N2000 System User Manual

July 11, 2017 | Author: Uttam Basumatry | Category: Backup, Databases, Windows 2000, Server (Computing), Personal Computers
Share Embed Donate


Short Description

Download N2000 System User Manual...

Description

Chapter 1 System Description........................................................................

1-1

1.1 Product Introduction ............................................................................... 1.2 Architecture ............................................................................................ 1.2.1 Software Architecture..................................................................... 1.2.2 Hardware Architecture ................................................................... 1.3 Technical Indices.................................................................................... 1.4 System Interface Standards ................................................................... 1.5 About Help .............................................................................................. 1.5.1 How to Get Help ............................................................................. 1.5.2 Content .......................................................................................... 1.5.3 Conventions ................................................................................... 1.5.4 How to Use Help ............................................................................

1-1 1-2 1-2 1-3 1-4 1-4 1-4 1-4 1-5 1-6 1-7

Chapter 2 Topology Management ..................................................................

1-1

2.1 Basic Concepts ...................................................................................... 2.1.1 Concept Description ....................................................................... 2.1.2 Icon Description ............................................................................. 2.2 Functions ................................................................................................ 2.2.1 Editing the Topological View .......................................................... 2.2.2 Viewing a Topological View ........................................................... 2.2.3 Setting Default SNMP Parameters ................................................ 2.2.4 Setting Access Protocol Parameters ............................................. 2.2.5 Setting Device Maintenance Information ....................................... 2.2.6 Auto Device Discovery ................................................................... 2.3 Deploying Devices .................................................................................. 2.3.1 Preparations ................................................................................... 2.3.2 Adding a Submap .......................................................................... 2.3.3 Adding a Device to the NMS .......................................................... 2.3.4 Add Links ....................................................................................... 2.3.5 Device Deploying Example ............................................................

1-2 1-2 1-4 1-5 1-5 1-12 1-14 1-15 1-17 1-18 1-20 1-20 1-20 1-20 1-21 1-22

Chapter 3 Fault Management ..........................................................................

3-1

3.1 Basic Concepts ...................................................................................... 3.1.1 Alarm Definition.............................................................................. 3.1.2 Term Explanations ......................................................................... 3.2 Functions ................................................................................................ 3.2.1 Browsing Alarm .............................................................................. 3.2.2 Alarm Statistics .............................................................................. 3.2.3 Setting Local Alarm Attributes ........................................................ 3.2.4 Setting Automatic Alarm Dumping ................................................. 3.2.5 Setting Automatic Alarm Acknowledgement ..................................

3-1 3-1 3-2 3-4 3-4 3-6 3-7 3-7 3-9

3.2.6 Setting Alarm Synchronization ....................................................... 3.2.7 Setting Remote Alarm Notification ................................................. 3.2.8 Setting Alarm Correlation ............................................................... 3.2.9 Locating Alarm/Event ..................................................................... 3.2.10 Managing Alarm Maintenance Tips ............................................. 3.3 Troubleshooting ...................................................................................... 3.3.1 Preparation .................................................................................... 3.3.2 Getting Alarm Information .............................................................. 3.3.3 Analyzing Alarm ............................................................................. 3.3.4 Eliminating Fault ............................................................................ 3.3.5 Acknowledging and Recovering Alarm .......................................... 3.3.6 Sharing Alarm Maintenance Tips ................................................... 3.3.7 An Example of Troubleshooting .....................................................

3-9 3-10 3-11 3-12 3-12 3-13 3-14 3-15 3-16 3-16 3-16 3-17 3-17

Chapter 4 Performance Management ............................................................

4-1

4.1 Realtime Performance Management...................................................... 4.1.1 Adding/deleting Performance Indexes ........................................... 4.1.2 Saving Data ................................................................................... 4.1.3 Adjusting Refresh Frequency......................................................... 4.2 Task Management .................................................................................. 4.2.1 Viewing Tasks ................................................................................ 4.2.2 Creating Tasks ............................................................................... 4.2.3 Suspending Tasks ......................................................................... 4.2.4 Resuming Tasks ............................................................................ 4.2.5 Deleting Tasks ............................................................................... 4.3 Data Management .................................................................................. 4.3.1 Querying Performance Data by Measuring Object ........................ 4.3.2 Querying Performance Data by Task............................................. 4.3.3 Setting Data Security Term ............................................................ 4.4 Data Integrity Management .................................................................... 4.4.1 Querying Data Integrity .................................................................. 4.4.2 Mending Data................................................................................. 4.5 Performance Alarm Threshold Management ......................................... 4.5.1 Querying Performance Alarm Threshold ....................................... 4.5.2 Adding a Performance Alarm Threshold ........................................ 4.5.3 Modifying a Performance Alarm Threshold.................................... 4.5.4 Deleting a Performance Alarm Threshold ...................................... 4.6 Performance Measurement .................................................................... 4.6.1 Time Distribution Analysis .............................................................. 4.6.2 Global Traffic Flow Analysis ........................................................... 4.6.3 Call Failure Analysis ......................................................................

4-2 4-2 4-2 4-2 4-3 4-3 4-4 4-7 4-7 4-7 4-8 4-8 4-10 4-11 4-12 4-12 4-13 4-14 4-14 4-15 4-16 4-17 4-17 4-17 4-18 4-19

4.7 Other Functions ...................................................................................... 4.7.1 Changing Graph Settings............................................................... 4.7.2 Saving Measurement Data ............................................................ 4.7.3 Printing Measurement Data ........................................................... 4.7.4 Deleting Measurement Data .......................................................... 4.7.5 Creating a Conditional Expression .................................................

4-20 4-20 4-21 4-22 4-22 4-23

Chapter 5 Security Management ....................................................................

5-1

5.1 Basic Conception ................................................................................... 5.2 Functions ................................................................................................ 5.2.1 Creating a User .............................................................................. 5.2.2 Modifying User Attributes ............................................................... 5.2.3 Assigning a User to User Groups .................................................. 5.2.4 Assigning Operation Right to a User .............................................. 5.2.5 Assigning Management Right to a User ........................................ 5.2.6 Creating a User Group ................................................................... 5.2.7 Modifying User Group Attributes .................................................... 5.2.8 Assigning Operation Right to a User Group ................................... 5.2.9 Assigning Operation Right to a User Group ................................... 5.2.10 Creating an Operation Set ........................................................... 5.2.11 Modifying Operation Set Attributes .............................................. 5.2.12 Setting Operations in an Operation Set ....................................... 5.2.13 Setting User ACL Right ................................................................ 5.2.14 Setting System ACL ..................................................................... 5.2.15 Realtime Monitoring User Operation Logs ................................... 5.2.16 Browsing/Dumping User Operation Logs ..................................... 5.3 User Right Management ........................................................................ 5.3.1 Preparations ................................................................................... 5.3.2 Creating Users ............................................................................... 5.3.3 Adding Users to User Groups ........................................................ 5.3.4 Adjusting User Operation Right ..................................................... 5.3.5 Adjusting User Management Right ................................................ 5.3.6 Configuring ACL ............................................................................. 5.3.7 User Log In .................................................................................... 5.4 License Management ............................................................................. 5.4.1 Querying License ........................................................................... 5.4.2 Upgrading License .........................................................................

5-1 5-2 5-2 5-3 5-3 5-3 5-5 5-5 5-6 5-6 5-7 5-8 5-8 5-8 5-9 5-9 5-9 5-10 5-12 5-12 5-12 5-13 5-13 5-13 5-13 5-13 5-15 5-15 5-15

Chapter 6 Environment Monitoring Management .........................................

6-1

6.1 Monitoring Power Parameters ................................................................ 6.2 Monitoring Environment Parameters ......................................................

6-1 6-3

6.3 Monitoring Configuration Information ..................................................... 6.4 Related Operations ................................................................................ 6.4.1 Configuring Synchronizing Period .................................................. 6.4.2 Synchronizing Monitoring Unit List ................................................. 6.4.3 Synchronizing Environment Monitoring Device ............................. 6.4.4 Refreshing Environment Monitoring Unit List................................. 6.4.5 Browsing Legend ...........................................................................

6-4 6-5 6-5 6-6 6-7 6-7 6-8

Chapter 7 Database Backup Tool ...................................................................

7-1

7.1 Functions ................................................................................................ 7.1.1 Starting/Exiting a Database Backup Tool ...................................... 7.1.2 Viewing a Database ....................................................................... 7.1.3 Viewing Logs .................................................................................. 7.1.4 Configuring a Database Server...................................................... 7.1.5 Configuring a Database Set ........................................................... 7.1.6 Configuring an Auto Backup Policy................................................ 7.1.7 Configuring a Backup Device......................................................... 7.1.8 Manual Backup .............................................................................. 7.1.9 Configuring an Auto Backup Task ................................................. 7.1.10 Restoring a Database .................................................................. 7.2 Backing Up/Restoring a Database ......................................................... 7.2.1 Preparations ................................................................................... 7.2.2 Backing Up a Database ................................................................. 7.2.3 Restoring a Database ....................................................................

7-1 7-1 7-2 7-3 7-4 7-5 7-6 7-7 7-7 7-8 7-9 7-9 7-10 7-10 7-11

Chapter 8 System Monitor ..............................................................................

8-1

8.1 Starting/Exiting a System Monitor .......................................................... 8.2 Starting/Closing an NMS Server ............................................................ 8.3 Querying Processes ............................................................................... 8.4 Querying Database Information ............................................................. 8.5 Querying System Resource Information ................................................ 8.6 Querying Disk Information ...................................................................... 8.7 Querying Component Information .......................................................... 8.8 Setting a System Monitor .......................................................................

8-1 8-2 8-3 8-4 8-4 8-4 8-5 8-5

Chapter 9 NMS Security Policy ......................................................................

9-1

9.1 Overview ................................................................................................ 9.2 Security of Operating System ................................................................. 9.2.1 Security Policy for UNIX System .................................................... 9.2.2 Security Policy for Windows System .............................................. 9.3 Security of NMS Database ..................................................................... 9.4 Equipment Access Control .....................................................................

9-1 9-1 9-2 9-12 9-15 9-15

9.5 Network Security Monitoring ..................................................................

9-16

Chapter 10 Routine Maintenance ...................................................................

10-1

10.1 NMS Maintenance Suggestions ........................................................... 10.2 Daily Maintenance Suggestions ........................................................... 10.2.1 Monitoring Running Environment ................................................. 10.2.2 Checking Network Running Status .............................................. 10.2.3 Checking Running Status of NMS Processes.............................. 10.2.4 Checking Server Performance ..................................................... 10.2.5 Checking Running Status of Equipment ...................................... 10.2.6 Checking Running Status of Boards ............................................ 10.2.7 Saving Configuration Data of Equipment ..................................... 10.2.8 Monitoring and Processing Alarms .............................................. 10.2.9 Monitoring User Operations ......................................................... 10.2.10 Backing up NMS Database ........................................................ 10.2.11 Shift Maintenance ...................................................................... 10.3 Weekly Maintenance Suggestions ....................................................... 10.3.1 Checking Performance Data ........................................................ 10.3.2 Managing Hard Disk Space of Server.......................................... 10.3.3 Managing Database Space .......................................................... 10.3.4 Backing up NMS Database .......................................................... 10.3.5 Managing User Authority ............................................................. 10.3.6 Outputting Weekly Report ............................................................ 10.4 Monthly Maintenance Suggestions ...................................................... 10.4.1 Checking NMS Running Performance ......................................... 10.4.2 Checking NMS Workstation Security ........................................... 10.4.3 Checking NMS Installation Disk ................................................... 10.4.4 Saving or Deleting History Data in NMS Database ...................... 10.4.5 Exporting or Clearing Data Files .................................................. 10.4.6 Checking Hardware, Power Supply and Equipment Room Environment of Workstation .................................................................... 10.4.7 Checking SUN Terminal and PC Terminal of NMS ..................... 10.4.8 Outputting Monthly Report ........................................................... 10.5 Quarterly Maintenance Suggestions .................................................... 10.5.1 Checking NMS by Remote Logon................................................ 10.5.2 Communicating Maintenance Experience ................................... 10.5.3 Outputting Quarterly Report ......................................................... 10.6 Yearly Maintenance Suggestions ......................................................... 10.6.1 Summarizing Yearly Maintenance Experience ............................ 10.6.2 Outputting Yearly Report .............................................................

10-1 10-2 10-2 10-2 10-3 10-4 10-4 10-5 10-5 10-6 10-7 10-8 10-8 10-9 10-9 10-10 10-10 10-11 10-12 10-13 10-13 10-13 10-14 10-15 10-16 10-16

Chapter 11 Remote Maintenance ...................................................................

11-1

10-17 10-18 10-18 10-19 10-19 10-19 10-20 10-20 10-20 10-20

11.1 Setting Up Remote Maintenance Channels ......................................... 11.2 Hardware Requirements and Connection Methods ............................. 11.2.1 PC and PC workstation ................................................................ 11.2.2 SUN workstation .......................................................................... 11.3 Software Configuration for Communication Connections..................... 11.3.1 PC/Windows2000 as PSTN dial-up access server ...................... 11.3.2 PC/Windows2000 as PSTN dial-up client .................................... 11.3.3 SUN workstation as PSTN dial-up access server ........................ 11.4 Remote Maintenance Schemes ........................................................... 11.4.1 SUN workstation serves as the dial-up server ............................. 11.4.2 PC/Windows2000 serves as the dial-up server ........................... 11.5 Troubleshooting....................................................................................

11-1 11-1 11-2 11-2 11-3 11-3 11-3 11-4 11-10 11-10 11-11 11-11

Appendix A FAQs ............................................................................................

A-1

A.1 Workstation ............................................................................................ A.1.1 How to Start Sun Workstation from CD-ROM (Sun/Solaris) .......... A.1.2 Sun Workstation Abnormally Shut Down (Sun/Solaris) ................. A.1.3 How to Set IP Address of Sun Workstation (Sun/Solaris) ............. A.1.4 How to Change Host Name of Sun Workstation (Sun/Solaris)...... A.1.5 Failed to Connect PC to Sun Workstation through Direct-connect Cable ( Sun/ Solaris) ....................................................... A.1.6 Keyboard No Response for Sun Workstation (Sun/Solaris) .......... A.1.7 How to Configure Maximum Terminals for Sun Workstation ( Sun/ Solaris)? ......................................................................................... A.1.8 How to Use CD-ROM Drive (Sun/Solaris) ..................................... A.1.9 How to Use Tape Drive (Sun/Solaris) ............................................ A.1.10 Failed to Log in to the System as a Root User While Using FTP ( Sun/ Solaris) ................................................................................. A.1.11 Can’ t Use Services Such as Telnet After the NMS is Installed................................................................................................... A.1.12 File Size Changed When FTP is Used to Send Files .................. A.1.13 Execution Authority of Files is Lost When FTP is Used to Send Files ............................................................................................... A.2 Database................................................................................................ A.2.1 How to Change the Password of "sa" (Sun/Solaris/Sybase)? ....... A.2.2 How to Set the sa Password (Windows/SQL Server 2000) ........... A.2.3 Sun Workstation Abnormally Shut Down (Sun/Solaris/Sybase) .... A.2.4 Unable to Start Sybase(Sun/Solaris/Sybase) ................................ A.3 NMS ....................................................................................................... A.3.1 No Response from Left Mouse Button .......................................... A.3.2 Some NMS Functions Abnormal Due to OS Time Changed ......... A.3.3 Alarm Window Display Abnormal Due to Alarm Panel Closed ......

A-1 A-1 A-1 A-1 A-2 A-2 A-2 A-2 A-2 A-3 A-4 A-4 A-4 A-5 A-5 A-5 A-5 A-6 A-6 A-6 A-6 A-7 A-7

A.3.4 Installation Interface No Response (Windows).............................. A.3.5 Shortcut No Response .................................................................. A.3.6 Help Window No Response ........................................................... A.3.7 Topology Display Abnormal ........................................................... A.3.8 Nonstop Alarm Sound ................................................................... A.3.9 How to View Text Completely ........................................................ A.3.10 Abnormality Occurs When Selecting Multiple Records in Table ....................................................................................................... A.3.11 Failed to Restore Database ......................................................... A.3.12 "Admin" Fails to Log in ................................................................ A.3.13 Device Name Overlap .................................................................

A-7 A-8 A-8 A-8 A-8 A-9 A-9 A-9 A-9 A-10

Appendix B Abbreviations ..............................................................................

B-1

HUAWEI

HUAWEI iManager N2000 Fixed Network Integrated

Management System User Manual V200R003

HUAWEI iManager N2000 Fixed Network Integrated Management System User Manual Manual Version

T2-100140-20040430-C-2.30

Product Version

V200R003

BOM

31013840

Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel free to contact our local office or company headquarters.

Huawei Technologies Co., Ltd. Address: Administration Building, Huawei Technologies Co., Ltd., Bantian, Longgang District, Shenzhen, P. R. China Postal Code: 518129 Website: http://www.huawei.com Email: [email protected]

Copyright © 2004 Huawei Technologies Co., Ltd.

All Rights Reserved No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.

Trademarks

, HUAWEI, C&C08, EAST8000, HONET,

, ViewPoint, INtess, ETS, DMC,

TELLIN, InfoLink, Netkey, Quidway, SYNLOCK, Radium, M900/M1800, TELESIGHT, Quidview, Musa, Airbridge, Tellwin, Inmedia, VRP, DOPRA, iTELLIN, HUAWEI OptiX, C&C08 iNET, NETENGINE, OptiX, iSite, U-SYS, iMUSE, OpenEye, Lansway, SmartAX, infoX, TopEng are trademarks of Huawei Technologies Co., Ltd. All other trademarks mentioned in this manual are the property of their respective holders.

Notice The information in this manual is subject to change without notice. Every effort has been made in the preparation of this manual to ensure accuracy of the contents, but all statements, information, and recommendations in this manual do not constitute the warranty of any kind, express or implied.

About This Manual Release Notes This manual applies to iManager N2000 Fixed Network Integrated Management System V200R003 (hereinafter referred to as iManager N2000).

Related Manuals Manual

Content

HUAWEI iManager N2000 Fixed Network Integrated Management System Installation Manual

It introduces the installation procedures of iManager 2000, including operating system, database, NMS software and client.

HUAWEI iManager N2000 Fixed Network Integrated Management System User Manual

It introduces the basic operations of iManager N2000, including system description, topology management, fault management, performance management, security management, database backup, and system monitor. Security strategy, daily maintenance and remote maintenance are also described in this manual.

For the operations on network elements (NEs), please refer to the user manuals of the corresponding subsystem.

Organization The manual introduces basic functions and operations of iManager N2000 and the maintenance guide as well. Chapter 1 System Description covers function features, architecture of iManager N2000 and introduction to help system. Chapter 2 Topology Management describes basic concepts, function features of topology management. The procedures of device deployment are illustrated with examples. Chapter 3 Fault Management describes basic concepts, function features of fault management. The procedures of fault processing are illustrated with examples.

Chapter 4 Performance Management introduces a group of management tools, through which the user can query performance data on different layers such as network layer, device layer and port layer. Chapter 5 Security Management introduces the user authority management of iManager N2000. Chapter 6 Environment Monitoring Management presents the integrated environment monitoring function of the iManager N2000 on the devices of the whole network. Chapter 7 Database Backup Tool introduces the usage of this database backup tool, which provides auto and manual database backup and recover function. It also supports the remote maintenance. Chapter 8 System Monitor introduces the usage of the system monitoring client and its maintenance functions. Chapter 9 NMS Security Policy provides security policies from four aspects, such as operating system, database, NM applications and network. Chapter 10 Routine Maintenance gives suggestions and guides to routine maintenance. Chapter 11 Remote Maintenance introduces the methods of remote maintenance on the NMS. Appendix collects the frequent asked questions (FAQs) about the NMS maintenance and the abbreviations used in the manual.

