0% found this document useful (0 votes)
402 views171 pages

Ruijie Cloud Service V3.6.0 User Guide

Uploaded by

ruijie medan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
402 views171 pages

Ruijie Cloud Service V3.6.0 User Guide

Uploaded by

ruijie medan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 171

Ruijie Cloud V3.6.

0 User Guide
·
Copyright statement

Ruijie Networks©2022

Ruijie Networks reserves all copyrights of this document. Any reproduction, excerption, backup, modification,
transmission, translation or commercial use of this document or any portion of this document, in any form or by any
means, without the prior written consent of Ruijie Networks is prohibited.

Exemption statement

This document is provided “as is”. The contents of this document are subject to change without any notice. Please obtain
the latest information through the Ruijie Networks website. Ruijie Networks endeavors to ensure content accuracy and
will not shoulder any responsibility for losses and damages caused due to content omissions, inaccuracies or errors.

Audience

This manual is intended for:

 Network engineers

 Technical support and servicing engineers

 Network administrators

Obtaining Technical Assistance

 Ruijie Networks Website: https://www.ruijienetworks.com/

 Technical Support Website: https://ruijienetworks.com/support

 Case Portal: https://caseportal.ruijienetworks.com

 Community: https://community.ruijienetworks.com

 Technical Support Email: [email protected]

 Skype: [email protected]

Symbols

Important information. Contains helpful suggestions or references.

Use caution. Could result in equipment damage or data loss.


Contents
1 Summary ....................................................................................................................................... 2
2 Supported Browser ........................................................................................................................ 3
3 Addresses & Ports to be Permitted ............................................................................................... 4
4 Register and Login ........................................................................................................................ 5
4.1 Register .......................................................................................................................... 5
4.2 Login ............................................................................................................................... 9
4.3 Forgot Password ........................................................................................................ 10
5 Monitoring .................................................................................................................................. 11
5.1 DASHBOARD ............................................................................................................. 11
5.2 TOPOLOGY ................................................................................................................ 15
5.3 ALARM ......................................................................................................................... 23
5.4 REPORT ...................................................................................................................... 25
5.5 DEVICE ........................................................................................................................ 33
5.6 CAMERA...................................................................................................................... 93
5.7 CLIENT ........................................................................................................................ 95
6 Configuration .............................................................................................................................. 98
6.1 PROJECT .................................................................................................................... 98
6.2 WIRELESS .................................................................................................................. 99
6.3 AUTHENTICATION.................................................................................................. 120
6.4 ADVANCED .............................................................................................................. 138
7 Maintenance .............................................................................................................................. 143
7.1 LOGS.......................................................................................................................... 143
7.2 UPGRADE ................................................................................................................. 146
8 System Settings ......................................................................................................................... 156
8.1 Alarm Settings........................................................................................................... 156
8.2 Contact ....................................................................................................................... 156
8.3 Remote Assistance .................................................................................................. 158
9 Account ..................................................................................................................................... 160
9.1 Account ...................................................................................................................... 160
9.2 Sub Account .............................................................................................................. 161
9.3 Logout ........................................................................................................................ 162
10 Unbind Device ................................................................................................................... 163
11 Application Examples ........................................................................................................ 164
11.1 Wireless Roaming .................................................................................................... 164
11.2 Authentication Scheme ........................................................................................... 168
12 Appendix ............................................................................................................................ 169
12.1 Acronyms and Abbreviations .................................................................................. 169
12.2 Glossary ..................................................................................................................... 169
User Guide Summary

1 Summary
Ruijie Cloud Service is Ruijie's easy and efficient cloud solutions for chain stores, small and medium-sized businesses
and boutique hotels. The solutions include equipment deployment, monitoring, network optimization and operational
lifecycle management; enabling customers with simple plug and play deployment and operation and maintenance.
Meeting the needs for automatic cloud RF planning and user experience monitoring, it also supports mobile monitoring
and alert, and fast provisioning by QR-Code scanning. At the same time it provides flexible wireless user access control
features, including high security “One person, one machine and one password” PPSK, built-in cloud Portal and Facebook
certification.

KEY FEATURES

 Unified Device Management

 Fast Provisioning by Mobile APP

 Secure PPSK Authentication for Staff

 Captive Portal & Social Authentication for Guest

 Mobile APP Monitoring & Alarm


User Guide Supported Browser

2 Supported Browser
For browser, it is recommended to use the following versions or above.

Supported Browser Version


Chrome 57.0.2987.133
Safari 10.1
Firefox 52.0.2
User Guide Addresses & Ports to be Permitted

3 Addresses & Ports to be Permitted

Device using
Source IP Destination IP Src. port Dst. port Protocol Description
this rule
Your Ruijie Cloud login
35.241.25.95 Any 80, 443 TCP Browser
network server
Your 35.197.150.240,
Any 80, 443 TCP Ruijie Cloud server Browser
network 35.234.108.108
Ruijie Cloud server
Your 35.197.150.240, establishes the tunnel
Any 10000-12000 TCP Gateway
network 35.234.108.108 connection with the
gateway
Ruijie Cloud server
Your 35.197.150.240, delivers the CLI AP, Switch,
Any 3478, 3479, UDP
network 35.234.108.108 commands to the Gateway
device
Your 35.190.54.251, Ruijie Cloud
Any 80, 443 TCP STA
network 35.186.215.129 authentication server
Your 35.201.94.110, AP, Switch,
Any 80, 443 TCP Ruijie Cloud DNS
network 35.190.93.193 Gateway
User Guide Register and Login

4 Register and Login

4.1 Register

1. Visit https://cloud.ruijienetworks.com.

2. Click Sign up to open the Register page.

3. Select your country or region.

Note: The Server Hosting is determined by country. Please choose your country correctly, or the device may fail to go
online. When the selected country or region does not match the current server, the page will automatically refresh
without affecting the registration.
User Guide Register and Login

4. Select your time zone.


User Guide Register and Login

5. Enter your Email address, and an activation Email will be sent after registration.

Note: One email address can be registered once only.

6. Enter and confirm the password.

Note: The password should be a combination of two or more items among numbers, letters and special characters in the
length of 5 to 12 characters. Space is not supported.
User Guide Register and Login

7. Fill in the rest required information and click Sign up.

8. Open the activation Email in your mailbox and click the link to activate your Ruijie account.

If your information is verified and saved, the registration succeeds.


User Guide Register and Login

4.2 Login

1. Visit https://cloud.ruijienetworks.com.
User Guide Register and Login

2. Enter your username and password, and click Login. After the information is verified, you can access the system.

4.3 Forgot Password


1. Click Forgot password? to open the Forgot password page

2. Enter your Email address, click Send Code, and enter the security code contained in the Email into the
Verification Code box.

3. Enter and confirm the new password.

Note: The password should be a combination of two or more items among numbers, letters and special characters in the
length of 5 to 12 characters. Space is not supported.

4. Click Save. If your information is verified and saved, you can use the new password to log into the system.
User Guide Monitoring

5 Monitoring

This part enables you to monitor the following items:

 DASHBOARD

 TOPOLOGY

 ALARM

 REPORT

 DEVICE

 CLIENT

5.1 DASHBOARD
After logging in, the Dashboard appears, or you can click Dashboard in the menu to open the page.

 Overview
User Guide Monitoring

Overview displays the statistics of APs, switches, gateways and clients. The upper number indicates the number of
online devices, and the lower number indicates the total number of devices.

 Alarms

Alarms displays the number of uncleared alarms, new alarms today and total alarms generated this week.

 Registered Device Distribution

The map displays the device distribution by default. Devices are displayed in network, and the number on icon indicates
the device number. Point to the icon, and the device and alarm number are displayed.
User Guide Monitoring

Click to bind the network. In the Unbound Network List, you can drag a device to the map to bind the location;
on map, you can drag a network to change its location, or click Unbind to unbind the location.

 2.4G / 5G Clients

The chart displays the statistics of clients using 2.4G and 5G.

 Channel Distribution and Usage

The chart displays the channel statistics.

For more information, point to a channel. The channel usage is graded as:

Idle: 0% to 59%

Busy: 60% to 79%


User Guide Monitoring

Overload: 80% to 100%

 WiFi Client Summary

The chart displays the trend of recent clients.

 Top 10 Networks by Traffic

The table displays the top 10 networks ranked by traffic.

 Top 10 WiFi Clients by Traffic

The chart displays the top 10 clients ranked by traffic.

 Top 10 APs by Traffic


User Guide Monitoring

The table displays the top 10 APs ranked by traffic.

 Top 10 SSIDs by Traffic

The chart displays the top 10 SSIDs ranked by traffic.

5.2 TOPOLOGY
Topology displays the network topology and device status, and offers the project report.
User Guide Monitoring

5.2.1 Data Monitoring


 Basic Information

Display the creation time, uptime, quantity of online clients and alarms.

 Network Topology

The topology displays the device connection and status. Click a device, and its detailed information will be displayed on
the right.
User Guide Monitoring

When the topology is abnormal, a note is displayed as shown below

 Details and Device

Details displays connectivity, network speed, WiFi experience, and number of online/active clients.

Device displays the information of different kinds of devices.


User Guide Monitoring

5.2.2 Report
To view the network report, point to Project Status, and click View Report.

The project delivery report can be exported into multi-languages.


User Guide Monitoring

To edit the report, click Edit on the upper right corner to customize the report.

You can edit:

 Title

 Cover

 Basic information

 Configuration

 Diagnosis data

 Device list

 Topology
User Guide Monitoring

5.2.3 New Device

5.2.3.1 Add New Device

When you add a new device, Cloud will refresh the topology automatically. If Cloud fails to detect the new device, you
can click Detect New Device to manually update the topology.

The new device can be added to the current network.


User Guide Monitoring

5.2.3.2 Device Information

Click a device in the topology to check its configuration.

5.2.4 Diagnosis
The function diagnoses the network connectivity and link status. Click Start Diagnosis or Diagnose again on the right to
start diagnosis.
User Guide Monitoring

Click View More to check the previous diagnosis results.

5.2.5 Virtual Device Complete on Topology


Select MONITORING > TOPOLOGY, and select a project to check its topology. When some device models can not be
recognized, they will not be displayed on the topology. In this case, you can add the device manually.
User Guide Monitoring

Click More > Manual Add on the upper right corner of topology.

