different LANs, subnets
or VLANs, use the following techniques to build up the connection according to your scenario.
27
Chapter 3 Manage Omada Managed Devices and Sites
Internet
Gateway
Interface 1 Interface 2
Switch
Omada SDN Controller
Site
Unified Gateway
Management from Switch
One Interface APs
AP AP
VLAN 1 VLAN 2
Internet
Gateway
Interface 1 Interface 2
Switch
SDN Controller
Site
Unified Gateway
Management from Switch
One Interface APs
AP AP
Subnet 1: 192.168.0.0/24 Subnet 2: 192.168.1.0/24
28
Chapter 3 Manage Omada Managed Devices and Sites
Internet
Port Forwarding
Gateway A Gateway B
Switch
SDN Controller
Site
Unified Gateway
Management from Switch
One Interface APs
AP AP
LAN 1 LAN 2
To configure Port Forwarding on Gateway B, you need first adopt Gateway B on the controller. For
how to adopt Gateway B, refer to Adopt the Devices. Go to Settings > Transmission > NAT > Port
Forwarding. Click + Create New Rule to load the following page. Specify a name to identify the Port
Forwarding rule, check Enable for Status, select Any as Source IP, select the desired WAN port
29
Chapter 3 Manage Omada Managed Devices and Sites
as Interface, disable DMZ, specify 29810-29813 as Source Port and Destination Port, specify the
controller’s IP address as Destination IP, and select All as Protocol. Then click Create.
30
Chapter 3 Manage Omada Managed Devices and Sites
• Use VPN
Set up a VPN connection between Gateway A and Gateway B in Standalone Mode. For details about
VPN configuration, refer to the User Guide of the gateways.
Internet
VPN Connection
VPN VPN
Gateway A Gateway B
Switch
SDN Controller
Site
Unified Gateway
Management from Switch
One Interface APs
AP AP
LAN 1 LAN 2
31
Chapter 3 Manage Omada Managed Devices and Sites
If the ping result shows the packets are received, it implies that the controller can communicate
with the devices. Otherwise, the controller cannot communicate with the devices, then you need to
check your network.
Prepare for Communication Prepare for Device Discovery Adopt the Devices
Note:
If the controller and devices are in the same LAN, subnet and VLAN, skip this step. In this scenario, the controller can discover the
devices directly, and no additional settings are required.
32
Chapter 3 Manage Omada Managed Devices and Sites
IP Address as the controller’s URL or IP address (if you have configured Port Forwarding on the
controller side, use the public WAN IP address of the gateway instead). Then click Apply.
■ Discovery Utility
Discovery Utility can discover the devices in the same LAN, subnet and VLAN, and inform the
devices of the controller’s IP address. Then the devices make contact with the controller so that
the controller can discover the devices.
1. Download Discovery Utility from the https://www.tp-link.com/hk/support/download/omada-
software-controller/#Omada_Discovery_Utility and then install it on your PC which should be
located in the same LAN, subnet and VLAN as your devices.
33
Chapter 3 Manage Omada Managed Devices and Sites
2. Open Discovery Utility and you can see a list of devices. Select the devices to be adopted and
click Batch Setting.
3. Specify Controller Hostname/IP as the IP address of the controller (if you have configured Port
Forwarding on the controller side, use the public WAN IP address of the gateway instead), and
34
Chapter 3 Manage Omada Managed Devices and Sites
enter the username and password of the devices. By default, the username and password are
both admin. Then click Apply. Wait until the setting succeeds.
35
Chapter 3 Manage Omada Managed Devices and Sites
138 as the controller’s IP address (if you have configured Port Forwarding on the controller side,
use the public WAN IP address of the gateway instead). Click Save.
3. To make DHCP Option 138 take effect, you need to renew DHCP parameters for the DHCP
clients. One possible way is to disconnect the DHCP clients and then reconnect them.
36
Chapter 3 Manage Omada Managed Devices and Sites
Prepare for Communication Prepare for Device Discovery Adopt the Devices
1. Decide which site you want to add the devices to. On the controller configuration page, select the
site from the drop-down list of Organization.
2. Go to Devices, and devices which have been discovered by the controller are displayed.
3. Click in the ACTION column of the devices which you want to add to the site. Wait until the
STATUS turns into Connected. Then the devices are adopted by the controller and added to the
current site. Once the devices are adopted, they are subject to central management in the site.
37
Chapter 3 Manage Omada Managed Devices and Sites
Connect to the Internet Prepare for Controller Management Adopt the Devices
SDN Controller
Site
Unified Gateway
Management from Switch
One Interface APs
Internet
Gateway A
Switch
AP AP
LAN 1
If you are using firewalls in your network, make sure that the firewall doesn’t block traffic from the
controller. To configure your firewall policy, you may want to know the URL of the controller. After
you open the web page of the controller, you can get the URL from the address bar of the browser.
2. (Optional) Test the network.
If you are not sure whether the devices are connected to the internet, it’s recommended to do the
ping test from the devices to a public IP address, such as 8.8.8.8.
38
Chapter 3 Manage Omada Managed Devices and Sites
Let’s take a switch for example. Log into the web page of the switch in Standalone Mode. Go to
MAINTENANCE > Network Diagnostics > Ping to load the following page. Specify Destination IP as
a public IP address, such as 8.8.8.8. Then click Ping.
If the ping result shows the packets are received, it implies that the devices are connected to the
internet. Otherwise, the devices are not connected to the internet, then you need to check your
network.
Connect to the Internet Prepare for Controller Management Adopt the Devices
Note:
If your devices are on the factory default setting, skip this step.
The Cloud-Based Controller Management feature allows the devices to be adopted by the Cloud-Based
Controller. Make sure Cloud-Based Controller Management is enabled on the devices. For details, refer
to the User Guide of your devices, which can be downloaded from https://www.tp-link.com/support/
download/.
39
Chapter 3 Manage Omada Managed Devices and Sites
Let’s take a switch for example. Log into the web page of the switch in Standalone Mode. Go to SYSTEM
> Controller Settings to load the following page. In Cloud-Based Controller Management, enable Cloud-
Based Controller Management and click Apply.
Connect to the Internet Prepare for Controller Management Adopt the Devices
On the controller configuration page, go into the site where you want to add the devices. Go to Devices
and click Add Devices. Then add your devices to the controller. Once the devices are adopted, they are
subject to central management in the site.
40
4
Configure the Network with the SDN
Controller
This chapter guides you on how to configure the network with the SDN Controller. As the command
center and management platform at the heart of the SDN network, the Controller provides a unified
approach to configuring enterprise networks comprised of routers, switches, and wireless access
points. The chapter includes the following sections:
• 4. 1 Navigate the UI
• 4. 5 Network Security
• 4. 6 Transmission
• 4. 7 Configure VPN
• 4. 8 Create Profiles
• 4. 9 Authentication
• 4. 10 Services
• 4. 11 CLI Configuration
Chapter 4 Configure the Network with the SDN Controller
4. 1 Navigate the UI
As you start using the management interface of the controller (Controller UI) to configure and monitor
your network, it is helpful to familiarize yourself with the Controller UI.
■ Global Overview
Know the status of your sites at a glance, and manage sites in the platform.
• Site Monitoring—Keep you informed of accurate, real-time status of every site.
• Site Management—Manage all sites to deploy the whole network.
• Account Settings—Manage all administrative accounts.
■ Site Overview
Know the status of your network at a glance, gain insights, and manage network devices all in the
platform.
• Statistics & Monitoring—Keep you informed of accurate, real-time status of every network
42
Chapter 4 Configure the Network with the SDN Controller
■ Site Overview
Site, which means logically separated network location, is the largest unit for managing networks
with the SDN Controller. You can simultaneously configure features for multiple devices at a site.
• Add New Site — Click Add New Site to add a new site, which is the logically separated network
43
Chapter 4 Configure the Network with the SDN Controller
location. The site is the largest unit for managing the network.
• Import Site — Click Import Site to import the site from another controller.
• Site Bookmark – Click Bookmark to place frequently-used sites on the top of the list.
■ Network Monitoring
Visual data keeps the network administrator informed about accurate status of every network
device and client on the wired and wireless network.
The Controller UI is grouped into task-oriented menus. These menus are located in the top right-
hand corner and the left-hand navigation bar of the page. Note that the settings and features that
appear in the UI depend on your user account permissions. The following image depicts the main
elements of the Controller UI.
The elements in the top right corner of the screen give quick access to:
Organization Management
Global View — Know the status of your Site at a glance, and manage sites in the platform.
Site View — Know the status of your network at a glance, gain insights, and manage network devices all in the platform.
Hotspot Manager — Centrally monitor and manage the clients authorized by portal authentication.
44
Chapter 4 Configure the Network with the SDN Controller
Click and enter the keywords to quickly look up the functions or devices that you want to configure. And you can
search for the devices by their MAC addresses and device names.
My Account
Click the account icon to display account information, Account Settings and Log Out. You can change your
password on Account Settings.
More Settings
Preferences: Click to jump to Maintenance and customize the Controller UI depending on your needs. For details, refer
to 5. 3 Maintenance
Tutorial: Click to view the quick Getting Started guide which demonstrates the navigation and tools available for the
controller.
45
Chapter 4 Configure the Network with the SDN Controller
Statistics provides a visual representation of the clients and network managed by the
controller. The run charts show changes in device performances over time, including the
status of switches and speed test results.
Map generates the system topology automatically and you can look over the provisioning
status of devices. By clicking on each node, you can view the detailed information of each
device. You can also upload images of your location for a visual representation of your
network.
Device displays all TP-Link devices discovered on the site and their general information.
This list view can change depending on your monitoring need through customizing the
columns. You can click any device on the list to reveal the Properties window for more
detailed information of each device and provisioning individual configurations to the device.
Clients displays a list view of wired and wireless clients that are connected to the network.
This list view can change depending on your monitoring need through customizing the
columns. You can click any clients on the list to reveal the Properties window for more
detailed information of each client and provisioning individual configurations to the client.
Insights displays a list of statistics of your network device, clients and services during a
specified period. You can change the range of date in one-day increments.
Log shows log lines about varied activities of users, devices, and systems events, such as
administrative actions and abnormal device behaviors. Comprehensive logs make historical
information more accurate, readily accessible, and usable, which allows for proactive
troubleshooting. And you can determine alert-level events and enable pushing notifications.
Tools provides various network tools for you to test the device connectivity, capture
packets for troubleshooting, and open Terminal to execute CLI or Shell commands.
Reports provides intuitive charts and detailed statistics concerning your network situation,
managed devices, and connected clients.
Settings allows you to provision and configure all your network devices on the same site in
minutes and maintain the controller system for best performance.
46
Chapter 4 Configure the Network with the SDN Controller
4. 2. 1 Site Configuration
Overview
In Site Configuration, you can view and modify the site name, location, time zone, and application
scenario of the current site.
Configuration
Select a site from the drop-down list of Organization in the top-right corner, go to Settings > Site, and
configure the following information of the site in Site Configuration. Click Save.
Site Name Specify the name of the current site. It should be no more than 64 characters.
47
Chapter 4 Configure the Network with the SDN Controller
Daylight Saving Time Enable the feature if your country/region implements DST. When it is enabled, the icon
will appear on the upper right, showing the DST settings and status.
Time Offset Select the time added in minutes when Daylight Saving Time starts.
Starts On Specify the time when the DST starts. The clock will be set forward by the time offset you
specify.
Ends On Specify the time when the DST ends.The clock will be set back by the time offset you
specify.
Application Scenario Specify the application scenario of the site. To customize your scenario, click Create New
Scenario in the drop-down list.
Longitude / Latitude / Configure the parameters according to where the site is located. These fields are optional.
Address
4. 2. 2 Services
Overview
In Services, you can view and modify the features applied to devices on the current site. Most features
are applied to all devices, such as LED and Alert Emails, while some are applied to APs only, such as
Channel Limit and Mesh.
48
Chapter 4 Configure the Network with the SDN Controller
Configuration
Select a site from the drop-down list of Sites in the top-right corner, go to Settings > Site, and configure
the following features for the current site in Services. Click Save.
By default, the device follows the LED setting of the site it belongs to. To change the LED
setting for certain devices, refer to Chapter 6. Configure and Monitor Controller-Managed
Devices.
Channel Limit (For Outdoor APs) When enabled, outdoor APs do not use the channel with the frequency
ranging from 5150 MHz to 5350 MHz to meet the local laws and regulations limit in EU
countries.
Mesh When enabled, APs supporting Mesh can establish the mesh network at the site.
Auto Failover (For APs in the mesh network) Auto Failover is used to automatically maintain the mesh
network. When enabled, the controller will automatically select a new wireless uplink for the
AP if the original uplink fails.
49
Chapter 4 Configure the Network with the SDN Controller
Connectivity Detection (For APs in the mesh network) Specify the method of Connection Detection when mesh is
enabled.
In a mesh network, the APs can send ARP request packets to a fixed IP address to test the
connectivity. If the link fails, the status of these APs will change to Isolated.
Auto (Recommended): Select this method and the mesh APs will send ARP request packets
to the default gateway for the detection.
Custom IP Address: Select this method and specify a desired IP address. The mesh APs
will send ARP request packets to the custom IP address to test the connectivity. If the IP
address of the AP is in different network segments from the custom IP address, the AP will
use the default gateway IP address for the detection.
Full-Sector DFS (For APs in the mesh network) With this feature enabled, when radar signals are detected on
current channel by one AP, the other APs in the mesh network will be also informed. Then
all APs in the mesh network will switch to an alternate channel.
LLDP Click the checkbox to enable LLDP (Link Layer Discovery Protocol) for device discovery
and auto-configuration of VoIP devices.
Remote Logging With this feature configured, the controller will send generated site logs to the log server.
When enabled, the following items are required:
Syslog Server IP/Hostname: Enter the IP address or hostname of the log server.
Client Detail Logs: With this feature enabled, the logs of clients will be sent to the syslog
server.
Advanced Features (For APs) When enabled, you can configure more features for APs in Advanced Features.
When disabled, these features keep the default settings.
4. 2. 3 Advanced Features
Overview
Advanced features include Fast Roaming, Band Steering, and Beacon Control. They are applicable to
APs only. With these advanced features configured properly, you can improve the network’s stability,
reliability and communication efficiency.
Advanced features are recommended to be configured by network administrators with the WLAN
knowledge. If you are not sure about your network conditions and the potential impact of all settings,
keep Advanced Features disabled in Services to use their default configurations.
50
Chapter 4 Configure the Network with the SDN Controller
Configuration
Select a site from the drop-down list of Organization in the top-right corner, go to Settings > Site,
and enable Advanced Features in Services first. Then configure the following features in Advanced
Features. Click Save.
Fast Roaming With this feature enabled, wireless clients that support 802.11k/v can improve fast roaming
experience when moving among different APs.
AI Roaming With Fast Roaming enabled, you can enable AI Roaming to facilitate Fast Roaming, which
improves roaming experience of the wireless clients that support 802.11k/v. This feature is
available for some certain devices.
Dual Band 11k Report When disabled, the controller provides neighbor list that contains only neighbor APs in the
same band with which the client is associated.
When enabled, the controller provides neighbor list that contains neighbor APs in both
2.4 GHz and 5 GHz bands.
This feature is available only when Fast Roaming is enabled. By default, it is disabled.
51
Chapter 4 Configure the Network with the SDN Controller
Force-Disassociation With this feature disabled, the AP only issues an 802.11v roaming suggestion when a
client’s link quality drops below the predefined threshold and there is a better option of AP,
but whether to roam or not is determined by the client.
With this feature enabled, the AP will force disassociate the client if it does not re-associate
to another AP.
This feature is available only when Fast Roaming is enabled. By default, it is disabled.
Band Steering Band steering can adjust the number of clients in 2.4 GHz, 5 GHz and 6 GHz bands to
provide better wireless experience.
When enabled, multi-band clients will be steered to the 5 GHz and 6 GHz band according to
the configured parameters. This function can improve the network performance because
the 5 GHz and 6 GHz band supports a larger number of non-overlapping channels and is
less noisy.
Beacon Control Beacons are transmitted periodically by the AP to announce the presence of a wireless
network for the clients. Click , select the band, and configure the following parameters
of Beacon Control.
Beacon Interval: Specify how often the APs send a beacon to clients. By default, it is 100.
DTIM Period: Specify how often the clients check for buffered data that are still on the AP
awaiting pickup. By default, the clients check for them at every beacon.
DTIM (Delivery Traffic Indication Message) is contained in some Beacon frames indicating
whether the AP has buffered data for client devices. An excessive DTIM interval may reduce
the performance of multicast applications, so we recommend that you keep the default
interval, 1.
RTS Threshold: RTS (Request to Send) can ensure efficient data transmission by avoiding
the conflict of packets. If a client wants to send a packet larger than the threshold, the RTS
mechanism will be activated to delay packets of other clients in the same wireless network.
We recommend that you keep the default threshold, which is 2347. If you specify a
low threshold value, the RTS mechanism may be activated more frequently to recover
the network from possible interference or collisions. However, it also consumes more
bandwidth and reduces the throughput of the packet.
Fragmentation Threshold: Fragmentation can limit the size of packets transmitted over the
network. If a packet to be sent exceeds the Fragmentation threshold, the Fragmentation
function will be activated, and the packet will be fragmented into several packets. By
default, the threshold is 2346.
Airtime Fairness: With this option enabled, each client connecting to the AP can get the
same amount of time to transmit data so that low-data-rate clients do not occupy too much
network bandwidth and network performance improves as a whole. We recommend you
enable this function under multi-rate wireless networks.
52
Chapter 4 Configure the Network with the SDN Controller
4. 2. 4 Device Account
You can specify a device account for all adopted devices on the site in batches. Once the devices
are adopted by the controller, their username and password become the same as settings in Device
Account to protect the communication between the controller and devices. By default, the username
is admin and the password is generated randomly.
Select a site from the drop-down list of Organization. Go to Settings > Site and modify the username
and password in Device Account. Click Save and the new username and password are applied to all
devices on the site.
53
Chapter 4 Configure the Network with the SDN Controller
Wired Networks
Internet LAN
Omada Controller
Switch A
WAN Port LAN Port
Internet Switch C
Gateway
Switch B
FTP Server
For Internet, you determine the number of WAN ports on the gateway and how they connect to the
internet. You can set up an IPv4 connection and IPv6 connection to your internet service provider
(ISP) according to your needs. The parameters of the internet connection for the gateway depend on
which connection types you use. For an IPv4 connection, the following internet connection types are
available: Dynamic IP, Static IP, PPPoE, L2TP, and PPTP. For an IPv6 connection, the following internet
connection types are available: Dynamic IP (SLAAC/ DHCPv6), Static IP, PPPoE, 6to4 Tunnel, and Pass-
Through (Bridge). And, when more than one WAN port is configured, you can configure Load Balancing
to optimize the resource utilization if needed.
For LAN, you configure the wired internal network and how your devices logically separate from or
connect to each other by means of VLANs and interfaces. Advanced LAN features include IGMP
Snooping, DHCP Server and DHCP Options, PoE, Voice Network, 802.1X Control, Port Isolation,
Spanning Tree, LLDP-MED, and Bandwidth Control.
Configuration
54
Chapter 4 Configure the Network with the SDN Controller
Select WAN Mode Configure WAN Connections (Optional) Configure Load Balancing
Select a site from the drop-down list of Organization. Go to Settings > Wired Networks > Internet to
load the following page. In WAN Mode, configure the number of WAN ports deployed by the gateway
and other parameters. Then click Apply.
WAN Settings Overrides With this option disabled, the WAN settings of the newly adopted Omada gateway in
standalone mode will take effect on the controller.
When this option is turned on, the gateway will use the configurations on the Controller
after adoption. Please make sure the configurations are correct. Otherwise the
gateway may be unable to access the internet after adoption. If the adopted device
does not support some pre-configurations, the relevant configurations will be deleted
after adoption.
Gateway Model Specify the gateway model and version. If you change the gateway, follow the web
instructions to select WAN ports and copy WAN port settings.
If the number of preconfigured WAN ports does not match the number of WAN ports
enabled in the adopted Omada gateway, the gateway will automatically reboot after
adoption.
55
Chapter 4 Configure the Network with the SDN Controller
Online Detection Interval Select how often the WAN ports detect WAN connection status. If you don’t want to
enable online detection, select Disable.
Online Detection results will influence whether Load Balancing and Link Backup
features take effect. The smaller the online detection interval, the faster Load
Balancing and Link Backup features will respond, and meanwhile more detection
packets will be sent.
Select WAN Mode Configure WAN Connections (Optional) Configure Load Balancing
Note:
The number of configurable WAN ports is decided by WAN Mode.
Select a site from the drop-down list of Organization. Go to Settings > Wired Networks > Internet. In the
WAN Ports Config section, click the edit icon of USB Modem and configure the parameters.
USB Modem Display whether a USB modem is connected to the device and the name of the
connected USB modem.
56
Chapter 4 Configure the Network with the SDN Controller
Auto: Use the Location and Mobile ISP information below for configuration.
Manually: Enter the Dial Number, APN, Username, and password provided by your
Mobile ISP.
The field is required when the following information appears in the Message: PIN
protection is enabled and the PIN is invalid.
Connect Automatically: The router will use the USB modem to connect to the internet
automatically.
Connect Manually: You need to turn on/off the internet manually on the device page,
refer to 6. 2. 2 Monitor the Gateway.
Authentication Select the Authentication mode for the USB modem. The default value is Auto, and it is
Mode recommended to keep the default value.
MTU Size Specify the MTU (Maximum Transmission Unit) of the USB WAN port. The default value
is 1480, and it is recommended to keep the default value.
Use the following Enable the feature if you want to specify the Primary and Secondary DNS servers
DNS Servers manually.
Select a site from the drop-down list of Organization. Go to Settings > Wired Networks > Internet. In
the WAN Ports Config section, click the edit icon of a WAN port and configure the Connection Type
according to the service provided by your ISP.
Connection Type Dynamic IP: If your ISP automatically assigns the IP address and the corresponding parameters,
choose Dynamic IP.
Static IP: If your ISP provides you with a fixed IP address and the corresponding parameters,
choose Static IP.
PPPoE: If your ISP provides you with a PPPoE account, choose PPPoE.
L2TP: If your ISP provides you with an L2TP account, choose L2TP.
PPTP: If your ISP provides you with a PPTP account, choose PPTP.
57
Chapter 4 Configure the Network with the SDN Controller
■ Dynamic IP
Choose Connection Type as Dynamic IP and configure the parameters.
Unicast DHCP With this option enabled, the gateway will require the DHCP server to assign the
IP address by sending unicast DHCP packets. Usually you need not to enable the
option.
Primary DNS Server / Enter the IP address of the DNS server provided by your ISP if there is any.
Secondary DNS Server
MTU Specify the MTU (Maximum Transmission Unit) of the WAN port.
MTU is the maximum data unit transmitted in the physical network. When the
connection type is Dynamic IP, MTU can be set in the range of 576-1500 bytes.
The default value is 1500.
Internet VLAN Add the WAN port to a VLAN and you need to specify the VLAN ID. Generally, you
don’t need to manually configure it unless required by your ISP.
Internet VLAN Priority Priority is only available when Internet VLAN is enabled. The Internet VLAN
Priority function helps to prioritize the internet traffic based on your needs.
You can determine the priority level for the traffic by specifying the tag. The
tag ranges from 0 to 7. None means the packet will be forwarded without any
operation.
WAN IP Alias WAN IP Alias supports configuring multiple IP addresses on one WAN port, and
these IP addresses can be used to configure virtual server and other functions.
58
Chapter 4 Configure the Network with the SDN Controller
■ Static IP
Choose Connection Type as Static IP and configure the parameters.
Primary DNS Server / Enter the IP address of the DNS server provided by your ISP if there is any.
Secondary DNS Server
MTU Specify the MTU (Maximum Transmission Unit) of the WAN port.
MTU is the maximum data unit transmitted in the physical network. When the
connection type is Static IP, MTU can be set in the range of 576-1500 bytes. The
default value is 1500.
Internet VLAN Add the WAN port to a VLAN and you need to specify the VLAN ID. Generally, you
don’t need to manually configure it unless required by your ISP.
Internet VLAN Priority Priority is only available when Internet VLAN is enabled. The Internet VLAN
Priority function helps to prioritize the internet traffic based on your needs.
You can determine the priority level for the traffic by specifying the tag. The
tag ranges from 0 to 7. None means the packet will be forwarded without any
operation.
WAN IP Alias WAN IP Alias supports configuring multiple IP addresses on one WAN port, and
these IP addresses can be used to configure virtual server and other functions.
59
Chapter 4 Configure the Network with the SDN Controller
■ PPPoE
Choose Connection Type as PPPoE and configure the parameters.
60
Chapter 4 Configure the Network with the SDN Controller
Get IP address from ISP With this option enabled, the gateway gets IP address from ISP when setting up
the WAN connection.
With this option disabled, you need to specify the IP Address provided by your
ISP.
Primary DNS Server / Enter the IP address of the DNS server provided by your ISP if there is any.
Secondary DNS Server
Connection Mode Connect Automatically: The gateway activates the connection automatically
when the connection is down. You need to specify the Redial Interval, which
decides how often the gateway tries to redial after the connection is down.
Time-Based: During the specified period, the gateway will automatically activate
the connection. You need to specify the Time Range when the connection is up.
Service Name Keep it blank unless your ISP requires you to configure it.
MTU Specify the MTU (Maximum Transmission Unit) of the WAN port.
MTU is the maximum data unit transmitted in the physical network. When the
connection type is PPPoE, MTU can be set in the range of 576-1492 bytes. The
default value is 1492.
MRU Specify the MRU (Maximum Receive Unit) of the WAN port. MRU is the maximum
data unit transmitted in the Data link layer.
MSS Clamping Specify the upper limit of the value of the MSS (Maximum Segment Size)
field negotiated by the sending and receiving parties when establishing TCP
connection to avoid IP fragmentation. If the value of the MSS field negotiated by
the communication parties exceeds the specified value, the gateway will change
the negotiated MSS field to the specified value
Disabled: Disable the MSS Clamping function, and the gateway will not intervene
in the MSS value negotiated by the communication parties.
Custom: Select this option to specify the MSS value. It should not exceed the
MTU value.
Internet VLAN Add the WAN port to a VLAN and you need to specify the VLAN ID. Generally, you
don’t need to manually configure it unless required by your ISP.
Internet VLAN Priority Priority is only available when Internet VLAN is enabled. The Internet VLAN
Priority function helps to prioritize the internet traffic based on your needs.
You can determine the priority level for the traffic by specifying the tag. The
tag ranges from 0 to 7. None means the packet will be forwarded without any
operation.
61
Chapter 4 Configure the Network with the SDN Controller
Secondary Connection Secondary connection is required by some ISPs. Select the connection type
required by your ISP.
None: Select this if the secondary connection is not required by your ISP.
Static IP: Select this if your ISP provides you with a fixed IP address and subnet
mask for the secondary connection. You need to specify the IP Address and
Subnet Mask provided by your ISP.
Dynamic IP: Select this if your ISP automatically assigns the IP address and
subnet mask for the secondary connection.
62
Chapter 4 Configure the Network with the SDN Controller
■ L2TP
Choose Connection Type as L2TP and configure the parameters.
VPN Server / Domain Name Enter the VPN Server/Domain Name provided by your ISP.
Get IP address from ISP With this option enabled, the gateway gets IP address from ISP when setting up
the WAN connection.
With this option disabled, you need to specify the IP address provided by your
ISP.
63
Chapter 4 Configure the Network with the SDN Controller
Primary DNS Server / Enter the IP address of the DNS server provided by your ISP if there is any.
Secondary DNS Server
Connection Mode Connect Automatically: The gateway activates the connection automatically when
the connection is down. You need to specify the Redial Interval, which decides
how often the gateway tries to redial after the connection is down.
Time-Based: During the specified period, the gateway will automatically activate
the connection. You need to specify the Time Range when the connection is up.
MTU Specify the MTU (Maximum Transmission Unit) of the WAN port.
MTU is the maximum data unit transmitted in the physical network. When the
connection type is L2TP, MTU can be set in the range of 576-1460 bytes. The
default value is 1460.
MSS Clamping Specify the upper limit of the value of the MSS (Maximum Segment Size)
field negotiated by the sending and receiving parties when establishing TCP
connection to avoid IP fragmentation. If the value of the MSS field negotiated by
the communication parties exceeds the specified value, the gateway will change
the negotiated MSS field to the specified value
Disabled: Disable the MSS Clamping function, and the gateway will not intervene
in the MSS value negotiated by the communication parties.
Custom: Select this option to specify the MSS value. It should not exceed the MTU
value.
Internet VLAN Add the WAN port to a VLAN and you need to specify the VLAN ID. Generally, you
don’t need to manually configure it unless required by your ISP.
Internet VLAN Priority Priority is only available when Internet VLAN is enabled. The Internet VLAN Priority
function helps to prioritize the internet traffic based on your needs. You can
determine the priority level for the traffic by specifying the tag. The tag ranges
from 0 to 7. None means the packet will be forwarded without any operation.
Static IP: Select this if your ISP provides you with a fixed IP address and subnet
mask for the secondary connection. You need to specify the IP Address, Subnet
Mask, Default Gateway (Optional), Primary DNS Server (Optional), and Secondary
DNS Server (Optional) provided by your ISP.
Dynamic IP: Select this if your ISP automatically assigns the IP address and subnet
mask for the secondary connection.
64
Chapter 4 Configure the Network with the SDN Controller
■ PPTP
Choose Connection Type as PPTP and configure the parameters.
VPN Server / Domain Name Enter the VPN Server/Domain Name provided by your ISP.
Get IP address from ISP With this option enabled, the gateway gets IP address from ISP when setting up
the WAN connection.
With this option disabled, you need to specify the IP address provided by your
ISP.
Primary DNS Server / Enter the IP address of the DNS server provided by your ISP if there is any.
Secondary DNS Server
65
Chapter 4 Configure the Network with the SDN Controller
Connection Mode Connect Automatically: The gateway activates the connection automatically when
the connection is down. You need to specify the Redial Interval, which decides
how often the gateway tries to redial after the connection is down.
Time-Based: During the specified period, the gateway will automatically activate
the connection. You need to specify the Time Range when the connection is up.
MTU Specify the MTU (Maximum Transmission Unit) of the WAN port.
MTU is the maximum data unit transmitted in the physical network. When the
connection type is PPTP, MTU can be set in the range of 576-1420 bytes. The
default value is 1420.
MSS Clamping Specify the upper limit of the value of the MSS (Maximum Segment Size)
field negotiated by the sending and receiving parties when establishing TCP
connection to avoid IP fragmentation. If the value of the MSS field negotiated by
the communication parties exceeds the specified value, the gateway will change
the negotiated MSS field to the specified value
Disabled: Disable the MSS Clamping function, and the gateway will not intervene
in the MSS value negotiated by the communication parties.
Custom: Select this option to specify the MSS value. It should not exceed the MTU
value.
Internet VLAN Add the WAN port to a VLAN and you need to specify the VLAN ID. Generally, you
don’t need to manually configure it unless required by your ISP.
Internet VLAN Priority Priority is only available when Internet VLAN is enabled. The Internet VLAN Priority
function helps to prioritize the internet traffic based on your needs. You can
determine the priority level for the traffic by specifying the tag. The tag ranges
from 0 to 7. None means the packet will be forwarded without any operation.
66
Chapter 4 Configure the Network with the SDN Controller
Static IP: Select this if your ISP provides you with a fixed IP address and subnet
mask for the secondary connection. You need to specify the IP Address, Subnet
Mask, Default Gateway (Optional), Primary DNS Server (Optional), and Secondary
DNS Server (Optional) provided by your ISP.
Dynamic IP: Select this if your ISP automatically assigns the IP address and subnet
mask for the secondary connection.
For IPv6 connections, check the box to enable the IPv6 connection, select the internet connection
type according to the requirements of your ISP.
Connection Type Dynamic IP (SLAAC/DHCPv6): If your ISP uses Dynamic IPv6 address assignment, either DHCPv6
or SLAAC+Stateless DHCP, select Dynamic IP (SLAAC/DHCPv6).
Static IP: If your ISP provides you with a fixed IPv6 address, select Static IP.
PPPoE: If your ISP uses PPPoEv6, and provides a username and password, select PPPoE.
6to4 Tunnel: If your ISP uses 6to4 deployment for assigning IPv6 address, select 6to4 Tunnel.
6to4 is an internet transition mechanism for migrating from IPv4 to IPv6, a system that allows
IPv6 packets to be transmitted over an IPv4 network. The IPv6 packet will be encapsulated in the
IPv4 packet and transmitted to the IPv6 destination through IPv4 network.
67
Chapter 4 Configure the Network with the SDN Controller
■ Dynamic IP (SLAAC/DHCPv6)
Choose Connection Type as Dynamic IP (SLAAC/DHCPv6) and configure the parameters.
Get IPv6 Address Select the proper method whereby your ISP assigns IPv6 address to your
gateway.
Automatically: With this option selected, the gateway will automatically select
SLAAC or DHCPv6 to get IPv6 addresses.
Via DHCPv6: With DHCPv6 selected, your ISP assigns an IPv6 address and other
parameters including the DNS server address to the gateway using DHCPv6.
Non-Address: With this option selected, the gateway will not get an IPv6 address.
Prefix Delegation Select Enable to get an address prefix by DHCPv6 server from your ISP, or
Disable to designate an address prefix for your LAN port manually. Clients in LAN
will get an IPv6 address with this prefix.
Prefix Delegation Size With Prefix Delegation enabled, enter the Prefix Delegation Size to determine the
length of the address prefix. If you are not sure about the value, you can ask your
ISP.
DNS Address Select whether to get the DNS address dynamically from your ISP or designate
the DNS address manually.
Get from ISP Dynamically: The DNS address will be automatically assigned by the
ISP.
Use the Following DNS Addresses: Enter the DNS address provided by the ISP.
68
Chapter 4 Configure the Network with the SDN Controller
■ Static IP
Choose Connection Type as Static IP and configure the parameters.
IPv6 Address Enter the static IPv6 address information received from your ISP.
Prefix Length Enter the prefix length of the IPv6 address received from your ISP.
Primary DNS Server Enter the IP address of the primary DNS server provided by your ISP.
Secondary DNS Server (Optional) Enter the IP address of the secondary DNS server, which provides
redundancy in case the primary DNS server goes down.
69
Chapter 4 Configure the Network with the SDN Controller
■ PPPoE
Choose Connection Type as PPPoE and configure the following parameters. Then click Apply.
Share the same PPPoE If your ISP provides only one PPPoE account for both IPv4 and IPv6 connections,
session with IPv4 and you have already established an IPv4 connection on this WAN port, you
can check the box, then the WAN port will use the PPP session of IPv4 PPPoE
connection to get the IPv6 address. In this case, you do not need to enter the
username and password of the PPPoE account. If your ISP provides two separate
PPPoE accounts for the IPv4 and IPv6 connections, or the IPv4 connection of this
WAN port is not based on PPPoE, do not check the box and manually enter the
username and password for the IPv6 connection.
Username Enter the username of your PPPoE account provided by your ISP.
Password Enter the password of your PPPoE account provided by your ISP.
70
Chapter 4 Configure the Network with the SDN Controller
Get IPv6 Address Select the proper method whereby your ISP assigns IPv6 address to your
gateway.
Automatically: With this option selected, the gateway will automatically select the
method to get IPv6 addresses between SLAAC and DHCPv6.
Via DHCPv6: With DHCPv6 selected, your ISP assigns an IPv6 address and other
parameters including the DNS server address to the gateway using DHCPv6.
Non-Address: With this option selected, the gateway will not get an IPv6 address.
Specified by ISP: With this option selected, enter the IPv6 address you get from
your ISP.
Prefix Delegation Select Enable to get an address prefix by DHCPv6 server from your ISP, or Disable
to designate an address prefix for your LAN port manually. Clients in LAN will get
an IPv6 address with this prefix.
Prefix Delegation Size With Prefix Delegation enabled, enter the Prefix Delegation Size to determine the
length of the address prefix. If you are not sure about the value, you can ask your
ISP.
DNS Address Select whether to get the DNS address dynamically from your ISP or designate
the DNS address manually.
Get from ISP Dynamically: The DNS address will be automatically assigned by the
ISP.
Use the Following DNS Addresses: Enter the DNS address provided by the ISP.
71
Chapter 4 Configure the Network with the SDN Controller
■ 6to4 Tunnel
Choose Connection Type as 6to4 Tunnel and configure the parameters.
DNS Address Select whether to get the DNS address dynamically from your ISP or designate
the DNS address manually.
Get from ISP Dynamically: The DNS address will be automatically assigned by the
ISP.
Use the Following DNS Addresses: Enter the DNS address provided by the ISP.
■ Pass-Through (Bridge)
Choose Connection Type as Pass-Through (Bridge) and no configuration is required for this type
of connection.
Select a site from the drop-down list of Organization. Go to Settings > Wired Networks > Internet. In the
WAN Ports Config section, click the edit icon of a WAN port and configure the MAC address according
to actual needs.
MAC Address Use Default MAC Address: The WAN port uses the default MAC address to set up
the internet connection. It’s recommended to use the default MAC address unless
required otherwise.
Customize MAC Address: The WAN port uses a customized MAC address to set up
the internet connection and you need to specify the MAC address. Typically, this is
required when your ISP bound the MAC address with your account or IP address. If you
are not sure, contact the ISP.
Select WAN Mode Configure WAN Connections (Optional) Configure Load Balancing
Note:
Loading Balancing is only available when you configure more than one WAN port.
72
Chapter 4 Configure the Network with the SDN Controller
Select a site from the drop-down list of Organization. Go to Settings > Wired Networks > Internet to
load the following page. In Load Balancing, configure the following parameters and click Apply.
Load Balancing Weight Specify the ratio of network traffic that each WAN port carries.
Alternatively, you can click Pre-Populate to test the speed of WAN ports and
automatically fill in the appropriate ratio according to test result.
Application Optimized With Application Optimized Routing enabled, the router will consider the source IP
Routing address and destination IP address (or destination port) of the packets as a whole
and record the WAN port they pass through. Then the packets with the same source
IP address and destination IP address ( or destination port) will be forwarded to the
recorded WAN port.
Link Backup With Link Backup enabled, the router will switch all the new sessions from dropped
lines automatically to another to keep an always on-line network.
Backup WAN / Primary WAN The backup WAN port backs up the traffic for the primary WAN ports under the
specified condition.
Backup Mode Link Backup: The system will switch all the new sessions from dropped line
automatically to another to keep an always on-link network.
Always Link Primary: Traffic is always forwarded through the primary WAN port unless
it fails. The system will try to forward the traffic via the backup WAN port when it fails,
and switch back when it recovers.
Mode Select whether to enable backup link when any primary WAN fails or all primary WANs
fail.
73
Chapter 4 Configure the Network with the SDN Controller
Overview
The LAN function allows you to configure wired internal network. Based on 802.1Q VLAN, the Controller
provides a convenient and flexible way to separate and deploy the network. The network can be logically
segmented by departments, application, or types of users, without regard to geographic locations.
Configuration
Create a Network Create a Port Profile Assign the Port Profile to the Ports
Note:
A default Network (default VLAN) named LAN is preconfigured as Interface and is associated with all LAN ports of the
Gateway and all switch ports. The VLAN ID of the default Network is 1. The default Network can be edited, but not deleted.
1. Select a site from the drop-down list of Organization. Go to Settings > Wired Networks > LAN >
Networks to load the following page.
2. Click + Create New LAN to load the following page, enter a name to identify the network, and select
the purpose for the network.
74
Chapter 4 Configure the Network with the SDN Controller
Purpose Interface: Create the network with a Layer 3 interface, which is required for inter-VLAN
routing.
75
Chapter 4 Configure the Network with the SDN Controller
■ Interface
LAN Interface Select the physical interfaces of the Gateway that this network will be associated with.
76
Chapter 4 Configure the Network with the SDN Controller
VLAN Enter a VLAN ID with the values between 1 and 4090. Each VLAN can be uniquely
identified by VLAN ID, which is transmitted and received as IEEE 802.1Q tag in an
Ethernet frame.
Gateway/Subnet Enter the IP address and subnet mask in the CIDR format. The CIDR Notation here
includes the IP address and subnet mask of the default gateway. The summary of the
information that you entered will show up below in real time.
