Before logging in to the web platform in wired connection mode, perform the following tasks:
Figure 1 shows the running environment of the web platform. You can manage and configure the device through the web platform on your PC.
When a user logs in to a device through HTTP, the HTTPS login page is displayed. If the HTTPS service is unavailable, for example, the HTTPS service is not enabled, or the HTTPS service is enabled but not bound to an SSL policy, the incorrect page is displayed.
The system supports English and Chinese. By default, the system uses the same language as the browser.
Enter a user name and password.
Upon the first login to the web platform, you are prompted to set the user name and password for subsequent login through the web platform or STelnet, which will be delivered to managed Fit APs for logging in to them. Additionally, the specified password is used as the password for console port login. This password will be also used as the key for the offline management VAP, allowing for wireless connections to the management SSID.
If the login fails, the following possible causes are displayed at the same time:
Generally, a web page file is integrated in the system software of the device and has been installed. You do not need to install the web page file separately. However, to upgrade the web page file, you can log in to the official website to download an independent web page file, upload it to the device, and install it.
By default, a digital certificate file has been loaded on the device. If the browser displays a message indicating a security risk or the web page fails to be accessed due to a certificate issue, you need to update the digital certificate file.
Ensure that you have obtained the local certificate abc_local.pem, CA certificate abc_ca.pem, and RSA key pair privatekey.pem and uploaded them to the storage medium of the device. If multiple CA certificates are available, perform the same operation to load the certificates to the memory of the device. The key for generating privatekey.pem is Example@123.
[HUAWEI] pki realm abc [HUAWEI-pki-realm-abc] quit [HUAWEI] pki import-certificate local realm abc pem filename abc_local.pem [HUAWEI] pki import-certificate ca realm abc pem filename abc_ca.pem [HUAWEI] pki import rsa-key-pair key1 pem privatekey.pem password Example@123
[HUAWEI] ssl policy sslserver type server [HUAWEI-ssl-policy-sslserver] pki-realm abc [HUAWEI-ssl-policy-sslserver] version tls1.2 [HUAWEI-ssl-policy-sslserver] quit
[HUAWEI] http secure-server ssl-policy sslserver [HUAWEI] http secure-server enable
[HUAWEI] display ssl policy sslserver
------------------------------------------------------------------------------
Policy name : sslserver
Policy ID : 2
Policy type : Server
Cipher suite : ecdhe_rsa_aes128_gcm_sha256
ecdhe_rsa_aes256_gcm_sha384
PKI realm : abc
Version : tls1.2
Cache number : 128
Time out(second) : 3600
Server certificate load status : loaded
CA certificate chain load status : loaded
SSL renegotiation status : enable
Bind number : 1
SSL connection number : 0
------------------------------------------------------------------------------