Intended Audience The manual is intended for the following readers: z

Network design & management personnel

z

Network maintenance personnel

z

Engineer for iManager N2000 NMS

Conventions

I. General conventions Convention

Description

Arial

Normal paragraphs are in Arial.

Arial Narrow

Warnings, Cautions, Notes and Tips are in Arial Narrow.

Convention

Description

Boldface

Headings are in Boldface.

Courier New

Terminal Display is in Courier New.

II. GUI conventions Convention

Description



Button names are inside angle brackets. For example, click button.

[]

Window names, menu items, data table and field names are inside square brackets. For example, pop up the [New User] window.

/

Multi-level menus are separated by forward slashes. For example, [File/Create/Folder].

III. Keyboard operation Format

Description



Press the key with the key name inside angle brackets. For example, , , , or .



Press the keys concurrently. For example, means the three keys should be pressed concurrently.



Press the keys in turn. For example, means the two keys should be pressed in turn.

IV. Mouse operation Action

Description

Click

Press the left button or right button quickly (left button by default).

Double Click

Press the left button twice continuously and quickly.

Drag

Press and hold the left button and drag it to a certain position.

V. Symbols Eye-catching symbols are also used in the manual to highlight the points worthy of special attention during the operation. They are defined as follows:

Caution, Warning, Danger: Means reader be extremely careful during the operation. Note, Comment, Tip, Knowhow, Thought: Means a complementary description.

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Table of Contents

Table of Contents Chapter 1 System Description ..................................................................................................... 1-1 1.1 Product Introduction........................................................................................................... 1-1 1.2 Architecture........................................................................................................................ 1-2 1.2.1 Software Architecture.............................................................................................. 1-2 1.2.2 Hardware Architecture ............................................................................................ 1-3 1.3 Technical Indices ............................................................................................................... 1-3 1.4 System Interface Standards .............................................................................................. 1-4 1.5 About Help ......................................................................................................................... 1-4 1.5.1 How to Get Help ...................................................................................................... 1-4 1.5.2 Content.................................................................................................................... 1-5 1.5.3 Conventions ............................................................................................................ 1-6 1.5.4 How to Use Help ..................................................................................................... 1-6 Chapter 2 Topology Management................................................................................................ 2-1 2.1 Basic Concepts .................................................................................................................. 2-2 2.1.1 Concept Description................................................................................................ 2-2 2.1.2 Icon Description....................................................................................................... 2-4 2.2 Functions ........................................................................................................................... 2-5 2.2.1 Editing the Topological View ................................................................................... 2-5 2.2.2 Viewing Topological View ..................................................................................... 2-12 2.2.3 Setting Default SNMP Parameters........................................................................ 2-14 2.2.4 Setting Access Protocol Parameters .................................................................... 2-15 2.2.5 Setting Device Maintenance Information .............................................................. 2-16 2.2.6 Auto Device Discovery .......................................................................................... 2-18 2.3 Deploying Devices ........................................................................................................... 2-19 2.3.1 Preparations .......................................................................................................... 2-19 2.3.2 Adding Submaps ................................................................................................... 2-20 2.3.3 Adding Devices to the NMS .................................................................................. 2-20 2.3.4 Add Links............................................................................................................... 2-21 2.3.5 Device Deploying Example ................................................................................... 2-21 Chapter 3 Fault Management ....................................................................................................... 3-1 3.1 Basic Concepts .................................................................................................................. 3-1 3.1.1 Alarm Definition ....................................................................................................... 3-1 3.1.2 Term Explanations .................................................................................................. 3-2 3.2 Functions ........................................................................................................................... 3-4 3.2.1 Browsing Alarm ....................................................................................................... 3-4 3.2.2 Alarm Statistics........................................................................................................ 3-6 3.2.3 Setting Local Alarm Attributes................................................................................. 3-7 i

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Table of Contents

3.2.4 Setting Automatic Alarm Dumping .......................................................................... 3-7 3.2.5 Setting Automatic Alarm Acknowledgement ........................................................... 3-9 3.2.6 Setting Alarm Synchronization ................................................................................ 3-9 3.2.7 Setting Remote Alarm Notification ........................................................................ 3-10 3.2.8 Setting Alarm Correlation ...................................................................................... 3-11 3.2.9 Locating Alarm/Event ............................................................................................ 3-12 3.2.10 Managing Alarm Maintenance Tips..................................................................... 3-12 3.3 Troubleshooting ............................................................................................................... 3-13 3.3.1 Preparation............................................................................................................ 3-14 3.3.2 Getting Alarm Information ..................................................................................... 3-15 3.3.3 Analyzing Alarm .................................................................................................... 3-16 3.3.4 Eliminating Fault.................................................................................................... 3-16 3.3.5 Acknowledging and Recovering Alarm ................................................................. 3-16 3.3.6 Sharing Alarm Maintenance Tips .......................................................................... 3-17 3.3.7 An Example of Troubleshooting ............................................................................ 3-17 Chapter 4 Performance Management.......................................................................................... 4-1 4.1 Realtime Performance Management ................................................................................. 4-2 4.1.1 Adding/deleting Performance Indexes .................................................................... 4-2 4.1.2 Saving Data............................................................................................................. 4-2 4.1.3 Adjusting Refresh Frequency.................................................................................. 4-2 4.2 Task Management ............................................................................................................. 4-3 4.2.1 Viewing Tasks ......................................................................................................... 4-3 4.2.2 Creating Tasks ........................................................................................................ 4-4 4.2.3 Suspending Tasks................................................................................................... 4-7 4.2.4 Resuming Tasks...................................................................................................... 4-7 4.2.5 Deleting Tasks......................................................................................................... 4-7 4.3 Data Management ............................................................................................................. 4-8 4.3.1 Querying Performance Data by Measuring Object ................................................. 4-8 4.3.2 Querying Performance Data by Task.................................................................... 4-10 4.3.3 Setting Data Security Term ................................................................................... 4-11 4.4 Data Integrity Management ............................................................................................. 4-12 4.4.1 Querying Data Integrity ......................................................................................... 4-12 4.4.2 Mending Data ........................................................................................................ 4-13 4.5 Performance Alarm Threshold Management................................................................... 4-14 4.5.1 Querying Performance Alarm Threshold .............................................................. 4-14 4.5.2 Adding a Performance Alarm Threshold............................................................... 4-15 4.5.3 Modifying a Performance Alarm Threshold........................................................... 4-16 4.5.4 Deleting a Performance Alarm Threshold............................................................. 4-17 4.6 Performance Measurement ............................................................................................. 4-17 4.6.1 Time Distribution Analysis..................................................................................... 4-17 4.6.2 Global Traffic Flow Analysis.................................................................................. 4-18 4.6.3 Call Failure Analysis.............................................................................................. 4-19

ii

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Table of Contents

4.7 Other Functions ............................................................................................................... 4-20 4.7.1 Changing Graph Settings...................................................................................... 4-20 4.7.2 Saving Measurement Data.................................................................................... 4-21 4.7.3 Printing Measurement Data .................................................................................. 4-22 4.7.4 Deleting Measurement Data ................................................................................. 4-22 4.7.5 Creating a Conditional Expression........................................................................ 4-23 Chapter 5 Security Management.................................................................................................. 5-1 5.1 Basic Conception ............................................................................................................... 5-1 5.2 Functions ........................................................................................................................... 5-2 5.2.1 Creating a User ....................................................................................................... 5-2 5.2.2 Modifying User Attributes ........................................................................................ 5-3 5.2.3 Assigning a User to User Groups............................................................................ 5-3 5.2.4 Assigning Operation Right to a User....................................................................... 5-3 5.2.5 Assigning Management Right to a User ................................................................. 5-5 5.2.6 Creating a User Group ............................................................................................ 5-5 5.2.7 Modifying User Group Attributes ............................................................................. 5-6 5.2.8 Assigning Operation Right to a User Group............................................................ 5-6 5.2.9 Assigning Operation Right to a User Group............................................................ 5-7 5.2.10 Creating an Operation Set .................................................................................... 5-8 5.2.11 Modifying Operation Set Attributes ....................................................................... 5-8 5.2.12 Setting Operations in an Operation Set ................................................................ 5-8 5.2.13 Setting User ACL Right ......................................................................................... 5-9 5.2.14 Setting System ACL .............................................................................................. 5-9 5.2.15 Realtime Monitoring User Operation Logs............................................................ 5-9 5.2.16 Browsing/Dumping User Operation Logs............................................................ 5-10 5.3 User Right Management.................................................................................................. 5-12 5.3.1 Preparations .......................................................................................................... 5-12 5.3.2 Creating Users ...................................................................................................... 5-12 5.3.3 Adding Users to User Groups ............................................................................... 5-13 5.3.4 Adjusting User Operation Right............................................................................. 5-13 5.3.5 Adjusting User Management Right ....................................................................... 5-13 5.3.6 Configuring ACL .................................................................................................... 5-13 5.3.7 User Log In............................................................................................................ 5-13 5.4 License Management ...................................................................................................... 5-15 5.4.1 Querying License .................................................................................................. 5-15 5.4.2 Upgrading License ................................................................................................ 5-15 Chapter 6 Environment Monitoring Management ...................................................................... 6-1 6.1 Monitoring Power Parameters ........................................................................................... 6-1 6.2 Monitoring Environment Parameters ................................................................................. 6-3 6.3 Monitoring Configuration Information ................................................................................ 6-4 6.4 Related Operations............................................................................................................ 6-5 6.4.1 Configuring Synchronizing Period........................................................................... 6-5 iii

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Table of Contents

6.4.2 Synchronizing Monitoring Unit List.......................................................................... 6-6 6.4.3 Synchronizing Environment Monitoring Device ...................................................... 6-7 6.4.4 Refreshing Environment Monitoring Unit List.......................................................... 6-7 6.4.5 Browsing Legend .................................................................................................... 6-8 Chapter 7 Database Backup Tool ................................................................................................ 7-1 7.1 Functions ........................................................................................................................... 7-1 7.1.1 Starting/Exiting a Database Backup Tool ............................................................... 7-1 7.1.2 Viewing a Database ................................................................................................ 7-2 7.1.3 Viewing Logs ........................................................................................................... 7-3 7.1.4 Configuring a Database Server............................................................................... 7-4 7.1.5 Configuring a Database Set .................................................................................... 7-5 7.1.6 Configuring an Auto Backup Policy......................................................................... 7-6 7.1.7 Configuring a Backup Device.................................................................................. 7-7 7.1.8 Manual Backup........................................................................................................ 7-7 7.1.9 Configuring an Auto Backup Task........................................................................... 7-8 7.1.10 Restoring a Database ........................................................................................... 7-9 7.2 Backing Up/Restoring a Database..................................................................................... 7-9 7.2.1 Preparations .......................................................................................................... 7-10 7.2.2 Backing Up a Database ........................................................................................ 7-10 7.2.3 Restoring a Database ........................................................................................... 7-11 Chapter 8 System Monitor............................................................................................................ 8-1 8.1 Starting/Exiting a System Monitor...................................................................................... 8-1 8.2 Starting/Closing an NMS Server........................................................................................ 8-2 8.3 Querying Processes .......................................................................................................... 8-3 8.4 Querying Database Information......................................................................................... 8-4 8.5 Querying System Resource Information............................................................................ 8-4 8.6 Querying Disk Information ................................................................................................. 8-4 8.7 Querying Component Information...................................................................................... 8-5 8.8 Setting a System Monitor................................................................................................... 8-5 Chapter 9 NMS Security Policy .................................................................................................... 9-1 9.1 Overview ............................................................................................................................ 9-1 9.2 Security of Operating System ............................................................................................ 9-1 9.2.1 Security Policy for UNIX System............................................................................. 9-2 9.2.2 Security Policy for Windows System..................................................................... 9-12 9.3 Security of NMS Database .............................................................................................. 9-15 9.4 Equipment Access Control .............................................................................................. 9-15 9.5 Network Security Monitoring............................................................................................ 9-16 Chapter 10 Routine Maintenance............................................................................................... 10-1 10.1 NMS Maintenance Suggestions .................................................................................... 10-1 10.2 Daily Maintenance Suggestions .................................................................................... 10-2 10.2.1 Monitoring Running Environment........................................................................ 10-2

iv

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Table of Contents

10.2.2 Checking Network Running Status ..................................................................... 10-2 10.2.3 Checking Running Status of NMS Processes..................................................... 10-3 10.2.4 Checking Server Performance ............................................................................ 10-4 10.2.5 Checking Running Status of Equipment ............................................................. 10-4 10.2.6 Checking Running Status of Boards ................................................................... 10-5 10.2.7 Saving Configuration Data of Equipment............................................................ 10-5 10.2.8 Monitoring and Processing Alarms ..................................................................... 10-6 10.2.9 Monitoring User Operations ................................................................................ 10-7 10.2.10 Backing up NMS Database ............................................................................... 10-8 10.2.11 Shift Maintenance ............................................................................................. 10-8 10.3 Weekly Maintenance Suggestions................................................................................. 10-9 10.3.1 Checking Performance Data ............................................................................... 10-9 10.3.2 Managing Hard Disk Space of Server............................................................... 10-10 10.3.3 Managing Database Space............................................................................... 10-10 10.3.4 Backing up NMS Database ............................................................................... 10-11 10.3.5 Managing User Authority................................................................................... 10-12 10.3.6 Outputting Weekly Report ................................................................................. 10-13 10.4 Monthly Maintenance Suggestions.............................................................................. 10-13 10.4.1 Checking NMS Running Performance .............................................................. 10-13 10.4.2 Checking NMS Workstation Security ................................................................ 10-14 10.4.3 Checking NMS Installation Disk ........................................................................ 10-15 10.4.4 Saving or Deleting History Data in NMS Database........................................... 10-16 10.4.5 Exporting or Clearing Data Files ....................................................................... 10-16 10.4.6 Checking Hardware, Power Supply and Equipment Room Environment of Workstation .................................................................................................................. 10-17 10.4.7 Checking SUN Terminal and PC Terminal of NMS .......................................... 10-18 10.4.8 Outputting Monthly Report ................................................................................ 10-18 10.5 Quarterly Maintenance Suggestions ........................................................................... 10-19 10.5.1 Checking NMS by Remote Logon..................................................................... 10-19 10.5.2 Communicating Maintenance Experience ........................................................ 10-19 10.5.3 Outputting Quarterly Report .............................................................................. 10-20 10.6 Yearly Maintenance Suggestions ................................................................................ 10-20 10.6.1 Summarizing Yearly Maintenance Experience ................................................. 10-20 10.6.2 Outputting Yearly Report................................................................................... 10-20 Chapter 11 Remote Maintenance............................................................................................... 11-1 11.1 Setting Up Remote Maintenance Channels .................................................................. 11-1 11.2 Hardware Requirements and Connection Methods....................................................... 11-1 11.2.1 PC and PC workstation ....................................................................................... 11-2 11.2.2 SUN workstation ................................................................................................. 11-2 11.3 Software Configuration for Communication Connections.............................................. 11-3 11.3.1 PC/Windows2000 as PSTN dial-up access server ............................................. 11-3 11.3.2 PC/Windows2000 as PSTN dial-up client........................................................... 11-3

v

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Table of Contents

11.3.3 SUN workstation as PSTN dial-up access server............................................... 11-4 11.4 Remote Maintenance Schemes................................................................................... 11-10 11.4.1 SUN workstation serves as the dial-up server .................................................. 11-10 11.4.2 PC/Windows2000 serves as the dial-up server ................................................ 11-11 11.5 Troubleshooting ........................................................................................................... 11-11 Appendix A FAQs ..........................................................................................................................A-1 A.1 Workstation........................................................................................................................A-1 A.1.1 How to Start Sun Workstation from CD-ROM (Sun/Solaris)...................................A-1 A.1.2 Sun Workstation Abnormally Shut Down (Sun/Solaris)..........................................A-1 A.1.3 How to Set IP Address of Sun Workstation (Sun/Solaris) ......................................A-1 A.1.4 How to Change Host Name of Sun Workstation (Sun/Solaris) ..............................A-2 A.1.5 Failed to Connect PC to Sun Workstation through Direct-connect Cable (Sun/Solaris) ..........................................................................................................................................A-2 A.1.6 Keyboard No Response for Sun Workstation (Sun/Solaris)...................................A-2 A.1.7 How to Configure Maximum Terminals for Sun Workstation (Sun/Solaris)?..........A-2 A.1.8 How to Use CD-ROM Drive (Sun/Solaris) ..............................................................A-2 A.1.9 How to Use Tape Drive (Sun/Solaris).....................................................................A-3 A.1.10 Failed to Log in to the System as a Root User While Using FTP (Sun/Solaris)...A-4 A.1.11 Can’t Use Services Such as Telnet After the NMS is Installed ............................A-4 A.1.12 File Size Changed When FTP is Used to Send Files ...........................................A-4 A.1.13 Execution Authority of Files is Lost When FTP is Used to Send Files .................A-5 A.2 Database ...........................................................................................................................A-5 A.2.1 How to Change the Password of "sa" (Sun/Solaris/Sybase)?................................A-5 A.2.2 How to Set the sa Password (Windows/SQL Server 2000) ...................................A-5 A.2.3 Sun Workstation Abnormally Shut Down (Sun/Solaris/Sybase).............................A-6 A.2.4 Unable to Start Sybase(Sun/Solaris/Sybase).........................................................A-6 A.3 NMS...................................................................................................................................A-6 A.3.1 No Response from Left Mouse Button ...................................................................A-6 A.3.2 Some NMS Functions Abnormal Due to OS Time Changed..................................A-7 A.3.3 Alarm Window Display Abnormal Due to Alarm Panel Closed...............................A-7 A.3.4 Installation Interface No Response (Windows).......................................................A-7 A.3.5 Shortcut No Response............................................................................................A-8 A.3.6 Help Window No Response....................................................................................A-8 A.3.7 Topology Display Abnormal....................................................................................A-8 A.3.8 Nonstop Alarm Sound.............................................................................................A-8 A.3.9 How to View Text Completely.................................................................................A-9 A.3.10 Abnormality Occurs When Selecting Multiple Records in Table ..........................A-9 A.3.11 Failed to Restore Database ..................................................................................A-9 A.3.12 "Admin" Fails to Log in..........................................................................................A-9 A.3.13 Device Name Overlap.........................................................................................A-10 Appendix B Abbreviations ...........................................................................................................B-1

vi

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 System Description

Chapter 1 System Description 1.1 Product Introduction The iManager N2000 Fixed Network Integrated Management System (called iManager N2000 in this manual) maintains and manages the fixed-network devices in a unified manner. Residing at the management layer of network solutions, the iManager N2000 manages Network Elements (NEs) and networks. The iManager N2000 provides different network management solutions: z

Broadband Network Management System (BMS)

z

U-SYS Management System (UMS) of the Next Generation Network (NGN).

The iManager N2000 is developed on the unified network management (NM) platform of Huawei. It employs the mature and widely-used client/server architecture. Therefore, it supports multiple clients and can manage large and complex networks. With a multi-process design mechanism, the iManager N2000 can be flexibly extended to meet different requirements. The iManager N2000 provides a concise and consistent management mode. It provides unified device panel and operation interfaces for the function supported. The functions are shown below. z

Topology management

z

Fault management

z

Performance management

z

Security & log management.