IGMP Snooping Click the checkbox to monitor IGMP (Internet Group Management Protocol) traffic and
thereby manage multicast traffic.
DHCP Server Click the checkbox to allow the Gateway to serve as the DHCP server for this network.
A DHCP server assigns IP addresses, DNS server, default gateway, and other
parameters to all devices in the network. Deselect the box if there is already a DHCP
server in the network.
DHCP Range Enter the starting and ending IP addresses of the DHCP address pool in the fields
provided. For quick operation, click the Update DHCP Range beside the Gateway/
Subnet entry to get the IP address range populated automatically, and edit the range
according to your needs.
DNS Server Select a method to configure the DNS server for the network.
Auto: The DHCP server automatically assigns DNS server for devices in the network. It
uses the IP address specified in the Gateway/Subnet entry as the DNS server address.
Manual: Specify DNS servers manually. Enter the IP address of a server in each DNS
server field.
Lease TIme Specify how long a client can use the IP address assigned from this address pool.
Auto: The DHCP server automatically assigns default gateway for devices in the
network. It uses the IP address specified in the Gateway/Subnet entry as the default
gateway address.
Manual: Specify default gateway manually. Enter the IP address of the default gateway
in the field.
DHCP Omada Enter the IP address of the Controller. The DHCP server uses this IP address as Option
Controller 138 in DHCP packets to tell clients where the controller is.
Legal DHCP Servers Click the checkbox to specify legal DHCP servers for the network. With legal DHCP
servers configured, Gateways and Switches ensure that clients get IP addresses only
from the DHCP servers specified here.
DHCP L2 Relay Click the checkbox to enable DHCP L2 Relay for the network.
Option 60 Enter the value for DHCP Option 60. DHCP clients use this field to optionally identify
the vendor type and configuration of a DHCP client. Mostly it is used in the scenario
where the APs apply for different IP addresses from different servers according to the
needs.
77
Chapter 4 Configure the Network with the SDN Controller
Option 66 Enter the value for DHCP Option 66. It specifies the TFTP server information and
supports a single TFTP server IP address.
Option 138 Enter the value for DHCP Option 138. It is used in discovering the devices by the
controller.
You can configure IPv6 connections for the LAN clients based on you needs. First, determine the
method whereby the gateway assigns IPv6 addresses to the clients in the local network. Some
clients may support only a few of these connection types, so you should choose it according to the
compatibility of clients in the local network.
IPv6 Interface Type Configure the type of assigning IPv6 address to the clients in the local network.
None: IPv6 connection is not enabled for the clients in the local network.
DHCPv6: The gateway assigns an IPv6 address and other parameters including the
DNS server address to each client using DHCPv6.
SLAAC+Stateless DHCP: The gateway assigns the IPv6 address prefix to each client
and the client automatically generates its own IPv6 address. Also, the gateway assigns
other parameters including the DNS server address to each client using DHCPv6.
SLAAC+RDNSS: The gateway assigns the IPv6 address prefix to each client and the
client automatically generates its own IPv6 address. Also, the gateway assigns other
parameters including the DNS server address to each client using the RDNSS option in
RA (Router Advertisement).
Pass-Through: Select this type if the WAN ports of the gateway use the Pass-Through
for IPv6 connections.
Gateway/Subnet Enter the IP address and subnet mask in the CIDR format. The CIDR notation here
includes the IP address and subnet mask of the default gateway. The summary of the
information that you entered will show up below in real time.
78
Chapter 4 Configure the Network with the SDN Controller
DHCP Range Enter the starting and ending IP addresses of the DHCP address pool in the fields
provided. For quick operation, click the beside the Gateway/Subnet
entry to get the IP address range populated automatically, and edit the range according
to your needs.
Lease Time This entry determines how long the assigned IPv6 address remains valid. Either keep
the default 1440 minutes or change it if required by your ISP.
DHCPv6 DNS Select a method to configure the DNS server for the network. With Auto selected, the
DHCP server automatically assigns DNS server for devices in the network. With Manual
selected, enter the IP address of a server in each DNS server field.
Prefix Configure the IPv6 address prefix for each client in the local network.
Manual Prefix: With Manual Prefix selected, enter the prefix in the Address Prefix field.
Get from Prefix Delegation: With Get from Prefix Delegation selected, select the WAN
port with Prefix Delegation configured, and the clients will get the address prefix from
the Prefix Delegation.
IPv6 Prefix ID With Get from Prefix Delegation selected, enter the Prefix ID, which will be added to the
prefix to obtain a /64 subnet.
The range of IPv6 Prefix ID is determined by the larger value of Prefix Delegation Size
and Prefix Delegation Length (obtained from the ISP). Note that if the Prefix Delegation
Length is larger than 64, the IPv6 Prefix ID cannot be obtained from Prefix Delegation,
please select another method. In site view, go to Settings > Wired Network > Internet
to configure Prefix Delegation Size.
DNS Server Select a method to configure the DNS server for the network.
Auto: With Auto selected, the DHCP server automatically assigns DNS server for
devices in the network.
Manual: With Manual selected, enter the IP address of a server in each DNS server field.
Prefix Configure the IPv6 address prefix for each client in the local network.
Manual Prefix: With Manual Prefix selected, enter the prefix in the Address Prefix field.
Get from Prefix Delegation: With Get from Prefix Delegation selected, select the WAN
port with Prefix Delegation configured, and the clients will get the address prefix from
the Prefix Delegation.
IPv6 Prefix ID With Get from Prefix Delegation selected, enter the Prefix ID, which will be added to the
prefix to obtain a /64 subnet.
79
Chapter 4 Configure the Network with the SDN Controller
DNS Server Select a method to configure the DNS server for the network.
Auto: With Auto selected, the DHCP server automatically assigns DNS server for
devices in the network.
Manual: With Manual selected, enter the IP address of a server in each DNS server field.
IPv6 Prefix Delegation Select the WAN port using Pass-Through (Bridge) for the IPv6 connection.
Interface
VLAN Enter a VLAN ID with the values between 1 and 4090. Each VLAN can be uniquely
identified by VLAN ID, which is transmitted and received as IEEE 802.1Q tag in an
Ethernet frame.
IGMP Snooping Click the checkbox to monitor IGMP (Internet Group Management Protocol) traffic and
thereby manage multicast traffic.
Legal DHCP Servers Click the checkbox to specify legal DHCP servers for the network. With legal DHCP
servers configured, Gateways and Switches ensure that clients get IP addresses only
from the DHCP servers specified here.
DHCP L2 Relay Click the checkbox to enable DHCP L2 Relay for the network.
4. Click Save. The new LAN is added to the LAN list. You can click in the ACTION column to edit the
LAN. You can click in the ACTION column to delete the LAN.
80
Chapter 4 Configure the Network with the SDN Controller
Create a Network Create a Port Profile Assign the Port Profile to the Ports
Note:
• Three default port profiles are preconfigured on the controller. They can be viewed, but not edited or deleted.
All: In the All profile, all networks except the default network (LAN) are configured as Tagged Network, and the native network is
the default network (LAN). This profile is assigned to all switch ports by default.
Disable: In the Disable profile, no networks are configured as the native network, Tagged Networks and Untagged Networks.
With this profile assigned to a port, the port does not belong to any VLAN.
LAN: In the LAN profile, the native network is the default network (LAN), and no networks are configured as Tagged Networks
and Untagged Networks.
• When a network is created, the system will automatically create a profile with the same name and configure the network as the
native network for the profile. In this profile, the network itself is configured as the Untagged Networks, while no networks are
configured as Tagged Networks. The profile can be viewed and deleted, but not edited.
1. Go to Wired Networks > LAN > Profiles to load the following page.
81
Chapter 4 Configure the Network with the SDN Controller
2. Click + Create New Port Profile to load the following page, and configure the following parameters.
Keep the Device's Settings: PoE keep enabled or disabled according to the switches’
settings. By default, the switches enable PoE on all PoE ports.
82
Chapter 4 Configure the Network with the SDN Controller
Native Network Select the native network from all networks. The native network determines the Port
VLAN Identifier (PVID) for switch ports. When a port receives an untagged frame, the
switch inserts a VLAN tag to the frame based on the PVID, and forwards the frame in
the native network. Each physical switch port can have multiple networks attached, but
only one of them can be native.
Tagged Networks Select the Tagged Networks. Frames sent out of a Tagged Network are kept with
VLAN tags. Usually networks that connect the switch to network devices like routers
and other switches, or VoIP devices like IP phones should be configured as Tagged
Networks.
Untagged Networks Select the Untagged Networks. Frames that sent out of an Untagged Network are
stripped of VLAN tags. Usually networks that connect the switch to endpoint devices
like computers should be configured as Untagged Networks. Note that the native
network is untagged.
Voice Network Select the network that connects VoIP devices like IP phones as the Voice Network.
Switches will prioritize the voice traffic by changing its 802.1p priority. To configure a
network as Voice Network, configure it as Tagged Network first, and then enable LLDP-
MED. Only tagged networks can be configured as Voice Network, and Voice Network
will take effect with LLDP-MED enabled.
802.1X Control Select 802.1X Control mode for the ports. To configure the 802.1X authentication
globally, enter the site view and go to Settings > Authentication > 802.1X.
Auto: The port is unauthorized until the client is authenticated by the authentication
server successfully.
Force Authorized: The port remains in the authorized state, sends and receives normal
traffic without 802.1X authentication of the client.
Force Unauthorized: The port remains in the unauthorized state, ignoring all attempts
by the client to authenticate. The switch cannot provide authentication services to the
client through the port.
Port Isolation Click the checkbox to enable Port Isolation. An isolated port cannot communicate
directly with any other isolated ports, while the isolated port can send and receive
traffic to non-isolated ports.
Flow Control With this option enabled, when a device gets overloaded it will send a PAUSE frame to
notify the peer device to stop sending data for a specified period of time, thus avoiding
the packet loss caused by congestion.
EEE Click the checkbox to enable EEE (Energy Efficient Ethernet) to allow power reduction.
83
Chapter 4 Configure the Network with the SDN Controller
Loopback Control Loopback refers to the routing of data streams back to their source in the network. You
can disable loopback control for the network or choose a method to prevent loopback
happening in your network.
Loopback Detection Port Based: Loopback Detection Port Based helps detect loops
that occur on a specific port. When a loop is detected on a port, the port will be
blocked.
Loopback Detection VLAN Based: Loopback Detection VLAN Based helps detect
loops that occur on a specific VLAN. When a loop is detected on a VLAN, the VLAN will
be blocked.
Spanning Tree: Select STP (Spanning Tree Protocal) to prevent loops in the network.
STP helps block specific ports of the switches to build a loop-free topology and detect
topology changes and automatically generate a new loop-free topology.
If you want to enable Spanning Tree for the switch, you also need to select the
Spanning Tree protocol in the Device Config page. For details, refer to 6. 3 Configure
and Monitor Switches.
LLDP-MED Click the checkbox to enable LLDP-MED (Link Layer Discovery Protocol-Media
Endpoint Discovery) for device discovery and auto-configuration of VoIP devices.
Bandwidth Control Select the type of Bandwidth Control functions to control the traffic rate and traffic
threshold on each port to ensure network performance.
Rate Limit: Select Rate limit to limit the ingress/egress traffic rate on each port. With
this function, the network bandwidth can be reasonably distributed and utilized.
Storm Control: Select Storm Control to allow the switch to monitor broadcast frames,
multicast frames and UL-frames (Unknown unicast frames) in the network. If the
transmission rate of the frames exceeds the set rate, the frames will be automatically
discarded to avoid network broadcast storm.
Ingress Rate Limit When Rate Limit selected, click the checkbox and specify the upper rate limit for
receiving packets on the port.
Egress Rate Limit When Rate Limit selected, click the checkbox and specify the upper rate limit for
sending packets on the port.
Broadcast Threshold When Storm Control selected, click the checkbox and specify the upper rate limit for
receiving broadcast frames. The broadcast traffic exceeding the limit will be processed
according to the Action configurations.
Multicast Threshold When Storm Control selected, click the checkbox and specify the upper rate limit for
receiving multicast frames. The multicast traffic exceeding the limit will be processed
according to the Action configurations.
UL-Frame Threshold When Storm Control selected, click the checkbox and specify the upper rate limit for
receiving unknown unicast frames. The traffic exceeding the limit will be processed
according to the Action configurations..
84
Chapter 4 Configure the Network with the SDN Controller
Action When Storm Control selected, select the action that the switch will take when the traffic
exceeds its corresponding limit. With Drop selected, the port will drop the subsequent
frames when the traffic exceeds the limit. With Shutdown selected, the port will be
shutdown when the traffic exceeds the limit.
DHCP L2 Relay Click the checkbox to enable DHCP L2 Relay for the network.
3. Click Save. The new port profile is added to the profile list. You can click in the ACTION column to
edit the port profile. You can click in the ACTION column to delete the port profile.
Create a Network Create a Port Profile Assign the Port Profile to the Ports
Note:
By default, there is a port profile named All, which is assigned to all switch ports by default. In the All profile, all networks except the
default network (LAN) are configured as Tagged Network, and the native network is the default network (LAN).
85
Chapter 4 Configure the Network with the SDN Controller
1. Go to Devices, and click the switch in the devices list to reveal the Properties window. Go to Ports,
you can either click in the Action column to assign the port profile to a single port, or select the
desired ports and click Edit Selected on the top to assign the port profile to multiple ports in batch.
2. Select the profile from the drop-down list to assign the port profile to the desired ports of the switch.
You can enable profile overrides to customize the settings for the ports, and all the configuration
here overrides the port profile. For details, refer to Chapter 6. Configure and Monitor Controller-
Managed Devices.
86
Chapter 4 Configure the Network with the SDN Controller
Configuration
Create a WLAN Group Create Wireless Networks Apply the WLAN Group
Note:
The controller provides a default WLAN group. If you simply want to configure wireless networks for the default WLAN group and apply
it to all your APs, skip this step.
1. Select a site from the drop-down list of Organization. Go to Settings > Wireless Networks to load
the following page.
2. Select + Create New Group from the drop-down list of WLAN Group to load the following page.
Enter a name to identify the WLAN group.
87
Chapter 4 Configure the Network with the SDN Controller
3. (Optional) If you want to create a new WLAN group based on an existing one, check Copy All SSIDs
from the WLAN Group and select the desired WLAN group. Then you can further configure wireless
networks based on current settings.
4. Click Save. The new WLAN Group is added to the WLAN Group list. You can select a WLAN Group
from the list to further create and configure its wireless networks. You can click to edit the name
of the WLAN Group. You can click to delete the WLAN Group.
Create a WLAN Group Create Wireless Networks Apply the WLAN Group
1. Select the WLAN group for which you want to configure wireless networks from the drop-down list
of WLAN Group.
88
Chapter 4 Configure the Network with the SDN Controller
2. Click + Create New Wireless Network to load the following page. Configure the basic parameters
for the network.
Note:
The 6 GHz band is only available for certain devices.
Network Name (SSID) Enter the network name (SSID) to identify the wireless network. The users of wireless
clients choose to connect to the wireless network according to the SSID, which
appears on the WLAN settings page of wireless clients.
Device Type Select the type of devices that the wireless network can apply to.
Band Enable the radio band(s) for the wireless network. When 6GHz is turned on, Security
cannot be PPSK with/without RADIUS since 6GHz does not support them.
Guest Network With Guest Network enabled, all the clients connecting to the SSID are blocked from
reaching any private IP subnet.
Security Select the encryption method for the wireless network based on needs.
■ None
With None selected, the hosts can access the wireless network without authentication, which is
applicable to lower security requirements.
89
Chapter 4 Configure the Network with the SDN Controller
■ WPA-Personal
With WPA-Personal selected, traffic is encrypted with a Security Key you set,
■ WPA-Enterprise
WPA-Enterprise requires an authentication server to authenticate wireless clients, and probably an
accounting server to record the traffic statistics.
RADIUS Profile Select a RADIUS Profile, which records the settings of the authentication server
and accounting server. You can create a RADIUS Profile by clicking Create New
Radius Profile from the drop-down list of RADIUS Profile. For details, refer to 4. 9
Authentication.
PPSK Profile Select a PPSK Profile, which records the PPSK settings. You can create a PPSK Profile
by clicking Create New PPSK Profile from the drop-down list of PPSK Profile. For
details, refer to 4. 8. 4 PPSK.
90
Chapter 4 Configure the Network with the SDN Controller
to record the traffic statistics. The SSID will not be applied to the device firmware not supporting
PPSK.
RADIUS Profile Select a RADIUS Profile, which records the settings of the authentication server
and accounting server. You can create a RADIUS Profile by clicking + Create New
Radius Profile from the drop-down list of RADIUS Profile. For details, refer to 4. 9
Authentication.
Generic Radius with bound MAC: This type needs to specify device MAC addresses.
NAS ID Configure a Network Access Server Identifier (NAS ID) for the authentication.
Authentication request packets from the controller to the RADIUS server carry the
NAS ID. The RADIUS server can classify users into different groups based on the NAS
ID, and then choose different policies for different groups.
MAC Address Format Select clients’ MAC address format which the controller uses for authentication. Then
configure the MAC addresses in the specified format as usernames for the clients on
the RADIUS server.
4. (Optional) You can also configure Advanced Settings, WLAN Schedule, 802.11 Rate Control, and
MAC Filter, and more according to your needs. Related topics are covered later in this chapter.
5. Click Apply. The new wireless network is added to the wireless network list under the WLAN group.
You can click in the ACTION column to edit the wireless network. You can click in the ACTION
column to delete the wireless network.
Create a WLAN Group Create Wireless Networks Apply the WLAN Group
Note:
91
Chapter 4 Configure the Network with the SDN Controller
The controller provides a default WLAN group. If you simply want to configure wireless networks for the default WLAN group and apply
it to all your APs, skip this step.
■ Apply to a Single AP
Go to Devices, select the AP. In the Properties window, go to Config > WLANs, select the WLAN
group to apply.
92
Chapter 4 Configure the Network with the SDN Controller
2. In the Properties window, go to Config > WLANs, select the WLAN group which you want to apply
to the AP.
4. 4. 2 Advanced Settings
Select a site from the drop-down list of Organization. Go to Settings > Wireless Networks, click in the
ACTION column of the wireless network which you want to configure, and click + Advanced Settings to
load the following page. Configure the parameters and click Apply.
SSID Broadcast With SSID Broadcast enabled, APs broadcast the SSID (network name) in the air so that
wireless clients can connect to the wireless network, which is identified by the SSID.
With SSID Broadcast disabled, users of wireless clients must enter the SSID manually to
connect to the wireless network.
VLAN To set a wireless VLAN for the wireless network, enable this option and set a VLAN ID
from 1 to 4094.
With this option enabled, traffic in different wireless networks is marked with different
VLAN tags according to the configured VLAN IDs. Then the APs work together with the
switches which also support 802.1Q VLAN, to distribute the traffic to different VLANs
according to the VLAN tags. As a result, wireless clients in different VLANs cannot
directly communicate with each other.
93
Chapter 4 Configure the Network with the SDN Controller
WPA Mode If you select WPA-Personal or WPA-Enterprise as the security strategy, you can select
the WPA Mode including the version of WPA, and the encryption type.
Select the encryption type. Some encryption type is only available under certain
circumstances.
Auto: APs automatically decide the encryption type in the authentication process.
PMF Protected Management Frames (PMF) provide protection for unicast and multicast
management action frames. When Mandatory is selected, non-PMF-capable clients may
fail to connect to the network.
Disable: Disables PMF for a network. It is not recommended to use this setting, only in
case non-PMF-capable clients experience connection issues with the “Capable” option.
Capable: Both types of clients, capable of PMF or not, can connect to the network.
Clients capable of PMF will negotiate it with the AP.
Group Key Update Period If you select WPA-Personal or WPA-Enterprise as the security strategy, you can specify
whether and how often the security key changes. If you want the security key to change
periodically, enable GIK rekeying and specify the time period.
802.11r Enable this feature to allow faster roaming when both the AP and client have 802.11r
capabilities. Currently 802.11r does not support WPA3 encryption.
Client Rate Limit Profile Specify the profile to limit the download and upload rates of each client to balance
bandwidth usage.
SSID Rate Limit Profile Specify the profile to limit the download and upload rates of each wireless band.
Bandwidth is shared among all clients connected to the same wireless band of the same
AP.
Note: This feature requires new firmware updates for Omada APs, and the rate limit settings will
only take effect on those APs running firmware that supports the feature.
4. 4. 3 WLAN Schedule
Overview
WLAN Schedule can turn on or off your wireless network in the specific time period as you desire.
94
Chapter 4 Configure the Network with the SDN Controller
Configuration
Select a site from the drop-down list of Organization. Go to Settings > Wireless Networks, click in the
ACTION column of the wireless network which you want to configure, and click + WLAN Schedule to
load the following page. Enable WLAN schedule and configure the parameters .Then click Apply.
Action Radio On: Turn on your wireless network within the time range you set, and turn it off
beyond the time range.
Radio Off: Turn off your wireless network within the time range you set, and turn it on
beyond the time range.
Time Range Select the Time Range for the action to take effect. You can create a Time Range entry
by clicking + Create New Time Range Entry from the drop-down list of Time Range. For
details, refer to 4. 8 Create Profiles.
Overview
Note:
802.11 Rate Control is only available for certain devices.
802.11 Rate Control can improve performance for higher-density networks by disabling lower bit
rates and only allowing the higher. However, 802.11 Rate Control might make some legacy devices
incompatible with your networks, and limit the range of your wireless networks.
Configuration
Select a site from the drop-down list of Organization. Go to Settings > Wireless Networks, click in the
ACTION column of the wireless network which you want to configure, and click + 802.11 Rate Control
to load the following page. Select one or multiple bands to enable minimum data rate control according
95
Chapter 4 Configure the Network with the SDN Controller
to your needs, move the slider to determine what bit rates your wireless network allows, and configure
the parameters. Then click Apply.
Note:
The 6 GHz band is only available for certain devices.
Disable CCK Rates (1/2/5.5/11 Mbps) Select whether to disable CCK (Complementary Code Keying), the modulation
scheme which works with 802.11b devices. Disable CCK Rates (1/2/5.5/11
Mbps) is only available for 2.4 GHz band.
Require Clients to Use Rates at or Select whether or not to require clients to use rates at or above the value
Above the Specified Value specified on the minimum data rate controller slider.
Send Beacons at 1 Mbps/6 Mbps Select whether or not to send Beacons at the minimum rate of 1Mbps for 2.4
GHz band or 6Mbps for 5 GHz band.
4. 4. 5 MAC Filter
Overview
MAC Filter allows or blocks connections from wireless clients of specific MAC addresses.
96
Chapter 4 Configure the Network with the SDN Controller
Configuration
Select a site from the drop-down list of Organization. Go to Settings > Wireless Networks, click in the
ACTION column of the wireless network which you want to configure, and click + MAC Filter to load the
following page. Enable MAC Filter and configure the parameters .Then click Apply.
Policy Allow List: Allow the connection of the clients whose MAC addresses are in the specified MAC
Address List, while blocking others.
Deny List: Block the connection of the clients whose MAC address are in the specified MAC
Addresses List, while allowing others.
MAC Address List Select the MAC Group which you want to allow or block according to the policy. You can create
new MAC group by clicking + Create New MAC Group from the drop-down list of MAC Address
List. For details, refer to 4. 8 Create Profiles.
4. 4. 6 Multicast/Broadcast Management
Overview
97
Chapter 4 Configure the Network with the SDN Controller
Configuration
Select a site from the drop-down list of Organization. Go to Settings > Wireless Networks, click in the
ACTION column of the wireless network which you want to configure, and click + Multicast/Broadcast
Management to load the following page. Configure the parameters .Then click Apply.
Multicast- When enabled, the controller will convert multicast packets into unicast packets when the
to-Unicast channel utilization is below the specified threshold.
Conversion
ARP-to-Unicast When enabled, the controller will convert ARP packets into unicast packets.
Conversion
IPv6-Multicast- Enable this option if you have high requirements for IPv6 multicast streaming transmission, such
to-Unicast as high-definition video on demand. When enabled, the AP maintains IPv6 multicast-to-unicast
Conversion entries by listening to MLD report packets and MLD leave packets reported by clients. When the
AP sends an IPv6 multicast packet to a client, it converts the packet into an IPv6 unicast packet
according to the multicast-to-unicast entry, thereby improving the IPv6 transmission efficiency
for better wireless experience.
Multicast Filtering When enabled, the controller will filter the multicast packets of the specified protocols. Improper
settings may cause network issues.
4. 4. 7 AI WLAN Optimization
Overview
AI WLAN Optimization helps improve the wireless network performance. With the AI WLAN Optimization
feature, the controller will detect WiFi interference and monitor the wireless environment. Based on
the environmental factors including network topology, deployment size, traffic, and client factors, the
controller can determine the optimum wireless configurations (such as channel, power, etc.) for the
access points (APs), and thus ensures that wireless clients of each AP can enjoy better WiFi experience.
In AI WLAN Optimization, the results of the last 10 scans are displayed. You can also enable automatic
optimization to allow the controller to conduct RF optimization automatically and set optimization
schedules. In Optimization Log, the past optimization records are displayed, and you can also restore
the previous optimization results as needed.
98
Chapter 4 Configure the Network with the SDN Controller
Configuration
Note:
1. WiFi experience may be influenced during optimization. Please select the spare time to scan and optimize to reduce
its impact on user experience.
2. Because the APs should stay connected during optimization, please set a different time for AI WLAN Optimization and
Reboot Schedule. It is recommended to stagger at least 10 minutes to avoid dissatisfactory results.
1. Select a site from the drop-down list of Organization. Go to Settings > Wireless Networks > AI
WLAN Optimization.
2. Click Deploy Now to begin the optimization. The controller will scan the wireless environment to
conclude the optimum WLAN network configurations. You can view the optimization results in
Optimization Log.
99
Chapter 4 Configure the Network with the SDN Controller
Default: The controller will conduct the optimization with the default configurations.
Custom: The controller will conduct the optimization with the configurations you set.
Automatic Channel Enable this function, and the controller will scan the wireless environment to conclude the
Optimization optimum operation channels for the APs and wireless routers.
Automatic Power Enable this function, and the controller will scan the wireless environment to conclude the
Optimization optimum transmission power for the APs and wireless routers.
Custom Channel Select the channel width for each band, and the optimization will maintain the selected
Width channel width.
Power Range Select Custom if you want to optimize the power within the specified range. You can
limit the transmit power range of each AP/wireless routers after the power deployment
is completed. For high-density deployment, you can try to set a smaller power range. An
over-low value may lead to limited coverage, while an over-high value may lead to strong
interference. (Note: The deployment may fail if the minimum power you select exceeds the
maximum power of the AP to be deployed.)
Power Threshold Select Custom if you want to optimize the power within the specified threshold. You can
adjust the power deployment override threshold according to the actual deployment
height and spacing of APs/wireless routers, achieving optimal wireless coverage after RF
optimization. The larger the threshold, the larger the adjusted overall power value.
100
Chapter 4 Configure the Network with the SDN Controller
Excluded 5 GHz When enabled, you can specify the channels so they will not execute the automatic
Channels optimization.
4. (Optional) Set schedules for WLAN optimization, and save the settings.
Scheduled Enable scheduled optimization, and the controller will automatically adjust the channels for
Optimization the APs/wireless routers on a regular basis.
5. (Optional) In the Excluded APs List, click Add to add the APs that will be excluded from AI WLAN
Optimization. The following APs will be added to the list automatically: APs in the mesh network and
APs with unsupported firmware.
101
Chapter 4 Configure the Network with the SDN Controller
4. 5 Network Security
Network Security is a portfolio of features designed to improve the usability and ensure the safety
of your network and data. It implements policies and controls on multiple layers of defenses in the
network.
4. 5. 1 ACL
Overview
ACL (Access Control List) allows a network administrator to create rules to restrict access to network
resources. ACL rules filter traffic based on specified criteria such as source IP addresses, destination
IP addresses, and port numbers, and determine whether to forward the matched packets. These rules
can be applied to specific clients or groups whose traffic passes through the gateway, switches and
APs.
The system filters traffic against the rules in the list sequentially. The first match determines whether
the packet is accepted or dropped, and other rules are not checked after the first match. Therefore, the
order of the rules is critical. By default, the rules are prioritized by their created time. The rule created
earlier is checked for a match with higher priority. To reorder the rules, select a rule and drag it to a new
position. If no rules match, the device forwards the packet because of an implicit Permit All clause.
The system provides three types of ACL:
■ Gateway ACL
After Gateway ACLs are configured on the controller, they can be applied to the gateway to control
traffic which is sourced from LAN ports and forwarded to the WAN ports.
You can set the Network, IP address, port number of a packet as packet-filtering criteria in the rule.
■ Switch ACL
After Switch ACLs are configured on the controller, they can be applied to the switch to control
inbound and outbound traffic through switch ports.
You can set the Network, IP address, port number and MAC address of a packet as packet-filtering
criteria in the rule.
■ AP ACL
After AP ACLs are configured on the controller, they can be applied to the APs to control traffic in
wireless networks.
You can set the Network, IP address, port number and SSID of a packet as packet-filtering criteria
in the rule.
Configuration
102
Chapter 4 Configure the Network with the SDN Controller
2 ) Define packet-filtering criteria of the rule, including protocols, source, and destination, and
determine whether to forward the matched packets.
2. Define packet-filtering criteria of the rule, including protocols, source, and destination, and
determine whether to forward the matched packets. Refer to the following table to configure the
required parameters and click Apply.
103
Chapter 4 Configure the Network with the SDN Controller
Policy Select the action to be taken when a packet matches the rule.
Protocols Select one or more protocol types to which the rule applies from the drop-down
list. The default is All, indicating that packets of all protocols will be matched. When
you select one of TCP and UDP or both of them, you can set the IP address and port
number of a packet as packet-filtering criteria in the rule.
Log When enabled, the system can collect ACL entry effective log. To use this function,
please configure the remote logging function first.
From the Source drop-down list, choose one of these options to specify the source of the packets
to which this ACL applies:
Network Select the network you have created. If no networks have been created, you can select
the default network (LAN), or go to Settings > Wired Networks > LAN to create one.
The gateway will examine whether the packets are sourced from the selected network.
SSID Select the SSID you have created. If no SSIDs have been created, go to Settings >
Wireless Networks to create one.The system will examine whether the SSID of the
packet is the SSID selected here.
IP Group Select the IP Group you have created. If no IP Groups have been created, click +Create
on this page or go to Settings > Profiles > Groups to create one. The gateway will
examine whether the source IP address of the packet is in the IP Group.
IP-Port Group Select the IP-Port Group you have created. If no IP-Port Groups have been created,
click +Create on this page or go to Settings > Profiles > Groups to create one. The
gateway will examine whether the source IP address and port number of the packet
are in the IP-Port Group.
IPv6 Group IPv6 Group:Select the IPv6 Group you have created. If no IPv6 Groups have been
created, click + Create on this page or go to Settings > Profiles > Groups to create one.
The system will examine whether the source IPv6 address of the packet is in the IPv6
Group.
IPv6-Port Group IPv6-Port Group:Select the IPv6-Port Group you have created. If no IPv6-Port Groups
have been created, click + Create on this page or go to Settings > Profiles > Groups
to create one. The system will examine whether the source IPv6 address and port
number of the packet are in the IPv6-Port Group.
Location Select one or multiple locations from the list as the source address, and the system
will judge whether the source IP of the data packet belongs to the selected locations.
104
Chapter 4 Configure the Network with the SDN Controller
Location Group Select a location group you have created, and the system will judge whether the
source IP of the data packet belongs to this location group. If no location group has
been created, click the create button to create one, or go to Settings > Profiles >
Groups to create one.
From the Destination drop-down list, choose one of these options to specify the destination of the
packets to which this ACL applies:
IP Group Select the IP Group you have created. If no IP Groups have been created, click +Create
on this page or go to Settings > Profiles > Groups to create one. The gateway will
examine whether the destination IP address of the packet is in the IP Group.
IP-Port Group Select the IP-Port Group you have created. If no IP-Port Groups have been created,
click +Create on this page or go to Settings > Profiles > Groups to create one. The
gateway will examine whether the destination IP address and port number of the
packet are in the IP-Port Group.
IPv6 Group Select the IPv6 Group you have created. If no IPv6 Groups have been created, click +
Create on this page or go to Settings > Profiles > Groups to create one. The system
will examine whether the destination IPv6 address of the packet is in the IPv6 Group.
IPv6-Port Group Select the IPv6-Port Group you have created. If no IPv6-Port Groups have been
created, click + Create on this page or go to Settings > Profiles > Groups to create one.
The system will examine whether the destination IPv6 address and port number of the
packet are in the IPv6-Port Group.
Location Select one or multiple locations from the list as the destination address, and the
system will judge whether the destination IP of the data packet belongs to the selected
locations.
Location Group Select a location group you have created, and the system will judge whether the
destination IP of the data packet belongs to this location group. If no location group
has been created, click the create button to create one, or go to Settings > Profiles >
Groups to create one.
Gateway Management This option will allow/block LAN network devices to access the gateway management
Page page.
Time Range Select the checkbox to enable time-based ACL. You can create a time range or select
an existing time range for the ACL rule to take effect.
Bi-Directional When Direction is LAN->LAN, you can enable this option to configure bi-directional
traffic rule.
105
Chapter 4 Configure the Network with the SDN Controller
States Type Determine the type of stateful ACL rule. It is recommended to use the default Auto
type.
Auto (Match Sate New/Established/Related): Match the new, established, and related
connection states.
Manual: If selected, you can manually specify the connection states to match.
Match State New: Match the connections of the initial state. For example, a SYN
packet arrives in a TCP connection, or the router only receives traffic in one
direction.
Match State Established: Match the connections that have been established. In other
words, the firewall has seen the bidirectional communication of this connection.
Match State Related: Match the associated sub-connections of a main connection,
such as a connection to a FTP data channel.
106
Chapter 4 Configure the Network with the SDN Controller
107
Chapter 4 Configure the Network with the SDN Controller
2. Define packet-filtering criteria of the rule, including protocols, source, and destination, and
determine whether to forward the matched packets. Refer to the following table to configure the
required parameters.
Policy Select the action to be taken when a packet matches the rule.
Protocols Select one or more protocol types to which the rule applies from the drop-down
list. The default is All, indicating that packets of all protocols will be matched. When
you select one of TCP and UDP or both of them, you can set the IP address and port
number of a packet as packet-filtering criteria in the rule.
Time Range Select the checkbox to enable time-based ACL. You can create a time range or select
an existing time range for the ACL rule to take effect.
Ethertype Click the checkbox if you want the switch to check the ethertype of the packets, and
configure the Ethertype based on needs.
Bi-Directional Click the checkbox to enable the switch to create another symmetric ACL with the
name “xxx_reverse”, where “xxx” is the name of the current ACL. The two ACLs target
at packets with the opposite direction of each other.
From the Source drop-down list, choose one of these options to specify the source of the packets
to which this ACL applies:
Network Select the network you have created. If no networks have been created, you can select
the default network (LAN), or go to Settings > Wired Networks > LAN to create one.
The switch will examine whether the packets are sourced from the selected network.
IP Group Select the IP Group you have created. If no IP Groups have been created, click +Create
on this page or go to Settings > Profiles > Groups to create one. The switch will
examine whether the source IP address of the packet is in the IP Group.
IP-Port Group Select the IP-Port Group you have created. If no IP-Port Groups have been created,
click +Create on this page or go to Settings > Profiles > Groups to create one. The
switch will examine whether the source IP address and port number of the packet are
in the IP-Port Group.
MAC Group Select the MAC Group you have created. If no MAC Groups have been created, click
+Create on this page or go to Settings > Profiles > Groups to create one. The switch
will examine whether the source MAC address of the packet is in the MAC Group.
IPv6 Group Select the IPv6 Group you have created. If no IPv6 Groups have been created, click
+Create on this page or go to Settings > Profiles > Groups to create one. The switch
will examine whether the source IP address of the packet is in the IPv6 Group.
108
Chapter 4 Configure the Network with the SDN Controller
IPv6-Port Group Select the IPv6-Port Group you have created. If no IPv6-Port Groups have been
created, click +Create on this page or go to Settings > Profiles > Groups to create one.
The switch will examine whether the source IP address and port number of the packet
are in the IPv6-Port Group.
From the Destination drop-down list, choose one of these options to specify the destination of the
packets to which this ACL applies:
Network Select the network you have created. If no networks have been created, you can select
the default network (LAN), or go to Settings > Wired Networks > LAN to create one.
The switch will examine whether the packets are forwarded to the selected network.
IP Group Select the IP Group you have created. If no IP Groups have been created, click +Create
on this page or go to Settings > Profiles > Groups to create one. The switch will
examine whether the destination IP address of the packet is in the IP Group.
IP-Port Group Select the IP-Port Group you have created. If no IP-Port Groups have been created,
click +Create on this page or go to Settings > Profiles > Groups to create one. The
switch will examine whether the destination IP address and port number of the packet
are in the IP-Port Group.
MAC Group Select the MAC Group you have created. If no MAC Groups have been created, click
+Create on this page or go to Settings > Profiles > Groups to create one. The switch
will examine whether the destination MAC address of the packet is in the MAC Group.
IPv6 Group Select the IPv6 Group you have created. If no IPv6 Groups have been created, click
+Create on this page or go to Settings > Profiles > Groups to create one. The switch
will examine whether the destination IP address of the packet is in the IPv6 Group.
IPv6-Port Group Select the IPv6-Port Group you have created. If no IPv6-Port Groups have been
created, click +Create on this page or go to Settings > Profiles > Groups to create one.
The switch will examine whether the destination IP address and port number of the
packet are in the IPv6-Port Group.
3. Bind the switch ACL to a switch port or a VLAN and click Apply. Note that a switch ACL takes effect
only after it is bound to a port or VLAN.
Ports: Select All Ports or Custom Ports as the interfaces to be bound with the ACL. With All
ports selected, the rule is applied to all ports of the switch. With Custom ports selected, the rule
is applied to the selected ports of the switch. Click the ports from the Device List to select the
binding ports.
VLAN: Select a VLAN and specify the switches as the interface to be bound with the ACL. If no
VLANs have been created, you can select the default VLAN 1 (LAN), or go to Settings > Wired
Networks > LAN to create one.
109
Chapter 4 Configure the Network with the SDN Controller
■ Configuring AP ACL
1. Select a site from the drop-down list of Organization. Go to Settings > Network Security > ACL.
Under the AP ACL tab, click to load the following page.
2. Define packet-filtering criteria of the rule, including protocols, source, and destination, and
determine whether to forward the matched packets. Refer to the following table to configure the
required parameters and click Apply.
110
Chapter 4 Configure the Network with the SDN Controller
Policy Select the action to be taken when a packet matches the rule.
Protocols Select one or more protocol types to which the rule applies from the drop-down
list. The default is All, indicating that packets of all protocols will be matched. When
you select one of TCP and UDP or both of them, you can set the IP address and port
number of a packet as packet-filtering criteria in the rule.
From the Source drop-down list, choose one of these options to specify the source of the packets
to which this ACL applies:
Network Select the network you have created. If no networks have been created, you can select
the default network (LAN), or go to Settings > Wired Networks > LAN to create one.
The AP will examine whether the packets are sourced from the selected network.
IP Group Select the IP Group you have created. If no IP Groups have been created, click +Create
on this page or go to Settings > Profiles > Groups to create one. The AP will examine
whether the source IP address of the packet is in the IP Group.
IP-Port Group Select the IP-Port Group you have created. If no IP-Port Groups have been created,
click +Create on this page or go to Settings > Profiles > Groups to create one. The AP
will examine whether the source IP address and port number of the packet are in the
IP-Port Group.
SSID Select the SSID you have created. If no SSIDs have been created, go to Settings >
Wireless Networks to create one. The AP will examine whether the SSID of the packet
is the SSID selected here.
IPv6 Group Select the IPv6 Group you have created. If no IPv6 Groups have been created, click
+Create on this page or go to Settings > Profiles > Groups to create one. The AP will
examine whether the source IP address of the packet is in the IPv6 Group.
IPv6-Port Group Select the IPv6-Port Group you have created. If no IPv6-Port Groups have been
created, click +Create on this page or go to Settings > Profiles > Groups to create one.