Select a device in the topology to add a downlink device.

5.3 ALARM

5.3.1 Alarm List


By default, Alarm List displays the uncleared alarms. You can select alarm type, level and cleared status to filter alarms.
User Guide Monitoring

Alarm List supports the search based on AP serial number, alarm type, alarm source (network/device), and alarm
generation time.

You can configure thresholds in Alarm Settings.

The following describes the conditions for generating alarms.

Type Condition Description


Device goes offline An AP goes offline. The AP is disconnected from the Cloud Service,
or the AP is powered off.
Device goes online and The online/offline change times of an The connection between the AP and the system
offline continually AP exceeds the default threshold is unstable or the AP has a firmware or
within two hours. hardware fault.
All devices are offline All APs in a network go offline. N/A
High channel usage on AP The RF channel utilization exceeds RF channel utilization is high and interference
80%. is strong. It is recommended to change the
channel.
System The CPU or memory usage of For AP, the default threshold for CUP usage is
usage(CPU/memory AP/switch/gateway exceeds the 85% and for memory usage is 85%.
usage) above threshold threshold. For switch, the default threshold for CUP usage
is 50% and for memory usage is 65%.
For gateway, the default threshold for CUP
usage is 50% and for memory usage is 65%.
Custom values are not supported.
Switch RLDP A loop occurs on the switch. N/A
Abnormal network access The gateway port fails to ping the When the Ping test failed for the specified times,
on gateway specified domain or IP for several the alarm is sent. The times and domain/IP
times. address can be configured manually.
High packet loss rate on The packet loss rate of gateway When the packet loss rate exceeds the
gateway exceeds the threshold. specified percentage of threshold for several
times in 5 minutes, the alarm is sent. The times
and threshold can be configured manually.
Uplink rate above threshold The uplink rate exceeds the specified When the uplink rate exceeds the specified
on gateway percentage of threshold for several percentage of threshold for several times, the
times. alarm is sent. The threshold, times and
percentage can be configured manually.
Downlink rate above The downlink rate exceeds the When the downlink rate exceeds the specified
threshold on gateway specified percentage of threshold for percentage of threshold for several times, the
several times. alarm is sent. The threshold, times and
percentage can be configured manually.
User Guide Monitoring

SIM card traffic exceeds SIM card traffic exceeds a default Only MTFi devices support this alarm.
limit threshold.
GPS signal is not found GPS signal is not found. Only MTFi devices support this alarm.
CPU usage is high CPU usage exceeds a default Only MTFi devices support this alarm.
threshold.
Memory usage is high Memory usage exceeds a default Only MTFi devices support this alarm.
threshold.
Disk space usage is high Disk space usage exceeds a default Only MTFi devices support this alarm.
threshold.
Flash usage is high Flash usage exceeds a default Only MTFi devices support this alarm.
threshold.
CPU temperature is high CPU temperature exceeds a default Only MTFi devices support this alarm.
threshold.

5.3.2 Ignore Alarm


Select the alarm you want to ignore in the Alarm List, and click Ignore Alarm.

5.4 REPORT

5.4.1 Network
Network is divided into 3 parts: Summary, Device and Client. All charts support searching data in the last 94 days with
the same query conditions, except the statistical charts with that display real-time data and Client > Experience
chart that only displays data in the last 7 days. All charts automatically refresh every minute. Reports can be exported into
CSV or PDF files, or sent by Email.

5.4.1.1 Summary

 Summary > WiFi Traffic Summary

The uplink/downlink traffic summaries of the selected network during the specific period.

Uplink: Traffic directed from internal network to external network.

Downlink: Traffic directed from external network to internal network.

 Summary > Channel Distribution and Usage


User Guide Monitoring

The channel distribution and usage of the selected network.

For more details, point to a channel. The channel usage is graded as:

Idle: 0% to 59%

Busy: 60% to 79%

Overload: 80% to 100%

 Summary > SSIDs by Client

The SSIDs ranked by client number of the selected network during the specific period.

 Summary > SSIDs by Traffic

The SSIDs ranked by traffic of the selected network during the specific period.

 Summary > RSSI Statistics


User Guide Monitoring

The wireless signal strength of the selected network during the specific period. The signal intensity is defined below:

Weak: RSSI ≤ -80dB

Medium: -80dB < RSSI ≤ -70dB.

Strong: RSSI > -70dB

5.4.1.2 Device

 Device > Device Summary

The online status of devices of the selected network during the specific period.

 Device > AP Activity

The AP activity of the selected network during the specific period. The chart does not support searching data in the last
24 hours.

AP activity is evaluated based on the number of active clients accessing the AP in a day. APs not associated with any
clients are not calculated.

Inactive: <5 active clients


User Guide Monitoring

Medium: 5-9 active clients

Active: ≥10 active clients.

 Device > Top 10 APs by Client

The top 10 APs ranked by client number of the selected network during the specific period.

 Device > Top 10 APs by Traffic

The top 10 APs ranked by traffic of the selected network during the specific period.

 Device > Firmware Version

The proportion of firmware versions of the selected network during the specific period.

 Device > Hardware Version


User Guide Monitoring

The proportion of hardware versions of the selected network during the specific period.

5.4.1.3 Client

 Client > WiFi Client Summary

The client summary of the selected network during the specific period.

 Client > WiFi Client Activity

The client activity of the selected network during the specific period. The chart does not support searching data in the last
24 hours.

Client activity is evaluated based on online duration and traffic volume (from highest to lowest):

Inactive: ≤100KB traffic

Minimal: Any time and 100KB traffic

Low: 1h/d and 500K traffic

Medium: 2h/d time and 2M traffic

High: 4h/d time and 5MB traffic

Extreme: 8h/d time and 10MB traffic

 Client > 2.4G / 5G Clients


User Guide Monitoring

The proportion of STAs using 2.4G/5G of the selected network during the specific period.

 Client > Top 10 WiFi Clients by Traffic

The top 10 clients ranked by traffic of the selected network during the specific period.

 Client > Captive Portal

The proportion of authentication types of the selected network during the specific period.

 Client > Experience


User Guide Monitoring

The experience status during the specified time and collects data every 5 minutes. You can switch between 2.4GHz and
5 GHz.

Client information: Click an indicator bar to display more information.

Excellent: HDV and internet game are available.

Good: communication application, Web page and VoIP are available.

Poor: go offline frequently or hard to go online.

Inactive: check whether a client is inactive according to the traffic and power usage.

Score: Take the parameters of client delay, client packet loss, signal strength and so on as the reference, and then use
the SVM algorithm to get the score.

5.4.1.4 Export

 Export to CSV/PDF

Point to , and select Export to CSV/PDF.

 Mail

Click , select the file type, enter Email addresses, and click OK.

5.4.1.5 Monthly Report

The monthly report displays the network monitoring data, including user and flow summaries.
User Guide Monitoring

You can send the report immediately to receivers, or enable Scheduled Report so that Cloud will send the report on the
first day of each month automatically (beta function for partial users).

You can send the report in the format of PDF or CSV to the specified Emails. The report can be sent at fixed period.

5.4.2 Voucher
The Voucher Report records the sales of voucher during the specified period.
User Guide Monitoring

Click to export the Voucher Report in PDF format.

Qty: Number of vouchers generated by each package in the specified period.

Activated Accounts: Number of vouchers activated by each package in the specified period.

Total Price: Total price of vouchers activated by each package in the specified period.

Total: Number of vouchers generated by all packages, number of vouchers activated by all packages and total amount of
vouchers activated by all packages.

5.5 DEVICE
Select MONITORING > DEVICE to display the Devices page, and select a network on the top to filter devices.

5.5.1 AP

5.5.1.1 AP List

The AP List displays basic device information, including the online/offline status, SN, config status, MAC, alias,
management IP & public IP, clients, network, firmware version, offline time, model and description.

The AP List automatically refreshes every minute. Click to enable/disable the auto refresh function.

Above the list is the Add function. Click to display the Move to, Delete, and Reboot functions. For more
information, refer to Basic AP Operations.

The Search function supports fuzzy queries based on the serial number, alias and description, and also supports queries
based on online/offline status.

Click the record in the Config Status column to open the Config Status page. On this page, you can deliver one or all
configurations.
User Guide Monitoring

The number of devices which have available firmware for upgrade is displayed on the upper-left corner of the AP List page.
Click New Firmware to display the New Firmware List. Then click Go To Upgrade to enter the MAINTENANCE >
UPGRADE > Upgrade page.

For more information, refer to Device Details.

5.5.1.2 Device Details

Click the SN in the AP List to open the details page for a single device. The page displays detailed device information,
including basic information, performance data, traffic data, client data, online/offline status, RF information, and device
logs.

The AP information is described as:

 AP Info

The basic information includes serial number, MAC address, management IP address, device model, configuration status,
firmware version, hardware version, alias, and description.
User Guide Monitoring

 Status

The performance data includes the AP connection status, number of online clients, CPU usage, and memory usage.

 Connectivity

AP connectivity refers to the connectivity (online status) between AP and Cloud Service within a period (1 day or 7 days).

 Traffic Summary

You can view the AP traffic statistics in the last 24 hours or the last 1 week.

 Radio List

The Radio List page displays the RF information, including the RF type, current channel, power (percentage), frequency
bandwidth, and channel usage.

 Client List

The client list displays information about clients currently associated with the APs, including the IP address, MAC address,
SSID, RSSI, traffic, online/offline status, and terminal type.

 Adjacent RF Signal
User Guide Monitoring

The Adjacent RF Signal page displays the RF signals (scanned BSSID) emitted by adjacent APs. The Radio, Adjacent
Channel, and RSSI in the list are scanned information. If a signal comes from the AP managed by the cloud controller, the
adjacent AP SN and adjacent MAC address will be identified and displayed; otherwise, these two items are in an
unidentified state.

 Scan Adjacent RF

The system provides the function of triggering APs to scan adjacent RF signals. With this function, identified and
unidentified RF signals can be observed. There are two known scenarios:

1. Testing the number and strength of RF signals emitted by neighboring APs that are not managed by the system to
predict a degree of RF interference.