Considering the user habits, the iManager N2000 puts the distributed devices together in a unified visual style. In this way, the operators can easily monitor, operate and manage the devices on the network. The iManager N2000 BMS is designed to manage the broadband devices and services. It manages the broadband access devices and Asynchronous Transfer Mode (ATM) backbone convergence devices. They are: z

MA510X

z

MA5200

z

MA530X

1-1

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System z

MD5500

z

Radium 8750/BAS

z

HONET (Home Optical Network)

Chapter 1 System Description

The iManager N2000 UMS manages NGN components. They are: z

Trunk Media Gateway (TMG)

z

Access Media Gateway (AMG)

z

Signaling Gateway (SG)

z

Media Resource Server (MRS)

z

Integrated Access Device (IAD)

z

Universal Media Gateway (UMG)

z

iGateway Bill (iGWB)

z

Integrated Access Device Management System (IADMS).

The iManager N2000 also manages NGN services. It provisions IAD, AMG and UMG services and manages the users. It also manages the NGN resources, including device resources and service resources. The Data Management System (DMS) is developed on the same NM platform. It is designed to manage data communications devices, such as routers, switches and access servers. It can manage both devices and networks. The iManager N2000 BMS, UMS and UMS can manage all devices of Huawei on the fixed network.

1.2 Architecture 1.2.1 Software Architecture Figure 1-1 shows the software architecture of the iManager N2000.

Figure 1-1 Software architecture of the iManager N2000 1-2

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 System Description

The design of the iManager N2000 is object-oriented. The iManager N2000 has a multi-process and modular structure. It supports distributed system management and has high scalability. The iManager N2000 schedules and monitors the real-time stauts of the NE daemon process in a unified way. The daemon processes transfer messages through one message distribution center (MDC). In this way, the NE daemons become highly independent. One NM application can initiate multiple real-time tasks, which can be quickly switched. The iManager N2000 provides NM components for different devices. You can choose the components that you want, so the iManager N2000 is highly scalable. You can easily add new components, device types and functions to it.

1.2.2 Hardware Architecture The iManager N2000 consists of one system server and multiple clients. The system server communicates with the clients through a Local Area Network (LAN) or Wide Area Network (WAN). Figure 1-2 shows the hardware architecture of the iManager N2000.

Client System server/database server

DCN Managed To NEs devices

Client

Client

Figure 1-2 Hardware architecture of the iManager N2000 The NMS server runs on Solaris or Windows 2000 Server platform. The NMS server can be SUN workstation or a PC. You can install client and server software on the same PC, instead of a workstation, and install SQL Server as database. In this way, you are provided with a cost-effective NM solution. You can do the following through this PC:

1-3

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System z

browse through the navigation tree

z

do some basic configurations

z

receive and query alarms

z

monitor the device performance in real time.

Chapter 1 System Description

1.3 Technical Indices 1)

The iManager N2000 supports up to 6,000 equivalent nodes.

2)

The iManager N2000 supports 50 clients at the same time.

3)

The current alarm table can store up to 100,000 alarm records. The maximum number of records in the history alarm and event alarm tables can by the user. Once the tables are full, the data is to be dumped.

4)

The time delay to display the alarms that is received at the fault management module at the client is less than 8 seconds.

5)

The log database contains three months’ log. In refreshing of the displayed log information, the latency time does not exceed 3 seconds.

6)

The iManager N2000 supports up to 255 users.

7)

The iManager N2000 deals with up to 100 alarm records per second. The alarm buffer can store up to 100,000 alarm records.

1.4 System Interface Standards z

Downstream SNMP V1/V2/V3 interfaces: management interfaces of the NMS to the broadband devices.

z

Downstream Man Machine Language (MML) interfaces: management interfaces of the NMS to the narrowband devices.

z

Downstream SYSLOG interface: Some devices report the operation information through the SYSLOG interface.

z

Downstream File Transfer Protocol/Trivial File Transfer Protocol (FTP/TFTP) interfaces: standard FTP/TFTP interfaces used to load and backup device versions.

z

Downstream Telnet interface: command line interface of the NMS to the broadband device.

z

Upstream SNMP (V1/V2/V3) interfaces: interfaces of the NMS to the upper NMS and other NMSs.

1.5 About Help 1.5.1 How to Get Help To start the iManager N2000 help, do one of these. z

Start the iManager N2000 client, and then select [Help/Topic].

1-4

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System z

Chapter 1 System Description

Start the iManager N2000 client, click on any area of the client, and then press . The context-sensitive Help appears.

To browse the Help while the client is not started, do one of these. z

On the Solaris operating system (OS), right click on the Common Desktop Environment (CDE), and then select [Applications/iManager N2000/N2000 Online Manual].

z

On Windows OS, select [Start/Program/iManager N2000/N2000 Online Manual].

The help window is as shown in Figure 1-3.

Figure 1-3 Help browser

1.5.2 Content The Help covers these major topics: z

Product Brief Introduction: It introduces the orientation, function features, and typical applications of the iManager N2000.

z

N2000 Quick Start: It introduces the client interface, customized settings, and usage of the iManager N2000.

z

Deploy Devices: It introduces how to deploy devices in the iManager N2000 and how to manage the devices through the topology.

1-5

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System z

Chapter 1 System Description

Device Troubleshooting: It introduces how to do troubleshooting through the iManager N2000. For example, it tells you how to collect alarms, locate and eliminate faults, and summarize alarm processing experiences.

z

User Right Management: It introduces how to manage user rights to ensure the reliability and security of the iManager N2000.

z

View Device Running Performance: It introduces how to query, collect and analyze the real-time performance data of devices. It helps you identify the performance bottleneck and provides reference for optimizing the network status.

z

Backup/Restore Database: It introduces how to back up and restore the NMS database.

z

NE Management: It tells how to manage the devices and finish the service configuration.

z

Service Management: It presents how to provision and maintain services.

z

Device Resource Management: It introduces how to measure and query network device resources and logical resources.

z

Routine Maintenance: It introduces the contents, methods and references of the routine maintenance. This helps you effectively maintain devices and ensure the reliability of the iManager N2000.

z

FAQ: It describes common problems and solutions to them.

z

Basic Operation List: It lists all basic operations. Through the basic operation list, you can know the operations quickly.

z

Terms and Abbreviations: It lists the relevant terms and abbreviations.

1.5.3 Conventions The conventions in the help system include: z

Pop-up: It is blue. Clicking it displays a window giving an explanation of the blue word.

z

Hyperlink: It is underlined and blue. Clicking it leads you to the linked page.

z

The relationship between interface and Help. —If the active dialog box or tab has a basic, independent function, press . The related help page is shown. For example, open the "Auto Discovery" dialog box, and then click . The "Set Device" page is shown. —If the active dialog box can implement many functions, click . The default help page is shown. For example, in the topological view, press . The "Topology Management" page is shown. On the page, the links of all topology management operations are listed.

1-6

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 System Description

1.5.4 How to Use Help I. How to find a topic In the "Help" window, do one of the following: z

To search for a topic from the topic list, select [View/Topic] or click the "Help Topics" tab. On the navigation tree, click the desired topic.

z

To search for a topic from the index list, select [View/Index] or click the "Index" tab. On the tab, enter the keyword, and then press .

The related help appears in the right pane.

II. How to print a topic 1)

In the right pane of the "Help" window, click the topic you want to print.

2)

On the "Help" title bar, click

3)

In the dialog box that appears, set the parameters, and then .

.

III. How to set the Help window 1)

Hide or show directories

z

To hide the directories in the left pane of the help window, click on the boundary between the left and right panes. The right pane occupies the entire help window. Click on the left boundary to restore.

z

To make the directories in the left pane occupy the entire help window, click on the boundary between the left and right panes. Click on the right boundary to restore.

2)

Set the window size

z

To resize the left and right panes, move the pointer to the boundary. When the pointer becomes a double-headed arrow, drag it to the left or the right.

z

To resize the "Help" window proportionately, move the pointer to the corner of the "Help" window. When the pointer becomes a double-headed arrow, drag it to resize the window.

z

To change the height or width of the "Help" window, move the pointer to the top, bottom, left, or right boundary of the window. When the pointer becomes a double-headed arrow, drag it to resize the window.

1-7

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

Chapter 2 Topology Management Topology management enables you to construct and manage the topology structure of the network. You can keep track of the operation status of the entire network by browsing topological views of the network. In topology management, you can upload topological data of network devices through topology auto discovery or by manually adding topology nodes. You can also add, delete, modify, and query topological devices. According to different management requirements of users, topology management provides such functions as non-hierarchically zooming, setting background, and auto layout. In this way, you can manage networks and devices easily. Topology management can poll network devices and refresh their status regularly, thus making the network view display consistent with the actual network topology. In addition, topology management can monitor polling status and alarm status of network devices through color changes of the topological nodes. Figure 1–1 shows the main window for topology management.

Figure 1–1 Main topological view

1-1

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

2.1 Basic Concepts The topology is a map of the managed telecommunications network in the NMS. It displays managed devices and links on the user interface using graphs and trees. Through the topology, users can perform such operations as configuration, alarm and performance. The topological objects that can be managed include nodes, submaps and links.

2.1.1 Concept Description I. Submap In the NMS, a large network can be divided into several smaller networks by region or something else to facilitate network management. In the topology, these smaller networks are known as submaps.

II. Node A node refers to a managed device that is mapped into the topology. For a single-frame device, a node represents the device. For a multiple-frame device, a node usually represents a frame in the device. Therefore, in the topology, a node and a device do not mean exactly the same.

III. Link A link refers to a connection between devices that is mapped into the topology. In the topological view, the displaying of links follows these rules: z

If there is any connection relation between two objects in the same submap, a link is drawn between the icons of the two objects. Double click the link, and you can query the detailed attributes, including the link name, link type and link status.

z

If there is any connection relation between two objects in two submaps, a shortcut icon is drawn at the lower right corner of each icon.

z

If there is any connection relation between the lower submaps or nodes in two submaps, a link is drawn between the two objects (two submaps).

IV. View In the NMS, different views can be used to display the topology, depending on the angle of observing network or the service range concerned. As examples, a physical view divides network topology structure based on regions or any other rules; an IP view divides a network into several smaller networks based on the IP network segment. Accordingly, the topology structure is organized in this way:

1-2

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

Each view corresponds to a device explorer and is concerned about different service points. Each device explorer includes several submaps, which show the network composition in the view. Each submap includes several nodes, as shown in Figure 1–2.

Figure 1–2 View

V. Role Switches in a cluster can play different roles based on the locations and functions. A cluster is a manageable network that comprises of multiple interconnected switches. It is assigned with a single IP address. All switches in the cluster must support Huawei Group Management Protocol V2 (HGMP V2). With the cluster management, the user can manage a group of switches without assigning an IP address to each member switch. In the NMS, depending on different service angles, device nodes of the same type can be defined as different roles to implement different operation and configuration modes. For example, a Quidview device node, which is not defined in the physical view, may be defined as a command switch or member switch in the Virtual Local Area Network (VLAN) view. The switches in a cluster can play the following roles. z

Command switch

The switch is assigned with a public network IP address and provides the main management interfaces for the overall cluster. A management command is first sent to the command switch for processing. If it finds that the command is destined to a certain member switch, it will redirect the command to the member switch.

1-3

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System z

Chapter 1 Topology Management

Member switch

The switch is a member of a cluster, which is not assigned with a public network IP address in normal situations. It only receives the management commands redirected from the command switch. z

Candidate switch

The switch does not join any cluster, but has the cluster capability and can become a member of a cluster. z

Independent switch

The switch can be discovered in the process of gathering cluster topology information, but has no cluster capability and cannot become a cluster member.

VI. Filter Filter is a special topological node. It can contain members. Currently, the filter often represents a multi-frame device. The multiple nodes under the filter represent the frames of the device.

VII. Polling status and alarm status Polling status: The NMS queries the status and other configuration data of devices regularly, and displays the queried status information in the topological view. The possible polling statuses include: Normal, unknown, offline, insignificant, minor, major fault, critical, loopback, and test. Alarm status: The device reports trap information to the NMS. Then the trap information is displayed in the topological view. The possible alarm statuses include: Critical, major, minor, and warning.

2.1.2 Icon Description Corresponding to the concepts provided in the previous section, the topological view uses different icons to indicate submap, node, link, view objects and their statuses, and role. For a node, a submap, or a link, the color of its icon shows its polling status. The status at the upper left corner of the icon shows its alarm status, lock status (locked or unlocked), and its role. Figure 1–3 shows a node which is locked, offline and is experiencing a critical alarm.

Figure 1–3 Node

1-4

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

Below list the legends of the status icons.

I. Polling status color legend Normal Unknown Offline Insignificant Fault Minor Fault Major Fault Critical Fault Loopback Test

II. Alarm icon Critical Major Minor Warning

III. Lock icon indicates that the object is locked.

IV. Shortcut icon indicates a cross-submap link.

V. Filter icon indicates a filter.

2.2 Functions 2.2.1 Editing the Topological View I. Adding/deleting a submap 1)

Select [Edit/Add Object] to display the "Add Object" dialog box.

2)

On the “Object Type” pane, select the submap type to be added, and enter the related parameters, as shown in Figure 1–4.

1-5

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

Figure 1–4 Adding submaps 3)

Then click .

If the operation succeeds, the status bar prompts the success. If the operation fails, a dialog box shows the failure. 4)

In the topological view or on the device explorer, select the submap to be deleted. Click [Edit/Delete From This Submap] or press , and then confirm the operation.

The selected submap is then deleted.

II. Adding/deleting a device 1)

Select [Edit/Add Object] to display the "Add Object" dialog box.

2)

On the “Object Type” pane, select the device type to be added, and enter the related parameters, as shown in Figure 1–5.

1-6

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

Figure 1–5 Adding devices 3)

Then click .

If the operation succeeds, the status bar prompts the success. If the operation fails, a dialog box shows the failure. 4)

In the topological view or on the device explorer, select the device to be deleted. Select [Edit/Delete From This Submap] or [Edit/Delete From All Submaps] or press , and then confirm the operation.

The selected device is then deleted.

Note: z

If there are several copies of the specified device, all of them are deleted after you select a copy and then [Edit/ Delete From All Submaps].

z

If you select [Edit/Delete From This Submap] or press , only the selected copy is deleted.

1-7

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

III. Adding/deleting a link 1)

Select [Edit/Add Object] to display the "Add Object" dialog box. You can also select two objects in the topological view, right click and select [Create Link] to pop up the “Add Object” dialog box.

2)

On the “Object Type” panel, select the link type to be added, enter the related parameters, as shown in Figure 1–6.

Figure 1–6 Adding links 3)

Then click .

If the operation succeeds, the status bar prompts the success. If the operation fails, a dialog box shows the failure. 4)

In the topological view, select the link to be deleted, and then select [Edit/Object Attributes]. In the “Object Attributes” dialog box that appears, click the “Link” tab to display the link attribute list.

5)

Select one or more records in the link attribute list, right click, and then select [Delete].

If the operation succeeds, the status bar prompts the success. If the operation fails, a dialog box shows the failure.

1-8

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

IV. Editing object attributes 1)

In the topological view, select the desired object, and then select [Edit/Object Attributes]. The “Object Attributes” dialog box then appears, as shown in Figure 1–7.

Figure 1–7 Object attributes 2)

On this interface, batch modify the attributes of the objects such as links, nodes, submaps, and so on.

V. Searching for objects 1)

Select [Edit/Search], or press , or click “Search” dialog box appears, as shown in Figure 1–8.

1-9

on the toolbar. Then the

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

Figure 1–8 Searching for objects 2)

In this dialog box, specify the searching conditions, including:

z

Find Type: the object type to search for, such as device, board or port.

z

Find Mode: the searching mode, such as device name, IP or physical address.

z

Find What: the keyword to search for.

z

Match whole word only: whether to use the default fuzzy search.

3)

Click to perform the operation. All the matching records will appear in the "Find Result" list.

4)

Select the record you want to locate in the "Find Result" list, and double click to locate the corresponding record in the topological view or on the panel.

5)

Click to cancel the operation and close the "Search" dialog box.

VI. Refreshing a topological view Select [Edit/Refresh View], or press , or click

on the toolbar. Then the current

topological view is refreshed.

VII. Refreshing a device status This operation is to refresh the polling status of the specified device node. 1)

On the device explorer, select the device node you want to refresh.

2)

Select [Edit/Refresh Status]. 1-10

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

If the operation succeeds, the status prompts the success. The status of the device node is refreshed on the device explorer and in the topological view. If the operation fails, a dialog box shows the failure.

VIII. Setting a start view Select [Edit/Set as Home View], then the current view is set as a start view. It will be displayed when you log in to the NMS next time. The start view is locally saved and is applied to the local terminal.

IX. Saving an icon position Select [Edit/Save Position], or click

on the toolbar. Then the current icon position

is saved. If the icon position is not saved after being changed, the icon position remains unchanged after the view is refreshed or after you log in again.

X. Copying/cutting/pasting an object With this function, you can copy or move the selected device node/submap from one submap to another. 1)

On the topological view, switch to the original submap where the object locates.

2)

Select [Edit/Copy] or [Edit/Cut] to copy or move the selected object to the Clipboard.

3)

Select the target view, and then select [Edit/Paste] to paste the object from the Clipboard.

Caution: z

If you select the cut/paste operation, the selected object is copied to the target view and deleted from the source view.

z

Neither the copy/paste operation nor the cut/paste operation can be performed across multiple views.

z

No recursive copy operation can be performed. For example, you are not allowed to copy submap A to a view under A.

z

Multiple objects can be copied and pasted at one time. To select multiple objects, press and hold and then select the desired objects.

1-11

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

2.2.2 Viewing a Topological View I. Zooming a topological view 1)

Select [View/Zoom In] or click

on the toolbar to zoom in the current view to

1.2 times of its original size. 2)

on the toolbar to zoom out the current view

Select [View/Zoom Out] or click to the 1.2 times of its original size.

3)

Select [View/Zoom In Partially] or click

on the toolbar. Press and hold the

left mouse button and select an area in the view. When you release the left mouse button, the selected area is displayed on the full screen. 4)

on the toolbar to display the whole view on

Select [View/Fit Window] or click the full screen.

5)

on the toolbar to display the view at its original

Select [View/Restore] or click size.

II. Browsing topological view 1)

In the topological view, double click the icon of the submap you want to enter.

Then the submap is switched to, and its topological structure is displayed. 2)

Select [View/UP] or click

on the toolbar, or press .

Then the parent view of the current submap is switched to, and the topological structure of the parent view is displayed.

III. Printing topological view 1)

Select [View/Print Preview].

2)

In the “Preview” dialog box that appears, click or to browse the topological view page by page.

3) 4)

Select [View/Print]. In the “Print” dialog box that appears, select a printer, specify printing range, copies and other desired parameters, and then click . Then the current topological view is printed.

IV. Auto layout 1)

Select [View/Layout Manager] or press to display the “Layout Manager” dialog box.

1-12

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

2)

Chapter 1 Topology Management

In the topological view, select the nodes you want to lay out, and then switch to the desired layout mode to lay them out.

3)

Select [View/Auto Layout] to lay out the nodes selected on the interface in the default mode.

Note: z

We recommend that the objects with obvious star or tree connection be laid out in star or tree mode; those with obvious closed loop be laid out in loop or round mode; those with complicated connection be laid out in dispersal or uniform length mode; and those with simple connection be laid out in uniform length mode or loop mode.

z

You can select some nodes on the interface and try different layout modes to get the best effect.

V. Showing filter and legend 1)

Select [View/Filter&Legend], or click

on the toolbar, or press [Ctrl+F2]. Then

the “Filter/Legend” panel appears on the right side of the topological view. 2)

Select the “Legend” panel to view the legend of the graphics in the topological view. Select the “Filter” panel to filter the objects displayed in the topological view by category.