The AP will examine whether the source IP address and port number of the packet are
in the IPv6-Port Group.
From the Destination drop-down list, choose one of these options to specify the destination of the
packets to which this ACL applies:
Network Select the network you have created. If no networks have been created, you can select
the default network (LAN), or go to Settings > Wired Networks > LAN to create one.
The AP will examine whether the packets are forwarded to the selected network.
IP Group Select the IP Group you have created. If no IP Groups have been created, click +Create
on this page or go to Settings > Profiles > Groups to create one. The AP will examine
whether the destination IP address of the packet is in the IP Group.
111
Chapter 4 Configure the Network with the SDN Controller
IP-Port Group Select the IP-Port Group you have created. If no IP-Port Groups have been created,
click +Create on this page or go to Settings > Profiles > Groups to create one. The AP
will examine whether the destination IP address and port number of the packet are in
the IP-Port Group.
IPv6 Group Select the IPv6 Group you have created. If no IPv6 Groups have been created, click
+Create on this page or go to Settings > Profiles > Groups to create one. The AP will
examine whether the destination IP address of the packet is in the IPv6 Group.
IPv6-Port Group Select the IPv6-Port Group you have created. If no IPv6-Port Groups have been
created, click +Create on this page or go to Settings > Profiles > Groups to create one.
The AP will examine whether the destination IP address and port number of the packet
are in the IPv6-Port Group.
4. 5. 2 URL Filtering
Overview
URL Filtering allows a network administrator to create rules to block or allow certain websites, which
protects it from web-based threats, and deny access to malicious websites.
In URL filtering, the system compares the URLs in HTTP, HTTPS and DNS requests against the lists of
URLs that are defined in URL Filtering rules, and intercepts the requests that are directed at a blocked
URLs. These rules can be applied to specific clients or groups whose traffic passes through the gateway
and APs.
The system filters traffic against the rules in the list sequentially. The first match determines whether
the packet is accepted or dropped, and other rules are not checked after the first match. Therefore, the
order of the rules is critical. By default, the rules are prioritized based on the sequence they are created.
The rule created earlier is checked for a match with a higher priority. To reorder the rules, select a rule
and drag it to a new position. If no rules match, the device forwards the packet because of an implicit
Permit All clause.
Note that URL Filtering rules take effects with a higher priority over ACL rules. That is, the system will
process the URL Filtering rule first when the URL Filtering rule and ACL rules are configured at the same
time.
Configuration
112
Chapter 4 Configure the Network with the SDN Controller
2. Define filtering criteria of the rule, including source and URLs, and determine whether to forward
the matched packets. Refer to the following table to configure the required parameters and click
Apply.
Policy Select the action to be taken when a packet matches the rule.
Deny: Discard the matched packet and the clients cannot access the URLs.
Permit: Forward the matched packet and clients can access the URLs.
Source Type Select the source of the packets to which this rule applies.
Network: With Network selected, select the network you have created from the
Network drop-down list. If no networks have been created, you can select the default
network (LAN), or go to Settings > Wired Networks > LAN to create one. The gateway
will filter the packets sourced from the selected network.
IP Group: With IP Group selected, select the IP Group you have created from the IP
Group drop-down list. If no IP Groups have been created, click +Create New IP Group
on this page or go to Settings > Profiles > Groups to create one. The gateway will
examine whether the source IP address of the packet is in the IP Group.
113
Chapter 4 Configure the Network with the SDN Controller
URL address should be given in a valid format. The URL which contains a wildcard(*) is
supported. One URL with a wildcard(*) can match mutiple subdomains. For example,
with *.tp-link.com specified, community.tp-link.com will be matched.
■ Configuring AP Rules
1. Select a site from the drop-down list of Organization. Go to Settings > Network Security > URL
Filtering. On AP Rules tab, click to load the following page.
2. Define filtering criteria of the rule, including source and URLs, and determine whether to forward
the matched packets. Refer to the following table to configure the required parameters and click
Apply.
Policy Select the action to be taken when a packet matches the rule.
Deny: Discard the matched packet and the clients cannot access the URLs.
Permit: Forward the matched packet and clients can access the URLs.
Source Type Select the SSID of the packets to which this rule applies.
114
Chapter 4 Configure the Network with the SDN Controller
URL address should be given in a valid format. The URL which contains a wildcard(*) is
supported. One URL with a wildcard(*) can match mutiple subdomains. For example,
with *.tp-link.com specified, community.tp-link.com will be matched.
4. 5. 3 MAC Filtering
Overview
MAC Filtering can drop or allow packets from certain devices passing through the router based on the
MAC address of the devices. After the MAC filtering policy and MAC filtering list are configured, the
router will apply the filter policy to the packets matching the MAC address, and thus limit network traffic
and manage network access behaviors.
Configuration
1. Select a site from the drop-down list of Organization. Go to Settings > Network Security > MAC
Filtering.
2. Enable MAC Filtering and configure the parameters.
Allow packets with the MAC addresses listed below and deny the rest: Select to allow
packets with the listed MAC address to pass through the router, and packets with
other MAC addresses will be dropped.
Deny packets with the MAC addresses listed below and allow the rest: Select to drop
packets with the listed MAC address, and packets with other MAC addresses will be
allowed to pass through the router.
Direction Select All when you want to apply the policy to traffic both from LAN to LAN and from
LAN to WAN. Select LAN -> WAN when you want to apply the policy only to traffic from
LAN to WAN.
115
Chapter 4 Configure the Network with the SDN Controller
3. Click Add MAC Filtering to add MAC addresses or groups to the list.
Policy Choose MAC Group and specify the MAC groups of devices, then the MAC filtering
policy will be applied to traffic with the MAC groups.
Choose MAC Address and specify the MAC addresses of devices, then the MAC
filtering policy will be applied to traffic with the MAC addresses.
4. 5. 4 Attack Defense
Overview
Attacks initiated by utilizing inherent bugs of communication protocols or improper network deployment
have negative impacts on networks. In particular, attacks on a network device can cause the device or
network paralysis.
With the Attack Defense feature, the gateway can identify and discard various attack packets in the
network, and limit the packet receiving rate. In this way, the gateway can protect itself and the connected
network against malicious attacks.
The gateway provides two types of Attack Defense:
■ Flood Defense
If an attacker sends a large number of fake packets to a target device, the target device is busy with
these fake packets and cannot process normal services. Flood Defense detects flood packets in real
time and limits the receiving rate of the packets to protect the device.
Flood attacks include TCP SYN flood attacks, UDP flood attacks, and ICMP flood attacks.
116
Chapter 4 Configure the Network with the SDN Controller
Configuration
Multi-Connections TCP A TCP SYN flood attack occurs when the attacker sends the target system with a
SYN Flood succession of SYN (synchronize) requests. When the system responds, the attacker
does not complete the connections, thus leaving the connection half-open and
flooding the system with SYN messages. No legitimate connections can then be
made.
With this feature enabled, the gateway limits the rate of receiving TCP SYN packets
from all the clients to the specified rate.
Multi-Connections UDP A UDP flood attack occurs when the attacker sends a large number of UDP packets
Flood to a target host in a short time, the target host is busy with these UDP packets and
cannot process normal services.
With this feature enabled, the gateway limits the rate of receiving UDP packets from
all the clients to the specified rate.
Multi-Connections ICMP If an attacker sends many ICMP Echo messages to the target device, the target device
Flood is busy with these Echo messages and cannot process other data packets. Therefore,
normal services are affected.
With this feature enabled, the system limits the rate of receiving ICMP packets from all
the clients to the specified rate.
117
Chapter 4 Configure the Network with the SDN Controller
Stationary Source TCP A TCP SYN flood attack occurs when the attacker sends the target system with a
SYN Flood succession of SYN (synchronize) requests. When the system responds, the attacker
does not complete the connections, thus leaving the connection half-open and
flooding the system with SYN messages. No legitimate connections can then be
made.
With this feature enabled, the gateway limits the rate of receiving TCP SYN packets
from a single client to the specified rate.
Stationary Source UDP A UDP flood attack occurs when the attacker sends a large number of UDP packets
Flood to a target host in a short time, the target host is busy with these UDP packets and
cannot process normal services.
With this feature enabled, the gateway limits the rate of receiving UDP packets from a
single client to the specified rate.
Stationary Source ICMP If an attacker sends many ICMP Echo messages to the target device, the target device
Flood is busy with these Echo messages and cannot process other data packets. Therefore,
normal services are affected.
With this feature enabled, the system limits the rate of receiving ICMP packets from a
single clients to the specified rate.
118
Chapter 4 Configure the Network with the SDN Controller
Block Fragment Traffic With this option enabled, the fragmented packets without the first part of the packet
will be discarded.
119
Chapter 4 Configure the Network with the SDN Controller
Block TCP Scan (Stealth With this option enabled, the gateway will block the anomalous packets in the
FIN/Xmas/Null) following attack scenarios:
Stealth FIN Scan: The attacker sends the packet with its SYN field and the FIN field set
to 1. The SYN field is used to request initial connection whereas the FIN field is used to
request disconnection. Therefore, the packet of this type is illegal.
Xmas Scan: The attacker sends the illegal packet with its TCP index, FIN, URG and PSH
field set to 1.
Null Scan: The attacker sends the illegal packet with its TCP index and all the control
fields set to 0. During the TCP connection and data transmission, the packets with all
control fields set to 0 are considered illegal.
Block TCP Scan with With this option enabled, the gateway will respond to RST messages. It is disabled by
RST default.
Block Ping of Death With this option enabled, the gateway will block Ping of Death attack. Ping of Death
attack means that the attacker sends abnormal ping packets which are smaller than
64 bytes or larger than 65535 bytes to cause system crash on the target computer.
Block Large Ping With this option enabled, the router will block the ping packets which are larger than
1024 packets to protect the system from Large Ping attack.
Block Ping from WAN With this option enabled, the router will block the ICMP request from WAN.
Block WinNuke Attack With this option enabled, the router will block WinNuke attacks. WinNuke attack refers
to a remote DoS (denial-of-service) attack that affects some Windows operating
systems, such as the Windows 95. The attacker sends a string of OOB (Out of Band)
data to the target computer on TCP port 137, 138 or 139, causing system crash or
Blue Screen of Death.
Block TCP Packets with With this option enabled, the router will filter the TCP packets with both SYN Bit and
SYN and FIN Bits Set FIN Bit set.
Block TCP Packets with With this option enabled, the router will filter the TCP packets with FIN Bit set but
FIN Bit but No ACK Bit without ACK Bit set.
Set
Block Packets with With this option enabled, the router will filter the packets with specified IP options
Specified Options including Security Option, Loose Source Route Option, Strict Source Route Option,
Record Route Option, Stream Option, Timestamp Option, and No Operation Option.
4. 5. 5 Firewall
Overview
Firewall is used to enhance the network security. In State Timeouts, you can specify a number of
timeouts for sessions including TCP, UDP, and ICMP connection. The packets will be forwarded within
the specified timeout. When there is no response after the specified time, the session or status will be
closed. State timeout will help close inactive sessions and thus avoid network malfunction. In Firewall
120
Chapter 4 Configure the Network with the SDN Controller
Options, you can further configure the gateway to prevent attacks like SYN flood attacks and broadcast
ping.
Configuration
ICMP The ICMP session will be closed if there is no response after the set time.
Other The sessions for protocols excluding TCP, UDP, and ICMP will be closed if there is no
response after the set time.
TCP Close The TCP Close status will be closed if there is no response after the set time.
TCP Close Wait The TCP Close Wait status will be closed if there is no response after the set time.
TCP Established The TCP Established status will be closed if there is no response after the set time.
TCP FIN Wait The TCP FIN Wait status will be closed if there is no response after the set time.
121
Chapter 4 Configure the Network with the SDN Controller
TCP Last ACK The TCP Last ACK status will be closed if there is no response after the set time.
TCP SYN Recv The TCP SYN (Synchronize) Recv status will be closed if there is no response after the
set time.
TCP SYN Sent The TCP SYN (Synchronize) Sent status will be closed if there is no response after the
set time.
TCP Time Wait The TCP Time Wait status will be closed if there is no response after the set time.
UDP Other The UDP connections with traffic in only one direction will be stopped if there is no
response after the set time.
UDP Stream The UDP connections with bidirectional traffic will be stopped if there is no response
after the set time.
Broadcast Ping With it enabled, the gateway will reply to broadcast pings.
Receive Redirects With it enabled, the gateway will accept ICMP redirects.
Send Redirects With it enabled, the gateway will send ICMP redirects.
SYN Cookies With it enabled, the SYN cookies will be used to resist SYN flood attacks that want to
open ports on the gateway.
4. 5. 6 IP-MAC Binding
Overview
ARP (Address Resolution Protocol) is used to map IP addresses to the corresponding MAC addresses
so that packets can be delivered to their destinations. However, if attackers send ARP spoofing packets
with false IP address-to-MAC address mapping entries, the device will update the ARP table based
122
Chapter 4 Configure the Network with the SDN Controller
on the false ARP packets and record wrong mapping entries, which results in a breakdown of normal
communication.
Anti ARP Spoofing can protect the network from ARP spoofing attacks. It works based on the IP-MAC
Binding. These entries record the correct one-to-one relationships between IP addresses and MAC
addresses. When receiving an ARP packet, the router checks whether it matches any of the IP-MAC
Binding entries. If not, the router will ignore the ARP packets. In this way, the router maintains the correct
ARP table.
Configuration
1. Select a site from the drop-down list of Organization. Go to Settings > Network Security > IP-MAC
Binding.
2. Enable ARP Spoofing Defense and configure general settings. Click Apply.
ARP Spoofing Defense Check the box to globally enable ARP Spoofing Defense.
Interface Select the interface on which the entries will take effect.
Permit the packets With this option enabled, when receiving a packet, the router will check whether the
matching the IP-MAC IP address, MAC address and receiving interface match any of the IP-MAC Binding
Binding entries only entries. Only the matched packets will be forwarded. This feature can be enabled only
when ARP Spoofing Defense is enabled.
Send GARP packets With this option enabled, the router will send GARP packets to the hosts if it detects
when ARP attack is ARP spoofing packets on the network. The GARP packets will inform the hosts of the
detected correct ARP information, which is used to replace the wrong ARP information in the
hosts. This feature can be enabled only when ARP Spoofing Defense is enabled.
Interval Specify the time interval for sending GARP packets. The valid values are from 1 to
10000.
123
Chapter 4 Configure the Network with the SDN Controller
3. Click Create New IP-MAC Binding Entry and add an IP-MAC binding entry. Click Apply.
Interface Select the interface on which the entries will take effect.
Status Enable the entry. Only when the status is enabled will the entry take effect.
4. 5. 7 IDS/IPS
Overview
IDS/IPS is a security mechanism that detects intrusions based on attack characteristics. It can detect
buffer overflows, Trojan horses, worms, SQL injections and other attacks to protect the network
security of users.
Note:
Using Intrusion Detection/Prevention may reduce maximum throughput speeds.
Configuration
1. Select a site from the drop-down list of Organization. Go to Settings > Network Security > IDS/IPS.
124
Chapter 4 Configure the Network with the SDN Controller
In IDS mode, the system will only report the threat log.
In IPS mode, the system will block the corresponding connection for 300s after a
threat is detected.
Security Level Choose the protection level. A higher protection level means more threat types are
detected, while a lower protection level only detects some important threats. You can
also customize the protection level.
Effective Time Specify the effective time period of the IDS/IPS module.
3. Apply the settings. When the system discovers a threat, the corresponding threat log will be
displayed on the Insights > Threat Management page. For a specific threat log, you can choose a
specified response strategy.
Block List
The Block List page displays all block entries added through the Threat Management page. Users can
choose to block all traffic of the source IP in the threat log, or block all traffic between the source IP and
the destination IP in the threat log.
125
Chapter 4 Configure the Network with the SDN Controller
Allow List
On the Allow List page, you can add, view, and edit the exemption entries of IDS/IPS detection, so that
the specified objects will no longer trigger threat logs.
Click Create New Allow List and configure the parameters.
Direction Specify the location of the object (target) exempt from triggering the threat: source,
destination, or both directions.
Track By Specify the type of object (target) exempt from triggering the threat: IP address,
Network, or Subnet.
Signature Suppression
The Signature Suppression page displays all the signature suppression entries added through the
Threat Management page, and the objects with signature suppressed will no longer trigger specific
threat logs.
126
Chapter 4 Configure the Network with the SDN Controller
4. 6 Transmission
Transmission helps you control network traffic in multiple ways. You can add policies and rules to control
transmission routes and limit the session and bandwidth.
4. 6. 1 Routing
Overview
■ Static Route
Network traffic is oriented to a specific destination, and Static Route designates the next hop or
interface where to forward the traffic.
■ Policy Routing
Policy Routing designates which WAN port the router uses to forward the traffic based on the
source, the destination, and the protocol of the traffic.
Configuration
■ Static Route
1. Go to Setting > Transmission > Routing > Static Route. Click + Create New Route to load the
following page and configure the parameters.
127
Chapter 4 Configure the Network with the SDN Controller
Destination IP/Subnet Destination IP/Subnet identifies the network traffic which the Static Route
entry controls. Specify the destination of the network traffic in the format of
192.168.0.1/24. You can click + Add Subnet to specify multiple Destination IP/
Subnets and click to delete them.
Route Type Next Hop: With Next Hop selected, your devices forward the corresponding
network traffic to a specific IP address. You need to specify the IP address as
Next Hop.
Metric Define the priority of the Static Route entry. A smaller value means a higher
priority. If multiple entries match the Destination IP/Subnet of the traffic, the entry
of higher priority takes precedence. In general, you can simply keep the default
value.
2. Click Create. The new Static Route entry is added to the table. You can click to edit the entry.
You can click to delete the entry.
128
Chapter 4 Configure the Network with the SDN Controller
■ Policy Routing
1. Go to Setting > Transmission > Routing > Policy Routing. Click + Create New Routing to load the
following page and configure the parameters.
Protocols Select the protocols of the traffic which the Policy Routing entry controls. The
Policy Routing entry takes effect only when the traffic matches the criteria of the
entry including the protocols.
WAN Select the WAN port to forward the traffic through. If you want to forward the
traffic through the other WAN port when the current WAN is down, enable Use the
other WAN port if the current WAN is down.
129
Chapter 4 Configure the Network with the SDN Controller
Routing Legend The Policy Routing entry takes effect only when the traffic using specified
protocols matches the source and destination which are specified in the Routing
Legend.
Network: Select the LAN Interfaces for the traffic source or destination.
IP Group: Select the IP Group for the traffic source or destination. You can click +
Create to create a new IP Group.
IP-Port Group: Select the IP-Port Group for the traffic source or destination. You
can click + Create to create a new IP-Port Group.
2. Click Create. The new Policy Routing entry is added to the table. You can click to edit the
entry. You can click to delete the entry.
4. 6. 2 NAT
Overview
■ Port Forwarding
You can configure Port Forwarding to allow internet users to access local hosts or use network
services which are deployed in the LAN.
Port Forwarding helps establish network connections between a host on the internet and the
other in the LAN by letting the traffic pass through the specific port of the gateway. Without Port
Forwarding, hosts in the LAN are typically inaccessible from the internet for the sake of security.
■ ALG
ALG ensures that certain application-level protocols function appropriately through your gateway.
■ One-to-One NAT
One-to-One NAT will establish a correspondence between a private IP and a public IP, allowing
access to the device with the private IP through the corresponding public IP.
130
Chapter 4 Configure the Network with the SDN Controller
Configuration
■ Port Forwarding
1. Go to Setting > Transmission > NAT > Port Forwarding. Click + Create New Rule to load the
following page and configure the parameters.
Source IP Any: The rule applies to traffic from any source IP address.
Limited IP Address: The rule only applies to traffic from specific IP addresses.
With this option selected, specify the IP addresses and subnets according to your
needs.
Interface Select the interface which the rule applies to. Traffic which is received through
the interface is forwarded according to the rule.
131
Chapter 4 Configure the Network with the SDN Controller
DMZ With DMZ enabled, all the traffic is forwarded to the Destination IP in the LAN, port
to port. You need to specify the Destination IP.
With DMZ disabled, only the traffic which matches the Source Port and the
Protocol is forwarded. The traffic is forwarded to the Destination Port of the
Destination IP in the LAN. You need to specify the Source Port, Destination IP,
Destination Port, and Protocol.
Source Port The gateway uses the Source Port to receive the traffic from the internet. Only
the traffic which matches the Source Port and the Protocol is forwarded.
Destination IP The traffic is forwarded to the host of the Destination IP in the LAN.
Destination Port The traffic is forwarded to the Destination Port of the host in the LAN.
Protocol Network traffic is transmitted using either TCP or UDP protocol. Only the traffic
which matches the Source Port and the Protocol is forwarded.
If you want both TCP traffic and UDP traffic to be forwarded, select All.
2. Click Create. The new Port Forwarding entry is added to the table. You can click to edit the
entry. You can click to delete the entry.
■ ALG
Go to Setting > Transmission > NAT > ALG. Enable or disable certain types of ALG according to your
needs and click Apply.
132
Chapter 4 Configure the Network with the SDN Controller
FTP ALG FTP ALG allows the FTP server and client to transfer data using the FTP protocol in
one of the following scenarios:
• The FTP server is in the LAN, while the FTP client is on the internet.
• The FTP server is on the internet, while the FTP client is in the LAN.
• The FTP server and FTP client are in different LANs.
H.323 ALG H.323 ALG allows the IP phones and multimedia devices to set up connections using
the H.323 protocol in one of the following scenarios:
• One of the endpoints is in the LAN, while the other is on the internet.
• The endpoints are in different LANs.
PPTP ALG PPTP ALG allows the PPTP server and client to set up a PPTP VPN in one of the
following scenarios:
• The PPTP server is in the LAN, while the PPTP client is on the internet.
• The PPTP server is on the internet, while the PPTP client is in the LAN.
• The PPTP server and PPTP client are in different LANs.
SIP ALG SIP ALG allows the IP phones and multimedia devices to set up connections using the
SIP protocol in one of the following scenarios:
• One of the endpoints is in the LAN, while the other is on the internet.
• The endpoints are in different LANs.
IPsec ALG IPsec ALG allows the IPsec endpoints to set up an IPsec VPN in one of the following
scenarios:
• One of the endpoints is in the LAN, while the other is on the internet.
• The endpoints are in different LANs.
133
Chapter 4 Configure the Network with the SDN Controller
■ One-to-One NAT
1. Go to Setting > Transmission > NAT > One-to-One NAT. Click + Create New Rule to load the
following page and configure the parameters.
Interface Specify the effective interface for the rule only when the connection type is Static
IP.
Original IP Specify the original IP address for the rule, which means the device’s private
IP. The original IP address cannot be the broadcast address, network segment
or interface IP. With One-to-One NAT enabled, the original IP will map to the
translated IP.
Translated IP Specify the translated IP address for the rule, which means the public IP of device.
The translated IP address cannot be the broadcast address, network segment
or interface IP. With One-to-One NAT enabled, the original IP will map to the
translated IP.
DMZ Forwarding Choose to enable DMZ Forwarding. The packets transmitted to the translated
IP address will be forwarded to the host with the original IP address if DMZ
Forwarding is enabled.
134
Chapter 4 Configure the Network with the SDN Controller
4. 6. 3 Session Limit
Overview
Session Limit optimizes network performance by limiting the maximum sessions of specific sources.
Configuration
1. Go to Setting > Transmission > Session Limit. In Session Limit, enable Session Limit globally and
click Apply.
2. In Session Limit Rule List, click + Create New Rule to load the following page and configure the
parameters.
135
Chapter 4 Configure the Network with the SDN Controller
Source Type Network: Limit the maximum sessions of specific LAN networks. With this option
selected, select the networks, which you can customize in Wired Networks > LAN
Networks. For detailed configuration of networks, refer to 4. 3. 2 Configure LAN
Networks.
IP Group: Limit the maximum sessions of specific IP Groups. With this option selected,
select the IP Groups, which you can customize in Profiles > Groups. For detailed
configuration of IP groups, refer to 4. 8 Create Profiles.
3. Click Create. The new Session Limit rule is added to the list. You can click to edit the rule. You can
click to delete the rule.
4. 6. 4 Bandwidth Control
Overview
Bandwidth Control optimizes network performance by limiting the bandwidth of specific sources.
Configuration
1. Go to Setting > Transmission > Bandwidth Control. In Bandwidth Control, enable Bandwidth Control
globally and configure the parameters. Then click Apply.
136
Chapter 4 Configure the Network with the SDN Controller
Threshold Control With Threshold Control enabled, Bandwidth Control takes effect only when total
bandwidth usage reaches the specified percentage. You need to specify the total
Upstream Bandwidth and Downstream Bandwidth of the WAN ports. It’s recommended
to use the Test Speed tool to decide the actual Upstream Bandwidth and Downstream
Bandwidth.
2. In Bandwidth Control Rule List, click + Create New Rule to load the following page and configure the
parameters.
Source Type Network: Limit the maximum bandwidth of specific LAN networks. With this option
selected, select the networks, which you can customize in Wired Networks > LAN
Networks. For detailed configuration of networks, refer to 4. 3. 2 Configure LAN
Networks.
IP Group: Limit the maximum bandwidth of specific IP Groups. With this option
selected, select the IP Groups, which you can customize in Profiles > Groups. For
detailed configuration of IP groups, refer to 4. 8 Create Profiles.
WAN Select the WAN port which the rule applies to.
137
Chapter 4 Configure the Network with the SDN Controller
Upstream Bandwidth Specify the limit of Upstream Bandwidth, which the specific local hosts use to transmit
traffic to the internet through the gateway.
Downstream Bandwidth Specify the limit of Downstream Bandwidth, which the specific local hosts use to
receive traffic from the internet through the gateway.
Mode Specify the bandwidth control mode for the specific local hosts.
Shared: The total bandwidth for all the local hosts is equal to the specified values.
Individual: The bandwidth for each local host is equal to the specified values.
3. Click Create. The new Bandwidth Control rule is added to the list. You can click to edit the rule.
You can click to delete the rule.
4. 6. 5 Gateway QoS
■ Bandwidth Control
This page allows you to configure rules to limit various data flows. In this way, you can optimize the
network performance by reasonably utilizing the bandwidth.
Configuration
1. Select a site from the drop-down list of Organization. Go to Setting > Transmission > Gateway QoS.
138
Chapter 4 Configure the Network with the SDN Controller
WAN Interface Select the WAN port. You can configure the QoS rule for a WAN port only when the
port is enabled.
UDP Bandwidth Control Check the box to enable UDP bandwidth control.
139
Chapter 4 Configure the Network with the SDN Controller
Limited Bandwidth When UDP Bandwidth Control is enabled, specify the bandwidth ratio of UDP at each
Ratio level of class1/2/3/other.
Outbound TCP ACK Check the box to prioritize outbound TCP ACK packets. This function ensures that
Prioritize traffic is not slowed down by remote hosts waiting for ACK packets before sending
further traffic.
Direction Specify the direction of the controlled traffic. “out” means control sending packets. “in”
means receiving packets. “both” means both are controlled.
Class1/Class2/Class3/ Specify the proportion of the maximum bandwidth that Class1, Class2, Class3 and
Others Others can occupy to limit the bandwidth usage of specific classification traffic.
■ Class Rule
This page allows you to add or delete class rules. Rules will be matched from top to bottom according
to the rule sequence number. When the traffic matches a rule, it will be assigned to the corresponding
class and will not continue to match down.
Configuration
1. Select a site from the drop-down list of Organization. Go to Setting > Transmission > Gateway QoS
> Class Rule.
140
Chapter 4 Configure the Network with the SDN Controller
Local Address Match the source IP address of the traffic. For IPv4 protocol, you can use the IP Group
object configured in the Profiles > Groups module. For the IPv6 protocol, you can use
the IPv6 Group object configured in the Profiles > Groups module.
Remote Address Match the destination IP address of the traffic. For IPv4 protocol, you can use the IP
Group object configured in the Profiles > Groups module. For the IPv6 protocol, you
can use the IPv6 Group object configured in the Profiles > Groups module.
DSCP Match the DSCP value of the traffic: Any, IP procedure, AF, or EF.
Service Name Match the port number of the traffic. Select the service type object defined in the
Preference > Service Type module.
QoS Class Select the category of traffic that meets the rule.
■ VoIP Prioritization
This page allows you to configure VoIP prioritization.
141
Chapter 4 Configure the Network with the SDN Controller
Configuration
1. Select a site from the drop-down list of Organization. Go to Setting > Transmission > Gateway QoS
> VoIP Prioritization.
2. Enable the first priority for VoIP SIP/RTP and enter the SIP UDP port. Then apply the settings.
Enable the First Priority Check the box to enable prioritize VoIP traffic.
for VoIP SIP/RTP
SIP UDP Port Enter the UDP port ID of the VoIP traffic.
Configuration
1. Select a site from the drop-down list of Organization. Go to Setting > Transmission > Gateway QoS
> Tag Outbound Traffic.
2. Check the box for your desired class and select the DSCP or Precedence value.
Class 1/2/3/Others Check the box and select the DSCP ( Any, IP procedure, AF, or EF) or Precedence value
for traffic.
142
Chapter 4 Configure the Network with the SDN Controller
4. 7 Configure VPN
VPN (Virtual Private Network) provides a means for secure communication between remote computers
across a public wide area network (WAN), such as the internet. The gateways supports various types
of VPN.
4. 7. 1 VPN
Overview
VPN (Virtual Private Network) gives remote LANs or users secure access to LAN resources over a public
network such as the internet. Virtual indicates the VPN connection is based on the logical end-to-end
connection instead of the physical end-to-end connection. Private indicates users can establish the
VPN connection according to their requirements and only specific users are allowed to use the VPN
connection.
The core of VPN connection is to realize tunnel communication, which fulfills the task of data
encapsulation, data transmission and data decompression via the tunneling protocol. The gateway
supports common tunneling protocols that a VPN uses to keep the data secure:
■ IPsec
IPsec (IP Security) can provide security services such as data confidentiality, data integrity and data
authentication at the IP layer. IPsec uses IKE (Internet Key Exchange) to handle negotiation of protocols
and algorithms based on the user-specified policy, and to generate the encryption and authentication
keys to be used by IPsec. IPsec can be used to protect one or more paths between a pair of hosts,
between a pair of security gateways, or between a security gateway and a host.
■ PPTP
PPTP (Point-to-Point Tunneling Protocol) is a network protocol that enables the secure transfer of
data from a remote client to a private enterprise server by creating a VPN across TCP/IP-based data
networks. PPTP uses the username and password to validate users.
■ L2TP
L2TP (Layer 2 Tunneling Protocol) provides a way for a dialup user to make a virtual Point-to-Point
Protocol (PPP) connection to an L2TP network server (LNS), which can be a security gateway. L2TP
sends PPP frames through a tunnel between an L2TP access concentrator (LAC) and the LNS. Because
of the lack of confidentiality inherent in the L2TP protocol, it is often implemented along with IPsec.
L2TP uses the username and password to validate users.
■ OpenVPN
OpenVPN uses OpenSSL for encryption of UDP and TCP for traffic transmission. OpenVPN uses a
client-server connection to provide secure communications between a server and a remote client
over the internet. One of the most important steps in setting up OpenVPN is obtaining a certificate
which is used for authentication. The SDN controller supports generating the certificate which can be
downloaded as a file on your computer. With the certificate imported, the remote clients are checked
out by the certificate and granted access to the LAN resources.
143
Chapter 4 Configure the Network with the SDN Controller
There are many variations of virtual private networks, with the majority based on two main models:
■ Site-to-Site VPN
A Site-to-Site VPN creates a connection between two networks at different geographic locations.
Typically, headquarters set up Site-to-Site VPN with the subsidiary to provide the branch office
with access to the headquarters’ network.
Site-to-Site VPN
Internet
■ Client-to-Site VPN
A Client-to-Site VPN creates a connection to the LAN from a remote host. It is useful for teleworkers
and business travelers to access their central LAN from a remote location without compromising
privacy and security.
The first step to build a Client-to-Site VPN connection is to determine the role of the gateways and
which VPN tunneling protocol to use:
• VPN Server
The gateway on the central LAN works as a VPN server to provide a remote host with access to
the local network. The gateway which functions as a VPN server can use L2TP, PPTP, IPsec, or
OpenVPN as the tunneling protocol.
• VPN Client
Either the remote user’s gateway or the remote user’s laptop or PC works as the VPN client.
144
Chapter 4 Configure the Network with the SDN Controller
When the remote user’s gateway works as the VPN client, the gateway helps create VPN tunnels
between its connected hosts and the VPN server. The gateway which functions as a VPN client
can use L2TP, PPTP, or OpenVPN as the tunneling protocol.
Internet
When the remote user’s laptop or PC works as the VPN client, the laptop or PC uses a VPN client
software program to create VPN tunnels between itself and the VPN server. The VPN client
software program can use L2TP, PPTP, IPsec, or OpenVPN as the tunneling protocol.
Internet
Note:
In scenario 1, you need to configure VPN client and VPN server separately on the gateways, while remote hosts can access the local
networks without running VPN client software.
In scenario 2, you need to configure VPN server on the gateway, and then configure the VPN client software program on the remote
user’s laptop or PC, while the remote user’s gateway doesn’t need any VPN configuration.
145
Chapter 4 Configure the Network with the SDN Controller
Site-to-Site VPN
Internet
Client-to-Site VPN
Internet
Internet
OpenVPN OpenVPN
146
Chapter 4 Configure the Network with the SDN Controller
Configuration
2. Enter a name to identify the VPN policy and select the purpose as Site-to-Site VPN. Refer to the
following table to configure the required parameters and click Create.
Name Enter a name to identify the VPN policy.
VPN Type Select the VPN type as Auto IPsec. With Auto IPsec, the controller automatically
creates an IPsec VPN tunnel between two sites on the same controller. The VPN
connection is bidirectional. That is, creating an Auto IPsec VPN from site A to site
B also provides connectivity from site B to site A, and nothing is needed to be
configured on site B.
147
Chapter 4 Configure the Network with the SDN Controller
Remote Site Select the site on the other end of the Auto IPsec VPN tunnel. Make sure that the
selected remote site has an online gateway within the same controller.
2. Enter a name to identify the VPN policy and select the purpose as Site-to-Site VPN. Refer to the
following table to configure the basic parameters and click Create.
Name Enter a name to identify the VPN policy.
148
Chapter 4 Configure the Network with the SDN Controller
Remote Gateway Enter an IP address or a domain name as the gateway on the remote peer of the
VPN tunnel.
Remote Subnets Enter the IP address range of LAN on the remote peer of the VPN tunnel. Remote
subnets should not be in the same network segment as the local LAN.
Local Network Type Specify whether to apply the VPN policy to specific local networks or IP addresses.
Network: Specify the local networks of the VPN tunnel. The VPN policy will be only
applied to the selected local networks.
Custom IP: Specify the IP addresses of the VPN tunnel. The VPN policy will be only
applied to the specified IP addresses.
Pre-Shared Key Enter the pre-shared key(PSK). Both peer gateways must use the same pre-shared
secret key for authentication.
The pre-shared keys should be long and random for security. Short or predictable
pre-shared keys can be easily broken in brute-force attacks. To maintain a high
level of security, administrators are recommended to update the pre-shared key
periodically.
WAN Select the WAN port on which the IPsec VPN tunnel is established.
149
Chapter 4 Configure the Network with the SDN Controller
Advanced settings include Phase-1 settings and Phase-2 settings. Phase-1 is used to set up a
secure encrypted channel which the two peers can negotiate Phase-2, and then establish the
IKE Security Associations (IKE SA). Phase-2 is used to negotiate about a set of parameters that
150
Chapter 4 Configure the Network with the SDN Controller
define what traffic can go through the VPN, and how to encrypt and authenticate the traffic,
then establish the IPsec Security Associations (IPsec SA).
Refer to the following table to complete the configurations according to your actual needs and
click Create.
For Phase-1 Settings:
Phase-1 Settings The IKE version you select determines the available Phase-1 settings and defines
the negotiation process . Both VPN gateways must be configured to use the same
IKE version and Phase-1 settings.
Internet Key Exchange Select the version of Internet Key Exchange (IKE) protocol which is used to set
Version up security associations for IPsec. Both IKEv1 and IKEv2 are supported with
gateways, but IKEv1 is available only when the VPN policy is applied to a single
Remote Subnet and a single Local Network.
Note that both peer gateways must be configured to use the same IKE version.
Proposal Specify the proposal for IKE negotiation phase-1. An IKE proposal lists the
encryption algorithm, authentication algorithm and Diffie-Hellman (DH) groups to
be negotiated with the remote IPsec peer.
Diffie-Hellman (DH) groups determine the strength of the key used in the key
exchange process.
Note that both peer gateways must be configured to use the same Proposal.
Exchange Mode Specify the IKE Exchange Mode when IKEv1 is selected.
Main Mode: This mode provides identity protection and exchanges more
information, which applies to scenarios with higher requirements for identity
protection.
Aggressive Mode: This mode establishes a faster connection but with lower
security, which applies to scenarios with lower requirements for identity
protection.
Negotiation Mode Specify the IKE Negotiation Mode as Initiator Mode or Responder Mode.
Initiator Mode: This mode means that the local device initiates a connection to the
peer.
Responder Mode: This mode means that the local device waits for the connection
request initiated by the peer.
151
Chapter 4 Configure the Network with the SDN Controller
Local ID Type Specify the type of Local ID which indicates the authentication identifier sent to
the peer for IKE negotiation.
Name: Select Name, and then enter the name in the Local ID field to use the name
as the ID for authentication.
Note that the type and value of Local ID should be the same as Remote ID given
for the remote peer of the VPN tunnel.
Local ID When the Local ID Type is configured as Name, enter a name for the local device
as the ID in IKE negotiation. The name should be in the format of FQDN (Fully
Qualified Domain Name).
Remote ID Type Specify the type of Remote ID which indicates the authentication identifier
received from the peer for IKE negotiation.
Name: Select Name, and then enter the name in the Remote ID field to use the
name as the ID for authentication.
Note that the type and value of Remote ID should be the same as Local ID given
for the remote peer of the VPN tunnel.
Remote ID When the Remote ID Type is configured as Name, enter a name of the remote
peer as the ID in IKE negotiation. The name should be in the format of FQDN (Fully
Qualified Domain Name).
DPD Check the box to enable DPD (Dead Peer Detect) function. If enabled, the IKE
endpoint can send a DPD request to the peer to inspect whether the IKE peer is
alive.
DPD Interval Specify the interval between sending DPD requests with DPD enabled. If the IKE
endpoint receives a response from the peer during this interval, it considers the
peer alive. If the IKE endpoint does not receive a response during the interval, it
considers the peer dead and deletes the SA.
Encapsulation Mode Specify the Encapsulation Mode as Tunnel Mode or Transport Mode. When both
ends of the tunnel are hosts, either mode can be chosen. When at least one of
the endpoints of a tunnel is a security gateway, such as a router or firewall, Tunnel
Mode is recommended to ensure safety.
152
Chapter 4 Configure the Network with the SDN Controller
Proposal Specify the proposal for IKE negotiation phase-2. An IPsec proposal lists the
encryption algorithm, authentication algorithm and protocol to be negotiated with
the remote IPsec peer.
Note that both peer gateways must be configured to use the same Proposal.
PFS Select the DH group to enable PFS (Perfect Forward Security) for IKE mode, then
the key generated in phase-2 will be irrelevant with the key in phase-1, which
enhance the network security. With None selected, it means PFS is disabled and
the key in phase-2 will be generated based on the key in phase-1.
153
Chapter 4 Configure the Network with the SDN Controller
2. Enter a name to identify the VPN policy and select the purpose as Client-to-Site VPN. Refer to
the following table to configure the required parameters and click Create.
Name Enter a name to identify the VPN policy.
154
Chapter 4 Configure the Network with the SDN Controller
IPsec Encryption Specify whether to enable the encryption for the tunnel.
Encrypted: Select Encrypted to encrypt the L2TP tunnel by IPsec (L2TP over
IPsec). With Encrypted selected, enter the Pre-shared Key for IKE authentication.
VPN server and VPN client must use the same pre-shared secret key for
authentication.
Unencrypted: With Unencrypted selected, the L2TP tunnel will not be encrypted
by IPsec.
