No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

eSight V300R010C00 Maintenance Guide 07

Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
High-risk Operations on Network Management

High-risk Operations on Network Management

Table 2-1 High-risk operations on monitoring management

No.

Operation

Impact

Severity

Requirements

1

Enabling an alarm masking rule

Masked alarms or events are not displayed in the current alarm list or current event list.

Low

You need to check the masking range carefully to ensure the accuracy and prevent major alarms from being masked by mistake.

2

Disabling reporting of interface alarms

After reporting of interface alarms is disabled, the corresponding interface alarm cannot be reported, affecting network O&M.

Low

Before disabling reporting of interface alarms, ensure that non-reporting of the interface alarms meets the O&M requirements.

Table 2-2 High-risk operations on resource management

No.

Operation

Impact

Severity

Requirements

1

Disabling a device interface/port

If the interface is unavailable, the network may be faulty.

Medium

Check the function of the interface on the network and ensure that no network fault occurs after the interface is disabled.

2

Creating or deleting a device VLAN, configuring a port VLAN, and creating or deleting a VLANIF

Incorrect VLAN configuration may cause network faults.

Medium

Before the operation, you need to confirm the networking and VLAN planning.

Table 2-3 High-risk operations on service management

No.

Operation

Impact

Severity

Requirements

4

Network traffic service management: Delivering interface sampling ratio to the device

If the sampling ratio is too small, the forwarding performance of the device may be affected.

Medium

Exercise caution when performing this operation to ensure that service operations are correct.

5

SLA management: Creating a non-device periodic SLA task

After a task is created, the eSight SLA periodically sends NQA test instances to the device. If a large number of tasks are created on a device with the configuration change alarm enabled, a large number of device configuration change alarms may be generated.

Low

Exercise caution when performing this operation to ensure that service operations are correct.

Table 2-4 High-risk operations on configuration management

No.

Operation

Impact

Severity

Requirements

1

Deploying and clearing WLAN configuration

Services on the device will be changed. If the configuration is incorrect, services or the network may be interrupted.

High

Check the configurations to be deployed or cleared carefully to ensure that the configurations are delivered successfully.

2

Upgrading the device software

1. During the upgrade of the software package, the device is restarted and services are interrupted temporarily.

2. The installed cold patch takes effect only after the device is restarted. You need to manually select a restart policy. During the restart, services are interrupted temporarily.

3. Restart policies cannot be selected for the SVF AS and FitAP devices. These devices automatically restart during upgrade. Services are interrupted temporarily during restart.

High

1. Apply for a proper time window to perform the upgrade, preventing the upgrade from affecting normal network services.

2. Obtain the formal target version file from Huawei Support website. Verify that the file is correct and do not change the file name so that the upgrade can be normally performed. For details about the upgrade precautions, see the documents of the device.

3. Ensure that the device to be upgraded has sufficient storage space to load the upgrade files. If the storage space is insufficient, follow instructions in the product documentation of the corresponding device to release the storage space.

4. Before installing a patch, ensure that the patch matches the running software version on the device. If they do not match, the patch installation will fail.

5. eSight does not support the version upgrade that requires configuration file conversion after the device is upgraded to the target version. Ensure that the uploaded software version meets the requirements.

6. When the CE device is upgraded using the In-Service Software Upgrade (ISSU), check the precautions on the device networking, feature limitations, and version support to ensure that the ISSU upgrade check is successful. Follow instructions in the device upgrade guide to obtain the target version.

3

Restoring configuration files to the device

Services may be damaged or interrupted.

High

1. Check the device configuration, evaluate the service risks, apply for sufficient time, and obtain the customer's written authorization.

2. Ensure that the configuration to be uploaded is correct and complies with the service expectations.

4

Delivering configurations through the intelligent configuration tool

If the configuration is incorrect or a command is delivered to perform risky operations (such as deletion), the services or network may be interrupted.

High

1. Select a proper operation time to avoid affecting normal network services.

2. Do not deliver the reboot command. After a device is restarted, eSight cannot check whether the command is delivered successfully.

3. Disable the function for the device to record logs in the console to improve the configuration delivery success rate.

4. Check the delivered configurations, and ensure that the configurations are correct and comply with the service expectations.