VI. Showing an aerial view If the size of the topological view is larger than 1024*768 pixels, only part of it can be displayed in the topology window. In this case, you can display the entire topological view and locate the displayed area in the aerial view. 1)

Select [View/Aerial View], or click

on the toolbar, or press.

Then the “Aerial View” window appears in the right part of the topological view. The rectangle area is the visible range of the current topological view. 2)

Click in the "Aerial View" window or press and hold the left mouse button and drag the rectangular area in the window.

Then the display area of the current view is changed. 3)

Click [View/Aerial View] again.

Then the "Aerial View" window is closed.

VII. Showing view navigation tree Select [View/Network Explorer], or click

on the toolbar, or press .

Then the view navigation on the “Device Explorer” panel is displayed.

1-13

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

VIII. Showing topology on full screen Select [View/Full Screen Mode]. Then the topological window occupies the full screen, and the toolbar and system menus are hidden. After the window is closed, the interface shows its actual status again.

IX. Setting icon size 1)

Select [View/Icon Size Setting/Small]. Then the size of the currently displayed icons becomes 16*16 pixels.

2)

Select [View/ Icon Size Setting/Medium]. Then the size of the currently displayed icons becomes 32*32 pixels.

3)

Select [View/Icon Size Setting/Large]. Then the size of the currently displayed icons becomes 64*64 pixels.

2.2.3 Setting Default SNMP Parameters In manual creating of the SNMP device or in device auto discovery, the system uses the default SNMP parameter profile to adapt to the specified device. This can determine the SNMP parameters supported by the device. This operation allows you to modify, add, or delete a default SNMP parameter profile of the system. 1)

Select [Edit/Default SNMP Configuration].

Then the “Default SNMP Configuration” dialog box appears, as shown in Figure 1–9. It lists all of the SNMP parameter profiles in the system.

1-14

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

Figure 1–9 Setting default SNMP parameters 2)

Click the desired SNMP parameter type tab. It includes the SNMP V1 parameter type, SNMP V2 parameter type and SNMP V3 parameter type.

3)

Configure the SNMP parameter profile of the selected type:

z

To add a parameter profile, click . A configuration area appears in the lower part of the dialog box. Enter the parameters and then click . The parameter profile then appears in the profile list.

z

To modify a parameter profile, double click the desired profile in the profile list. Then a configuration area appears in the lower part of the dialog box. Modify the parameters, and then click to confirm the operation. The profile list is also refreshed.

z

To delete a parameter profile, select the desired profile in the profile list, and then click . In the confirmation dialog box that appears, confirm the operation. Then the selected profile is deleted.

4)

After the configuration, click to close the dialog box.

2.2.4 Setting Access Protocol Parameters With this function, you can modify or test the access protocol parameters of the specified device at the NMS side. 1)

On the device explorer, click to select a device node or a submap.

1-15

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

2)

Chapter 1 Topology Management

Select [Edit/Device Access Protocol] to display the “Device Access Protocol” dialog box, as shown in Figure 1–10. The configuration list displays the SNMP parameter/MML parameter configuration of the selected device. The “Detailed Information” text box in the lower part of the dialog box displays the details of the record selected in the list.

Figure 1–10 Setting device access protocol 3)

Click or double click the selected record in the SNMP/MML parameter configuration list. Then the details of the record appear in the lower part of the dialog box.

z

Modify the desired parameters.

z

Click to test whether the parameters are properly configured. A prompt box pops up showing the operation results.

z

Click to confirm the operation.

If the operation succeeds, the status bar prompts the success. If the operation fails, a dialog box prompts the failure. 4)

Click to complete the configuration and close the "Device Access Protocol" dialog box.

1-16

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

2.2.5 Setting Device Maintenance Information With this function, you can add, delete and modify the device maintenance profiles. 1)

Select [Edit/Device Maintenance Info].

Then the “Device Maintenance Info” dialog box appears, as shown in Figure 1–11. It lists all the device maintenance information.

Figure 1–11 Setting device maintenance information 2)

To add the device maintenance, click . Then a parameter configuration area appears in the lower part of the dialog box.

3)

Set the following parameters:

z

[Supporter]: The name of the maintainer. It is mandatory.

z

[Department]: The name of the company in which the maintainer works.

z

[Phone]: The phone number of the maintainer.

z

[Email]: The E-mail address of the maintainer. It should be in standard form, such as [email protected]

After the setting, click . Then the maintenance information appears in the information list. 4)

To modify the device maintenance, double click the maintenance you want to modify in the information list. Then a parameter configuration area appears in the lower part of the dialog box.

5)

Modify the desired parameters and then click to confirm the operation and refresh the information list.

1-17

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

6)

Chapter 1 Topology Management

To delete the device maintenance, select the maintenance you want to delete from the information list, and then click . In the confirmation dialog box that appears, confirm the operation.

7)

Click to close from the "Device Maintenance Info" dialog box.

2.2.6 Auto Device Discovery With this function, the NMS can search the specified IP network segment and device type automatically. It can further add the device to the topological view. 1)

Select [Edit/Auto Discovery] to display the “Auto Discovery” dialog box. The dialog box is as shown in Figure 1–12.

Figure 1–12 Setting auto discovery 2)

Select the desired auto discovery mode from the "Protocol" drop-down list. It is the "IP and SNMP" mode by default.

3)

Select the desired device type from the "Device Type" drop-down list. It is "All Devices" by default.

4)

Enter "PING Times", which is 1 by default. This parameter specifies the PING retries for the specified IP network segment.

1-18

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

The PING retries should be no more than 5 so that the operation will not last for too long. 5)

Enter “Timeout(s)”. This parameter specifies a time limit of the ping operation.

When the time is up, the operation will be stopped. The range is 5–15 seconds. It depends on the complexity of the network. 6)

Enter "Layers", which is 0 by default.

This parameter refers to how many subnet layers the system will search to discover the router in an IP segment. The subnet layer should be no more than 5 so that the operation will not last for too long. 7)

Click the "Physical Path" input box, and move the mouse pointer onto the "Device Explorer" tab or in the topological view. Click the target submap in which the desired device resides.

The path of the target submap then appears in the "Physical Path" input box. 8)

In the "IP Address Range" frame, click to add a new IP address range record.

This record should specify the start IP address, end IP address, and subnet mask of the IP segment that the system needs to search. 9)

Click to delete the IP address range.

10) Click to set the filtered IP address. For example, the IP address range is set as 10.11.242.86~10.11.242.90, and the filtered IP address is set as 10.11.242.87.

Then the IP address will not be

automatically discovered. 11) Click and to set whether to discover in the default IP address range. 12) Click to pop up the "Default SNMP Parameter" dialog box. Select the SNMP parameter profile that is used to adapt to the device you want to search for. By default, all default SNMP parameter parameters are used. 13) Click to confirm the operation.

Note: For the time being, the auto device discovery function is only applicable to the devices that use the SNMP.

1-19

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

2.3 Deploying Devices Reasonable device deployment in the NMS can make the communication network more visual and improve the operability of the NMS. Generally, deploying device should experience four phases: Preparations–>Creating a Submap–>Adding a Device to the NMS–>Creating a Link.

2.3.1 Preparations Deploying a device is to deploy communication devices in the network in the topological view. Before deploying a device in the topological view, you should plan the topological submaps reasonably. If there are too many devices in a very large network, it is very difficult to locate and manage a device in one topological view. You can classify the topological view into topological submaps by: z

Geographical region, that is, the region where the communication device is located.

z

Device type, that is, the type of the communication device.

z

IP network segment, that is, the IP address of the communication device.

z

Manager of the device.

Note: z

Up to 300 devices can be added to each submap. If there are too many devices in a submap, the interface of the NMS will be much crowded and the devices will be overlapped. This will make locating devices inconvenient.

z

Submaps should be arranged in 5 layers at most. If they are arranged in too many layers, it will cause much trouble to operate on the NMS.

2.3.2 Adding a Submap There is a very large and complex communication network. To ease the management and operation, you can divide it into several subnets based on the geographical region, type or IP network segment of devices. Each subnet is mapped to a submap in the topology. Adding a submap helps you to manage the communication network easily. Each subnet can correspond to a submap.

2.3.3 Adding a Device to the NMS After planning the communication network and creating a submap, you should add a device to the NMS. 1-20

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

Take the two steps below to add a device to the NMS:

I. Configuring NMS and device data Before adding a device to the NMS, configure SNMP parameters at the NMS side and NMS workstation parameters at the device side. Get Community/Set Community must be exactly the same at both sides. In order to improve the security of the system, do not use the default community names. You should configure the following data in the NMS: 1)

The network management protocol and parameters supported by the managed devices.

If the SNMP is used to manage the devices, you should configure the default SNMP parameters of the NMS. See “Set Default SNMP Parameters”. 2)

According to the different device types, the following data should be configured at the device side:

z

Network management protocol and parameters supported by the managed devices.

z

ACLs of the devices.

z

Trap center.

z

Other parameters.

For different devices, different parameters need be configured at the NMS and device sides in different ways. For details, refer to the user manuals of the respective network management subsystems.

II. Adding a device There are two methods to add a device to the NMS. z

Add devices manually

First specify the type, IP address, name, submap, network management protocol and parameters of the device you want to add. Then add the device to the NMS. z

Auto device discovery

First specify the IP network segment you want to search, automatically discover the desired device within the network segment. Then add it to the NMS. The auto discovery mode applies only to the devices that support the SNMP. See “Auto Device Discovery”. After adding a device to the NMS, you can copy/cut and paste the device to move it among different submaps to modify the layout of the topological view.

2.3.4 Add Links After adding a device to the NMS, you can add the physical links between devices in the NMS. If a logical connection exists between two submaps, between a submap and

1-21

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 1 Topology Management

a device, or between two devices, you can add the corresponding virtual link to the NMS.

2.3.5 Device Deploying Example Below shows the device deployment. z

Office A: MA5100

z

Office B: MA5100 and MA5200

z

Office C: MA5200 and NE16

z

NMC (Network Management Center): Radium 8750 and NE80

z

Links: MA5100->Radium 8750, MA5200->Radium 8750, NE16-> NE80 10.11.25.5/24

iManager N2000 Server

Client 2 10.11.25.1/24 HUB

NMC Room

10.11.25.2/24 10.11.25.6/24

Radium 8750

Client 3

10.11.25.4/24

10.11.25.3/24

DCN

NE80 Client 1

211.124.8.1/24

MA5100

211.124.8.2/24 212.12.8.1/24 MA5100

MA5200

Office A

201.224.5.2/24 212.12.8.2/24 MA5200

Office B

NE16 Office C

Figure 1–13 NMS networking example The procedures for deploying devices are as follows: 1)

Divide the managed communication network into four regions: "Office A", "Office B", "Office C", and "NMC Room".

2)

Create four submaps in the physical topology: "Office A", "Office B", "Office C", and "NMC Room".

3)

Name devices after their IP addresses.

4)

Create MA5100 211.124.8.1 in the "Office A", MA5100 211.124.8.2 and MA5200 212.12.8.1 in the "Office B", MA5200 211.12.8.2 and NE16 201.124.5.2 in the "Office C", and Radium8750 10.11.25.2 and NE80 10.11.25.3 in the "NMC Room".

5)

Create

links

between

211.124.8.1–10.11.25.2,

211.124.8.2–10.11.25.2,

212.12.8.1–10.11.25.2, 212.12.8.2–10.11.25.2, and 201.224.5.2–10.11.25.3.

1-22

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

Chapter 3 Fault Management Fault management is used to process the device alarms and the alarms of NMS itself. The management functions include querying the alarm history and operation information of devices, and querying and configuring device alarm information. The main window for fault management is shown in Figure 3-1.

Figure 3-1 The main window for fault management

3.1 Basic Concepts 3.1.1 Alarm Definition Alarm (event) information may come from various device modules or service boards. Alarms can be classified into operation information, fault alarm and recovery alarm by alarm type. Fault alarms and recovery alarms correspond to each other one by one. Alarms (events) can be classified into four levels in the descending order of severity: critical, major, minor, and warning. After an alarm is generated, the system broadcasts it to the terminals according to the condition of the configured terminals, mainly to the NMS users and Command Line 3-1

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

Interface (CLI) users. Whether an alarm will be reported the terminals are specified in alarm control.

I. Alarm ID An alarm ID consists of four bytes, indicating a unique alarm. Each alarm ID corresponds to an alarm. Generally, alarm IDs are allocated according to alarm type and alarm module type.

II. Alarm level Alarm (event) level is used to identify the severity of an alarm. Alarms can be classified into four levels in the descending order of severity: critical, major, minor, and warning. z

A critical alarm refers to a global alarm that endangers the normal operation of the device and needs to be handled, like power failure, output clock failure, and so on.

z

A major alarm refers to a board or line failure within the limited range. The user services will be abnormal if the user does not handle it in time. Examples of such alarm include fiber cut, fault in physical line, and so on.

z

A minor alarm refers to an ordinary fault alarm or event alarm that shows the board or line abnormality, like the bit error on a physical line.

z

A warning refers to a status change or event that does not affect the system performance and user services but interests the operator. A warning may also be a message that prompts the recovery from a device abnormality.

III. Alarm category By function, alarms can be classified into power alarm, environment alarm, trunk alarm, hardware alarm, software alarm, operation alarm, communications alarm, service quality alarm, and error processing alarm.

3.1.2 Term Explanations I. Real-time alarm Real-time alarms refer to the alarms that are reported after the real-time alarm browser is started. The real-time alarm browser can automatically scroll down to display the latest alarms on the screen.

3-2

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

II. Current alarm Current

alarms

refer

to

the

unacknowledged&unrecovered

alarms,

unacknowledged&recovered alarms and acknowledged&unrecovered alarms. A current alarm requires human intervention.

III. Historical alarm Historical alarms refer to the acknowledged&recovered alarms. A historical alarm does not require human intervention.

IV. Real-time event Real-time events refer to the events that are reported after the real-time event browser is started. The real-time event browser can automatically scroll down to display the latest events on the screen.

V. Alarm acknowledgement By the alarm acknowledgement status, the user can easily identify which alarms have been handled and which alarms have not. Then the user can take different measures to handle the alarms in two different statuses. The system supports manual and automatic alarm acknowledgement.

VI. Alarm status transition In case of a device fault, the device sends an alarm to the NMS. The NMS receives the reported alarms in real time. For the time being, the NMS supports the alarms and events reported in form of MML and SNMP Trap. The latest alarms received by the NMS are unacknowledged&unrecovered. After the fault is eliminated, the alarm is acknowledged manually or automatically. When the NMS receives a recovery alarms, the alarm becomes recovered. The acknowledged&recovered alarm becomes a historical alarm and is not handled as a current alarm. Current alarms include all unacknowledged and/or unrecovered alarms, and they can be handled in a centralized manner. The alarm status transition model is shown in Figure 3-2.

3-3

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

Network Element

Report

Acknowledge

Unacked but Unrecovered Alarm

Recover

Acked but Unrecovered Alarm

Acknowledge

Unacked but Recovered Alarm

Recover Historicial Alarm

Figure 3-2 Alarm status transition model

3.2 Functions 3.2.1 Browsing Alarm To facilitate browsing and querying alarms, the system provides alarm profile. The alarm profile helps you to: z

Get the concerned alarm information in time.

z

Identify critical alarms from a large number of alarms so as to perform efficient network management.

z

Divide alarms into several manageable groups based on your filtering conditions.

Through the fault browser, you can open these windows easily: “Realtime Alarm Browse”, “Current Alarm Browse”, "Realtime Event Browse”, “Event Browse”, and “Alarm History Browse”. Taking the real-time alarm browsing as an example, this section explains how to browse and query alarms. 1)

Select [Fault/Fault Browser] to open the main interface of the fault browser. The fault browser appears in the left part of the main interface, and the "Realtime Alarm Browse" window appears in the right part, as shown in Figure 3-3.

3-4

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

Figure 3-3 Browsing real-time alarms 2)

In the opened “Alarm Filtering Condition Setting Panel”:

z

Enable the "Select Resource" switch, and then click .

z

In the "Select Resource" dialog box that appears, select the desired device, and then click to add it to the "Select Devices" list.

z

Enable the "Severity" switch, and then select the desired alarm severity.

z

Enable the "Function Class" switch, and then select the desired alarm function category.

z

Select the desired alarm fields in the "Displayed Column" list box.

z

Click to validate the filtering conditions immediately and turn the "Alarm Filtering Condition Setting Panel" into a filtering condition character string

3)

Click to update the currently selected real-time alarm browsing profile.

z

If the default profile is selected, the "Save as" dialog box will appear for you to save the alarm filtering conditions as a new profile.

z

Enable the "Automatic Scroll Down" at the bottom left corner of the "Realtime Alarm Browse" window.

z

If a new alarm is reported to the "UnAck" or "Ack" list, the list will automatically scroll to the bottom to show the latest alarms.

4)

Select one or multiple alarms in the "UnAck" list, right click, and then:

z

Select [Ack Alarm]. Then the selected unacknowledged&unrecovered alarms will be moved from the "UnAck" list to the "Ack" list, and the selected unacknowledged&recovered alarms will be deleted from the "UnAck" list.

3-5

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System z

Chapter 3 Fault Management

Select [Clear Alarm]. Then the selected acknowledged&unrecovered alarms will get unacknowledged&recovered. Recovered alarms cannot be manually recovered. Select [Detailed] to display the "Detailed Information" window.

z

Select [Locating to] to locate the topological node that experiences an alarm

5)

Select one or multiple alarms in the "Ack" list, right click, and then select [Ack Alarm], [Recovery], [Locating to], or [Detailed].

6)

To avoid reconfiguring the alarm filtering conditions, you can open the alarm browsing window from the real-time alarm browsing profile you have defined.

3.2.2 Alarm Statistics This operation lists the alarm data in two dimensions according to the specified conditions, helping you analyze the device operation status. Alarm statistics involves: setting alarm statistics conditions, showing statistics results, and saving and printing statistics results. The alarm statistics conditions include: alarm object, function class, alarm level, alarm time range, and alarm. The main interface of the "Alarm Statistics" window consists of three parts: statistics condition setting panel, statistics result list, and status bar. 1)

Select [Fault/Fault Browser] to start the fault browser.

2)

In the fault browser, double click the "Alarm Statistics" node to expand the profile node for alarm statistics.

3)

Double click the "by Month&Severity" profile node. The "Alarm Statistics" window then appears.

4)

In the "Statistics Condition Setting Panel", the statistics conditions are month and alarm severity. Click to measure all alarms by month and alarm severity. Reconfigure the query conditions. The condition settings here are the same as those for "Create Alarm Statistics Profile".

5)

Click to validate the statistics conditions immediately and turn the "Create Alarm Statistics Profile" into a statistics condition character string.

6)

Click to update the current alarm statistics profile with the current statistics conditions.

Note: z

If no control is available for changing statistics conditions, you can click the triangle button at the upper left corner of the fault display window to display the controls. Changing statistics conditions does not result in an updated profile.

z

The system provides a default profile for alarm statistics by month&severity.

3-6

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

3.2.3 Setting Local Alarm Attributes Using this function, you can set real-time printing, alarm panel, and audio/visual alarm, facilitating you in getting the reported alarms from the NMS in time. 1)

Select [Fault/Fault Setting/Local Property]. Then the "Local Property" dialog box appears, as shown in Figure 3-4.

Figure 3-4 Setting local properties 2)

Click the “Realtime Printing Setting” tab, the "Alarm Panel Setting” tab, and the “Audio&Visual Setting” tab to set the local properties.

z

Realtime Printing Setting: Select the “Enable Realtime Printing” check box. Select the “Severity” check box, and then select the alarm severity. Select the “Function Class” check box, and then select the function class. Select the columns you want to print.

z

Alarm Panel Setting: Select the display mode of the alarm panel and that of the alarm indicator.

z

Audio&Visual Setting: Set alarm display color and alarm sound.