Auto: With Auto selected, the L2TP server will determine whether to encrypt the
tunnel according to the client ‘s encryption settings. And enter the Pre-shared Key
for IKE authentication. VPN server and VPN client must use the same pre-shared
secret key for authentication.
Local Network Type Specify whether to apply the VPN policy to specific local networks or IP addresses.
Network: Specify the local networks of the VPN tunnel. The VPN policy will be only
applied to the selected local networks.
Custom IP: Specify the IP addresses of the VPN tunnel. The VPN policy will be only
applied to the specified IP addresses.
Pre-shared Key Enter the pre-shared secret key when IPsec Encryption is selected as Encrypted
and Auto. Both peer routers must use the same pre-shared secret key for
authentication.
WAN Select the WAN port on which the L2TP VPN tunnel is established. Each WAN port
supports only one L2TP VPN tunnel when the gateway works as a L2TP server.
IP Pool If you selected IP Address/Mask type, enter the IP address and subnet mask to
decide the range of the VPN IP pool. If you select IP Address Range type, enter the
start and end IP addresses of the VPN IP pool.
Primary DNS Server Enter the IP address of the primary DNS server provided by your ISP.
Secondary DNS Server (Optional) Enter the IP address of the secondary DNS server, which provides
redundancy in case the primary DNS server goes down.
3. Add the VPN users account to validate remote hosts. To create VPN users, refer to 4. 7. 2 VPN
User.
155
Chapter 4 Configure the Network with the SDN Controller
2. Enter a name to identify the VPN policy and select the purpose as Client-to-Site VPN. Refer to
the following table to configure the required parameters and click Create.
Name Enter a name to identify the VPN policy.
MPPE Encryption Specify whether to enable MPPE (Microsoft Point-to-Point Encryption) for the
tunnel.
Encrypted: With Encrypted selected, the PPTP tunnel will be encrypted by MPPE.
Unencrypted: With Unencrypted selected, the PPTP tunnel will be not encrypted
by MPPE.
156
Chapter 4 Configure the Network with the SDN Controller
Local Network Type Specify whether to apply the VPN policy to specific local networks or IP addresses.
Network: Specify the local networks of the VPN tunnel. The VPN policy will be only
applied to the selected local networks.
Custom IP: Specify the IP addresses of the VPN tunnel. The VPN policy will be only
applied to the specified IP addresses.
WAN Select the WAN port on which the PPTP VPN tunnel is established. Each WAN port
supports only one PPTP VPN tunnel when the gateway works as a PPTP server.
IP Pool If you selected IP Address/Mask type, enter the IP address and subnet mask to
decide the range of the VPN IP pool. If you select IP Address Range type, enter the
start and end IP addresses of the VPN IP pool.
Primary DNS Server Enter the IP address of the primary DNS server provided by your ISP.
Secondary DNS Server (Optional) Enter the IP address of the secondary DNS server, which provides
redundancy in case the primary DNS server goes down.
3. Add the VPN users account to validate remote hosts. To create VPN users, refer to 4. 7. 2 VPN
User.
• Configuring the gateway as a VPN server using IPsec
1. Select a site from the drop-down list of Organization. Go to Settings > VPN. Click
to load the following page.
2. Enter a name to identify the VPN policy and select the purpose as Client-to-Site VPN. Refer to
the following table to configure the basic parameters and click Create.
157
Chapter 4 Configure the Network with the SDN Controller
Remote Host Enter an IP address or a domain name of the host on the remote peer of the VPN
tunnel. 0.0.0.0 represents any IP address.
Local Network Type Specify whether to apply the VPN policy to specific local networks or IP addresses.
Network: Specify the local networks of the VPN tunnel. The VPN policy will be only
applied to the selected local networks.
Custom IP: Specify the IP addresses of the VPN tunnel. The VPN policy will be only
applied to the specified IP addresses.
Pre-Shared Key Enter the pre-shared key(PSK). Both peer gateways must use the same pre-shared
secret key for authentication.
The pre-shared keys should be long and random for security. Short or predictable
pre-shared keys can be easily broken in brute-force attacks. To maintain a high
level of security, administrators are recommended to update the pre-shared key
periodically.
WAN Select the WAN port on which the IPsec VPN tunnel is established.
IP Pool Enter the IP address and subnet mask to decide the range of the VPN IP pool.
The VPN server will assign IP address to the remote host when the tunnel is
established. You can specify any reasonable IP address that will not cause overlap
with the IP address of the LAN on the local peer router.
Primary DNS Server Enter the IP address of the primary DNS server provided by your ISP.
Secondary DNS Server (Optional) Enter the IP address of the secondary DNS server, which provides
redundancy in case the primary DNS server goes down.
158
Chapter 4 Configure the Network with the SDN Controller
Advanced settings include Phase-1 settings and Phase-2 settings. Phase-1 is used to set up a
secure encrypted channel which the two peers can negotiate Phase-2, and then establish the
IKE Security Associations (IKE SA). Phase-2 is used to negotiate about a set of parameters that
159
Chapter 4 Configure the Network with the SDN Controller
define what traffic can go through the VPN, and how to encrypt and authenticate the traffic,
then establish the IPsec Security Associations (IPsec SA).
Refer to the following table to complete the configurations according to your actual needs and
click Create.
For Phase-1 Settings:
Phase-1 Settings The IKE version you select determines the available Phase-1 settings and defines
the negotiation process . Both VPN gateways must be configured to use the same
IKE version and Phase-1 settings.
Internet Key Exchange Select the version of Internet Key Exchange (IKE) protocol which is used to set
Version up security associations for IPsec. Both IKEv1 and IKEv2 are supported with
gateways, but IKEv1 is available only when the VPN policy is applied to a single
Remote Subnet and a single Local Network.
Note that both VPN peers must be configured to use the same IKE version.
Proposal Specify the proposal for IKE negotiation phase-1. An IKE proposal lists the
encryption algorithm, authentication algorithm and Diffie-Hellman (DH) groups to
be negotiated with the remote IPsec peer.
Diffie-Hellman (DH) groups determine the strength of the key used in the key
exchange process.
Note that both VPN peers must be configured to use the same Proposal.
Exchange Mode Specify the IKE Exchange Mode when IKEv1 is selected.
Main Mode: This mode provides identity protection and exchanges more
information, which applies to scenarios with higher requirements for identity
protection.
Aggressive Mode: This mode establishes a faster connection but with lower
security, which applies to scenarios with lower requirements for identity
protection.
Negotiation Mode Specify the IKE Negotiation Mode as Initiator Mode or Responder Mode.
Initiator Mode: This mode means that the local device initiates a connection to the
peer.
Responder Mode: This mode means that the local device waits for the connection
request initiated by the peer.
160
Chapter 4 Configure the Network with the SDN Controller
Local ID Type Specify the type of Local ID which indicates the authentication identifier sent to
the peer for IKE negotiation.
Name: Select Name, and then enter the name in the Local ID field to use the name
as the ID for authentication.
Note that the type and value of Local ID should be the same as Remote ID given
for the remote peer of the VPN tunnel.
Local ID When the Local ID Type is configured as Name, enter a name for the local device
as the ID in IKE negotiation. The name should be in the format of FQDN (Fully
Qualified Domain Name).
Remote ID Type Specify the type of Remote ID which indicates the authentication identifier
received from the peer for IKE negotiation.
Name: Select Name, and then enter the name in the Remote ID field to use the
name as the ID for authentication.
Note that the type and value of Remote ID should be the same as Local ID given
for the remote peer of the VPN tunnel.
Remote ID When the Remote ID Type is configured as Name, enter a name of the remote
peer as the ID in IKE negotiation. The name should be in the format of FQDN (Fully
Qualified Domain Name).
DPD Check the box to enable DPD (Dead Peer Detect) function. If enabled, the IKE
endpoint can send a DPD request to the peer to inspect whether the IKE peer is
alive.
DPD Interval Specify the interval between sending DPD requests with DPD enabled. If the IKE
endpoint receives a response from the peer during this interval, it considers the
peer alive. If the IKE endpoint does not receive a response during the interval, it
considers the peer dead and deletes the SA.
Encapsulation Mode Specify the Encapsulation Mode as Tunnel Mode or Transport Mode. When both
ends of the tunnel are hosts, either mode can be chosen. When at least one of
the endpoints of a tunnel is a security gateway, such as a router or firewall, Tunnel
Mode is recommended to ensure safety.
161
Chapter 4 Configure the Network with the SDN Controller
Proposal Specify the proposal for IKE negotiation phase-2. An IPsec proposal lists the
encryption algorithm, authentication algorithm and protocol to be negotiated with
the remote IPsec peer.
Note that both peer gateways must be configured to use the same Proposal.
PFS Select the DH group to enable PFS (Perfect Forward Security) for IKE mode, then
the key generated in phase-2 will be irrelevant with the key in phase-1, which
enhance the network security. With None selected, it means PFS is disabled and
the key in phase-2 will be generated based on the key in phase-1.
2. Enter a name to identify the VPN policy and select the purpose as Client-to-Site VPN. Refer to
the following table to configure the required parameters and click Create.
Name Enter a name to identify the VPN policy.
162
Chapter 4 Configure the Network with the SDN Controller
Account Password Specify whether VPN clients need to enter a user account to access the VPN
tunnel. When enabled, you need to create accounts on the VPN User page.
Full tunneling uses the VPN for all your traffic, whereas split tunneling sends part
of your traffic through a VPN and part of it through the open network. Full tunneling
is more secure than split tunneling.
Protocol Select the communication protocol for the gateway which works as an OpenVPN
Server. Two communication protocols are available: TCP and UDP.
Service Port Enter a VPN service port to which a VPN device connects.
Authentication Mode Select the authentication mode: Local or LDAP. LDAP is used for SSO (single sign-
on), which enables users to use the same password in multiple services.
Local Network Type Specify whether to apply the VPN policy to specific local networks or IP addresses.
Network: Specify the local networks of the VPN tunnel. The VPN policy will be only
applied to the selected local networks.
Custom IP: Specify the IP addresses of the VPN tunnel. The VPN policy will be only
applied to the specified IP addresses.
WAN Select the WAN port on which the VPN tunnel is established. Each WAN port
supports only one OpenVPN tunnel when the gateway works as a OpenVPN
server.
IP Pool Enter the IP address and subnet mask to decide the range of the VPN IP pool.
The VPN server will assign IP address to the remote host when the tunnel is
established. You can specify any reasonable IP address that will not cause overlap
with the IP address of the LAN on the local peer router.
Primary DNS Server Enter the IP address of the primary DNS server provided by your ISP.
Secondary DNS Server (Optional) Enter the IP address of the secondary DNS server, which provides
redundancy in case the primary DNS server goes down.
3. After clicking Create to save the VPN policy, go to VPN Policy List and click in the Action
column to export the OpenVPN file that ends in .ovpn which is to be used by the remote client.
The exported OpenVPN file contains the certificate and configuration information.
163
Chapter 4 Configure the Network with the SDN Controller
2. Enter a name to identify the VPN policy and select the purpose as Client-to-Site VPN. Refer to
the following table to configure the required parameters and click Create.
Name Enter a name to identify the VPN policy.
164
Chapter 4 Configure the Network with the SDN Controller
NAT: With NAT (Network Address Translation) mode selected, the L2TP client
uses the assigned IP address as its source addresses of original IP header when
forwarding L2TP packets.
Routing: With Routing selected, the L2TP client uses its own IP address as its
source addresses of original IP header when forwarding L2TP packets.
Username Enter the username used for the VPN tunnel. This username should be the same
as that of the L2TP server.
Password Enter the password of user. This password should be the same as that of the L2TP
server.
IPsec Encryption Specify whether to enable the encryption for the tunnel.
Encrypted: Select Encrypted to encrypt the L2TP tunnel by IPsec (L2TP over
IPsec). With Encrypted selected, enter the Pre-shared Key for IKE authentication.
VPN server and VPN client must use the same pre-shared secret key for
authentication.
Unencrypted: With Unencrypted selected, the L2TP tunnel will be not encrypted
by IPsec.
Remote Server Enter the IP address or domain name of the L2TP server.
Remote Subnets Enter the IP address and subnet mask to specify the remote network. It’s always
the IP address range of LAN on the remote peer of the VPN tunnel.
Local Network Type Specify whether to apply the VPN policy to specific local networks or IP addresses.
Network: Specify the local networks of the VPN tunnel. The VPN policy will be only
applied to the selected local networks.
Custom IP: Specify the IP addresses of the VPN tunnel. The VPN policy will be only
applied to the specified IP addresses.
Pre-shared Key Enter the pre-shared secret key when the L2TP tunnel is encrypted by IPsec. Both
peer gateways must use the same pre-shared secret key for authentication.
WAN Select the WAN port on which the VPN tunnel is established.
165
Chapter 4 Configure the Network with the SDN Controller
2. Enter a name to identify the VPN policy and select the purpose as Client-to-Site VPN. Refer to
the following table to configure the required parameters and click Create.
Name Enter a name to identify the VPN policy.
166
Chapter 4 Configure the Network with the SDN Controller
NAT: With NAT (Network Address Translation) mode selected, the PPTP client
uses the assigned IP address as its source addresses of original IP header when
forwarding PPTP packets.
Routing: With Routing selected, the PPTP client uses its own IP address as its
source addresses of original IP header when forwarding PPTP packets.
Username Enter the username used for the VPN tunnel. This username should be the same
as that of the PPTP server.
Password Enter the password of user. This password should be the same as that of the PPTP
server.
MPPE Encryption Specify whether to enable the encryption for the tunnel.
Unencrypted: With Unencrypted selected, the PPTP tunnel will be not encrypted
by MPPE.
Remote Server Enter the IP address or domain name of the PPTP server.
Remote Subnets Enter the IP address and subnet mask to specify the remote network. It’s always
the IP address range of LAN on the remote peer of the VPN tunnel.
Local Network Type Specify whether to apply the VPN policy to specific local networks or IP addresses.
Network: Specify the local networks of the VPN tunnel. The VPN policy will be only
applied to the selected local networks.
Custom IP: Specify the IP addresses of the VPN tunnel. The VPN policy will be only
applied to the specified IP addresses.
WAN Select the WAN port on which the VPN tunnel is established.
167
Chapter 4 Configure the Network with the SDN Controller
2. Enter a name to identify the VPN policy and select the purpose as Client-to-Site VPN. Refer to
the following table to configure the required parameters and click Create.
Name Enter a name to identify the VPN policy.
Certificate: Select this option if the VPN tunnel only requires the certificate.
Certificate+Account: Select this option if the VPN tunnel requires the certificate
and VPN user account. If selected, configure the following parameters:
168
Chapter 4 Configure the Network with the SDN Controller
Remote Server Enter the IP address or domain name of the OpenVPN server.
Local Network Type Specify whether to apply the VPN policy to specific local networks or IP addresses.
Network: Specify the local networks of the VPN tunnel. The VPN policy will be only
applied to the selected local networks.
Custom IP: Specify the IP addresses of the VPN tunnel. The VPN policy will be only
applied to the specified IP addresses.
WAN Select the WAN port on which the VPN tunnel is established.
Configuration Click to import the OpenVPN file that ends in .ovpn generated by the
OpenVPN server. Only one file can be imported.
If the certificate file and configuration file are generated singly by the OpenVPN
server, combine two files and import the whole file.
4. 7. 2 VPN User
Overview
VPN User is used to configure and record your custom settings for VPN configurations, and it allows
you to configure VPN users that can be used for multiple VPN servers. It saves you from setting the
VPN users with the same configurations repeatedly when you want to apply the user in different VPN
servers.
Configuration
169
Chapter 4 Configure the Network with the SDN Controller
Username Enter the username used for the VPN tunnel. The client use the username for the
validation before accessing the network.
Password Enter the password of user. The client uses the password for the validation before
accessing the network.
VPN Server Select the VPN server that the VPN user is applied to.
Local IP Address (Optional) Specify the local IP address of the VPN tunnel.
Client: This mode allows the client to request for an IP address and the server supplies
the IP addresses from the VPN IP Pool. With this mode selected, set maximum number
of concurrent VPN connections with the same account in Maximum Connections.
Network Extension Mode: This mode allows only clients from the configured subnet to
connect to the server and obtain VPN services. With this mode selected, specify the
subnets in Remote Subnets.
VPN Server Select the VPN server that the VPN user is applied to.
170
Chapter 4 Configure the Network with the SDN Controller
To edit or delete the VPN users, click the icon in the Action column. You can further filter the
entries based on the VPN Server.
4. 7. 3 IPsec Failover
Overview
IPsec Failover is used to configure the backup group of the IPsec connection. When the primary
connection in the group is interrupted, it will try to use the secondary connection to dial up to maintain
the stability of the VPN network.
Configuration
1. Select a site from the drop-down list of Organization. Go to Settings > VPN >IPsec Failover. Click
Create New IPsec Failover to add a new entry.
171
Chapter 4 Configure the Network with the SDN Controller
Automatic Failback Select this function to automatically switch back to the primary connection when it is
reachable.
When selected, specify the Gateway Failover Timeout time, then the system will query
whether the primary connection is reachable within the time, and if yes, it will switch
back to the primary connection.
4. 7. 4 SSL VPN
Overview
SSL VPN uses Secure Socket Layer (SSL) to ensure information safety and provides abundant services
such as user management, resource management, user lockout, authentication and accounting.
SSL VPN uses username and password for authentication and login. A network administrator can
assign different resources to different types of users, and meanwhile associate the users with multiple
resources, making it easy to manage and limit the services the users can access through the VPN.
Configuration
172
Chapter 4 Configure the Network with the SDN Controller
1. Select a site from the drop-down list of Organization. Go to Settings > VPN > SSL VPN > SSL VPN
Server. Enable SSL VPN Server.
WAN Select the port for the SSL VPN server to listen on, and the VPN tunnel will take effect
on the port.
Virtual IP Pool Set a virtual IP Pool, and the SSL VPN server will assign an IP address to a connected
client within the pool.
Primary/Secondary Specify the IP address of the DNS server. The clients will be informed of the DNS
DNS server, and it can help the clients resolve the domain name.
Listen on Port Specify the port for the SSL VPN server to listen on. By default, it is 1194.
173
Chapter 4 Configure the Network with the SDN Controller
Authentication Type Select the authentication for the clients: Local Authentication or RADIUS
Authentication.
Authentication Type: Select the authentication protocol for the RADIUS server.
Max Requests: Specify the maximum number of requests sent when no response is
received.
Request Timeout: Specify the maximum interval for request timeout. After timeout, the
request will be sent again.
NAS IP: Specify the IP address for the router to communicate with the RADIUS server.
Username Lockout When enabled, you can lock out a username in case of excessive login attempts.
Max Login Attempts: Specify the maximum failed login attempts for a username. If the
number of attempts reaches this amount, the username will be locked out.
Lockout Duration: Specify how long the username will be locked out.
IP Lockout When enabled, you can lock out an IP address in case of excessive login attempts.
Max Login Attempts: Specify the maximum failed login attempts for a login IP. If the
number of attempts reaches this amount, the login IP will be locked out.
Lockout Duration: Specify how long the login IP will be locked out.
Idle Timeout When enabled, the VPN tunnel will close automatically if there is no traffic for the
specified amount of time.
Full Mode When enable, all traffic will go through the SSL VPN tunnel. When disabled, only the
resource-related traffic will go through the tunnel.
174
Chapter 4 Configure the Network with the SDN Controller
3. Click Export Certificate, enter the WAN IP/Domain Name to access the VPN, then click Export. The
VPN configuration file will be exported for clients to access the VPN.
■ Resource Management
In Tunnel Resources, you can configure the resources the clients can access through the VPN
tunnel, including IP range and domain name.
In Resource Group, you can add the multiple tunnel resources to a group for better management.
By default, two resource groups are provided: Group_ALL (indicates all resources) and Group_LAN
(indicates all LAN resources).
1. Select a site from the drop-down list of Organization. Go to Settings > VPN > SSL VPN > Resource
Management.
175
Chapter 4 Configure the Network with the SDN Controller
2. Click Create New Tunnel Resource to load the following page. Configure the parameters and click
Confirm.
Resource Type Select the type for the resources: IP Address or Domain Name.
Protocol: Select the protocol type that the client can access in the IP range, and the
router will filter illegal packets through firewall rules. By default, the value is ALL, and it
means there is no restriction on the client.
If you selected Domain Name, specify domain name the clients can access.
3. Click Create New Resource Group to load the following page. Configure the parameters and click
Confirm.
176
Chapter 4 Configure the Network with the SDN Controller
■ User Group
In User Group, you can add multiple users to a group for better management.
1. Select a site from the drop-down list of Organization. Go to Settings > VPN > SSL VPN > User Group.
2. Click Create New User Group to load the following page. Configure the parameters and click
Confirm.
Resource Group List Select the resource group for the user group.
■ User List
In User List, you can view and configure all user settings of the SSL VPN.
1. Select a site from the drop-down list of Organization. Go to Settings > VPN > SSL VPN > User List.
177
Chapter 4 Configure the Network with the SDN Controller
2. Click Create New User to load the following page. Configure the parameters and click Confirm.
Max Concurrent Users Specify the maximum number of clients using the username for login concurrently. If
the number reaches this amount, new login attempts will be rejected.
User Group Select which group the user belongs to. A user can only be added to one user group.
178
Chapter 4 Configure the Network with the SDN Controller
2. Click Add Locked Out User to load the following page. Configure the parameters and click Confirm.
Lockout Duration Specify how long the entry will be locked out.
4. 7. 5 WireGuard VPN
Overview
WireGuard VPN is a secure, fast and modern VPN protocol. It is based on the UDP protocol and uses
modern encryption algorithms to improve work efficiency.
■ WireGuard
1. Select a site from the drop-down list of Organization. Go to Settings > VPN > WireGuard.
179
Chapter 4 Configure the Network with the SDN Controller
2. Click Create New WireGuard. Configure the parameters and click Apply.
MTU Specify the MTU value of the WireGuard interface. The default value 1420 is
recommended.
Listen Port Specify the port number that the WireGuard interface listens to.
Private Key Specify the private key of the WireGuard interface. The value will be automatically
generated on the device, and you can also modify it manually.
■ Peers
1. Select a site from the drop-down list of Organization. Go to Settings > VPN > WireGuard > Peers.
180
Chapter 4 Configure the Network with the SDN Controller
2. Click Create New Peer. Configure the parameters and click Apply.
Endpoint Specify the IP address of the peer. This parameters is required when the Router
actively connects to other WireGurad Server.
Endpoint Port Specify the port number of the peer. This parameters is required when the Router
actively connects to other WireGurad Server.
Allowed Address Specify the address segment that allows traffic to pass through. Generally, it is the
same as the WireGuard VPN interface IP configured on the remote device.
Public Key Fill in the public key information exported from the remote device.
181
Chapter 4 Configure the Network with the SDN Controller
4. 8 Create Profiles
Profiles section is used to configure and record your custom settings for site configurations. It includes
Time Range and Groups profiles. In Time Range section, you can configure time templates for wireless
schedule, PoE schedule, etc. In Groups section, you can configure groups based on IP, IP-Port and
MAC addresses for ACL, Routing, NAT, etc. After creating the profiles, you can apply them to multiply
configurations for different sites, saving you from repeatedly setting up the same information.
4. 8. 1 Time Range
Overview
Time Range section allows you to customize time-related configurations. You can set different time
range templates which can be shared and applied to wireless schedule, PoE schedule, etc. in site
configuration.
Configuration
2. Enter a Name for the new entry, select the Day Mode, and specify the time range. Click +Add to add
a new time period, click Apply to save the entry. After saving the newly added entry, you can apply
182
Chapter 4 Configure the Network with the SDN Controller
them to site configuration. To apply the customized time range profiles in configuration, refer to 4.
4. 3 WLAN Schedule, and 4. 10. 8 Port Schedule.
Name Enter a name for the new entry, and it is a string with 1 to 64 ASCII symbols.
Day Mode Select Every Day, Weekday, Weekend, or Customized first before specifying the
time range for each day.
Every Day: You only need to set the time range once, and it will repeat every day.
Weekday: You only need to set the time range once, and it will repeat every weekday
from Monday to Friday.
Weekend: You only need to set the time range once, and it will repeat every Saturday
and Sunday.
Customized: You are able to set different time range for the chosen day(s) based on
your needs. When a day is not chosen, the WiFi is open all day by default.
You can view the name, day mode and time range in the list.
To edit or delete the time range entry, click the icon in the Action column.
183
Chapter 4 Configure the Network with the SDN Controller
4. 8. 2 Groups
Overview
Groups section allows you to customize client groups based on IP, IP-Port, or MAC Address. You can
set different rules for the groups profiles which can be shared and applied to ACL, Routing, NAT, etc. in
site configuration.
Configuration
184
Chapter 4 Configure the Network with the SDN Controller
2. Enter a name for the new group profile entry, and select the type for the new entry.
185
Chapter 4 Configure the Network with the SDN Controller
Add MAC addresses in batches. You can enter the MAC addresses and names in the input
box or import them with files in the format of Excel, txt, and text.
If you want to use the newly added MAC address(es) and names when they conflict with the
existing ones, check the box to override the current MAC addresses in the list.
Note:
1. Each MAC address and name should be entered on a new line. The MAC address and
name should be separated by a space.
2. Octets in a MAC address should be separated by a hyphen. For example, AA-BB-CC-DD-
EE-FF.
Add MAC addresses from the clients that are connected to the devices controlled by the
SDN Controller.
4. 8. 3 Rate Limit
Overview
Rate Limit allows you to customize rate-related configurations. You can set different rate limit templates.
They can be bound with wireless network to limit the upload/download rate of clients connected the
SSID, and applied to specific types of Portal, such as Local User and Voucher. After creating the
profiles, you can apply them to multiple configurations, saving you from repeatedly setting up the same
information.
Configuration
186
Chapter 4 Configure the Network with the SDN Controller
1. Select a site from the drop-down list of Organization. Go to Settings > Profiles > Rate Limit. By
default, there is an entry with no limits, and it can not be deleted. Click +Create New Rate Limit
Profile to add a new group entry.
2. Enter a name and specify the download/upload rate limit for the new entry. After saving the newly
added entry, you can apply them to other configurations such as Portal and Wireless Settings.
Download Limit Enable the download limit, and specify the rate limit correspondingly in Kbps or Mbps.
Upload Limit Enable the upload limit, and specify the rate limit correspondingly in Kbps or Mbps.
3. Click Apply to save the entry. After saving the newly added entry, you can apply them to site
configuration. To apply the customized rate limit profiles in the related configurations, refer to 4. 9.
1 Portal, and 4. 4. 1 Set Up Basic Wireless Networks.
187
Chapter 4 Configure the Network with the SDN Controller
You can view the name, download limit, and upload limit in the list.
To view, edit or delete the rate limit profile, click the icon in the Action column.
View and edit the parameters in the entry. You cannot change the type when editing the entry.
4. 8. 4 PPSK
Overview
PPSK is a security solution in which individual client devices can be managed without much complexity.
With PPSK, each user is assigned with a unique passphrase for authentication. Also, it allows the
binding of a passphrase and the device MAC address(es), and thus only the specified device can be
authenticated using the passphrase. In PPSK, you can create the PPSK list and apply them to multiple
wireless networks, saving you from repeatedly setting up the same information.
Configuration
188
Chapter 4 Configure the Network with the SDN Controller
Passphrase Enter a passphrase, and the client will use the passphrase for authentication.
MAC Address (Optional) Enter the MAC address of the device that can use the passphrase for
authentication.
VLAN Assignment (Optional) Enter the VLAN ID, and the client who uses the passphrase for authentication
will be assigned to the specified VLAN.
189
Chapter 4 Configure the Network with the SDN Controller
PPSK Name Prefix Enter the prefix of the names for the created PPSK entries.
VLAN Assignment (Optional) Enter the VLAN ID, and the client who uses the passphrase for authentication
will be assigned to the specified VLAN.
4. After saving the newly added profile, you can apply them to wireless networks, refer to 4. 4. 1 Set
Up Basic Wireless Networks.
190
Chapter 4 Configure the Network with the SDN Controller
Overview
In Gateway QoS Service, you can define service type entries that will appear as matching conditions for
you to choose when configuring the rules of related modules like QoS. The default entries cannot be
edited or deleted. You can add other entries if your service type is not in the list.
Configuration
Protocol Specify the protocol for the service. The system predefined protocols include TCP,
UDP, TCP/UDP and ICMP. For other protocols, select the option Other.
Source Port Range Specify the source port range for the service. Packets whose source port and
destination port are both in the range are considered as the target packets.
Destination Port Range Specify the destination port range for the service. Packets whose source port and
destination port are both in the range are considered as the target packets.
Type Specify the type of the ICMP packets. 255 means all types are included. ICMP packets
with both the type and code fields matched are considered as the target packets.
Code Specify the code of the ICMP packets. 255 means all codes are included. ICMP packets
with both the type and code fields matched are considered as the target packets.
Protocol Number Specify the protocol number of the packets. Packets matched with the protocol
number are considered as the target packets.
191
Chapter 4 Configure the Network with the SDN Controller
3. Click Apply to save the profile. Now you can select the predefined entry of service type when
configuring rules of related modules like QoS.
4. 8. 6 Bonjour Service
Overview
mDNS (Multicast DNS) Repeater can help forward mDNS request/reply packets between different
VLANs. With this function, you can create a forwarding rule to allow the devices in the specified Client
VLAN to discover the mDNS service in the specified Service VLAN. You can also specify the services
to be forwarded.
Configuration
Service ID Specify the domain name corresponding to the mDNS service. It is used to identify
and filter mDNS packets.
4. 8. 7 RADIUS Profile
Overview
RADIUS (Remote Authentication Dial In User Service) is a client/server protocol that provides for the
AAA (Authentication, Authorization, and Accounting) needs in modern IT environments.
In authentication services including 802.1X, Portal and MAC-Based Authentication, network devices
operate as clients of RADIUS to pass user information to designated RADIUS servers. A RADIUS server
maintains a database which stores the identity information of legal users. It authenticates users against
192
Chapter 4 Configure the Network with the SDN Controller
the database when the users are requesting to access the network, and provides authorization and
accounting services for them.
A RADIUS profile records your custom settings of a RADIUS server. After creating a RADIUS profile,
you can apply it to multiple authentication policies like Portal and 802.1X, saving you from repeatedly
entering the same information.
Configuration
User Authentication: Select this option and enter the user Name and Password for
authentication.
MAC Authentication: Select this option and enter the MAC Address for authentication.
193
Chapter 4 Configure the Network with the SDN Controller
Rate Limit When enabled, you can set limits for Uplink Rate and Downlink Rate of each client to
balance bandwidth usage.
Traffic Limit When enabled, you can set limits for Uplink Traffic and Downlink Traffic of each client.
VLAN Assignment This feature allows the RADIUS server to place a wireless user into a specific VLAN
based on the credentials supplied by the user. To use the feature, you should create
the specific VLAN first. And the user-to-VLAN mappings must be already stored in the
RADIUS server database.
Note:
1. VLAN Assignment is not currently supported when a client is authenticated by Portal with
External RADIUS Server or RADIUS Hotspot.
2. VLAN Assignment is applicable only when the device supports the feature. To make this feature
work properly, it is recommended to upgrade your devices to the latest firmware version.
Authentication Port Enter the UDP destination port on the authentication server for authentication
requests.
Authentication Enter the password that will be used to validate the communication between network
Password devices and the RADIUS authentication server.
194
Chapter 4 Configure the Network with the SDN Controller
RADIUS Accounting Click the checkbox to enable RADIUS Accounting to meet billing needs. This feature is
only available for APs with Portal to account for wireless clients.
Interim Update Click the checkbox to enable Interim Update. By default, the RADIUS accounting
process needs only start and stop messages to the RADIUS accounting server. With
Interim Update enabled, network devices will periodically send an Interim Update
(a RADIUS Accounting Request packet containing an “interim-update” value) to the
RADIUS server. An Interim Update updates the user’s session duration and current
data usage.
Interim Update Interval Enter an appropriate interval between the updates of users’ session duration and
current data usage.
Accounting Port Enter the UDP destination port on the RADIUS server for accounting requests.
Accounting Password Enter the password that will be used to validate the communication between network
devices and the RADIUS accounting server.
4. 8. 8 LDAP Profiles
Overview
The Lightweight Directory Access Protocol (LDAP) is an industry standard protocol for maintaining and
accessing directory information over a network. LDAP Authentication allows you to bind the device to
an LDAP server and use that server to authenticate LAN clients.
Configuration
195
Chapter 4 Configure the Network with the SDN Controller
Bind Type Select the LDAP Authentication mode: Anonymous Mode, Simple Mode, or Regular
Mode.
Destination Port Enter the port ID of the LDAP server. By default, the port ID is 389 when SSL is disabled
and 636 when SSL is enabled.
Regular DN Specify the distinguished name (DN) of the administrator account. This parameter is
required in Regular mode.
Regular Password Specify the password of the administrator account. This parameter is required in
Regular mode.
Common Name Identifier Specify the common name for user authentication. It is usually “cn”.
Base Distinguished Name Specify the user identifier for user authentication. You can click the icon next to it to
search and select from the LDAP directory tree.
Additional Filter Specify the filter for user authentication. It is not supported in Simple Mode and is
optional in other modes.
Group Distinguished Specify the group identifier for user authentication. It is not supported in Simple Mode
Name and is optional in other modes.
3. Click Apply to save the profile. Now you can select the predefined entry of LDAP profile when
configuring rules of related modules like LDAP Server.
196
Chapter 4 Configure the Network with the SDN Controller
4. 9 Authentication
Authentication is a portfolio of features designed to authorize network access to clients, which
enhances the network security. Authentication services include 4. 9. 1 Portal, 4. 9. 2 802.1X and 4. 9.
3 MAC-Based Authentication, covering all the needs to authenticate both wired and wireless clients.
4. 9. 1 Portal
Overview
Portal authentication provides convenient authentication services to the clients that only need
temporary access to the network, such as the customers in a restaurant or in a supermarket. To
access the network, these clients need to enter the authentication login page and use the correct login
information to pass the authentication. In addition, you can customize the authentication login page
and specify a URL which the authenticated clients will be redirected to.
Portal authentication takes effect on SSIDs and LAN networks. APs authenticate wireless clients which
connect to the SSID with Portal configured, and the gateway authenticates wired clients which connect
to the network with Portal configured. To make Portal authentication available for wired and wireless
clients, ensure that both the gateway and APs are connected and working properly.
The controller provides several types of Portal authentication:
■ No Authentication
With this authentication type configured, clients can pass the authentication and access the
network without providing any login information. Clients just need to accept the terms (if configured)
and click the Login button.
■ Simple Password
With this authentication type configured, clients are required to enter the correct password to pass
the authentication. All clients use the same password which is configured in the controller.
■ Hotspot
With this authentication type configured, clients can access the network after passing any type of
the authentication:
• Voucher
Clients can use the unique voucher codes generated by the controller within a predefined time
usage. Voucher codes can be printed out from the controller, so you can print the codes and
distribute them to your costumers to tie the network access to consumption.
• Local User
Clients are required to enter the correct username and password of the login account to pass
the authentication.
• SMS
Clients can get verification codes using their mobile phones and enter the received codes to
pass the authentication.
197
Chapter 4 Configure the Network with the SDN Controller
• RADIUS
Clients are required to enter the correct username and password which are stored in the RADIUS
server to pass the authentication.
• Form Auth
Clients are required to fill in a survey created by the network administrator to pass the
authentication. It can be used for collecting feedback from your clients.
■ RADIUS Server
Clients are required to enter the correct username and password created on the RADIUS server to
pass the authentication.
■ Pre-Authentication Access
Pre-Authentication Access allows unauthenticated clients to access the specific network resources.
■ Authentication-Free Client
Authentication-Free Clients allows the specific clients to access the specific network resources
without authentication.
1. Select a site from the drop-down list of Organization. Go to Settings > Authentication > Portal.
198
Chapter 4 Configure the Network with the SDN Controller
2. On Portal tab, click Create New Portal. Specify the portal name and enable Portal.
3. Select the SSIDs and LAN networks for the portal to take effect. The clients connected to the
selected SSIDs or LAN networks will have to log into a web page to establish verification before
accessing the network.
4. Select the Authentication Type and configure authentication settings.
■ No Authentication
Authentication Timeout Select the login duration. Clients will be off-line after the authentication timeout.
Daily Limit Click the checkbox to enable Daily Limit. With this feature enabled, after authentication
times out, clients cannot get authenticated again until the next day. With this feature
disabled, after authentication times out, clients can get authenticated again without
limit.
■ Simple Password
Authentication Timeout Select the login duration. Clients will be off-line after the authentication timeout.
■ Hotspot
Type Select one or more authentication types according to your needs. Clients can access
the network after passing any type of the authentication.
199
Chapter 4 Configure the Network with the SDN Controller
• Voucher Portal
Local User Select Local User and click to manage the information of the
login accounts.
Refer to 7. 2. 4 Local Users for detailed information about how to create Local
Users.
• SMS Portal
Select SMS and configure the required parameters in the SMS section.
SMS Clients can get verification codes using their mobile phones and enter the
received codes to pass the authentication.
Twilio SID Enter the Account SID for Twilio API Credentials.
Auth Token Enter the Authentication Token for Twilio API Credentials.
Operating Phone Enter the phone number that is used to send verification messages to the clients.
Number
Maximum User Click the checkbox and enter the maximum number of users allowed to be
Numbers authenticated using the same phone number at the same time.
Authentication Timeout Select the login duration. The client needs to log in again on the web
authentication page to access the network.
Preset Country Code Enter the default country code that will be filled automatically on the
authentication page.
• RADIUS Portal
Select RADIUS and configure the required parameters in the RADIUS section.
Authentication Timeout Clients are required to enter the correct username and password which are
stored in the RADIUS server to pass the authentication.
RADIUS Profile Select the RADIUS profile you have created. If no RADIUS profiles have
been created, click from the drop-down list or
to create one. The RADIUS profile records the information
of the RADIUS server which provides a method for storing the authentication
information centrally.
Authentication Mode Select the authentication protocol for the RADIUS server. Two authentication
protocols are available: PAP and CHAP.
200
Chapter 4 Configure the Network with the SDN Controller
NAS ID Configure a Network Access Server Identifier (NAS ID) on the portal.
Authentication request packets from the controller to the RADIUS server carry
the NAS ID. The RADIUS server can classify users into different groups based on
the NAS ID, and then choose different policies for different groups.
Disconnected Requests With the feature enabled, the controller will listen on the receiver port for
disconnect requests from the RADIUS server. When the controller receives the
disconnect requests in correct format, the controller will terminate the RADIUS
authentication session of the clients. Note that the feature is available only when
the controller is accessible to the RADIUS server.
Receiver Port Specify the port on which the controller listens when there are disconnect
requests from the RADIUS server. Make sure that the specified port is not in use.
Status The entry displays the status of the receiver port, including Running, Disabled,
and Error. Running means that the port is available, Disabled means that the port
is closed, and Error means that the port is already in use.
Duration Specify how long clients can use the network after they pass the form
authentication.
Created surveys will be displayed for you to choose for the form authentication.
■ RADIUS Server
Authentication Timeout Select the login duration. Clients will be off-line after the authentication timeout.
RADIUS Profile Select the RADIUS profile you have created. If no RADIUS profiles have been created,
click Create New RADIUS Profile from the drop-down list or click Manage RADIUS
Profile to create one. The RADIUS profile records information of the RADIUS server
including the IP address, port and so on.
NAS ID Configure a Network Access Server Identifier (NAS ID) on the portal. Authentication
request packets from the controller to the RADIUS server carry the NAS ID. The
RADIUS server can classify users into different groups based on the NAS ID, and
then choose different policies for different groups.
Disconnected Requests With the feature enabled, the controller will listen on the receiver port for disconnect
requests from the RADIUS server. When the controller receives the disconnect
requests in correct format, the controller will terminate the RAIDIUS authentication
session of the clients. Note that the feature is available only when the controller is
accessible to the RADIUS server.
201
Chapter 4 Configure the Network with the SDN Controller
Receiver Port Specify the port on which the controller listens when there are disconnect requests
from the RADIUS server. Make sure that the specified port is not in use.
Status The entry displays the status of the receiver port, including Running, Disabled, and
Error. Running means that the port is available, Disabled means that the port is
closed, and Error means that the port is already in use.