2. Identifying RF signals emitted by neighboring APs managed by the system to diagnose the RF functions and powered-
on status of neighboring APs.

On the device details page, an AP may be triggered to perform scanning and display the scanning result. The following
steps describe the method for scanning the adjacent RF signals:

Click Scan Adjacent RF to trigger an AP to scan adjacent RF signals.

After the AP is triggered, the trigger time, expected completion time, and status are displayed in the status bar. Then wait
for the AP to finish scanning and send the results to the cloud controller.
User Guide Monitoring

A list of RF signals scanned by the AP is displayed after the scanning. The list supports a filtering function based on the
RF type (2.4 GHz/5 GHz).

The system stores the latest scanning results, which overwrites earlier data.

If the adjacent AP SN and MAC address are unidentified, it indicates that the RF source is not managed by the
system; otherwise, the RF signal is emitted by an AP.

It displays the RSSI of SIM card by time. Green indicates a high RSSI, yellow indicates a medium RSSI, and red indicates
a low RSSI. You can export the RSSI data.

 Device Log
User Guide Monitoring

The device log records the historical operations, and currently supports the online/offline records, restart records, and
upgrade records, and supports queries based on the log type and period.

5.5.1.3 Basic AP Operations

 Add

Select the network, and click Add. Both batch import and manual add are supported.

Click Download Template to download the template, enter AP information, and click ‘.xls’ File to import the template.

Click Add a Device, enter SN and alias of the AP, and click OK. Click to add multiple APs.
User Guide Monitoring

 Move to

Select one or multiple devices in the AP List, click More > Move to, select the new network and click OK.

 Delete
User Guide Monitoring

Select one or multiple devices in the AP List, click More > Delete and click OK.

 Reboot

Select one or multiple devices in the AP List, and click Reboot.

5.5.1.4 Web CLI

Select one or multiple devices in the AP List, and click Web CLI. The Web CLI dialog box is displayed, and device
information can be queried via the menus in this dialog box. The menus vary with the products.

In the command entry box, the TAB key and question mark (?) both can complete a command.

To kick off clients or add clients to blacklist, enter the MAC address in the format of “H.H.H” n Client.
User Guide Monitoring

5.5.2 AC

5.5.2.1 AC List

The AC List displays basic device information, including online/offline status, SN, alias, management IP, MAC, public IP,
network, firmware version, offline time, model and description.

The AC List automatically refreshes every minute. Click to enable/disable the auto refresh function.

Above the list are the Add, Web CLI, eWeb and Upgrade functions. Click to display Reboot, Export and Delete

functions. For more information, refer to Basic AC Operations.

The Search function supports fuzzy queries based on the serial number, alias and description.

5.5.2.2 Device Details

Click the serial number in the device list to open the details page for a single device.

 Web CLI

Click Web CLI, and the Web CLI page is displayed. The Web CLI page provides commonly-used CLI commands on the
left. Click the command, or manually enter the command and click Send.
User Guide Monitoring

 eWeb

Click eWeb to open the eWeb system in a new window.

 More > Reboot

Click More > Reboot to reboot the AC.

 Refresh

Click to refresh all data in the page.

 Port Panel

The port panel imitates the actual AC panel, displaying the port type and status.

 Basic
User Guide Monitoring

Basic information displays the alias, model, SN and other information. Alias, MGMT password and description can be
edited.

 Overview > CPU & Memory Usage

CPU & memory usage are displayed here.

 Overview > Device Status

Device status displays online status, online clients and active clients.

 Overview > Connectivity

Connectivity refers to the connectivity (online status) between AC and Cloud Service within a period (1 day or 7 days).

 Overview > CPU/Memory Summary


User Guide Monitoring

CPU/memory summary over the 24 hours are displayed.

 Overview > Device Log

The device log records the historical operations, including online/offline, restart, upgrade and VLAN change, and supports
queries based on log type and time.

 Overview > Config Log

The Config log records the historical configuration delivery, and supports queries based on status and time.

 Port > Speed Summary


User Guide Monitoring

Uplink & downlink speed of port are displayed. This page supports queries based on day, week and month. Click to

refresh the summary.

 Port > Port Status

Port information displays port name, VLAN etc.

 Config > AC Configuration Backup List

The backup records include configuration file name, size, time, mode and MD5.

Click Current to display the current configuration. Click Back up in the Config Details page to back up the current
configuration.
User Guide Monitoring

Click Back up and then click OK in the message box to back up the current configuration.

Select one record, and click Download to download the configuration file.

Select one record, and click Restore to restore the current configuration.

Select one or multiple records, and click Delete to delete the backup record.

Select two records, and click Compare to compare the differences

 Config > AP Configuration Backup List


User Guide Monitoring

The backup records include configuration file name, size, time, mode and MD5.

Select one record, and click Download to download the configuration file.

Select one or multiple records, and click Delete to delete the backup record.

Select two records, and click Compare to compare the differences

 Tunnel > Create Tunnel

Select the tunnel type and click Create Tunnel. The tunnel types include Telnet, eWeb and SSH.

 Tunnel > Tunnel List

Tunnel information includes tunnel type, host, port, destination device, expiration time and status. Click Re-create in the
Action column to re-create a tunnel. Click Telnet/eWeb in the Action column to open the corresponding page.
User Guide Monitoring

5.5.2.3 Basic AC Operations

 Add AC Network

 Add

Click Add, enter the SN and Alias, and click OK to add an AC to the network. Only one AC can be added to a network.

 Web CLI
User Guide Monitoring

Select the device to be managed by CLI command, click Web CLI. The Web CLI page provides commonly-used CLI
commands on the left. Click the command, or manually enter the command and click Send. Only one AC can be
configured at a time.

 eWeb

Select the device and click eWeb. The system will connect to AC and automatically open the eWeb page in a new
window.
User Guide Monitoring

If a tunnel is created successfully but the eWeb page does not automatically open, a message is displayed as below.
The user can manually click the link to open the page.

 Reboot

Select the device in the AC List, click More > Reboot and click OK.

 Delete

Select the device in the AC List, click More > Delete and click OK.
User Guide Monitoring

5.5.2.4 AP / STA List

Click AP/STA List to display the AP and STA list.

5.5.3 Switch

5.5.3.1 Switch List

The Switch List displays basic device information, including the online/offline status, SN, MAC, alias, management IP &
public IP, offline time, network, model, firmware version and description.

The Switch List automatically refreshes every minute. Click to enable/disable the auto refresh function.

Above the list is the Add function. Click to display the Move to, Delete, and Reboot functions. For more information,
refer to Basic Switch Operations.
User Guide Monitoring

The Search function supports fuzzy queries based on the serial number, alias and description, and also supports queries
based on online/offline status.

5.5.3.2 Device Details

Click the SN in the Switch List to open the details page of a single device. The page displays detailed device information,
including the port panel, basic information, overview, ports, config, PoE and diagnosis.

 Port Panel

The port panel imitates the actual switch panel, displaying the port type, status and speed.

When you point to a port, the traffic, speed and other information of the port will be displayed.

 Switch Info

Switch information includes the alias, model, SN and other information. Alias and Description can be edited.

 Overview > CPU & Memory Usage


User Guide Monitoring

 Overview > Connectivity

Connectivity refers to the connectivity (online status) between Switch and Cloud Service within a period (1 day or 7 days).

 Overview > Uplink

Uplink information includes the port, speed, duplex, uplink/downlink speed and uplink/downlink traffic.

 Overview > Speed Summary

Speed summary includes the uplink/downlink speed summary over the past 24 hours.

 Overview > Device Log


User Guide Monitoring

The device log records the historical operations, including online/offline, restart, upgrade, and VLAN change, and supports
queries based on log type and time.

 Overview > Config Log

The config log records the historical configuration delivery, and supports queries based on status and time.

 Overview > Port Log

The port log records the changes of port configuration, and supports queries based on port ID and time.

 Ports > Port Settings


User Guide Monitoring

Select one or multiple ports in the port panel to display and edit the port configuration, including admin status, duplex mode
and speed.

 Ports > Port List

Port list includes the information of all ports, including port ID, admin status, port status, duplex mode, port type, VLAN ID
and PoE status, and support queries based on admin status, port type and PoE status.

 Config > VLAN List

VLAN list includes the VLAN ID and the correspondingly ports.

 Config > Voice VLAN

You can enable the voice VLAN function on a switch.


User Guide Monitoring

In Global Settings, you can enable voice VLAN. When there is an IP phone in the network, you can set a higher CoS
priority to improve the quality of voice data.

You can manage the OUI of devices.

Edit the voice VLAN for a specified port or in batches.


User Guide Monitoring

 Config > SVI & DHCP

SVI & DHCP information includes VLAN ID, SVI and DHCP pool name. You can add, edit or delete the SVI or DHCP
configuration.
User Guide Monitoring

Click Add to configure the IP and subnet mask of a VLAN, and configure the name, IP segment, subnet mask and gateway
of DHCP service.

 Config > DHCP

Enable DHCP Snooping Status, select ports and click Save. The uplink port is selected by default if it is not routed port.
If the port connecting to the DHCP server is not an uplink port, please select it manually.

 Config > RLDP


User Guide Monitoring

Enable Status, select one or multiple ports, choose the troubleshooting method for a loop, and click Save. The
troubleshooting methods include Detection Disabled, Warning, Block, Shutdown-port and Shutdown-SVI. If Warning
is chosen, the Switch loop alarm should be enabled in the Alarm Settings page.

Click Auto Config to enable the default configuration.

 Config > Service List

Configure the admin status and login password of the eWeb service.
User Guide Monitoring

 Config > Configuration Backup List

The backup records include configuration file name, size, time, mode and MD5.

Click Current to display the current configuration. Click Backup in the Config Details page to back up the current
configuration.

Select one record, and click Download to download the configuration file.

Select one record, and click Restore to restore the current configuration.

Select one or multiple records, and click Delete to delete the backup record.

Select two records, and click Compare to compare the differences.


User Guide Monitoring

Description can be edited. Click Details in the Action column to check the backup configuration.

 PoE > PoE Port List

PoE statistics are displayed above PoE Port List, including the total power, current power and time.

PoE configuration includes the port, PoE-capable, PoE status, power, PD class and description.