3)

Click to save your settings and close the “Local Property” dialog box.

3.2.4 Setting Automatic Alarm Dumping Automatic dumping is used to dump alarm history data to files regularly, during which the dumped alarm history data will be deleted. This operation improves the efficiency 3-7

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

and stability of the system. Using this function, you can set the attribute of automatic dumping. 1)

Select [Fault/Fault Setting/Dump&Sync&Ack] to display the "Dump&Sync&Ack" dialog box.

2)

Select the "Others" tab, as shown in Figure 3-5.

Figure 3-5 Setting automatic alarm dumping 3)

To enable the automatic alarm dumping, select "Enable Alarm Auto Dumping".

4)

In the tab, enter the conditions and period for automatic acknowledgement.

5)

Click to save your settings and close the "Dump&Sync&Ack" dialog box.

Note: z

"Alarm Generated x Days ago" means that alarms generated x days ago will be automatically dumped. For example, if x=90, only the alarms generated 90 days ago (with regard to the time when automatic dumping is performed) will be automatically dumped.

z

"Auto Dump Intervals x days" indicates the period for the automatic dumping. If it is set to 5 days, the system will perform automatic dumping once every five days.

z

Only historical alarms can be automatically dumped while the current alarms cannot.

z

By default, the automatic dumping starts at 1:00 AM.

3-8

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

3.2.5 Setting Automatic Alarm Acknowledgement Using this function, you can set the conditions for automatic alarm acknowledgement. 1)

Select [Fault/Fault Setting/Dump&Sync&Ack] to display the "Dump&Sync&Ack" dialog box.

2)

Select the "Others" tab.

3)

Select the "Enable Auto Ack" check box.

4)

Enter the conditions on the panel.

5)

Click or to save your settings.

Note: z

"Alarm Generated x days ago": The alarms generated x days ago will be automatically acknowledged. For example, if x=3, then the alarms generated 3 days ago (with regard to the time when the alarm is automatically acknowledged) will be automatically acknowledged.

z

"Auto Ack Interval" indicates the period for the automatic acknowledgement. If it is set to 5 days, the system will perform automatic acknowledgement once every five days.

z

The unrecovered alarms will also be automatically acknowledged.

z

By default, the automatic acknowledgement operation starts at 0:00.

3.2.6 Setting Alarm Synchronization When the failure of the communication between the NMS and a device recovers or when the NMS is restarted, you should synchronize the alarm information to make the alarm information consistent. Because the synchronization operation greatly affects the system performance, it is provided only for alarms but not for events. 1)

Select [Fault/Fault Setting/Dump&Sync&Ack] to pop up the "Dump&Sync&Ack" dialog box.

2)

In the device tree in the left part of the window, select a device node.

3)

If you want to synchronize alarms when the NMS is restarted, select "Auto-synchronizing when the system starts".

4)

If you want to synchronize alarms when the failure of the communication between the NMS and a device recovers, select "Auto-synchronizing when the communication recovers".

5)

Click or to save your settings.

3-9

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

Note: You can set alarm synchronization for multiple devices at one time, but your settings will not work until you click or .

3.2.7 Setting Remote Alarm Notification This operation can be used to set the attribute of alarm transferring to e-mail. With this function, when the system is faulty and the maintainer is absent, the NMS can notify the operation status of the system to the maintainer. 1)

Select [Fault/Fault Setting/Remote Notification] to display the "Remote Notification" dialog box.

2)

In the dialog box, click to display the "Add" dialog box, enter the profile name, and then click to add the profile name in the "Profile Name" tree.

3)

Select the desired function class, alarm resource, and severity.

4)

Enter an e-mail address.

5)

Set the time length for the notification delay to prevent the NMS from still sending a reported alarm after the corresponding recovery alarm is received.

6)

Click to set the Simple Mail Transfer Process (SMTP) Server and the sending address.

7)

Click to save your settings and close the “Remote Notify” dialog box.

Note: z

The alarm notification e-mail messages provide the number and details of critical alarms, the number and details of major alarms, the number of major alarms, and the number of warnings.

z

To set Domain Name Server (DNS) under Solaris operating system:

a) Add “nis” and/or “dns” to the “hosts” of “/etc/nsswitch.conf”, with the content being: hosts: files dns b) Set the gateway of the DNS in “/etc/defaultrouter”, with the content being: 10.11.43.254 c) Set the IP address of the DNS in /etc/resolv.conf, with the content being: nameserver 10.15.1.3 nameserver 129.9.111.100 domain

huawei.com

3-10

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

3.2.8 Setting Alarm Correlation I. Setting Root-Cause Regulations Root-cause correlation analysis is to analyze device alarms comprehensively and efficiently by using the regulation-based correlation analysis technique. This reduces network storm and enables the maintainers to locate fault quickly. This operation allows you to add or delete alarm correlation analysis regulations. 1)

Select [Fault/Fault Setting/Alarm&Event Correlation] to pop up the "Alarm&Event Correlation" dialog box.

2)

Select the "Root-cause Regulations" tab.

3)

Click next to "Source Alarm or Event Name" to pop up the "Select Alarms" dialog box.

4)

Select an alarm and click .

5)

Select an alarm in the "Related Alarm or Event Name" in a way similar to Steps 3 and 4.

6)

Select an action from the "Action" drop-down list.

7)

Select the relationship between the source alarm and the target alarm from the "Relation" drop-down list.

8)

Click .

9)

Click to save your settings and close the "Alarm&Event Correlation" dialog box.

II. Repeated Event Definition No event can be recovered. Even though the cause for an event has disappeared, status of the event remains unchanged. Therefore, the same event may be due to different causes. For the events with the same product type, event ID and locating information that are reported within a period, you should not discard them directly (repeated alarms are so handled). You should handle them according to your settings. 1)

Select [Fault/Fault Setting/Alarm&Event Correlation] to pop up the "Alarm&Event Correlation" dialog box.

2)

Click the "Repeated Event Definition" tab.

z

Select the desired device type on the “Device Type” tree, and select the desired event from the “Event Name” list.

z

Enter a period in the "Report Interval" input box.

3)

Click to select “Enable Correlation Analyzing”.

4)

Click or to save your setting.

3-11

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

III. Set Flash Alarm When the interval between the first recovery of an alarm and the second recovery of the alarm is very short, this alarm is defined as a flash alarm. For the flash alarm, the system only receives the first report, and the subsequent reports will be masked. This operation allows you to set flash interval for alarms. If the interval between the previous alarm recovery and the current alarm recovery is less than the set interval, the system will mask the alarm and does not handle it. 1)

Select [Fault/Fault Setting/Alarm&Event Correlation] to pop up the "Alarm&Event Correlation" dialog box.

2)

Click the "Flash Alarm" tab.

z

Select the desired device type on the “Device Type” tree, and select the desired alarm from the “Alarm Name” list.

z

Enter a flash interval in the “Flash Interval” edit box.

3)

Click to select “Enable Correlation Analyzing”.

4)

Click or to save your setting.

3.2.9 Locating Alarm/Event Using this function, you can locate the object that experiences the specified alarm or event. This operation can be performed in all alarm/event browsing/querying windows. 1)

Open an alarm/event browsing/querying window, select an alarm or event, right click, and then select [Locating to].

2)

The alarm/event object then is located, with a white frame surrounding it.

Note: z

The display focus can be located to not only the topological node level but also a specific object (board, port, and so on) on the panel.

z

If no alarm/event object is found, the alarm/event locating operation will be stopped.

3.2.10 Managing Alarm Maintenance Tips Using this function, you can record your experience in handling alarms for future reference. 1)

Select [Fault/Fault Setting/Maintenance Tips] to display the "Maintenance Tips" dialog box, as shown in Figure 3-6.

3-12

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

Figure 3-6 Maintenance tips 2)

Select a device type in the device type tree in the left part of the dialog box, and then the corresponding alarms appear in the table in the right part.

3)

Select an alarm in the table.

4)

In the "please input your maintenance tips" column, type your experience in handling alarms.

5)

Click or to save your maintenance tips.

Note: z

You can sort the alarm table based on a column by double clicking the corresponding column heading.

z

The input column provides automatic and forced line wrap functions. When a line is too long, a new line will be used.

3.3 Troubleshooting An alarm will be reported when a device or line fault occurs. The alarm information helps you to find the alarm cause and locate the fault. After that, you can take corresponding measures to eliminate the fault.

3-13

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

Please follow these steps to process a device fault: Preparation->Getting Alarm Information->Analyzing Alarm->Eliminating Fault->Acknowledging and Recovering Alarm->Sharing Alarm Maintenance Tips.

3.3.1 Preparation To facilitate processing device faults and getting alarm information, you should make these operations:

I. Setting alarm attributes Except the attribute "remote notification", Default values are provided for the attributes except “remote notification”. You can use the default settings or change them as required. z

Setting alarm panel: Setting the display mode of the alarm panel and alarm indicators.

z

Setting alarm real-time printing: Setting the print conditions, and printing the reported alarms in teal time. The printer should be connected to the computer.

z

Setting alarm transferring to e-mail: Setting the e-mail address to notify alarms to the remote user.

Besides, the system supports the sending of visual and audio alarms by the alarm box. You need equip alarm box produced by Huawei.

II. Creating profile For the convenience of alarm browsing, querying and statistics, the system provides the function of customizing profile. Alarm profile enables different users to attend to the alarms concerned, makes it easier to set alarm query and statistics conditions, and makes the handling of device faults more efficient.

III. Setting alarm correlations If a fault occurs, several correlative alarms may be reported together as well as the alarms caused by the fault itself. The setting of alarm correlations makes the alarm reporting more efficient and the fault locating easier. The correlation setting mainly involves: z

Set Root-Cause regulations

z

Define repeated event

z

Set flash alarm

z

Enable correlation analysis

z

Redefine alarm severity

3-14

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

3.3.2 Getting Alarm Information To get alarm information in time is important for fault locating. There are various means to get alarm information.

I. Alarm panel Through alarm panel, you can monitor the alarms of the whole network. According to the statistics conditions (by severity or by status), the alarm panel shows the information such as the numbers of acknowledged alarms and unacknowledged alarms of different severities.

II. Topology The status icon on the upper left of the topological object indicates the alarm status of the object. Different icons indicate different severities. In the topological view, select a topological object with alarm status icon, right click to select [Browse Alarm] to open the alarm browser.

III. Alarm browser Using the alarm browser, you can view the reported alarms in real time. Multiple query functions are also provided. You can select alarm profiles and set querying conditions to filter alarms. The major query functions include: z

Browse real-time alarm

z

Browse real-time event

z

Query current alarm

We recommend that the profile-based query be preferred.

IV. Alarm box You can get alarm notifications through alarm box. The alarm indicators and the alarm sound will show the alarm information. The system provides the operations such as stopping alarm box sound and turning off alarm box indicator.

V. Sound box The speaker connected with the system will notify you of the alarm information. The system provides the operations such as setting alarm sound and stopping current alarm sound.

VI. Alarm transferring to e-mail With the remote alarm notification function, the NMS can send alarms to the remote users in e-mail. 3-15

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

VII. Printer You can print the alarm information in real time for permanent backup.

3.3.3 Analyzing Alarm The system provides functions such as filtering repeated alarms, analyzing alarm correlations, and so on to make the obtained alarm information as valid as possible. Multiple and various valid alarms might be available. You should find out the real alarm causes according to the alarm-related information, including time, device status, and so on. The alarm causes might be very complicated. The alarm causes in the alarm details window are only prompts. You should analyze, deduct and verify the real alarm causes according to the prompted alarm causes and the actual situation. You can analyze alarms from these aspects: 1)

Through alarm details and related experiences

2)

The system supports not only to jump from a topological node to the corresponding alarm window, but also to locate the faulty topological node or port based on the alarm information.

Besides, the system provides port searching function. You can quickly locate the faulty port by inputting the string for port description.

3.3.4 Eliminating Fault After finding out the real alarm causes, you can take corresponding measures to eliminate the fault. You can locate the faulty device according to the location information provided in the alarm details window, and then eliminate the device fault according to the recovery suggestions provided and the alarm maintenance tips. The fault recovery suggestions are general resolutions. Maintenance tips are the summary of the experience in troubleshooting. The same type of alarms may be due to different causes and require different resolutions. You should refer to the fault recovery suggestions to properly accumulate and update alarm maintenance tips. Besides, after eliminating the fault, we suggest that you summarize the experience immediately.

3.3.5 Acknowledging and Recovering Alarm If a fault has been cleared, you should acknowledge the relevant alarm to extract valid alarm information.

3-16

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System z

Chapter 3 Fault Management

The system provides the functions of manual alarm acknowledging and automatic alarm acknowledging. The automatic alarm acknowledging is performed periodically.

z

After recovering from a fault, the device will report a recovery alarm. The fault system might not receive the recovery alarm due to some reason. The fault information will still exist. In this case, you should recover the alarm manually.

After the alarm is acknowledged and recovered, detailed information will be recorded including the acknowledgement user, alarm time and acknowledgement time. The corresponding alarm indicator on the alarm panel will turn green. Moreover, after a certain period, the alarm panel and alarm box will automatically stop their alarm sound, and the alarm box will turn off the corresponding alarm indicator. Alternatively, you can manually stop them immediately The specific operations include: z

Stop current alarm sound

z

Stop alarm box sound

z

Turn off alarm box indicator

3.3.6 Sharing Alarm Maintenance Tips You should accumulate and record your experience in troubleshooting, particularly after getting new solution to eliminate a new alarm. The alarm maintenance tips are very helpful for you to handle similar faults in the future. You can view, add and update the alarm maintenance tips: z

In Alarm "Detailed Information" dialog box, click to enter "Maintenance Tips" dialog box.

z

Enter the "Maintenance Tips" dialog box through menu operation.

3.3.7 An Example of Troubleshooting 1)

Preparations:

z

Set alarm display mode as "Alarm panel pops up when a new alarm arrives", set alarm indicator as "Alarm panel flashes when uncleared alarm exists".

z

Create a "Major Alarm" profile to detect all major device alarms timely.

z

Enable correlation analysis, and set the flash interval as 150 seconds.

2)

When the alarm panel pops up and the major alarm indicator flashes, double click the indicator to pop up the current alarm querying window. Then the queried alarm information is displayed in the right part of the window.

3)

Select an alarm record and double click it. The "Detailed Information" dialog box then appears showing the following information:

z

Device Name: Office A MA5100_1

z

Device Type: MA5100

3-17

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 3 Fault Management

z

Alarm Name: LAN opposite end does not support self-negotiation.

z

Severity: Major

z

Function Class: Event

z

Status: UnAck&UnClear

z

Generated Time: 2002-09-27 10:57:02

z

Locating Info: Frame=0 Slot=1 Port=5

According to alarm name and alarm processing experiences, you may find the probable causes: LAN local end supports self-negotiation, while the opposite end does not support. Then find the port and check the port mode according to the device name and Location Information. 4)

Take the following measures: Set the same port mode for the local end and opposite end of LAN.

5)

Summarize and record the alarm processing experience, and then acknowledge and recover the alarm manually.

3-18

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

Chapter 4 Performance Management Performance management supports collecting, browsing and measuring performance data of all managed devices in an integrated manner. With this function, you can get to know the basis information and performance status of the current network, which can help you to prevent network failures and plan the network reasonably. For the explanation of the concepts involved in the performance management, see Table 4-1. Table 4-1 Explanation of the basic concepts involved in the performance management Concept

Explanation

Measuring Object

A measuring object is a managed object on which the performance data is collected, such as a device, board, port, logical port and PVC. Each measuring object has a unique identification within the network.

Performance Metrics

A parameter measuring the running performance of a system (NE, NMS or network). It can be obtained through arithmetic of one or more Managed Information Base (MIB) objects. For example, ADSL line downstream noise margin is obtained by calculating X1 and X2 MIB objects through Y1 and Y2 operations. Each performance metrics has one unique ID.

Performance Profile

A performance profile combines several performance indexes so that it applies to one type of NEs, such as ADSL port performance collection profile of the MA5100 and ADSL performance collection profile. Each performance profile has a unique ID.

Measuring Entity

A parameter of the data that must be collected during the measurement, like traffic, calling times and average seizure duration. It can be considered as a measuring variable.

Measuring Unit

A type of specific measurements, such as the incoming office traffic measurement, outgoing office traffic measurement, internal traffic measurement. It can be described with such elements as the entity, object, time and output ranging, and provides answers to such questions as what, when, how to measure, and when to output the measuring results.

Task

A group of descriptions of a specified traffic measurement operation, involving multiple respects, like description of the statistic object features (specifying calls specified in the statistic range), that of the statistic time, output entities and output time.

Traffic Measurement Report

A report describing the measurement result of one type of traffic, as well as measuring object, measuring entity value, measuring cycle and start date and end date of the measurement, providing a basis for the whole network performance measurement, planning and running management.

4-1

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

4.1 Realtime Performance Management Realtime performance management provides the function of browsing realtime performance data of the objects. You can browse the realtime performance data as well as save the data.

4.1.1 Adding/deleting Performance Indexes This operation enables you to add or delete performance indexes of an object. 1)

Select [Performance/Add/Delete Performance Index] to display the “Add/Delete Performance Index” dialog box.

2)

In the “Optional Indexes” drop-down list, select a profile.

3)

Select one or more indexes (selecting multiple indexes while pressing or ), click

to add the specified indexes to the selected list. You can click

to add all available indexes to the selected list. 4)

Click to save the modification.

4.1.2 Saving Data While browsing the view containing the realtime performance data, you can save the data to a file of another format for further processing and for future use. You can save the current view as an HTML file (.html) containing pictures. You can also save the data that you are viewing as an Excel file (.txt) or Text file (.txt). Perform the following operations to save the data. 1)

Select [Performance/Save as] to display the file saving dialog box.

2)

In the dialog box, select the file type the data is to be saved as: .html, .csv or .txt.

3)

Select the directory the file is to be saved and enter the file name.

4)

Click .

Note: The default file name provided by the system consists of the object browsed and time.

4.1.3 Adjusting Refresh Frequency When browsing the performance data in real time, you can select one refresh frequency from highest, higher, normal, lower or lowest. After a frequency is selected, the client will refresh the interface display according to the refresh frequency. 1)

Select [Performance/Frequency]. 4-2

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

2)

Chapter 4 Performance Management

Select one refresh frequency from the following options: Highest, Higher, Normal, Lower or Lowest. By default, “Highest” is selected.

Note: z

Highest frequency sampling means that each time the data is reported by the device, it is displayed. Higher frequency sampling means that one of two data reported by the device is displayed. For normal, lower and lowest frequency sampling, one of three, one of four and one of five data are displayed respectively.

z

The realtime performance management function is only supported by the broadband devices. You can display the realtime performance measurement window through the right-click menu of the modules of the NM subsystems.

4.2 Task Management The task management module supports creating and managing collection tasks. Creating a collection task is the prerequisite to performance data measurement. The collection task can collect data according to the time interval set by the collection period. After a task is created, you can perform the following operations: z

data management

z

time distribution analysis

z

global traffic flow measurement

z

call failure measurement

z

data mending

The task management module can modify, suspend, resume and delete the existing tasks, and view detailed information of the selected device tasks.

4.2.1 Viewing Tasks This operation enables you to view the information about all existing tasks, as well as the detailed information about one task. You can perform the operation only when the tasks are available on the “Task Management” window. 1)

Select [Performance&Stat/Task Management] to display the “Task Management” window.

2)

On the upper part of the window, select the device type which you want to view tasks from the "Device Type" drop-down list. The tasks meeting the conditions are displayed on the window, as shown in Figure 4-1.