Authentication Mode Select the authentication protocol for the RADIUS server.
Portal Customization Select Local Web Portal or External Web Portal. The authentication login page
of Local Web Portal is provided by the built-in portal server of the controller. The
External Web Portal is provided by external portal server. Enter the authentication
login page’s URL provided by the external portal server in the External Web Portal
URL field.
Authentication Timeout Select the login duration. Clients will be off-line after the authentication timeout.
LDAP Profile Select the LDAP profile you have created. If no LDAP profiles have been created,
click Create New LDAP Profile from the drop-down list or click Manage LDAP Profile
to create one. The LDAP profile records information of the LDAP server including the
server address, port and so on.
Portal Customization Select Local Web Portal or External Web Portal. The authentication login page of Local
Web Portal is provided by the built-in portal server of the controller. The External Web
Portal is provided by external portal server. Enter the authentication login page’s URL
provided by the external portal server in the External Web Portal URL field.
Custom Portal Server Specify the IP address or URL that redirect to an external portal server.
HTTPS Redirection Click the checkbox to enable HTTPS Redirection. With this feature enabled, the
unauthorized clients will be redirected to the Portal page when they are trying to
browse HTTPS websites. With this feature disabled, the unauthorized clients cannot
browse HTTPS websites and are not redirected to the Portal page.
Landing Page Select which page the client will be redirected to after a successful authentication.
The Original URL: Clients are directed to the URL they request for after they pass
Portal authentication.
The Promotional URL: Clients are directed to the specified URL after they pass Portal
authentication.
202
Chapter 4 Configure the Network with the SDN Controller
When creating or editing a portal entry, you can customize the Portal page in the Portal Customization
section.
Note:
Portal Customization is not available when you configure external authentication types.
203
Chapter 4 Configure the Network with the SDN Controller
Edit Current Page: Edit the related parameters to customize the Portal page based on
the provided page.
Import Customized Page: Click to import your unique Portal page for branding
it as per your business.
Default Language Select the default language displayed on the Portal page. The controller automatically
adjusts the language displayed on the Portal page according to the system language
of the clients. If the language is not supported, the controller will use the default
language specified here.
Solid Color: Configure your desired background color by entering the hexadecimal
HTML color code manually or through the color picker.
Logo Picture Click and select a picture from your PC as the logo.
Logo Size/ Adjust the logo size and position on the Portal Page.
Logo Position
Input Box Color/ (For cetain anthentication types) Configure your desired background and text color for
the input box by entering the hexadecimal HTML color code manually or through the
Input Text Color color picker.
Button Color/ Configure your desired background and text color for the button by entering the
hexadecimal HTML color code manually or through the color picker.
Button Text Color
Welcome Information Click the checkbox and enter text as the welcome information.
You can specify the desired text font size and configure the text color by entering the
hexadecimal HTML color code manually or through the color picker.
Terms of Service Click the checkbox and enter text as the terms of service in the following box. Click
Add Terms to enter the name and context of the terms which will appear after a client
clicks the link in Terms of Service.
Copyright Click the checkbox and enter text as the copyright in the following box.
You can specify the desired text font size and configure the text color by entering the
hexadecimal HTML color code manually or through the color picker.
204
Chapter 4 Configure the Network with the SDN Controller
Show Redirection When enabled, the system will show the portal’s redirection countdown.
Countdown After
Authorized
Click Advertisement Options and customize advertisement pictures on the authentication page if
needed.
Advertisement Click the checkbox to enable the Advertisement feature. With this feature enabled,
you can add advertisement pictures on the authentication page. These advertisement
pictures will be displayed before the login page appears.
Picture Resource Click and select pictures from your PC as the advertisement pictures. When
several pictures are added, they will be played in a loop.
Advertisement Duration Enter the duration time for the advertisement pictures. For this duration, the pictures
Time will be played in a loop. If the duration time is not enough for all the pictures, the rest
will not be displayed.
Picture Carousel Enter the picture carousel interval. For example, if this value is set as 5 seconds, the
Interval first picture will be displayed for 5 seconds, followed by the second picture for 5
seconds, and so on.
Allow Users To Skip Click the checkbox to allow users to skip the advertisement.
Advertisement
205
Chapter 4 Configure the Network with the SDN Controller
On Access Control tab, you can configure access control rules if needed.
Pre-Authentication Click the checkbox to enable Pre-Authentication Access. With this feature enabled,
Access unauthenticated clients are allowed to access the subnets and web resources
specified in the Pre-Authentication Access List below.
Pre-Authentication Click to configure the IP range or URL which unauthenticated clients are
Access List allowed to access.
Authentication-Free Click the checkbox to enable Authentication-Free Policy. With this feature enabled,
Policy you can allow certain clients to access the internet without Portal authentication.
Authentication-Free Click and enter the IP address or MAC address of Authentication-Free clients.
Client List
4. 9. 2 802.1X
Overview
802.1X provides port-based authentication service to restrict unauthorized clients from accessing to
the network through publicly accessible switch ports. An 802.1X-enabled port allows only authentication
messages and forbids normal traffic until the client passes the authentication.
206
Chapter 4 Configure the Network with the SDN Controller
802.1X authentication uses client-server model which contains three device roles: client/supplicant,
authenticator and authentication server. This is described in the figure below:
Clients
Switch
Authenticator Authentication Server
■ Client
A client, usually a computer, is connected to the authenticator via a physical port. We recommend
that you install TP-Link 802.1X authentication client software on the client hosts, enabling them to
request 802.1X authentication to access the LAN.
■ Authenticator
An authenticator is usually a network device that supports 802.1X protocol. As the above figure
shows, the switch is an authenticator.
The authenticator acts as an intermediate proxy between the client and the authentication server.
The authenticator requests user information from the client and sends it to the authentication
server; also, the authenticator obtains responses from the authentication server and sends them to
the client. The authenticator allows authenticated clients to access the LAN through the connected
ports but denies the unauthenticated clients.
■ Authentication Server
The authentication server is usually the host running the RADIUS server program. It stores
information of clients, confirms whether a client is legal and informs the authenticator whether a
client is authenticated.
Based on authenticated identity, 802.1X can also deliver customized services. For example, 802.1X
and VLAN Assignment together make it possible to assign different authenticated users to different
VLANs automatically.
Configuration
207
Chapter 4 Configure the Network with the SDN Controller
Enable 802.1X Configure RADIUS Profile and Parameters Select the Ports
Select a site from the drop-down list of Organization. Go to Settings > Authentication > 802.1X. Click
to enable 802.1X.
Enable 802.1X Configure RADIUS Profile and Parameters Select the Ports
Select the RADIUS profile you have created. If no RADIUS profiles have been created, click
from the drop-down list or to create one. The RADIUS
profile records the information of the RADIUS server which acts as the authentication server during
802.1X authentication.
Authentication Protocol Select the authentication protocol for exchanging messages between the switch and
RADIUS server. As a bridge between the client and RADIUS server, the switch forwards
messages for them. It uses AP packets to exchange messages with the client, and
processes the messages according to the specified authentication protocol before
forwarding them to the RADIUS server.
PAP: The AP packets are converted to other protocol (such as RADIUS) packets, and
transmitted to the RADIUS server.
AP: The AP packets are encapsulated in other protocol (such as RADIUS) packets, and
transmitted to the authentication server. To use this authentication mechanism, the RADIUS
server should support AP attributes.
208
Chapter 4 Configure the Network with the SDN Controller
Port Based: After a client connected to the port gets authenticated successfully, other
clients can access the network via the port without authentication.
MAC Based: Clients connected to the port need to be authenticated individually. The
RADIUS server distinguishes clients by their MAC addresses.
VLAN Assignment This feature allows the RADIUS server to send the VLAN configurations to the port
dynamically. After the port is authenticated, the RADIUS server assigns the VLAN based on
the username of the client connecting to the port. The username-to-VLAN mappings must
be already stored in the RADIUS server database. This feature is available only when the
802.1X authentication type is Port Based.
MAB MAB (MAC Authentication Bypass) allows clients to be authenticated without any client
software installed. MAB is useful for authenticating devices without 802.1X capability like IP
phones. When MAB is enabled on a port, the switch will learn the MAC address of the client
automatically and send the authentication server a RADIUS access request frame with the
client’s MAC address as the username and password. MAB takes effect only when 802.1X
authentication is enabled on the port.
Enable 802.1X Configure RADIUS Profile and Parameters Select the Ports
Select the ports to enable 802.1X authentication or MAB for them. To enable 802.1X authentication,
click the unselected ports. 802.1X-enabled ports will be marked with . To enable MAB, click the ports
marked with . You can enable MAB only on 802.1X-enabled ports. MAB-enabled ports will be marked
with .
Note:
• You are not recommended to enable 802.1X authentication on the switch ports which connects to network devices without
802.1X capability like the router and APs.
• The switch authenticates wired clients which connect to the port with 802.1X enabled. And the gateway authenticates wired
clients which connect to the network with Portal configured. Wired clients should pass Portal and 802.1X authentication to
access the internet when both are configured.
4. 9. 3 MAC-Based Authentication
Overview
MAC-Based Authentication allows or disallows clients access to wireless networks based on the MAC
addresses of the clients. In this authentication method, the controller takes wireless clients’ MAC
addresses as their usernames and passwords for authentication. The RADIUS server authenticates the
MAC addresses against its database which stores the allowed MAC addresses. Clients can access the
wireless networks configured with MAC-based authentication after passing authentication successfully.
209
Chapter 4 Configure the Network with the SDN Controller
Note:
Both MAC-Based Authentication and Portal authentication can authenticate wireless clients. If both are configured on a wireless network,
a wireless client needs to pass MAC-Based Authentication first and then Portal authentication for internet access. You can enable MAC-
Based Authentication Fallback to allow clients bypass MAC-Based Authentication, which means the client needs to pass either of the
two authentication. The client tries MAC-Based Authentication first, and is allowed to try portal authentication if it failed the MAC-Based
Authentication.
Configuration
1. Select a site from the drop-down list of Organization. Go to Settings > Authentication > MAC-Based
Authentication. Click to enable MAC-Based Authentication.
2. In the Basic Info, select the SSIDs, RADIUS Profile and other required parameters. Refer to the
following table to configure the required parameters and click Save.
SSID Select one or more SSIDs for MAC-based authentication to take effect.
RADIUS Profile Select the RADIUS profile you have created. If no RADIUS profiles have been created,
click from the drop-down list or
to create one. The RADIUS profile records the information of the RADIUS server which
acts as the authentication server during MAC-Based Authentication.
210
Chapter 4 Configure the Network with the SDN Controller
NAS ID Configure a Network Access Server Identifier (NAS ID) for the authentication.
Authentication request packets from the controller to the RADIUS server carry the
NAS ID. The RADIUS server can classify users into different groups based on the NAS
ID, and then choose different policies for different groups.
MAC-Based For the wireless network configured with both MAC-Based Authentication and Portal,
Authentication Fallback if you enable this feature, a wireless client needs to pass only one authentication. The
client tries MAC-Based Authentication first, and is allowed to try Portal authentication if
it failed the MAC-Based Authentication. If you disable this feature as default, a wireless
client needs to pass both the MAC-Based Authentication and portal authentication for
internet access, and will be denied if it fails either of the authentication.
MAC Address Format Select clients’ MAC address format which the controller uses for authentication. Then
configure the MAC addresses in the specified format as usernames for the clients on
the RADIUS server.
Empty Password Click to allow a blank password for MAC-Based Authentication. With this option
disabled, the password will be the same as the username.
211
Chapter 4 Configure the Network with the SDN Controller
4. 10 Services
Services provide convenient network services and facilitate network management. You can set fixed IP
address for certain device in DHCP Reservation, configure servers or terminals in DDNS, SNMP, UPnP,
and SSH, schedule the devices in Reboot Schedule, PoE Schedule and Upgrade Schedule, and export
the information in Export Data, and more.
Overview
It is convenient for networks to use Dynamic IP addresses assigned by Dynamic Host Configuration
Protocol (DHCP), however, for devices that need to be reliably accessed, it is ideal to set fixed IP
addresses for them. DHCP Reservation allows you to reserve specific IP addresses for devices in your
network, and centrally manage the IP addresses.
Configuration
Network Select the network the DHCP reservation entry is used for.
MAC Address Specify the MAC address of the device for which you want to reserve an IP address.
212
Chapter 4 Configure the Network with the SDN Controller
Overview
WAN IP Address of your gateway can change periodically because your ISP typically employs DHCP
among other techniques. This is where Dynamic DNS comes in. Dynamic DNS assigns a fixed domain
name to the WAN port of your gateway, which facilitates remote users to access your local network
through WAN Port.
Let’s illustrate how Dynamic DNS works with the following figures.
Before:
WAN IP Address can change periodically, if it’s dynamically assigned by the ISP using DHCP among other techniques.
Remote User doesn’t know what WAN IP Address is exactly at the moment, and cannot access Local Network.
213
Chapter 4 Configure the Network with the SDN Controller
After:
Remote User can simply use Domain Name to access Local Network through WAN Port.
In this example, Domain Name is mysite.ddns.net.
Service Provider
Gateway
Remote User
Prerequisite:
Choose one Service Provider from the four that the controller supports, i.e. DynDNS, No-IP, Peanuthull, Comexe.
Register at your Service Provider, then you get your Username and Password.
Get your Domain Name from your Service Provider.
2
Dynamic DNS Binding:
2020/05/27: 172.217.174.196 -> mysite.ddns.net
2020/05/28: 172.217.174.208 -> mysite.ddns.net
...
Service Provider
WAN IP Address changes:
2020/05/27: 172.217.174.196
3 1 2020/05/28: 172.217.174.208
...
4
WAN Port LAN Port
Internet Local Network
Gateway
Remote User
214
Chapter 4 Configure the Network with the SDN Controller
Configuration
Select a site from the drop-down list of Organization. Go to Settings > Services > Dynamic DNS. Click +
Create New Dynamic DNS Entry, to load the following page. Configure the parameters and click Create.
Service Provider Select your service provider which Dynamic DNS works with.
Interface Select the WAN Port which the Dynamic DNS entry applies to.
Username Enter your username for the service provider. If you haven’t registered at the service
provider, click Go To Register.
Domain Name Enter the Domain Name which is provided by your service provider. Remote users can use
the Domain Name to access your local network through WAN port.
Update Interval Specify the update interval to report the changes of the WAN IP address for the DDNS
service.
4. 10. 3 mDNS
Overview
mDNS (Multicast DNS) Repeater can help forward mDNS request/reply packets between different
VLANs. With this function, you can create a forwarding rule to allow the devices in the specified Client
215
Chapter 4 Configure the Network with the SDN Controller
VLAN to discover the mDNS service in the specified Service VLAN. You can also specify the services
to be forwarded.
Configuration
1. Select a site from the drop-down list of Organization. Go to Settings > Services > mDNS.
2. Click Create New Rule. Configure the parameters.
Device Type Specify the device type for which the rule takes effect.
Services Network - When Device Type is AP, specify the VLANs where the mDNS services are located.
VLAN You can enter VLAN ranges or VLAN IDs separated by comma.
Client Network - VLAN When Device Type is AP, specify the VLANs where the Client devices are located. You
can enter VLAN ranges or VLAN IDs separated by comma.
Services Network - When Device Type is Gateway, specify the networks where the mDNS services are
Network located.
Client Network - When Device Type is Gateway, specify the networks where the Client devices are
Network located.
216
Chapter 4 Configure the Network with the SDN Controller
4. 10. 4 SNMP
Overview
SNMP (Simple Network Management Protocol) provides a convenient and flexible method for you
to configure and monitor network devices. Once you set up SNMP for the devices, you can centrally
manage them with an NMS (Network Management Station).
The controller supports multiple SNMP versions including SNMPv1, SNMPv2c and SNMPv3.
Note:
If you use an NMS to manage devices which are managed by the controller, you can only read but not write SNMP objects.
Configuration
Select a site from the drop-down list of Organization. Go to Settings > Services > SNMP and configure
the parameters. Then click Apply.
Community String With SNMPv1 & SNMPv2c enabled, specify the Community String, which is used as a
password for your NMS to access the SNMP agent. You need to configure the Community
String correspondingly on your NMS.
Username With SNMPv3 enabled, specify the username for your NMS to access the SNMP agent. You
need to configure the username correspondingly on your NMS.
Password With SNMPv3 enabled, specify the password for your NMS to access the SNMP agent. You
need to configure the password correspondingly on your NMS.
217
Chapter 4 Configure the Network with the SDN Controller
4. 10. 5 UPnP
Overview
UPnP (Universal Plug and Play) is essential for applications including multiplayer gaming, peer-to-peer
connections, real-time communication (such as VoIP or telephone conference) and remote assistance,
etc. With the help of UPnP, the traffic between the endpoints of these applications can freely pass the
gateway, thus realizing seamless connections.
Configuration
Select a site from the drop-down list of Organization. Go to Settings > Services > UPnP. Enable UPnP
globally and configure the parameters. Then click Apply.
4. 10. 6 SSH
Overview
SSH (Secure Shell) provides a method for you to securely configure and monitor network devices via a
command-line user interface on your SSH terminal.
Note:
If you use an SSH terminal to manage devices which are managed by the controller, you can only get the User privilege.
218
Chapter 4 Configure the Network with the SDN Controller
Configuration
Select a site from the drop-down list of Organization. Go to Settings > Services > SSH. Enable SSH
Login globally and configure the parameters. Then click Apply.
SSH Server Port Specify the SSH Sever Port which your network devices use for SSH connections. You
need to configure the SSH Server Port correspondingly on your SSH terminal.
Layer 3 Accessibility With this feature enabled, the SSH terminal from a different subnet can access your devices
via SSH. With this feature disabled, only the SSH terminal in the same subnet can access
your devices via SSH.
Overview
Reboot Schedule can make your devices reboot periodically according to your needs. You can configure
Reboot Schedule flexibly by creating multiple Reboot Schedule entries.
Configuration
1. Select a site from the drop-down list of Organization. Go to Settings > Services > Reboot Schedule.
Click + Create New Reboot Schedule to load the following page and configure the parameters.
219
Chapter 4 Configure the Network with the SDN Controller
Occurrence Specify the date and time for the devices to reboot.
Devices List Select the devices which the Reboot Schedule applies to.
2. Click Create. The new Reboot Schedule entry will be added to the table.
Overview
In Port Schedule, you can set schedules to control the PoE feature of the PoE switch or control the
on/off behavior of the switch port. When the PoE feature is disabled, the PoE switches will not supply
power to the connected PoE devices during the specified time period, but the switches can still transmit
data; when the Port feature is disabled, please check your topology and related configurations to avoid
network problems. You can configure PoE or Port Schedule flexibly by creating multiple entries.
Configuration
1. Select a site from the drop-down list of Organization. Go to Settings > Services > Port Schedule.
Click + Create New Port Schedule to load the following page and configure the parameters.
220
Chapter 4 Configure the Network with the SDN Controller
Port Schedule: This function affects LAN connections of ports but does not affect PoE
power supply. To avoid network problems, please check your topology and related
configurations before turning off ports.
Time Range When the Type is PoE Schedule, select the time range when the PoE switches will
supply power to the powered devices.
when the Type is Port Schedule, select the time range when the switches will turn on
the designated ports.
You can create a Time Range entry by clicking Create New Time Range Entry from the
drop down list.
Devices List When Type is PoE Schedule, select the PoE switch and PoE port to apply the schedule.
When Type is Port Schedule, select the switch and port to apply the schedule.
2. Click Create. The new schedule entry will be added to the table.
4. 10. 9 IPTV
Overview
IPTV includes two sections: IGMP and IPTV. In IGMP settings, you can enable IGMP proxy to detect
multicast group membership information and thus the router is able to forward multicast packets based
upon the information. IPTV settings allows you to enable Internet/IPTV/Phone service provided by your
ISP.
221
Chapter 4 Configure the Network with the SDN Controller
Configuration
1. Select a site from the drop-down list of Organization. Go to Settings > Services > IPTV > IGMP,
configure the parameters. If you want to configure the IPTV settings, go to next step; if you don’t
want to configure the IPTV settings, click Apply.
IGMP Proxy sends IGMP querier packets to the LAN ports to detect if there is any
multicast member connected to the LAN ports.
IGMP Version Select the IGMP version as V2 or V3. The default is IGMP V2.
IGMP Interface Select the WAN port on which the IGMP Proxy takes effect.
2. Go to Settings > Services > IPTV > IPTV, enable the IPTV features and choose the mode as Bridge
or Custom according to your ISP. Then configure the corresponding parameters. Click Apply.
222
Chapter 4 Configure the Network with the SDN Controller
Note that the IPTV section will be hidden if your device is an earlier version that does not support
this feature.
Custom: Select this mode if your ISP provides necessary parameters, and configure
the parameters according to the requirements of your ISP.
WAN Port Select the WAN port on which the IPTV settings take effect.
Port Mode Select the appropriate Port Mode of the LAN ports to determine which port is used to
support Internet service, IPTV service, or IP Phone service.
Overview
Upgrade Schedule allows you to schedule the device upgrade as desired. You can set recurring upgrades
or a one-time schedule.When configuring multiple schedules, set different execution times if possible.
If execution times overlap, new schedule will not be executed before the current task completes.
223
Chapter 4 Configure the Network with the SDN Controller
Configuration
Select a site from the drop-down list of Organization. Go to Settings > Services > Upgrade Schedule.
Set the upgrade schedule and select devices. Click Apply.
Devices List Select the devices that will upgrade according to the set schedule.
Overview
DNS Proxy provides the LAN side clients with the DNS query service. It forwards the DNS request from
the LAN side clients to the selected upstream DNS server and forwards the DNS reply accordingly.
DNSSEC (DNS Security Extensions), DoT (DNS over TLS), and DoH (DNS over Https) are three security
options for DNS Proxy. DNSSEC will verify the integrity of DNS records, and DoT / DoH will encrypt the
query.
All of the three options need an upstream DNS server that supports them.
224
Chapter 4 Configure the Network with the SDN Controller
Configuration
1. Select a site from the drop-down list of Organization. Go to Settings > Services > DNS Proxy.
2. Configure the parameters, then save the settings.
DNS Server Specify the upstream DNS server which the DNS requests will be forwarded to. For
DoT and DoH, the system provides some known public DNS servers that support
these security options. For DoH, the upstream DNS servers are usually websites with
https URLs. For DNSSEC and DoT, servers are usually IP address.
Bogus DNS Reply This is an special option for DNSSEC. Choose to pass/drop the bogus reply if the
integrity of DNS records failed to be verified (which means the DNS record may be
modified and is not trustable).
Overview
DNS caching further speeds up domain name translation/resolution by handling it for recently visited
addresses before the request is sent to the internet. Even if your network can use a large number of
public DNS servers for translation/resolution, it’s still faster to have a local copy.
Configuration
1. Select a site from the drop-down list of Organization. Go to Settings > Services > DNS Cache.
225
Chapter 4 Configure the Network with the SDN Controller
2. Enable DNS Cache, configure the parameters, then save the settings.
TTL Specify the time to live (TTL) value in seconds. When the life cycle of the DNS entry
exceeds the TTL value, the DNS cache will be automatically cleared. The range is
1-86400. If it’s not specified, the system will use the default TTL value of each DNS
message.
Overview
Configuration
1. Select Global View from the drop-down list of Organization. If you want to export data of only one
site, you can also select the site to access the site view instead.
226
Chapter 4 Configure the Network with the SDN Controller
2. Go to Settings > Services > Export Data. Select the type of data from the export list and click
Export.
Client List: Export the list of all clients that are connected to the networks.
Insight-Rogue AP List: Export the list of the rogue APs scanned before.
Log List: Export the list of the logs generated by the controller.
Mode Select the columns to export. We recommend selecting Default Columns, which include
commonly needed columns such as DEVICE NAME, MAC ADDRESS, MODEL, etc. If you
select All Columns or Current Display Columns, data exporting will be time-consuming if
there are lots of devices.
Note: In site view, only the data of current site can be exported.
Format The data can be exported to the file in the format of .CSV or .XLSX.
227
Chapter 4 Configure the Network with the SDN Controller
Send Email If you want to send the exported data via email, enable Send Email and configure the
parameters below:
Send to: Specify the email addresses to send the exported data to.
228
Chapter 4 Configure the Network with the SDN Controller
4. 11 CLI Configuration
CLI configuration is essentially to configure devices via command lines. It is a supplementary means of
GUI configuration. CLI configuration may conflict with GUI configuration.
The Controller supports two types of CLI configuration: Site CLI and Device CLI.
■ Site CLI
Site CLI supports batch configuration of devices that support CLI configuration on the site.
■ Device CLI
Device CLI supports batch configuration of selected devices.
Currently, CLI configuration only supports switches. Please refer to CLI Reference Guide to
understand the CLI commands of TP-Link switches.
If you need to use CLI configuration, please read the precautions and User Guide carefully. You can
contact TP-Link technical support if necessary.
After applying the CLI configuration, you can go to Devices > Application Result to view the
configuration results.
General Precautions
1. The GUI and CLI configuration should be planned globally according to the actual network topology
and requirements.
2. To avoid conflicts, it is recommended not to use the CLI to configure the existing functions of the
GUI.
a. When adopting a new device, the Controller will apply configurations to the device in the order
of GUI, Site CLI, and then Device CLI. If there is a configuration conflict, the configuration applied
last takes effect.
b. CLI profiles (including Site CLI profiles and Device CLI profiles) will only be sent to devices once
after applied, unless the “Apply Again” button in the Application Result is clicked to trigger the
full configurations application.
c. When a device upgrades its firmware, the Controller will apply the full configurations to the
device in the order of GUI, Site CLI, and then Device CLI.
d. Since the configurations applied later will overwrite the previous configurations, the
configuration results of different devices may be different after the same function has been
modified repeatedly via GUI, Site CLI and Device CLI.
3. The Controller will not verify the existing GUI and CLI configurations of devices. Be sure to check
the existing configurations before performing new configurations. Otherwise, unexpected results
may occur after the configurations are applied, and the devices may even go offline.
4. To avoid configuration conflicts, if you really need to use the CLI to configure a certain function, it is
recommended not to configure it via GUI at the same time.
229
Chapter 4 Configure the Network with the SDN Controller
5. To avoid disconnection of devices from the Controller due to configuration errors or conflicts,
it is recommended to configure VLAN, VLAN Interface, IP Address, ACL, etc. via GUI, and avoid
modifying related configurations via CLI.
Repeated Configurations
When the same function is configured via CLI multiple times, the previous configuration may be
overwritten, and the last configuration shall prevail.
a. It is recommended to confirm the currently effective commands via the CLI configuration
viewing function “Show Running Config”.
b. If you need to cancel a certain configuration, use the “no” command.
c. If you need to modify a certain configuration, you can enter a new command to overwrite the
configuration.
d. Apply the final configuration, and confirm that the function is configured correctly and takes
effect via the CLI configuration viewing function.
Execution Failures
If a CLI command fails to be executed, an error will be reported and subsequent commands will be
executed. You can view the error details via the error message, and the commands that have been
successfully executed before will not be undone. It is recommended to follow the steps below:
a. Use the CLI configuration viewing function (Show Running Config) to confirm the commands
that have taken effect. If you need to cancel them, you can enter “no” commands and apply
them to devices.
b. Troubleshoot and correct the command error, regenerate the CLI configuration, and apply it to
devices.
Command Modification
If you need to modify the commands issued via CLI, please follow the steps below:
a. Use the CLI configuration view function (Show Running Config) to confirm the commands that
have taken effect, and sort out the commands that need to be canceled.
b. Enter “no” commands to cancel the configurations, and apply them to devices.
Prohibited Commands
1. CLI commands such as modifying user name and password, managing VLAN, SDM profile, reboot,
reset, upgrade, import and export configurations have been prohibited. When using other CLI
commands, please also pay attention to avoid affecting the management of the Controller.
2. Device CLI supports the variable function. The variable content does not have too many restrictions,
for example, you can enter CLI commands, but it is not recommended to use it in this way.
230
Chapter 4 Configure the Network with the SDN Controller
Overview
Site CLI enables batch configurations of all devices that support CLI configuration on the site via
command lines.
Configuration
Note:
• The # character is a special command, which indicates entering the configure mode. Please use it in a separate line. If you add
other commands after it in the same line, they will be ignored.
Import CLI from Device Click and select a device that supports CLI configuration to import its running config.
Import CLI from File Click and select an existing command file to import command lines.
231
Chapter 4 Configure the Network with the SDN Controller
3. Click Save to add the profile. The new profile is in inactive state and will not be applied to devices.
4. Click Apply to apply the CLI. The profile will change to active state and apply configurations to all
devices that support CLI configuration on the site.
Note:
Once the profile becomes active, you will be unable to edit it.
To check whether the profile is successfully applied to devices and takes effect, click View CLI Details
to view the configuration results on the Devices > Application Result page.
Note:
Deleting a CLI profile will not take effect on existing configurations on devices. To delete the configurations, use the “no” command.
Overview
Device CLI enables batch configuration of specific devices via command lines.
Device CLI supports variables. You can use the %x% format to define a variable x, and then set different
values for different switches. When the Controller applies the Device CLI configuration to switches, it
will automatically modify the variable %x% to the values you set.
232
Chapter 4 Configure the Network with the SDN Controller
Configuration
1. Go to Settings > CLI Configuration > Device CLI. Click Create New Device CLI Profile and create a
CLI profile according to your needs.
Note:
• The # character is a special command, which indicates entering the configure mode. Please use it in a separate line. If you add
other commands after it in the same line, they will be ignored.
CLI Enter the command lines manually. You can enter %xxx% in the CLI template to define
variables.
Import CLI from Device Click and select a device that supports CLI configuration to import its running config.
Import CLI from File Click and select an existing command file to import command lines.
233
Chapter 4 Configure the Network with the SDN Controller
3. Click Save to add the profile. The new profile is in inactive state and will not be applied to devices.
4. Click Apply to apply the CLI. The profile will change to active state and apply configurations to the
devices you selected.
Note:
Once the profile becomes active, you will be unable to edit it.
To check whether the profile is successfully applied to devices and takes effect, click View CLI Details
to view the configuration results on the Devices > Application Result page.
Note:
Deleting a CLI profile will not take effect on existing configurations on devices. To delete the configurations, use the “no” command.
234
5
Configure the SDN Controller
Controller Settings control the appearance and behavior of the controller and provide methods of data
backup, restore and migration:
• 5. 3 Maintenance
• 5. 4 Migration
• 5. 5 Auto Backup
Chapter 5 Configure the SDN Controller
5. 1. 1 General Settings
Configuration
Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Controller. In General Settings, configure the parameters and click Save.
Time Zone Select the Time Zone of the controller according to your region. For controller settings and
statistics, time is displayed based on the Time Zone.
Daylight Saving Time Enable the feature if your country/region implements DST. When it is enabled, the icon
will appear on the upper right, showing the DST settings and status.
236
Chapter 5 Configure the SDN Controller
Time Offset Select the time added in minutes when Daylight Saving Time starts.
Starts On Specify the time when the DST starts. The clock will be set forward by the time offset you
specify.
Ends On Specify the time when the DST ends.The clock will be set back by the time offset you
specify.
Primary NTP Server/ Enter the IP address of the primary and secondary NTP (Network Time Protocol) server.
Secondary NTP Server NTP servers assign network time to the controller.
Reset Button With this feature enabled, the controller can be reset via reset button.
Network Settings Select one way for the controller to get IP settings.
Static: You need to specify the IP address, Netmask, Gateway, Primary DNS, and Secondary
DNS for the controller.
DHCP: The controller get IP settings from the DHCP server. If the controller fails to get IP
settings from the DHCP server, it will use the Fallback IP Address and Fallback Netmask.
Time Zone Select the Time Zone of the controller according to your region. For controller settings and
statistics, time is displayed based on the Time Zone.
Daylight Saving Time Enable the feature if your country/region implements DST.
237
Chapter 5 Configure the SDN Controller
Time Offset Select the time added in minutes when Daylight Saving Time starts.
Starts On Specify the time when the DST starts. The clock will be set forward by the time offset you
specify.
Ends On Specify the time when the DST ends.The clock will be set back by the time offset you
specify.
5. 1. 2 Mail Server
Overview
With the Mail Server, the controller can send emails for resetting your password, pushing notifications,
and delivering the system logs. The Mail Server feature works with the SMTP (Simple Mail Transfer
Protocol) service provided by an email service provider.
Configuration
1. Log in to your email account and enable the SMTP (Simple Mail Transfer Protocol) Service. For
details, refer to the instructions of your email service provider.
238
Chapter 5 Configure the SDN Controller
2. Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Controller Settings. In Mail Server, enable SMTP Server and configure the parameters. Then click
Save.
SMTP Enter the URL or IP address of the SMTP server according to the instructions of the
email service provider.
Port Configure the port used by the SMTP server according to the instructions of the email
service provider.
SSL Enable or disable SSL according to the instructions of the email service provider. SSL
(Secure Sockets Layer) is used to create an encrypted link between the controller and
the SMTP server.
Authentication Enable or disable Authentication according to the instructions of the email service
provider. If Authentication is enabled, the SMTP server requires the username and
password for authentication.
Username When Authentication is enabled, enter your email address as the username.
Password When Authentication is enabled, enter the authentication code as the password, which
is provided by the email service provider when you enable the SMTP service.
239
Chapter 5 Configure the SDN Controller
Sender Address (Optional) Specify the sender address of the email. If you leave it blank, the controller
uses your email address as the Sender Address.
Test SMTP Server Test the Mail Server configuration by sending a test email to an email address that you
specify.
Overview
With History Data Retention, you can specify how the controller retains its data.
Configuration
Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Controller Settings. In History Data Retention, configure the parameters and click Save.
Clients’ History Data When enabled, known clients, client history and client logs will be recorded. This will
occupy much storage space.
Client History Specify the retention time of client online and offline records. Corresponding to Insight-
Past Connection.
240
Chapter 5 Configure the SDN Controller
Known Client Specify the retention time of known client data. Corresponding to Insight-Known Clients.
Time Series with 5 Minutes Displays the retention time of AP, switch, gateway, and client data. Corresponding to
Granularity 5-minute statistics.
Time Series with Hourly Displays the retention time of AP, switch, gateway, and client data. Corresponding to
Granularity hourly statistics.
Time Series with Daily Specify the retention time of AP, switch, gateway, and client data. Corresponding to
Granularity daily statistics.
Time Series with Weekly Specify the retention time of client data. Corresponding to weekly statistics.
Granularity
Portal Authentication Specify the retention time of portal authorization records. Corresponding to Insight-
Records Past Portal Authorization.
Rogue AP Specify the retention time of scanned Rogue APs. Corresponding to Insight-Rogue APs.
Configuration
Click the checkbox if you agree to participate in the customer experience improvement program
and help improve the quality and performance of TP-Link products by sending statistics and usage
information.
5. 1. 5 HTTPS Certificate
Overview
If you have assigned a domain name to the controller for login, to eliminate the “untrusted certificate“
error message that will appear in the login process, you can import the corresponding SSL certificate
and private key here. The certificate and private key are issued by the certificate authority.
Note:
• HTTPS Certificate configuration is only available for the Software Controller and Hardware Controller.
• You need to restart you controller for the imported SSL certificate to take effect.
241
Chapter 5 Configure the SDN Controller
Configuration
Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Controller Settings. In HTTPS Certificate, select your file format, import your SSL certificate and
configure the parameters. Then click Save.
File Format Select the format of your certificate, and import the certificate file.
Keystore Password (For JKS) Enter the keystore password if your SSL certificate has the keystore
password. Otherwise, leave it blank.
Private Key Password (For PFX) Enter the private key password if your SSL certificate has the private key
password. Otherwise, leave it blank.
Note:
For the PEM-formatted certificate:
• The key can be placed behind certificate file, and they can be imported together.
242
Chapter 5 Configure the SDN Controller
5. 1. 6 Access Config
Overview
With Access Config, you can specify the port used by the controller for management and portal.
Note:
• Access Config is only available on the Software Controller and Hardware Controller.
• Once applying the change of HTTPS and HTTP port, restart the controller to make the change effective.
• For security, the HTTPS and HTTP port for Potal should be different from that for controller management.
Configuration
Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Controller Settings. In Access Config, configure the parameters and click Save.
243
Chapter 5 Configure the SDN Controller
Controller Hostname/IP Enter the hostname or IP address of the controller which will be used as the Controller
URL in the notification email for resetting your controller password. You can keep it
default and IP address recognized by the controller will be used as the Controller URL.
Auto Refresh IP (Only for hardware controller) Enable the feature and the hardware controller will refresh
its IP address automatically.
Redirect HTTP to HTTPS With this option enabled, HTTP requests will be redirected to HTTPS connections.
HTTPS Port for Controller Specify the HTTPS port used by the controller for management. After setting the port,
Management you can visit https://[Controller Host’s IP address or URL]:[HTTPS Port] to log in to the
Controller.
HTTP Port for Controller Specify the HTTP port used by the controller for management. After setting the port,
Management you can visit https://[Controller Host’s IP address or URL]:[HTTP Port] to log in to the
Controller.
HTTPS Port for Portal Specify the HTTPS port used by the controller for Portal.
HTTP Port for Portal Specify the HTTP port used by the controller for Portal.
244
Chapter 5 Configure the SDN Controller
Overview
With Cloud Access, it’s convenient for you to manage your controller from anywhere, as long as you
have access to the internet.
Configuration
• If you have enabled cloud access and bound your TP-Link ID in the quick setup wizard, skip this step.
1 ) Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Cloud Access. Enable Cloud Access.
2 ) Enter your TP-Link ID and password. Then click Log In and Bind.
245
Chapter 5 Configure the SDN Controller
246
Chapter 5 Configure the SDN Controller
5. 3 Maintenance
5. 3. 1 Controller Status
Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Maintenance. In Controller Status, you can view the controller-related information and status.
Controller Name Displays the controller name, which identifies the controller. You can specify the controller
name in 5. 1. 1 General Settings.
System Time Displays the system time of the controller. The system time is based on the time zone which
you configure in 5. 1. 1 General Settings.
5. 3. 2 User Interface
Overview
You can customize the User Interface settings of the controller according to your preferences.
247
Chapter 5 Configure the SDN Controller
Configuration
Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Maintenance. In User Interface, configure the parameters and click Apply.
Use 24-Hour Time With Use 24-Hour Time enabled, time is displayed in a 24-hour format. With Use 24-
Hour Time disabled, time is displayed in a 12-hour format.
Statistic/Dashboard Timezone Select which Timezone the time of statistics and the dashboard is based on.
UTC: UTC (Coordinated Universal Time) is the common time standard across the
world.
Fixed Menu With Fixed Menu enabled, the menu icons are fixed and do not prompt menu texts
when your mouse hovers on them.
Dark Settings When enabled, the system will switch to a dark theme.
248
Chapter 5 Configure the SDN Controller
Show Pending Devices With this option enabled, the devices in Pending status will be shown, and you can
determine whether to adopt them. With this option disabled, they will not be shown,
thus you cannot adopt any new devices.
Refresh Button Enable or disable Refresh Button in the upper right corner of the configuration
page.
Refresh Interval Select how often the controller automatically refreshes the data displayed on the
page.
Enable WebSocket Connection With WebSocket Connection enabled, the controller updates in real time some part
of its data on the web interface, which is transmitted using the WebSocket service,
so that you don’t need to refresh them manually.
Controller Update Notification With this feature enabled, you will receive an update notification when a new
controller version is available.
Devices Update Notification With this feature enabled, you will receive an update notification when a new
firmware version for your device is available.
Overview
You can backup the configuration and data of your controller to prevent any loss of important information.
If necessary, restore the controller to a previous status using the backup file.
Configuration
■ Backup
Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Maintenance > Backup & Restore > Backup, click Export to export and save the backup file.
249
Chapter 5 Configure the SDN Controller
If you want to export the data to a file server, configure the parameters accordingly and click Export.
Retained Data Backup Select the time range in the drop-down menu of Retained Data Backup. Only
configuration and data within the time range is backed up. If you select Settings
Only, only configuration (no data) is backed up.
Retain User Info Select this option if you want to retain local and cloud user information.
Export to Local File: Export and save the data locally. It is not supported when
accessing the controller via cloud.
Export to File Server: Export and save the data to a file server. Select the desired
file server type (FTP / TFTP / SFTP / SCP) and configure the parameters.
