Files
proxmox/docs/04-configuration/OMADA_CONNECTION_STATUS.md

202 lines
5.3 KiB
Markdown

# Omada Controller Connection Status
**Last Updated:** 2025-01-20
**Status:** ✅ Connected & Authenticated
---
## Connection Summary
**Controller Accessible**: `https://192.168.11.8:8043`
**Authentication**: Successful with admin credentials
**Credentials Configured**: Admin username/password in `~/.env`
---
## Current Configuration
### Controller Details
- **URL**: `https://192.168.11.8:8043`
- **Site ID**: `090862bebcb1997bb263eea9364957fe`
- **Admin Username**: `tp-link_admin`
- **Admin Password**: `L@ker$2010` (configured in `~/.env`)
- **SSL Verification**: Disabled (self-signed certificate)
### Environment Variables (`~/.env`)
```bash
OMADA_CONTROLLER_URL=https://192.168.11.8:8043
OMADA_ADMIN_USERNAME=tp-link_admin
OMADA_ADMIN_PASSWORD=L@ker$2010
OMADA_SITE_ID=090862bebcb1997bb263eea9364957fe
OMADA_VERIFY_SSL=false
```
---
## Authentication Status
**Login Endpoint**: `/api/v2/login`
**Token Generation**: Working
**Authentication Method**: Admin username/password
**Test Result:**
```json
{
"errorCode": 0,
"msg": "Log in successfully.",
"result": {
"omadacId": "090862bebcb1997bb263eea9364957fe",
"token": "<token>"
}
}
```
---
## API Access Methods
### Option 1: Web Interface (Recommended)
**URL**: `https://192.168.11.8:8043`
**Steps:**
1. Open browser and navigate to the URL above
2. Accept the SSL certificate warning (self-signed certificate)
3. Login with:
- Username: `tp-link_admin`
- Password: `L@ker$2010`
**From the web interface, you can:**
- View all devices (routers, switches, access points)
- Check device adoption status
- View and configure VLANs
- Manage network settings
- Export configurations
- Monitor device status and statistics
### Option 2: API Access (Limited)
**Status**: Authentication works, but API endpoints return redirects
**Working:**
-`/api/v2/login` - Authentication endpoint
- ✅ Token generation
**Redirects/Issues:**
- ⚠️ `/api/v2/sites` - Returns 302 redirect
- ⚠️ `/api/v2/sites/{siteId}/devices` - Returns 302 redirect
- ⚠️ `/api/v2/sites/{siteId}/vlans` - Returns 302 redirect
**Possible Causes:**
1. API endpoints may require different URL structure
2. Token authentication may need different format/headers
3. Some endpoints may only be accessible via web interface
4. API version differences
**Note**: The redirect location includes the site ID: `/090862bebcb1997bb263eea9364957fe/login`, suggesting the API might use the site ID in the URL path.
---
## Next Steps
### Immediate Actions
1. **Access Web Interface**
- Open `https://192.168.11.8:8043` in browser
- Login with credentials above
- Document actual device inventory (routers, switches)
- Document current VLAN configuration
- Document device adoption status
2. **Verify Hardware Inventory**
- Check if ER605-A and ER605-B are adopted
- Check if ES216G switches (1, 2, 3) are adopted
- Document device names, IPs, and firmware versions
3. **Document Current Configuration**
- Export router configuration
- Export switch configurations
- Document VLAN setup (if any)
- Document network settings
### API Integration (Future)
1. **Investigate API Structure**
- Check Omada Controller API documentation
- Test different endpoint URL formats
- Verify token usage in API requests
- Consider using web interface for device queries until API structure is resolved
2. **Update API Library**
- If API structure differs, update `omada-api` library
- Fix endpoint URLs if needed
- Update authentication/token handling if required
---
## Test Scripts
### Direct Connection Test
```bash
cd /home/intlc/projects/proxmox
node test-omada-direct.js
```
**Status**: ✅ Authentication successful
**Output**: Token generated, but API endpoints return redirects
### Manual API Test (curl)
```bash
# Test login
curl -k -X POST https://192.168.11.8:8043/api/v2/login \
-H "Content-Type: application/json" \
-d '{"username":"tp-link_admin","password":"L@ker$2010"}'
```
**Expected Response:**
```json
{
"errorCode": 0,
"msg": "Log in successfully.",
"result": {
"omadacId": "090862bebcb1997bb263eea9364957fe",
"token": "<token>"
}
}
```
---
## Security Notes
1. **Credentials**: Admin credentials are stored in `~/.env` (local file, not in git)
2. **SSL Certificate**: Self-signed certificate in use (verification disabled)
3. **Network Access**: Controller accessible on local network (192.168.11.8)
4. **Recommendation**: For production, consider:
- Using valid SSL certificates
- Enabling SSL verification
- Implementing OAuth/API keys instead of admin credentials
- Restricting network access to controller
---
## Related Documentation
- **[OMADA_HARDWARE_CONFIGURATION_REVIEW.md](OMADA_HARDWARE_CONFIGURATION_REVIEW.md)** - Comprehensive hardware and configuration review
- **[OMADA_CONNECTION_GUIDE.md](OMADA_CONNECTION_GUIDE.md)** - Connection troubleshooting guide
- **[OMADA_API_SETUP.md](OMADA_API_SETUP.md)** - API integration setup guide
- **[ER605_ROUTER_CONFIGURATION.md](ER605_ROUTER_CONFIGURATION.md)** - Router configuration guide
---
**Document Status:** Active
**Connection Status:** ✅ Connected
**Authentication Status:** ✅ Authenticated
**API Access:** ⚠️ Limited (redirects on endpoints)
**Last Updated:** 2025-01-20