5

Performing zero-touch provisioning

If the configuration is incorrect, services are abnormal.

Medium

1. The configurations to be deployed must pass the verification on real devices and be piloted in a small scope. Then, zero-touch provisioning can be performed at large scale.

2. Limited by the current concurrency performance of eSight, it is recommended that a maximum of 100 devices be deployed at a time to prevent configuration interaction from taking a long time to deliver the configuration.

6

Configuring the SVF

1. If the configuration is incorrect, the network or services may be interrupted.

2. Service configuration data is configured on eSight and applied to devices in batches. If you use other methods to modify device configuration, the planned configuration on eSight may be inconsistent with that on devices, which may lead to configuration conflicts.

High

1. Select a proper operation time to avoid affecting normal network services.

2. Perform synchronization before configuration deployment to avoid configuration conflicts.

3. eSight supports only configuration using service templates. If the AS stays in the independent configuration mode, switch the mode to the service template mode.

4. Check the template to be delivered carefully to ensure that the configuration is correct.

7

Executing the compliance check task

The audit commands for compliance check are written by users. The users need to ensure the accuracy of the commands. If the audit commands contain risky operations, the network may be interrupted or services may be interrupted and damaged.

Medium

1. Check the command lines carefully to ensure that no risky operation is performed.

2. Disable the function for the device to record logs in the console. If you enable the function, the audit result may be abnormal.

3. It is recommended that one task contain no more than 1000 rules. Too many rules may cause the page to stop responding.

Table 2-5 High-risk operations on report management

No.

Operation

Impact

Severity

Requirements

1

Using the data synchronization tool

If this operation is performed, the report service is unavailable before the synchronization is complete.

High

Use this tool with caution. Consult Huawei engineers before using this tool.

2

Deleting a report

After a report is deleted, the corresponding report file is deleted directly and cannot be retrieved.

Medium

Before deleting a report, ensure that the corresponding report file does not need to be used anymore.

3

Frequently clicking the button to clear the report cache

Reports may fail to be queried in a short period of time.

Low

Refresh the cache only when necessary and do not perform the operation frequently.

Table 2-6 High-risk operations on the maintenance tool

No.

Operation

Impact

Severity

Requirements

1

Restoring data using the maintenance tool

The database data and eSight files in the current environment are overwritten.

Medium

Exercise caution when performing this operation to ensure that the operation is necessary.

Table 2-7 High-risk operations on WLAN management

No.

Operation

Impact

Severity

Requirements

1

Deleting an AP

The AP goes offline and wireless users go offline.

High

Specify the AP to be deleted and select a proper time to perform the operation with caution.

2

Restarting an AP

Wireless users go offline when the AP is restarted.

High

Specify the AP to be restarted and select a proper time to perform the operation with caution.

3

Restoring factory settings of an AP

Wireless users go offline when the settings of the AP are restored to the factory settings.

High

Specify the AP whose settings are to be restored to the factory settings and select a proper time to perform the operation with caution.

4

Binding a template to an AP

Services are interrupted and wireless users go offline.

(Devices whose versions are earlier than WLAN V200R006C00)

Medium

Specify the AP to which a template needs to be bound and select a proper time to perform the operation with caution.

5

Configuring countermeasures

The AP may switch the working mode, and wireless users go offline.

Medium

Specify the AP and radio for which countermeasures need to be configured, confirm the countermeasure mode, and select a proper time to perform the operation with caution.

6

Countering rogue devices or clients

The AP may switch the working mode, and wireless users go offline.

Medium

Specify the rogue devices or clients to be countered and select a proper time to perform the operation with caution.

7

Creating a dynamic energy saving policy

The AP, radio, and SSID are turned off.

Low

Specify the AP, radio, and SSID to be turned off and select a proper time to perform the operation with caution.

9

Deleting an AC

AP data is deleted from eSight, and network planning data (such as AP location) is lost.

Medium

Specify the AC to be deleted and select a proper time to perform the operation with caution. You are advised to export the planning sheet and back up the planned data before deleting the AC.

Translation
Download
Updated: 2019-06-30

Document ID: EDOC1100044373

Views: 24856

Downloads: 74

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next