250
Chapter 5 Configure the SDN Controller
■ Restore
Go to Settings > Maintenance > Backup & Restore > Restore. In Backup & Restore section, Click Browse
and select a backup file from your computer or file server. Click Restore.
Import from Local File: Import the data locally. It is not supported when accessing
the controller via cloud.
Import from File Server: Import the data from a file server. Select the desired file
server type (FTP / TFTP / SFTP / SCP) and configure the parameters.
Note:
Configuration data cannot be imported into the controller through restore.
251
Chapter 5 Configure the SDN Controller
5. 4 Migration
Migration services allow users to migrate the configurations and data to any other controller. Migration
services include 5. 4. 1 Site Migration and 5. 4. 2 Controller Migration, covering all the needs to migrate
both a single site and the whole controller.
5. 4. 1 Site Migration
Overview
Site Migration allows the administrators to export a site from the current controller to any other
controller that has the same version. All the configurations and data of the site will be migrated to the
target controller.
The process of migrating configurations and data from a site to another controller can be summarized
in three steps: Export Site, Migrate Site and Migrate Devices.
Site Migration
1 2 3
Export Site Migrate Site Migrate Devices
Export the configurations and Import the configurations and Migrate the devices on Site A
data of Site A on Controller A data of Site A to Controller B to Controller B
Configuration
252
Chapter 5 Configure the SDN Controller
1. Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Migration. On the Site Migration tab, click start button on the following page.
2. Select the site to be imported into the second controller in the Select Site drop-down list. Select
where you want to export and save the backup file. Click Export to download the file of the current
site. If you have backed up the file, click Skip.
253
Chapter 5 Configure the SDN Controller
1. Start and log in to the target controller, click the top right corner of the
screen and select , and then the following window will pop up. Note that for controller
v 4.3.0 and above, only the file from the controller with the same major and minor version number
can be imported.
2. Enter a unique name for the new site. Click Browse to upload the file of the site to be imported and
click Import to import the site.
3. After the file has been imported to the target controller, go back to the previous controller and click
Confirm.
254
Chapter 5 Configure the SDN Controller
1. Enter the IP address or URL of your target controller into Controller IP/Inform URL input filed. In this
case, the IP address of the target controller is 10.0.3.23.
Note:
Make sure that you enter the correct IP address or URL of the target controller to establish the communication between managed
devices and your target controller. Otherwise the managed devices cannot be adopted by the target controller.
255
Chapter 5 Configure the SDN Controller
2. Select the devices that are to be migrated by clicking the box next to each device. By default, all the
devices are selected. Click Migrate Devices to migrate the selected devices to the target controller.
256
Chapter 5 Configure the SDN Controller
3. Verify that all the migrated devices are visible and connected on the target controller. When all the
migrated devices are in Connected status on the Device page on the target controller, click Forget
Devices to finish the migration process.
4. When the migration process is completed, all the configuration and data are migrated to the target
controller. You can delete the previous site if necessary.
5. 4. 2 Controller Migration
Overview
Controller Migration allows administrators to migrate the configurations and data from the current
controller to any other controller that has the same version.
257
Chapter 5 Configure the SDN Controller
The process of migrating configurations and data from the current controller to another controller can
be summarized in three steps: Export Controller, Migrate Controller and Migrate Devices.
Controller Migration
Controller A Controller B
1 2 3
Export Controller Migrate Controller Migrate Devices
Export the configurations and Import the configurations and data Migrate the devices on
data of Controller A of Controller A to Controller B Controller A to Controller B
Configuration
258
Chapter 5 Configure the SDN Controller
1. Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Migration. On the Controller Migration tab, click start button on the following page.
259
Chapter 5 Configure the SDN Controller
2. Select the length of time in days that data will be backed up in the Retained Data Backup, and where
you want to export and save the data. Click Export to export the configurations and data of your
current controller as a backup file. If you have backed up the file, click Skip.
260
Chapter 5 Configure the SDN Controller
1. Log in to the target controller. Select Global from the drop-down list of Organization in the upper
right corner. Go to Settings > Maintenance > Backup & Restore. Click Browse to locate and choose
the backup file of the previous controller. Then click Restore to upload the file.
261
Chapter 5 Configure the SDN Controller
2. After the file has been imported to the target controller, go back to the previous controller and click
Confirm.
1. Enter the IP address or URL of your target controller into Controller IP/Inform URL input filed. In this
case, the IP address of the target controller is 10.0.3.23.
Note:
Make sure that you enter the correct IP address or URL of the target controller to establish the communication between managed
devices and your target controller. Otherwise the managed devices cannot be adopted by the target controller.
262
Chapter 5 Configure the SDN Controller
2. Select the devices that are to be migrated by clicking the box next to each device. By default, all the
devices are selected. Click Migrate Devices to migrate the selected devices to the target controller.
263
Chapter 5 Configure the SDN Controller
3. Verify that all the migrated devices are visible and connected on the target controller. When all the
migrated devices are in Connected status on the Device page on the target controller, click Forget
Devices to finish the migration process.
When the migration process is completed, all the configuration and data are migrated to the target
controller. You can uninstall the previous controller if necessary.
264
Chapter 5 Configure the SDN Controller
5. 5 Auto Backup
Overview
With Auto Backup enabled, the controller will be scheduled to back up the configurations and data
automatically at the specified time. You can easily restore the configurations and data when needed.
Note:
• For OC200, Auto Backup is available only when it is powered by a PoE device and a storage device is connected to its USB port.
• On the Cloud-Based Controller, you have no need to configure Auto Backup. It will automatically save your configurations and
data on the cloud.
Configuration
1. Select Global from the drop-down list of Organization in the upper right corner. Go to Settings >
Maintenance > Auto Backup. Click to enable Auto Backup.
2. Configure the following parameters to specify the rules of Auto Backup. Click Apply.
265
Chapter 5 Configure the SDN Controller
Occurrence Specify when to perform Auto Backup regularly. Select Every Day, Week, Month, or
Year first and then set a time to back up files.
Note the time availability when you choose Every Month. For example, if you choose
to automatically backup the data on the 31st of every month, Auto Backup will not
take effect when it comes to the month with no 31st, such as February, April, and
June.
Retained Data Backup Select the length of time in days that data will be backed up.
7 Days/1 Month/2 Months/3 Months/6 Months/1 Year: Back up the data in the recent
7 days/1 month/2 months/3 months/6 months/1 year.
All Time: (Only for Software Controller) Back up all data in the controller.
Save to Local File: The backup file will be saved as a local file.
Save to File Server: The backup file will be saved in the specified file server. Four
types of file server are available: FTP, TFTP, SFTP, and SCP.
Saving Path (Only for Hardware Controller) Select a path to save the backup files.
Maximum Number of Files Specify the maximum number of backup files to save.
You can view the name, backup time and size of backup files in Backup Files List.
To restore, export or delete the backup file, click the icon in the Action column.
Restore the configurations and data in the backup file. All current configurations will be replaced
after the restoration.
To keep the backup data safe, please wait until the operation is finished. This will take several
minutes.
Export the backup file. The exported file will be saved in the saving path of your web browser.
Note:
266
Chapter 5 Configure the SDN Controller
• If the backup file is saved to file server and the type SCP / TFTP is selected, it will not included in the Backup Files List, and it
cannot be exported, restored, or deleted.
• To back up data manually and restore the data to the controller, refer to 5. 3. 3 Backup & Restore to configure Backup&Restore.
• The configuration of cloud users can be neither backed up nor restored. To add cloud users, please refer to 9. 4 Manage and
Create Cloud User Accounts.
267
6
Configure and Monitor
Controller-Managed Devices
This chapter guides you on how to configure and monitor controller-managed devices, including
gateways, switches and APs. You can configure the devices individually or in batches to modify the
configurations of certain devices. The chapter includes the following sections:
Overview
The Devices page displays all TP-Link devices discovered by the controller and their general information.
For an easy monitoring of the devices, you can customize the column and filter the devices for a better
overview of device information. Also, quick operations and Batch Edit are available for configurations.
According the connection status, the devices have the following status: Pending, Isolated, Connected,
Managed by Others, Heartbeat Missed, and Disconnected. The icons in the Status column are explained
as follows:
The device is in Standalone Mode or with factory settings, and has not been adopted
by the controller. To adopt the device, click , and the controller will use the default
username and password to adopt it. When adopting, its status will change from Adopting,
Provisioning, Configuring, to Connected eventually.
(For APs in the mesh network) The AP once managed by the controller via a wireless
connection now cannot reach the gateway. You can rebuild the mesh network by
connecting it to an AP in the Connected status, then the isolated AP will turn into a
connected one. For detailed configuration, refer to Mesh.
The device has been adopted by the controller and you can manage it centrally. A
connected device will turn into a pending one after you forget it.
The device has already been managed by another controller. You can reset the device or
provide the username and password to unbind it from another controller and adopt it in
the current controller.
269
Chapter 6 Configure and Monitor Controller-Managed Devices
Once connected to the controller, the device will send inform packets to the controller
in a regular interval to maintain the connection. If the controller does not receive its
inform packets in 30 seconds, the device will turn into the Heartbeat Missed status. For
a heartbeat-missed device, if the controller receives an inform packet from the device
in 5 minutes, its status will become Connected again; otherwise, its status will become
Disconnected.
The connected device has lost connection with the controller for more than 5 minutes.
(For APs in the mesh network) When this icon appears with a status icon, it indicates the
AP with mesh function and no wired connection is detected by the controller. You can
connect it to an uplink AP through Mesh.
When this icon appears with a status icon, it indicates the device in the Connected,
Heartbeat Missed, Isolated, or Disconnected status is migrating. For more information
about Migration, refer to 5. 4 Migration.
Configuration
270
Chapter 6 Configure and Monitor Controller-Managed Devices
To filter the devices, a tab bar is above the table to filter the devices by
device type. You can also filter the devices by their status by clicking in the Status colum.
If you select the APs tab, another tab bar will be available to
change the column quickly.
Overview Displays the device name, IP address, status, model, firmware version, uptime, channel,
and Tx power by default.
Mesh Displays the information of devices in the mesh network, including the device name, IP
address, status, model, uplink device, channel, Tx power, and the number of downlink
devices, clients and hops by default.
Performance Displays the device name, IP address, status, uptime, channel, Tx power, the number
of 2.4 GHz and 5 GHz clients, Rx rate, and Tx rate by default.
Config Displays the device name, status, version, WLAN group, and the radio settings for
2.4 GHz and 5 GHz by default.
■ Quick Operations
Click the icons in Header or the Action column to quickly adopt, locate, upgrade, or reboot the
device.
(For connected switches and APs) Click this icon and the LEDs of the device will flash
to indicate the device’s location. The LEDs will keep flashing for 10 minutes, or you can
click the icon to stop the flashing.
Click to upgrade the device’s firmware version. This icon appears when the device has
a new firmware version.
271
Chapter 6 Configure and Monitor Controller-Managed Devices
Missed/Isolated status, while Batch Adopt is available for the devices in the Pending/Managed By
Others status.
Click Batch Action. select Batch Adopt, click the checkboxes of devices, and click Done. If the
selected devices are all in the Pending status, the controller will adopt then with the default
username and password. If not, enter the username and password manually to adopt the devices.
Click Batch Action, select Batch Config, click the checkboxes of devices, and click Done. Then the
Properties window appears. There are two tabs in the window: Devices and Config.
In Devices, you can click to remove the device from the current batch configuration.
In Config, all settings are Keep Existing by default. For detailed configurations, refer to the
configuration of switches and APs.
Click to minimize the Properties window to an icon. To reopen the minimized Properties
window, click .
Click to maximize the Properties window. You can also use the icon on pages other
than the Devices page.
Click to close the Properties window of the chosen device(s). Note that the unsaved
configuration will be lost.
The number on the lower-right shows the number of devices in the batch
configuration.
272
Chapter 6 Configure and Monitor Controller-Managed Devices
Note:
• You can adopt only one router in one site.
• The available functions in the window vary due to the model and status of the device.
Monitor Panel
The monitor panel displays the router’s ports, and it uses colors and icons to indicate different
connection status and port types. When the router is pending or disconnected, all ports are disabled.
273
Chapter 6 Configure and Monitor Controller-Managed Devices
You can hover the cursor over the port icon for more details.
Details
In Details, you can view the basic information of the router and statistics of WAN ports to know the
device’s running status briefly. The listed information varies with devices.
274
Chapter 6 Configure and Monitor Controller-Managed Devices
Networks
Ports
In Ports, you can view the status and edit settings of the ports.
275
Chapter 6 Configure and Monitor Controller-Managed Devices
Manual: Specify the speed and duplex from the drop-down list manually.
Mirroring Mirroring is used to analyze network traffic and troubleshoot network problems.
Enable this option to set the edited port as the mirroring port, then specify one or
multiple mirrored ports. The gateway will sends a copy of traffics passing through the
mirrored ports to the mirroring port.
Ingress and Egress: Both the incoming and outgoing packets through the mirrored
port will be copied to the mirroring port.
Ingress: The packets received by the mirrored port will be copied to the mirroring
port.
Egress: The packets sent by the mirrored port will be copied to the mirroring port.
276
Chapter 6 Configure and Monitor Controller-Managed Devices
Clients
Config
In the Properties window, click Config and then click the sections to configure the features applied to
the router.
277
Chapter 6 Configure and Monitor Controller-Managed Devices
■ General
In General, you can specify general settings of the router.
Use Site Settings: The device’s LED will work following the settings of the site. To view and
modify the site settings, refer to 4. 2. 2 Services.
Longitude / Configure the parameters according to where the site is located. These fields are optional.
Latitude / Address
278
Chapter 6 Configure and Monitor Controller-Managed Devices
Status If you disable the frequency band, the radio on it will turn off.
Wireless Mode Specify the wireless mode of the band. Different bands have different available options.
We recommend using the default value.
Channel Width Specify the channel width of the band. Different bands have different available options. We
recommend using the default value.
Channel Specify the operation channel of the router to improve wireless performance. If you select
Auto for the channel setting, the router scans available channels and selects the channel
where the least amount of traffic is detected.
Tx Power Specify the Tx Power (Transmit Power) in the 4 options: Low, Medium, High and Custom.
The actual power of Low, Medium and High are based on the minimum transmit power
(Min. Txpower) and maximum transmit power (Max. TxPower), which may vary in different
countries and regions.
Low: Min. TxPower + (Max. TxPower-Min. TxPower) * 20% (round off the value)
Medium: Min. TxPower + (Max. TxPower-Min. TxPower) * 60% (round off the value)
279
Chapter 6 Configure and Monitor Controller-Managed Devices
■ WLANs
In WLANs, you can apply the WLAN group to the router and specify a different SSID name and
password to override the SSID in the WLAN group. After that, clients can only see the new SSID
and use the new password to access the network. To create or edit WLAN groups, refer to 4. 4
Configure Wireless Networks.
(Only for configuring a single device) To override the SSID, select a WLAN group, click in the entry
and then the following page appears.
SSID Override Enable or disable SSID Override on the AP. If SSID Override enabled, specify the new SSID
and password to override the current one.
280
Chapter 6 Configure and Monitor Controller-Managed Devices
VLAN Enable or disable VLAN. If VLAN enabled, enter a VLAN ID to add the new SSID to the
VLAN.
■ Services
In Services, you can configure SNMP to write down the location and contact detail. You can also
click Manage to jump to Settings > Services > SNMP, and for detailed configuration of SNMP
service, refer to 4. 10. 4 SNMP.
281
Chapter 6 Configure and Monitor Controller-Managed Devices
■ Advanced
In Advanced, you can configure advanced settings to make better use of network resources.
Hardware Offload Hardware Offload can improve performance and reduce CPU utilization by using the
hardware to offload packet processing.
Note that this feature cannot take effect if QoS, Bandwidth Control, or Session Limit
is enabled. To configure Bandwidth Control and Session Limit for the router, refer to 4.
6 Transmission.
LLDP LLDP (Link Layer Discovery Protocol) can help discover devices.
Echo Server Echo Server is used to test the connectivity and monitor the latency of the network
automatically or manually. If you click Custom, enter the IP address or hostname of
your custom server.
Maximum Associated Enable this function and specify the maximum number of connected clients. If the
Clients connected client reaches the maximum number, the router will disconnect those with
weaker signals to make room for other clients requesting connections.
RSSI Threshold Enable this function and enter the threshold of RSSI (Received Signal Strength
Indication). If the client’s signal strength is weaker than the threshold, the client will
lose connection with the router.
282
Chapter 6 Configure and Monitor Controller-Managed Devices
No Acknowledgement Enable this function to specify that the router will not acknowledge frames with QoS
No Ack. Enabling No Acknowledgment can bring more efficient throughput, but it
may increase error rates in a noisy Radio Frequency (RF) environment.
Unscheduled Automatic When enabled, this function can greatly improve the energy-saving capacity of
Power Save Delivery clients.
OFDMA (Only for models supporting 802.11 ax) Enable this feature to enable multiple users
to transmit data simultaneously, and it will greatly improves speed and efficiency.
Note that the benefits of OFDMA can be fully enjoyed only when the clients support
OFDMA.
283
Chapter 6 Configure and Monitor Controller-Managed Devices
■ Manage Device
In Manage Device, you can upgrade the device’s firmware version manually, move it to another site,
synchronize the configurations with the controller, and forget the router.
Custom Upgrade Click Browse and choose a file from your computer to upgrade the device. When
upgrading, the device will be reboot and readopted by the controller. You can also
check the box of Upgrade all devices of the same model in the site after the firmware
file is uploaded.
Move to Site Select a site which the device will be moved to. After moving to another site, device
configurations on the prior site will be replaced by that on the new site, and its traffic
history will be cleared.
284
Chapter 6 Configure and Monitor Controller-Managed Devices
Force Provision Click Force Provision to synchronize the configurations of the device with the
controller. The device will lose connection temporarily, and be adopted to the
controller again to get the configurations from the controller.
Forget This Device Click Forget and then the device will be removed from the controller. Once forgotten,
all configurations and history related to the device will be wiped out.
Download Device Info If the device has an abnormality, you can download the device information and
provide it to our R&D personnel to analyze the problem.
Note:
Firmware updates are required for earlier devices to obtain complete information.
■ Common Settings
In Common Settings, you can click the path to jump to corresponding modules quickly.
285
Chapter 6 Configure and Monitor Controller-Managed Devices
Statistics
In Statistics, you can monitor the CPU and memory of the device in last 24 hours via charts. To view
statistics of the device in a certain period, click the chart.
286
Chapter 6 Configure and Monitor Controller-Managed Devices
Note:
• The available functions in the window vary due to the model and status of the device.
• In Batch Config, you can only configure the selected devices, and the unaltered configurations will keep the current settings.
6. 3. 1 Configure Switches
In the Properties window, you can view and configure the profiles applied to ports in Ports, and in Config,
you can configure the switch features.
Ports
Port and LAG are two tabs designed for physical ports and LAGs (Link Aggregation Groups), respectively.
Under the Port tag, all ports are listed but you can configure physical ports only, including overriding the
applied profiles, configuring Port Mirroring, and specifying ports as LAGs. Under the LAG tag, all LAGs
are listed and you can view and modify the configurations of existing LAGs.
287
Chapter 6 Configure and Monitor Controller-Managed Devices
■ Port
In Port, you can view and configure all ports’ names and applied profiles.
: The port profile is Disabled. To enable it, click to change the profile.
Action : Click to edit the port name and configure the profile applied to the port.
: (For PoE ports) Click to reboot the connected powered devices (PDs).
288
Chapter 6 Configure and Monitor Controller-Managed Devices
To configure a single port, click in the table. To configure ports in batches, click the checkboxes
and then click Edit Selected. Then you can configure the port name and profile. By default, all
settings are Keep Existing for batch configuration.
Profile Select the profile applied to the port from the drop-down list. Click Manage Profiles to
jump to view and manage profiles. For details, refer to 4. 3 Configure Wired Networks.
Profile Overrides Click the checkbox to override the applied profile. The parameters to be configured
vary in Operation modes,
With Profile Overrides enabled, select an operation mode and configure the following parameters
to override the applied profile, configure a mirroring port, or configure a LAG.
289
Chapter 6 Configure and Monitor Controller-Managed Devices
290
Chapter 6 Configure and Monitor Controller-Managed Devices
291
Chapter 6 Configure and Monitor Controller-Managed Devices
PoE Mode (Only for PoE ports) Select the PoE (Power over Ethernet) mode for the port.
802.1X Control Select 802.1X Control mode for the ports. To configure the 802.1X authentication
globally, go to Settings > Authentication > 802.1X.
Force Authorized: The port remains in the authorized state, sends and receives
normal traffic without 802.1X authentication of the client.
Force Unauthorized: The port remains in the unauthorized state, and the client
connected to the port cannot authenticate with any means. The switch cannot
provide authentication services to the client through the port.
Manual: Specify the speed and duplex from the drop-down list manually.
Port Isolation Click the checkbox to enable Port Isolation. An isolated port cannot communicate
directly with any other isolated ports, while the isolated port can send and receive
traffic to non-isolated ports.
Flow Control With this option enabled, when a device gets overloaded it will send a PAUSE
frame to notify the peer device to stop sending data for a specified period of time,
thus avoiding the packet loss caused by congestion.
EEE Click the checkbox to enable EEE (Energy Efficient Ethernet) to allow power
reduction.
Loopback Control Loopback refers to the routing of data streams back to their source in the
network. You can disable loopback control for the network or choose a method to
prevent loopback happening in your network.
Loopback Detection Port Based: Loopback Detection Port Based helps detect
loops that occur on a specific port. When a loop is detected on a port, the port will
be blocked.
Loopback Detection VLAN Based: Loopback Detection VLAN Based helps detect
loops that occur on a specific VLAN. When a loop is detected on a VLAN, the
VLAN will be blocked.
Spanning Tree: Select STP (Spanning Tree Protocal) to prevent loops in the
network. STP helps block specific ports of the switches to build a loop-free
topology and detect topology changes and automatically generate a new loop-
free topology. To make sure Spanning Tree takes effect on the port, go to the
Config tab and enable Spanning Tree on the switch.
292
Chapter 6 Configure and Monitor Controller-Managed Devices
LLDP-MED Click the checkbox to enable LLDP-MED (Link Layer Discovery Protocol-Media
Endpoint Discovery) for device discovery and auto-configuration of VoIP (Voice
over Internet Protocol) devices.
Bandwidth Control Select the type of Bandwidth Control functions to control the traffic rate and
specify traffic threshold on each port to make good use of network bandwidth.
Rate Limit: Select Rate limit to limit the ingress/egress traffic rate on each port.
With this function, the network bandwidth can be reasonably distributed and
utilized.
Storm Control: Select Storm Control to allow the switch to monitor broadcast
frames, multicast frames and UL-frames (Unknown unicast frames) in the network.
If the transmission rate of the frames exceeds the specified rate, the frames will
be automatically discarded to avoid network broadcast storm.
Ingress Rate Limit With Rate Limit selected, click the checkbox and specify the upper rate limit for
receiving packets on the port.
Egress Rate Limit When Rate Limit selected, click the checkbox and specify the upper rate limit for
sending packets on the port.
Broadcast Threshold With Storm Control selected, click the checkbox and specify the upper rate limit
for receiving broadcast frames. The broadcast traffic exceeding the limit will be
processed according to the Action configurations.
Multicast Threshold With Storm Control selected, click the checkbox and specify the upper rate limit
for receiving multicast frames. The multicast traffic exceeding the limit will be
processed according to the Action configurations.
Unknown Unicast With Storm Control selected, click the checkbox and specify the upper rate
Threshold limit for receiving unknown unicast frames. The traffic exceeding the limit will be
processed according to the Action configurations.
Action When Storm Control selected, select the action that the switch will take when the
traffic exceeds its corresponding limit.
Drop: With Drop selected, the port will drop the subsequent frames when the
traffic exceeds the limit.
Shutdown: With Shutdown selected, the port will be shutdown when the traffic
exceeds the limit.
Recover Time With Shutdown selected as the Action, specify the recover time, and the port will
be opened after the specified time.
DHCP L2 Relay Click the checkbox to enable DHCP L2 Relay for the network.
293
Chapter 6 Configure and Monitor Controller-Managed Devices
Circuit ID (Optional) Enter the customized circuit ID. The circuit ID configurations of the
switch and the DHCP server should be compatible with each other. If it is not
specified, the switch will use the default circuit ID when inserting Option 82 to
DHCP packets.
Remote ID (Optional) Enter the customized remote ID. The remote ID configurations of the
switch and the DHCP server should be compatible with each other. If it is not
specified, the switch will use its own MAC address as the remote ID.
294
Chapter 6 Configure and Monitor Controller-Managed Devices
Note that the mirroring ports and the member ports of LAG cannot be selected as mirrored
ports.
PoE Mode (Only for PoE ports) Select the PoE mode for the port.
Manual: Specify the speed and duplex from the drop-down list manually.
295
Chapter 6 Configure and Monitor Controller-Managed Devices
Bandwidth Control Bandwidth control optimizes network performance by limiting the bandwidth of
specific sources.
Rate Limit: Enable bandwidth control on the port, and you need to specify the
ingress and/or egress rate limit.
Ingress Rate Limit With Rate Limit selected, click the checkbox and specify the upper rate limit for
receiving packets on the port. With this function, the network bandwidth can be
reasonably distributed and utilized.
Egress Rate Limit With Rate Limit selected, click the checkbox and specify the upper rate limit for
sending packets on the port. With this function, the network bandwidth can be
reasonably distributed and utilized.
• Configure a LAG
If you select Aggregating as Operation, you can aggregate multiple physical ports into a logical
interface, which can increase link bandwidth and enhance the connection reliability.
Configuration Guidelines:
• Ensure that both ends of the aggregation link work in the same LAG mode. For example, if the local end
works in LACP mode, the peer end should also be set as LACP mode.
• Ensure that devices on both ends of the aggregation link use the same number of physical ports with
the same speed, duplex, jumbo and flow control mode.
• A port cannot be added to more than one LAG at the same time.
• One static LAG supports up to eight member ports. All the member ports share the bandwidth evenly.
If an active link fails, the other active links share the bandwidth evenly.
• One LACP LAG supports multiple member ports, but at most eight of them can work simultaneously,
and the other member ports are backups. Using LACP protocol, the switches negotiate parameters and
determine the working ports. When a working port fails, the backup port with the highest priority will
replace the faulty port and start to forward data.
• The member port of an LAG follows the configuration of the LAG but not its own. Once removed, the
LAG member will be configured as the default All profile and Switching operation.
• The port enabled with Port Security, Port Mirror, MAC Address Filtering or 802.1X cannot be added to
an LAG, and the member port of an LAG cannot be enabled with these functions.
To configure a new LAG, select other ports to be added to the LAG, specify the LAG ID, and
choose a LAG type. Click Apply. To discard the modifications, click Remove Overrides and all
296
Chapter 6 Configure and Monitor Controller-Managed Devices
profile configurations become the same as the applied profile. For other parameters, configure
them under the LAG tab.
LAG ID Specify the LAG ID of the LAG. Note that the LAG ID should be unique.
The valid value of the LAG ID is determined by the maximum number of LAGs
supported by your switch. For example, if your switch supports up to 14 LAGs,
the valid value ranges from 1 to 14.
Static LAG In Static LAG mode, the member ports are added to the LAG manually.
Active LACP/ LACP extends the flexibility of the LAG configurations. In LACP, the switch
uses LACPDU (Link Aggregation Control Protocol Data Unit) to negotiate the
Passive LACP parameters with the peer end. In this way, the two ends select active ports and
form the aggregation link.
Active LACP: In this mode, the port will take the initiative to send LACPDU.
Passive LACP: In this mode, the port will not send LACPDU before receiving the
LACPDU from the peer end.
297
Chapter 6 Configure and Monitor Controller-Managed Devices
■ LAG
LAGs (Link Aggregation Groups) are logical interfaces aggregated, which can increase link
bandwidth and enhance the connection reliability. You can view and edit the LAGs under the LAG
tab. To configure physical ports as a LAG, refer to Configure a LAG.
: The LAG profile is Disable. To enable it, click to change the profile.
Action : Click to edit the port name and configure the profile applied to the port.
: Click to delete the LAG. Once deleted, the ports will be configured as the default
All profile and Switching operation. You can configure the ports under the Port tab.
298
Chapter 6 Configure and Monitor Controller-Managed Devices
Profile Select the profile applied to the port from the drop-down list. Click Manage Profiles to
jump to view and manage profiles. For details, refer to 4. 3 Configure Wired Networks.
Profile Overrides Click the checkbox to override the applied profile. The parameters to be configured
vary in Operation modes.
299
Chapter 6 Configure and Monitor Controller-Managed Devices
With Profile Overrides enabled, you can reselect the LAG members and configure the following
parameters.
Manual: Specify the speed and duplex from the drop-down list manually.
Port Isolation Click the checkbox to enable Port Isolation. An isolated port cannot
communicate directly with any other isolated ports, while the isolated port can
send and receive traffic to non-isolated ports.
Flow Control With this option enabled, when a device gets overloaded it will send a PAUSE
frame to notify the peer device to stop sending data for a specified period of
time, thus avoiding the packet loss caused by congestion.
EEE Click the checkbox to enable EEE (Energy Efficient Ethernet) to allow power
reduction.
300
Chapter 6 Configure and Monitor Controller-Managed Devices
Loopback Control Loopback refers to the routing of data streams back to their source in the
network. You can disable loopback control for the network or choose a method
to prevent loopback happening in your network.
Loopback Detection Port Based: Loopback Detection Port Based helps detect
loops that occur on a specific port. When a loop is detected on a port, the port
will be blocked.
Spanning Tree: Select STP (Spanning Tree Protocal) to prevent loops in the
network. STP helps block specific ports of the switches to build a loop-free
topology and detect topology changes and automatically generate a new loop-
free topology. To make sure Spanning Tree takes effect on the port, go to the
Config tab and enable Spanning Tree on the switch.
Bandwidth Control Select the type of Bandwidth Control functions to control the traffic rate and
traffic threshold on each port to ensure network performance.
Rate Limit: Select Rate limit to limit the ingress/egress traffic rate on each port.
With this function, the network bandwidth can be reasonably distributed and
utilized.
Storm Control: Select Storm Control to allow the switch to monitor broadcast
frames, multicast frames and UL-frames (Unknown unicast frames) in the
network. If the transmission rate of the frames exceeds the specified rate, the
frames will be automatically discarded to avoid network broadcast storm.
Ingress Rate Limit With Rate Limit selected, click the checkbox and specify the upper rate limit for
receiving packets on the port.
Egress Rate Limit With Rate Limit selected, click the checkbox and specify the upper rate limit for
sending packets on the port.
Broadcast Threshold With Storm Control selected, click the checkbox and specify the upper rate limit
for receiving broadcast frames. The broadcast traffic exceeding the limit will be
processed according to the Action configurations.
Multicast Threshold With Storm Control selected, click the checkbox and specify the upper rate limit
for receiving multicast frames. The multicast traffic exceeding the limit will be
processed according to the Action configurations.
Unknown Unicast With Storm Control selected, click the checkbox and specify the upper rate
Threshold limit for receiving unknown unicast frames. The traffic exceeding the limit will be
processed according to the Action configurations.
DHCP L2 Relay Click the checkbox to enable DHCP L2 Relay for the network.
301
Chapter 6 Configure and Monitor Controller-Managed Devices
Action With Storm Control selected, select the action that the switch will take when the
traffic exceeds its corresponding limit.
Drop: With Drop selected, the port will drop the subsequent frames when the
traffic exceeds the limit.
Shutdown: With Shutdown selected, the port will be shutdown when the traffic
exceeds the limit.
Recover Time With Shutdown selected as the Action, specify the recover time, and the port will
be opened after the specified time.
Config
In Config, click the sections to configure the features applied to the selected switch(es), including the
general settings, services, and networks.
■ General
In General, you can specify the device name and LED settings of the switch, and categorize it via
device tags.
Name (Only for configuring a single device) Specify a name of the device.
302
Chapter 6 Configure and Monitor Controller-Managed Devices
Use Site Settings: The device’s LED will work following the settings of the site. To view and
modify the site settings, refer to 4. 2. 2 Services.
Device Tags Select a tag from the drop-down list or create a new tag to categorize the device.
Generally, the MTU (Maximum Transmission Unit) size of a normal frame is 1518 bytes.
If you want the switch supports to transmit frames of which the MTU size is greater than
1518 bytes, you can configure the MTU size manually here.
Hash Algorithm Select the Hash Algorithm, based on which the switch can choose the port to forward the
received packets. In this way, different data flows are forwarded on different physical links
to implement load balancing.
SRC MAC: The computation is based on the source MAC addresses of the packets.
DST MAC: The computation is based on the destination MAC addresses of the packets.
SRC MAC+DST MAC: The computation is based on the source and destination MAC
addresses of the packets.
SRC IP: The computation is based on the source IP addresses of the packets.
DST IP: The computation is based on the destination IP addresses of the packets.
SRC IP+DST IP: The computation is based on the source and destination IP addresses of
the packets.
303
Chapter 6 Configure and Monitor Controller-Managed Devices
■ VLAN Interface
In VLAN Interface, you can configure Management VLAN and different VLAN interface for the
switch. The general information of the existing VLAN interface are displayed in the table.
304
Chapter 6 Configure and Monitor Controller-Managed Devices
To configure a single VLAN interface, hover the mouse on the entry and click to edit the settings.
305
Chapter 6 Configure and Monitor Controller-Managed Devices
Management VLAN Click the checkbox if you want to use the VLAN interface as Management VLAN. Note
that the controller will fail to manage your devices with wrong Management VLAN
configurations. If you are not sure about your network conditions and the potential impact
of any configurations, we recommend that you keep the default configurations.
The management VLAN is a VLAN created to enhance the network security. Without
Management VLAN, the configuration commands and data packets are transmitted in the
same network. There are risks of unauthorized users accessing the management page
and modifying the configurations. A management VLAN can separate the management
network from the data network and lower the risks.
IP Address Mode Select a mode for the interface to obtain its IP address, and the VLAN will communicate
(when Management with other networks including VLANs with the IP address.
VLAN enabled)
Static: Assign an IP address to the interface manually, specify the IP Address and Subnet
Mask for the interface.
When the VLAN interface is set as the Management VLAN, it is optional for you to specify
the Default Gateway and Primary/Secondary DNS for the interface.
When you want to let device use a fixed IP address, enable Use Fixed IP Address and
specify the Network and IP Address based on needs.
When the VLAN interface is set as the Management VLAN, you can further enable
Fallback IP Address, and specify the Fallback IP Address, Fallback IP Mask, and Fallback
Gateway (optional). If the VLAN interface fails to get an IP address from the DHCP server,
the fallback IP address will be used for the interface.
DHCP Option 12 When DHCP is selected as the IP Address Mode, you can specify the hostname of the
DHCP client in the field. The DHCP client will use option 12 to tell the DHCP server their
hostname.
DHCP Mode Select a mode for the clients in the VLAN to obtain their IP address.
When DHCP Server is selected, you can specify the DHCP Range, and the IP addresses in
the range can be assigned to the clients in the VLAN. Also, it is optional for you to specify
the DHCP Option 138, Primary/Seconday DNS, Default Gateway, and Lease Time. DHCP
Option 138 informs the DHCP client of the controller's IP address when the client sends
a request to the DHCP server, and specify Option 138 as the controller's IP address here.
Lease Time decides how long the client can use the assigned IP address.
DHCP Relay: It allows clients in the VLAN to obtain IP addresses from a DHCP server
ion different subnet. When DHCP Relay is selected, specify the IP address of the DHCP
server in Server Address.
306
Chapter 6 Configure and Monitor Controller-Managed Devices
■ Static Route
In Static Route, you can configure entries of static route for the switch. The general information of
the existing static route entries are displayed in the table. For an existing static route, click to edit
the settings, and click to delete it.
To add a new static route entry, click and configure the parameters.
Destination IP/ When IP Version is IPv4, specify Destination IP/Subnet. When IP Version is IPv6, specify
Subnet / Destination IP/Prefix Length. They identify the network traffic which the Static Route entry
controls.
Destination IP/
Prefix Length You can click + Add Subnet to specify multiple entries or click to delete them.
Next Hop Specify the IP address for your devices to forward the corresponding network traffic.
307
Chapter 6 Configure and Monitor Controller-Managed Devices
Distance Specify the priority of a static route. It is used to decide the priority among routes to
the same destination. Among routes to the same destination, the route with the lowest
distance value will be recorded into the routing table.
■ Services
In Services, you can configure Management VLAN, Loopback Control and SNMP.
308
Chapter 6 Configure and Monitor Controller-Managed Devices
To configure the Management VLAN, please go to Config > VLAN Interface. Note that the
controller will fail to manage your devices with wrong Management VLAN configurations.
If you are not sure about your network conditions and the potential impact of any
configurations, we recommend that you keep the default configurations.
The management VLAN is a VLAN created to enhance the network security. Without
Management VLAN, the configuration commands and data packets are transmitted in the
same network. There are risks of unauthorized users accessing the management page
and modifying the configurations. A management VLAN can separate the management
network from the data network and lower the risks.
Loopback Detection When enabled, the switch checks the network regularly to detect the loopback.
Note that Lopback Detection and Spanning Tree are not available at the same time.
Spanning Tree Select a mode for Spanning tree. This feature is available only when Loopback Detection
is disabled.
STP: Enable STP (Spanning Tree Protocal) to prevent loops in the network. STP helps to
block specific ports of the switches to build a loop-free topology and detect topology
changes and automatically generate a new loop-free topology.
RSTP: Enable RSTP (Rapid Spanning Tree Protocal) to prevent loops in the network. RSTP
provides the same features as STP with faster spanning ree convergence.
Priority: When STP/RSTP enabled, specify the priority for the swith in Spanning Tree. In
STP/RSTP, the switch with the highest priority will be selected as the root of the spanning
tree. The switch with the lower value has the higher priority.
SNMP (Only for configuring a single device) Configure SNMP to write down the location and
contact detail. You can also click Manage to jump to Settings > Services > SNMP, and for
detailed configuration of SNMP service, refer to 4. 10. 4 SNMP.
309
Chapter 6 Configure and Monitor Controller-Managed Devices
address to hold an IP address in reserve for the situation in which the device fails to get a dynamic
IP address. Enable Fallback IP and then set the IP address, IP mask and gateway.
310
Chapter 6 Configure and Monitor Controller-Managed Devices
If you select Static as the mode, set the IP address, IP mask, gateway, and DNS server for the static
address.
311
Chapter 6 Configure and Monitor Controller-Managed Devices
■ Manage Device
In Manage Device, you can upgrade the device’s firmware version manually, move it to another site,
synchronize the configurations with the controller and forget the switch.
Custom Upgrade Click Browse and choose a file from your computer to upgrade the device. When
upgrading, the device will be reboot and readopted by the controller. You can also
check the box of Upgrade all devices of the same model in the site after the firmware
file is uploaded.
Copy Configuration Select another device at the current site to copy its configurations.
Move to Site Select a site which the device will be moved to. After moving to another site, device
configurations on the prior site will be replaced by that on the new site, and its traffic
history will be cleared.
312
Chapter 6 Configure and Monitor Controller-Managed Devices
Force Provision (Only for configuring a single device) Click Force Provision to synchronize the
configurations of the device with the controller. The device will lose connection
temporarily, and be adopted to the controller again to get the configurations from the
controller.
Forget This Device Click Forget and then the device will be removed from the controller. Once forgotten,
all configurations and history related to the device will be wiped out.
Download Device Info If the device has an abnormality, you can download the device information and
provide it to our R&D personnel to analyze the problem.
Note:
Firmware updates are required for earlier devices to obtain complete information.
6. 3. 2 Monitor Switches
One panel and four tabs are provided to monitor the device in the Properties window: Monitor Panel,
Details, Clients, and Statistics.
Monitor Panel
The monitor panel displays the switch’s ports and uses colors and icons to indicate the connection
status and port type. When the switch is pending or disconnected, all ports are disabled.
STP Blocking A port in the Blocking status in Spanning Tree. It receives and sends BPDU (Bridge
Protocal Data Unit) packets to maintain the spanning tree. Other packets are dropped.
313
Chapter 6 Configure and Monitor Controller-Managed Devices
You can hover the cursor over the port icon (except disabled ports) for more details. The displayed
information varies due to connection status and port type.