4-3

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

Figure 4-1 Task management window 3)

Select a task to be viewed, right click it and then select [View Task], or double click the task to display the “Task Details” dialog box showing the detailed information of the task.

4)

Click the headings of the tasks to sort the tasks.

After the operation, the detailed information of the task is shown in the “Task Details” dialog box: Task Name, Device Task Id, Device Name, Measuring Unit, Objects, Output Port, Time Range (Start Date, End Date and Polling Period) and Collection Time.

4.2.2 Creating Tasks This operation enables you to create tasks according to the selected device type, device name, measuring unit and measuring object. You can also specify a validity period and a data collection period for a task. For the broadband devices, you can select multiple devices for one task, and before creating a task, you can test it.

I. Operation procedure 1)

Select [Performance&Stat/Task Management] from the main menu to display the "Task Management" window.

2)

On the upper part of the window, select a device type from the "Device Type" drop-down list and a device name from the "Device Name" drop-down list. If there are tasks meeting the conditions, they will be displayed on the lower part of the window.

4-4

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

3)

Chapter 4 Performance Management

Right click and then select [Create Task] to display the "Create Task" dialog box as shown in Figure 4-2.

Figure 4-2 Creating task dialog box 4)

The default task name is displayed in the "Task Name" text box. You can change it to the desired task name.

5)

Select the desired device from the "Device Name" list box.

6)

Select the desired measuring unit from the "Measuring Unit" drop-down list.

7)

Select the desired output port from the "Output Port" list box. “NMS Port” is recommended.

8)

Select a polling period from the "Polling Period" drop-down list. It should be longer than five minutes.

9)

Click next to the "Start Time" and "End Time" boxes to specify a valid time segment. Note that the end time should not be earlier than the start time and the start time should not be earlier than the current time.

10) Click . In the "Advanced" dialog box that appears, select a collection period: daily, weekly, or monthly, and then click . 11) In the "Measuring Object" frame, unfold the "Root" and then select the desired check boxes. Then the measuring objects are grouped based on the object type displayed in the "Root". Select at least one measuring object. 12) Click and then view the newly added task in the task list.

II. Parameter specification [Device Type]: All device types supported by the performance module. [Device Name]: After a device type is selected, all devices of the type are displayed in the "Device Name" drop-down list.

4-5

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

[Task Name]: Name of the task. [Measuring Unit]: After a device is selected, all measuring units supported by the device are displayed in the "Measuring Unit" list. [Output Port]: It can be "Statistic Port" or "NMS Port". When the "Statistics Port" is selected, the system transmits analysis data to the Background Administration Module (BAM). When the "NMS Port" is selected, the system transmits the collected performance analysis data to the Network Management Port. By default, the "NMS Port" is selected. [Objects]: A measuring object supported by the selected device and measuring unit. [Start Data]: Start time of the task. [End Date]: End time of the task. [Polling Period]: The polling period for data collection. The options include: 1 minute, 5 minutes, 15 minutes, 30 minutes, 1 hour, and 1 day. [Set Time]: The time segment for data collection within each day. A maximum of 3 time segments can be specified, which can be of the same or different duration but should not be repeated. [Polling Period]: The options include: daily, weekly, and monthly. z

If "Daily" is selected in the "Advanced" dialog box, performance data will be collected at the time segments set in step 9 within the polling period set in step 8.

z

If "Weekly" is selected in the "Advanced" dialog box, you need to specify the days for data collection within each week. If you select "Tuesday" and "Saturday", performance data will be collected at the time segments set in step 9 within the polling period set in step 8.

z

If "Monthly" is selected in the "Advanced" dialog box, you need to specify the days for data collection within each month. If you select the 1st, 10th and 20th days for data collection within each month, performance data will be collected at the time segments set in step 9 within the polling period set in step 8.

Note: z

A maximum of 3 time segments can be selected for the data collection within a day, for example, 10:00~12:00, 14:00~16:00 and 18:00~22:00.

z

For the broadband devices, multiple devices can be selected for one task. Note that the devices should be devices of one device type and one version.

4-6

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

4.2.3 Suspending Tasks This operation enables you to suspend one or more collection tasks in running status at one time. Once a task is suspended, it can be modified, resumed or deleted. 1)

Select [Performance&Stat/Task Management] from the main menu to display the "Task Management" window.

2)

On the upper part of the window, select the device types of the tasks you want to suspend from the "Device Type" drop-down list.

3)

On the upper part of the window, select the device names of the tasks you want to suspend from the "Device Name" drop-down list.

4)

The tasks meeting the conditions will be displayed on the lower part of the window.

5)

Select the tasks you want to suspend, right click it and then select [Suspend Task].

6)

In the confirmation dialog box that appears, click to confirm the operation or to abort the operation.

If the operation succeeds, the selected tasks change to the "Suspended" status, and the indicators in front of them turn red. If the operation fails, the system prompts that the selected tasks fail to be suspended. If the operation partially succeeds, the system prompts that not all of the selected tasks are suspended successfully. Click to view the detailed operation results.

4.2.4 Resuming Tasks This operation enables you to resume suspended collection tasks. One or more collection tasks can be resumed at one time. 1)

Select [Performance&Stat/Task Management] from the main menu to display the "Task Management" window.

2)

In the "Device Type" list on the upper part of the window, select the device type of the task to be resumed.

3)

Tasks meeting the conditions are displayed on the lower part of the window.

4)

Select the task to be resumed from the task list, right click it and then select [Resume Task].

5)

In the confirmation dialog box, click to resume the tasks or click to abort the operation.

4.2.5 Deleting Tasks This operation enables you to delete one or more collection tasks at one time. 1)

Select [Performance&Stat/Task Management] from the main menu to display the "Task Management" window.

2)

On the upper part of the window, select the device type of the task to be deleted in the "Device Type" list.

4-7

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

3)

Chapter 4 Performance Management

On the upper part of the window, select the device name of the task to be deleted in the "Device Name" list.

4)

Tasks meeting the conditions are displayed on the lower part of the window.

5)

Select one or more tasks to be deleted. Right click and then select [Delete Task], a dialog box will be shown for you to confirm the operation.

6)

In the dialog box, click to proceed to the operation or click to abort the operation.

Note: Only the tasks in "Suspended", "Not Started" or "Terminated" status can be deleted.

4.3 Data Management Original performance data is collected from different Network Elements according to the tasks created. Data management module performs overall management on the original performance data. By setting different parameters in the query pane, you can query the original performance data by measuring object and task. Data management includes querying performance data by measuring objects, querying performance data by task and setting data security term.

4.3.1 Querying Performance Data by Measuring Object This operation enables you to query the collected original data according to the set conditions. You can select device type, device name, measuring unit, measuring object, measuring entity and conditional expression to query the original performance data within the specified period.

I. Operation procedure 1)

Select [Performance&Stat/Performance Data Management] or click toolbar to display the "Data Management" window as shown in Figure 4-3.

4-8

on the

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

Figure 4-3 Querying performance data by measuring objects 2)

Select "Query by Measuring Object" in the "Query Type" area.

3)

Select the device type for data query from the "Device Type" drop-down list.

4)

Select the device name for data query from the "Device Name" drop-down list.

5)

Select the measuring unit for data query from the "Measuring Unit" drop-down list.

6)

In the "Time Range" area, click next to the "Start Time" and "End Time" edit boxes to specify the time range for the data to be queried.

7)

Click , and then select measuring objects in the dialog box that appears, finally click to confirm the operation and close the dialog box.

Table 4-2 Function of the buttons Click…

To… add one or more measuring objects at one time. add all measuring objects. remove one or more selected objects. Remove all selected objects.

8)

Click to display the "Create Conditional Expression" dialog box. In the dialog box, configure the conditional expression for querying and then click .

9)

In the “Data Management” dialog box, click or . 4-9

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

II. Parameter specification [Device Type]: A device type supported by the data management module. [Device Name]: After a device type is selected, all names of the devices of the type are displayed in the "Device Name" drop-down list. [Measuring Unit]: After a device is selected, all measuring units supported by the device are displayed in the "Measuring Unit" drop-down list. [Start Time]: Start time for the data querying. [End Time]: End time for the data querying. [Measuring Objects]: Measuring objects for the data querying. [Measuring Entity]: Measuring entity for the data querying.

4.3.2 Querying Performance Data by Task This operation enables you to query the collected original data according to the set conditions. You can select device type, device name, task, measuring entity and condition expression to query the original performance data within the specified period.

I. Operation procedure 1)

Select [Performance&Stat/Performance Data Management] or click

on the

toolbar to display the "Data Management" window as shown in Figure 4-3. 2)

Select "Query by Task" in the "Query Type" area.

3)

Select the device type for data query from the "Device Type" drop-down list.

4)

Select the device name for data query from the "Device Name" drop-down list.

5)

Select the measurement task for data query from the "Task" drop-down list.

6)

In the "Time Range" area, click next to the "Start Time" and "End Time" edit boxes to specify the time range for data to be queried.

7)

Click . In the dialog box that appears, create a conditional expression, and then click .

8)

In the “Data Management” window, click or .

II. Parameter specification [Device Type]: A device type supported by the data management function. [Device Name]: After a device type is selected, all names of the devices of the type are displayed in the "Device Name" drop-down list. [Task]: After a device is selected, all tasks are displayed in the "Task" drop-down list. [Start Time]: Start time for the data querying. It should be earlier than the valid start time of the performance measurement task. [End Time]: End time for the data querying.

4-10

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

[Measuring Entity]: Measuring entity for the data querying. It is related to the measuring unit selected when creating the performance measurement task.

Note: z

For the operations of creating a conditional expression, refer to 4.7.5 Creating a Conditional Expression.

z

Click to save the query results in the form of .html or .csv. Click to print the query results. Click to delete the records. Click to close the query window.

4.3.3 Setting Data Security Term In order to ensure security of the saved performance data, you can set a time segment starting from the current date. The time segment ranges from 3 to 6 months. The performance data within this time range cannot be deleted.

I. Operation procedure 1)

Select [Performance&Stat/Performance Data Management] from the main menu or click the corresponding shortcut button on the toolbar to display the "Data Management" window as shown in Figure 4-3.

2)

Click on the lower part of the "Data Management" window to display the “Set Security Term” dialog box, as shown in Figure 4-4.

Figure 4-4 Setting security term 3)

In the dialog box, select the security term.

4)

Click .

II. Parameter specification [Security Term]: A time segment backward from the current date (it ranges from three to six months). The data within this time range will be protected and cannot be deleted.

4-11

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

Before the data deleting, it is determined whether to delete the data earlier than the set security term.

4.4 Data Integrity Management This operation provides the data integrity analysis function. You can analyze the data integrity according to device, measuring unit and collection task to understand the data collection status in time. The system also provides the function of mending the lost data in minimum duration, thus enhancing the integrity and security of performance analysis data. This module involves: querying data integrity, mending data by devices, mending data by measuring units, and mending data by tasks.

4.4.1 Querying Data Integrity This operation enables you to query the data integrity information. 1)

Select [Performance&Stat/Data Integrity Management] to display the "Data Integrity Management" window. There are three tables in the window, which are "Integrity of Devices", "Integrity of Measuring Units" and "Integrity of Tasks", as shown in Figure 4-5.

Figure 4-5 Data integrity window 2)

Select a device type, and view the data integrity rate conditions of all devices of this device type in the “Integrity of Devices” list.

4-12

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

3)

Chapter 4 Performance Management

Select a device in the “Integrity of Devices” list, and view the data integrity rate conditions of all measuring units of this device in “Integrity of Measuring Units”.

4)

Select a measuring unit in the “Integrity of Measuring Units” list, and view the data integrity rate conditions of all tasks of the selected measuring unit in “Integrity of Tasks”.

4.4.2 Mending Data This operation enables you to mend the lost performance data at the device level, measuring unit level and task level.

I. Operation procedure 1)

Select [Performance&Stat/Data Integrity Management] or click

on the toolbar

to display the “Data Integrity Management” window. 2)

Select a device type in the “Device Type” drop-down list, and then set the start time and end time, finally click .

3)

To do mending on a device, elect a device in the "Integrity of Devices" table, right click it and then select [Execute Mending], or click the corresponding button on the toolbar.

4)

To do mending on a measuring unit, select a measuring unit in the "Integrity of Measuring Units" table, right click it and then select [Execute Mending], or click the corresponding button on the toolbar.

5)

To do mending on a task, select a task in the "Integrity of Tasks" table, right click it and then select [Execute Mending], or click the corresponding button on the toolbar.

II. Parameter specification [Device Type]: All device types supported by the data integrity management module. [Start Time]: The time point for starting querying the data integrity. [End Time]: The time point for finishing querying the data integrity.

Note: z

Click

to do mending on the selected device.

z

Click

to do mending on the selected measuring unit.

z

Click

to do mending on the selected task.

4-13

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

4.5 Performance Alarm Threshold Management Performance alarm threshold management enables you to set threshold values for the measuring entities. For each combination of device type, device, measuring unit, measuring object and measuring entity, upper threshold value and lower threshold values can be set. In the process of collecting performance data, the system will automatically check the threshold for performance data set with alarm thresholds. If the performance data exceeds the threshold, performance alarms will be generated and sent to the alarm module and finally reported to you. There are recovery alarms corresponding to the performance alarms. Performance alarm threshold management involves querying, adding, deleting and modifying performance alarm threshold.

4.5.1 Querying Performance Alarm Threshold This operation enables you to query performance alarm threshold records.

I. Operation procedure 1)

Select [Performance&Stat/Threshold Management] or click

on the tool bar to

display the "Threshold Management" window as shown in Figure 4-6.

Figure 4-6 Performance alarm threshold management window

4-14

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

2)

Chapter 4 Performance Management

In the "Device Type" drop-down list, select the type of the device for which the performance alarm threshold is to be queried.

3)

In the "Device Name" drop-down list, select the name of the device for which the performance alarm threshold is to be queried.

4)

In the "Measuring Unit" drop-down list, select the measuring unit for which the performance alarm threshold is to be queried.

5)

In the "Measuring Object" drop-down list, select the measuring object for which the performance alarm threshold is to be queried.

6)

In the "Measuring Entity" drop-down list, select the measuring entity for which the performance alarm threshold is to be queried.

7)

In the alarm threshold list, observe the performance alarm threshold information.

II. Parameter specification [Device Type]: All device types supported. [Device Name]: After one device type is selected, all devices of the type will be available in the "Device Name" drop-down list. [Measuring Unit]: After one device is selected, all measuring unit supported by the device will be available in the "Measuring Unit" drop-down list. [Measuring Object]: It is the measuring object for which performance alarm threshold is to be queried. [Measuring Entity]: It is the measuring entity for which performance alarm threshold is to be queried.

4.5.2 Adding a Performance Alarm Threshold This operation enables you to add performance alarm threshold for the measuring entities. Depending on the alarm threshold and alarm levels added, corresponding alarms will be generated.

I. Operation procedure 1)

Select [Performance&Stat/Threshold Management] from the main menu or click on the toolbar to display the "Threshold Management" window as shown in Figure 4-6.

2)

In the "Device Type" drop-down list, select the type of the device for which the performance alarm threshold is to be added.

3)

In the "Device Name" drop-down list, select the name of the device for which the performance alarm threshold is to be added.

4)

In the "Measuring Unit" drop-down list, select the measuring unit for which the performance alarm threshold is to be added.

5)

In the "Measuring Object" drop-down list, select the measuring objects for which the performance alarm threshold is to be added. 4-15

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

6)

Chapter 4 Performance Management

In the "Measuring Entity" drop-down list, select the measuring entities for which performance alarm threshold is to be added.

7)

In the "Threshold" pane, enter values for "High Threshold" and "Low Threshold", and then select "Alarm Level".

8)

In the "Date Time" pane, click next to the "Start Time" and "End Time" to set start time and end time for the performance alarm threshold.

9)

Click and then observe the newly added performance alarm threshold record in the performance alarm threshold list.

II. Parameter specification [High Threshold]: Upper threshold of the performance alarm threshold. In case it is crossed, alarms will be generated. [Low Threshold]: Lower threshold of the performance alarm threshold. In case it is crossed, alarms will be generated. [Alarm Level]: It is of enumerated type. The following options are provided: critical, major, minor and warning. [Start Time]: Start time for threshold value checking. It should not be earlier than the current time. [End Time]: End time for threshold value checking. It should not be earlier than the start time.

4.5.3 Modifying a Performance Alarm Threshold This operation enables you to modify performance alarm threshold of the measuring entity. Among the parameters, start time, end time, upper limit, lower limit and alarm level can be modified. After the modification, the alarms will be reported according to the newly-set upper/lower limit and alarm level. 1)

Query performance alarm threshold following the steps given in 4.5.1

to list all

performance alarm threshold records meeting the conditions in the result output area. 2)

Select one record to be modified in the threshold list.

3)

On the "Threshold" pane, enter new values for "High Threshold" and "Lower Threshold", and then select new "Alarm Level".

4)

On the "Time Range" pane, click next to the "Start Time" and "End Time" edit boxes and then modify the start time and end time for performance alarm threshold.

5)

Click .

4-16

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

4.5.4 Deleting a Performance Alarm Threshold This operation enables you to delete performance alarm threshold from the measuring entities. After the deletion, no performance alarms will be generated for the measuring objects. 1)

Query performance alarm threshold following the steps given in 4.5.1

to list all

performance alarm threshold records meeting the conditions in the result output area. 2)

Select one or more records to be deleted in the threshold list.

3)

Right click it and then select [Delete].

4)

In the confirmation dialog box, click .

4.6 Performance Measurement 4.6.1 Time Distribution Analysis Time distribution analysis is: z

analyze one or multiple measuring entities of one measuring object according to different steps within the specified period of time

z

or to compare the same measuring entity of multiple measuring objects and output the analysis result in the form of table or graphics.

I. Operation procedure 1)

Select [Performance&Stat/Time Distribution Analysis] or click

on the toolbar

to display the "Time Distribution Analysis" window. On the upper part of the window is the analysis conditions input area while the lower part is the result output area. 2)

Select the desired device type from the "Device Type" drop-down list.

3)

Select the desired device name from the "Device Name" drop-down list.

4)

Select the desired measuring unit from the "Measuring Unit" drop-down list.

5)

Select the desired analysis type from the "Analysis Type" drop-down list.

6)

In the "Time Range" pane, click "Period" drop-down list and then select the analyzing cycle. Click next to the "Start Time" edit box and then set the analyzing operation start time in the pop-up calendar.

7)

Click to display the measuring object selection dialog box. In this dialog box, select measuring objects.

8)

Click . In the dialog box that appears, select the measuring entity and then configure the calculation formula for the measuring entity. In the measuring entity selection dialog box, select measuring entities.

9)

In the “Show Type” list, select the query result output format: Table Multiple Bar or Line.

10) Click or . 4-17

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

4.6.2 Global Traffic Flow Analysis This operation enables you to analyze the specified measuring units including: z

originating traffic

z

inner traffic

z

originating outgoing office traffic

z

incoming office traffic

z

incoming office terminating traffic

z

transfer traffic

z

terminating traffic

z

outgoing office traffic

The analysis entities include call attempt times, call connect times, answer times, seizure traffic and answer traffic.

I. Operation procedure 1)

Select [Performance&Stat/Global Traffic Flow Analysis] or click

on the

toolbar to display the “Global Traffic Flow Analysis" window as shown in Figure 4-7.

Figure 4-7 Global traffic flow analysis 2)

In the "Device Type" drop-down list, select the type of the device to be analyzed.

3)

In the "Device Name" drop-down list, select the name of the device to be analyzed.