 Diagnose > Fault Diagnosis

There are two types of fault diagnosis: PoE Power Supply and SFP Port. Select a port in the panel, click Diagnose, and
the diagnosis procedure is displayed as below.

Click History, and the diagnosis history is displayed.


User Guide Monitoring

Select a port in the panel, click Deep Diagnose, and click Diagnose in the PoE Diagnosis page.

Normal diagnosis: The Cloud server delivers CLI commands to collect the switch information, and the diagnosis occurs on
the Cloud server.

Deep diagnosis: The diagnosis occurs on the switch, and the results are reported to the Cloud server.

5.5.3.3 Basic Switch Operations

 Add

Select the network, and click Add. Both batch import and manual add are supported.

Click Download Template to download the template, enter switch information, and click ‘.xls’ File to import the template.

Click Add a Device, enter SN and alias of the switch, and click OK. Click to add multiple switches.
User Guide Monitoring

 Move to

Select one or multiple devices in the Switch List, click More > Move to, select the new network and click OK.

 Delete
User Guide Monitoring

Select one or multiple devices in the Switch List, click More > Delete and click OK.

 Reboot

Select one or multiple devices in the Switch List, and click Reboot.

 Web CLI

Select one or multiple devices in the Switch List, and click Web CLI. The Web CLI dialog box is displayed, and device
information can be queried via the menus in this dialog box. The menus vary with the products.
User Guide Monitoring

In addition, in the command entry box, the TAB key and question mark (?) both can complete a command.

5.5.4 Gateway

5.5.4.1 Gateway List

The Gateway List displays basic device information, including the online/offline status, SN, alias, management IP, MAC,
public IP, network, firmware version, offline time, model and description.

The Gateway List automatically refreshes every minute. Click to enable/disable the auto refresh function.

Above the list are the Add, Web CLI and eWeb functions. Click to display the Move to, Reboot, and Delete
functions. For more information, refer to Basic Gateway Operations.

The Search function supports fuzzy queries based on the serial number, alias and description, and also supports queries
based on online/offline status.

5.5.4.2 Device Details

 Web CLI
User Guide Monitoring

Click Web CLI, and the Web CLI page is displayed. The Web CLI page provides commonly-used CLI commands on the
left. Click the command, or manually enter the command and click Send.

 eWeb

Click eWeb to open the eWeb system in a new window.

 Telnet

Click Telnet, and a window is opened to connect to the gateway by Telnet protocol. Enter CLI commands to configure the
gateway.
User Guide Monitoring

 More > SSH

Click More > SSH, and a window is opened to connect to the gateway by SSH protocol. Use other SSH tools to connect
to the gateway.

 More > Reboot

Click More > Reboot to reboot the gateway.

 Refresh

Click to refresh all data in the page.


User Guide Monitoring

 Port Panel

The port panel imitates the actual gateway panel, displaying the port type and status.

 Basic

Basic information includes the alias, model, SN and other information. Alias, MGMT Password and Description can be
edited.

 Overview > CPU & Memory Usage

CPU & memory usage are displayed here.

 Overview > Device Status

Device status includes online status, online clients and sessions.

 Overview > Connectivity


User Guide Monitoring

Connectivity refers to the connectivity (online status) between Gateway and Cloud Service within a period (1 day or 7 days).

 Overview > Speed Summary

The uplink/downlink speed summary over the 24 hours is displayed.

 Overview > Client Summary

The client statistics over the 24 hours are displayed.

 Overview > CPU/Memory Summary

CPU/memory summary over the 24 hours are displayed.

 Overview > Session Summary


User Guide Monitoring

Session summary over the 24 hours is displayed.

 Overview > Top 10 Applications by Traffic

Top 10 applications by downlink traffic are displayed.

 Overview > Top 10 Users by Traffic

Top 10 users by downlink traffic are displayed.

 Overview > Device Log


User Guide Monitoring

The device log records the historical operations, including online/offline, restart, upgrade and VLAN change, and supports
queries based on log type and time.

 Overview > Config Log

The Config log records the historical configuration delivery, and supports queries based on status and time.

 WAN > Port

Select one WAN port to display the corresponding port information and rate summary.

 WAN > Basic

Basic information includes the IP, subnet mask and description. If PPPoE is enabled and dialing port is configured, the
PPPoE information is displayed.

 WAN > Speed Summary


User Guide Monitoring

Uplink & downlink rate of WAN port are displayed. This page supports queries based on day, week and month. Click
to refresh the summary.

 WAN > Port Status

Packet loss rate and latency summary are displayed. This page supports queries based on day, week and month. Click

to refresh the summary.

 LAN > Port

Select a LAN port to display the corresponding information of its switch port, routed port and subinterface.

 LAN > Switch Port

Switch port information includes the switch port, including duplex and speed.

 LAN > Routed Port

Routed port information includes the IP address, subnet mask, LAN and description.

 LAN > Subinterface

Subinterface information includes the name, IP address, and VLAN.

 Config > Configuration Backup List


User Guide Monitoring

The backup records include configuration file name, size, time, mode and MD5.

Click Current to display the current configuration. Click Backup in the Config Details page to back up the current
configuration.

Click Back up and then click OK in the message box to back up the current configuration.

Select one record, and click Download to download the configuration file.

Select one record, and click Restore to restore the current configuration.

Select one or multiple records, and click Delete to delete the backup record.

Select two records, and click Compare to compare the differences


User Guide Monitoring

Description can be edited. Click Details in the Action column to check the backup configuration.

 PoE > PoE List

PoE configuration includes the port, physical port, PoE-capable, PoE status, power and PD class.

 Alarm
User Guide Monitoring

Insufficient bandwidth: When the bandwidth exceeds the specified percentage of threshold for several times, the alarm is
sent. The threshold, times and percentage can be configured manually.

Ping failure: When the Ping test failed for the specified times, the alarm is sent. The times and domain/IP address can be
configured manually.

High packet loss rate: When the packet loss rate exceeds the specified percentage of threshold for several times in 5
minutes, the alarm is sent. The times and threshold can be configured manually.

Besides, the corresponding alarm should be enabled in the Alarm Settings page. For insufficient bandwidth, the alarm
types are GW port downlink rate beyond threshold and GW port uplink rate beyond threshold; for Ping failure, the
alarm type is Abnormal path on the device WAN port; and for high packet loss rate, the alarm type is High packet loss
rate on the device WAN port.
User Guide Monitoring

After changing the configuration, click Save below.

When the modified bandwidth and the actual bandwidth do not match, click Fetch Channel Width to check the actual
bandwidth which will then be set as the threshold.
User Guide Monitoring

 Tunnel > Create Tunnel

Select the tunnel type and click Create Tunnel. The tunnel types include Telnet, eWeb and SSH.

 Tunnel > Tunnel List

Tunnel information includes tunnel type, host, port, destination device, expiration time and status. Click Re-create in the
Action column to re-create a tunnel. Click Telnet/SSH in the Action column to open the corresponding page.

5.5.4.3 Basic Gateway Operations

 Add
User Guide Monitoring

Click Add, enter the SN, Alias and Web Password, and click OK to add a gateway to the network. Only one gateway can
be added to a network.

Before a gateway is authorized, it is displayed in the Unauthorized Gateway List. If authorization fails, you can click Re-
authorize in the Action column to re-enter the Web password to re-authorize the device.

 eWeb

Select the device to be managed by eWeb, and click eWeb. The system will try to connect the gateway and
automatically open the eWeb page in a new window.
User Guide Monitoring

If a tunnel is created successfully but the eWeb page does not automatically open, the system will pop up a message.
The user can manually click the link to open the page.

 Move to

Select the device in the Gateway List, click More > Move to, select the new network and click OK. Only one gateway
can be moved at a time.
User Guide Monitoring

 Reboot

Select the device in the Gateway List, click More > Reboot and click OK.

 Web CLI

Select the device to be managed by CLI command, click Web CLI. The Web CLI page provides commonly-used CLI
commands on the left. Click the command, or manually enter the command and click Send. Only one gateway can be
configured at a time.
User Guide Monitoring

 Delete

Select the device in the Gateway List, click More > Delete and click OK.

5.5.4.4 Cloud Portal Auth

Reyee EG devices support Cloud portal authentication, including one-click, voucher, account, SMS (integrated with
Twilio) authentications.
User Guide Monitoring

5.5.4.5 IPTV

When ISP link provides 2-3 VLANs for Internet, IPTV and IP phone, you can configure the VLAN in Device Details >
IPTV for different services (only supported on Reyee device with the R55 or a higher version).
User Guide Monitoring

5.5.4.6 DynDNS Configuration

You can connect to a device through a customized domain name. This function is supported on partial models of
gateways and home routers.

Click the SN of device to open the Device Details page. If the device supports DynDNS, you can configure No-IP or
DynDNS on the Dynamic DNS tab according to your requirements. Please note that the domain is required when
configuring DynDNS.

After configuration, please wait until the connection succeeds. The real-time progress is displayed in the Connection
Status.
User Guide Monitoring

5.5.5 Home Router

5.5.5.1 Home Router List

The Home Router List displays basic device information, including the online/offline status, SN, MAC, alias, management
IP & public IP, offline time, network, model, firmware version and description.

The Home Router List automatically refreshes every minute. Click to enable/disable the auto refresh

function.

Above the list is the Add function. Click to display the Move to, Delete, Export, and Reboot functions. For more
information, refer to Basic Router Operations.

The Search function supports fuzzy queries based on the serial number, alias and description, and also supports queries
based on online/offline status.

Click the record in the Sync column to open the Config Status page. On this page, you can deliver one or all configurations.
User Guide Monitoring

The number of devices which have available firmware for upgrade is displayed on the upper-left corner of the AP List page.
Click New Firmware to display the New Firmware List. Then click Go To Upgrade to enter the MAINTENANCE >
UPGRADE > Upgrade page.

For more information, refer to Device Details.

5.5.5.2 Device Details

Click the serial number in the device list to open the details page for a single device. The page displays detailed device
information, including basic information, performance data, speed data, client data, online/offline status, and device logs.

Router information is described as:

 Router Info
User Guide Monitoring

The basic information includes serial number, MAC address, management IP address, device model, configuration status,
firmware version, hardware version, alias, and description.