Profile Displays the name of profile applied to the port, which defines how the packets in both
ingress and egress directions are handled. For detailed configuration, refer to 4. 8 Create
Profiles.
PoE Power Displays the PoE power supply for the PD device.
LAG ID Displays the name of ports that are aggregated into a logical interface.
Details
In Details, you can view the basic information, traffic information, and radio information of the device to
know the device’s running status.
314
Chapter 6 Configure and Monitor Controller-Managed Devices
■ Overview
In Overview, you can view the basic information of the device. The listed information will be varied
due to the device’s model and status.
■ Uplink (Only for the switch connected to a controller-managed router/switch in Connected status)
Click Uplink to view the uplink information, including the uplink port, the uplink device, the negotiation
speed, and transmission rate.
315
Chapter 6 Configure and Monitor Controller-Managed Devices
■ Downlink (Only for the switch connected to controller-managed devices in Connected status)
Click Downlink to view the downlink information, including the downlink ports, devices name and
model as well as negotiation speed.
Clients
In Clients, you can view the information of clients connected to the switch, including the client name, IP
address and the connected port. You can click the client name to open its Properties window.
316
Chapter 6 Configure and Monitor Controller-Managed Devices
Statistics
In Statistics, you can monitor the CPU and memory of the device in last 24 hours via charts. To view
statistics of the device in certain period, click the chart to jump to 8. 2 View the Statistics of the Network.
317
Chapter 6 Configure and Monitor Controller-Managed Devices
Note:
• The available functions in the window vary due to the model and status of the device.
• In Batch Config, you can only configure the selected devices, and the unaltered configurations will keep the current settings.
• In Batch Config, if some functions, such as the 5 GHz band, are available only on some selected APs, the corresponding
configurations will not take effect. To configure them successfully, check the model of selected devices first.
6. 4. 1 Configure APs
In the Properties window, click Config and then click the sections to configure the features applied to
the selected AP(s).
318
Chapter 6 Configure and Monitor Controller-Managed Devices
■ General
In General, you can specify the device name and LED settings of the AP, and categorize it via device
tags.
Name (Only for configuring a single device) Specify a name of the device.
Use Site Settings: The device’s LED will work following the settings of the site. To view and
modify the site settings, refer to 4. 2. 2 Services.
Wi-Fi Control (Only for Certain wall plate APs) Enable Wi-Fi Control, and it will take effect only when the
LED feature is enabled. After enabling Wi-Fi Control, you can press the LED button on the
AP to turn on/off the Wi-Fi and LED at the same time.
Device Tags Select a tag from the drop-down list or create a new tag to categorize the device.
319
Chapter 6 Configure and Monitor Controller-Managed Devices
the situation in which the device fails to get a dynamic IP address. Enable Fallback IP and then set
the IP address, IP mask and gateway.
320
Chapter 6 Configure and Monitor Controller-Managed Devices
If you select Static as the mode, set the IP address, IP mask, gateway, and DNS server for the static
address.
321
Chapter 6 Configure and Monitor Controller-Managed Devices
■ Radios
In Radios, you can control how and what type of radio signals the AP emits. Select each frequency
band and configure the parameters. Different models support different bands.
Note:
The 6 GHz band is only available for certain devices.
Status If you disable the frequency band, the radio on it will turn off.
Channel Width Specify the channel width of the band. Different bands have different available options. We
recommend using the default value.
Channel Specify the operation channel of the AP to improve wireless performance. If you select
Auto for the channel setting, the AP scans available channels and selects the channel
where the least amount of traffic is detected.
Tx Power Specify the Tx Power (Transmit Power) in the 4 options: Low, Medium, High and Custom.
The actual power of Low, Medium and High are based on the minimum transmit power
(Min. Txpower) and maximum transmit power (Max. TxPower), which may vary in different
countries and regions.
Low: Min. TxPower + (Max. TxPower-Min. TxPower) * 20% (round off the value)
Medium: Min. TxPower + (Max. TxPower-Min. TxPower) * 60% (round off the value)
322
Chapter 6 Configure and Monitor Controller-Managed Devices
■ WLANs
In WLANs, you can apply the WLAN group to the AP and specify a different SSID name and password
to override the SSID in the WLAN group. After that, clients can only see the new SSID and use
the new password to access the network. To create or edit WLAN groups, refer to 4. 4 Configure
Wireless Networks.
Note:
The 6 GHz band is only available for certain devices.
323
Chapter 6 Configure and Monitor Controller-Managed Devices
(Only for configuring a single device) To override the SSID, select a WLAN group, click in the entry
and then the following page appears.
SSID Override Enable or disable SSID Override on the AP. If SSID Override enabled, specify the new SSID
and password to override the current one.
VLAN Enable or disable VLAN. If VLAN enabled, enter a VLAN ID to add the new SSID to the
VLAN.
324
Chapter 6 Configure and Monitor Controller-Managed Devices
■ Services
In Services, you can enable Management VLAN to protect your network and configure SNMP and
web server parameters.
Management VLAN To configure Management VLAN, create a network in LAN first, and then select it as the
management VLAN on this page. For details, refer to 4. 3 Configure Wired Networks.
The management VLAN is a VLAN created to enhance the network security. Without
Management VLAN, the configuration commands and data packets are transmitted in the
same network. There are risks of unauthorized users accessing the management page
and modifying the configurations. A management VLAN can separate the management
network from the data network and lower the risks.
SNMP (Only for configuring a single device) Configure SNMP to write down the location and
contact detail. You can also click Manage to jump to Settings > Services > SNMP, and for
detailed configuration of SNMP service, refer to 4. 10. 4 SNMP.
325
Chapter 6 Configure and Monitor Controller-Managed Devices
Layer-3 Accessibility With this feature enabled, devices from a different subnet can access controller-managed
devices.
LLDP LLDP (Link Layer Discovery Protocol) can help discover devices.
■ Smart Antenna
In Smart Antenna, you can turn on the function to improve Wi-Fi performance for user-heavy
scenarios through antenna array and intelligent algorithm. This help overcome obstacles and signal
interference.
■ Advanced
In Advanced, configure Load Balance and QoS to make better use of network resources. Load
Balance can control the client number associated to the AP, while QoS can optimize the performance
when handling differentiated wireless traffics, including traditional IP data, VoIP (Voice-over Internet
Protocol), and other types of audio, video, streaming media.
326
Chapter 6 Configure and Monitor Controller-Managed Devices
Select each frequency band and configure the following parameters and features.
327
Chapter 6 Configure and Monitor Controller-Managed Devices
Max Associated Clients Enable this function and specify the maximum number of connected clients. If the
connected client reaches the maximum number, the AP will disconnect those with
weaker signals to make room for other clients requesting connections.
RSSI Threshold Enable this function and enter the threshold of RSSI (Received Signal Strength
Indication). If the client’s signal strength is weaker than the threshold, the client will
lose connection with the AP.
ETH VLAN/ETH2 VLAN/ (Only for Wall Plate AP) Enable this function and add the corresponding AP’s LAN
ETH3 VLAN port to the VLAN specified here. Then the hosts connected to this AP can only
communicate with the devices in this VLAN.
ETH3 PoE Out (Only for Wall Plate AP with the PoE out port) Enable this function to supply power
to the connected device on this port.
Wi-Fi Multimedia (WMM) With WMM enabled, the AP maintains the priority of audio and video packets for
better media performance.
No Acknowledgment Enable this function to specify that the APs will not acknowledge frames with QoS
No Ack. Enabling No Acknowledgment can bring more efficient throughput, but it
may increase error rates in a noisy Radio Frequency (RF) environment.
Unscheduled Automatic When enabled, this function can greatly improve the energy-saving capacity of
Power Save Delivery clients.
Non-PSC Channels (Only for AP supporting 6GHz band) When enabled, the AP can use both non-
PSC channels and PSC channels. Note that some clients may not discover 6GHz
networks using non-PSC channels.
OFDMA (Only for AP supporting 802.11 ax) Enable this feature to enable multiple users to
transmit data simultaneously, and it will greatly improves speed and efficiency.
Note that the benefits of OFDMA can be fully enjoyed only when the clients
support OFDMA.
328
Chapter 6 Configure and Monitor Controller-Managed Devices
■ Manage Device
In Manage Device, you can upgrade the device’s firmware version manually, move it to another site,
synchronize the configurations with the controller and forget the AP.
Custom Upgrade Click Browse and choose a file from your computer to upgrade the device. When
upgrading, the device will be reboot and readopted by the controller. You can also
check the box of Upgrade all devices of the same model in the site after the firmware
file is uploaded.
Copy Configuration Select another device at the current site to copy its configurations.
Move to Site Select a site which the device will be moved to. After moving to another site, device
configurations on the prior site will be replaced by that on the new site, and its traffic
history will be cleared.
329
Chapter 6 Configure and Monitor Controller-Managed Devices
Force Provision (Only for configuring a single device) Click Force Provision to synchronize the
configurations of the device with the controller. The device will lose connection
temporarily, and be adopted to the controller again to get the configurations from the
controller.
Forget this AP Click Forget and then the device will be removed from the controller. Once forgotten,
all configurations and history related to the device will be wiped out.
Download Device Info If the device has an abnormality, you can download the device information and
provide it to our R&D personnel to analyze the problem.
Note:
Firmware updates are required for earlier devices to obtain complete information.
6. 4. 2 Monitor APs
One panel and four tabs are provided to monitor the device in the Properties window: Monitor Panel,
Details, Clients, Mesh, and Statistics.
Monitor Panel
The monitor panel illustrates the active channel information on each radio band, including the AP’s
operation channel, radio mode and channel utilization. Four colors are used to indicate the percentage
of Rx Frames (blue), Tx Frames (green), Interference (orange), and Free bandwidth (gray).
330
Chapter 6 Configure and Monitor Controller-Managed Devices
You can hover the cursor over the channel bar for more details.
Busy: Displays the sum of Tx, Rx, and also non-WiFi interference, which indicates how busy
the channel is.
Tx Error/Dropped Displays the percentage of transmit packets that have errors and the percentage of
packets that were dropped.
Rx Error/Dropped Displays the percentage of receive packets that have errors and the percentage of
packets that were dropped.
Details
In Details, you can view the basic information, traffic information, and radio information of the device to
know the device’s running status.
331
Chapter 6 Configure and Monitor Controller-Managed Devices
■ Overview
In Overview, you can view the basic information of the device. The listed information varies due to
the device’s status.
332
Chapter 6 Configure and Monitor Controller-Managed Devices
333
Chapter 6 Configure and Monitor Controller-Managed Devices
Clients
In Clients, you can view the information of users and guests connecting to the AP, including client
name, MAC address and the connected SSID. Users are clients connected to the AP’s SSID with Guest
334
Chapter 6 Configure and Monitor Controller-Managed Devices
Network disabled, while Guests are clients connected to that with Guest Network enabled. You can
click the client name to open its Properties window.
Click History to view the client history. In the History page, you can specify the date or time
period to view the clients connected during specific time, and click Export to download the list
of clients.
Mesh is used to establish a wireless network or expand a wired network through wireless connection
on 5 GHz radio band. In practical application, it can help users to conveniently deploy APs without
requiring Ethernet cable. After mesh network establishes, the APs can be configured and managed in
the controller in the same way as wired APs. Meanwhile, because of the ability to self-organize and self-
configure, mesh also can efficiently reduce the configuration.
335
Chapter 6 Configure and Monitor Controller-Managed Devices
Note that only certain AP models support Mesh, and the APs should be in the same site to establish a
Mesh network.
To understand how mesh can be used, the following terms used in the Controller will be introduced:
Root AP The AP is managed by the Controller with a wired data connection that can be configured
to relay data to and from mesh APs (downlink AP).
Isolated AP When the AP which has been managed by the Controller before connects to the network
wirelessly and cannot reach the gateway, it goes into the Isolated state.
Mesh AP An isolated AP will become a mesh AP after establishing a wireless connection to the AP
with network access.
Uplink AP/Downlink AP Among mesh APs, the AP that offers the wireless connection for other APs is called uplink
AP. A Root AP or an intermediate AP can be the uplink AP. And the AP that connects to
the uplink AP is called downlink AP. An uplink AP can offer direct wireless connection for 4
downlink APs at most.
Wireless Uplink The action that a downlink AP connects to the uplink AP.
Hops In a deployment that uses a root AP and more than one level of wireless uplink with
intermediate APs, the uplink tiers can be referred to by root, first hop, second hop and so
on. The hops should be no more than 3.
A common mesh network is shown as below. Only the root AP is connected by an Ethernet cable, while
other APs have no wired data connection. Mesh allows the isolated APs to communicate with pre-
configured root AP on the network. Once powered up, factory default or unadopted APs can detect the
AP in range and make itself available for adoption in the controller.
Internet Internet
Wireless Uplink
Router (DHCP Server)
Wired Connection
After all the APs are adopted, a mesh network is established. The APs connected to the network
via wireless connection also can broadcast SSIDs and relay network traffic to and from the network
through the uplink AP.
To build a mesh network, follow the steps below:
336
Chapter 6 Configure and Monitor Controller-Managed Devices
2. Go to Devices to make sure that the Root AP has been adopted by the controller. The status of the
Root AP is Connected.
3. Install the AP that will uplink the Root AP wirelessly. Make sure the intended location is within the
range of Root AP. The APs that is waiting for Wireless Uplink includes two cases: factory default
APs and APs that has been managed by the controller before. Go to Devices to adopt an AP in
Pending (Wireless) status or link an isolated AP.
337
Chapter 6 Configure and Monitor Controller-Managed Devices
1) For the factory default AP, after powering on the device, the AP will be in Pending (Wireless)
status with the icon in the controller. Click to adopt the AP in Pending (Wireless)
status in the Devices list.
After adoption begins, the status of Pending (Wireless) AP will become Adopting (Wireless) and
then Connected (Wireless). It should take roughly 2 minutes to show up Connected (Wireless)
with the icon within your controller.
2) For the AP that has been managed by the Controller before and cannot reach the gateway,
it goes into Isolated status when it is discovered by controller again. Click to connect the
Uplink AP in the Devices list.
The following page will be shown as below, click Link to connect the Uplink AP.
Once mesh network has been established, the AP can be managed by the controller in the same way
as a wired AP. You can click the AP’s name in the Devices list, and click Mesh to view and configure the
mesh parameters of the AP in the Properties window.
338
Chapter 6 Configure and Monitor Controller-Managed Devices
In Mesh, if the selected AP is an uplink AP, this page lists all downlink APs connected to the AP.
If the selected AP is a downlink AP, this page lists all available uplink APs and their channel, signal
strength, hop, and the number of downlink APs. You can click Rescan to search the available uplink APs
and refresh the list, and click Link to connect the uplink AP and build up a mesh network.
The icon appears before the priority uplink AP of the downlink AP. If you want to set
another AP as the priority AP, click Link in Action column.
The icon appears before the current uplink AP of the downlink AP.
Tips:
• You can manually select the priority uplink AP that you want to connect in the uplink AP list. To build a mesh
network with better performance, we recommend that you select the uplink AP with the strongest signal, least
hop and least downlink AP.
• Auto Failover is enabled by default, and it allows the controller automatically select an uplink AP for the isolated
AP to establish Wireless Uplink. And the controller will automatically select a new uplink AP for the mesh APs
when the original uplink fails. For more details about Mesh global configurations, refer to the Mesh feature in 4.
2. 2 Services.
339
Chapter 6 Configure and Monitor Controller-Managed Devices
Tools
In Tools, you can enable RF Scanning to scan the RF (Radio Frequency) environments around the AP,
which is useful for spectral analysis in channel selection and planning.
Note:
• The RF scanning may take several minutes. During the scanning, all clients using this AP will be disconnected, and
the AP will be offline. You should select a spare time of network to start scanning.
Select each frequency band to view and analyze the scan results.
Each colored bar graph displays the information about channel utilization and interference on a channel.
The filling area of the bar represents the channel utilization. And the larger filling area means the higher
utilization, which indicates the channel is busier in transmitting data. The color shade represents the
level of interference. And the legend is displayed at the top.
340
Chapter 6 Configure and Monitor Controller-Managed Devices
You can hover the cursor over a channel option for more details.
341
Chapter 6 Configure and Monitor Controller-Managed Devices
Interference Type Displays the type of interface, including MWO (Microwave Oven), CW (Continuous Wave),
WLAN (Wi-Fi signals) and FHSS (Frequency Hopping Spread Spectrum).
Statistics
In Statistics, you can monitor the utilization of the device in last 24 hours via charts, including CPU/
Memory Monitor, Channel Utilization, Dropped Packets, and Retried Packets. To view statistics of the
device in certain period, click the chart to jump to 8. 2 View the Statistics of the Network.
342
7
Monitor and Manage the Clients
This chapter guides you on how to monitor and manage the clients through the Clients page using the
clients table and the properties window and the Hotspot Manager system. To view clients that have
connected to the network in the past, refer to View the Statistics During the Specified Period with
Insight. This chapter includes the following sections:
The client has not passed the portal authentication and it is not connected to the internet.
The client does not need to be authorized and it is connected to the internet.
When this icon appears in the Wireless Connection column, it indicates the client is in the power-
saving mode.
344
Chapter 7 Monitor and Manage the Clients
Filter clients using the search box based on username, IP address, MAC address or
channel.
(For wireless clients) Filter wireless clients based on the frequency band they are
using.
(For wireless clients) Filter wireless clients based on the type of connected wireless
network. Guests are clients connected to the guest network, which you can set during
the Quick Setup, creating wireless networks, etc.
■ Quick Operations
For quick operations on a single client, click the icons in the Action column. The available icons vary
according to the client status and connection type.
Click to block the client in the chosen site. You can view blocked clients in 8. 5. 1
Known Clients.
(With portal authentication enabled) Click to manually authorize the client that has not
passed the portal authentication.
(With portal authentication enabled) Click to unauthorize the client that has passed the
portal authentication.
(For wireless clients) Click to reconnect the wireless client to the wireless network.
345
Chapter 7 Monitor and Manage the Clients
Click to select multiple clients and add them to the Properties window for batch monitoring
and management.
Click to minimize the Properties window to an icon. To reopen the minimized Properties
window, click .
Click to maximize the Properties window. You can also use the icon on pages other than the
Clients page.
Click to close the Properties window of the chosen client(s). Note that the unsaved
configuration for the client(s) will be lost.
The number on the lower-right shows the number of clients in the batch client configuration.
346
Chapter 7 Monitor and Manage the Clients
Under the History tab, you can view the connection history of the client.
347
Chapter 7 Monitor and Manage the Clients
Name Specify the client’s name to better identify different clients, and the name is used as
the client’s username in the table on the Clients page.
Rate Limit Select an existing rate limit profile, create a new rate limit profile or customize the
rate limit for the client.
Note: Rate Limit on this page is only available for the clients connected to the APs.
To limit the rate of the clients connected to the gateway or switch, go to Bandwidth
Control page.
Download/Upload Limit Click the checkbox and specify the rate limit for download/upload for wireless clients
using the voucher code(s). The value of the download and upload rate can be set in
Kbps or Mbps.
348
Chapter 7 Monitor and Manage the Clients
Use Fixed IP Address Click the checkbox to configure a fixed IP address for the client. With this function
enabled, select a network and specify an IP address for the client. To view and
configure networks, refer to 4. 3 Configure Wired Networks.
Note: A gateway is required for this function. Otherwise, you cannot set a fixed IP
address for the client.
Lock To AP Enable the function, and select one or multiple APs, then the client will be locked to
the selected APs. This feature helps prevent a static client from roaming frequently
between multiple APs.
To manage multiple clients at the same time, click , select multiple clients, and click Edit Selected.
Then you can configure the following parameters under the Config tab.
Rate Limit Select an existing rate limit profile, create a new rate limit profile or customize the rate
limit for the clients.
Keeping Existing: The rate limit of the chosen clients will remain their current settings.
Note: Rate Limit on this page is only available for the clients connected to the APs. To limit
the rate of the clients connected to the gateway or switch, go to Bandwidth Control page.
Download/Upload Limit Click the checkbox and specify the rate limit for download/upload for wireless clients
using the voucher code(s). The value of the download and upload rate can be set in Kbps
or Mbps.
349
Chapter 7 Monitor and Manage the Clients
IP Setting Keeping Existing: The IP setting of the chosen clients remains their current settings.
Use DHCP: The IP addresses of the clients is automatically assigned by the DHCP server,
such as the Layer 3 switch and the gateway.
Use Fixed IP Address: Select a network and assign fixed IP addresses to the chosen
clients manually. To view and configure networks, refer to 4. 3 Configure Wired Networks.
Note that a gateway is required for this function. Otherwise, you cannot set fixed IP
addresses for the chosen clients.
Lock To AP Lock to AP helps prevent static clients from roaming frequently between multiple APs.
Enable: Enable Lock to AP, and select one or multiple APs, then the chosen clients will be
locked to the selected APs.
You can view their names and IP addresses in the Clients tab and remove client(s) from Batch Client
Configuration by clicking in the Action column.
350
Chapter 7 Monitor and Manage the Clients
Authorized Clients View the records of the connected and expired portal clients.
Vouchers Create vouchers for Portal authentication, and view and manage the related information.
Local Users Create local user accounts for Portal authentication, view their information, and manage
them.
Form Auth Data Customize your survey contents and publish it to collect data.
Operators Create operator accounts for Hotspot management, view their information, and manage
them.
To access the system, click Hotspot Manager from the drop-down list of Organization. To log out of the
system, click the account icon at the upper-right corner, then click Log Out.
7. 2. 1 Dashboard
In the dashboard, you can monitor portal authorizations at a glance through different visualizations.
To open the dashboard, click Hotspot Manager from the drop-down list of Organization and click
Dashboard in the pop-up page. Specify the time period to view portal authorization histories.
351
Chapter 7 Monitor and Manage the Clients
7. 2. 2 Authorized Clients
The Authorized Clients tab is used to view and manage the clients authorized by portal system, including
the expired clients and the clients within the valid period.
To open the list of Authorized Clients, click Hotspot Manager from the drop-down list of Organization
and click Authorized Clients in the pop-up page. You can search certain clients using the search box,
view their detailed information in the table, and manage them using the action column.
Click to extend the valid period of the authorized client. You can choose the preset time
length or set a customized period based on needs.
Click to disconnect the authorized client(s). If you disconnect an authorized client, the client
needs to be re-authenticated for the next connection.
7. 2. 3 Vouchers
The Vouchers tab is used to create vouchers and manage unused voucher codes. With voucher
configured and codes created, you can distribute the voucher codes generated by the controller to
clients for them to access the network via portal authentication. For detailed configurations, refer to 4.
9. 1 Portal.
Create vouchers
352
Chapter 7 Monitor and Manage the Clients
2. Click +Create Vouchers on the lower-left, and the following window pops up. Configure the following
parameters and click Save.
Portal Select the portal for which the vouchers will take effect.
Type Select a type to limit the usage counts or the number of authorized users of a
voucher code.
Limited Usage Counts: The voucher code can only be used for a limited number of
times within its valid period.
Limited Online Users: The voucher code can be used for an unlimited number of
times within its valid period, but only a limited number of wireless clients can access
the network with this voucher code at the same time.
Duration Type Specify whether to limit the voucher duration or client duration.
353
Chapter 7 Monitor and Manage the Clients
Rate Limit Select an existing rate limit profile, create a new rate limit profile or customize the
rate limit for the voucher codes.
Download/Upload Limit Click the checkbox and specify the rate limit for download/upload for wireless clients
using the voucher code(s). The value of the download and upload rate can be set in
Kbps or Mbps.
Note: Download/Upload Limit on this page are only available for wireless clients
connected to the SSIDs with Portal authentication enabled. To limit the rate of wired
clients connected to the switch and gateway, go to the Settings >Transmission >
Bandwidth Control.
Traffic Limit Click the checkbox and specify the daily/weekly/monthly/total traffic limit for the
voucher, and the value of the traffic limit can be set in MB or GB. Once the limited is
reached, the client(s) can no longer access the network using the voucher.
Note: Traffic Limit on this page are only available for wireless clients connected to the
SSIDs with Portal authentication enabled. To limit the rate of wired clients connected
to the switch and gateway, go to the Settings > Transmission > Bandwidth Control.
Description (optional) Enter notes for the created voucher code(s), and the input description is displayed in
the voucher list under the voucher tab.
The voucher code can be used for an unlimited number of times within its valid period,
but only a limited number of wireless clients can access the internet with this voucher
code at the same time. The number on the right shows the limited number of users.
The voucher code can only be used for a limited number of times within its valid period.
The number on the right shows the limited number of authentication times.
354
Chapter 7 Monitor and Manage the Clients
4. Print the vouchers. Click to print a single voucher, or click checkboxes of vouchers and click
Print Selected Vouchers to print the selected vouchers. And you can click Print All Unused
Vouchers to print all unused vouchers.
5. Distribute the vouchers to clients, and then they can use the codes to pass authentication. If a
voucher code expires, it will be automatically removed from the list.
6. To delete certain vouchers manually, click to delete a single voucher, or Delete to delete
multiple voucher codes at a time.
7. 2. 4 Local Users
The Local Users tab is used to create user accounts for authentication. With the Local User configured,
clients are required to enter the username and password to pass the authentication. You can create
multiple accounts and assign them to different users. For detailed configurations, refer to 4. 9. 1 Portal.
There are two ways to create local user accounts: create accounts on the page and import from a file.
To create local user accounts, follow the steps below.
355
Chapter 7 Monitor and Manage the Clients
1. Click Hotspot Manager from the drop-down list of Organization and click Local Users in the pop-up
page.
2. Create Local User accounts through two different ways.
Portal Select the portal for which the local users will take effect.
Username Specify the username. The username should be different from the existing ones, and
it is not editable once it is created.
Password Specify the password. Local users are required to enter the username and password
to pass authentication and access the network.
356
Chapter 7 Monitor and Manage the Clients
Status When the status is enabled, it means the user account is valid. You can disabled the
user account, and enable it later when needed.
Authentication Timeout Specify the authentication timeout for local users. After timeout, the users need to
log in again on the authentication page to access the network.
MAC Address Binding There are three types of MAC binding: No Binding, Static Binding and Dynamic
Type Binding.
Static Binding: Bind a MAC address to this user account manually. Then only the
user with the this MAC address can use the username and password to pass the
authentication.
Dynamic Binding: The MAC address of the first user that passes the authentication
will be bound to this account. Then only this user can use the username and
password to pass the authentication.
Maximum Users Specify the maximum number of users that can use this account to pass the
authentication.
Rate Limit Select an existing rate limit profile, create a new rate limit profile or customize the
rate limit for the local users.
Download/Upload Limit Click the checkbox and specify the rate limit for download/upload for users of the
local user account. The value of the download/upload rate can be set in Kbps or
Mbps.
Note: Download/Upload Limit on this page are only available for wireless clients
connected to the SSIDs with Portal authentication enabled. To limit the rate of wired
clients connected to the switch and gateway, go to the Settings >Transmission >
Bandwidth Control.
Traffic Limit Click the checkbox and specify the daily/weekly/monthly/total traffic limit for the
local user account, and the value of the traffic limit can be set in MB or GB. Once the
limited is reached, the user(s) can no longer access the network using this account.
Note: Traffic Limit on this page are only available for wireless clients connected
to the SSIDs with Portal authentication enabled. To limit the rate of wired clients
connected to the switch and gateway, go to the Settings > Transmission > Bandwidth
Control.
357
Chapter 7 Monitor and Manage the Clients
Portal Select the portal to which the local users will be imported.
3. The local user account(s) will be created and displayed in the module. You can view the information of
the created local users, search certain accounts through the name, and use icons for management.
Click to add local user(s) from files in the format of CVS or Excel. It is recommended
when you need to create local users in batches. Select the portals based on needs,
and the local users will be imported to the chosen portal.
Note that the imported file will override the current user data.
Click to export the local user(s) to files in the format of CVS or Excel. Select the portals
based on needs, and the local users of the chosen portal will be exported.
358
Chapter 7 Monitor and Manage the Clients
Create Surveys
3. Specify the survey name and duration, then customize the contents.
4. Preview and save the settings or publish the survey.
5. The surveys are created and displayed in the table. You can use icons for management and click
for more management options.
7. 2. 6 Operators
The Operators tab is used to manage and create operator accounts that can only be used to remotely
log in to the Hotspot Manager system and manage vouchers and local users for specified sites. The
operators have no privileges to create operator accounts, which offers convenience and ensures
security for client authentication.
Create Operators
359
Chapter 7 Monitor and Manage the Clients
1. Click Hotspot Manager from the drop-down list of Organization and click Operators in the pop-up
page.
2. Click Create Operator on the lower-left, and the following window pops up.
3. Specify the username, password, and role for the operator account. Admin role has read and write
permissions, while Viewer role has read-only permissions.
4. (Optional) Enter a description for identification.
5. Select sites from the drop-down list of Site Privileges. Click Save.
6. The operator accounts are created and displayed in the table. You can view the information of the
create operator accounts on the page, search certain accounts through the name and notes, and
use icons for management.
7. Then you can use an operator account to log in to the Hotspot Manager system:
361
8
Monitor the Network
This chapter guides you on how to monitor the network devices, clients, and their statistics. Through
visual and real-time presentations, the SDN Controller keeps you informed about the accurate status
of the managed network. This chapter includes the following sections:
Topology Overview
Topology Overview on the top shows the status of ISP Load and numbers of devices, clients and guests.
ISP Load has four statuses: Unknown, Good, Medium, Poor.
363
Chapter 8 Monitor the Network
You can hover the cursor over the gateway, switch, AP, client or guest icons to check their status. For
detailed information, click the icon here to jump to the Devices or Clients section.
Tab Bar
You can customize the widgets displayed on the tab for Dashboard page. Three tabs are created by
default and cannot be deleted.
Network Displays Alerts, Wi-Fi Traffic Distribution, Wi-Fi Summary and Traffic Activities by default.
Clients Displays Most Active Clients, Clients Freq Distribution, and Client Activities by default.
In the tab bar, you can take the following action to edit the tabs and customize the widget to be displayed.
Click the icon to edit the tabs. For the default tabs, you can reset them to the default
settings. For a created tab, you can edit its name or delete it.
Click the icon and enter the name in the pop-up window to create a new tab.
To quickly display the statistics of today, yesterday, last 24 hours, or last several
days, click the default date/period at the right side in the calendar.
To display the statistics of a specific date, click the date twice in the calendar.
To display the statistics of a specific time range, click the start date and end date in
the calendar.
Click a tab and then click the widget in the pop-up page to add it to this tab or
remove it.
364
Chapter 8 Monitor the Network
8. 1. 2 Explanation of Widgets
The widgets are divided into three categories: System, Network and Client. You can click the icon
to add or remove the widgets.
Network Alerts, ISP Load, VPNs, Most Active EAPs, Most Active Switches,Wi-Fi Traffic Distribution,
Wi-Fi Summary, Switching Summary, Traffic Distribution, Client Distribution, Traffic
Activities, Retried Rate/Dropped Rate, Top Devices Usage, PoE Utilization, Top
Interference
Client Most Active Clients, Longest Client Uptime, Clients Freq Distribution, Client Activities,
Clients Association Activities, Association Failures, Clients SSID Distribution, Clients with
on Boarding Times, Clients with RSSI
System
The Controller Overview widget in System displays the general information about the controller,
including sites, devices, Admin accounts, Cloud Access, and alerts. You can click See Admin to view
and manage Admin accounts, or click Manage Cloud Access to configure cloud access. For details,
refer to 9 Manage Accounts of the SDN Controller.
Network
Widgets in Network use lists and charts to illustrate the traffic status of wired and wireless networks
in the site, including traffic statistics, the most active devices, VPN connection, distribution, PoE
utilization, and interference.
■ Alerts
The Alerts widget displays the total number of unarchived alerts happened in the site and details
of the latest five. To view all the alerts and archive them, click See All to jump to Log > Alerts. To
365
Chapter 8 Monitor the Network
specify events appeared in Alerts, go to Log > Notifications and configure the events as the Alert
level. For details, refer to 8. 6 View and Manage Logs.
■ ISP Load
ISP Load use a line chart to display the throughput and latency of gateway’s WAN port within the
time range. Click the tab on the right to view the statistics of each WAN port and move the cursor
on the line chart to view specific values of throughput and latency. For detailed statistics of certain
gateway’s WAN port within a time range, refer to 8. 2 View the Statistics of the Network.
To test the current download and unload speed and the latency of WAN port, click Test Speed on
the widget to display the speed test result.
366
Chapter 8 Monitor the Network
■ VPNs
VPNs displays the information of VPN servers and VPN clients. Click the corresponding tab to
display the statistics.
Tunnels Displays the number of VPN tunnels for the VPN server.
Average Tx Data Displays the average transmitted traffic of the VPN serve/client.
Average Rx Data Displays the average received traffic of the VPN serve/client.
Statistics Displays the upstream and downstream traffic of the VPN server/client.
Data Flow Displays the data flow of the IPSec VPN tunnel.
367
Chapter 8 Monitor the Network
configurations and monitoring. For details, refer to 6 Configure and Monitor Controller-Managed
Devices.
■ Wi-Fi Summary
The Wi-Fi Summary widget summarizes the real-time status of wireless networks in the site,
including the number of connected EAPs and clients, the channel utilization, and the total number
of traffic within the time range.
368
Chapter 8 Monitor the Network
■ Switching Summary
The Switching Summary widget summarizes the real-time status of switches in the site, including
the number of connected switches and clients, the port utilization, and the total amount of traffic
within the time range.
■ Traffic Distribution
The Traffic Distribution widget uses a pie chart to display the traffic distribution on EAPs and
switches in the site within the time range. Click the tab to display the statistic of EAPs or switches,
and click the slice to view the total number of traffic, its proportion, and the device name.
■ Client Distribution
The Client Distribution widget uses a sunburst chart to display the real-time distribution of
connected clients in the site. The chart has up to three levels. The inner circle is divided by the
369
Chapter 8 Monitor the Network
device category the clients connected to, the middle is by the device name, and the outer is by the
frequency band. You can hover the cursor over the slice to view specific values.
■ Traffic Activities
The Traffic Activities widget displays the Tx and Rx data of EAPs and switches within the time range.
Only activities of the devices in the connected status currently will be counted.
Click the tab to display the statistic of EAPs or switches, and move the cursor on the line chart to
view specific values of traffic. For detailed statistics of certain devices within a time range, refer to
8. 2 View the Statistics of the Network.
370
Chapter 8 Monitor the Network
Retried Rate Displays the percentage of packets that needed to be re-sent because
they were corrupted upon arriving at the proper destination.
Dropped Rate Displays the percentage of packets that were dropped before reaching
their intended destination.
■ PoE Utilization
The PoE Utilization widgets describes the PoE utilization of a switch. Select a switch from the switch
list to display the ports connected to PoE devices. You can hover the cursor over a certain port to
371
Chapter 8 Monitor the Network
view specific values. The bar below displays the current power capacity provided by PoE and its
proportion of the PoE budget.
■ Top Interference
The Top Interference widget displays the environment interference of wireless products. Click
the tab to select the 2.4 GHz band or 5 GHz band. Click the traffic number in the widget to open
the device’s Properties window for further configurations and monitoring. For details, refer to 6
Configure and Monitor Controller-Managed Devices.
Client
Widgets in Clients use lists and charts to illustrate the traffic status of wired and wireless clients in the
site, including the most active clients, activity statistics and distribution.
372
Chapter 8 Monitor the Network
To view all the clients connected to the network, click See All to jump to the Clients section. You
can also click the traffic number in the widget to open the client’s Properties window for further
configurations and monitoring. For details, refer to 7.1 Manage Wired and Wireless Clients in Clients
Page.
373
Chapter 8 Monitor the Network
connect to the two bands. You can hover the cursor over the slice to view the number of clients in
2.4 GHz or 5 GHz band.
■ Client Activities
The Client Activities widget displays how the number of connected client changes over time within
the time range. In the stacked chart, you can easily compare the total number of clients and analyze
the variation of each time period.
The total value of a column shows the total number of connected clients in this time period, and the
segments in three colors shows the change of client number compared with the last time period.
374
Chapter 8 Monitor the Network
Blue represents the newly connected clients, orange is the clients have been connected in the last
period, and gray is the newly disconnected clients.
■ Association Failures
The Association Failures widget list three failure types and the times of clients failed to connect
to the EAPs’ networks in the site. A single bar is next to the count to show the proportion of the
three failure reasons using gray colors from dark to light. Click the reason in the list to view the
distribution of failures on EAPs.
Blocked by Access Control The connection failed because the client has been blocked. For details
about blocked clients, refer to 8. 5. 1 Known Clients.
WPA Authentication Timeout/Failure The connection failed because the client did not pass the authentication
due to authentication timeout or wrong password.
375
Chapter 8 Monitor the Network
the cursor over the slice to view the number of clients connected to the SSID in 2.4 GHz or 5 GHz
band. Click a certain SSID to further display the statistics of its band frequency distribution.
376
Chapter 8 Monitor the Network
is bigger than -72 dBm. The line graph on the right displays the number of clients according to the
different range values of RSSI.
377
Chapter 8 Monitor the Network
8. 2. 1 Performance
In Performance, you can view the device performance in a specified period by graphs, such as user
counts, CPU and memory usage, and transmitted and received packets. The graphs vary due to the
device type and status.
Tab Bar
The tabs and calendar on the top are used to specify the displayed statistics, and the legends on the
right account for elements in the graphs.
Click to select a device from the drop-down list to view its statistics. The tabs vary due to
the type of the selected device.
Click the date to display a calendar. Click a specific date twice in the calendar for the
widgets to display its statistics. To display the statistic of a time range, click the start date
and end date in the calendar, or directly select the time range on the right.
The available time range is restricted by the time interval. Before selecting a long time
range, select Hourly or Daily as the time interval.
Select 5 minutes, Hourly, or Daily to specify the time interval of the data. When selecting a
long time range, a longer time interval is recommended for a better view.
(For gateway) Click to select the port of gateway on the tab to view the statistics.
(For AP) Click to select the band of the AP to view the statistics.
Statistical Graphs
Statistical graphs vary according to the type of devices. The chart below shows the statistical graphs
which correspond to the gateway, switch, and AP.
378
Chapter 8 Monitor the Network
■ User Counts
The User Counts graph displays the number of users connected to the devices during the selected
time range. Hover the cursor over the line to display the specific values.
■ Usage
The Usage graph uses the orange line and yellow line to display the percentage of CPU usage and used
memory during the selected time range, respectively. Hover the cursor over the lines to display the
specific values.
■ Traffic
The Traffic graph uses the dark blue line and light blue line to display the bytes of data transmitted and
received during the selected time range, respectively. Hover the cursor over the lines to display the
specific values.
379
Chapter 8 Monitor the Network
■ Packets
The Packets graph uses the dark blue line and light blue line to display the number of packets transmitted
and received during the selected time range, respectively. Hover the cursor over the lines to display the
specific values.
■ Dropped
The Dropped graph uses the dark blue line and light blue line to display the number of dropped Tx
packets and Rx packets during the selected time range, respectively. Hover the cursor over the lines
to display the specific values.
■ Errors
The Errors graph uses the dark blue line and light blue line to display the number of error packets sent
to AP and received by AP during the selected time range, respectively. Hover the cursor over the line
to display the specific values.
380
Chapter 8 Monitor the Network
■ Retries
The Retries graph uses the dark blue line and light blue line to display the number of times that the data
packets are transmitted again and received again during the selected period, respectively. Hover the
cursor over the lines to display the specific values.
8. 2. 2 Switch Statistics
In Switch Statistics, you can view the current status of ports and their traffic statistics of the selected
switch in the specified time range via a monitor panel and graphs.
Tab Bar
The tabs and calendar on the top are used to specify the displayed statistics, and the legends on the
right account for elements in the graphs.
Click to select a switch from the drop-down list to view its statistics.
Click the date to display a calendar. Click a specific date twice in the calendar for the
widgets to display its statistics. To display the statistic of a time range, click the start date
and end date in the calendar, or directly select the time range on the right.
The available time range is restricted by the time interval. Before selecting a long time
range, select Hourly or Daily as the time interval.
Select 5 minutes, Hourly, or Daily to specify the time interval of the data. When selecting a
long time range, a longer time interval is recommended for a better view.
Select Natural, Transmitted, Received, or All to specify the graph order of ports.