4-18

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

4)

Chapter 4 Performance Management

In the "Date Time" pane, click next to the "Start Time" and "End Time" edit boxes and then set the start time and end time for the analysis.

5)

Click or .

II. Parameter specification [Device Type]: All device types supported. [Device Name]: After one device type is selected, all devices of the type will be available in the "Device Name" drop-down list. [Start Date]: Start date for the analysis. [End Date]: End date for the analysis.

Note: This function is only supported by the C&C08 switch and SoftX3000.

4.6.3 Call Failure Analysis This operation enables you to analyze different failure calls resulted from different causes within the specified time segment. To perform a call failure analysis operation, the user needs to select a device, measuring unit, measuring objects of the trunk groups as well as start time and end time for the analysis. The measuring units supporting call failure analysis include Incoming Trunk Group and Outgoing Trunk Group. 1)

Select [Performance&Stat/Call Failure Analysis] or click

on the toolbar to

display the "Call Failure Analysis" window as shown in Figure 4-8.

4-19

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

Figure 4-8 Call failure analysis window 2)

In the "Device Type" drop-down list, select the type of the device to be analyzed.

3)

In the "Device Name" drop-down list, select the name of the device to be analyzed.

4)

In the "Measuring Unit" drop-down list, select the measuring unit to be analyzed.

5)

In the "Time Range" pane, click next to the "Start Time" and "End Time" edit boxes and then set start time and end time for the analysis.

6)

Click or .

Note: This function is only supported by the C&C08 switch and SoftX3000.

4.7 Other Functions 4.7.1 Changing Graph Settings When the measurement results are displayed in the form of histogram or graph, their attributes can be reset, for which the line color and type, background color and grid can be selected freely. When statistics report is displayed in the form of graph, through the above settings, an object can be differentiated from others. The graph can be moved horizontally or vertically, through which parts that cannot be fully displayed will be

4-20

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

viewed. Furthermore, the graph can be flexed by zooming in or out X and Y axis, and the two axes can be displayed in the grid mode.

I. Operation procedure 1)

In the “Show Object" check box, select the desired object for graph setting.

2)

In the “Line Color” check box, select the desired color.

3)

In the “Line Type” check box, select the desired line type.

4)

In the “Background Color” check box, select the desired background color.

5)

In the “Show X-axis Grid Line” selection box, select the grid line of X axis.

6)

In the “Show Y-axis Grid Line” selection box, select the grid line of Y axis.

7)

Select “X Properties” to zoom in or out X axis.

8)

Select “Y Properties” to zoom in or out Y axis.

9)

Click or in the “X Properties” area to right or left move the graph.

10) Click or in the “Y Properties” area to right or left move the graph.

II. Parameter specification [Show Object]: The selected object. [Line Color]: The line color of the selected object. [Line Type]: The line type of the selected object. [Background Color]: The background color of the graphics. [Show X-axis Grid Line]: Show grid line on the X-axis. [Show Y-axis Grid Line]: Show grid line on the Y-axis. [X Properties]: Vary the graph with the zooming in/out of X axis, or right/left move the graph. [Y Properties]: Vary the graph with the zooming in/out of Y axis, or right/left move the graph.

Note: The graph property tool is available only when the “Multiple Bar” or “Line” mode is selected.

4.7.2 Saving Measurement Data This operation enables you to save measurement data in the form of .html, .txt, or .csv.

I. Operation procedure 1)

Perform a performance measurement task to measure the performance data.

2)

Click to display the “Save” dialog box.

4-21

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

3)

Chapter 4 Performance Management

If the records are displayed in full pages, you will be prompted to select all data or current data. After selecting one mode, click and proceed to step 4). Otherwise, proceed to step 4) directly.

4)

Select the saving directory, enter the file name and select the save type.

5)

Click .

II. Parameter specification [Save Path]: Save path of the measurement report. [File Name]: Name of the file saving the measurement report. [File Type]: Select to save the measurement report in one of the following type: .htm, .txt or .csv.

4.7.3 Printing Measurement Data This operation enables you to print the measurement data generated from measurement operations for reference. 1)

Perform a performance measurement task to measure the performance data.

2)

Click to display the “Print Preview” dialog box.

3)

Click , , and to browse the information to be printed.

4)

Click to display the “Print” dialog box.

5)

If the records are displayed in full pages, you will be prompted to select all data or current data. After selecting one mode, click and proceed to step 6). Otherwise, proceed to step 6) directly.

6)

Specify a printer and then click to print the measurement result with the specified printer.

Note: The measurement report in any of the three forms (table, multiple bar or line) can be printed.

4.7.4 Deleting Measurement Data This operation enables you to delete the queried performance measurement data. 1)

Perform a performance measurement task to measure the performance data.

2)

Select multiple data records and then click .

3)

In the dialog box that appears, select the start time of the data to be deleted.

4)

Click to delete the selected data.

4-22

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 4 Performance Management

Note: z

You can only delete the data beyond the data security term.

z

You can only delete the data in the “Data Management” window.

4.7.5 Creating a Conditional Expression This operation enables you to create a conditional expression to query the performance measurement data of a measuring entity of the selected measuring unit conditionally. 1)

Select [Performance&Stat /Data Management] to display the “Data Management” window.

2)

Click to pop up the “Create Conditional Expression” dialog box.

3)

Select a measuring entity and click the Operator drop-down list. The following operators are available: “=", “>”, “>=”, “ WS as Dial-up Server---> Gateway NE

2)

PC/Windows98/2000 ---PSTN---> PC/Windows98/2000 ---> Gateway NE

3)

PC/Windows98/2000 Gateway NE

----------------------------------------------------------------------------------------------------

11.2 Hardware Requirements and Connection Methods Based on the above mentioned communication modes, the hardware requirements are as follows: one Robotics, Sportster 33.6K, Hayes or Etek modem at each side. The modems are delivered together with an NMS computer or workstation. The correct connection methods are introduced below.

11-1

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 11 Remote Maintenance

11.2.1 PC and PC workstation For a PC or PC workstation, connect the serial port cable accompanying the modem to the PC or PC workstation, plug the telephone line into the Line socket of the modem, and then use the accompanying transformer to feed the modem.

11.2.2 SUN workstation For a SUN workstation, do not use the serial port cable accompanying the modem. Use the delivery attached DB25 serial port cable instead. Serial port A or B and serial port of the modem are usually DB25 (female). Because the cable accompanying the modem is usually female--------male, it cannot be used here. A DB25(male)------DB25(male) is needed to connect the workstation and the modem. The connection method is as shown in Figure 11-1. Pins 1~8 and 20 must be connected to their counterparts one by one. For the currently delivered modem cables, pins 1~25 correspond to their counterparts one by one. Plug the telephone line into the Line port of the modem. Use the accompanying transformer to feed the modem.

1 2 3 4 5 6 7 8 20

Ground (GND)

1

Transmit Data (TD)

2

Receive Data (RD)

3

Request To Send (RTS)

4

Clear To Send (CTS)

5

Date Set Ready (DSR)

6

Signal Ground (SG)

7

Data Carrier Detect (DCD)

8

Data Terminal Ready (DTR)

20

Figure 11-1 Connections between the workstation and the modem

11-2

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 11 Remote Maintenance

11.3 Software Configuration for Communication Connections

Note: Before configuring the software for communication connections, please connect the Modem with the computer and install the Modem driver.

11.3.1 PC/Windows2000 as PSTN dial-up access server I. Software requirement No other software is needed because it is an inherent function of the system.

II. Configuration procedure Follow the connection wizard to set up a dial-up connection 1)

Select [Setting/Network and Dial-up/New Connection] from the [Start] menu to start a setup Wizard. Click .

2)

Select “Accept IN Connection”, and then click .

3)

Select “Standard Modem”, and then click .

4)

Select “Not Allowed Virtual Private Connection”, and then click .

5)

Click to add a new user, and set the user name and password.

6)

Click . Then a dialog box appears for you to select network components.

7)

Select all network components, and then click .

8)

Click .

11.3.2 PC/Windows2000 as PSTN dial-up client I. Software requirement No other software is needed because it is an inherent function of the system.

II. Configuration procedure If Windows 2000 serves as the dial-up client, follow the operation guide to configure it. The following part describes the configuration procedure of the dial-up client in Windows 2000. For Windows 98, the procedure is almost the same.

11-3

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

1)

Chapter 11 Remote Maintenance

Select [Setting/Network and Dial-up/New Connection] from the [Start] menu to start a setup Wizard. Click .

2)

Select “Dial to Private Network” and then click .

3)

Type in the area code of the telephone you dial in the “Zone No. (A)” box and telephone number of the dial-up server in the “Telephone No.” box. Select in the country/region code list. For a toll call, select the ”Use Dial-up Principle” check box; for a local call, clear the ” Use Dial-up Principle” check box. Click .

4)

Select “All Users Use the Connection” or “Only My Connection”, and then click . “Only My Connection” is recommended.

5)

Type “Remote Maintenance Client” in the “Type in the Connection Name” edit box, select the “Add Shortcut on My Desktop” check box, and then click .

To place a call, double click the “Remote Maintenance Client” icon. Then a login interface appears. Enter your user name and password in the “User Name” and “Password" boxes respectively. Type the telephone number you want to dial in the “Dial” box, including the area code. Then click .

11.3.3 SUN workstation as PSTN dial-up access server I. Configuration requirement 1)

When SUN workstation serves as the Point to Point Protocol (PPP) server, there are two kinds of virtual network interfaces: ipdptpn and ipdn (where n indicates the device number. Serial port A corresponds to 0 and serial port B to 1). For ipdptpn interface, one modem can only connect to one PPP client. For ipdn interface, one modem can connect to multiple PPP clients.

2)

For the time being, only the configuration of static IP-based PPP client is supported. If a PC serves as the PPP client, set "PPP" as the server type when setting connection attributes, and select the specified IP address when setting TCP/IP attributes. Other settings remain unchanged.

3)

The dial-up script should be compiled in consistency with the type of modem. It is hard to do so during the configuration of workstation dial-up service. Three types of modems are recommended: Robotics, Hayes, and Etek. Here we introduce the configuration of Hayes modem.

4)

Unix to Unix Copy Protocol (UUCP) software and PPP software should be pre-installed on the workstation (they are already installed on the current workstations). If necessary, use this command to install the PPP software:

#: pkginfo | grep ppp

II. Configuration procedure 1)

Check the connection of modem.

Connect the modem to the serial port, and then use this command to check whether the modem is properly connected (assume that the modem is connected to serial port A): 11-4

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 11 Remote Maintenance

# tip /dev/cua/a connected

If “connected” is displayed, it indicates that the modem is connected to serial port A. In this case, if the modem can be configured by using AT commands, it indicates that the modem is connected properly. Otherwise, check whether the serial port cable and the modem are normal. Type “~” to quit the command “tip”. 2)

Configure the PPP.

Default settings of configuration script: z

The IP addresses of the PPP server and PPP client are set to “192.168.55.1” and “192.168.55.2” respectively.

z

The PPP server adopts ipdptpn network interfaces.

z

The login user name of the PPP client is “ppp_user”.

These parameters can be changed if necessary. Set the server: z

On the PC, load the file “ppp.tar” to the directory “/usr/local/rms/” as the user “root”. Note that this file is transmitted in binary system.

z

Log in to the workstation as a super user, and then decompress the file “ppp.tar”.

# cd /usr/local/rms # tar xvf ppp.tar z

Connect the modem to the workstation and telephone line, and then power on the modem. On the workstation, enter the PPP directory, and then configure the PPP server as below:

# cd PPP # sh setup_ppp.sh (or use “./setup_ppp.sh”). z

Specify the computer as the remote monitor server (options are client and server. By default it serves as the client): server

z

Input the serial port used (a or b. It is “a” by default): b

z

Rate of serial communication (19200bps, 9600bps, or 38400bps. It is 19200bps by default (We recommend that you press to accept the default value 19200bps).

z

Input the type of the used modem (Hayes, Robotics, or Etek. It is Hayes by default): (case-sensitive).

z

The PPP user is “ppp_user” by default.

z

Input the password of "ppp-user":

z

New password: (input the password of the PPP user.)

z

Re-enter new password: (Input the password of the PPP user again)

11-5

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 11 Remote Maintenance

Note: If you have forgotten the password of "ppp_user", log in as a super user and then change the password using the command “passwd ppp_user”. We recommend that you set the default password to “abcd”.

Input these two commands to control the Hayes modem (we recommend that you copy and paste them). AT&FN0Q2X0&C1&D2S0=1&W&y: Set parameters of modem ~.: End the session with modem

Note: Input the above two commands from the beginning of the line. stands for Carriage Return.

If a Robotics modem is used, we recommend that the AT command used to communicate with the modem be changed to: AT&F1&B1&C1&D2X0S0=1&W

If an Etek modem is used, we recommend that the AT commands used to communicate with the modem be changed to: ATX0&C1&D2S0=1&W connected AT&FN0Q2X0&C1&D2S0=1&W&y OK ~. [EOT] #

Note: z

Both serial ports a and b are okay. We recommend using 19200bps as the serial communication rate.

z

The modem type is case sensitive.

z

We recommend that you input the AT commands for communicating modem with “Copy” and “Paste”. To end the session with the modem, type “~” at the beginning of the line.

3)

Establish and end connections

z

Check if the process “asppp” is started:

# ps -ef | grep asppp 11-6

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System z

Chapter 11 Remote Maintenance

Start “asppp”

# /etc/init.d/asppp start z

Stop “asppp”

# /etc/init.d/asppp stop z

After "asppp” is started on both the server and the client, ping the server to establish the dial-up connection.

# ping ppp_server [N]

Note: The dial-up may take a tong time. If you ping the server for the first time, a time-out might occur. "N" is used to set the time-out period of the command “ping”. You can check whether the connection is made by viewing the log files (see "Troubleshooting" later in this manual) or the status indicator in the mode.

III. Change default settings 1)

Change the default telephone number of the client

Modify the file “/etc/uucp/Systems” . The last row of the file is: UNIX Any PPP 19200 0,163 ...

Where “0,163” indicates the telephone number of the PPP server. Modify it directly. 2)

Change the IP address

The server and the client should be synchronized. z

Modify the IP address of the server.

Log in as a superuser, and then edit the file “/etc/hosts”: ... 192.168.55.1

ppp_server

192.168.55.2

ppp_client

...

Change the corresponding IP addresses of ppp_server and ppp_client. z

If the client is a workstation, change the IP address in the above way. If the client is a PC, enter the IP address of the ppp.chient in the file ”/etc/hosts” at the server.

z

The IP addresses of the PPP server and all PPP clients should be within the same subnet.

3)

Rename the server and client

The name is only valid at the local end. The IP addresses of the server and client should be consistent.

11-7

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System z

Chapter 11 Remote Maintenance

Modify the server:

Step 1: Log in as a superuser, and then modify the file “/etc/hosts”: ... 192.168.55.1

ppp_server

192.168.55.2

ppp_client

...

Modify ppp_server and ppp_client Step 2: Change the file “/etc/asppp.cf”: ... ifconfig ipdptp0 plumb ppp_server ppp_client up ...

Modify ppp_server and ppp_client

Note: If the virtual network interface is ipdn, the format of the file “ asppp.c” is different from the one listed above. Simply modify ppp_server and ppp_client.

z

Modify the client (workstation):

Step 1: The same as Step 1 in modifying the server. Step 2: The same as Step 2 in modifying the server. The virtual network interface of the client can only be ipdptpn. Do not change the format of asppp.cf. 4)

Change the type of the virtual network interface of the server to ipdn

Log in as a superuser, and then modify the file “/etc/asppp.cf”: ifconfig ipdptp0 plumb ppp_server ppp_client up path ... interface ipdptp0 ...

Change the above information to: ifconfig ipd0 plumb ppp_server up path ... interface ipd0 peer_ip_address

ppp_client

...

5)

Connect the server with multiple clients 11-8

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 11 Remote Maintenance

z

Change the interface type to ipdn.

z

Log in as a superuser, and then add the IP addresses of the clients to the file “/etc/hosts”.

... 192.168.55.1

ppp_server

192.168.55.2

ppp_client

192.168.55.3

ppp_client2

192.168.55.4

ppp_client3

... z

Log in as a superuser, and then add the description of the paths to the file “/etc/asppp.cf”,

#Connection parameter setting of ppp_client(192.168.55.2) path ... peer_ip_address

ppp_client

... #Connection parameter setting of ppp_client1(192.168.55.3) path ... peer_ip_address

ppp_client1

...

For all the paths, the peer_ip_address is different but other parameters are identical.

IV. Configure the PPP server as a router 1)

Add ppp network number

Log in as a superuser, and then add the ppp network number to the file “/etc/networks ”, ... pppnet

2)

192.168.55

ppp

#ppp network

Set subnet mask

Log in as a superuser, and then modify the file “/etc/netmasks”. ... 192.168.55.0

3)

255.255.255.0

Add PPP host name

If the virtual network interface is ipdn, create the file “/etc/hostname.ipdn”. If it is ipdptpn , create the file “/etc/hostname.ipdptpn ”. Enter the PPP host name, and then log in as a super user. # vi /etc/hostname.ipdn ppp_server Save the file, and then restart the workstation. 11-9

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

4)

Chapter 11 Remote Maintenance

Start the routing process

Check whether the routing process (in.routed, in.rdisc) of the access server has been started. # ps -ef | grep in.routed # ps -ef | grep in.rdisc If not, run these commands: # /usr/sbin/ndd -set /dev/ip ip_forwarding 1 # /usr/sbin/in.routed -s # /usr/sbin/in.rdisc -r 5)

Set default route at the client

Set a default route at the PPP client, with the gateway being ppp_server. # route add default ppp_server 6)

Set default route at the host

At the LAN host side, set a route to the PPP network, with the gateway being the Ethernet IP address of the PPP server. # route add 192.168.55.0 xxx.xxx.xxx.xxx

11.4 Remote Maintenance Schemes The remote maintenance mode varies with the operating system platform and the remote maintenance tool software. This section details the remote maintenance modes of the iManager N2000 (Client/Server).

11.4.1 SUN workstation serves as the dial-up server This mode is used in situations where the server of the operator is a SUN workstation. It features high connection rate and high security. First set up the corresponding dial-up connection (see Section 10.1.3), and then follow these steps to perform the maintenance. 1)

Both parties establish communication connections in between. The remote maintenance client should get information such as the telephone number of the opposite end, dial-up user name and password. Then dial in the iManager N2000 NMS Workstation of the operator.

2)

The remote maintenance engineer runs the iManager N2000 Client, inputs “192.168.55.1: 9801” in the server input box, and then the user name and password provided by the operator, and clicks . After logging in successfully, the maintenance engineer can perform remote maintenance. 11-10

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 11 Remote Maintenance

Note: z

Both parties establish communication connections in between. The remote maintenance client should get information such as the telephone number of the opposite end, dial-up user name and password. Then dial in iManager N2000 NMS Workstation of the operator.

z

For the sake of security, set one TELNET connection for the SUN workstation and disable the FTP function.

11.4.2 PC/Windows2000 serves as the dial-up server This mode is used in situations where the server of the operator is a PC. It features high connection rate and high security. First set up the corresponding dial-up connection (see Section 10.1.2), and then follow these steps to perform the maintenance. 1)

Both parties establish communication connections in between. The remote maintenance client should get information such as the telephone number of the opposite end, dial-up user name and password. Then dial in the network management PC of the operator.

2)

The remote maintenance engineer runs the iManager N2000 Client, inputs “192.168.55.1: 9801” in the server input box, and then the user name and password provided by the operator, and click . After logging in successfully, the maintenance engineer can perform remote maintenance.