 Status

The performance data includes the router connection status, online client count, CPU usage, and memory usage.

 Connectivity

Router connectivity refers to the connectivity (online status) between router and Cloud Service within a period (1 day or 7
days).

 Speed Summary

You can choose to view the router speed statistics in the last 24 hours or the last 1 week.

 Device Log
User Guide Monitoring

The device log records the historical operations, including online/offline, restart and upgrade records, and supports queries
based on the log type and period.

5.5.5.3 Basic Router Operations

 Add

Select the network, and click Add. Both batch import and manual add are supported.

Click Download Template to download the template, enter router information, and click ‘.xls’ File to import the template.

Click Add a Device, enter SN and alias of the AP, and click OK. Click to add multiple APs.
User Guide Monitoring

 Move to

Select one or multiple devices in the Home Router List, click More > Move to, select the new network and click OK.

 Delete
User Guide Monitoring

Select one or multiple devices in the Home Router List, click More > Delete and click OK.

 Reboot

Select one or multiple devices in the WiFi Router List, and click Reboot.

5.5.5.4 Web CLI

Select one or multiple devices in the Home Router List, and click Web CLI. The Web CLI dialog box is displayed, and
device information can be queried via the menus in this dialog box. The menus vary with the products.

In the command entry box, the TAB key and question mark (?) both can complete a command.

5.5.5.5 IPTV

When ISP link provides 2-3 VLANs for Internet, IPTV and IP phone, you can configure the VLAN in Device Details >
IPTV for different services (only supported on Reyee device with the R55 or a higher version).
User Guide Monitoring

5.5.6 Wireless Bridge

5.5.6.1 Wireless Bridge List

The Wireless Bridge List displays basic device information, including the online/offline status, SN, MAC, alias,
management IP & public IP, offline time, network, model, firmware version and description.

The Wireless Bridge List automatically refreshes every minute. Click to enable/disable the auto refresh
function.

Above the list is the Add function. Click to display the Move to, Delete, Export, and Reboot functions. For more
information, refer to Basic Bridge Operations.

The Search function supports fuzzy queries based on the serial number, alias and description, and also supports queries
based on online/offline status.

5.5.6.2 Device Details

Click the serial number in the device list to open the details page for a single device. The page displays detailed device
information, including basic information, connectivity, diagnosis, neighbor devices, and device logs.

 Device Information

The basic information includes serial number, MAC address, management IP address, device model, synchronization
status, firmware version, hardware version, alias, and description.

 Connectivity
User Guide Monitoring

Refers to the connectivity (online status) between wireless bridge and Cloud within a period (1 day or 7 days).

 Neighbor Device List

You can discover other wireless bridges in the same LAN.

 Device Log

The device log records the historical operations, including online/offline, restart and upgrade records, and supports queries
based on the log type and period.

5.5.6.3 Basic Bridge Operations

 Add (Recommend to use Ruijie Cloud App)

Select the network, and click Add. Both batch import and manual add are supported.

Click Download Template to download the template, enter wireless bridge information, and click ‘.xls’ File to import the
template.
User Guide Monitoring

Click Add a Device, enter SN and alias of the wireless bridge, and click OK. Click to add multiple APs.

 Move to

Select one or multiple devices in the Wireless Bridge List, click More > Move to, select the new network and click OK.

 Delete
User Guide Monitoring

Select one or multiple devices in the Wireless Bridge List, click More > Delete and click OK.

 Export

Click More > Export to export all wireless bridges, or select one or multiple devices to export.

5.5.6.4 Web CLI

Select one or multiple devices in the Wireless Bridge List, and click Web CLI. The Web CLI dialog box is displayed, and
device information can be queried via the menus in this dialog box. The menus vary with the products.

5.6 CAMERA

5.6.1 Cameras
 Camera List

The Camera List displays the camera information, and you can filter cameras based on switch.
User Guide Monitoring

 Detect

Cameras can be detected by Ruijie Cloud or NVR.

Click Detect to start detection.

 Add NVR

Click Add NVR to add the NVR.


User Guide Monitoring

5.6.2 NVR
The NVR List displays the NVR information.

Click Check Connectivity to view the connection status of device.

5.7 CLIENT
Select MONITORING > CLIENT to open the Client page.
User Guide Monitoring

5.7.1 Client List


The Client List displays the information about online clients and historical clients of the current network.

You can switch between Online Clients and History Clients. The client information includes basic information, AP
Location, band, and online time.

Click MAC in Client List, and the Client Details page is displayed.

5.7.2 Client Details


 Client Info

Client Info includes alias, online status, MAC etc.

 Performance

Performance displays the traffic summary etc.


User Guide Monitoring

 Online/Offline Record

Online/Offline Record displays AP SN, AP alias, IP, SSID etc.

 Roaming Record

Roaming Record displays roam-in AP, source AP, SSID etc.


User Guide Configuration

6 Configuration

This module enables you to configure the following items:

 PROJECT

 WIRELESS

 AUTHENTICATION

 ADVANCD

6.1 PROJECT

6.1.1 Project Management


To facilitate the project management, especially when you have a number of projects, Ruijie Cloud optimizes the Project
page.

The left menu displays the network hierarchical structure. Each node can be a project group or a project. You can click a
node to display the corresponding project information.

 If the node is a project group, its projects will be displayed.

 If the node is a project, its sub projects will be displayed.


User Guide Configuration

 If the node is a project group, you can add a new project.

 If the node is a project, you can add a new sub project.

6.2 WIRELESS

6.2.1 Basic
If a network is not configured, it will inherit configuration from its parent network by default. You can create a config file or
import a config file from other networks. If there is any captive portal template unavailable for the network, then you can
not import the config file.

The Basic page displays Wireless Configuration, Security, and Advanced Settings.
User Guide Configuration

6.2.1.1 SSID

Click + in the upper left corner to add an SSID. In addition, the SSID page further enables you to configure the rate limit
and the authentication function. Parameters on the SSID page are defined as follows.

WLAN ID: Select a WLAN ID. An SSID matches a WLAN ID one-to-one. The WLAN ID can be specified only when an
SSID is added and cannot be changed subsequently. The maximum value of WLAN ID is 32.

SSID: Enter an SSID name.

Encryption Mode: Four modes are available: OPEN, WPA-PSK, WPA2-PSK AND WPA2-ENTERPRISE (802.1X).
OPEN indicates that no password needs to be configured; WPA-PSK or WPA2-PSK indicates that a password needs to
be configured. WPA2-Enterprise(802.1x) indicates that the 802.1x authentication mode is adopted for the SSID. After
the 802.1x authentication mode is selected, the following page is displayed. PPSK indicates that each terminal device is
bound with a unique WiFi account and key. After the PPSK mode is selected, you need to configure your account in
CONFIGURATION>AUTHENTICATION>PPSK.
User Guide Configuration

Click to add an authentication server. A dialog box for a Radius server configuration is displayed, as shown in the

following figure.

Server IP, Authentication Port, Accounting Port, and Key can be configured for a RADIUS server. Authentication
Port and Accounting Port are optional, and respectively set to the default values 1812 and 1813 if no values are
entered. The jitter prevention function can be configured in 802.1x authentication mode, as shown in the SSID
configuration page with Encryption Mode set to WPA2-Enterprise(802.1x). In case of jitters: after the jitter prevention
function is enabled (the jitter prevention duration range is 0–600), clients will not go offline within the duration of jitter
prevention. The default jitter prevention duration of an AP is 2 seconds. Note that the jitter prevention function may not
be supported in earlier AP versions. In addition, the Advanced Settings function is provided for 802.1x authentication. In
Advanced Settings, the NAS IP address (available in the NAT environment) and accounting update period can be
configured and the added authentication server can be managed.

Hidden: Specify whether to hide the SSID, which can be set to Yes or No.

Forward Mode: Select a forward mode of a wireless AP. NAT indicates that an IP address is allocated to a client by an
AP; Bridge indicates that an IP address is allocated to a client by an AP’s upstream device. A VLAN ID must be
configured when the Bridge mode selected.
User Guide Configuration

NAT Address Pool Configuration: Click the NAT Address Pool Configuration link to display the window.
Support customized DNS configuration in NAT DHCP Pool.

Wi-Fi6: RGOS and Reyee APs support Wi-Fi6 configuration. On Reyee APs, Wi-Fi6 can be enabled based on SSID.
On RGOS APs, Wi-Fi6 can only be enabled based on Radio. After enabling, Wi-Fi6 is applied to the radio corresponding
to the SSID.

5G-Prior Access: It is enabled when the SSID is associated with Radio 1 and Radio 2 for dual-band APs (2.4 GHz and 5
GHz) to ensure that clients supporting dual bands access the 5 GHz frequency band preferentially. This reduces the load
in the 2.4 GHz frequency band and improves user experience.

Rate limit: Specify whether to enable the rate limit function for a client. When this function is enabled, uplink and
downlink rates must be configured.

Auth: Common APs support External Portal and Captive Portal authentication.

6.2.1.2 External Portal

You can configure the External Portal when using an external authentication server.

Enable Auth and select External Portal. Enter correct information and click OK.
User Guide Configuration

6.2.1.3 Captive Portal

You can configure the Captive Portal when using Ruijie Cloud for authentication.

1. On the SSID page, enable Auth and select Captive Portal.

2. Enable Seamless Online and select the portal.


User Guide Configuration

6.2.1.4 Apartment WiFi

To configure different SSIDs for APs, enable Apartment WiFi in Basic > SSID > More.
User Guide Configuration

6.2.1.5 Radio

The Radio page enables you to configure the AP radio ports. As shown in Figure 4-4, the Radio page provides the
On/Off and Max Clients items. Parameters on the Radio page are defined as follows:

On/Off: Specify whether to enable the radio function. When it is set to Off, the SSID is invalid; the corresponding SSID
can be used properly only when this function is set to On.

Max Clients: Enter the upper limit of associated clients in a frequency band.

DFS: After enabling DFS, the device will automatically change a channel when detecting radar interference,
The function is only supported on RGOS devices.

Deletion of radio configurations indicates that the system preserves the current configurations.
User Guide Configuration

6.2.1.6 Security Configuration

As shown in the preceding figure, Web Password, Telnet Settings, Client Isolation, and Wireless Intrusion
Detection can be configured.

Web Password: Enter the Web login password of an AP. When the password is empty, the system does not push the
password to AP.

Telnet Settings: Enable the Telnet service of AP. When the Telnet service is enabled, the password is required.

Client Isolation: Clients are isolated without affecting their network access to ensure that they cannot communicate with
each other, thereby ensuring client service security. AP-based client isolation or AP&SSID-based client isolation can be
selected. If AP-based client isolation is enabled, all layer-2 clients associated with the same AP cannot communicate
with each other. If AP&SSID-based client isolation is enabled, clients in the same WLAN on the same AP cannot
communicate with each other.

Wireless Intrusion Attack Detection: Include DDOS attack detection, flooding attack detection, AP spoof attack
detection, and weak IV attack detection. If this function is enabled, at least one of the preceding four detection functions
needs to be enabled.

6.2.1.7 Advanced Settings

AP RF Scheduling:

If AP RF Scheduling is disabled, AP will broadcast the SSID.

To specify the time of turning on/off WiFi, enable RF Shutdown Scheduling and configure the period.
User Guide Configuration

Whitelist: Enter whitelisted websites, and websites that can be accessed directly without authentication. For Facebook
social login, you need check on Facebook Whitelist so that clients can access Facebook API before authentication.

CLI Command: Enter commands to be pushed to APs. This function allows you to perform some configurations
unsupported via CLI commands.

6.2.2 Layout
On the Layout page, you can bind an AP to a specific location after importing it to a network.

The Unbound Device List on the right displays APs that have been imported to the network, but are not bound to a
location. Click Config Layout to display the list.

Click Add Layout to add the local layout or map layout. The local layout can be used to bind the location of indoor APs
and the map layout can be used to bind the location of outdoor APs.
User Guide Configuration

Select an AP from in the unbound AP list and drag it to the target location.

6.2.2.1 Unbind APs

AP unbinding is different from AP deletion. AP unbinding removes the binding relation between an AP and a location, but
the AP still exists in the network and can be managed. AP deletion deletes an AP from a network and the AP cannot be
controlled after being deleted.

The AP unbinding methods are:

Method 1: Select an AP, and click to unbind the AP from a location. An unbound AP will then be
moved from a network to its parent network.

Method 2: If a location is already bound with an AP, you can drag another AP to the location to replace the old one.

6.2.3 Radio
Radio planning can adjust channels and power of APs in the same area to optimize the channel allocation and power of
the APs. Proper RF configuration planning can reduce channel interference, increase channel utilization and improve
overall wireless performance and capacity.
User Guide Configuration

Select CONFIGURATION > WIRELESS > Radio to enter the configuration page. Both manual and automatic planning
are currently supported.

6.2.3.1 Radio Settings

On the Radio Settings page, select the country and Channel Width.

For 2.4G channels, the bandwidth can be 20 or 40 MHz.

For 5G channels, the bandwidth can be 20, 40, 80, or 160 MHz.

6.2.3.2 Smart RRM

The automatic RF planning function allows Cloud to calculate the optimal channel configurations and power values for
APs by using the radio resource management (RRM) algorithm according to RF information collected by each AP.
Optimal recommended configurations can be applied to the APs.

The entire process of the automatic RF planning includes three parts:

1. Cloud triggers APs to scan and upload RF information.

2. Cloud calculates the optimal recommended configurations.

3. The optimal recommended configurations are applied to the APs.

The automatic RF planning supports network-based planning only.


User Guide Configuration

The AP RF channel optimization algorithm staggers RF channels of neighboring APs respectively based on the 2.4 GHz
frequency band and the 5 GHz frequency band while ensuring as much as possible that original configurations are
unchanged. To reach optimal power, The AP power optimization algorithm automatically increases or decreases the RF
power for an AP according to the co-channel interference.

After a network is selected on the RF planning page, a page for automatic RF scanning and planning of the network is
displayed. On this page, the APs of a network can be triggered to scan the RF, display recommended RF configurations
calculated after scanning, and save the recommended RF configurations to APs.

The Recent RF Scan History page displays historical records of automatic RF scanning and planning. Each record
shows triggering information got each time, including the automatic RF planning status, the start time, the end time, the
status (Initializing/Scanning/RRM analysis/Finish/Failure), whether to apply to the APs, and the running logs.

 Smart RRM

There are two execution modes: immediate and periodic. Click Scan Now, and Cloud starts RF scanning. Data will be
uploaded after scanning.

 Schedule Settings

On the Schedule Settings page, Periodic Execution can be enabled.

When a periodic task is triggered, this periodic task is automatically canceled if the network is already in a scanning
triggered state (for example, immediate execution is being triggered).
User Guide Configuration

 Related parameters

(1) Scan Mode

Quick Scan: This mode enables APs to provide the WiFi service properly during scanning. However, data acquired in this
mode is not as accurate as that in the Deep Scan mode. The calculation result based on the data in this mode is less
accurate than that in the Deep Scan mode. This mode is applied when it is expected that the current network is not
affected.

Deep Scan: This mode is also referred to as the enhanced mode, and causes wireless clients to go offline at the
beginning and ending of the scanning. Data acquired in this mode is more accurate than that in the Quick Scan mode,
and the automatic RF planning based on the data is more accurate. This mode shall be applied at the initial stage of the
overall network planning or when disadvantages of this mode are tolerable.

(2) Sync to Device

If this function is enabled, the RF scanning result will be automatically pushed to the AP. In this case, skip step 3.

(3) Manually push the RF optimization results (synchronize the RF configurations to the APs).

Skip this step if Sync to Device is enabled.

After the status in the record of the triggered RF planning displays Finish, check the planning results, and synchronize
the recommended automatic planning RF configurations to the APs.

It allows you to directly view RF optimization results, and directly push the optimized configurations to APs of a network,
without relying on the location planning. It is convenient and suitable for fast deployment, and can be used when the APs
have no location planning or are not bound.

(4) Click Recent RF Scan History in the list to display the automatic RF planning result list of the APs.
User Guide Configuration

In the RF optimization result list of the APs, Recommended Power indicates a recommended power value for the
current channel. Recommended Signal Power indicates a recommended power value for the recommended channel. It
is calculated based on the recommended channel, and is configured together with the recommended channel.

(5) Click in the trigger record, and select a mode to push the recommended optimization

configurations to the corresponding APs.

Three modes are available: pushing the recommended channel configurations, pushing the recommended power
configurations of the current channel, and pushing the recommended power configurations of the recommended channel.
Any of the three modes can be selected as required.

If an AP has been bound to a location and has been synchronized with RF configurations of the location. This
operation will remove the RF synchronization between the location and the AP, and push the selected
recommended optimization configurations to the AP.

6.2.3.3 Manual Planning

You can also manually configure the RF of a network. First, select a network to open the Manual Planning page. You
can select a radio type (2.4 GHz/5 GHz) in the Radio Select drop-down list. The number inside the location icon
indicates the current channel, and the power percentage is displayed when you point to the location icon.

The RF channel or power data is not displayed during configuration.

Click a location icon to display the RF channel and power configurations on the right. If the location is bound to an AP,
the SN of the bound AP is also displayed.

To perform manual RF planning:

1. Set the RF configurations of a location in one of the following ways:

 Configure one location


User Guide Configuration

Click a location icon, configure parameters the right, and click Apply.

 Configure locations in batches

This function is used to configure the RF channel and power for a large batch of locations, and is suitable for a scenario
with many locations on a network.

Click above the location diagram to configure the power percentage for all locations of a network.

2. Synchronize the RF configurations of the location to a bound AP

Click above the location diagram to synchronize the RF configurations of the corresponding location to the
bound AP.

Batch operations for multiple locations can be select before clicking .

After the synchronization is successful, is displayed in the lower right corner. At this point, the configurations of the

location are synchronized to the bound AP.

If the Bind or Unbind operation is performed, RF configurations are synchronized to or removed from the AP.

6.2.3.4 AC Smart RRM

In the AC network, click Radio Planning to open the Smart RRM page.
User Guide Configuration

Check “I have read the above note”, and click to start RRM. The whole process takes about 10 to 15

minutes.

Enable Scheduled RRM to configure the time, and RRM will start at the set time.
User Guide Configuration

6.2.4 Wi-Fi Optimization


Ruijie Cloud supports one-click Wi-Fi optimization on both Reyee APs and Enterprise RGOS APs. When you add or
replace an AP, you can run this function to optimize the RF configuration or schedule the optimization.

After optimization, the optimization records will be displayed.

You can also schedule the optimization during the specified time. Click Optimization Schedule, and select the day and
time for optimization.
User Guide Configuration

6.2.5 Roaming
Roaming planning refers to enabling network-based roaming.

L3 Roaming: You can seamlessly connect to APs with different VLANs. It is enabled by default.

L2 InVLAN Tunnel Forwarding: You can seamlessly connect to APs with the same VLAN. It is enabled by default.

For wireless roaming, SSID signals must be consistent; otherwise, roaming may fail.
User Guide Configuration

6.2.6 Bluetooth
Bluetooth configuration functions include Bluetooth configuration import, configuration adding for a single AP,
configuration modification, and configuration deletion, as shown in the following figure:

 Import Bluetooth Configuration in Batches

Click Import, and click Download Template to download the template corresponding to APs in the current network and
set corresponding parameters in the file. Requirements for the UUID, Major, and Minor parameters are:

UUID: Enter a string of 32 characters in hexadecimal format.

Major: Enter a string of 4 characters in hexadecimal format.

Minor: Enter a string of 4 characters in hexadecimal format.

After the parameters are filled, click '.xls' File to import the file.

 Add Bluetooth Configuration for an AP

Click Add, enter the parameters as required to add a Bluetooth configuration for one AP and click Save. If a Bluetooth
configuration is already configured for the AP, the existing Bluetooth configuration will be updated.
User Guide Configuration

 Edit Bluetooth Configuration for an AP

Click the icon in the Action column, edit the parameters and click Save.

6.2.7 Load Balancing


The AP load is imbalanced as the distribution of clients is uneven. As a result, the user experience of clients who are
associated with heavily loaded AP may be affected. To solve the problem, you can create a load balancing group to
evenly distribute clients across APs to enhance the user experience. Please note that load balance is only supported on
RAPs in the network with Reyee EG.

There are two types of load balancing policies: Client Load Balancing and Traffic Load Balancing.
Client Load Balancing: When the difference of client number between 2 APs reaches the threshold, the AP with heavy
load will deny the association of a new client, and the client can only associate with another AP in the group. After the
number of client association is denied for the specified times, it will be allowed to associate with the AP upon the next
attempt.
User Guide Configuration

Traffic Load Balancing: When the difference of AP traffic load between 2 APs reaches the threshold, the AP with heavy
load will deny the association of new client, and the client can only associate with another AP in the group. After the
number of client association is denied for the specified times, it will be allowed to associate with the AP upon the next
attempt.

After a load balancing group is added, you can delete it or edit its configuration.
User Guide Configuration

You can change the parameters of balancing policy and the APs in group. Please note that an AP can only be added to a
load balancing group.

6.3 AUTHENTICATION

6.3.1 Captive Portal


On the Captive Portal page, you can edit the portal template. If you enable Auth when configuring SSID and select the
Captive Portal option, you can select an existing portal template.

Select CONFIGURATION > AUTHENTICATION > Captive Portal to open the Captive Portal page, and select a
network on the top to filter captive portals.
User Guide Configuration

When Captive Portal is enabled, SSID can associate with the templates. You can manage templates under a network,
but only use or associate templates under a sub-network.

6.3.1.1 Captive Portal List

The list displays all captive portal templates, including thumbnails, name, association status, creation time and
description.

 Add Captive Portal

Click or to open the Add Captive Portal page. Enter name, description and post login URL, and
select login options. After Status Balance Page is enabled, you can check your balance information after login.
User Guide Configuration

There are four login options: One-click Login, Voucher, Account and Facebook Account.

One-Click Login: You can set Access Duration and Access Times Per Day.

The page for One-click Login:

Voucher: You can log in with the voucher code.

The page for Voucher:


User Guide Configuration

Account: You can log in with the account and password.

The page for Account:

Facebook Account: You can log in with your Facebook account, and Facebook Like is available. When Facebook Like
is enabled, you need to provide the corresponding URL, Profile Photo, Page Name and Description.
User Guide Configuration

The page for Facebook Account Login:

Note: if you select Facebook Account, you need to enable Facebook Whitelist at the Advanced Settings panel.

You can also select multiple login options. The page for One-click Login, Voucher, Account and Facebook Account
Login:
User Guide Configuration

 Portal Page

You can customize the content and style of the login page. The previews on the mobile phone and PC are displayed on
the right.

Note: Each type of authentication supports a maximum of three languages. During authentication, users can select a
language switching icon in the upper right corner of the authentication page to switch the language.
User Guide Configuration

In the Basic tab, set the logo picture, background color or image, welcome massage, marketing message, terms &
conditions and copyright.

In the Advanced tab, set the Logo position, background mask color/opacity, text color/size. Click Reset Style to restore
the default style.
User Guide Configuration

Click on the bottom to save.

6.3.1.2 Edit Captive Portal

Click to edit a template, and click to save.

6.3.1.3 Delete Captive Portal


User Guide Configuration

Click and then click in the confirmation window to delete a template.

If the template is associated to an SSID or applied to the EG, then you need to dissociate it before delete.

6.3.1.4 Apply to EG

Click to synchronize the captive portal template to the EG.

If no EG exists in the current network, you can click to open the MONITORING > DEVICE > Gateway page.

If there is an EG in the current network, the page is displayed as below:


User Guide Configuration

Only 1 template can be synchronized to an EG. Select a template and click .

After the template is applied, the date of last synchronization will be displayed above.

6.3.2 PPSK

6.3.2.1 PPSK Authentication

PPSK combines the advantages of PSK and 802.1x. It prevents the network from being stolen. Each terminal device is
bound with a unique WiFi account and key so that the key will not be shared. This is called “One Client, One Password”.

The main tasks of the PPSK administrator:

 Log in to Ruijie Cloud and deploy the network so that APs can access the Ruijie Cloud.

 Set the authentication mode of SSID to PPSK (the administrator can do it directly).
User Guide Configuration

 On the PPSK Configuration page, an enterprise can enable the PPSK function and choose the network.

 Open account for staffs in batches.

Staffs can connect to the SSID with a unique WiFi key allocated by the administrator and access the Internet.

6.3.2.2 Configuration Steps

1. Choose CONFIGURATION > WIRELESS > Basic, click , and set the Encryption Mode as PPSK.

2. Choose CONFIGURATION > AUTHENTICATION > PPSK.

3. Click Add to batch import or manually add new accounts.

4. Click the view button on the Action column of the PPSK list to check PPSK Sync Log.
User Guide Configuration

5. Bind MAC address for accounts in the PPSK list.

6.3.3 Voucher

6.3.3.1 Voucher Authentication

Voucher authentication on Ruijie Cloud allows you to charge users for accessing wireless network by access codes.
Concurrent users, time period and data quota limit can be customized and offered to your guests.

6.3.3.2 Configuration Steps

1. Enable Voucher function in the Captive Portal mode of SSID under the corresponding network.

2. Select CONFIGURATION > AUTHENTICATION > Voucher.

3. Select Manage Package > Add Package to define a voucher type for your guests.

4. Click OK to go back to the Voucher page and click Print Voucher.


User Guide Configuration

5. Support customizing the logo and profile information for voucher printing.

6. Click the Print button.

6.3.3.3 Bind/Unbind MAC

If Bind MAC is enabled for the package, the voucher code used by a device will be bound with its MAC address. The
number of bound MAC can be set in Max Concurrent Devices. When the Status is Activated or Depleted, you can

click in the Bind MAC column to unbind MAC addresses.


User Guide Configuration

6.3.4 Account

6.3.4.1 Account Authentication

Account authentication requires the valid account and password. Concurrent users, time period and data quota limit can
be customized and offered to your guests.

6.3.4.2 Configuration Steps

1. Enable Captive Portal in the SSID page, and select a template with Account Authentication.

2. Select CONFIGURATION > AUTHENTICATION > Account.

3. Select Manage Profile > Add Profile to define an account type for your guests.

4. Click OK to go back to the Account page and click Add Account.


User Guide Configuration

5. Click Add an Account, enter the account and password, select the package, and click Save.

6. Connect to the SSID, select Account Login in the pop-up page, enter the account and password created in the last
step, and click Login.
User Guide Configuration

6.3.5 Easy Sharing

6.3.5.1 Share

You can share the PPSK, voucher and account to other users by using a sharing link.

Click the icons in Action column to share PPSK, cancel sharing or check sharing logs.
User Guide Configuration

Click in the Action column to generate an Easy Sharing link.

Click Copy to copy the sharing link.


User Guide Configuration

The operation of sharing vouchers and accounts are similar.

6.3.5.2 Receive

Visit the sharing link, and log in to Ruijie Cloud first.

After login, the Accept Sharing page will be displayed.


User Guide Configuration

After accepting the PPSK, the PPSK management page will be displayed.

6.4 ADVANCED

6.4.1 Batch CLI Config


Ruijie Cloud supports configuring CLI commands on RGOS devices in batches.

6.4.1.1 Batch CLI Config Status

You can check the configuration delivery status, or stop its delivery.
User Guide Configuration

6.4.1.2 Batch Configure CLI Commands

To batch add the configuration to be delivered, Click Add.

To apply the configuration to the specified devices, select the devices and click Apply; to deliver the configuration to all
devices, click Apply All.

Set the application time, enter commands or select the existing command sets, and click Apply.
User Guide Configuration

6.4.1.3 Check Result

You can click Result in the Action column to check the delivery result.

6.4.2 Customize CLI Set


You can add, delete or edit the existing command sets which can be used in batch configuration.
User Guide Configuration

6.4.3 AP VLAN
Reyee APs support batch VLAN configuration (RAP1200(F)/RAP1200(P)). You can filter APs by model, SN etc, and
configure the port type and VLAN ID.
User Guide Configuration
User Guide Maintenance

7 Maintenance

The Maintenance module mainly provides the following functional services:

 LOGS

 UPGRADE

7.1 LOGS

7.1.1 Operation Log


This page shows operation logs.

Click to check log details.

General operation log details are shown as follows:


User Guide Maintenance

7.1.2 Config Log

7.1.2.1 Action View

The configuration logs record the information about configuration changes and pushing in three levels. In the figure, the
first level records operation types that cause the configuration change or configuration pushing. The operation types
include: apply templates, update templates, switch templates, and version upgrade. In addition, the first-level logs also
record the running status statistics and some parameters.

1. Click to check APs involved by the operation type.

2. Click the rightmost action column ( ) of the second-level logs to check the push status of each configuration item.

The following figure shows an example of full configurations, including the configuration execution status of SSID, Radio
and so on.

7.1.2.2 Device View


User Guide Maintenance

Click the rightmost action column ( ) of the second-level logs to check the push status of each configuration item.

The following figure shows an example of full configurations, including the configuration execution status of SSID, Radio
and so on.

7.1.2.3 Config Log

You can select Recent Log to check the configuration logs in the past 7 days.
User Guide Maintenance

7.1.3 Upgrade Log


This part provides the upgrade tracing function, and enables checking upgrade status, aborting the upgrade, and retry.

Click to check log details.

Click to top the upgrade task if the upgrade command has not been pushed.

Click to restart the upgrade task that failed or was aborted.

Click to restart the upgrade task.

Click to stop the upgrade task.

Abort: You cannot stop the upgrade task if the upgrade command has been pushed to the AP.

Retry: You can only restart the failed or aborted upgrade task.

7.2 UPGRADE

The following tab pages are provided for device firmware management:

 Upgrade

 Firmware
User Guide Maintenance

7.2.1 Upgrade
Ruijie Cloud supports the online upgrade of device firmware, and allows network administrators to utilize the latest features
and security enhancement for Ruijie devices. Online upgrade allows administrators to easily arrange the firmware upgrade
in their networks and view firmware releases.

The following ways are available to check whether there is a new version for the device:

1) MAINTENANCE Menu (for all devices)

2) Upgrade in the Navigation Bar (for all devices)

3) AP List, Switch List and Gateway List (for devices in the network)
User Guide Maintenance

7.2.1.1 Check Version Information

Choose Maintenance > Upgrade to display the top 5 versions in pie chart form and a list for each network.

7.2.1.2 Upgrade

Four ways are available to enter the Upgrade page:

1. Point to MAINTENANCE, and a link will appear. Click the link to enter the Upgrade page. The default network
information is All.

2. On the AP List, Switch List or Gateway List, click New firmware to open New Firmware List. Then click Go to
Upgrade to enter the Upgrade page, and select and upgrade devices by Search.
User Guide Maintenance

3. Check the Firmware Version in AP List, Switch List or Gateway List. If there is any new version, the link will turn
into blue. Click the link to enter the Upgrade page, and select and upgrade devices by Search.
User Guide Maintenance

4. Click Go to Upgrade in Firmware List to enter the Upgrade page, and select and upgrade devices by Search.

7.2.1.3 Upgrade Devices

For convenience, two upgrade modes are provided:

 Upgrade Selected

Upgrade one or multiple devices of one type. It is suitable for a scenario with a few devices to be upgraded.

1. Select one or multiple devices of one type, and click Upgrade.

2. Select a firmware version.

On the Upgrade page, you can check the device information and version, click Select Firmware to select the target
version (the recommended version is the latest one), set scheduled upgrade and retry times accordingly, and click Start
Upgrade.
User Guide Maintenance

 Upgrade All

Upgrade all devices in the list. It is suitable for a scenario with a large number of devices. A network or a firmware
version number can be specified to perform fast upgrades.

1. Click Upgrade All.

2. Select the version and click Start Upgrade

3. You can check the upgrade result in LOGS > Upgrade Log.
User Guide Maintenance

If the upgrade is successful, log will show Upgrade succeeded.

Or check the results in the Recommend Version of Device List.

The numbers of devices which have available firmware for upgrade in MAINTENANCE Menu and Upgrade in Navigation
Bar will change accordingly.
User Guide Maintenance

7.2.2 Firmware

7.2.2.1 Version Details

The Version Details list displays the versions of firmware installed on all devices. Click Go To Upgrade in the Action
column to open the MAINTENANCE > UPGRADE > Upgrade page.

7.2.2.2 Private Firmware

The Private Firmware list displays the private firmware uploaded by all accounts under a tenant.
User Guide Maintenance

Click Upload Firmware to upload private firmware.

Click in the Action column to edit the Description of firmware.


User Guide Maintenance

Click Delete or in the Action column to delete private firmware.


User Guide System Settings

8 System Settings

8.1 Alarm Settings

Click in the upper right corner and select Alarm Settings. The Alarm Settings page is displayed for alarm

parameter configuration.

Alarm settings are configured by network. If no alarm is configured, the global settings are adopted.

On the Alarm Settings page, you can configure to receive alarms or not and in which way. When the Status is enabled,
alarm information is displayed on the Alarm page. Alarms can be pushed by Email and only when the Status is enabled.
When the Email Alarm is enabled, alarms will be pushed via Email to the contacts in the Contact List of the network.

Note: To use the Email Alarm function, click and select System Settings to preset the account and

password of the SMTP server for sending Emails on the Advanced page via the administrator account. For details
about the configuration page, see section 6.2.2.

8.2 Contact

On the Contact page, you can add contact and contact groups that will receive the alarm Emails.

8.2.1 Contact List


Add a contact as the Email recipient.
User Guide System Settings

8.2.2 Contact Group


Add a group and move the contacts to the group.
User Guide System Settings

8.3 Remote Assistance

Remote Assistance aims to provide a quick access for Ruijie Support to log in your Ruijie Cloud for configuration and
troubleshooting. Ruijie will not change your settings without your permission.

8.3.1 Configuration Steps


1. Click Remote Assistance on top right navigation bar.

Or click in the lower right corner, an online-help window will appear. Then click please click here.

2. Set the permission of remote assistance: In the Read-only mode, Ruijie Support can check but not modify user
data; in the Read and Write mode, Ruijie Support can check and modify user data.

3. Copy and share this link and password to Ruijie Support.

Note: Ruijie will not take any responsibility if remote assistance session is shared to non-Ruijie staff and services
are interrupted.
User Guide System Settings
User Guide Account

9 Account

Point to on the upper right corner, the Account menu is displayed, which includes Account, Sub Account and
Logout.

9.1 Account
The Account page is divided into the User Info, Modify Password and Modify Twilio Account area. In the User
Info area, you can edit the basic information of user (Username and Email is not allowed to be changed). In the
Modify Password area, you can change the login password.
User Guide Account

9.2 Sub Account


The Sub Account List displays the information of sub accounts. Click in the Action column to edit the sub account.
Click in the Action column to delete the sub account.

Click Add Sub Account to add a new sub account. Select the network, enter the Email in the Username box and click
Send Code. Enter the security code contained in the Email, set the password, language, full name, expiration date,
mobile and role, and click Save.

Role: Admin owns the permissions to create an account. Employee owns the permissions to edit data. Operator owns
the permissions to print voucher and view account data. Guest owns the permissions to view data.

The existing sub account can be added to the network so that a sub account can manage multiple networks.
User Guide Account

You can edit the name of project sharers for easy recognition.

9.3 Logout
Click Logout to exit the system and return to the login page.
User Guide Unbind Device

10 Unbind Device

Click Unbind Device, and enter the device SN to get URL. Configure the URL as the ACS URL on device, and the device
will automatically unbind on Cloud.
User Guide Application Examples

11 Application Examples

This chapter introduces how to quickly connect AP710 to the Cloud Service, and use the Cloud Service to manage AP320
to emit WiFi signals. For example, to deploy a network for a new branch, a WiFi network with the SSID of "SSID-FREE" is
provided for staff. The WiFi network is encrypted in wpa2-psk mode, with the password 12345678 and a rate limit of 100
Kbps for a connected client.

11.1 Wireless Roaming


To deploy a network for a new branch, a WiFi network "SSID-FREE" is provided for external personnel for free. The WLAN
for clients on floor 3 is divided into VLAN 10, and the WLAN for clients on floor 4 is divided into VLAN 20. The roaming
function is supported, and the uplink and downlink rates of all clients are limited to 100 Kbps.
User Guide Application Examples

11.1.1 Adding Network


Network planning is realized using Network.

1. Choose CONFIGURATION > NETWORKS.

2. Click Add Network to add “TestHotel” Network.

3. Click Add Sub Network to add “Building1” and “Building2” network, as shown in the following figure. You can add
more networks according to this method.

4. Choose CONFIGURATION > NETWORKS > More > Edit, and select the TestHotel network.

5. Enter a location name in the search box, select the location marked by on the map, and then click Save.
User Guide Application Examples

6. Choose MONITORING > DEVICE > AP, select the TestHotel > Building1 network, and click Add to add APs. APs
can be imported in batches or added one by one. Accordingly, add other APs in the Hotel > Building2 network.

11.1.2 Enabling Roaming Function


1. Choose CONFIGURATION > WIRELESS > Roaming.

2. Select the TestHotel network.

3. Enable the roaming function for this Network.

11.1.3 Adding Configurations


1. Choose CONFIGURATION > WIRELESS > Basic.

2. Click + under SSID, enter SSID-FREE in the SSID text box, set Forward Mode as Bridge, set VLAN ID as 10, set
Rate limit as 100 KB/s, and click Save.
User Guide Application Examples

3. Add the Building2 network with VLAN ID 20 according to the same method.

11.1.4 Importing APs


Bind AP1 and AP2 to the Building1 network, and bind AP3 and AP4 to the Building2 network.

11.1.5 APs Online


Gateway Configuration:

Add the AP address pool: 192.168.1.0/24.

Building1 client address pool: 192.168.10.0/24; gateway: 192.168.10.1; VLAN: 10

Building2 client address pool: 192.168.20.0/24; gateway: 192.168.20.1; VLAN: 20


User Guide Application Examples

PoE Switch Configuration:

On the port through which the PoE switch is connected to the AP, configure a trunk port with the native ID set to 1 by
default, and add VLAN 10 and VLAN 20.

11.1.6 Verification

11.1.6.1 Connecting to WiFi Signals

Connect a mobile phone to the WiFi network properly for Internet access.

11.1.6.2 Testing Wireless Roaming

Connect a mobile phone with the WiFi network “SSID-FREE”, and go upstairs from Building1 to Building2.
Reconnection and Internet access failure do not occur.

11.2 Authentication Scheme

11.2.1 External Portal


Third-party authentication servers adopt the WiFiDog protocol for authentication. The industrial APs interconnect with the
third-party authentication servers are based on the WiFiDog protocol.

It is necessary to learn about the interconnection protocol adopted by third-party authentication servers for
evaluation and confirmation by R&D personnel before interconnecting with the third-party authentication servers.
User Guide Appendix

12 Appendix

12.1 Acronyms and Abbreviations


Acronyms Full Name
and
Abbreviations
AP Access Point
AC Access Controller
BOSS Business & Operation Support System
DHCP Dynamic Host Configuration Protocol
DNS Domain Name Server
EAP Extensible Authentication Protocol
EAPOL EAP Over Lan
EAP AKA Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement
ESSID Extended Service Set Identification
FTP File Transfer Protocol
HLR/AuC Home Location Register
HTTP Hypertext Transfer Protocol
IMSI International Mobile Subscriber Identification
MSISDN Mobile Subscriber ISDN
NAT Network Address Translation
PAT Port Address Translation
Radius Remote Authentication Dial In User Service
SNMP Simple Network Management Protocol
SSID Service Set Identifier
UDP User Datagram Protocol
VPN Virtual Private Network
WEP Wired Equivalent Privacy
WPA Wi-Fi Protected Access
WAPI Wireless LAN Authentication and Privacy Infrastructure
WLAN Wireless Local Access Network

12.2 Glossary
Term Definition
Cloud Specify the cloud center management end, supports private and public clouds, allows separate
deployment of a system of a private cloud version, and provides cloud services of the public
cloud version.
Network Enable the device grouping for easy management of a large quantity of devices. It is
recommended that networks be added by geographical location or device use.

You might also like