Natural: Displays the line graphs in ascending order of the port number.
Transmitted: Displays the line graphs in descending order based on the traffic volume of
transmitted packets.
Received: Displays the line graphs in descending order based on the traffic volume of
received packets.
All: Displays the line graphs in descending order based on the total traffic volume of
transmitted and received packets.
381
Chapter 8 Monitor the Network
Select bps, Bytes or Packets to specify the data type and measuring unit.
If you select Packet, click the tab to specify which type of packet statistics to be displayed.
All: Displays statistics of all packets, including broadcast and multicast packets.
Monitor Panel
The monitor panel below the tab bar displays the current status of the ports on the selected switch.
Disabled The port profile is Disable. To enable it, refer to 6. 3 Configure and Monitor Switches.
STP Blocking A port in the Blocking status in Spanning Tree. It receives and sends BPDU (Bridge Protocal
Data Unit) packets to maintain the spanning tree. Other packets are dropped.
Statistical Graphs
Statistical graphs below the monitor panel display the traffic statistics of active ports.
382
Chapter 8 Monitor the Network
You can specify the data type and measuring unit by clicking the tab. The dark blue and
light blue are used to indicate the transmitted and received statistics, respectively. Hover the cursor
over the lines to display the specific values. To view and configure the device connected to the port,
click the device name beside the port number.
383
Chapter 8 Monitor the Network
8. 3. 1 Topology
Go to Map > Topology, and you can view the topology generated by the controller automatically. You
can click the icon of devices to open the Properties window. For detailed configuration and monitoring
in the Properties window, refer to 6 Configure and Monitor Controller-Managed Devices.
384
Chapter 8 Monitor the Network
For a better overview of the network topology, you can control the display of branches, the size of the
diagram, and the link labels.
■ Display of Branches
The default view shows the all devices connected by solid and dotted lines. Click the icon of the
client group to view clients connected to the same device. Click the nods to unfold or to fold
the branches.
■ Diagram Size
Click the icons at the right corner to adjust the size of the topology and view the legends.
Click to view the meaning of lines in the topology. Solid and dotted lines are used to
indicate wired and wireless connections, respectively, and four colors are used to
indicate the link speed.
385
Chapter 8 Monitor the Network
■ Link Labels
Click Link Labels at the left corner, and labels will appear to display the link status. Information on
the labels varies due to the link connections.
(For the WAN port of router connected to the internet) Displays the port name,
link speed and duplex type.
(For simple wired connections) Displays the connected port number, link speed,
and duplex type. Note that only the switch’s port number can be displayed in the
label.
(For Link Aggregation) Displays the LAG ID, port number of LAG members, LAG
speed, and duplex type.
(For wireless connections between APs) Displays the negotiation rate of uplink
and downlink and the RSSI (displayed in percentage and dBm).
8. 3. 2 Heat Map
Go to Map > Heat Map, and a default map is shown as below. You can upload your local map images and
add devices and different types of walls to customize a visual representation of your network.
Click the following icons to add, edit, and select the map. After selecting a map, click and drag in the
devices from the Devices list to place it on the map according to the actual locations.
Click to select a map from the drop-down list to place the devices.
386
Chapter 8 Monitor the Network
Click to add a map. In the pop-up window, enter the description, select the
layout, and upload an image in the .jpg, .jpeg, .gif, .png, .bmp, .tiff format.
Click to use the selection tool to select the elements including walls and
devices on the map.
Click to use the measurement tool. Draw a line on the map to measure the
actual distance according to the map scale.
Click to edit the elements including walls and devices on the map.
Click to set the map scale. Draw a line on the map by clicking and
dragging, and then define the distance of the line.
Click to set the default height of the added devices and the information
displayed on the map.
Configuration
To generate a visual representation and heat map of your network, follow these steps:
1 ) Add a map and configure the general parameters for the map.
2 ) Add devices and walls, and configure the parameters.
3 ) View simulation results.
387
Chapter 8 Monitor the Network
Add Map Add Devices and Walls View and Export Results
1. Go to Map > Heat Map and click to add a new map. Then click Add.
Layout Select the general layout of the map, which will make the simulation more
accurate.
Upload an image Upload the map in the .jpg, .jpeg, .gif, .png, .bmp, .tiff, .dxf format.
2. Click on the upper right to set a map scale. Draw a line on the map by clicking and
dragging, and then define the distance of the line.
388
Chapter 8 Monitor the Network
3. Click to set the default height of the added devices and the information displayed on the map.
Then click Confirm.
Default Height Specify the default height for devices. You can change the height for individual
device later.
Display Information Select the information you want to see on the map.
389
Chapter 8 Monitor the Network
Add Map Add Devices and Walls View and Export Results
3. Click on the upper left. Select a type of wall/obstacle area and then start drawing on the map.
Left click to start and right click / hit Enter to end.
You can also edit the details parameters of the walls and obstacles, delete, and add walls. Adding
correct obstacles will increase the accuracy of simulation results.
390
Chapter 8 Monitor the Network
Add Map Add Devices and Walls View and Export Results
Note:
It is required to click Simulate to generate a new heat map after editing elements on the map.
1. Click to generate the heat map. You can adjust the receiver sensitivity, show signal strength,
and view the simulation results according to your needs.
Enable the feature, and you can move the cursor to view the signal
strength of a specific location.
Click and follow the instruction to specify an area to view the signal
strength and the corresponding percentage.
Adjust the receiver sensitivity, and the new settings will take effect after
refreshing the simulation.
2. (Optional) If you want to export a network coverage report, click on the upper right to export a
report in .docx format.
8. 3. 3 Device Map
Prerequisite
A valid Mapbox API Access Token is required to use the Device Map function.
391
Chapter 8 Monitor the Network
Visit https://www.mapbox.com, register an account, and obtain the default token on the account page.
Configuration
1. Select a site from the drop down list of Organization in the top-right corner. Go to Map > Device
Map.
2. Enter the Mapbox API Access Token you obtained, then click Confirm.
392
Chapter 8 Monitor the Network
3. Select the sites that can share the token, then click Confirm.
Unplaced Device Display a list of sites that are not marked on the map. You can drag and
List drop a site to add it to the map.
Search bar Select a catogary and enter the keyword to search for a site or address.
393
Chapter 8 Monitor the Network
8. 3. 4 Site Map
Prerequisite
A valid Mapbox API Access Token is required to use the Site Map function.
Visit https://www.mapbox.com, register an account, and obtain the default token on the account page.
394
Chapter 8 Monitor the Network
Configuration
1. Select Global from the drop down list of Organization in the top-right corner. Go to Dashboard >
Site Map.
2. Enter the Mapbox API Access Token you obtained, then click Confirm.
3. Select the sites that can share the token, then click Confirm.
Unplaced Site List Display a list of sites that are not marked on the map. You can drag and
drop a site to add it to the map.
Search bar Select a catogary and enter the keyword to search for a site or address.
395
Chapter 8 Monitor the Network
Click a site to view site info, and click Launch to access the site.
396
Chapter 8 Monitor the Network
Wireless Summary Display the wireless statistics summary of the whole network, including data related to APs,
wireless clients, and wireless traffic.
Wired Summary Display the wired statistics summary of the whole network, including data related to
gateway, switches, wired clients, and wired traffic.
Wireless Devices Display details of APs in the network, including AP Traffic, CPU Utilization, Memory
Utilization, Total Clients, Alerts, and Reboot Times.
Wired Devices Display details of gateway and switches in the network, including Traffic, CPU Utilization,
Memory Utilization, Total Clients, Alerts, and Reboot Times.
SSID Display the statistics of SSIDs in the network, including Traffic, Total Clients, and Activities.
Clients Display the statistics of Clients in the network, including Distribution, Client Activities, and
Client Numbers.
397
Chapter 8 Monitor the Network
When you are accessing the controller locally, you can export the network report or send the report via
email by clicking the icons on the upper right.
Click to send the report via email. Both Send Now and Send Schedule are available.
Note that for Linux system, please install Chromium before exporting the network report
and make sure you can run Chromium as root.
398
Chapter 8 Monitor the Network
8. 5. 1 Known Clients
In Known Clients, a table lists all clients that connected to the network before in the site.
In the table, you can view the client’s basic information, role and connection statistics, including
download and upload traffics, connection duration, and the last time it connected to the network.
A search bar, a time selector and three tabs are above the table for searching and filtering.
Click the selector to open the calendar. Click a specific date twice in the calendar to
display the records on the day. To display the records of a time range, click the start
date and end date in the calendar.
399
Chapter 8 Monitor the Network
Click the tabs to filter the clients listed in the table. The three tabs can take effect
simultaneously.
All/Wireless/Wired: Click All to display both wireless and wired clients. Click Wireless
or Wired to display wireless or wired clients only.
All/Users/Guests: Click All to display both users and guests. Click Users or Gusets
to display users or guests only. Guests are users connected to the wireless guest
network. To configure guest network, refer to 4. 4 Configure Wireless Networks.
All/Rate Limited/Blocked: Click All to display both rate limited and blocked clients.
Click Rate Limited or Blocked to display rate limited or blocked clients only. To
configure Rate Limit, refer to 4. 8. 3 Rate Limit. To block the clients, click the icon
in the table.
You can also take actions to block or forget the client. For detailed monitor and management, click the
entry in the table to open the Properties window of the client. For more details, refer to 7. 1. 2 Using the
Clients Table to Monitor and Manage the Clients.
(For unblocked clients) Click to block the client in the site. Once blocked, the client is
banned from connecting to the network in the site.
Click to forget the client. Once forget, all statistics and history of the client in the site
are dropped.
8. 5. 2 Past Connections
In Past Connections, a table displays information about previous client connection sessions.
400
Chapter 8 Monitor the Network
In the table, you can view the client’s name, MAC address, association time and duration, download and
upload traffic, IP address, and the network/port it connected to.
A search bar and a time selector are above the table for searching and filtering.
Enter the client name, SSID or MAC address to search the clients.
Click the selector to open the calendar. Click a specific date twice in the calendar
to display client connection sessions on the day. To display the client connection
sessions during a time range, click the start date and end date in the calendar.
401
Chapter 8 Monitor the Network
In the table, you can view the client’s name, MAC address, authorization credential, uplink and downlink
traffics, authorization time and duration, IP address, and the network/port it connected to. For detailed
monitoring and management, refer to 7. 2 Manage Client Authentication in Hotspot Manager.
A search bar and a time selector are above the table for searching and filtering.
Click the selector to open the calendar. Click a specific date twice in the calendar to
display the clients authorized on the day. To display the clients authorized during a
time range, click the start date and end date in the calendar.
8. 5. 4 Switch Status
In Switch Status, a table displays information about the status of the switches managed by the controller.
In the table, you can view the ports, PoE status, mode, and traffic activity of the switches.
A search bar and two tabs are above the table for searching and filtering. You can also click the icons in
the Action column for quick operation.
402
Chapter 8 Monitor the Network
Click the tabs to filter the switch ports listed in the table. The two tabs can take
effect simultaneously.
All/Connected/Disconnected: Filter the ports by their link status. Click All to display
information of all ports. Click Connected or Disconnected to display all connected or
disconnected ports.
(Only for the PoE port that is connected to a PD) Click the button and the port will
stop to supply power to the connected PD momentarily in order to reboot the PD.
The listed information when you select Overview on the first tab is explained as follows.
Mirroring: The port is a mirroring port that is mirroring another switch port.
STP Blocking: The port is in the Blocking status in Spanning Tree. It receives and sends
BPDU (Bridge Protocal Data Unit) packets to maintain the spanning tree. Other packets are
dropped.
403
Chapter 8 Monitor the Network
Mirroring: The network traffic of this port will receive the mirrored traffic from its mirrored
port.
Profile Display the switch port profile that takes effect on the port.
Link Status Display the connection speed and duplex mode of the port.
The listed information when you select PoE on the first tab is explained as follows.
Mirroring: The port is a mirroring port that is mirroring another switch port.
STP Blocking: The port is in the Blocking status in Spanning Tree. It receives and sends
BPDU (Bridge Protocal Data Unit) packets to maintain the spanning tree. Other packets are
dropped.
404
Chapter 8 Monitor the Network
PD Class Display the power requirement of the PD connected to the PoE port.
The listed information when you select Counters on the first tab is explained as follows.
Mirroring: The port is a mirroring port that is mirroring another switch port.
STP Blocking: The port is in the Blocking status in Spanning Tree. It receives and sends
BPDU (Bridge Protocal Data Unit) packets to maintain the spanning tree. Other packets are
dropped.
405
Chapter 8 Monitor the Network
A tab is above the table for filtering. You can also click the icons in the Action column for quick operation.
Click the tab to filter the port forwarding entries listed in the table.
User-defined/UPnP: Click User Defined to display the port forwarding entries created
by the user. Click UPnP to display the UPnP port forwarding entries.
Source Port The traffic through the source port, also known as internal port, will be forwarded to the
LAN.
Destination IP Display the destination IP address, and it will receive the forwarded port traffic.
Destination Port Display the destination port, also known as internal port, that will receive the forwarded
traffic.
406
Chapter 8 Monitor the Network
Lease Duration (Only for UPnP port forwarding) Display the uptime of the port forwarding entry.
8. 5. 6 VPN Status
In VPN Status, a table displays the existing VPN tunnels and corresponding information.
A tab is above the table for filtering. You can also click the icons for quick operation.
Click the tab to filter the routing information listed in the table.
When you select OpenVPN/PPTP/L2TP, you can further choose Server or Client.
(Only for SSL VPN) Click to lock out the user. You can click View Locked Out Users to
manage the locked out users.
Tunnel ID Display the local and remote IP address/name. The arrow indicates the traffic direction.
407
Chapter 8 Monitor the Network
Data Flow Display local and remote subnet. The arrow indicates the direction.
The listed information of OpenVPN/PPTP/L2TP (Server) table is explained as follows (some information
listed below is hidden by default). You can further filter the entries based on their type.
Remote Local IP Display the IP address of the remote user of the VPN tunnel.
408
Chapter 8 Monitor the Network
Uptime Display the time duration that the VPN tunnel has been active.
The listed information of OpenVPN/PPTP/L2TP (Client) table is explained as follows (some information
listed below is hidden by default). You can further filter the entries based on their type.
Remote Local IP Display the IP address of the remote user of the VPN tunnel.
Uptime Display the time duration that the VPN tunnel has been active.
409
Chapter 8 Monitor the Network
Statistics Display the upload and download traffic of the remote user.
8. 5. 7 Routing Table
Routing Table displays information of routing entries that have taken effect.
A tab is above the table for filtering. You can also click the icons in the Action column for quick operation.
Click the tab to filter the routing information listed in the table.
Interface (Only for Gateway) Display the interface that the traffic of the entry goes through.
410
Chapter 8 Monitor the Network
Metric (Only for Gateway) Display the number of hops before reaching the destination. Generally, if
there are a few routing entries with the same destination, the routing with the lowest metric
will be used.
Distance (Only for Switch) Display the administrative distance of the routing entry. It is used to decide
the priority among routes to the same destination. Among routes to the same destination,
the route with the lowest distance value will be used.
8. 5. 8 Dynamic DNS
In Dynamic DNS, a table displays information about the uses of the dynamic DNS services. You can
click in the Action column to edit the entry.
Domain Name Display domain name registered with the DDNS service.
Last Updated Display the time when the IP address of the domain name was last updated.
8. 5. 9 Rogue APs
A rogue AP is an access point that has been installed on a secure network without explicit authorization
from a system administrator. In Rogue APs, you can scan rogue APs and view the rogue APs scanned
before.
411
Chapter 8 Monitor the Network
Click the selector to open the calendar. Click a specific date twice in the calendar to
display the rogue APs scanned on the day. To display the scanned AP during a time
range, click the start date and end date in the calendar.
Click the tab to filter the rogue APs listed in the table based on the frequency band.
Click to scan rogue APs. It may take several minutes, and the wireless service may be
influenced during scanning.
BSSID A string with a similar form as MAC address to recognize access points.
Channel Displays the operation channel and standard of the rogue AP.
Location Displays the managed AP nearest to the rogue AP. You can click the nearest AP to
open its Properties window.
412
Chapter 8 Monitor the Network
Last Seen Display the last time that the rogue AP was scanned by the controller.
413
Chapter 8 Monitor the Network
■ Occurred Hierarchies
Two categories in occurred hierarchies are Controller and Site, which indicate the log activities
happened, respectively, at the controller level and in the certain site. Only Main Administrators can
view the logs happened at the controller level.
■ Notifications
Two categories in notifications are Event and Alert, and you can classify the logs into them by
yourself.
■ Severities
Three levels in severities are Error, Warning, and Info, whose influences are ranked from high to low.
■ Contents
Four types in contents are Operation, System, Device, and Client, which indicate the log contents
relating to.
414
Chapter 8 Monitor the Network
8. 6. 1 Alerts
Alerts are the logs that need to be noticed and archived specially. You can configure the logs as Alerts
in Notifications, and all the logs configured as Alerts are listed under the Alerts tab for you to search,
filter, and archive.
Enter the content types, severity levels, or key words to search the logs.
Click the tabs to filter the logs listed in the table. The two tabs can take effect
simultaneously.
Unarchived/Archived: Click the tab to filter the unarchived and archived logs. You
can click and Archive All to archive a single log and all, respectively.
All/Errors/Warnings: Click All to display logs in both Error, Warning, and Info levels.
Click Errors or Warnings to display logs in Error or Warning levels only.
Content Displays the log types and detailed message. You can click the device name, client
name to open its Properties window for detailed information.
415
Chapter 8 Monitor the Network
Click and select the log types to delete the corresponding alert logs. Once deleted
the archived alerts cannot be recovered. The unarchived alerts cannot be deleted.
8. 6. 2 Events
Events are the logs that can be viewed but have no notifications. You can configure the logs as Events
in Notifications, and all the logs configured as Events are listed under the Events tab for you to search
and filter.
416
Chapter 8 Monitor the Network
Enter the content types, severity levels, or key words to search the logs.
Click and select the log types to delete the corresponding event logs.
Click the tabs to filter the logs listed in the table. The two tabs can take effect
simultaneously.
Content Displays the log types and detailed message. You can click the device name,
client name to open its Properties window for detailed information.
8. 6. 3 Notifications
In Notifications, you can find all kinds of activity logs classified by the content and specify their
notification categories as Event and Alert for the current site. Also, you can enable Email for the logs.
417
Chapter 8 Monitor the Network
With proper configurations, the controller will send emails to the administrators when it records the
logs.
To specify the logs as Alert/Event, click the corresponding checkboxes of logs and click Apply. The
following icons and tab are provided as auxiliaries.
Reset to Default Click to reset all notification configurations in the current site to the default.
Enable the checkboxes to specify the activity logs as Events/Alerts, and then the
recorded logs will be displayed under the Events/Alerts tab. If both of them are
disabled, the controller will not record the activity logs.
Enable the checkboxes to specify the activity logs as alert logs. With proper
settings in Site and Admin, the controller can send emails to notify the
administrators and viewers of the site’s alert logs once generated.
This icon appears when the configuration of a log is changed but has not been
applied. Click it to reset the configuration of the log to the default.
The Email checkboxes are used to enable Alert Emails for the logs. To make sure the administrators and
viewers can receive alert emails of the site, follow the following steps:
1 ) Enable Mail Server
2 ) Enable Alert Emails in Site
418
Chapter 8 Monitor the Network
Enable Mail Server Enable Alert Emails in Site Enable Alert Emails in Admin
Go to Settings > Controller. In the Mail Server section, enable SMTP Server and configure the parameters.
Then click Save.
SMTP Enter the URL or IP address of the SMTP server according to the instructions of the email
service provider.
Port Configure the port used by the SMTP server according to the instructions of the email service
provider.
SSL Enable or disable SSL according to the instructions of the email service provider. SSL (Secure
Sockets Layer) is used to create an encrypted link between the controller and the SMTP
server.
Authentication Enable or disable Authentication according to the instructions of the email service provider.
If Authentication is enabled, the SMTP server requires the username and password for
authentication.
Username Enter the username for your email account if Authentication is enabled.
Password Enter the password for your email account if Authentication is enabled.
419
Chapter 8 Monitor the Network
Test SMTP Server Test the Mail Server configuration by sending a test email to an email address that you specify.
Enable Mail Server Enable Alert Emails in Site Enable Alert Emails in Admin
5. Go to Settings > Site and enable Alert Emails in the Services section.
6. (Optional) On the same page, enable Send similar alerts within seconds in one email and specify
the time interval. When enabled, the similar alerts generated in each time period are collected and
sent to administrators and viewers in one email.
420
Chapter 8 Monitor the Network
7. Click Apply.
Enable Alert Emails in Site Enable Alert Emails in Admin Enable Alert Emails in Logs
Go to Admin and configure Alert Emails for the administrators and viewers to receive the emails. Click
+ Add New Admin Account to create an account or click to edit an account. Enter the email address
in Email and enable Alert Emails. Click Create or Apply.
421
Chapter 8 Monitor the Network
Enable Alert Emails in Site Enable Alert Emails in Admin Enable Alert Emails in Logs
Go to Logs and click Notifications. Click a tab of content types and enable Email for the activity logs
that the controller emails administrators. Click Save.
422
Chapter 8 Monitor the Network
■ Network Check
Test the device connectivity via ping or traceroute.
■ Packet Capture
Capture packets for network troubleshooting.
■ Terminal
Open Terminal to execute CLI or Shell commands.
Note:
Firmware updates are required for earlier devices to support these tools.
8. 7. 1 Network Check
1. In the Site view, go to Tools > Network Check.
2. Configure the test parameters.
Device Type Select the type of device(s) to perform a test: EAP, Switch, or Gateway.
Test Choose the Ping or Traceroute tool to test the device connectivity.
Ping: Test the connectivity between the specified sources and destination, and
measure the round-trip time.
Traceroute: Display the route (path) the specified sources have passed to reach
the specified destination, and measure transit delays of packets across an Internet
Protocol network.
Destination Type Select the destination type and specify the Domain/IP Address or Client to ping. Client
is unavailable in the traceroute test or when multiple AP devices perform the ping test.
Packet Size When Test Type is Ping, specify the size of ping packets.
423
Chapter 8 Monitor the Network
Count When Test Type is Ping, specify the number of ping packets.
Note:
• Devices which are already running commands shall not execute newly added commands.
• Output history of device with buffer space issues shall be automatically cleared.
3. Click Run to perform the test. You can view the test result in the Device Output section.
8. 7. 2 Packet Capture
1. In the Site view, go to Tools > Packet Capture.
2. Configure the parameters for packet capture.
424
Chapter 8 Monitor the Network
Interface Type Select the Wired interface type and specify the Port, or select the Wireless interface
type and specify the Band and SSID / Interface.
Single Packet Size Specify the size of a single captured packet. It cannot exceed 1 MB.
Packet Capture Filters Enter the filters to capture packets. Supported filters include:
host, src, dst, tcp port, tcp src port, tcp dst port, udp port, udp src port, udp dst port,
ether host, ether src, ether dst
Combination of operators “and”, “or”, “(“ and “)” is supported between multiple filter
items. For example:
(src 192.168.0.1 and tcp port 80) or (src 192.168.0.1 and tcp port 90)
Note: host: host address, src: source, dst: destination, ether: ethernet address (MAC
address)
3. Click Start Packet Capture to capture packets. After packets are captured, you can click Download
.pcap Files to download them.
Note:
The file will be kept for 10 minutes only and can only be downloaded three times.
8. 7. 3 Terminal
1. In the Site view, go to Tools > Terminal.
2. Configure the parameters.
Device Type Select the type of device(s) to test: EAP, Switch, or Gateway.
425
Chapter 8 Monitor the Network
3. Click Open Terminal. Now you can run CLI or Shell commands.
426
9
Manage Accounts of the SDN
Controller
This chapter gives an introduction to different user levels of controller accounts and guides you on how
to create and manage them. The chapter includes the following sections:
■ Main Administrator
The main administrator has access to all features.
The account who first launches the controller will be the main administrator. It cannot be changed and
deleted.
■ Administrator
Administrators have no permission to some modules, mainly including cloud access, migration, auto-
backup and global view logs. They have read-only permission to some modules, such as global view
license management and custom account roles.
Administrators can be created and deleted by the main administrator and administrators.
■ Viewer
Viewers can view the status and settings of the network, and change the settings in Hotspot Manager.
The entrance to Account page is hidden for viewers, and they can be created or deleted by the main
administrator and administrators.
■ Custom roles
Custom roles can be configured to access different features.
They can be created or deleted only by the main administrator.
Note:
Please upgrade Omada APP to version 4.6 or later, otherwise you may not be able to log in with the accounts bound with
customized roles.
428
Chapter 9 Manage Accounts of the SDN Controller
2. Click Add New Role. Specify the role type name and customize the permissions for the role.
3. Click Create. The new role will be displayed in the role list.
429
Chapter 9 Manage Accounts of the SDN Controller
Permission Transfer Click the button and select a new main administrator to transfer the Cloud Main
Administrator permissions of the current account to the new account. The current
account will be downgraded as Administrator.
Alert Emails Check the box if you want the current user to receive emails about alerts of the
privileged sites.
430
Chapter 9 Manage Accounts of the SDN Controller
3. Select Local User for the administrator type in the pop-out window. Specify the parameters and
click Create.
Username Specify the username. The username should be different from the existing ones.
Administrator: This role has permissions to adopt and/or manage devices of the
sites chosen in the site privileges, edit itself, create/edit/delete viewer accounts in its
privileged sites. However, it cannot delete itself or edit/delete main administrator.
Viewer: This role can view the information of the sites chosen in the site privileges. It
can only edit itself.
Custom roles: If you have created custom roles, they will be displayed in the list. To
create custom roles, refer to 9. 2 Create and Manage Custom Account Roles.
431
Chapter 9 Manage Accounts of the SDN Controller
Site Privileges Assign the site permissions to the created local user.
All: The created user has device permissions in all sites, including all new-created
sites.
Sites: The created user has device permission in the sites that are selected. Select
the sites by checking the box before them.
Alert Emails Check the box if you want the created user to receive emails about alerts of the
privileged sites. For detailed configurations, refer to 4. 2. 2 Services.
432
Chapter 9 Manage Accounts of the SDN Controller
2. Go to Account > User. A cloud main administrator with the same username as the TP-Link ID will
be automatically created. The Cloud Main Administrator cannot be deleted. You can log in with the
cloud main administrator when the cloud access is enabled.
433
Chapter 9 Manage Accounts of the SDN Controller
3. Select Cloud User for the administrator type in the pop-out window. Specify the parameters and
click Invite.
TP-Link ID Enter an email address of the created cloud user, and then an invitation email will be sent
to the email address.
If the email address has already been registered as a TP-Link ID, it will become a valid
cloud user after accepting the invitation.
If the email address has not been registered, it will receive an invitation email for
registration. After finishing registration, it will automatically becomes a valid cloud user.
Administrator: This role has permissions to adopt and/or manage devices of the sites
chosen in the site privileges, edit itself, create/edit/delete viewer accounts in its privileged
sites. However, it cannot delete itself or edit/delete main administrator and other
administrator accounts.
Viewer: This role can view the information of the sites chosen in the site privileges. It can
only edit itself.
Custom roles: If you have created custom roles, they will be displayed in the list. To create
custom roles, refer to 9. 2 Create and Manage Custom Account Roles.
Site Privileges Assign the site permission to the created cloud user.
All: The created user has permission in all sites, including all new-created sites.
Sites: The created user has permission in the sites that are selected. Select the sites by
checking the box before them.
434
Chapter 9 Manage Accounts of the SDN Controller
Alert Emails Check the box if you want the created user to receive emails about alerts of the privileged
sites. For detailed configurations, refer to 4. 2. 2 Services.
435
10
Manage Customer Networks in MSP
Mode
MSP (Managed Service Provider) mode allows you to know the status of your customers at a glance,
and manage customers in the Omada platform.
■ Customer Monitoring
Keep you informed of accurate, real-time status of every customer.
■ Customer Management
Manage all customers to deploy the whole network.
■ Account Settings
Manage all administrative accounts.
This chapter will introduce how to enable MSP mode and manage customer networks in MSP view.
• 10. 1 Quick Start
Enabling or disabling MSP mode may cause problems on the connected Cloud access page. In this case, re-enter
the web page.
437
Chapter 10 Manage Customer Networks in MSP Mode
438
Chapter 10 Manage Customer Networks in MSP Mode
3. The new customers will be added to the customer list and the drop-down list of Customers.
In the customer list, you can view the customer information, and click the icons in the ACTION
column to manage customer entries and launch the controller of each customer.
439
Chapter 10 Manage Customer Networks in MSP Mode
When Auto-Renewal is enabled for a customer, the licenses for active devices of the customer will
be automatically renewed when they expire.
3. Go to License > License Assignment, and click Assign Licenses. Select the customer and assign
licenses.
After license assignment, you can click Revoke Licenses and select a customer to revoke licenses
in case needed.
Please upgrade Omada APP to version 4.6 or later, otherwise you may not be able to log in with the accounts bound with
customized roles.
441
Chapter 10 Manage Customer Networks in MSP Mode
2. MSP roles are used for manage settings in MSP view. On the MSP Role page, click Add New MSP
Role. Specify the role type name and customize the permissions for the role. Parameters may vary
by controller type.
442
Chapter 10 Manage Customer Networks in MSP Mode
3. Customer roles are used for manage settings in global view and site view. On the Customer Role
page, click Add New Customer Role. Specify the role type name and customize the permissions for
the role. Parameters may vary by controller type.
443
Chapter 10 Manage Customer Networks in MSP Mode
2. Click the Edit icon to change settings. You can enable Alert Emails if you want this account to
receive emails about alerts.
3. If you want to transfer the permissions to another account, click Permission Transfer and specify
the new account.
444
Chapter 10 Manage Customer Networks in MSP Mode
2. Click Add New User. Specify the parameters and click Invite.
If the email address is already registered with a TP-Link ID, it will become a valid
cloud user account after accepting the invitation.
If not, it will be invited for registration, and automatically becomes a valid cloud user
account after finishing the registration.
MSP Administrator: This role has access to most features in MSP View except for
some modules.
MSP Viewer: This role can view the status and settings of some features.
Custom MSP roles: If you have created custom MSP roles, they will be displayed in
the list.
All: The created user has device permissions of all customers, including all newly
created ones.
Customer: The created user has device permissions of only the customers you
specify.
445
Chapter 10 Manage Customer Networks in MSP Mode
Customer Role Administrator: Compared with the Customer Main Administrator, Customer
Administrators have no permission to some modules in Global View and Site View,
mainly including cloud access, migration, auto-backup and global view logs. They
have read-only permission to some modules in Global View and Site View, such as
license management and custom account roles.
Viewer: Customer Viewers can view the status and settings of the network, and
change the settings in Hotspot Manager.
Custom Customer roles: If you have created custom Customer roles, they will be
displayed in the list.
Alert Emails Check the box if you want the created user to receive emails about alerts of the
privileged customers.
446
Chapter 10 Manage Customer Networks in MSP Mode
General Settings
Time Zone Select the time zone of the controller according to your region. The time of the
controller settings and statistics is displayed based on the time zone.
Daylight Saving Time Enable the feature and configure the parameters if your country/region implement
DST.
Time Offset: Specify the time added in minutes when Daylight Saving Time starts.
Starts On: Specify the time when the DST starts. The clock will be set forward by the
time offset you specify.
Ends On: Specify the time when the DST ends. The clock will be set back by the time
offset you specify.
User Interface
You can customize the User Interface settings of the controller according to your preferences.
1. In MSP View, go to Settings > MSP Settings.
447
Chapter 10 Manage Customer Networks in MSP Mode
Use 24-Hour Time With Use 24-Hour Time enabled, time is displayed in a 24-hour format. With Use 24-
Hour Time disabled, time is displayed in a 12-hour format.
Fixed Menu With Fixed Menu enabled, the menu icons are fixed and do not prompt menu texts
when your mouse hovers on them.
Dark Settings When enabled, the system will switch to a dark theme.
Show Pending Devices With this option enabled, the devices in Pending status will be shown, and you can
determine whether to adopt them. With this option disabled, they will not be shown,
thus you cannot adopt any new devices.
Refresh Button Enable or disable Refresh Button in the upper right corner of the configuration
page.
Refresh Interval Select how often the controller automatically refreshes the data displayed on the
page.
Enable WebSocket Connection With this function enabled, the controller updates in real time some part of its data
on the web interface, which is transmitted using the WebSocket service, so that
you don’t need to refresh them manually.
448
Chapter 10 Manage Customer Networks in MSP Mode
With this function enabled, you can upload your controller labeling and define the
redirection URL.
With this feature enabled, you will receive an update notification when a new
controller version is available.
With Remote Logging configured, the controller will send generated system logs to a log server.
1. In MSP View, go to Settings > MSP Settings.
2. In Services, enable Remote Logging, configure the parameters and save the settings.
Syslog Server IP/Hostname Enter the IP address or hostname of the syslog server.
With the Mail Server, the controller can send emails for resetting your password, pushing notifications,
and delivering the system logs. The Mail Server feature works with the SMTP (Simple Mail Transfer
Protocol) service provided by an email service provider.
1. Log in to your email account and enable the SMTP (Simple Mail Transfer Protocol) Service. For
details, refer to the instructions of your email service provider.
2. In MSP View, go to Settings > Server Settings.
449
Chapter 10 Manage Customer Networks in MSP Mode
3. In Mail Server, enable SMTP Server and configure the parameters. Then save the settings.
SMTP Enter the URL or IP address of the SMTP server according to the instructions of the
email service provider.
Port Configure the port used by the SMTP server according to the instructions of the email
service provider.
SSL Enable or disable SSL according to the instructions of the email service provider. SSL
(Secure Sockets Layer) is used to create an encrypted link between the controller and
the SMTP server.
Authentication Enable or disable Authentication according to the instructions of the email service
provider.
If Authentication is enabled, the SMTP server requires the username and password for
authentication.
Password: Enter the authentication code as the password, which is provided by the
email service provider when you enable the SMTP service.
Sender Address Specify the sender address of the email. If you leave it blank, the controller uses your
email address as the Sender Address.
450
Chapter 10 Manage Customer Networks in MSP Mode
Test SMTP Server Test the Mail Server configuration by sending a test email to an email address that you
specify.
With History Data Retention, you can specify how the controller retains its data.
1. In MSP View, go to Settings > MSP Settings.
2. In History Data Retention, configure the parameters and save the settings.
Clients’ History Data When enabled, known clients, client history and client logs will be recorded. This will
occupy much storage space.
Time Series with 5 Minutes Displays the retention time of AP, switch, gateway, and client data. Corresponding to
Granularity 5-minute statistics.
Time Series with Hourly Displays the retention time of AP, switch, gateway, and client data. Corresponding to
Granularity hourly statistics.
Time Series with Daily Specify the retention time of AP, switch, gateway, and client data. Corresponding to
Granularity daily statistics.
Time Series with Weekly Specify the retention time of client data. Corresponding to weekly statistics.
Granularity
451
Chapter 10 Manage Customer Networks in MSP Mode
Portal Authentication Specify the retention time of portal authorization records. Corresponding to Insight-
Records Past Portal Authorization.
Rogue AP Specify the retention time of scanned Rogue APs. Corresponding to Insight-Rogue APs.
With App-Side Device Notifications enabled, the Controller will send notifications to the app when your
devices go online or offline.
1. Launch the Cloud-Based Controller. In MSP View, go to Settings > MSP Settings.
2. In App-Side Device Notifications, enable the feature and save the settings.
452
Chapter 10 Manage Customer Networks in MSP Mode
Export List Log List: Export the logs generated by the controller.
Audit Log List: Export the audit logs generated by the controller.
Format The data can be exported to the file in the format of .CSV or .XLSX.
453
Appendix 1: Omada APP
Omada app is a mobile application designed for Omada and Omada Pro products. It allows you to
conveniently monitor and manage your network. The Omada app can be used for Standalone and
Controller mode. This appendix introduces how to use Omada app to manage your network. It includes
the following sections:
or
AP
Internet Router
Mobile Device Installed
with Omada App
AP
Follow the steps below to manage your network via Omada app in standalone mode. The following
page is exampled with the iOS version of the app. The Android version is similar.
455
Appendix 1: Omada APP
1. Connect your mobile device to the AP by 3. Tap on the AP device appearing on the page.
using the default SSID (format: TP-Link Set a new username and password for your
2.4GHz/5GHz_XXXXXX) printed on the login account of the AP.
label.
Note:
All the AP devices in the same subnet will be discovered by
Omada app and shown on the page. You can tap the discovered
AP device to configure directly.
456
Appendix 1: Omada APP
4. Edit the default SSID and password to keep 5. You can view the name of the AP device
your wireless network secure. Tap Next. and other information including wireless
parameters and clients. You can tap to
change the settings of radio, SSID and
device account.
Note:
The settings will take effect after several minutes. For operation
system differences, the wireless network connection will be
different. When the default SSID of the AP device is changed,
normally mobile device join the new wireless network Note:
automatically. For the unsupported operation system, you
should manually connect to the new SSID. • Omada app is designed to help you quickly configure
some basic settings. For advanced configuration, you can
use controller mode. And when your AP is managed by the
controller, you can not use standalone mode.
457
Appendix 1: Omada APP
Internet
Router
Switch
Omada Controller OR
Follow the steps below to manage your network via Omada app in controller mode locally. The following
page is exampled with the iOS version of the app. The Android version is similar.
458
Appendix 1: Omada APP
1. Connect your mobile device to the AP by 3. Tap the Controller, the controller login page
using the default SSID (format: TP-Link will show. Enter the username and password
2.4GHz/5GHz_XXXXXX) printed on the of the controller, then tap Log In to launch
label. Note that the AP should be in the same the controller.
subnet with the controller.
459
Appendix 1: Omada APP
460
Appendix 1: Omada APP
Hardware/Software Controller
Refer to the topology for hardware/software controller below, make sure that the following requirements
have been met:
• Both your hardware controller/controller host and mobile device have internet access.
• The version of the Controller is 4.1.5 or above.
• A compatible iOS or Android device with Omada app (iOS: 3.0.28 and above, Android: 3.0.10
and above).
• Cloud Access is enabled on the controller. The controller has been bound with a TP-Link ID.
Internet
Mobile Device Installed
with Omada App
Router
Switch
Omada Controller OR
Clients
Follow the steps below to manage your network via Omada app in controller mode remotely. The
following page is exampled with the iOS version of the app. The Android version is similar.
461
Appendix 1: Omada APP
1. Launch the Omada app, go to Cloud Access 2. All the controllers which are bound with your
and tap Go to Log In to log in with your TP- TP-Link ID will appear on the page.
Link ID.
• If you want to add a hardware controller,
tap + on the upper right, scan its QR
code and follow the instructions to add a
hardware controller.
• If you want to add devices to an existing
hardware/software controller, tap the
controller to launch the controller.
462
Appendix 1: Omada APP
463
Appendix 1: Omada APP
Cloud-Based Controller
Refer to the topology for cloud-based controller below, make sure that the following requirements have
been met:
• Your mobile device has internet access.
• A compatible iOS or Android device with Omada app.
• The supported firmware version of the router/switch/AP.
Router
Switch
AP AP AP
Clients
Follow the steps below to manage your network via Omada app in controller mode remotely. The
following page is exampled with the iOS version of the app. The Android version is similar.
464
Appendix 1: Omada APP
1. Launch the Omada app, go to Cloud Access 2. All the online controller which are bound with
and tap Go to Log In to log in with your TP- your TP-Link ID will appear on the page. Tap
Link ID. the cloud-based controller to launch and
configure the controller.
465
Appendix 1: Omada APP
3. On the Devices screen, tap the + on the 4. On the Devices screen, the newly added
upper right to add devices to your cloud- device will appear. To manage and configure
based controller. You can scan the barcode devices on the cloud-based controller, you
of the serial number of the device or enter need to activate them by assigning available
the serial number manually. licenses. Tap the device to load the page for
device details.
Note:
To successfully add a device to your cloud-based controller,
make sure the following requirements are met:
466
Appendix 1: Omada APP
5. Tab Activate and follow the instructions to 6. After binding with licenses, the devices can
assign licenses to the devices. be managed and configured. You can use the
functions at the bottom to navigate various
screens of the Controller including the
wireless statistics, clients information and
basic settings.
467