Note: z

If the dial-up connection at the server side is disconnected, restart the SS module of the NMS Server.

z

For the sake of security, the number of the login users is limited.

11.5 Troubleshooting I. Failed to connect to SUN workstation 1)

Check whether the connections are correct, especially the connection of the SUN workstation. Check whether the modem is connected properly. The telephone line should be connected to the jacket marked “line”.

2)

Make sure that connection of the modem is normal. If a message similar to

tip: /dev/cua/b: No such device or address all ports busy

11-11

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 11 Remote Maintenance

appears during the setup, it means that the modem is improperly connected. In this case, check the condition of the lines and make sure that the modem is switched on. Use

tip termb (or terma, respectively indicates that the modem is connected to serial port b or a) or tip -19200 /dev/cua/b (a) to connect the modem. If the message “connected” appears, it indicates that the modem is connected. In this case, you can input “AT”. If "OK” is returned, it indicates that the modem is normal. Input “~” to exit, and then set setup_ppp.sh again. If no “OK” is returned after you input “AT”, input “ATE1Q0”. If still no response is returned, replace the port or re-connect the modem. For more information about debugging modem, please see the document “Modem_conf.pl”. You can open this file with an HTML browser.

Note: To use terma or termb, the setup_ppp.sh must be set correspondingly. terma or termb is an entry to file “‘/etc/remote”.

3)

Make sure that the password of ppp_user input at the client side is identical to the one set at the server side. run “vi” to view the file “/etc/uucp/Systems”. The password of ppp_user is located at the last row (login: ppp_user word:) of the file. It must be identical to the one set at the server side. To change the password of ppp_user without setting PPP again, log in as a superuser, and use “/usr/bin/passwd ppp_user” to change the password of ppp_user.

4)

The file “/var/adm/log/asppp.log” (the same as etc/log/asppp.log) records the operations performed by the PPP user. You can view the dial-up connection progress in ”tail -f /var/adm/log/asppp.log”.

5)

If no change occurs in “tail -f /var/adm/log/asppp.log” when the client dials, it means that the PPP user has not logged in or the login shell is not “/usr/sbin/aspppls”. Modify the file “/etc/passwd” directly, or change the login shell of the PPP user to “/usr/sbin/aspppls“ in “admintool”.

6)

If the following message is displayed in “/var/adm/log/asppp.log”:

10:13:22 get_fifo_msg: can't find path with peer_system_name ppp_user

It means that the PPP user name set at he client side might be inconsistent with the one set in ”peer_system_name” in “/etc/asppp.cf” at the server side. Please make them consistent. 11-12

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Chapter 11 Remote Maintenance

II. No display in the SUN workstation login window The cause is possibly related to cables. Check whether the cables meet the hardware requirements.

III. Frequent problems with the PC workstation serving as the dial-up client 1)

Illegible characters appear in the PC client login window. The likely reason is that the rate of the PC client is not set to 19200.

2)

Make sure that the dial-up server is correctly installed and is bound with TCP/IP. Problems may occur if multiple dial-up servers are installed.

IV. How to check wether the PPP software has been installed UUCP software and PPP software should be pre-installed on the workstation (currently, they are already installed on the workstation). Run this command to check whether the PPP software has been installed: # pkginfo | grep ppp The system prompts that the PPP software has been installed.

V. The modem at the server side does not answer. Set the modem to auto answer mode. For Robotics, Hayes and Etek modems, run the scripts again and select a correct modem type (case-sensitive). For another modem type, set the corresponding AT commands by referring to the configuration manual.

11-13

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Appendix A FAQ

Appendix A FAQs A.1 Workstation A.1.1 How to Start Sun Workstation from CD-ROM (Sun/Solaris) 1)

Power on the workstation. When the startup screen appears, key in the key combination. The prompt "OK" then appears.

2)

Put the Solaris installation CD-ROM into the CD-ROM drive, key in the command "boot cdrom" and press . The workstation then starts from the CD-ROM.

A.1.2 Sun Workstation Abnormally Shut Down (Sun/Solaris) Always take the correct procedure to shut down your workstation. Incorrect operations, such as directly switching off, or power failure may damage the file system. If there is a power failure, it is necessary to restore the operating system and database to maintain the normal functioning of the entire system. While re-booting, the system will automatically check and restore the file system. Now, use the fsck command to manually check the file system. Log in as a root user and execute the following commands. 1)

Execute the fsck -y command to check the file system

Input the following command in the terminal window: # fsck -y The system begins to correct the errors in the file system until the completion of the correction.

A.1.3 How to Set IP Address of Sun Workstation (Sun/Solaris) Two methods are available: Method 1: Enter the NIC IP address of the Sun workstation correctly in the "Configure Network" option while installing the operating system. Method 2: Set the IP address by modifying the corresponding file. 1)

Open the "/etc/hosts" file and change the IP address corresponding to the host name.

A-1

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

2)

Appendix A FAQ

Open the "/etc/netmasks" file and change the network mask corresponding to the host. If the corresponding item is unavailable, add "host IP network mask", like "10.110.1.1 255.255.0.0".

3)

Restart the workstation.

A.1.4 How to Change Host Name of Sun Workstation (Sun/Solaris) Changing host name of the Sun workstation involves changing the following three files: z

/etc/hostname.hme0

z

/etc/hosts

z

/etc/nodename

Change the host name of the three files to the desired one Restart the workstation to validate your change.

A.1.5 Failed to Connect PC to Sun Workstation through Direct-connect Cable (Sun/Solaris) Direct-connecting Sun workstation to some network devices may fail due to mismatch. In this case, do not use the direct-connect cables. Add a hub and use ordinary network cables to connect the related devices.

A.1.6 Keyboard No Response for Sun Workstation (Sun/Solaris) This problem may occur when you click on the left part of the keyboard. In this case, click it again.

A.1.7 How to Configure Maximum Terminals for Sun Workstation (Sun/Solaris)? Add the following settings to the "/etc/system" file: set npty=100 set pt_cnt=100 Restart the NMS workstation to validate your settings.

A.1.8 How to Use CD-ROM Drive (Sun/Solaris) z

If a CD-ROM drive is embedded in the Sun workstation, the system will automatically install it to the "/cdrom" directory. If a CD-ROM is put in the CD-ROM drive, you can enter the "/cdrom" directory and then access to the CD-ROM. A-2

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System z

Appendix A FAQ

If an external CD-ROM driver is installed, connect SCSI cables, power on the CD-ROM driver and then the workstation. Then the system can detect it automatically and install it to the "/cdrom" directory.

z

If a CD-ROM is put in the CD-ROM driver, use the corresponding command to open the CD-ROM drive. First make sure the CD-ROM is not in use, exit the directory where the CD-ROM is located, and then run the following command as a superuser:

# eject z

Then the CD-ROM driver is opened. Extract the CD-ROM.

z

If the prompt "Device busy" appears and the CD-ROM is not ejected, run the following command as a superuser:

# /etc/rc2.d/S92volmgt stop z

Then press the eject button on the front panel of the CD-ROM drive, extract the CD-ROM. The CD-ROM drive is not running now. To run the CD-ROM driver, run this command:

# /etc/rc2.d/S92volmgt start z

To run or start the system from CD-ROM, put the boot CD-ROM into the CD-ROM drive. When the prompt "OK" appears on the workstation, enter:

OK boot cdrom z

Then the system is started from the CD-ROM.

z

Enter the following command at the "OK" prompt:

OK probe-scsi z

This is to check if SCSI devices (usually CD-ROM) are well connected to the workstation.

A.1.9 How to Use Tape Drive (Sun/Solaris) The command "tar" is usually used to operate tape drive. Assume the tape drive is well connected and the device No. is /dev/rmt/0. The general operations include: z

Backing up a directory or a file to a tape (the original contents are corrupted, starting from the tape header):

tar cvf /dev/rmt/0 z

Adding a directory or a file to an existing non-empty tape (the new contents are appended to the original contents):

tar rvf /dev/rmt/0 z

Viewing the contents of a tape:

tar tvf /dev/rmt/0 z

Extracting a directory or a file from a tape:

A-3

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Appendix A FAQ

tar xvf /dev/rmt/0

A.1.10 Failed to Log in to the System as a Root User While Using FTP (Sun/Solaris) For the sake of security, FTP service is unavailable to the root user by default after Solaris 8 is installed. To use FTP as a root user, follow this procedure: Log in as a root user, edit the “/etc/ftpusers” file, comment out the root user line, save the setting, and then log out. Then you can log in as a root user by using FTP. We recommend that you undo the comment operation after use of the FTP service.

A.1.11 Can’t Use Services Such as Telnet After the NMS is Installed For the sake of security, when iManager N2000 is installed on Solaris OS, services such as telnet, FTP, finger, and so on, are disabled. To use these services, follow this procedure: #cd /etc/inet #cp inetd.conf inet.conf.bak #cp inetd.conf.021204.034801.bak inetd.conf Where the file name "inetd.conf.021204.034801.bak” varies with the date on which the NMS is installed. View the process used to enable the service and make the process to re-read the file. #ps -ef | grep inet root 144 1 0 12 04 ?

0:00 /usr/sbin/inetd -s

#kill -HUP 144 Now, you can use the corresponding services. After use, follow this procedure to disable the services: #cp inet.conf.bak inetd.conf #kill -HUP 144

A.1.12 File Size Changed When FTP is Used to Send Files When FTP is used to send files with binary contents (for example, NMS Setup and database interface files), the files must be sent in binary format. Otherwise the transmission error will occur. When you enter the FTP program, the default

A-4

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Appendix A FAQ

transmission mode is ASCII. In this case, before sending the files, use the command “bin” to change the transmission mode to binary format.

A.1.13 Execution Authority of Files is Lost When FTP is Used to Send Files If the execution authority of Setup is lost when the Setup is copied to a hard disk through FTP program, change the authority of the file. Take the installation script of the NMS as an example, run this command: # chmod +x setup.sh

If the system prompts that the authority of another file is lost, change it in the same way.

A.2 Database A.2.1 How to Change the Password of "sa" (Sun/Solaris/Sybase)? "sa" is the user name of the Sybase system administrator. After the Sybase database is installed, the password of "sa" is null by default. Please follow these steps to set or change the password to "abc123", for example. $ isql -Usa –P 1> sp_password null, abc123 2> go The password is set correctly. (return status=0) 1>quit The password of "sa" cannot be changed back to null after setting. Please remember the new password.

A.2.2 How to Set the sa Password (Windows/SQL Server 2000) If you have not set the sa password during the installation of SQL Server 2000, you can set it through the following methods after installation. Method 1: Select [Program/Microsoft SQL Server/Enterprise Manager] from the [Start] menu to pop up "SQL Server Enterprise Manager" window. Unfold the directory tree on the left and locate the security node. Click "Login" and double click "sa" on the right of the window. Set password in the pop-up "SQL Server Login Properties" dialog box. A-5

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Appendix A FAQ

Method 2: Modify the password through "isql" application. It is just the same as the operations for Sybase. Please refer to How to Change the Password of "sa" (Sun/Solaris/Sybase)?

A.2.3 Sun Workstation Abnormally Shut Down (Sun/Solaris/Sybase) Use the fsck command to manually check the file system. Log in as a root user and execute the following commands. 1)

Execute the fsck -y command to check the file system

Input the following command in the terminal window: # fsck -y

The system begins to correct the errors in the file system until the completion of the correction. 2)

If

the

Sybase

database

does

not

start,

delete

the

"/opt/sybase/N2000DBServer.krg" file (Herein, the N2000DBServer is a Database Server name, which is set while installing Sybase). Then execute the /usr/sbin/shutdown -y -g0 -i6 command to restart the WS.

A.2.4 Unable to Start Sybase(Sun/Solaris/Sybase) Check the shared memory in the "/etc/system" file for the following contents (usually at the end of this file): set shmsys:shminfo_shmmax = 131072000 Herein, "131072000" is calculated with the following formula based on the memory of 128M. Y=X*1024*1000 (where X is the physical memory, measured in MB). If the set shared memory is lower than the value that is calculated based on the physical memory, the Sybase will fail to be started. Calculate the shared memory on the basis of the physical memory, set it again, and then restart the OS.

A.3 NMS A.3.1 No Response from Left Mouse Button The left mouse button may give no response after the following operations: 1)

Move the cursor onto a topological object. Click the left and right mouse buttons concurrently, then the right-click menu appears.

A-6

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

2)

Appendix A FAQ

Hold on these two buttons and move the cursor to another area. Release the buttons simultaneously.

3)

Move the cursor out of the popup menu area, click and see whether the left button (selection operation) still functions.

I. Solution Right click, and then left mouse button will become normal. Do not click the left mouse button and the right mouse button at the same time.

A.3.2 Some NMS Functions Abnormal Due to OS Time Changed In case of any change to the operating system time of the NMS Server while the NMS is running, some NMS functions based on timer (operation log auto dumping, for example) might be abnormal.

I. Solution Shut down the NMS and databases and restart the NMS Server. Please set accurately the system time while installing the OS. Do not change system time of the NMS Server when the NMS is running. If you really need to do so, first exit the NMS, change the system time, and then restart.

A.3.3 Alarm Window Display Abnormal Due to Alarm Panel Closed After adjusting the real-time alarm window to show both unacknowledged alarm pane and acknowledged alarm pane, open and then close the alarm panel. Then the acknowledged alarm pane maybe restores the original size.

I. Solution Drag to resize the acknowledged alarm pane.

A.3.4 Installation Interface No Response (Windows) Sometimes the installation interface may stop refreshing (becomes blank, for example) while installing the NMS under Windows.

I. Solution While installing the NMS under Windows 2000 Server, the installation is started with a ".bat" file, and a DOS window pops up. Do not click in the DOS window. Otherwise the above problem may occur.

A-7

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Appendix A FAQ

If it happens, please switch to the DOS window and press . The installation will continue.

A.3.5 Shortcut No Response There are shortcuts for some right-click menu items, but it may be no response when you click the shortcut key.

I. Solution At present, the function is still not supported by Java Development Kit (JDK). It is suggested using mouse click to select in the right-click menu instead of clicking the shortcut key.

A.3.6 Help Window No Response This problem may occur when doing following operations: 1)

Select [Help/Topic] to access the online help.

2)

Perform some operations on iManager N2000, and switch to the opened help window during the operations. In this case, the help window may be no response. For example, open the "Create Current Alarm Querying Profile" dialog box, then switch to the help window, you will find that you cannot operate on the help window.

II. Solution Finish the operation. For example, close all the opened dialog boxes. The help window will recover normal. To browse help during the operations, please press to access the online help.

A.3.7 Topology Display Abnormal The problem may occur when you open a dialog box then draw the roll bar in the topology window. Because there are many topological objects in the topology, the status refreshing may delay.

I. Solution Switch to other window then return. The topological view will be displayed normally.

A.3.8 Nonstop Alarm Sound Alarm sound will last till it is cleared. How to stop alarm sound?

A-8

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Appendix A FAQ

I. Solution Select [Fault/Audio&Visual/Stop Alarm Box Sound] to stop the current alarm sound. But when a new alarm occurs, the alarm sound will ring again. To stop all the alarm sounds, you can select {Fault/Fault Setting/Local Property] to pop up "Local Property" dialog box. Click "Audio&Visual Setting" tab, uncheck the audio alarms of all the severities. This is not recommended in case that some faults maybe ignored.

A.3.9 How to View Text Completely In some text boxes that cannot be edited, the long text may be not shown completely. How to view the text completely?

I. Solution Click the mouse on the text, there is no cursor icon. But you can click and drag to view the covered text.

A.3.10 Abnormality Occurs When Selecting Multiple Records in Table In the window of displaying information table, drag your mouse to select multiple records continuously. Some records in the middle may not be selected.

I. Solution Drag slowly and do not select too many records at one time.

A.3.11 Failed to Restore Database Use the database backup tool to restore the database from the backup but the operation failed.

I. Solution Please shut down SQL Server Enterprise Manager before the restoration.

A.3.12 "Admin" Fails to Log in In the “Login“ dialog box, enter "admin" and "Admin" to log in. For Windows version, both "admin" and "Admin" can log in. For Solaris version, the user "Admin" does not exist, so it cannot log in.

A-9

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Appendix A FAQ

I. Solution In Windows system , user names are case insensitive, so "admin" and "Admin" indicate the same user. In Solaris system, user names are case sensitive, so "admin" and "Admin" indicate two different users, and only "admin" can log in.

A.3.13 Device Name Overlap In the topological view, if the device names are short, they will not overlap after auto layout. If they are very long, they might overlap after auto layout.

I. Solution Drag the icon with the long device name to a free place until they device names do not overlap.

A-10

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Appendix B Abbreviations

Appendix B Abbreviations Abbreviations

Full Name

ACL

Access Control List

ADSL

Asymmetric Digital Subscriber Line

AMG

Access Media Gateway

ATM

Asynchronous Transfer Mode

BAM

Back Administration Module

BAS

Broadband Access Server

BML

Business Management Layer

BMS

Broadband Management System

CDE

Common Desktop Environment

CES

Circuit Emulation Service

CLI

Command Line Interface

CNM

Client Network Management

CORBA

Common Object Request Broker Architecture

DCN

Data Communications Network

DDN

Digital Data Network

DHCP

Dynamic Host Configuration Protocol

DMS

Data Management System

DNS

Domain Name Server

EMF

Element Management Framework

EML

Element Management Layer

EMS

Element Management System

ETG

Edge Trunk Gateway

FR

Frame Relay

FTP

File Transfer Protocol

GK

Gatekeeper

GUI

Graphic User Interface

HGMP

Huawei Group Management Protocol

HTTP

Hyper Text Transport Protocol

B-1

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Abbreviations

Appendix B Abbreviations

Full Name

JDK

Java Development Kit

IAD

Integrated Access Device

IADMS

Integrated Access Device Management System

ID

Identity

IDS

Intrusion Detection System

iGWB

iGateway Bill

IMA

Inverse Multiplexing on ATM

IP

Internet Protocol

IPOA

IP Over ATM

ITA

Intruder Alert

LAN

Local Area Network

MA

Multi-service Access

MAU

Media Attachment Unit

MDC

Message Distribution Center

MG

Media Gateway

MGCP

Media Gateway Control Protocol

MIB

Management Information Base

MML

Man Machine Language

MRS

Media Resource Server

MTBF

Mean Time Between Failures

MTTR

Mean Time To Recovery

NAT

Network Address Translation

NE

Network Element

NFS

Network File System

NGN

Next Generation Network

NML

Network Management Layer

NMS

Network Management System

OAM

Operations, Administration and Maintenance

OSS

Operation Support System

POS

Packet Over SDH

PPP

Point to Point Protocol

PSTN

Public Switched Telephone Network

B-2

User Manual HUAWEI iManager N2000 Fixed Network Integrated Management System

Abbreviations

Appendix B Abbreviations

Full Name

PVC

Permanent Virtual Connection

PVC

Permanent Virtual Channel

PVP

Permanent Virtual Path

RAS

Remote Access Server

SG

Signaling Gateway

SLA

Service Level Agreement

SML

Service Management Layer

SMTP

Simple Mail Transfer Process

SNMP

Simple Network Management Protocol

SQL

Structured Query Language

SoftX

Soft Switch

TFTP

Trivial File Transfer Protocol

TMF

Tele Management Forum

TMG

Trunk Media Gateway

TMN

Telecommunications Management Network

UDP

User Datagram Protocol

UMG

Universal Media Gateway

UMS

U-SYS Management System

UPS

Uninterrupted Power Supply

UUCP

Unix to Unix Copy Protocol

VLAN

Virtual Local Area Network

VPN

Virtual Private Network

WAN

Wide Area Network

XML

Extensible Mark-up Language

B-3

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF