Sie sind auf Seite 1von 412

NetNumen™ U31 R22

Unified Network Management System


Operation Guide (Common Operations)

Product Version: V12.15.10

ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright © 2014 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.

Revision History

Revision No. Revision Data Revision Reason

R5.0 2014-12-30 Updated the following contents in this manual after the
NetNumen™ U31 R22 (V12.15.10) was issued:

l Chapters including “Alarm Management”, “Performance


Management”, “Report Management”, and “Log
Management”.
l Some configuration interfaces and menu items.

R4.1 2014-06-30 l Added the “Exporting All Data”, Managing the CTN Ethernet
Service Access Information Report”, “Managing the
Bandwidth Resource Statistics Report”, and “Query in the
toolbar” after the NetNumen™ U31 R22 (V12.14.10P02) was
issued.
l Updated some configuration interfaces and menu items after
the NetNumen™ U31 R22 (V12.14.10P02) was issued.

R4.0 2013-12-20 l Updated some configuration interfaces and menu items after
the NetNumen™ U31 R22 (V12.14.10) was issued.

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Revision No. Revision Data Revision Reason

R3.2 2013-07-30 l Added “Filtering the Resource Type”, “ Configuration


Example”, “Setting CTN Performance Threshold in Batches”,
and “CTN Device Optical Module Information Statistics Table”
sections after the NetNumen™ U31 R22 (V12.13.10P02) was
issued.
l Updated some configuration interfaces and menu items after
the NetNumen™ U31 R22 (V12.13.10P02) was issued.

R3.1 2013-03-25 l Updated the “Alarm Management”, “Performance


Management”, “Report Management”, and “NE Data
Management” chapters after the NetNumen™ U31 R22
(V12.13.10P01) was issued.
l Updated some configuration interfaces and menu items after
the NetNumen™ U31 R22 (V12.13.10P01) was issued.

R3.0 2012-12-30 l Added "Setting Password Protection Questions", "Virtual


NE Operations", "Virtual Link Operations", "FEC Mode
Configuration Report", and "Statistical Report for CTN Links
Becoming Ring", and "Information Report of CTN Circle Link"
sections after the NetNumen™ U31 R22 (V12.13.10) was
issued.
l Updated some configuration interfaces and menu items after
the NetNumen™ U31 R22 (V12.13.10) was issued.

R2.0 2012-11-02 l Added the "Report Management" and "NE Data


Synchronization" sections after the NetNumen™ U31 R22
(V12.12.20P01) was issued.
l Updated some configuration interfaces and menu items after
the NetNumen™ U31 R22 (V12.12.20P01) was issued.

R1.2 2012-06-30 l Added the "Querying Archiving Historical Performance"


and “Northbound Alarm Filtering Rules" sections after the
NetNumen™ U31 R22 (V12.12.20) was issued.
l Deleted the “Report Management”, “Virtual NE Management”,
“Virtual Link Management”, “Notification Description”,
and “Measure Object Management” chapters after the
NetNumen™ U31 R22 (V12.12.20) was issued.
l Updated some configuration interfaces and menu items after
the NetNumen™ U31 R22 (V12.12.20) was issued.

Serial Number: SJ-20141211100735-007

Publishing Date: 2014-12-30 (R5.0)


Table of Contents
About This Manual ......................................................................................... I
Chapter 1 Quick Start................................................................................. 1-1
1.1 Basic Operation Flow ......................................................................................... 1-1
1.2 System Startup and Exit ..................................................................................... 1-3
1.2.1 Starting the U31 R22 Server ..................................................................... 1-3
1.2.2 Logging In to the U31 R22 Client............................................................... 1-4
1.3 Portal Operations ............................................................................................... 1-6
1.3.1 Logging In to the Client Portal ................................................................... 1-6
1.3.2 Locking the Portal .................................................................................... 1-7
1.3.3 Logging Out of the Portal .......................................................................... 1-8
1.3.4 Exiting the Portal ...................................................................................... 1-8
1.3.5 Starting the Client..................................................................................... 1-9
1.4 System Setting................................................................................................... 1-9
1.4.1 Setting System Parameters....................................................................... 1-9
1.4.2 Setting the Information of Login User........................................................1-11
1.5 User Interface Management.............................................................................. 1-12
1.5.1 Closing the Current Window.................................................................... 1-12
1.5.2 Closing All Views.................................................................................... 1-12
1.5.3 Closing Other Windows .......................................................................... 1-12
1.5.4 Showing or Hiding the Toolbar................................................................. 1-13
1.5.5 Showing or Hiding the Status Bar ............................................................ 1-13
1.5.6 Showing and Hiding the Message Area ................................................... 1-13
1.5.7 Configuring the Toolbar........................................................................... 1-14
1.6 Other Functions ............................................................................................... 1-15
1.6.1 Locking the Screen................................................................................. 1-15
1.6.2 Logging Out of the System...................................................................... 1-16
1.6.3 Setting the Password of the Current Login User ....................................... 1-16
1.6.4 Viewing the System Time........................................................................ 1-17
1.6.5 Copying, Clearing, and Configuring Messages ........................................ 1-17

Chapter 2 Topology Management ............................................................ 2-1


2.1 Topology Management Functions ........................................................................ 2-1
2.2 Topology Management Window........................................................................... 2-2
2.3 Custom User Interface........................................................................................ 2-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


2.3.1 Customizing Icons by NE Type.................................................................. 2-7
2.3.2 Customizing Link Appearance ................................................................... 2-8
2.3.3 Customizing Status Icons.......................................................................... 2-8
2.3.4 Customizing Status Colors ........................................................................ 2-9
2.3.5 Customizing Status Order ....................................................................... 2-10
2.3.6 Customizing Tooltips................................................................................2-11
2.3.7 Customizing Alarm Prompting Type ......................................................... 2-12
2.3.8 Customizing Other Elements................................................................... 2-12
2.4 Functions on Topology Menu............................................................................. 2-13
2.4.1 Opening the Topology Management Window............................................ 2-13
2.4.2 Refreshing Topology Data....................................................................... 2-14
2.4.3 Exporting GUI Display Style .................................................................... 2-14
2.4.4 Importing GUI Display Style .................................................................... 2-15
2.4.5 Configuring Alarm Display Method........................................................... 2-15
2.5 Common Topology Management Operations...................................................... 2-19
2.5.1 Setting Node Rules ................................................................................ 2-19
2.5.2 Setting Members of a Node..................................................................... 2-20
2.5.3 Moving a Node....................................................................................... 2-20
2.5.4 Showing Statistics of a Node................................................................... 2-21
2.5.5 Switching to the Fault Management Window ............................................ 2-21
2.5.6 Switching to the Performance Management Window ................................ 2-21
2.5.7 Viewing the Alarm Count of a Node ......................................................... 2-22
2.6 Operations on NE Tree ..................................................................................... 2-22
2.6.1 Introduction to NE Tree........................................................................... 2-22
2.6.2 Implementing the Filtering....................................................................... 2-23
2.6.3 Searching the NE or Group ..................................................................... 2-23
2.6.4 Filtering the Resource Type .................................................................... 2-24
2.7 Operations on Topology Graph.......................................................................... 2-24
2.7.1 Topology Layer Operations ..................................................................... 2-24
2.7.2 Functions of Toolbar buttons ................................................................... 2-27
2.7.3 Display Filter Settings ............................................................................. 2-30
2.7.4 Configuring a Map .................................................................................. 2-32
2.8 Virtual NE Operations ....................................................................................... 2-33
2.8.1 Creating a Virtual NE .............................................................................. 2-33
2.8.2 Modifying the Attributes of a Virtual NE .................................................... 2-34
2.8.3 Deleting a Virtual NE .............................................................................. 2-34
2.8.4 Viewing a Virtual NE Attributes ............................................................... 2-35

II

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


2.9 Virtual Link Operations ..................................................................................... 2-35
2.9.1 Creating a Virtual Link ............................................................................ 2-35
2.9.2 Modifying the Attributes of a Virtual Link .................................................. 2-36
2.9.3 Deleting a Virtual Link............................................................................. 2-37
2.9.4 Viewing a Virtual Link Attributes ............................................................. 2-37
2.10 Group Management Operations ...................................................................... 2-38
2.10.1 Creating a Common Group ................................................................... 2-38
2.10.2 Creating a Type Group.......................................................................... 2-39
2.10.3 Creating a Location Group .................................................................... 2-40
2.10.4 Setting Members .................................................................................. 2-41
2.10.5 Deleting a Group .................................................................................. 2-42
2.10.6 Viewing Attributes of a Group ................................................................ 2-43

Chapter 3 Alarm Management................................................................... 3-1


3.1 Overview ........................................................................................................... 3-1
3.1.1 Fault Management Terms ......................................................................... 3-1
3.1.2 Main Interface of Fault Management View ................................................. 3-2
3.1.3 Alarm Classification .................................................................................. 3-5
3.1.4 Alarm Severity and Troubleshooting ......................................................... 3-6
3.1.5 Alarm Handling Flow and Suggestion ........................................................ 3-6
3.2 Preference Settings ............................................................................................ 3-7
3.2.1 Setting the Name of the Alarm Level.......................................................... 3-7
3.2.2 Setting the Default Sorting Mode of the Alarm Table ................................... 3-7
3.2.3 Setting Alarm Colors and Sounds .............................................................. 3-8
3.2.4 Setting the Alarm Flash and Sound ........................................................... 3-9
3.2.5 Setting the Alarm Prompt ........................................................................ 3-10
3.2.6 Setting Intermittent Alarms ...................................................................... 3-12
3.2.7 Redefining Alarm Codes ......................................................................... 3-16
3.2.8 Setting Tandem Mode for External Alarms ............................................... 3-16
3.2.9 Redefining Alarm levels .......................................................................... 3-17
3.2.10 Configuring NE Alarm Mask .................................................................. 3-18
3.2.11 Setting Board Alarm Mask..................................................................... 3-18
3.2.12 Configuring Alarm Preload .................................................................... 3-19
3.2.13 Setting Alarm Severities........................................................................ 3-20
3.2.14 Configuring Specified Alarm Monitoring ................................................. 3-21
3.2.15 Configuring ADMC Alarms ................................................................... 3-22
3.2.16 Setting NE Alarm Parameters................................................................ 3-23
3.2.17 Setting External Alarm Monitoring.......................................................... 3-24

III

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


3.2.18 Setting the Alarm Audibility and Visibility ................................................ 3-25
3.2.19 Configuring Free AU Alarm Detection .................................................... 3-26
3.2.20 Configuration Example.......................................................................... 3-26
3.3 Synchronizing NE Alarms ................................................................................. 3-28
3.3.1 Synchronizing Active NE Alarms ............................................................. 3-28
3.3.2 Recollecting Historical NE Alarms ........................................................... 3-29
3.4 Alarm Query .................................................................................................... 3-30
3.4.1 Alarm Query .......................................................................................... 3-30
3.4.2 Querying Notifications............................................................................. 3-35
3.4.3 Custom Query........................................................................................ 3-36
3.5 Alarm Information Query .................................................................................. 3-42
3.5.1 Viewing Alarm Details............................................................................. 3-42
3.5.2 Querying Historical Alarms ..................................................................... 3-43
3.5.3 Viewing Related History Alarms of an Active Alarm................................... 3-44
3.5.4 Querying Alarm-Related Rules ................................................................ 3-45
3.5.5 Viewing and Supplementing Alarm Handling Suggestions ......................... 3-45
3.5.6 Locating the Source NE of an Alarm ........................................................ 3-46
3.5.7 Locating the Source Board of an Alarm.................................................... 3-46
3.5.8 Querying the Associated Services of an Alarm ........................................ 3-46
3.6 Handling Alarm ............................................................................................... 3-46
3.6.1 Automatically Acknowledging History Alarms .......................................... 3-47
3.6.2 Acknowledging an Alarm ........................................................................ 3-47
3.6.3 Unacknowledging an Alarm..................................................................... 3-48
3.6.4 Clearing an Alarm .................................................................................. 3-48
3.6.5 Specifying Alarms to Be Monitored .......................................................... 3-49
3.6.6 Adding Comments to an Alarm................................................................ 3-49
3.6.7 Creating a Rule for an Active Alarm ......................................................... 3-49
3.6.8 Printing Alarm Information....................................................................... 3-50
3.6.9 Exporting Alarm Information.................................................................... 3-50
3.7 Alarm Forwarding............................................................................................. 3-51
3.7.1 Setting Alarm Forwarding Templates ....................................................... 3-51
3.7.2 Forwarding an Alarm .............................................................................. 3-51
3.8 Alarm Rule Management .................................................................................. 3-52
3.8.1 Introduction to Alarm Rules ..................................................................... 3-52
3.8.2 Introduction to Alarm Rule Operations ..................................................... 3-55
3.8.3 Creating an Alarm Rule .......................................................................... 3-56
3.9 Fault Handling Settings..................................................................................... 3-58

IV

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


3.9.1 Finding Alarm Handling Suggestions ....................................................... 3-58
3.9.2 Supplementing Alarm Handling Suggestions ............................................ 3-59
3.9.3 Exporting Handling Suggestions to a File ................................................. 3-60
3.9.4 Importing Handling Suggestions .............................................................. 3-60
3.10 Alarm Statistics .............................................................................................. 3-61
3.10.1 Overview of Fault Statistics ................................................................... 3-61
3.10.2 Basic Statistics ..................................................................................... 3-62
3.10.3 Busy Time Statistics ............................................................................. 3-62
3.10.4 Customizing Statistics........................................................................... 3-63
3.10.5 Querying Historical Alarms by Specified Alarm Code .............................. 3-64
3.10.6 Managing Timed Statistical Task............................................................ 3-65
3.10.7 Managing Timed Export Tasks............................................................... 3-66
3.11 Alarm and Notification Monitoring .................................................................... 3-67
3.11.1 Alarm Monitoring Policies ...................................................................... 3-67
3.11.2 Alarm Monitoring Methods..................................................................... 3-68
3.11.3 Alarm Monitoring via U31 R22 ............................................................... 3-68
3.11.4 Alarm Monitoring via Short Message and E-mail ..................................... 3-68
3.11.5 Monitoring Real-Time Alarms ................................................................ 3-69
3.11.6 Monitoring Real-time Notifications.......................................................... 3-69
3.11.7 Monitoring the Alarm Statistics by NE .................................................... 3-69
3.11.8 Monitoring the Alarm Statistics by NE Type ............................................ 3-70
3.12 Alarm Task Management ................................................................................ 3-70
3.12.1 Creating a Scheduled Statistic Task....................................................... 3-70
3.12.2 Creating a Scheduled Export Task ......................................................... 3-72
3.12.3 Creating a Suppressing Plan Task ......................................................... 3-75

Chapter 4 Performance Management ....................................................... 4-1


4.1 Performance Management Overview ................................................................... 4-1
4.1.1 Term Overview ......................................................................................... 4-2
4.1.2 Performance Monitoring Scheme .............................................................. 4-3
4.1.3 Performance Management Window ........................................................... 4-4
4.2 Performance Settings ......................................................................................... 4-6
4.2.1 Setting Performance Module Parameters................................................... 4-6
4.2.2 Configuring the Performance Mask............................................................ 4-7
4.2.3 Setting Performance Thresholds .............................................................. 4-8
4.2.4 Configuring Analog Performance Thresholds ............................................. 4-9
4.2.5 Setting Default Thresholds for Optical Modules ........................................ 4-10
4.2.6 Setting the CTN Performance Threshold in Batches ................................. 4-10

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


4.2.7 Configuring Zero Performance Suppression ............................................. 4-12
4.2.8 Clearing the Performance Counter .......................................................... 4-12
4.2.9 Setting Performance Rendering .............................................................. 4-14
4.3 Introduction to Measurement Task Management................................................. 4-15
4.3.1 Creating a Measurement Task................................................................. 4-16
4.3.2 Modifying a Measurement Task ............................................................... 4-18
4.3.3 Deleting a Measurement Task ................................................................. 4-19
4.3.4 Activating a Measurement Task............................................................... 4-20
4.3.5 Suspending a Measurement Task............................................................ 4-21
4.3.6 Viewing a Measurement Task.................................................................. 4-21
4.3.7 Checking the Consistency Status of a Measurement Task......................... 4-22
4.3.8 Synchronizing a Measurement Task ........................................................ 4-23
4.3.9 Refreshing Measurement Tasks .............................................................. 4-23
4.3.10 Importing a Measurement Task ............................................................. 4-24
4.3.11 Exporting a Measurement Task ............................................................. 4-25
4.3.12 Re-collecting Performance Data ............................................................ 4-26
4.4 Template Task Management ............................................................................. 4-26
4.4.1 Introduction to Query Template and Template Task................................... 4-26
4.4.2 Opening the Template Task Management Tab .......................................... 4-28
4.4.3 Query Template Operations .................................................................... 4-29
4.4.4 Template Task Operations....................................................................... 4-38
4.4.5 Common Template Management............................................................. 4-44
4.5 Performance Data Query .................................................................................. 4-50
4.5.1 Performance Query ................................................................................ 4-50
4.5.2 Operations on the Query Result .............................................................. 4-62
4.5.3 Performance Data Integrity Report .......................................................... 4-64
4.5.4 Overview of Performance Data Integrity Report ........................................ 4-67
4.6 Real-Time Traffic Management ......................................................................... 4-69
4.6.1 Setting the Display Style ......................................................................... 4-69
4.6.2 Monitoring Real-Time Traffic ................................................................... 4-70
4.6.3 Real-Time Traffic Task Management........................................................ 4-71
4.7 Counter and Index Management ....................................................................... 4-74
4.7.1 Introduction to Counter and Index Management ....................................... 4-74
4.7.2 Counter Management ............................................................................. 4-75
4.7.3 Index Management................................................................................. 4-77
4.7.4 Index Group Management ...................................................................... 4-84
4.8 Threshold Tasks Management .......................................................................... 4-85

VI

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


4.8.1 Creating a Threshold Task ...................................................................... 4-85
4.8.2 Querying Threshold Tasks ...................................................................... 4-87
4.8.3 Modifying a Threshold Task..................................................................... 4-88
4.8.4 Deleting a Threshold Task....................................................................... 4-88
4.8.5 Suspending a Threshold Task ................................................................. 4-89
4.8.6 Activating a Threshold Task .................................................................... 4-89

Chapter 5 Report Management ................................................................. 5-1


5.1 Public Report ..................................................................................................... 5-1
5.1.1 Managing Statistical Reports on NEs ......................................................... 5-1
5.1.2 Managing Statistical Reports on Slots........................................................ 5-2
5.1.3 Managing the Statistical Reports on Boards ............................................... 5-3
5.1.4 Managing Statistical Reports on Ports ....................................................... 5-5
5.1.5 Managing the Link Statistics Report .......................................................... 5-7
5.1.6 Managing the Protection Group Information Report .................................... 5-9
5.1.7 Managing the CTN/SDH Device Port Status Statistics Report ..................... 5-9
5.1.8 Managing the CTN/SDH Port Status Statistics Report............................... 5-10
5.2 CTN Resource Analysis Report..........................................................................5-11
5.2.1 Managing the CTN Link Looping Statistics Report ....................................5-11
5.2.2 Managing the CTN Loop Information Report ............................................5-11
5.2.3 Managing the Logic Resource Statistics Report ....................................... 5-12
5.3 CTN Statistics Report ....................................................................................... 5-13
5.3.1 Managing the CTN NE Service Count Report .......................................... 5-13
5.3.2 Managing the CTN SFP Statistics Report ................................................ 5-14
5.3.3 Managing the NE Rate Statistics Report ................................................. 5-15
5.3.4 Managing the L3 Interface Information Report ......................................... 5-15
5.3.5 Managing the CTN NE Version Statistics Report ..................................... 5-16
5.3.6 Managing the CTN Ethernet Service Access Information Report ............... 5-17
5.4 OTN Report ..................................................................................................... 5-17
5.4.1 Managing the Shelf Information Report ................................................... 5-17
5.4.2 Managing the Information Report of the Board Components ..................... 5-19
5.4.3 Managing the Adjustable Power Margin Report ....................................... 5-19
5.4.4 Managing Port State Report ................................................................... 5-20
5.4.5 Managing the Fixed Attenuator Report .................................................... 5-20
5.4.6 Managing the Wavelength Allocation Report ........................................... 5-21
5.4.7 Managing the Dispersion Compensation Report ...................................... 5-22
5.4.8 Managing the Optical Module Information Report .................................... 5-22
5.4.9 Managing the Configuration Report of GCC Byte Use Mode ..................... 5-23

VII

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


5.4.10 Managing the FEC Mode Configuration Report ...................................... 5-23
5.4.11 Managing the Customer Information Report .......................................... 5-24
5.4.12 Managing the Configuration Report of the Service Mapping Mode .......... 5-24
5.4.13 Managing the Customer Service Running State Report .......................... 5-25
5.4.14 Managing the OPM Optical Channel Performance Report ...................... 5-26
5.4.15 Managing the Bandwidth Resource Statistics Report .............................. 5-27
5.4.16 Managing Frequency Statistics of Tunnels Between Two NEs ................. 5-27
5.5 MSTP Proprietary Report.................................................................................. 5-28
5.5.1 Managing the MSTP Cross-Connect Service Report................................. 5-28
5.5.2 Managing the SFP Statistics Report of MSTP Equipment.......................... 5-28
5.6 End-to-End Report Management ....................................................................... 5-29
5.6.1 Managing the Service Data Report ......................................................... 5-29
5.6.2 Managing the Service Statistics Report ................................................... 5-31
5.6.3 Managing the MSTP Fiber Usage Statistic Information Report .................. 5-32
5.6.4 Managing the Isolated Cross Connection Data Report ............................. 5-33
5.6.5 Managing the Protection Subnet Report................................................... 5-34

Chapter 6 Security Management............................................................... 6-1


6.1 Overview ........................................................................................................... 6-1
6.1.1 Overview of Security Management ............................................................ 6-1
6.1.2 Basic Concepts in Security Management ................................................... 6-3
6.1.3 Relation Model ......................................................................................... 6-4
6.1.4 Security Management Solution.................................................................. 6-5
6.2 Setting User Account Rule .................................................................................. 6-8
6.3 Role Management ............................................................................................ 6-10
6.3.1 Creating a Role .......................................................................................6-11
6.3.2 Modifying a Role .................................................................................... 6-13
6.3.3 Duplicating a Role .................................................................................. 6-14
6.3.4 Deleting a Role ...................................................................................... 6-14
6.3.5 Viewing Users Assigned with a Role........................................................ 6-15
6.3.6 Locking a Role ....................................................................................... 6-15
6.4 Role Set Management ...................................................................................... 6-16
6.4.1 Creating a Role Set ................................................................................ 6-16
6.4.2 Modifying a Role Set .............................................................................. 6-17
6.4.3 Duplicating a Role Set ............................................................................ 6-18
6.4.4 Deleting a Role Set ................................................................................ 6-19
6.4.5 Viewing Users Assigned with a Role Set .................................................. 6-19
6.4.6 Locking a Role Set ................................................................................. 6-20

VIII

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


6.5 Operation Set Management .............................................................................. 6-20
6.5.1 Creating an Operation Set ...................................................................... 6-21
6.5.2 Viewing the Information of an Operation Set............................................. 6-22
6.5.3 Modifying an Operation Set..................................................................... 6-22
6.5.4 Duplicating an Operation Set................................................................... 6-23
6.5.5 Deleting an Operation Set....................................................................... 6-24
6.5.6 Viewing All Permitted Operations of an Operation Set............................... 6-24
6.5.7 Exporting Customized Operation Sets ..................................................... 6-25
6.5.8 Importing an Operation Set ..................................................................... 6-25
6.6 Department Management ................................................................................. 6-26
6.6.1 Creating a Department ........................................................................... 6-26
6.6.2 Modifying a Department.......................................................................... 6-27
6.6.3 Deleting a Department............................................................................ 6-28
6.7 User Management............................................................................................ 6-28
6.7.1 Creating a User...................................................................................... 6-28
6.7.2 Modifying a User .................................................................................... 6-32
6.7.3 Duplicating a User .................................................................................. 6-33
6.7.4 Deleting a User ...................................................................................... 6-33
6.7.5 Viewing Rights ...................................................................................... 6-34
6.7.6 Comparing Rights .................................................................................. 6-34
6.7.7 Exporting Rights .................................................................................... 6-35
6.8 Other Functions ............................................................................................... 6-35
6.8.1 Viewing User Lockup Records................................................................. 6-35
6.8.2 Modifying the Passwords of Common Users in Batches............................ 6-36
6.8.3 Managing Login Users............................................................................ 6-36
6.8.4 Setting User Blacklist.............................................................................. 6-36
6.8.5 Cleaning up Accounts............................................................................. 6-37
6.8.6 Setting User Login Mode ........................................................................ 6-37
6.8.7 Setting specified Time for Auto-Logout..................................................... 6-38

Chapter 7 Log Management ...................................................................... 7-1


7.1 Overview of Log Management............................................................................. 7-1
7.2 Introduction to Log Management View ................................................................. 7-2
7.3 Managing Logs by Type...................................................................................... 7-2
7.3.1 Viewing Log Records................................................................................ 7-2
7.3.2 Querying Operation Logs .......................................................................... 7-3
7.3.3 Querying Security Logs ............................................................................ 7-4
7.3.4 Querying System Logs ............................................................................. 7-5

IX

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


7.3.5 Refreshing Logs ....................................................................................... 7-6
7.3.6 Querying Log Information ......................................................................... 7-7
7.4 Customizing Log Query ...................................................................................... 7-7
7.4.1 Customizing a Log Query Condition........................................................... 7-7
7.4.2 Importing Query Conditions..................................................................... 7-10
7.4.3 Editing Query Conditions ........................................................................ 7-10
7.4.4 Exporting a Query Condition ....................................................................7-11
7.4.5 Saving a Customized Condition as Another Condition................................7-11
7.4.6 Deleting a Customized Log Query Condition ............................................ 7-12
7.4.7 Renaming a Customized Log Query Condition ......................................... 7-12
7.5 Maintaining Logs .............................................................................................. 7-13
7.5.1 Automatically Exporting Logs to a File ..................................................... 7-13
7.5.2 Manually Exporting Logs to a File ............................................................ 7-15
7.5.3 Printing Logs.......................................................................................... 7-15

Chapter 8 NE Data Management ............................................................... 8-1


8.1 Synchronizing Data of the NE ............................................................................. 8-1
8.1.1 Uploading the Data................................................................................... 8-1
8.1.2 Comparing the Data ................................................................................. 8-1
8.1.3 Downloading the Data .............................................................................. 8-2
8.1.4 Setting Automatic Uploading Comparison ................................................. 8-3
8.2 NE Data Backup and Recovery ........................................................................... 8-4
8.2.1 Backing Up NE Data................................................................................. 8-4
8.2.2 Restoring NE Data ................................................................................... 8-4
8.3 Managing NCP Data........................................................................................... 8-6
8.3.1 Clearing NCP Database............................................................................ 8-6
8.3.2 Backing up and Restoring NCP Data ......................................................... 8-7

Chapter 9 NMS DataBackup and Restoration.......................................... 9-1


9.1 Comparison for Backing Up and Restoring the U31 Data ..................................... 9-1
9.2 System Backup .................................................................................................. 9-5
9.2.1 EMS Data Backup with the U31 ................................................................ 9-6
9.2.2 Backing Up the Data with the dbtool Tool ................................................ 9-12
9.2.3 Backing Up the Data with the Offline Tool ................................................ 9-14
9.3 System Restoration .......................................................................................... 9-15
9.3.1 EMS Data Restoration with the U31 ........................................................ 9-16
9.3.2 Restoring the Data with the dbtool Tool ................................................... 9-18
9.3.3 Restoring the Data with the Offline Tool ................................................... 9-20

Chapter 10 System Monitoring................................................................ 10-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


10.1 System Monitoring.......................................................................................... 10-1
10.2 System Monitor View-Introduction ................................................................... 10-1
10.3 Application Server Monitor .............................................................................. 10-2
10.3.1 Viewing the Basic Information of Application Server................................ 10-2
10.3.2 Configuring Server Performance Monitoring .......................................... 10-2
10.3.3 Starting Server Performance Monitor .................................................... 10-3
10.3.4 Suspending Server Performance Monitor ............................................... 10-3
10.3.5 Viewing Monitoring Information of the Application Server ........................ 10-4
10.4 Database Server Monitor ................................................................................ 10-4
10.4.1 Viewing the Basic Information of Database Server.................................. 10-4
10.4.2 Configuring Database Resource Monitor................................................ 10-4
10.4.3 Starting Database Resource Monitor ..................................................... 10-5
10.4.4 Suspending Database Resource Monitor ............................................... 10-5
10.4.5 Viewing Database Resource Information................................................ 10-6

Chapter 11 Task Management ................................................................. 11-1


11.1 Task Management ...........................................................................................11-1
11.2 Introduction to Task Management View .............................................................11-3
11.3 Backing up and Deleting Log Data ....................................................................11-3
11.4 Backing up and Deleting Performance Data ......................................................11-4
11.5 Backing up and Deleting Alarm Data.................................................................11-5
11.6 Viewing the Backup Logs of Basic Data ...........................................................11-6
11.7 Viewing the Backup Logs of the Whole Database Structure ................................11-6
11.8 Viewing the File Backup Logs ..........................................................................11-6
11.9 File Clearing Tasks ..........................................................................................11-7
11.9.1 Modifying Monitor Attributes ...................................................................11-7
11.9.2 Executing Monitoring Tasks Immediately .................................................11-7
11.10 Modifying the Task Starting Time ....................................................................11-8

Chapter 12 Troubleshooting.................................................................... 12-1


12.1 Troubleshooting Flow...................................................................................... 12-1
12.2 Methods for Collecting Failure Information ....................................................... 12-3
12.3 Common Troubleshooting Methods ................................................................. 12-3
12.4 Common Troubleshooting Tools ...................................................................... 12-4
12.5 Troubleshooting Precautions and Requirements............................................... 12-5
12.6 Contacting Technical Support .......................................................................... 12-6
12.7 Troubleshooting of Server Failures .................................................................. 12-6
12.7.1 An Indicator of the Server Lights Red..................................................... 12-6
12.7.2 An Indicator of the Server Lights Yellow ................................................. 12-7

XI

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


12.7.3 The Indicator of a Hard Disk Lights Red ................................................. 12-8
12.7.4 Startup Failure of the Server ................................................................. 12-8
12.7.5 Remote Login Failure to the Server ....................................................... 12-9
12.8 Troubleshooting of Ethernet Switch Failures....................................................12-10
12.8.1 Indicators of the Switch Port Connected to the Server Are Off ................12-10
12.8.2 Indicators of the Switch Port Connected to the Server Light Solid
Yellow ................................................................................................. 12-11
12.9 Troubleshooting of Software Failures ..............................................................12-13
12.9.1 Failure of Removing the Server Program ..............................................12-13
12.9.2 Insufficient Disk Space During Server Installation ..................................12-14
12.9.3 FTP Server Start Error .........................................................................12-16
12.10 Failure of Querying Performance Data ..........................................................12-17

Figures............................................................................................................. I
Tables ............................................................................................................ III
Glossary .......................................................................................................VII

XII

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


About This Manual
Purpose
This manual is applicable to the NetNumen™ U31 R22 Unified Network Management
System (hereinafter referred to as U31 R22).
The U31 R22 is a network-level Network Management System (NMS) based on the
distributed, multi-process and modular design. It can exercise unified management
over the CTN, SDH, WDM/OTN, Router, BAS and Switch series of optical transmission
equipment from ZTE.

Intended Audience
This manual is intended for:
l Planning engineers
l Monitoring personnel
l Maintenance engineers

What Is in This Manual


This manual contains the following chapters.

Describes the operation flow and basic operations of the U31


1, Quick Start
R22.

Describes common operations in the Topology Management


2, Topology Management
module.

Describes common operations in the Alarm Management


3, Alarm Management
module.

Describes common operations in the Performance


4, Performance Management
Management module.

Describes common operations in the Report Management


5, Report Management
module.

Describes common operations in the Security Management


6, Security Management
module.

Describes common operations in the Log Management


7, Log Management
module.

8, NE Data Management Describes how to manage NE data.

9, NMS Data Backup and


Describes how to back up and restore U31 R22 data.
Restoration

10, System Monitoring Describes how to monitor the U31 R22 server and database.

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


11, Task Management Describes how to manage tasks on the U31 R22.

12, Troubleshooting Describes how to troubleshoot the U31 R22.

Conventions
This manual uses the following conventions.

Italics Variables in commands. It may also refer to other related manuals and documents.

Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters, and commands.

Constant Text that you type, program codes, filenames, directory names, and function names.
width

Danger: indicates an imminently hazardous situation. Failure to comply can result in


death or serious injury, equipment damage, or site breakdown.

Warning: indicates a potentially hazardous situation. Failure to comply can result in


serious injury, equipment damage, or interruption of major services.

Caution: indicates a potentially hazardous situation. Failure to comply can result in


moderate injury, equipment damage, or interruption of minor services.

Note: provides additional information about a certain topic.

II

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 1
Quick Start
Table of Contents
Basic Operation Flow .................................................................................................1-1
System Startup and Exit .............................................................................................1-3
Portal Operations .......................................................................................................1-6
System Setting ...........................................................................................................1-9
User Interface Management .....................................................................................1-12
Other Functions........................................................................................................1-15

1.1 Basic Operation Flow


Figure 1-1 shows the basic operation flow of the U31 R22 system.

1-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Figure 1-1 Operation Flow of the U31 R22

1. Start the U31 R22 server program.


Starting the U31 R22 server program is the premise of using the U31 R22 network
management system.

Caution!
Do not start/shut down the U31 R22 server program frequently.

2. Log in to the U31 R22 client portal.


3. Log in to the U31 R22 client.
The user interfaces of the U31 R22 system are integrated in the U31 R22 client. After
logging in to the client, you can perform the relevant management operations.

1-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 1 Quick Start

4. Perform management operations.


l Customization of GUI elements
To customize the parameters such as system parameters, login user information,
performance module parameters, alarm sound and color, and holiday information.
l U31 R22 management
The user can create and manage the information of the U31 R22.
l Topology management
The user can query and present the network topology and the service topology in
the Topology Management window.
l Security management
The user can manage the department, user, role, role set, operation set, and user
account rule in the security management view.
l Alarm management
The user can perform the functions of alarm monitor, alarm query, alarm statistics,
and alarm configuration in the alarm management view.
l Performance management
The user can query and collect the performance data in the performance
management view.
l Routine maintenance
The user can perform the functions of log management, security management,
and system maintenance in the view.
l Log management
The user can perform the functions of viewing, querying, and exporting logs in the
log management view.

1.2 System Startup and Exit


1.2.1 Starting the U31 R22 Server
This procedure describes how to start the U31 R22 server on Windows.

Prerequisite
You have installed the U31 R22 server software successfully.

Steps
1. On the desktop of the Windows operating system, select Start > All Programs >
NetNumen(TM) U31 Unified Management System > U31console. The Console
window is displayed.

1-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

When Successful. is displayed in the Operation result column, it indicates that the
U31 R22 server is successfully started, see Figure 1-2.

Figure 1-2 Operation Result Display

Note:
l The displayed processes vary with the server size that is selected during the
server software installation. For details, refer to the displayed information in the
Console window.
l The U31 R22 console automatically starts all processes, and no manual operation
is required.
l The EMS console startup file console.exe is located in the ums-server directory
under the path where the EMS is installed.

– End of Steps –

1.2.2 Logging In to the U31 R22 Client


This procedure describes how to log in to the U31 R22 client through start menu on
Windows.

1-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 1 Quick Start

Prerequisite

Ensure that the U31 R22 server is running properly.

Steps
1. On the desktop of the Windows operating system, select Start > Programs >
NetNumen Unified Management System > NetNumen Client. The Login dialog
box is displayed.

2. Enter User Name, Password, and Server Address in the Login window.

Caution!
In the U31 R22, the default user name is admin, and the password is null. Be sure to
modify the password of the admin user after successful login for the first time to ensure
the account security.

Note:

In the Login window, click on the right side of the server address to display
the Config Bureau dialog box. In the Config Bureau dialog box, you can configure
bureau name and the corresponding server address. The configuration information
will be displayed in the drop-down list of the Server Address to facilitate the user to
select.

3. Click OK.
– End of Steps –

1-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

1.3 Portal Operations


1.3.1 Logging In to the Client Portal
The U31 R22 provides a client portal as a unified login interface. After starting the
client portal, you can start the client or other specific management modules by clicking
corresponding links. The started client or other management modules can communicate
with the server and load data from the server directly.

Prerequisite
The U31 R22 server is operating properly.

Steps
1. On the desktop of the Windows operating system, click Start, point to Programs >
NetNumen U31 Unified Network Management System, and click U31 Client Portal.
The Login dialog box is displayed.

2. Enter the User Name, Password, and Server Address.

Caution!
For the U31 R22, the default user is admin, and the password is null. The user should
modify the password after login.

3. Click OK.
– End of Steps –

Result
After successful login, the Portal dialog box is displayed, see Figure 1-3.

1-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 1 Quick Start

Figure 1-3 Portal

The buttons in Portal dialog box are described as follows:

Button Description

Screen lock

Log out

Exit

About

Start the U31 client

Start alarm management module

Start performance management module

Start system maintenance module

1.3.2 Locking the Portal


This procedure describes how to lock the client portal through shortcut menus.

1-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Prerequisite
You have logged in to the U31 R22 client.

Steps
1. In the Portal dialog box, click on the toolbar. The Confirm message box is
displayed.
2. Click OK.
– End of Steps –

1.3.3 Logging Out of the Portal


This procedure describes how to log out of the client portal through shortcut menus.

Prerequisite
You have logged in to the U31 R22 client portal.

Steps
1. In the Portal dialog box, click on the toolbar. A Confirm message box is displayed.
Perform one of the following operations as required.

To... Do...

Save the user name and server IP address for Click the Save option button.
this login

Delete the user name and server IP address Click the Delete option button.
for this login

2. Click OK.
– End of Steps –

1.3.4 Exiting the Portal


This procedure describes how to exit the client portal through shortcut menus.

Prerequisite
You have logged in to the U31 R22 client portal.

Steps
1. In the Portal dialog box, click on the toolbar. A Confirm message box is displayed.
2. Click OK.
– End of Steps –

1-8

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 1 Quick Start

1.3.5 Starting the Client


The portal provides shortcut for the user to access the main window of the system. Through
the portal, the user can access the main window without entering a password.

Prerequisite
You have logged in to the U31 R22 client portal.

Steps
1. Perform any of the following operations as required.

To... Do...

Open the U31 Client window In the Clients area in the NetNumen U31 Portal window, click U31
Client

Open the Fault Management In the Clients area in the NetNumen U31 Portal window, click
window Fault Management.

Open the Performance In the Clients area in the NetNumen U31 Portal window, click
Management window Performance Management.

Open the System In the Clients area in the NetNumen U31 Portal window, click
Maintenance window System Maintenance.

– End of Steps –

1.4 System Setting


1.4.1 Setting System Parameters
You can customize system parameters. The system settings include:

l Time of automatic screen lock


l Number of prompt messages and error messages
l Number of query results displayed on one page
l Setting of exiting the window
l Number of seconds before hiding tooltips

Steps
1. From the client main menu, select System > Preferences. The Preferences dialog
box is displayed.
2. In the Preferences navigation tree, expand the System node. To set system
parameters, refer to Table 1-1.

1-9

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Table 1-1 System Parameter Setting

To... Do...

Set automatic screen lock Select Screen Lock from the system navigation tree, and then
time set parameters in the right pane.
l Enabled: select whether to enable the automatic screen lock
function.
l Idle time (minute(s)): waiting time before the automatic
screen lock, in range of 1 to 6000.
l Lock type: Lock Screen or Lock Operation (click OK to
unlock the screen). Lock Operation, or press shortcut key
<Ctrl+U> to unlock the operation.)

Set the number of messages Select Message Area from the system navigation tree, and then
displayed in the message set parameters from the right pane.
area l Set Prompt Message Count: maximum number of prompt
messages, in range of 1 to 5000.
l Set Error Message Count: maximum number of error
messages, in range of 1 to 5000.

Set the number of displayed Select Query Settings from the system navigation tree, and then
query results set parameters from the right pane.
Query results count in one page: maximum number of query
results displayed in one page, in range of 50 to 500.
This setting does not take effects on the current active alarms, but
takes effects on the history data.

Set the window record when Select Window from the system navigation tree, and then set
exiting the client terminal parameters from the right pane.
Keep the position and the size of the main window the same as
in the last logout: If you select Enabled, the position and size of
the main window in previous logout will be kept when the client
terminal is enabled.

Customize the toolbar Select Toolbar Customization from the system navigation tree.
To set parameters, refer to 1.5.7 Configuring the Toolbar.

Set the prompting time of Select Tooltip Duration from the system navigation tree, and
hiding the tool then set Number of seconds before hiding tooltip. The value
range is in 1 to 1000.

1-10

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 1 Quick Start

To... Do...

Configure holiday Select Holiday Setting from the system navigation tree, and then
information set parameters from the right pane.
l Add a holiday: Click Create, and then set holiday name,
begin date, end data, and year in the Create Holiday dialog
box.
l Modify a holiday: Select the holiday to be modified, and then
click Modify. Modify begin date, end date, and year in the
Modify Holiday dialog box.
l Delete a holiday: Select the holiday to be deleted, and then
click Delete. Select the year in the Delete Holiday dialog
box.

3. Click OK.

– End of Steps –

1.4.2 Setting the Information of Login User


This procedure describes how to configure the email address, the telephone number of
the user, and password protection.

Steps
1. From the client main menu, select System > Preference. The Preference dialog box
is displayed.
2. In the Preference navigation tree, select Security > Login User , and then set the
login user parameters on the right pane.

Parameter Description

Email Address You must enter the full E-mail address. For example, test@zte.com.cn

Phone Number l Enter a fixed or mobile phone number.


l It supports numbers and half-angle connector "-".
l More than one number should be separated by commas.

3. Select Security > Password Protection Question Setting, and then set the
parameters.

4. Click OK.
– End of Steps –

1-11

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

1.5 User Interface Management


1.5.1 Closing the Current Window
By default, different activated application views are displayed on the client window in an
embedded way.

Context
You can perform any of the following operations to close the current window.

Steps
l From the client main menu, select Window > Close Current Window.
l At the upper-right corner of the main window, click the button.
l At the upper-right corner of the main window, click the button on the right of the
button, and select Close Current Window.
– End of Steps –

1.5.2 Closing All Views


By default, different activated application views are embedded in the client window.

Context
You can perform any of the following operations to close all Windows.

Steps
l From the client main menu, select Window > Close All Windows.
l At the upper-right corner of the main window, click the button on the right of the
button, and select Close All Windows.
– End of Steps –

1.5.3 Closing Other Windows


When there are several windows open, you can close all the other windows except the
current window.

Prerequisite
You have opened several application views in the client window.

Context
You can perform any of the following operations to close other windows.

1-12

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 1 Quick Start

Steps
l From the client main menu, select Window > Close Other Windows.
l At the upper-right corner of the main window, click the button on the right of the
button, and select Close Other Windows.
– End of Steps –

1.5.4 Showing or Hiding the Toolbar


The user may show or hide the toolbar of the client window. For the first startup of the
system, the toolbar of the main view is visible by default. After the first time, the display
status of toolbar on the main view for each login is consistent with the status before the
operator last exits the system.

Prerequisite
Before you begin, make sure that you have logged in to U31 R22 client.

Steps
1. When the toolbar is in showing status, select Window > Tool Bar to hide the toolbar.
2. When the toolbar is in hiding status, select Window > Tool Bar to display the toolbar.
– End of Steps –

1.5.5 Showing or Hiding the Status Bar


The user may show or hide the status bar of the client window. For the first startup of the
system, the status bar of the main interface is visible by default. Then, the display status
of status bar on the main interface for each login is consistent with the status before the
operator last exits the system.

Prerequisite
You have logged in to the U31 R22 client.

Steps
1. When the status bar is in showing status, select Window > Status Bar to hide the
status bar.
2. When the status bar is in hiding status, select Window > Status Bar to display the
status bar.
– End of Steps –

1.5.6 Showing and Hiding the Message Area


The Show Message dialog box is not visible on the client window by default when you
start the client for the first time. You can select to show the message area or not. When

1-13

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

you start the client again, whether the message area is displayed depends on the state of
the message area before the client was closed last time.

Prerequisite
Before you begin, make sure that you have logged in to the U31 R22 client.

Steps
1. When the message area is in showing status, select Window > Message Area to hide
the message area.
2. When the toolbar is in hiding status, select Window > Message Area to display the
message area.
– End of Steps –

1.5.7 Configuring the Toolbar


The toolbar in the U31 R22 client only display the buttons of some common functional
modules by default, such as viewing topology, system monitoring, task management, and
alarm monitoring. You can set the toolbar as required so that the buttons of the functional
modules are displayed or hidden.

Prerequisite
The toolbar is displayed.

Steps
1. Right-click the blank of the toolbar on the client terminal, and then select Toolbar
Customization. The Toolbar Customization dialog box is displayed, see Figure 1-4.

1-14

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 1 Quick Start

Figure 1-4 Toolbar Customization Dialog Box

2. Perform the corresponding operation as required.

To... Do...

Display the button


i. In the Hide the toolbar buttons area, select the button to be displayed.
of a functional
module ii. Click to move the button to the Show the toolbar buttons area.

Hide the button


i. In the Show the toolbar buttons area, select the button to be hidden.
of a functional
module ii. Click to move the button to the Hide the toolbar buttons area.

– End of Steps –

1.6 Other Functions


1.6.1 Locking the Screen
You can lock the screen operation when you want to leave for a short time without exiting
the client window. After the screen is locked, only you (that is, the current login user) or
the system administrator can unlock the screen.
l If the screen is unlocked by the current user, the client window appears with the same
view displayed before the screen locking operation.
l If the screen is unlocked by the administrator, the client window is displayed with the
Topology Management window displayed by default.

1-15

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. Perform one of the following operations to open the Select Lock Type dialog box.
l From the main menu, select System > Lock Screen.
l On the toolbar, click the shortcut button .
2. Select a locking type.

Table 1-2 Parameter Description of Select Lock Type Dialog Box

Parameter Description

Lock Screen The GUI will not be visible.


Unlock method: enter the correct user name and password in the Unlock
dialog box, and click OK.

Lock Operation The GUI will be visible but operations are disabled.
Unlock method: press <Ctrl+U>. The Unlock dialog box is displayed. Enter
the correct user name and password, and click OK.

3. Click OK. The Confirm message box is displayed.


4. Click OK.
– End of Steps –

1.6.2 Logging Out of the System


Logout is unavailable if you log in from the portal. It is only available in the main window
of the U31 R22 client. If you execute the operation of logout, you will exit from the client
and the Login dialog box is displayed.

Steps
1. Open the Confirm message box by performing one of the following operations:
l From the main menu, select System > Logout.
l On the toolbar, click .

To... Do...

Save the login user name and server IP address Click the Save option button.

Delete the login user name and server IP Click the Delete option button.
address

2. Click OK.

– End of Steps –

1.6.3 Setting the Password of the Current Login User


This procedure describes how to set a new login password.

1-16

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 1 Quick Start

Steps
1. From the main menu, select System > User Password Setting. The User Password
Setting dialog box is displayed.
2. Set the new password.

Parameter Description

Old Password Enter the current password. If the current password is null, you do not need
to enter.

New Enter the new password. The new password must be different from the last
Password five passwords.

Confirm Enter the new password again to confirm. User Password must be consistent
Password with Confirm Password.

3. Click OK. The Confirm message box is displayed.


4. Click OK.

– End of Steps –

1.6.4 Viewing the System Time


The time of the client and the server may be different. You can check the current time of
the server in the client window.

Steps
1. From the client main menu, select System > Query System Time. The Query
System Time message box is displayed.

2. View the server time and client time.


– End of Steps –

1.6.5 Copying, Clearing, and Configuring Messages


This procedure describes how to copy, clear, and configure the messages in the message
area.

Steps
1. You can perform any of the following operations to open the Show Message dialog
box.
l From the client main menu, select Window > Message Area.
l Double-click at the bottom-left corner of the U31 R22 client window.

2. Perform the operations of copying, clearing, and configuring as needed.

1-17

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To... Do... Result

Copy In the Show Message dialog box, select the The selected message is copied
Selected message to be copied, and then click . to the clipboard.
Message

Copy All All the messages in the Show


Click in the Show Message dialog box.
messages Message dialog box are copied
to the clipboard.

Clear All All the messages in the Show


Click the button in the Show Message
Messages Message dialog box are cleared.
dialog box.

Set Set maximum number messages


Click . Enter the maximum number
Message successfully.
messages in the Set Message Count dialog
Count
box, and then click OK.

– End of Steps –

1-18

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2
Topology Management
Table of Contents
Topology Management Functions ...............................................................................2-1
Topology Management Window..................................................................................2-2
Custom User Interface ...............................................................................................2-7
Functions on Topology Menu....................................................................................2-13
Common Topology Management Operations............................................................2-19
Operations on NE Tree.............................................................................................2-22
Operations on Topology Graph.................................................................................2-24
Virtual NE Operations...............................................................................................2-33
Virtual Link Operations .............................................................................................2-35
Group Management Operations ...............................................................................2-38

2.1 Topology Management Functions


Overview
The U31 R22 provides a series of topology management functions, including:
l Viewing and editing network resource locations, network architectures, links and
connections, and service distribution in different service systems.
l Displaying topological relationships between service subnetworks along with access
management.

Function Description
l Topology Display
The U31 R22 system displays network resources by combining the NE tree and the
topology graph. Users can manage network resources in different views.
l Topology Operations
The U31 R22 provides the following topology operations:
à Searching topology nodes
à Switching between different views
à Backing up and printing the topology graph
à Moving topology graph
à Changing the displaying structure of topology graph
à Displaying full-screen view

2-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

à Setting the network layout


à Operations on groups
à Operations on links
à Operations on NEs
à Expanding and collapsing the topology graph
à Customizing elements on Graphic User Interface (GUI)
à Viewing the rack diagram
l Monitoring Function
The topology view provides a dynamic network topology graph, displaying the
operation status of managed networks in real time. It monitors configuration changes
and fault alarms.
The topology graph also displays records of adding and deleting NEs and the
configuration information of NEs, while informing users of these changes. By using
regular synchronization, you cannot only view dynamic status of configuration
changes in network devices, but also set the updating cycle of configuration
information.
Fault Monitoring: The topology graph can display fault generated in lower-level
network element management systems in the format of visual and audio alarms.
The system also distinguishes between different alarm severity levels by using
different icon colors of faulty NEs. Acknowledged, unacknowledged, handled and
removed faults are also displayed in different ways.

2.2 Topology Management Window


Topology Management Window
The Topology Management window is shown in Figure 2-1.

2-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Figure 2-1 Topology Management Window

1. NE tree 3. Pane of filter, legend and 5. Prompt message area


2. Topology graph toolbar display overview 6. Alarm and performance
4. Topology Graph pane

Note:
l To display the pane of filter, legend and display overview in the Topology

Management window, you can click the button.


l To display the alarm and performance pane at the bottom of the Topology
Management window, you can click the button.
l In the alarm and performance pane, NE alarm information is displayed, and you can
query or handle alarms.

Topology Menu
The commands on the Topology menu are shown in Figure 2-2.

2-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Figure 2-2 Topology Menu

Topology Graph and NE Tree


l The NE tree lists all nodes in the network, while the topology graph shows all nodes
on the current layer.
l The topology graph shows the network structure of devices managed by the system.
The graph reflects parent-child relations between devices in a hierarchical way and
displays connection relations between devices with lines.
l The system keeps the synchronization between the NE tree and the topology map.
Moreover, the NE tree provides the navigation function for the topology graph.

Topology Graph Toolbar


On the top of the topology map is the topology toolbar, see Figure 2-3. You can use the
buttons on the toolbar to perform basic operations on the topology graph.

Figure 2-3 Topology Graph Toolbar

The functions on the toolbar are described in Table 2-1.

Table 2-1 Description of Topology Toolbar Buttons

Button Function

Configure Toolbar: used to configure topology buttons displayed


on the toolbar.

Select: By clicking this button and then clicking an NE or link on


the topology map, and the NE or link node is selected.

Pan: used to move the area displayed on the topology graph.

Magnifying glass: used to zoom in the region where the cursor


is located

2-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Button Function

Regional Zoom: If you select a region and click this button, only
the selected area in the current window is displayed.

Zoom Out: used to zoom out the map.

Zoom In: used to zoom in the map.

Zoom Reset: used to display the map in accordance with the


default scale of the system.

Fit to Content: used to show the entire graph in the current


window area of the topology view.

Zoom Back: used to cancel the last zooming action.

Lock Position: After being locked, the NE cannot be moved.

Save Position: saves the position information on the topology


graph.

Icon Arrangement: used to arrange the nodes selected on the


topology graph.

Goto: locates a specified node on the graph.

Back to: displays the map layer of the previous operation. This
button changes in accordance with map layer change.

Forward to: displays the map layer of the previous operation.


This button changes in accordance with map layer change.

Filtering: filters the topology graph or topology list based on the


specified filtering conditions.

Customized Displays: select the contents to be displayed in the


topology graph.

Export Current Graph: exports the information of all nodes on


the current layer to a local file.

Search(Ctrl+F): used to search nodes by name, type, description


or location.

Full Screen: displays the NE tree, Filter, Legend, and Display


areas on the full screen.

When the topology information is displayed in a graph, the button


appears.
View Table: shows the information of all nodes on the current
layer in a list.

2-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Button Function

When the pane of filter, legend, or display overview is displayed,


the button appears.
Hide Legend: used to hide the pane of filter, legend, and display
overview.

Pane of "Filter", "Legend", and "Display" overview


On the right of the topology map is the pane of "Filter", "Legend", and "Display" overview.
l You can set filtering conditions in the filter to only show the contents meeting the
conditions on the view.
l The legend explains the icons of all NE types, alarm colors and status icons.
l In the display overview, you can set whether to show node name, link name and the
message window in the Topology Management window and determine the contents
displayed in the message window.

Note:
If the pane of Filter, Legend and Display Overview are not displayed in the Topology

Management window, click the button to show the pane on the right.

Alarm and Performance Pane


The alarm and performance pane lists the alarm and performance messages of the
selected NE.

NE Icons
NE icons refer to the icon of devices on the topology graph, see Figure 2-4.

Figure 2-4 NE Icons

The icon color indicates the following information:


l Blue: NE does not raise any alarm.
l Other colors: the highest-level alarm existing on the NE.
Alarm colors represent alarm severity levels. For details, see Figure 2-5.

2-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Figure 2-5 Alarm Color Illustration

Point the cursor to an NE icon and a message box appears to show the statistic information
of related alarms.

2.3 Custom User Interface


The GUI elements can be customized as required.

2.3.1 Customizing Icons by NE Type


You can customize images corresponding to different NE types on the topology map and
the NE Tree.

Prerequisite
The new image file meets system requirements and is stored on the client.

Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Type Icon. The type icons are displayed in the
right pane.

3. In the right list, click the button after the icon to be replaced. The Open dialog box
is displayed.
4. Select a file from the Open dialog box.

Note:
The icon image file must meet the following requirements:
l The selected image file must not exceed 50 KB.
l The icon of an NE tree node must not be more than 25×25 pixels.
l The icon of a topology node must not be more than 50×50 pixels.

5. Click Open to return to the Customize GUI Elements dialog box.

2-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

6. Click the OK button.


– End of Steps –

2.3.2 Customizing Link Appearance


This procedure describes how to set link linearity and width.

Context
You can customize the linearity and line width displayed on the topology map for links.

Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Link Appearance.
3. In the right pane, click the link attribution box to be modified, and select a link style
and link width as required from the drop-down list.
4. Click OK.
– End of Steps –

2.3.3 Customizing Status Icons


You can customize the icon of each status.

Prerequisite
The new image file meets system requirements and is stored on the local computer.

Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Status Icon.

3. In the right list, click the button after the icon to be replaced. The Open dialog box
is displayed.
4. Select a file from the Open dialog box.

Note:
The icon image file must meet the following requirements: The selected image file
must not exceed 50 K. The icon of an NE tree node must not be more than 25*25
pixels. The icon of a topology node must not be more than 50*50 pixels.

2-8

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

5. Click the Open button to return to the Customize GUI Elements dialog box.
6. Click the OK button.
– End of Steps –

2.3.4 Customizing Status Colors


You can customize colors corresponding to each status.

Context
l RGB: indicates the parameters of red, green, and blue.
l HSB: indicates the parameters of hue, saturation, and brightness.

Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Status Color. The status colors are displayed in
the right pane.

3. Click the button in the Status Color field. The Chooser Status Color dialog box
is displayed.

Note:

The Swatches tab is displayed by default.

4. Select the color as required, and click Preview button to view the setting. The last
chosen color is displayed in the first box under the Recent section.

Note:
The HSB and the RGB of the selected color can be adjusted on the other two tabs.
HSB and RGB settings are interrelated. Adjusting one of them will change the other.

5. Click the HSB tab.

To set HSB, perform one of the following operations:


l Click the option button before H, S, and B, and drag the color slider.
l Enter a value.
l Click the spin box to set a value.

2-9

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
The parameters set here affect those on the RGB tab.

6. Click the RGB tab.


To set RGB, perform one of the following operations:
l Drag the slider after each color.
l Enter a value.
l Click the spin box to set a value.
7. Click the OK button to finish setting and close the Customize GUI Elements dialog
box. The color is changed by now.
8. Click OK.
– End of Steps –

2.3.5 Customizing Status Order


You can select the status icons to be displayed on the user interface and the order in which
they are displayed. The higher-order icons are displayed to the left. Three icons can be
displayed on the topology graph, while one icon can be displayed on the NE tree. To
replace the status icons, refer to "Customizing Status Icons" in this chapter.

Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Status Order. The Customize Status Order
page is displayed in the right pane.
3. From the Displayed Status Icon box, select icons that do not need to be displayed.

4. Click to move the icon to the Undisplayed Status Icon list.

Button Function

Add all icons to Displayed Status Icon list.

Add selected icons to Displayed Status Icon list.

Move all icons to Undisplayed Status Icon list.

Move selected icons to Undisplayed Status Icon list.

Move selection to the icon above the selected one.

2-10

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Button Function

Move selection to the icon below the selected one.

5. Click OK.

Note:
Click the Default button to restore default settings.

– End of Steps –

2.3.6 Customizing Tooltips


On the topology graph, a tip is displayed when you point to a node. You can customize
node tips, or hint messages in the Topology Management window. The node tip includes:
the node name, status, alarms, description, IP address , mode, performance information,
and bearer network topology. For a description of the tooltip items, refer to Table 2-2.

Table 2-2 Tooltip Item Descriptions

Item Description

Name Name of the node, for example, NE1.

Type Type of the node, for example, ZXCTN 6300 or Link.

IP Address IP address, for example, 192.168.200.1.

Status Offline, online, or disconnected.

Alarm Displays the unidentified active alarms and the number of total active
alarms. If the node has no alarm, the item is not displayed.

Description Description information. If the node has no description information, the


item is not displayed.

Performance Related performance information.

BN TOPO ID of the device.

Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.

2. From the left list, select Customize Tooltips. The Customize Tooltips page is
displayed in the right pane.
3. Select an NE type from the Type list.

2-11

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

4. On the Basic Information , NE PM Monitoring, and BN TOPO tab, select the tip
message to be displayed.
5. Click the OK button to finish setting.
– End of Steps –

2.3.7 Customizing Alarm Prompting Type


You can customize the alarm prompting type of the nodes on the topology graph. The
prompting type includes:
l Show Alarm Bubble
l Show alarm border
l Alarm flashing

Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Alarm. The Customize Alarm page is displayed
in the right pane.
3. Select the check box before each prompting type according to the description and your
needs.
4. Click OK to finish setting.
– End of Steps –

2.3.8 Customizing Other Elements


You can customize NE tree, status column, and topology diagram displayed in the
Topology Management window.

Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Other. The other configurations are displayed in the right
pane.
l In the NE Tree Configuration area, select the Show Status Icon check box to
show status icon.
l In the Status Bar Configuration area, select the object to be displayed on the
status bar.
l In the Topology Graph Configuration area:
à Select The Parent Node of a Layer is Visible.
à Set Label Color.
à Set Background Color.

2-12

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

à Set Node Border Color


à Set Label Font Size.
à Set Max Number of Character per Row in the Node Label.
à Set Max Number of Rows in the Node Label.
à Set Arrow of a Unidirectional Link is Visible.
à Set Arrows of a Bidirectional Link are Visible.

à Set Minimum Number of Links to be Combined.


à Set Distance Between Two Links.

Note:
Minimum Number of Links to be Combined indicates that the links can be combined
into one and be expanded when the number of the links between two NEs is more than
or equal to the value.

3. Click Set to save the settings.


– End of Steps –

2.4 Functions on Topology Menu


This chapter provides instructions on topology management operations by using the
commands on the Topology menu.

2.4.1 Opening the Topology Management Window


This procedure describes how to open the topology management window.

Context
Log in to the U31 R22 client, and the system opens the Topology Management window by
default. If you open another view later, perform the following steps to switch to Topology
Management window again.

Steps
1. Perform one of the following optional operations to open the Topology Management
window.
l From the client main menu, select Topology > View Topology.
l Click the button on the toolbar.
l Select Topology Management from the drop-down menu on top right.

2-13

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

– End of Steps –

2.4.2 Refreshing Topology Data


When more than one user is operating on the topology graph at the same time, refreshing
is necessary. If one user modifies the topology graph on his or her client and has uploaded
modification to the server, you can refresh the topology to get latest data from the server.

Steps
1. From the client main menu, select Topology > Refresh Data to refresh topology data.
– End of Steps –

Result
In the message area, double-click . The Show Message dialog box is displayed,
indicating the refreshed results, see Figure 2-6.

Figure 2-6 Show Message Dialog Box

2.4.3 Exporting GUI Display Style


You can export the GUI display style to a ZIP file. The exported file includes all the
configuration data in Customize GUI Elements dialog box and your selections of legend
display, overview map, NE location and lock status, and the map configuration. To export
GUI display style, perform the following steps:

Steps
1. From the client main menu, select Topology > Display Style Management > Export
GUI Display Style. The Save dialog box is displayed.

2-14

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

2. Set file path and name in Save in box and File name text box respectively.
3. Click the Save button to export all display settings to a ZIP file.
– End of Steps –

2.4.4 Importing GUI Display Style


The user may export the current display style into a ZIP file, which can later be imported to
another client with the same topology data to realize consistency in display style between
clients.

Steps
1. From the client main menu, select Topology > Display Style Management > Import
GUI Display Style. The Open dialog box is displayed.
2. Select a zip file from the Look in box.
3. Click the Open button to import the file, and the display style of the current client
changes accordingly.
– End of Steps –

2.4.5 Configuring Alarm Display Method


2.4.5.1 Showing and Setting the NE Monitoring Table
You can view the monitoring information and acknowledgment status of NEs in the
monitoring table at the bottom of Topology Management window. You can also set the
monitoring mode in the table.

Steps
1. From the client main menu, select Topology > Set Alarm Display Style > Show NE
Alarms Table. The monitoring table is displayed at the bottom of the client.

Note:

Select an NE in the topology graph or on the NE Tree, and the alarm information of
the NE is displayed on the Active Alarms.

2. Select filter conditions from the Severity, ACK State and Visibility drop-down menu
to set the monitoring information you want to see.
3. You can use the buttons on the monitoring pane to handle the monitoring information.
For the operation descriptions, refer to Table 2-3.

2-15

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Table 2-3 Toolbar on Monitoring Pane

Function Button Operation

Exporting i. Click the button, and select Export All Columns or Export Visible
monitoring Columns. The Save dialog box is displayed.
informa-
ii. Set file path, name, and type.
tion
iii. Click the Save button, and a message box is displayed prompting suc-
cess.

Printing i. Click the button. The Print Setup dialog box is displayed.
monitoring
ii. Set printing parameters.
informa-
tion iii. Click the Print button.
At most 5000 records can be printed at a time.

Pin table Used to stop refreshing the NE monitoring table. The current page will
remain unchanged.

Customize i. Click the button. The Customize Display Columns dialog box is dis-
display played.
columns
ii. select the check boxes corresponding to the columns you want to
show on the table.

iii. Click right or left arrow to add or remove the columns, and click up or
down arrow to adjust the sequence of columns displayed on the table.

iv. Double-click an item in the "Undisplayed Column" to display the col-


umn. Double-click an item in the "Displayed Column" to move that
filed to "Undisplayed Column" list.

v. Click OK button to finish setting.

4. To view the details of an alarm in the NE monitoring table, double-click corresponding


row to open the Details dialog box.
5. In the detailed monitoring dialog box, click the Handling Measure tab to view or edit
the handling measures.
6. Click the Close button to close the dialog box.

Note:
If you have edited the handling measures, click the Save button before closing the
dialog box.

7. (Optional) In the dialog box showing the details of an alarm, perform the following
operations as required.

2-16

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Table 2-4 View Details of Alarm Information

To... Do...

View previous message Click this button to show the details of the previous alarm message
in the dialog box.

View next message Click this button to show the details of the next alarm message in
the dialog box.

Acknowledge an alarm Click this button to acknowledge the current alarm.

Cancel acknowledgment Cancel acknowledgement of an acknowledged alarm, whose status


turns to "Unacknowledged" accordingly.

Add comments i. Click the button. The Comment dialog box is displayed.

ii. Type the comments or description in the text box, and click the
OK button.

Clear contents To clear the contents of this monitoring record, click the button and
click OK button in the displayed Confirm message box.

Forward message to i. Click the button. The Forwarding Setup dialog box is displayed.
related personnel via
ii. Select the forwarding mode: E-mail, phone number, or/and SMS.
SMS, E-mail, or phone
iii. Click the OK button.

Export the current i. Click the button. The Save dialog box is displayed.
message
ii. Set file name, path, and type.

iii. Click the Save button. You will be prompted of successful export.

Copy the details of the i. Click the Copy button.


message
ii. Open the window to paste the information.

– End of Steps –

2.4.5.2 Showing Primary Monitor Alarm Table


You can query primary monitor alarms based on their severity in accordance with query
conditions that are preset.

Steps
1. From the client main menu, select Topology > Set Alarm Display Style > Display
Important Alarms Table. The important alarm table is displayed at the bottom of the
Topology Management window.
2. Set query conditions to query the monitor information of primary alarms.

a. In the Topology Management area, click . The Set Monitor Condition dialog
box is displayed.
b. Select an NE from the Location tab in the Set Monitor Condition dialog box.

2-17

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

You can select NEs by performing one of the following operations:


l NE type: Select an NE type from the NE type list. If this is not configured, all
NE types are queried by default.
l NE tree: Expand the NE tree, and select the NE you want to query.
c. Click the Alarm Code tab and select an alarm code.

d. Click to move selected alarm code(s) to the selected box on the right.
e. Click the Time tab to set alarm generating time.
f. Click the Others tab to set other parameters.
l Alarm Type: Select the check box to select the alarm types to be queried.
l Data Type: Select the check box to select the data types to be queried.
l Severity: Select the check box to select the perceived severity to be queried.
l ACK State: Select the check box to select alarms to be queried in
corresponding acknowledgement status.
l NE IP: If you want to query the alarm of a specified NE, enter the NE IP.
l Click the Advanced button, and set advanced parameters in the displayed
Advanced dialog box.

Parameter Description

(Un)ACK user ID: Sets the ID of the user that acknowledges or


Exact Match unacknowledges the alarm.

Comment(Fuzzy Sets a string for fuzzy match.


Match)

Alarm ID(Exact Match) Sets the ID of an alarm to be queried.

Visibility Queries visible or invisible alarms.

Correlation Sets alarm query correlation.

Maintenance State Sets alarm debugging status.

Note:
The alarm levels and confirmation status can also be set by selecting options from
the Severity and ACK State drop-down menus.

g. Click OK.

– End of Steps –

Result
The queried result is displayed in the Important Alarms Table area at the bottom of the
Topology Management window.

2-18

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

2.5 Common Topology Management Operations


This chapter describes common topology management operations that you can perform
by using the commands from the shortcut menu of a node on either the NE tree or the
topology graph of the Topology Management window.

2.5.1 Setting Node Rules


Set rules for a node (except actual microwave NE nodes) in the topology graph or on the
NE tree, including location, device type, and IP address. The topological objects created
afterwards will be set under the node that can best match its rules.

Steps
1. In the Topology Management window, right-click an NE, and select Topology
Management > Set Rule from the shortcut menu. The Set Rules dialog box is
displayed.
Select a rule from the following list: IP Address Rule, Device Type Rule, and
Location Rule.
2. Select rules form the Rule Type list.
3. Configure the rules as required.

Parameter Description

IP Address Rule Enter the IP address in the text box. The semicolon ";" is used to separate
multiple IP addresses. The following three formats of strings can be used:
l A singe IP address, for example, 1.2.3.4
l An IP address ranges from a smaller address to a larger one connected
with "-", for example, 10.10.1.5–10.10.2.6
l IP address with "*" used at head or end to substitute for multiple
characters

Not Equals: The IP address is not matched.

Location Rule Enter the location in the text box. The semicolon ";" is used to separate
multiple locations.
l The asterisk "*" can replace any characters, and the question mask "?"
only replaces one character.
l The asterisk "*” is represented by "\*" , and the question mask "?" is
represented by "\?".

Not Equals: The input location is not matched.

Ignore Case: no case-sensitive

Device Type Rule


l Select the known device type, and then click .
l Enter the device type manually:

2-19

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Description

à The asterisk "*" can replace any characters, and the question mask
"?" only replaces one character.

à The asterisk "*” is represented by "\*" , and the question mask "?" is
represented by "\?".

Not Equals: The input location is not matched.

Ignore Case: no case-sensitive

4. Click Save.

Note:
The objects created before the rule is enabled are not affected by the rule.

– End of Steps –

2.5.2 Setting Members of a Node


This procedure describes how to set members for a group or an NE.

Steps
1. In the Topology Management window, right-click a node, and select Topology
Management > Set Member from the shortcut menu. The Set Member dialog box is
displayed.
2. In the Set Member dialog box, select an NE from the Available Items list, and click
the Add button to add the NE to the Selected Items list.
3. (Optional) Repeat step 2 to add multiple NEs.
4. Click OK.
– End of Steps –

2.5.3 Moving a Node


You can move a node to another place (except actual microwave NE nodes) on the NE
Tree.

Steps
1. In the Topology Management window, right-click a node, and select Topology
Management > Move Node from the shortcut menu. The Move Node dialog box is
displayed.

2-20

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

2. Select a new parent node on the NE tree.


3. Click the OK button. The node is moved to the specified place on the NE Tree.
– End of Steps –

2.5.4 Showing Statistics of a Node


You can view the statistics of a node on the NE tree, including the number of its child NEs,
and that of related groups and links.

Steps
1. You can use any of the following methods to display the Statistical Information dialog
box.
l In the Topology Management window, right-click a node, and select Topology
Management > Show Statistical Information from the shortcut menu. The
Statistical Information dialog box is displayed.
l In the Topology Management window, right-click a node in the NE Tree list.
Select Topology Management > Show Statistical Information. The Statistical
Information dialog box is displayed.
l From the main menu, select Topology > Show Topology Statistics. The
Statistical Information dialog box is displayed.

2. View the number of NEs, connected NEs, disconnected NE, and offline NEs
3. (Optional) Click Export to export the statistical information.
The formats of exported files include txt, htm, pdf, xls, csv, prn, xlsx, and xml.
– End of Steps –

2.5.5 Switching to the Fault Management Window


You can select an NE and switch to the Fault Management window to troubleshoot the
fault alarms of the NE.

Steps
1. In the Topology Management window, right-click an NE, and select Fault
Management from the shortcut menu. The system displays the corresponding alarm
window of the NE.

– End of Steps –

2.5.6 Switching to the Performance Management Window


You can select an NE and switch to the Performance Management window to manage
performance data of that NE.

2-21

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. In the Topology Management window, right-click an NE, and select Performance
Management from the shortcut menu. The system displays the corresponding
performance management window of the NE.
– End of Steps –

2.5.7 Viewing the Alarm Count of a Node


You can quickly view the number of current alarms and total alarms of an NE on the
topology graph. To view alarm details, see 《 U31 R22 Unified Network Management
System Performance Management Operation Guide 》

Steps
1. In the NE tree or topology graph, suspend the mouse on the NE for seconds. The
alarm information will be displayed automatically.
– End of Steps –

2.6 Operations on NE Tree


2.6.1 Introduction to NE Tree
The NE Tree is to the left of the topology graph, see Figure 2-7.

Figure 2-7 NE Tree

On the NE tree, you can query the corresponding nodes in one of the following ways. For
the differences between the three ways, refer to Table 2-5. The detailed operation of each
way is described in the following chapters.

2-22

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Table 2-5 Differences Between the Three Ways

Query Way Query Result

Filter Only the NEs or groups whose names include "filtering condition" are displayed
on the NE tree.

Find NEs or groups whose names include "search condition" are highlighted on the
NE tree or in the topology view. You can click Find Next to locate other NEs or
groups meet the "search condition".

Filter by Resource Only the NEs meet the resource type displayed on the NE tree.
Type

In addition, you can perform the operations the same as the above through the right-click
menu on the node of the NE tree.

2.6.2 Implementing the Filtering


This procedure describes how to set the filtering condition, and then implement the filtering.

Prerequisite
You have learned of the related information of the NE node that you want to search.

Steps
1. Enter a keyword in the text box under the NE Tree tab, such as the name, see Figure
2-8.

Figure 2-8 Entering a Keyword

2. Click the button to filter NEs.


The NE nodes that satisfy the query condition are displayed in the NE tree.
– End of Steps –

2.6.3 Searching the NE or Group


This procedure describes how to search an NE or group in the NE tree as required.

Steps

1. On the right of the NE tree text box, click , and then click . The Find
dialog box is displayed.

2-23

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2. Enter the querying condition, for example, the name of the NE or group.
3. Click Find Next to locate another NE or group.
– End of Steps –

2.6.4 Filtering the Resource Type


This procedure describes how to filter the NEs that meet the querying condition in the NE
tree and topology view.

Steps

1. On the right of the NE tree text box, click , and then click
. The Filter by Resource Type dialog box is displayed.
2. In the Resource Type tree, select the NE type to be filtered.
3. Click OK. Only NEs that meet the querying condition are displayed in the NE tree and
topology view.
– End of Steps –

2.7 Operations on Topology Graph


This chapter describes how to perform operations unique to topology graph.

2.7.1 Topology Layer Operations


The topology graph is divided into layers. Select a node on the NE tree, and the topology
graph shows all nodes on the current layer under the same node, see Figure 2-9.

2-24

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Figure 2-9 Current Layer

Operations on the topology layer are described in the next few topics.

2.7.1.1 Going to the Upper Layer


This procedure describes how to view the topology graph of the upper layer.

Prerequisite
The current layer is under a parent-node layer.

Steps
1. On the topology graph, right-click the blank, and select To Upper Layer from the
shortcut menu.

– End of Steps –

2.7.1.2 Expanding and Collapsing a Node


On the current layer, you can expand a node to show its child nodes at the same time and
collapse it to hide the child nodes. Collapsing is the opposite operation of expanding.

2-25

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Prerequisite
The current node has at least one child node.

Steps
1. Expand a node: Right-click a node to be expanded on topology graph, and select
Topology Management > Show Node's Sublayer from the shortcut menu.
2. Collapse a node: Right-click a node to be collapsed on topology graph, and select
Topology Management > Hide Node's Sublayer from the shortcut menu.
– End of Steps –

2.7.1.3 Expanding and Collapsing All Nodes on the Current Layer


One-layer expanding is the opposite operation of complete collapsing. You can perform
the operations through right-click menus.

Prerequisite
The current layer has at least one child-node layer.

Context
On the current map layer, you can expand all parent nodes and collapse all expanded
nodes.
l Expanding all nodes: to expand all parent nodes on the current layer and display all
their child nodes in one layer.
l Collapsing all nodes: to collapse all the expanded nodes.

Steps
1. Expanding all nodes: Right-click the blank of the topology graph, and select Show
Sublayer from the shortcut menu. All sub-layers are then shown on the current layer.
2. Collapsing all nodes: Right-click the blank of the topology graph, and select Hide
Sublayer from the shortcut menu. All expanded sub-nodes are then hidden, with all
their parent nodes being displayed.

– End of Steps –

2.7.1.4 Going to Lower Layer


This procedure describes how to go to the lower layer of the current node.

Prerequisite
The current node has sub-nodes.

2-26

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Steps
1. On the topology view, right-click a parent node, and select Topology Management >
To Lower Layer from the shortcut menu.
The topology information of the lower layer is displayed in the topology view.
– End of Steps –

2.7.2 Functions of Toolbar buttons


On the top of the topology graph is the topology toolbar, as shown in Figure 2-10. You can
use the buttons on the toolbar to perform basic operations on the topology graph.

Figure 2-10 Topology Graph Toolbar

For the description about buttons, refer to 2.2 Topology Management Window. The
common functions that use buttons are described below.

Moving the Topology Graph


You can move the topology graph in the current view to display the information out of the
current view.

1. Click the button on the toolbar.


2. Drag the cursor to move the topology graph.

Locking and Unlocking the Topology Graph


NEs can be moved on the topology graph if the topology graph is not locked. After being
locked, NEs cannot be moved.

1. To lock NEs on the topology graph, click to lock NEs on the topology graph.
2. To unlock NEs on the topology graph, click .

Setting Network Layout


You can select a network layout type of NEs on the topology graph.

1. Click the button on the toolbar. The Network Layout dialog box is displayed.
2. Select a layout type from the Layout Strategy list.

Note:
For a layout type, refer to the layout example in the Sample pane.

The layout types include:

2-27

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l Hierarchical Layout
l Tree Layout
l Radial Tree Layout
l Spring Embedded Layout
l Uniform Length Edges Layout
3. Click OK.

Switching to the Graph of Another Node


You can switch the graph to another node that you have viewed during this login.

1. Click the button. The list of nodes you have viewed is displayed, see Figure 2-11.

Figure 2-11 Viewed Nodes

2. Select the node on the list as required.

Searching a Topology Node


You can search a node by name, type, position, IP address, or description.

1. Click the button. The Search dialog box is displayed.


2. Click an optional button after Search Mode.
l Or: searches the node(s) that meet(s) one of the conditions you select.
l And: searches the node(s) that meet(s) all conditions you select.
3. Select one or multiple conditions, and configure the condition value in the
corresponding condition area.
4. Select the Case Sensitive check box.
5. Click the Search button.

Note:
l A table is displayed below the topology graph to show the search result.
l If no matching nodes are found, the Confirm message box is displayed, informing
you about the result.

Displaying the Topology Map on Full Screen


If the topology graph is displayed on non-full screen, you have to drag the graph to view
the part that is not displayed. Full-screen view displays all information, thus unnecessary
to move the graph.

2-28

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Click the button.

Note:
You can click the button to exit full-screen display.

Exporting the Topology Graph


This procedure describes how to save the current topology graph as a screen snapshot to
a local path.

1. Click the button. The Save dialog box is displayed.


2. Select a file path in Save in box.
3. Set the file name and type.
l File Name: Enter the file name. The name of a group or an NE is recommended.
l Files of Type: The options include jpg and png.
4. Click the Save button. A message box is displayed.
5. Click OK.

Showing the Topology Information in Table


This procedure describes how to switch the topology display mode between a topology
table and a topology graph.

1. Click the button. The topology information is listed in a table.


2. Click the button to return to the topology graph.

Printing Topology Information


You can only print the NE list when they are displayed in table, instead of being presented
in topology graph.

1. Click the button. The Print Setting dialog box is displayed.


2. On the General tab, set Printer, Print Range and Copies.
3. On the Page Setting tab, set Paper Size, Orientation, and Margins.
4. On the Advanced tab, set advanced parameters.
5. Click the Preview All button. The Print Preview dialog box is displayed, in which you
can preview printing result.
6. Click the button in the Print Preview dialog box to print the NE list.

Customizing Content Display on the Topology Graph


You can select the contents you want to display on the topology graph. For example, the
notification message is displayed only when you select the Enable Message Notification
check box.
1. Click the button.

2-29

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l If the topology information is listed in the table, the Customize Display Columns
dialog box is displayed.
l If the topology information is displayed on the topology graph, the Configure
Display Content dialog box is displayed.
2. Select the contents you want to display.
3. Click OK.

Displaying or Hiding the Pane of Filter, Legend, and Display Overview


This procedure describes how to hide or show the pane of filter, legend, and display
overview on the right of the Topology Management window.

In the Topology window, click in the toolbar. The Legend tab is displayed in the right
pane.
l Click Filter below the Legend tab. The Filter dialog box is displayed.
l Click Configuration Display Content below the Legend tab. The Configure Display
Content dialog box is displayed. You can customize the contents to be displayed in
the Topology Management window.

2.7.3 Display Filter Settings


2.7.3.1 Setting Topology Nodes on Filter Tree
This procedure describes how to set filtering conditions on the topological filter tree to get
the desired topology view.

Prerequisite
The legend page is displayed in the topology management view.

Steps
1. In the right pane of the Topology Management window, click the Filter link. The Filter
dialog box is displayed.
The Filter dialog box has two sub-pages, of which the Filter Tree is displayed by
default.

Note:

If the pane of Filter, Legend and Display Overview is not displayed in the Topology
Management window, click the button to show the pane on the right.

2. Expand the resource tree to view detailed nodes.

2-30

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

3. Select the check box before the nodes you want to display. The checked nodes are
displayed on the topology graph.
4. Click OK. The selected NEs are displayed on the topology graph.
– End of Steps –

2.7.3.2 Setting Topology Nodes by Using Condition Filter


If the topology graph is complex or that the user only needs necessary information, using
the condition filter can remove some information. Set filtering conditions on the Condition
Filter page to get required topological view.

Prerequisite
The legend page is displayed in the topology management view.

Steps
1. In the right pane of the Topology Management window, click the Filter link. The Filter
dialog box is displayed.

Note:
If the pane of Filter, Legend and Display Overview is not displayed in the Topology
Management window, click the button to show the pane on the right.

2. Click the Condition Filter optional button in the Filter dialog box.
3. Select a filtering method.
l Or: The NEs or Groups meeting one of the conditions will be displayed after
filtering.
l And: Only the NEs or Groups meeting both conditions will be displayed after
filtering.
4. Enter the filter condition in the NE(Group) Name and IP address text boxes.

5. Enter the link name in the Link Name text box.

2-31

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
You can also use the following wild cards: "?" represents one character, while "*"
represents two characters.
Use ";" to separate more than one IP addresses. You can enter three types of IP
address:
l A single IP address, for example, 1.2.3.4.
l An IP address range from a smaller address to a larger one connected with "-",
for example, 10.197.0.0-10.197.255.255.
l IP address with "*" used at head or end to substitute for multiple characters, for
example, *.10.10.10 and 10.197.10.*.

6. Click the OK button to display the nodes that meet the filter conditions on the topology
graph.
– End of Steps –

2.7.4 Configuring a Map


You can import a map to the current topology graph to manage NEs on the map.

Context
l The system provides a default map as the background of the topology graph.
l The imported map file should be less than 1 MB, and in .gif or .jpg format.

Steps
1. Right-click the blank of the topology graph, and select Configure Map from the
shortcut menu. The Configure Map dialog box is displayed.

2. Click the Import... button in the File Setting group box to select a map file.

To... Do...

Import a specific map i. Click the Import... button.

ii. Select a map file in the displayed dialog box.

iii. Click Open.

Import a default map Click Default.

3. Set the horizontal and vertical coordinates in the Map Range group box.

2-32

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Note:
You can only set the range for the imported map.

Parameter Description Value Range

Horizontal coordinate Horizontal coordinate of the [-180, 180]


map range

Vertical coordinate Vertical coordinate of the map [-90, 90]


range

4. Click OK to save the settings. The imported map will be displayed as the background
of the topology graph.
– End of Steps –

2.8 Virtual NE Operations


Virtual NE refers to an NE that is not physically connected to the U31 R22 system. The
topology view can display a global network through virtual NEs. You can create, delete,
modify, and display the topology attributes of a virtual NE.

2.8.1 Creating a Virtual NE


You can create a virtual NE of a certain type as required on the topology graph. The
parameters include father node, NE node, location description, and IP address.

Steps
1. Right-click any blank area in the Topology Management window, and select Create
Object > Virtual NE from the shortcut menu. The Create Virtual NE dialog box is
displayed.
2. Set the parameters in the Create Virtual NE dialog box.

Parameter Description

Parent Node By default, it is the parent node you selected from the shortcut menu. You can
select another parent node by clicking Select.

Name Name of the virtual NE.

Location Location information of the virtual NE.


Description

IP Address IP address of the Virtual NE.

Description Optional parameter.

2-33

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Description

Successively l To select the check box: After a virtual NE is created, the Create Virtual
Create NE dialog box is automatically displayed, and you can continue to create a
more virtual NE.
l To clear the check box: After a virtual NE is created, the Create Virtual NE
dialog box is not displayed.

3. Click OK.
The virtual NE is created successfully, and displayed in the NE tree and topology view.
– End of Steps –

2.8.2 Modifying the Attributes of a Virtual NE


This procedure describes how to modify the attributes of a virtual NE, such as the name,
location description, and IP address as needed.

Prerequisite
The virtual NE is created.

Steps
1. In the NE tree or on the topology graph, right-click the virtual NE to be modified, and
select Topology Management > Modify Virtual NE from the shortcut menu. The
Modify Virtual NE dialog box is displayed.
2. Modify the corresponding attributes.
3. Click OK.
– End of Steps –

2.8.3 Deleting a Virtual NE


This procedure describes how to delete a virtual NE.

Prerequisite
The virtual NE is created.

Steps
1. In the NE tree or on the topology graph, right-click a virtual NE, and select Topology
Management > Delete Virtual NE from the shortcut menu. The Confirm message
box is displayed.
2. Click Yes.
– End of Steps –

2-34

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

2.8.4 Viewing a Virtual NE Attributes


This procedure describes how to view the attributes of a virtual NE, including the parent
node, name, location description, and IP address.

Prerequisite
The virtual NE is created.

Steps
1. In the NE tree or on the topology graph, right-click a virtual NE, and select Topology
Management > View Virtual NE from the shortcut menu. The View Virtual NE dialog
box is displayed.

Note:

To view the virtual NE attributes, you can also display the topology information in table.

– End of Steps –

2.9 Virtual Link Operations


Virtual link refers to a virtual topology connection between NEs. You can create, delete,
modify, and display the topology attributes of a virtual link.

2.9.1 Creating a Virtual Link


This procedure describes how to create a virtual link. You need to set the link name, link
direction, source and target nodes, and description of a new virtual link.

Steps
1. Use any of the following methods to display the Create Virtual Link dialog box.
l Right-click the blank area in the Topology Management window, and then select
Create Object > Virtual Link from the shortcut menu. The Create Virtual Link
dialog box is displayed.
l Use the mouse pointer to select a rectangle covering two NEs in the topology.
Right-click either of the two NEs. Select Create Object > Virtual Link.
l Select an NE from the NE Tree or in the topology. Press Ctrl or Shift without
releasing the key, and select anther NE. Release the key and then right-click either
of the two NEs. Select Create Object > Virtual Link.

2-35

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
You can also open the Create Virtual Link dialog box in one of the following ways.
l Press the left mouse button and draw a rectangle on the topology graph to select
two NEs. Then right-click either NE, and select Create Virtual Link from the
shortcut menu.
l On the NE tree or the topology graph, click to select one NE, and press Ctrl (or
Shift) while clicking to select another NE. Next, right-click either NE, and select
Create Virtual Link from the shortcut menu.

2. Set the parameters referring to the following table.

Parameter Description

Name The name of the virtual link, used for search.

Link The options are: Send, Receive, Both, and None.


Direction

Source Starting NE of the virtual link. Click Source. Select a Node from the Select
Node Node dialog box.

Source Port The starting port of the link.

Target Ending NE of the virtual link. Click Target. Select a Node from the Select Node
Node dialog box.

Target Port The ending port of the link.

Description Description of the link.

Succes- l To select the check box: After a virtual link is created, the Create Virtual
sively Cre- Link dialog box is automatically displayed, and you can continue to create a
ate more virtual link.
l To clear the check box: After a virtual NE is created, the Create Virtual Link
dialog box is not displayed.

3. Click OK.
– End of Steps –

2.9.2 Modifying the Attributes of a Virtual Link


This procedure describes how to modify the attributes of a virtual link. The link name and
link direction can be modified.

Prerequisite
The virtual link is created.

2-36

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Steps
1. In the NE tree or on the topology graph, right-click the virtual link to be modified, and
select Topology Management > Modify Virtual Link from the shortcut menu. The
Modify Virtual Link dialog box is displayed.
2. Modify the corresponding attributes.
3. Click OK.
– End of Steps –

2.9.3 Deleting a Virtual Link


This procedure describes how to delete a virtual link if the virtual link is not required.

Prerequisite
The virtual link is created.

Steps
1. In the NE tree or on the topology graph, right-click a virtual NE, and select Topology
Management > Delete Virtual Link from the shortcut menu. The Confirm message
box is displayed.
2. Click Yes.
– End of Steps –

2.9.4 Viewing a Virtual Link Attributes


This procedure describes how to view the attributes of a virtual NE, including the link name,
link direction, source and target nodes, and description.

Prerequisite
The virtual link is created.

Steps
1. On the NE tree or the topology graph, right-click a virtual NE, and select Topology
Management > View Virtual Link from the shortcut menu. The View Virtual Link
dialog box is displayed.

Note:
To view the virtual link attributes, you can also display the topology information in table.

– End of Steps –

2-37

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2.10 Group Management Operations


The U31 R22 system groups the managed NEs to facilitate resource management. The
NEs can be divided in accordance with type and location.

2.10.1 Creating a Common Group


In the Topology Management window, NEs can be divided into logical groups. This
grouping process does not depend on the actual physical connections between the NEs.

Prerequisite
You have the user permissions of "Maintenance Role" or above.

Steps
1. Right-click a blank area in the Topology Management window, and select Create
Object > Common Group. The Create Common Group dialog box is displayed.

2. Set the attributes of the common group referring to the following table.

Parameter Description

Parent Node Click Select and select a node (other group or NE) where you want to create
a group.

Name Enter the group ID. Common groups under one parent node cannot have the
same name.

Description Enter the supplementary information.

Rule Type No Rule No rule is required.

IP Address Enter the IP address manually.


Rule If Not Equals is selected, the entered IP rule is excluded.

Location Enter the location manually.


Rule l If Not Equals is selected, the entered location is excluded.
l If Ignore Case is selected, the entered location is not case
sensitive.

Device Type Select Select Device Type or Input Device Type.


Rule l If Not Equals is selected, the entered device type is
excluded.
l If Ignore Case is selected, the entered device type is not
case sensitive.

2-38

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Note:
If the Successively Create check box is selected, after a common group is created,
the Create Common Group dialog box is displayed automatically to create another
common group.

3. Click OK.
– End of Steps –

Result
In the left NE Tree in the Topology Management window, the new group is displayed
under the selected parent node.

2.10.2 Creating a Type Group


Creation of type groups is based on equipment type. You can either create a single group,
or create multiple groups in batches.

Prerequisite
You have the user permissions of "Maintenance Role" or above.

Context
The type groups cannot have the same name under the same parent node.

Steps
1. Right-click a blank area in the Topology Management window, and select Create
Object > Type Group from the menu. The Create Type Group dialog box is displayed.

2. Click the Select... button. The Select Node dialog box is displayed.
3. Select the parent node of the new group, and then click OK.

Note:
The parent node here can be other groups or NEs.

4. Perform the following operation as required.

2-39

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To... Do...

Create a batch of
i. Click the Create a Batch of Groups tab.
groups
ii. Select all the device types to be grouped.

iii. Click OK to create the groups in batches.

Groups of all selected device types are created and all groups are located
under the selected parent node.

Create a single
i. Click the Create a single group tab
group
ii. Enter the group name and group description.

iii. Select a rule type.

The writing specifications vary with rule types, and you should enter the rule
based on a message.

The rules for the type groups include No Rule, IP Address Rule, Location
Rule, and Device Type Rule. All writing specifications are given in the bottom
of the dialog box.

iv. Click OK.

The new single group is displayed under the selected parent node.

– End of Steps –

2.10.3 Creating a Location Group


This procedure describes how to create a location group. The parent node, group name,
description, and rule type of a location group needs to be set.

Prerequisite
You have the user permissions of "Maintenance Role" or above.

Steps
1. Right-click a blank area in the Topology Management window, and select Create
Object > Location Group from the menu. The Create Location Group dialog box is
displayed.

2. Click Select.... The Select Node dialog box is displayed.


3. Select the parent node of the new group, and then click OK.

2-40

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

Note:
The parent node here can be other groups or NEs.

4. Enter the group name and group description.


5. Enter the self-defined rules in Rule Type.

Note:
l The writing specifications vary with rule types, and you should enter the rule based
on the message.
l The rules for the location groups include No Rule/IP Address Rule/Location
Rule/Device Type Rule. All writing specifications are given in the bottom of the
dialog box.
l If Successively Create is selected, the Create Location Group dialog box is
automatically displayed after a location group is created, and you can continue to
create a more location group.

6. Click OK.
The new location group is displayed under the selected parent node.
– End of Steps –

2.10.4 Setting Members


You can allocate members for an NE or a group as sub-nodes of the NE or group.

Prerequisite
You have the user permissions of "Maintenance Role" or above.

Steps
1. In the Topology Management window, select an NE or a group in the object tree in
the left pane.
2. Right-click an NE or a group, and select Topology Management > Set Member from
the shortcut menu. The Set Member dialog box is displayed.

3. Perform the following operation as required.

2-41

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To... Do...

Add a member
Only an NE but not a group can be added as a member.

i. Select an NE from the Available Items pane, and click to move the
selected NE to the Selected Items pane.

ii. Click OK. The added member is displayed in the group.

Delete a
member i. Select an NE from the Selected Items pane, and click to move the selected
NE to the Available Items pane.

ii. Click OK. The member is not listed in the group.

– End of Steps –

2.10.5 Deleting a Group


You can delete groups as required. This procedure describes how to delete a type group,
and other groups can also be deleted in the similar way.

Prerequisite
The group is created.

Context
This section takes deleting a type group as an example. Other groups can also be deleted
in the similar way.

Steps
1. In the NE tree or on the topology graph, right-click a group, and select Topology
Management > Delete Type Group from the shortcut menu. The Confirm message
box is displayed.

Note:
The shortcut menus vary with the types of objects.

2. Click OK to delete the selected group.

– End of Steps –

2-42

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 2 Topology Management

2.10.6 Viewing Attributes of a Group


This procedure describes how to view the topology attributes of a type group, including the
parent node and group name. Other groups can also be viewed in the similar way.

Prerequisite
The group is created.

Context
This section takes viewing a type group as an example. Other groups can also be viewed
in the similar way.

Steps
1. In the NE tree or on the topology graph, right-click a group, and select Topology
Management > View Type Group. The View Group dialog box is displayed.

Note:
The shortcut menus vary with the types of objects.
To view the group attributes, you can also display the topology information in table.
For this operation, see "Showing the Topology Information in Table" in the chapter
"Operations on Topology Graph".

– End of Steps –

2-43

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

This page intentionally left blank.

2-44

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3
Alarm Management
Table of Contents
Overview ....................................................................................................................3-1
Preference Settings....................................................................................................3-7
Synchronizing NE Alarms.........................................................................................3-28
Alarm Query .............................................................................................................3-30
Alarm Information Query .........................................................................................3-42
Handling Alarm ........................................................................................................3-46
Alarm Forwarding .....................................................................................................3-51
Alarm Rule Management..........................................................................................3-52
Fault Handling Settings ............................................................................................3-58
Alarm Statistics ........................................................................................................3-61
Alarm and Notification Monitoring .............................................................................3-67
Alarm Task Management..........................................................................................3-70

3.1 Overview
Alarm information is displayed if a fault or prompt message occurs during system
operation. The fault management module monitors the operational status of the U31
R22 system in a centralized manner, and collects real-time alarms and notifications of
boards, databases, and the server. If a fault occurs, the module immediately displays
the accurate fault information to help the administrator locate and troubleshoot the fault
for stable operation of the system.

3.1.1 Fault Management Terms


The fault management module provides a maintenance tool for monitoring the operational
status of the U31 R22 system and collecting real-time alarms and notifications of boards,
databases, and the server.

If a fault occurs, the module immediately displays the accurate fault information to help
the administrator locate and troubleshoot the fault for stable operation of the system.
In addition, the module also provides accurate, timely, and necessary alarm data for
operators, network management departments, and vendors.

Alarm
An alarm is a prompt message indicating faults that occur during the system operation and
have negative effects on the system service and reliability.

3-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

This kind of faults may impact the proper system operation. Therefore, once it occurs, the
user must immediately find out the cause and troubleshoot it.

Notification
Notification is reported when a fault or event that cannot be recovered occurs in the
network, such as the restart of a board and the fake power failure of a board.
Such faults or events are generally caused by some occasional factors, such as the sudden
change of the environment. Therefore, no special handling is required for notifications.
However, if a notification is displayed frequently, it is required to find out the cause and
troubleshoot it.

Active alarm
An active alarm indicates the occurrence of a fault that has not been removed yet.

History Alarm
A history alarm indicates the occurrence of a fault that has already been removed.

Visible and Invisible Alarms


After the alarm filtering rule becomes effective, some alarms become invisible alarms (such
as the queried alarms after alarm filtering), and other alarms are visible alarms.

Alarm Clearing
A notification that an alarm has been cleared is reported after the corresponding fault is
successfully removed.

Alarm Shielding
The alarms are not reported to the NMS server in accordance with customized conditions.

Alarm Code
An alarm code is a unique sequence number used to identify an alarm for fault
management.

3.1.2 Main Interface of Fault Management View


On the menu bar of U31 R22 main interface, select Fault > Alarm Monitoring. The Fault
Management view is displayed.

3-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Figure 3-1 Fault Management View User Interface

1. Main menu 3. Management tree, NE tree, 4. Status bar


2. Toolbar and statistic tree 5. Alarm information pane

Main Menu
Main menu provides menus for configuring system attributes, including topology
management, fault management, performance management, and help.

Toolbar
Toolbar provides buttons for carrying out common sub-functions of each module. Fault
management module contains the following buttons:

Module Button Description

Alarm Alarm Monitoring

Query Active Alarms

Query History Alarms

Management tree, NE tree, and Statistic tree


The Management tree, NE tree and Statistic tree are shown in Figure 3-2, Figure 3-3, and
Figure 3-4 respectively.

3-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Figure 3-2 Management Tree

Management tree organizes all the fault management functions in the form of a tree. The
nodes under the tree root indicate corresponding functions. The user can perform alarm
query operations and related settings easily by using Management tree.

Figure 3-3 NE Tree

NE Tree organizes NEs in the form of a tree. The nodes under the tree root indicate
different functional units of the NEs. Adjacent nodes under the tree are in parallel or
hierarchical relationship. NE tree demonstrates the real physical relationships among the
functional units of each managed NE.

3-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Figure 3-4 Statistic Tree

Statistic tree organizes statistic methods in the form of a tree.

Alarm Information Pane


Alarm Information Pane is the main area of fault management, which displays the
information of various alarms and notifications as requested by the user.

Status Bar
The status bar shows the information of the current login user and the server.

3.1.3 Alarm Classification


By Alarm Types
l Communication alarm
l Equipment alarm
l Integrity alarm
l Security violation
l Processing error alarm
l Environmental alarm
l Operational alarm
l Time domain alarm
l Quality of service alarm
l NMC alarm
l Physical violation

By Data Types
l Common alarm
l Status event
l Common event
l Network Management alarm
l Network Management event

3-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l Threshold alarm
l Pre–warning alarm
l Switch event

By Alarm Severity Level


l Critical
l Major
l Minor
l Warning

By Acknowledged Status
l Acknowledged
l Unacknowledged

3.1.4 Alarm Severity and Troubleshooting


Alarm messages fall into four levels according their severities: critical, major, minor and
warning.

When an alarm occurs, solve the problem in accordance with this manual. If the problem
persists, inform the local ZTE office.

3.1.5 Alarm Handling Flow and Suggestion


Description
Alarm messages are prompt messages when the system encounters problems or faults.
Alarms exist and will only disappear when all corresponding problems or faults have
been removed. If you do not handle the fault in time, serious consequences might occur.
Therefore, you must clear the faults in time.

Flow
General flow of removing alarms is described as follows.

1. Identify the alarm code, severity level, description, and components involved.
2. Analyze the causes of alarms and the effects on the system.
3. Perform appropriate handling measures to troubleshoot the alarms based on the
information gathered in steps 1 and 2.
4. Check the result of the handling operation.

3-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

3.2 Preference Settings


3.2.1 Setting the Name of the Alarm Level
Names of alarm levels are configured in NetNumen U31 Unified Network Management
System-Configuration Center. The default names of alarm severity levels are Critical,
Major, Warning, and Minor. You can change them as required.

Steps
1. On the U31 R22 server, select Start > Program > NetNumen U31 Unified Network
Management System > U31 Config Center. The NetNumen U31 Unified Network
Management System-Configuration Center window is displayed.
2. In the left navigation tree, select Common Configuration > Common Property.
3. On the server tab on the right, select Server > Global Configuration > Alarm.
4. Select Fault Management: The severity name of major alarm, and then enter the
name in Value of config.
5. Repeat step 4 to set the name of another alarm severity level.
6. Click the Save button, and then click the OK button in the displayed dialog box.
– End of Steps –

3.2.2 Setting the Default Sorting Mode of the Alarm Table


The default sorting mode of the current alarm table is configured in NetNumen U31
Unified Network Management System-Configuration Center. The U31 R22 supports
two sorting modes, including time of alarm occurrence and the default system policy.

Steps
1. On the U31 R22 server, select Start > Program > NetNumen(TM) U31 Unified
Network Management System > U31 Config Center. The NetNumen U31 Unified
Network Management System-Configuration Center window is displayed.
2. In the left navigation tree, select Common Configuration > Common Property.

3. On the server tab on the right, select Server > Global Configuration > Alarm.
4. Select To select the default sort mode for the alarm tables, and then select the sort
mode in Value of config.
l 1: sort by the time of alarm occurrence.
l 0: sort by the default system policy.

5. Click the Save button, and then click the OK button in the displayed dialog box.
– End of Steps –

3-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3.2.3 Setting Alarm Colors and Sounds


If alarms are generated, the alarms of different levels can be prompted through different
colors and sounds. A user can set the different colors and sounds for the alarms of different
levels as required.

Prerequisite
Sound files required already exist. The .aif, .au, .mid, and .wav formats are supported.

Context
You can set alarm colors and sounds through the following operation. To set whether
flashing and sound are required when the alarm occurs, refer to "Setting the Alarm Flash
and Sound". To set the range in which the alarm prompt takes effect, refer to "Setting the
Alarm Prompt".

Steps
1. From the main menu, select System > Preference. The Preference dialog box is
displayed.
2. In the Preference navigation tree on the left, select Fault > Alarm Sound and Color.
The Sound Setting and Color Setting tabs are displayed on the right.
3. Set alarm sounds.
a. On the Sound Setting tab, click Choose... to select different sound files for alarms
of different alarm levels.
b. Click Play to play the selected sound file.

Note:
To set the alarm sound to mute, select Mute after the corresponding alarm level.

c. In the Sound Model area, select Sound According to the Highest Severity of
Unacknowledged Alarms or Sound When Alarm Messages Are Received.
d. (Optional) To set the sound when the alarm is cleared, select Sound When
Alarms Are Restored.
e. (Optional) To recover the default alarm sound setting, click Restore Default
Sound.
4. Set alarm colors.
a. Click the Color Setting tab.
b. Click the drop-down lists next to the different alarm levels, and then select the
different alarm colors.

3-8

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

5. Click OK.
6. (Optional) To recover the default alarm colors, click Restore Default Color.
– End of Steps –

3.2.4 Setting the Alarm Flash and Sound


The number of acknowledged alarms of each level and the number of unacknowledged
alarms are displayed in different colors in the alarm panel at the top right of the network
management client terminal, see Figure 3-5. A user can set whether the alarm panel
flashes or makes a sound when an alarm is generated.

Figure 3-5 Alarm Panel

Prerequisite
The user has the operation authority of alarm management.

Steps
1. From the main menu, select Fault > Alarm Panel. The Alarm Panel dialog box is
displayed, see Figure 3-6.

Figure 3-6 Alarm Panel Dialog Box

2. Click Flash to set whether the alarm panel flashes when an alarm is generated.
l : It indicates that the alarm panel flashes when an alarm is
generated.
l : It indicates that the alarm panel does not flash when an alarm is
generated.
3. Click Sound to set whether the alarm panel makes a sound when an alarm is
generated.
l : It indicates that the alarm panel makes a sound when an alarm is
generated.

3-9

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l : It indicates that the alarm panel does not make a sound when an
alarm is generated.
4. Click to close the Alarm Panel dialog box.
– End of Steps –

3.2.5 Setting the Alarm Prompt


A user can set alarm prompts for important alarms through the following operations. When
these alarms are generated or the states are changed, the system will give a prompt
through the displayed dialog box or sound.

Prerequisite
You have the operation permission of alarm management.

Steps
1. From the main menu, select Fault > Setting > Alarm Prompting Setting. The Alarm
Prompting Setting window is displayed.
BN-xTN EMS Alarm Prompt Default Rule is displayed in the Alarm Prompting
Setting window.
2. (Optional) Check the EMS alarm prompting default rule.
a. Double-click BN-xTN EMS Alarm Prompt Default Rule. The Alarm Prompting
Setting dialog box is displayed.
b. Click the Alarm Code tab in Condition, and check the prompting rule of the EMS
default alarm code.

c. Click OK.

3. Click . The Alarm Prompting Setting dialog box is displayed.


4. Click the Basic tab. To set alarm prompting parameters, refer to Table 3-1.

Table 3-1 Descriptions for Parameters in the Basic Tab

Parameter Description

Name Enter the name of the alarm prompt.

Description Enter the description information of the alarm prompting information.

Rule status Select the state after the alarm prompt is created.
l Activated: This alarm prompt takes effect immediately.
l Suspended: This alarm prompt does not take effect immediately until
this alarm is activated manually.

3-10

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Parameter Description

Notify Method Select the mode of the alarm prompt.


l Notify by Dialog: If the alarm is generated or the state is changed, the
dialog box pops up for prompt.
l Notify by Sound: If the alarm is generated or the state is changed, the
sound is played for prompt. After selecting this option, the user must
set in the Sound Setup.

Note:
After Notify by Sound is selected, if the alarm meeting the condition is generated,
only the specified sound is played for prompt. The system will not play the sound.

5. Click the Condition tab. Set the alarm information such as locations and alarm types.
a. Click the Location tab, and then select NEs on which alarms are generated. When
alarms are generated on the specified NEs, the system will give prompts.
l From the NE Type list, select an NE type.
l Perform one of the following operations as required.

To... Do...

Display alarm prompts for Click the All NEs option button.
all NEs

Display alarm prompts for Click the Specific NEs option button. Select the NEs to
specified NEs
be set, and then click or to move the selected
NEs to the right list. Prompts will be displayed only for
alarms generated on the NEs selected.

b. Click the Alarm Code tab, and then select the alarms. If the alarm selected is
generated on the NE selected, the system gives a prompt.
l All Codes: When All Codes is generated, if any alarm is generated on the
NE, the system gives a prompt.
l Specific Codes: After selecting Specific Codes, select the alarms, and then

click to move the selected alarm codes into the area selected. Only the
selected alarm is generated on the NE, the system gives a prompt.

c. Click the Others tab, and then select the alarm type, data type, alarm level,
acknowledge status, NE IP, and additional text.

6. Click OK.

– End of Steps –

3-11

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3.2.6 Setting Intermittent Alarms


This procedure describes how to set intermittent alarms. The purpose of setting
intermittent alarms is to reduce frequent alarm reporting within a short period and reduce
pressures on the U31 R22.

Prerequisite
You have the operation permission of alarm management.

Context
If the number of times that the same alarm occurs reaches a threshold in a specified time,
these alarms are called intermittent alarms.
Intermittent alarms are integrated to a root alarm which has the highest alarm level among
all correlated alarms. Only this root alarm is displayed on the U31 R22. You can view all
the correlated alarms through this root alarm.

Steps
1. In the operation window of the U31 R22, select Fault > Setting > Intermittent Alarm
Setting. The Intermittent Alarm Setting window is displayed, see Figure 3-7.

Figure 3-7 Intermittent Alarm Setting Window

2. Click the button on the toolbar. The Intermittent Alarm Setting dialog box is
displayed, see Figure 3-8.

3-12

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Figure 3-8 Intermittent Alarm Setting Dialog Box

3. Set intermittent alarms. For a description of the parameters, refer to Table 3-2.

Table 3-2 Parameter Descriptions for Intermittent Alarm Setting

Parameter Description

Name Customized intermittent alarm name.

Description Description about the intermittent alarm.

State Options: Activated and Suspended.


The intermittent alarm takes effect only if the Activated option
is selected.

Condition Set the conditions for determining intermittent alarms. By default,


if the number of times that the same alarm occurs within one
minute exceeds 5, these alarms are called intermittent alarms.

Discard the correlated If this check box is selected, the correlated alarms are discarded.
alarms cleared during the If intermittent alarms are integrated to a root alarm, other
intermittence correlated alarms are displayed on the U31 R22. You can delete
these correlated alarms from the NMS database as required.

4. (Optional) Set the alarms to be processed.

3-13

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

a. Click the Set alarms to be processed button. The Set alarms to be processed
dialog box is displayed.
b. On the Location tab, select the NE type to be queried.
By default, all NE types are selected.
c. On the Alarm Code tab, select the alarm code to be queried.
By default, all alarm codes are selected.
d. On the Others tab, set Raised Time, Alarm Type, Severity, NE IP, and
Remark(Fuzzy Match) of the intermittent alarms.
e. Click OK to return to the Intermittent Alarm Setting dialog box.
5. Click OK.
6. (Optional) View correlated alarms through the root alarm displayed on the U31 R22.
a. In the operation window of the U31 R22, select Fault > Alarm Monitoring. The
Alarm Monitoring window is displayed, see Figure 3-9.
In the Root Alarm Indicator column, the alarms marked with + and Root Alarm
are root alarms.

Figure 3-9 Alarm Monitoring Window

b. Select a root alarm, and click the + icon. The Roort-Correlated Alarm
Relationship Tree dialog box is displayed.

The correlated alarms of this root alarm are displayed in the dialog box.
c. Select the Display All Alarms check box to view all the deleted correlated alarms.

– End of Steps –

3-14

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Related Tasks
l Refreshing Intermittent Alarms

On the toolbar of the Intermittent Alarm Setting window, click the button.
l Modifying Intermittent Alarms
In the Intermittent Alarm Setting window, use either of the following methods to
modify intermittent alarms:

à Select an intermittent alarm configuration item, and click the button on the
toolbar.
à Right-click an intermittent alarm configuration item, and select Modify from the
shortcut menu.
l Suspending Intermittent Alarms

Note:
Intermittent alarms can be suspended only if the status of intermittent alarms is set to
Activated.

In the Intermittent Alarm Setting window, use either of the following methods to
suspend intermittent alarms:
à Select an intermittent alarm configuration item, and click the button on the
toolbar.

à Right-click an intermittent alarm configuration item, and select Suspend from the
shortcut menu.
l Activating Intermittent Alarms

Note:
Intermittent alarms can be activated only if the status of intermittent alarms is set to
Suspended.

In the Intermittent Alarm Setting window, use either of the following methods to
activate intermittent alarms:
à Select an intermittent alarm configuration item, and click the button on the
toolbar.

à Right-click an intermittent alarm configuration item, and select Activate from the
shortcut menu.

3-15

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l Deleting Intermittent Alarms

Note:
Intermittent alarms can be deleted only if the status of intermittent alarms is set to
Suspended.

In the Intermittent Alarm Setting window, use either of the following methods to
delete intermittent alarms:

à Select an intermittent alarm configuration item, and click the button on the
toolbar.

à Right-click an intermittent alarm configuration item, and select Delete from the
shortcut menu.

3.2.7 Redefining Alarm Codes


This procedure describes how to redefine alarm code names for easy identification or
query.

Steps
1. From the main menu, select Fault > Setting > Alarm Code Description Setting. The
Alarm Code Description Setting window is displayed.
2. From the Code Group list, select a resource type, and click OK. The alarm codes of
the selected resource type are displayed in the list.
3. Perform one of the following operations to open the User Defined Alarm Code Setup
dialog box.
l Double-click the alarm you want to redefine.
l Click the alarm to be redefined, and click the button.
l Right-click the alarm code to be redefined, and select Modify from the shortcut
menu.
4. Enter the new code name.

5. Click Apply to finish modification.

– End of Steps –

3.2.8 Setting Tandem Mode for External Alarms


This procedure describes how to set alarm tandem mode for outputting the board alarm
signals of this NE to another NE.

3-16

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Context
l Tandem: The alarm signal output port of the NE is cascaded to that of another NE to
output the alarm signals of the NE. If the cascading mode is used, cascading cables
should be installed.
l Non tandem: The signal ports between NEs are not cascaded.

Steps
1. In the Topology Management window, right-click an NE, and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the NE Operation navigation tree, select Alarm Configuration > External Alarm
Tandem Configuration. The External Alarm Tandem Configuration area is
displayed.
3. In the Tandem Mode column, select a board tandem mode as required.
4. Click the Apply button, and click OK in a displayed message box.
– End of Steps –

3.2.9 Redefining Alarm levels


The default alarm level of each alarm is set when the system is initialized. Users can adjust
alarm levels as required to monitor important alarm events.
After alarm levels are redefined, the new alarm levels do not work on existing alarms. They
only apply to new alarms generated after modification.

Prerequisite
The user has the operation authority of alarm management.

Steps
1. From the main menu, select Fault > Setting > Severity Regarding Setting. The
Severity Regarding Setting window is displayed.
2. In the Code Group list, select a group. The alarms belonging to this group will be
automatically listed in the Severity Regarding Setting window.
3. (Optional) Add resources for an alarm code.
a. Right-click an alarm code. Select New. In the displayed dialog box, select the
resources (NE or NE types) that you want to add.
b. Click OK. The Severity Regarding Setting window is displayed. You can view
the newly added resources under the alarm code.
4. Click the alarm entry whose alarm level is to be redefined. In the Custom Severity
list box, select the target alarm level.
After the target alarm level is selected, the red exclamation mark is displayed in Modify
Flag, see Figure 3-10.

3-17

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Figure 3-10 Severity Regarding Setting Window

5. Click on the toolbar to save the modification.


– End of Steps –

3.2.10 Configuring NE Alarm Mask


You can mask particular alarms on the NE to focus on important alarm events. The masked
alarms are not monitored any more.

Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration >
Alarm Mask Configuration. The Alarm Mask Configuration area is displayed.
3. On the Mask By Resource tab, expand all alarms contained by the boards configured
in the NE to set the Mask Status for alarms.
l Select Mask Status: The alarm is masked.
l Clear Mask Status: The alarm is not masked.
4. Click Apply. A message box is displayed.
5. Click OK.
The alarms whose Mask Status is selected will not be detected. The blocked alarms
will not be displayed in the current alarm window and not be counted in the alarm
board.
– End of Steps –

3.2.11 Setting Board Alarm Mask


The masked board alarms are not reported to the main control board of the NE or to the
NMS.

Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the Customized Resource tree in the left pane, select a board.

3-18

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

3. In the navigation tree in the left pane, select Board Operation > Alarm Configuration
> Alarm Mask Configuration. The Alarm Mask Configuration area is displayed.
4. On the Mask By Resource tab, expand all alarms contained by the board to set the
Mask Status for alarms.
l Select Mask Status: The alarm is masked.
l Clear Mask Status: The alarm is not masked.
5. Click Apply. A message box is displayed.
6. Click OK.
The alarms whose Mask Status is selected will not be reported to the main control
board of the NE or to the NMS. The blocked alarms will not be displayed in the current
alarm window and not be counted in the alarm board.
– End of Steps –

3.2.12 Configuring Alarm Preload


Alarm preload allows you to mask unconcerned alarms. It includes Auto Recover
Preload, Reverse Preload, and Non Preload modes.

Context
Alarm preload is only applicable to the LOS alarm. For three modes of alarm preload, refer
to table below.

Table 3-3 Descriptions for Three Modes of Alarm Preload

Preload Mode Reporting Mode Description

Reverse The alarm status of the alarm source is You can set unused ports to Reverse
Preload the opposite of the actual alarm. Preload. When these ports are used
again, you can set them to Auto
Recover Preload or Non Preload.

Non Preload The alarm state of the alarm source is -


consistent with the actual alarm state.

Auto Recover The alarm state of the port without l When there is an LOS alarm, the
Preload service loaded is not reported to the "loss of input signal" alarm is not
EMS. After service is loaded on the port, generated.
the alarm state will be reported to the l After the LOS alarm is removed, the
system. port recovers to normal state and
alarm preload can be cleared.

For example, when no service is loaded on the port of a service board, the "loss of input
signal" alarm is generated for the port.
1. The alarm of the port is set to reverse preload mode, and the alarm is removed.
2. Service is loaded to the port, and the port generates an alarm. The alarms of the port
on the EMS and NE are inconsistent.

3-19

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3. The alarm of the port is set to non preload mode, and the alarm is removed. The
alarms on the EMS and NE are consistent.

Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. Perform one of the following operations to open the Alarm Preload Configuration
window.
l In the NE Operation navigation tree in the left pane, select Alarm Configuration
> Alarm Preload Configuration.
l In the Topology Management window, double-click an NE, right-click a board
in the Rack Chart window, and select Alarm Preload Configuration from the
shortcut menu.
l In the Customized Resource navigation tree in the NE Management window,
select a board, and select Alarm Configuration > Alarm Preload Configuration
from the Board Operation navigation tree.
3. Select a board from the Select Board list.
4. Set the Alarm Preload mode for the port: Auto Recover Preload, Reverse Preload,
or None Preload.
You can set alarm preload in batches, that is, you can select multiple ports, and then
right-click and select an alarm preload mode from the shortcut menu, see Figure 3-11.

Figure 3-11 Setting Alarm Preload in Batches

5. Click Apply. A message box is displayed.


6. Click OK.
– End of Steps –

3.2.13 Setting Alarm Severities


You can modify the severities of NE alarms as required, so as to focus on some important
alarm events.

Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.

3-20

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration
> Alarm Severity Configuration. The Alarm Severity Configuration area is
displayed.
The right pane displays the alarm events supported by the NE.
3. Perform one of the following operations to set the alarm severity:
l Select an alarm, and then click Alarm Severity to set its alarm severity to critical,
major, minor, or warning.
l Click Import to import an existed template.
l Select one or multiple alarms, and then right-click and select an alarm severity
from the shortcut menu.
4. Perform the following operations as required.

To... Do...

Apply the current alarm severity to


i. Click the Apply to... button. The Resource Selector
multiple NEs
dialog box is displayed.

ii. Select NEs from the Resource area.

iii. Click Add. The selected NEs are added to the


Selected Result area.

iv. Click OK.

Export the modified alarm severities to


i. Click the Export drop-down arrow, and select Save As
a template
Template from the submenu. The Save As Template
dialog box is displayed.

ii. Enter Template Name and Template Remark.

iii. Click OK.

5. Click Apply. A message box is displayed.

6. Click OK.
– End of Steps –

3.2.14 Configuring Specified Alarm Monitoring


If you must pay special attention to an alarm, you can configure the specified alarm
monitoring attribute. If this alarm is cleared, the specified alarm monitoring attribute will
be automatically cancelled.

Prerequisite
You have the operation right for alarm management.

3-21

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. In the operation window of the U31 R22, select Alarm > Alarm Monitoring. The
Alarm Monitoring window is displayed.
2. Right-click the desired alarm, to which you must pay special attention. Select
Specified Alarms Monitoring from the shortcut menu. The Specified Alarms
Monitoring window is displayed, see Figure 3-12.
In the U31, you can press Shift + Ctrl to concurrently select multiple alarms. In the
Specified Alarms Monitoring window, you can pay special attention to these alarms.

Figure 3-12 Specified Alarms Monitoring Window

The U31 provides the following operations:

l Click the button, select Export All Columns or Export Visible Columns,
and export the current alarms to a specified folder for saving purposes.
l Click the button to print the current alarms in paper.
l Click the button to update the current alarms in real-time and capture the latest
alarm information.
l Click the button. The Customize Display Columns dialog box is displayed.
You can customize the columns to be displayed as required.
– End of Steps –

3.2.15 Configuring ADMC Alarms


After an event is generated on the device, it is displayed as a historical rather than an active
alarm, such as MAC drifting and OSPF protocol event. If you must pay more attention to
certain events during the maintenance, you can convert it into an Auto Detected Manually
Cleared (ADMC) alarm. An ADMC alarm refers to an alarm that is automatically detected
but manually cleared.

3-22

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

When an event is converted into an ADMC alarm, it is displayed as an active alarm for ease
of query. The U31 allows you to configure automatic recovery rules for an ADMC alarm.
After an ADMC alarm is received for some time, you can configure it to be automatically
or manually cleared in the U31.

Prerequisite
You have the operation right for alarm management.

Steps
1. Select Fault > Setting > BN-xCTN Event Transforms to ADMC Alarm from the menu
bar. The BN-xCTN Event Transforms to ADMC Alarm dialog box is displayed, see
Figure 3-13.
The left Selectable Event pane allows you to query them as historical alarms. The
right ADMC Transformed Event pane allows you to query them as active alarms.

Figure 3-13 BN-xTN Event Transforms to ADMC Alarm Dialog Box

2. In the left Selectable event navigation tree, select the desired event, and then click

the button to convert it into an ADMC alarm.

3. Click the OK button. The procedure for configuring ADMC alarms is complete.
– End of Steps –

3.2.16 Setting NE Alarm Parameters


Setting Alarm Raise Ack Time and Alarm Clear Ack Time can prevent the jitter caused by
alarm generation and clearance, for example, destroying the stability of the system, and
reducing the system performance.

3-23

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Context
l Alarm Raise Ack Time: Indicates the time after which a generated alarm is regarded
as generated.
l Alarm Clear Ack Time: Indicates the time after which a cleared alarm is regarded as
cleared.

Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management dialog box is displayed.
2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration
> Alarm Parameter Configuration. The Alarm Parameter Configuration area is
displayed.
3. Set whether the UAS is used for alarm filtering from the UAS filtering type list.

4. Select a time value from the Alarm Raise Ack Time list.
5. Select a time value from the Alarm Clear Ack Time list.
6. Click Apply. A message box is displayed.
7. Click OK.
– End of Steps –

3.2.17 Setting External Alarm Monitoring


The U31 R22 can monitor external alarms of the NE in real time, that is, the environmental
alarms such as temperature/humidity of equipment room, door opening/closing, fire alarm,
ventilation, or cooling system. To realize this function, you need to set the correspondence
between the alarm monitoring line number and external alarms on the NE, as well as the
alarm mode.

Prerequisite
You have installed and configured the sensors used for reporting the environmental
alarms, such as temperature/humidity of equipment room, door opening/closing, fire
alarm, ventilation, or cooling system on the NE.

Context
Parameters may vary with different types of NEs.

Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.

3-24

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration
> External Alarm Configuration. The External Alarm Configuration area is
displayed.
The right pane will display all the external alarms that can be configured.

Note:
The quantity of the external alarms supported by the NMS is determined by the product
model. Refer to the corresponding product manuals for details.

3. In the External Alarm Channel ID column, select an external alarm signal.


4. In the Alarm Detection Mode column, select an alarm detection mode.

Alarm Detection Mode Description

On (High Voltage Alarm) Reports an alarm when receiving external alarm signals
(high voltage)

Off (Low Voltage Alarm) Reports an alarm when receiving no external alarm signals
(low voltage)

5. Select an external alarm name in the External Alarm list.


6. Click Apply. A message box is displayed.
7. Click OK.

– End of Steps –

3.2.18 Setting the Alarm Audibility and Visibility


You can set the alarm sound switch to remind maintenance personnel to handle the alarm.

Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration >
Alarm Audibility and Visibility Configuration. The Alarm Audibility and Visibility
Configuration area is displayed.

3. Select the Audible Alarm check box.


4. Click Apply. A message box is displayed.

5. Click OK.
– End of Steps –

3-25

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3.2.19 Configuring Free AU Alarm Detection


For the network configured with protecting path, you can check whether the protecting path
works properly in advance by setting the free AU detecting alarm. By default, the system
does not monitor the alarm of the free AU channel.

Context
l This function is applicable to the SDH series NEs, such as ZXMP S150, ZXMP S200,
ZXMP S325, ZXMP S330, ZXMP S380, ZXMP S385, ZXMP S390 and ZXONE 5800.
l This function is applicable to the SDH series cards, such as OL64, OL64FEC, OL16,
OL4, OL1, EL1, OL4/1, OL256, OPS1, LP1, OEL1, S4A, S16A, and S64A.

Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the left navigation tree, select NE Operation > Alarm Configuration > Free AU
Alarm Detect Configuration. The Free AU Alarm Detect Configuration area is
displayed.
3. Select a board to set in the Select Board drop-down list.
The right pane will display all ports that can be set in the selected board.
4. Select Detect in the Free AU Alarm Detect Configure list.

5. Click Apply.
– End of Steps –

3.2.20 Configuration Example


This section describes how to configure the alarm input and output, including external
alarm input, alarm cascading output, and alarm audible function by taking an example.

Configuration Requirement
As shown in Figure 3-14, ZXCTN equipment (NE1) receives the alarm information from
the external equipment through the alarm input interface on the main control board, and
then displays the information on the network management window. NE1 is connected to
NE2 in cascading mode. Local alarms generated on NE1 are output to NE2 through the
alarm output interface on the main control board so that the NE1 alarms can be viewed on
NE2.

3-26

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Figure 3-14 Configuration Example (Alarm Setting)

Configuration Plan
l Configure the external alarm input interface on NE1.
NE1 receives power supply alarms of the external equipment through the first channel
of external alarm input of RSCCU3[0–1–13]. The power supply alarms are input
through high-level signals.
l Configure the alarm cascading output function on NE1, and the alarm cascading input
function on NE2.
l Configure the alarm audible function on NE1 so that NE1 can output ring alarms to
the cabinet through the LAMP interface.
For the configurations of the NE boards, refer to Table 3-4.

Table 3-4 Board Configuration Plan Table (Alarm Setting)

NE Slot Board

NE1 5 RSCCU2

NE2 13 RSCCU3

Configuration Procedure
1. Configure the external alarm input interface.
In External Alarm Configuration of NE1, set external alarm attributes. For details,
refer to Table 3-5.

Table 3-5 External Alarm Parameters (Alarm Setting)

Parameter NE1

Equipment RSCCU3[0–1–13]

External Alarm Channel Channel 1 alarm


ID

Alarm Detection Mode On alarm (high voltage level)

External Alarm Power problem

3-27

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2. Configure the alarm cascading.


In the External Alarm Tandem Configuration window, set the cascading mode
between NE1 and NE2. For details, refer to Table 3-6.

Table 3-6 External Alarm Tandem Parameters (Alarm Setting)

Parameter NE1 NE2

Equipment RSCCU2[0–1–5] RSCCU2[0–1–13]

Tandem Mode Tandem Tandem

3. Configure the alarm audible function.


In Alarm Audibility and Visibility Configuration of NE1, select Audible Alarm.

3.3 Synchronizing NE Alarms


This operation synchronizes the alarm information on the U31 R22 with that on NEs.
After alarm synchronization, the U31 R22 displays updated NE alarms promptly, which
helps you to obtain the equipment operation status.

3.3.1 Synchronizing Active NE Alarms


This procedure describes how to synchronize alarm information on an NE to the U31 R22.

Prerequisite
The NE whose active alarms will be synchronized is connected properly to the U31 R22.

Context
You can perform the following operation to directly synchronize the active alarms of a
specified NE:

1. In the Topology Management window, right-click an NE, and select Fault


Management > Synchronize Active Alarms from the shortcut menu.
2. Click OK in a displayed message box, indicating the system successfully sends a
synchronization command.

3-28

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Steps
1. Use any of the following methods to display the Synchronize Active Alarms dialog
box.
l From the main menu, select Fault > Synchronize Active Alarms. The
Synchronize Active Alarms dialog box is displayed.
l In the Topology Management window, right-click an NE, select Active Alarm
from the shortcut menu, and click in the displayed Active Alarm dialog box.
l In the Topology Management window, right-click an NE, select Fault
Management > Active Alarms from the shortcut menu, and click in the
displayed Active Alarms dialog box.
l In the NE Alarm Table window on the bottom of the Topology Management view,
click .
2. In the NE Type list, select one or multiple NE types.

3. In the NE area, select one or multiple NEs, and click or to add the NE(s) to the
Selected area.
l : to add the selected NE node to the Selected area.
l : to add the selected NE node and its sub-node to the Selected area.

4. Click OK. A message box is displayed.


5. Click OK.

After the synchronization is successful, you can double-click in the lower-left


corner to view the alarm synchronization success information in the displayed Show
Message dialog box.
– End of Steps –

3.3.2 Recollecting Historical NE Alarms


This procedure describes how to recollect historical alarm information on an NE to the U31
R22.

Prerequisite
The NE whose historical alarms will be recollected is connected properly to the U31 R22.

Steps
1. In the Topology Management window, select Fault > Recollect History Alarms.
The Recollect History Alarms dialog box is displayed.

2. In the Raised Time area, select the period of historical alarms.

3. In the NE area, select one or multiple NEs, and click to add the NE(s) to the
Selected area.
4. Click OK. A message box is displayed.

3-29

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

5. Click OK.

After the recollection is successful, you can double-click in the lower-left corner
to view the alarm recollection success information in the displayed Show Message
dialog box.
– End of Steps –

3.4 Alarm Query


3.4.1 Alarm Query
Alarms can be queried on the EMS in the following ways:
l Query in the topology view.
l Query in the toolbar.
l Query in the main menu.
l Query in the service view.
l Query in the rack diagram.
l Query in the resource view.
It is the most convenient and rapid way to query alarms in the topology view.

3.4.1.1 Querying an Alarm in the Topology View


Alarms can be queried in two modes: direct query or right—click menu query.

Steps
l From the topology view, select one or multiple NEs. The current alarms of the NE(s)
are displayed on the bottom of the view in real time.
l (Only applicable for bearer and transmission NEs) In the topology view, right-click one
or multiple NEs, and then select Active Alarm or History Alarm from the shortcut
menu to view related alarms.
l In the topology view, right-click one or multiple NEs, select Fault Management from
the shortcut menu to perform the related operation. The right-click menu of Fault
Management is shown in Figure 3-15.

3-30

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Figure 3-15 Right-Click Menu of Fault Management

– End of Steps –

3.4.1.2 Querying Alarms by Clicking Buttons on the Toolbar


This procedure describes how to query NE alarms by clicking buttons on the toolbar.

Steps
1. Perform the following operations as required to query alarms.
l Click the button. The Alarm Monitoring tab is displayed.
l Click the button. The Query Active Alarms dialog box is displayed.
l Click the button. The Query History Alarms dialog box is displayed.
– End of Steps –

3.4.1.3 Querying the Alarm in the Main Menu


The user can query the alarm in the main menu in either of the following ways:
l Query the alarm by selecting Fault > Alarm Monitoring.
l Query the alarm by selecting Fault > Query Active Alarms and Fault > Query
History Alarms.

Steps
l Method 1: query the alarm by selecting Fault > Alarm Monitoring.
1. From the main menu, select Fault > Alarm Monitoring. The Alarm Monitoring
window is displayed.
2. In the Management Tree navigation tree, double-click the node under Active
Alarms, History Alarms, and Notifications to query the related alarms. In
addition, the user can double-click the node under Custom Query to query the
related alarms according to the template customized. The alarm query navigation
tree is shown in Figure 3-16.

3-31

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Figure 3-16 Alarm Query Navigation Tree

l Method 2: query the alarm by selecting Fault > Query Active Alarms and Fault >
Query History Alarms.

To... Do...

Query current a. From the main menu, select Fault > Query Active Alarms. The Query
alarms Active Alarms dialog box is displayed.

b. On the Location tab, select the NE type to be queried. By default, all


NEs are selected. (optional)

c. Click the Alarm Code tab, and then select the alarm code to be queried.
By default, all alarm codes are selected. (optional)

d. Click the Time tab, and then select the time when the alarm is generated
and acknowledged/unacknowledged time. (optional)

3-32

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

To... Do...

e. Click the Others tab, and then set Alarm Type, Data Type, Severity,
ACK State, and NE IP. (optional)

f. Click OK. The corresponding alarms are displayed in the Query Active
Alarms window.

Query historical a. In the main menu, select Fault > Query History Alarms. The Query
alarms History Alarms dialog box is displayed.

b. On the Location tab, select the NE type to be queried. By default, all


NEs are selected. (optional)

c. Click the Alarm Code tab, and then select the alarm code to be queried.
By default, all alarm codes are selected. (optional)

d. Click the Time tab, and then set the time when the history was generated,
alarm recovery time, acknowledged/unacknowledged time, and duration.

e. Click the Others tab, and then set Alarm Type, Data Type, Severity,
ACK State, and NE IP. (optional)

f. Click OK. The corresponding alarms are displayed in the Query History
Alarms window.

– End of Steps –

3.4.1.4 Querying the Alarms of a Service


This procedure describes how to select a service and view the active and history alarms
of the service.

Steps
1. From the main menu, select Service > Service View. The Service View window is
displayed.
2. Perform the following operations as required.

To... Do...

Query the active alarms of the


i. In the topology view, click a link. The services carried on the
service
link are displayed in the lower list.

ii. Right-click the service to be queried, and select Active Alarm


from the shortcut menu.

Query the history alarms of the


i. In the topology view, click a link. The services carried on the
service
link are displayed in the lower list.

ii. Right-click the service to be queried, and select Query >


History Alarm from the shortcut menu.

3-33

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To... Do...

Query the active alarms of the


i. In the topology view, click a link. The services carried on the
service and its server layer
link are displayed in the lower list.

ii. Right-click the service to be queried, and select Query > Active
Alarm (Inc Server Layer) from the shortcut menu.

Query the history alarms of the


i. In the topology view, click a link. The services carried on the
service and its server layer
link are displayed in the lower list.

ii. Right-click the service to be queried, and select Query >


History Alarm (Inc Server Layer) from the shortcut menu.

– End of Steps –

3.4.1.5 Querying Alarms in the Rack Diagram


You can view the active alarms and historical alarms of a board by selecting the board in
the rack diagram.

Steps
1. In the Topology Management window, double-click an NE whose alarms need to be
queried. The Rack Chart window is displayed.
2. Perform the following operations as required.

To... Do...

Query the active alarms of a board Right-click a board, and select Active Alarm from the
shortcut menu to view the active alarms of the board in the
Active Alarm dialog box.

Query the historical alarms of a board Right-click a board, and select History Alarm from the
shortcut menu to view the historical alarms of the board in
the History Alarm dialog box.

– End of Steps –

3.4.1.6 Querying the Alarm in the Resource View


The user can query the active alarm and history alarm through the shortcut menu in the
Resource view.

Steps
1. Open the BN NE Resource View window in one of the following ways.
l On the toolbar, click the button. The BN NE Resource View window is
displayed.

3-34

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

l In the Topology Management view, select Configuration > BN-IP NE


Configuration > BN NE Resource View. The BN NE Resource View window
is displayed.
l In the Topology Management view, right-click one NE, and then select BN NE
Resource View. The BN NE Resource View window is displayed.
2. Query alarms in one of the following ways.
l (Only applicable for bearer transmission NEs) In the topology view, right-click one
or multiple NEs, and then select Active Alarm or History Alarm from the shortcut
menu to view related alarms.
l In the topology view, right-click one or multiple NEs, select Fault Management
from the shortcut menu to perform the related operation.
The right-click menu of Fault Management is shown in Figure 3-15.
– End of Steps –

3.4.2 Querying Notifications


This procedure describes how to query notifications.

Context
You can query current notifications of a specified NE in the Topology Management
window.

To... Do...

View current In the Topology Management window, right-click the NE or the NE node, and
notifications then select Fault Management > Notifications

Steps
1. Query notifications in one of the following ways.

To... Do...

Query notifications through the main menu i. From the main menu, select Fault > Query
Notifications. The Query Notifications
window is displayed.

ii. Set parameters on the Location tab, Noti-


fication Code tab, and Others tab.

iii. Click OK. The query results will be listed in


the Query Notifications window.

3-35

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Query notifications through alarms In the Management navigation tree in the


left pane of the Fault Management window,
select Alarm Query > Notifications >
Notifications Within One Day (or you can
select Notifications Within Three Days). The
query results will be listed on the right pane.

Query notifications through NEs In the NE Tree in the left pane of the Fault
Management window, right-click the NE node
to be queried, and select Notifications from
the shortcut menu. The query results will be
listed on the right pane.

– End of Steps –

3.4.3 Custom Query


3.4.3.1 Customizing the Alarm Query Template
Users can customize the corresponding alarm query template according to the network
scale and service type to determine the service range affected by the alarm and take
appropriate measures timely.
For example, the template can be customized according to network layers and rings in the
following modes:
l Important site: customize an alarm query template to query all alarms on NEs.
l Device in the core and convergence layers: customize an alarm query template.

Prerequisite
The user has the operation authority of alarm management.

Context
Figure 3-17 illustrates the default alarm query templates provided by the U31 R22.

3-36

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Figure 3-17 Default Alarm Query Templates

The common customized alarm (active alarm and historical alarm) query templates
include:
l Ethernet port alarm query in the entire network
l SDH optical port alarm query in the entire network
l NE link disconnection alarm query in the entire network
l LCT login event query
l EMS server CPU/memory/database utilization threshold crossed alarm query

This procedure describes how to create a current alarm query template. You can create a
historical alarm query template in a similar way.

Steps
1. In the operation window of the U31 R22, select Fault > Alarm Monitoring. The Alarm
Monitoring window is displayed.
2. In Management Tree on the left, right-click Alarm Query > Custom Query > My
Query, and then select New Active Alarm Query from the shortcut menu. The Query
Active Alarms dialog box is displayed.

3-37

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
When customizing the historical alarm query template, select New History Alarm
Query from the shortcut menu. The Query History Alarms dialog box is displayed.

3. In the Location tab, select the NE type to be queried.

To... Do...

Query all NEs in the whole network Click the All NEs option button.

Query the specified NE


i. Click the Specific NEs option button.

ii. Select the specified NE in the list on the left, and then click

or to add the NE or NE group to the specified


area.

4. Click the Alarm Code tab, and then select Specific Codes.
5. In the Resource Type navigation tree, select BN-xTN > CTN.
6. Select the resource type in the CTN node according to the template type to be
customized.

7. Click to add the alarm code to the specified area, see Figure 3-18.

3-38

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Figure 3-18 Query Active Alarms Dialog Box

Note:
In the Click to enter the keyword to filter text box, enter the alarm code key word to
query.

For the settings of common alarm query templates, refer to Table 3-7.

Table 3-7 Common Alarm Query Template Settings

Alarm Query Template NE Type Alarm Code

Ethernet port alarm All NE types Ethernet ETPI l Ethernet Physical (ETPI) Ethernet Port Link
query in the entire (4203) Down (37)
network l Ethernet Physical (ETPI) Ethernet Port Half
Duplex Link (617)
l Ethernet Physical (ETPI) LOS (8)
l Ethernet Physical (ETPI) Ethernet Port
Oscillation (3573)

3-39

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Alarm Query Template NE Type Alarm Code

SDH optical port alarm All NE types SDH Port (4092) l SDH Port Missing Laser Module (137)
query in the entire l SDH Port Unauthenticated Laser Module
network (101)
l SDH Port LOS (8)
l SDH Port Transmit Failure (TF) (67)
l SDH Port Laser Module Fault (138)
l SDH Port Input Optical Power(dBm)
threshold crossed (50)
l SDH Port Output Optical Power(dBm)
threshold crossed (241)
l SDH Port Optical module rate mismatch with
port (621)
l SDH Port Laser Bias Current(mA) threshold
crossed (239)
l SDH Port Laser Temperature(℃) threshold
crossed (240)

NE disconnection alarm All NE types OMC Alarm (6) The link between the server and the NE is broken
query in the entire (1014)
network
BN EMS Alarm l BN EMS Alarm NE Communication Failure
(4237) (79)
l Link to Gateway NE is Broken (12063)

LCT login event query All NE types Board (4033) l Board LCT Login (3438)
l Board LCT Logout (18260)

U31 server Network OMC Alarm (6) l CPU usage of application server overload
CPU/memory/database (1002)
usage off-limit alarm l Ram usage of application server overload
query (1003)
l Database space usage too large (1008)
l Hard disk usage of database server overload
(1001)
l The capacity of the PM database has
exceeded the threshold (1027)

8. (Optional) When the historical alarm query template is created, click the Time tab, and
then set the time range.
9. Click the OK button. The Query Active Alarms dialog box is displayed.

10. On the toolbar, click . The New Query dialog box is displayed.
11. In the Query Name text box, enter the template name, and then click OK to save the
template, see Figure 3-19.

3-40

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Figure 3-19 Entering a User-Defined Alarm Template Name

In Management Tree on the left, select Alarm Query > Custom Query > My
Query. The customized alarm query template name is displayed, see Figure 3-20.
Double-click it to check the query result.

Figure 3-20 User-Defined Alarm Query Template Name

– End of Steps –

3.4.3.2 Exporting and Importing Query Conditions


This procedure describes how to export and import query conditions.
You can export predefined or customized query conditions of active alarms, history
alarms, and notifications. The query conditions can be exported as an .XML file to the
local computer.
You can also import an .XML file from a local path to carry out the saved query.

Steps
1. Perform the following operations as required.

To... Do...

Export query
i. In the Management tree in the Fault Management window, expand the
conditions
Alarm Query node.

ii. Right-click a query condition node, and select Export condition from the
shortcut menu. The Save dialog box is displayed.

iii. Select a file path in the Save in box, and set a file name and file type.

3-41

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To... Do...

iv. Click the Save button. The query condition is saved in .xml file to the
specified local path.

Import query
i. In the Management tree in the Fault Management window, expand the
conditions
Custom Query node under the Alarm Query node.

ii. Right-click My Query or Department’s Query, and select Import Condition


from the shortcut menu. The Open dialog box is displayed.

The file to be imported must be an .xml file previously exported from one
query condition.

iii. Select a file path, and set a file name and file type, and click the Open button.

– End of Steps –

3.4.3.3 Copying and Pasting a Query Condition


By copying and pasting query conditions, you can create query tasks conveniently.

Steps
1. In the Management tree in the Fault Management window, right-click a query
condition, and select Copy from the shortcut menu.
2. In the Management tree, right-click the Custom Query node, and select Paste from
shortcut menu.
– End of Steps –

3.5 Alarm Information Query


You can query the related information of an alarm by selecting the corresponding operation
item from the right-click menu, including:

l Viewing alarm details


l Viewing the related history alarms of an active alarm
l Querying alarm-related rules
l Viewing and supplementing alarm handling suggestions
l Locating the source NE of an alarm
l Locating the source board of an alarm
l Querying the associated services of an alarm

3.5.1 Viewing Alarm Details


By viewing alarm details and handling suggestions, you can locate the fault and
troubleshoot it in time.

3-42

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Steps
1. In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Detail from the shortcut menu. The Detail dialog box is displayed.
2. View alarm details and handling suggestions.

Note:
The two fields NE and Location combine to describe the NE with specific board
location that reports the alarm.
Related Service(s) describes the NE with the specific board that is affected by the
alarm.
If the alarm does not affect other NEs, the Related Service(s) is null.

– End of Steps –

3.5.2 Querying Historical Alarms


This procedure describes how to query historical alarms archived in the NMS so that similar
alarms can be easily located, analyzed, and cleared.

Steps
1. From the main menu, select Fault > Query Archived History Alarms. The Query
Archived History Alarms window is displayed.
2. From the left navigation tree on the Location tab, select the NEs whose historical
alarms you want to query, and click or to add these NEs to the right list.
3. (Optional) To remove an NE whose historical alarms you do not want to query, select
the NE from the right list and then click or .
4. Click the Alarm Code tab. Select the desired alarm codes from the left list, and then
click to add these alarm codes to the right list.
5. (Optional) To remove a selected alarm code, select it from the right list and then click
.
6. Click the Time tab. Set the parameters. For a description of the parameters, refer to
Table 3-8.

Table 3-8 Time Parameter Descriptions

Parameter Description

Raised Time Period during which alarms corresponding to the specified


alarm codes are already generated.

3-43

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Description

Cleared Time Required. This parameter indicates the time when these
alarms are cleared.

(Un)ACK Time Time when these alarms are handled.

Duration Length of time that these alarms persist.

7. Click the Others tab. In the Alarm Type area, set the alarm types that you want to
query. For a description of the parameters, refer to Table 3-9.

Table 3-9 Parameter Descriptions for the Others Tab

Parameter Description

Alarm Type Select the types of the NE alarms that you want to query.
Options include Equipment Alarm and Communications
Alarm.

Data Type Select the data types of the alarms that you want to query.
Options include Common Alarm and Switch Event.

Original Severity Select the severity levels of the alarms that you want to query.
Options include Critical, Major, Minor and Warning.

ACK State Select acknowledged or unacknowledged alarms.

NE IP and Remark(Fuzzy Set them as required.


Match)

– End of Steps –

3.5.3 Viewing Related History Alarms of an Active Alarm


By using the Related History Alarms shortcut menu item, you can view the history alarms
related to the active alarm. These history alarms can provide reference for handling the
active alarm.

Steps
1. In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Related History Alarms from the shortcut menu.
The Related History Alarms tab is displayed in the Fault Management window,
listing all history alarms related to the selected active alarm.

3-44

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Note:
If the selected active alarm has no relative history alarms, the Confirm message box
is displayed, prompting that no matching record is found.

– End of Steps –

3.5.4 Querying Alarm-Related Rules


You can use this function to check the rules related to an alarm. If the alarm meets one of
the related rules, the system might process the alarm using the rule.

Context
Note that the influence of related rules is not certain on the selected alarm.

Steps
1. In the Fault Management window, right-click an alarm in a displayed history alarm list.
2. Select Related Rules from the shortcut menu. The Related Rules dialog box is
displayed.

3. Double-click a rule in the rule list. A dialog box is displayed, displaying the detailed
parameters of this rule.
– End of Steps –

3.5.5 Viewing and Supplementing Alarm Handling Suggestions


To locate and troubleshoot a fault, you can refer to suggested suggestions or supplement
handling suggestions.

Steps
1. In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Handling Suggestions from the shortcut menu.
2. View suggested suggestions on the Handling Suggestions tab in a displayed dialog
box.

3. Enter advice in the User-defined Suggestions text box.


4. Click Save.

– End of Steps –

3-45

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3.5.6 Locating the Source NE of an Alarm


Locating source NE enables the user to access the topology map view the NE where the
selected alarm is generated.

Steps
l In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Locate Alarm to NE from the shortcut menu. The Topology Management
window is displayed.
The icon of the NE to which an alarm occurs is selected on the topology graph.
– End of Steps –

3.5.7 Locating the Source Board of an Alarm


You can view the alarm information of the boards to which the alarm occurs on the rack
diagram.

Steps
1. In the Fault Management window, right-click an alarm in a displayed alarm list,
and select Open Rack Chart from the shortcut menu. The Rack Chart window is
displayed.
2. Right-click the board on the rack, and select Active Alarm. The Active Alarm dialog
box is displayed. The active alarm information of the board is listed in this dialog box.
– End of Steps –

3.5.8 Querying the Associated Services of an Alarm


The services that are relevant to an alarm are displayed in the alarm query result list.

Steps
1. In the Fault Management window, open any active alarm or history alarm list.
2. In the Relates Service(s) column, click the service that is associated with the alarm
to view the service.
– End of Steps –

3.6 Handling Alarm


The U31 R22 provides a series of alarm management functions. By using the alarm
management functions, you cannot only view, synchronize, manage and process alarms,
but also print and export the alarm messages.
In the alarm list, you can perform various operations by right-clicking an active alarm and
select items from the shortcut menu.

3-46

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

3.6.1 Automatically Acknowledging History Alarms


The function of automatically acknowledging history alarms is used for automatically
acknowledging the history alarms before the days that are set by the user so as to avoid
manual acknowledgment and improve maintenance efficiency.
This procedure describes how to set the days for automatically acknowledging the history
alarm.

Steps
1. From the main menu, select Maintenance > Task Management > Show Timing Task.
The Task Management window is displayed.
2. From the Task Management navigation tree, select Common Task > Alarm
Background Task > Automatically Acknowledge History Alarms Setting. The
Automatically Acknowledge History Alarms Setting window is displayed.

3. Click , and enter a time in the Automatically acknowledge history alarms


before: text box.

4. Click .

– End of Steps –

3.6.2 Acknowledging an Alarm


The system allows a user to acknowledge receiving an alarm before further processing.
After the acknowledgement, the alarm status turns from Unacknowledged to
Acknowledged. The user can acknowledge only an unacknowledged alarm. This
procedure indicates that the maintenance staff are aware of the selected alarm and will
begin troubleshooting. To acknowledge an alarm, perform the following steps:

Steps
1. In the Fault Management window, open a list of active alarms, and right-click an
unacknowledged alarm record.

2. Select Acknowledge from the shortcut menu. The Alarm Acknowledge dialog box
is displayed.
3. Enter comments in the Comment text box, and click OK.

– End of Steps –

Result
The status of the selected alarm turns from Unacknowledged to Acknowledged.
Meanwhile, the client will record detailed information of this acknowledgment, including
time, user, and the acknowledged alarm.

3-47

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3.6.3 Unacknowledging an Alarm


After the acknowledgement, you can also unacknowledge the alarm, thus turning its status
from Acknowledged to Unacknowledged. Alarms must be acknowledged before being
unacknowledged.

Steps
1. In the Fault Management window, open a list of active alarms by double-clicking a
node under Alarm Query in the Management tree, and right-click an acknowledged
alarm record.

2. Select Unacknowledge from the shortcut menu. The Alarm Unacknowledge dialog
box is displayed.
3. Enter comments in the Comment text box, and click OK.

– End of Steps –

Result
The ACK state (Acknowledging status) of the selected alarm turns from Acknowledged
to Unacknowledged.

3.6.4 Clearing an Alarm


Clearing an alarm refers to removing an active alarm alarms from the alarm database.
After an alarm is cleared, it is moved to the list of history alarms, from which it can be
queried.

Steps
1. In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Clear from the shortcut menu. The Confirm message box is displayed.
2. Click OK to clear the alarm.

Note:

If an alarm clearing rule has been set, the system will automatically clear the received
alarms meeting the set conditions, and move them to the history alarm list directly.

– End of Steps –

Result
The cleared alarm is moved from the active alarm list to the history alarm list. To check
the details of this alarm, query it from the history alarms.

3-48

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

3.6.5 Specifying Alarms to Be Monitored


This procedure describes how to specify the current alarms to be monitored. If a specified
alarm is cleared, it automatically stops to be monitored.

Steps
1. In the Fault Management window, select the current alarm to be monitored.
2. Right-click the alarm and select Specified Alarms Monitoring from the shortcut
menu. The Specified Alarms Monitoring window is displayed.

Note:

You can specify multiple current alarms to be monitored.

– End of Steps –

3.6.6 Adding Comments to an Alarm


You can add additional information to an alarm by adding comments.

Steps
1. In the Fault Management window, right-click an alarm in a displayed alarm list, and
select Comment from the shortcut menu. The Comment dialog box is displayed.
2. Enter the comment in the text box and click OK button.
– End of Steps –

Result
Add comments to the alarm successfully.

3.6.7 Creating a Rule for an Active Alarm


With this function, the user can create an alarm rule with an existing alarm message in the
alarm list as the template.

When you create a rule, the system will initialize parameters in the created rule in
accordance with corresponding attribute values of the selected alarm message.

Steps
1. In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Create a Rule from the shortcut menu.

3-49

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2. Select a rule from the sub-menu, for example, Alarm Acknowledging Rule. The
Alarm Acknowledging Rule dialog box is displayed.
3. Set parameters on the Basic and Condition tabs.
4. Click OK to complete the creation of the new rule.
– End of Steps –

3.6.8 Printing Alarm Information


You can print the alarm information in the alarm list opened by the user. The user can
select the printing range, copies, paper size, orientation and margins to achieve desired
printing results.

Prerequisite
The printer is correctly connected and configured.

Steps
1. In the Fault Management window, open a list of history or active alarms.

2. Click the button. The Print Setting dialog box is displayed.


3. Set parameters on the General, Page Setup, and Advanced tabs.

4. Click the Print button.

Tip:
To preview the printing effect, click the Preview All button.

– End of Steps –

3.6.9 Exporting Alarm Information


This function enables the user to export all alarm data on the current list and save them to
an external file. The external file can be in the format of xml, txt, prn, html, pdf, xls, xlsx,
or csv.

Steps
1. In the Fault Management window, open a list of history or active alarms

2. Click the button, and select Export All Columns or Export Visible Columns.
The Save dialog box is displayed.

3. Select a file path from the Save in list, and set a file name and file type.

3-50

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

4. Click the Save button. A message box is displayed, indicating that the file is exported
successfully.
5. Click OK.
– End of Steps –

3.7 Alarm Forwarding


3.7.1 Setting Alarm Forwarding Templates
By setting the alarm forwarding templates, the user can predefine the forwarding template
of messages sent to handsets and E-mail boxes, making forwarding settings easier.

Steps
1. From the main menu, select Fault > Setting > Alarm Forwarding Template Setting.
The Alarm Forwarding Template Setting dialog box is displayed.
2. Set forwarding parameters in the SMS Template, Mail Subject, and Mail Contents
text boxes.
3. Click OK.
– End of Steps –

3.7.2 Forwarding an Alarm


Forwarding an alarm refers to sending the alarm message to other management personnel
through E-mails or mobile phone short messages for them to handle in time.

Prerequisite
l The OMC server is connected to the SMS center and the mail server.
l The mobile phone number and the E-mail address to be forwarded to are available.

Steps
1. In the Fault Management window, right-click an alarm in a displayed alarm list, and
select Forward from the shortcut menu. The Forward Alarm dialog box is displayed.

2. Enter the information of the specified person in the E-mail and Phone text boxes.

3. On the Forward by email tab, enter the email subject and content.
4. On the Forward by SMS tab, enter the short message content.

5. Click OK.
– End of Steps –

3-51

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3.8 Alarm Rule Management


The alarm rule management function manages user-customized rules, and the alarm
operations are performed according to these rules. You can add, delete, modify, fresh,
activate, or suspend a rule through the alarm rule management function.

3.8.1 Introduction to Alarm Rules


From the main menu, you can select Fault > Setting > Rule Setting. The Rule Setting
tab is displayed.

Delivery to Database
It specifies whether to store the rule-meeting alarms in the database.

Upload via Northbound Interface


It specifies whether to report the rule-meeting alarms to upper-level NMS via northbound
interfaces.

Alarm Rule Functions


The names, valid ranges and functions of alarm rules are illustrated in Table 3-10.

Table 3-10 Alarm Management Rule

Rule Name Valid Range Delivering to Uploading via Function


Database Northbound
Interface

Alarm Ac- l Global Yes Yes Rules meeting the rule are automatically
knowledge- validity acknowledged. When a rule-meeting
ment Rule l Forward alarm is reported, it will be acknowledged
validity automatically.

Alarm l Global Yes Yes Rules meeting the rule are automatically
Clearance validity cleared. When a rule-meeting alarm is
Rule l Forward reported, it will be cleared automatically.
validity

Alarm Filter l User Not stored when Not reported Rules meeting the rule are automatically
Rule validity, if restrained. when filtered. When a rule-meeting alarm is
specific restrained. reported, it will be filtered automatically.
user is The two filter types are:
selected. Display filter: the filtered alarms are not
Otherwise, displayed.
global Alarm suppression: The filtered alarms are
validity. neither displayed nor stored in database.
l Backward
validity for

3-52

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Rule Name Valid Range Delivering to Uploading via Function


Database Northbound
Interface

"display"
filter
l Forward
validity
when
restrained

Alarm Delay l Global Yes Yes Used to handle intermittent alarms. If


Rule validity the rule-meeting alarms are reported and
l Forward eliminated in the specified delay time, the
validity alarms are directly sent to history library.

Alarm l Global Yes Yes Used to display only one record for alarms
Merging Rule validity from the same source caused by the same
l Forward fault.
validity

Alarm l Global Yes Yes Used to count the duration time of


Duration Rule validity rule-meeting alarms. If the duration
l Forward reaches to the threshold value, a
validity designated operation will be executed,
such as generating a new alarm or setting
a higher level for the alarm.

Alarm Count l Global Yes Yes Used to count the occurrences of alarms.
Rule validity If the number of occurrences exceeds the
l Forward threshold value within a set period, a new
validity alarm is generated.

Alarm l Global Yes Yes Used to forward alarms to designated


Forwarding validity personnel when an alarm is reported or if
Rule l Forward it meets a condition.
validity

Alarm Mask l Global No No Used to send masking conditions to the


Rule validity NE agent, which afterwards will not report
l Forward alarms that meet these conditions. This
validity rule is applicable only to NE agent and
devices managed by NE agent.

NAF Alarm l Global No No Used to filter alarms meeting specified


Filtering Rule validity rules. The filtered alarms are not reported
l Forward to the upper-level northbound network
validity management.

3-53

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Rule Name Valid Range Delivering to Uploading via Function


Database Northbound
Interface

Notification l Global No No Used to filter notifications meeting certain


Filter Rule validity rules. The filtered notifications are neither
l Forward displayed nor stored to database. This rule
validity is only applicable to the newly reported
notifications.

Repeated l Global No No Used to filter the repeated notifications


Notification validity (the same location position and notification
Filtering Rule l Forward code) within a specified time from
validity the last notification (including filtered
notifications). The filtered notifications are
directly discarded, which means that the
notifications are neither displayed on the
client nor stored to the database. The
number of the reported notification times
can be queried. This rule is only applicable
to the newly reported notifications. Multiple
rules can be created, and the conditions of
these rules must be different.

Repeated l Global No No Used to filter the repeated historical


History Alarm validity notifications (the same location position
Filtering Rule l Forward and notification code) within a specified time
validity from the last historical notification (including
filtered notifications). The filtered historical
notifications are directly discarded, which
means that the notifications are neither
displayed on the client nor stored to the
database. The number of the reported
historical notification times can be queried.
This rule is only applicable to the newly
reported historical notifications. Multiple
rules can be created, and the conditions of
these rules must be different.

Alarm l Global Yes Yes Set for restraining the report of an alarm
Restrain Rule validity depending on another. If alarm A depends
- NE l Forward on B, only alarm B is reported under this
validity rule. This rule enables the alarms of
different NEs to restrain each other.

3-54

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Rule Name Valid Range Delivering to Uploading via Function


Database Northbound
Interface

Alarm l Global Yes Yes Set for restraining the report of an alarm
Restrain validity depending on another. If alarm A depends
Rule-NE Type l Forward on B, only alarm B is reported under this
validity rule. This rule enables the alarms of the
same NE of the same NE type to restrain
each other.

Note:
There might be slight differences in specific rules among products or versions of the same
product.

3.8.2 Introduction to Alarm Rule Operations


The alarm rule management operations include:

Creating an Alarm Rule


The user can create fault operation and maintenance rules for different alarms.

Modifying an Alarm Rule


The user can modify the information of the created alarm rules as required, including rule
description, alarm selection conditions, and other information.
In the Rule Setting dialog box, right-click the rule to be modified and select Modify on
shortcut menu to modify the rule.

Suspending an Alarm Rule


The user can suspend activated alarm rules. When an alarm rule is suspended, it does
not take effect.

In the Rule Setting dialog box, right-click the rule to be suspended and select Disable on
shortcut menu to suspend the rule.

Enabling an Alarm Rule


The user can enable disabled alarm rules.
In the Rule Setting dialog box, right-click the rule to be enabled and select Enable on
shortcut menu to enable the rule.

3-55

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Deleting an Alarm Rule


This operation enables the user to delete alarm rules that are no longer useful. Suspended
rules can be deleted.
In the Rule Setting dialog box, right-click the rule to be deleted and select Delete from the
shortcut menu to delete the rule.

Refreshing an Alarm Rule


When multiple users log into the same server simultaneously, if one user modifies alarm
rules, other users may not be able to see the changes immediately due to network delay.
They need to obtain the latest data from the server to see the modified alarm rules.

In the Rule Setting dialog box, click the button to refresh alarm information.

3.8.3 Creating an Alarm Rule


This procedure describes how to create an alarm rule.

Steps
1. From the main menu, select Fault > Setting > Rule Setting. The Rule Setting tab is
displayed.

2. On the toolbar, click the button. The New dialog box is displayed.
3. Select an alarm rule.
4. Click OK. The dialog box of the corresponding alarm rule is displayed.
5. Set rule parameters.
Rule parameters vary with different alarm rules. For the parameters descriptions of all
alarm rules, refer to Table 3-11.

Table 3-11 Alarm Rule Parameter Descriptions

Rule Description

Alarm Filtering The parameters on the Basic and Condition tabs need to be set.
Rule Both the alarm masking rule and alarm filtering rule restrain alarms. The

Alarm differences between them are as follows:

Acknowledging l The alarm masking rule discards the alarm when the NE reports an

Rule alarm, and the alarm filtering rule discards the alarm after the U31 R22
receives an alarm.
Alarm Clearing
l The masked alarm does not occupy network bandwidth, and the alarm
Rule
filtered from the U31 R22 still occupies network bandwidth.
Alarm Delaying
Rule

Alarm Masking
Rule

3-56

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Rule Description

NAF Alarm
Filtering Rule

Notification The parameters on the Basic and Condition tabs need to be set.
Filtering Rule The notification filtering rule is only applicable to a newly reported
notification.
Repeated
Notification
Filtering Rule

Repeated History The parameters on the Basic and Condition tabs need to be set.
Alarm Filtering The historical alarm filtering rule is only applicable to a newly reported
Rule notification.

Alarm Merging The parameters on the Basic, Condition, and Action tabs need to be set.
Rule l Only the earliest alarm that satisfies the requirement of the alarm
merging rule is displayed on the Rule Setting tab. You can click
"+" before the alarm to display the merged alarms. If the alarm is
recovered, the alarm merging rule will re-select another alarm to be
displayed.
l To view other alarms filtered by the rule, you can select Others >
Advanced > Invisible in the Query Active Alarms dialog box.

Alarm Persisting The parameters on the Basic, Condition, and Action tabs need to be set.
Rule Suppose the persisting state of a new alarm is unacknowledged. After the
alarm changes to active state, the system will remove the alarm.

Alarm Counting The parameters on the Basic, Condition, and Action tabs need to be set.
Rule l After the alarm counting rule is created, the U31 R22 system will
enable alarm occurrence frequency sampling to count the times of
alarm occurrence after the alarm meeting the rule occurs.
l If the number of times of alarm occurrence in a specified duration
exceeds the threshold, the system will automatically create an alarm
that specifies alarm severity and details.
l If the system detects the counting alarm created in the previous
counting duration, it will modify the times of alarm occurrence in the
details of the counting alarm instead of creating a new alarm.
l If the system has created a new counting alarm and then detects that
the number of times of alarm occurrence in the previous counting
duration does not exceed the threshold, the system will remove the
existing alarm.

Alarm Forwarding The parameters on the Basic, Condition, and Action tabs need to be set.
Rule

3-57

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Rule Description

Alarm Restraining The parameters on the Basic, Root Alarm, and Correlated Alarm tabs
Rule by NE need to be set.
l On the Root Alarm tab, set the location and alarm code.
l On the Correlated Alarm tab, set the location and alarm code.
The correlated primary and secondary alarms must have different alarm
description. The primary alarm of a rule cannot be a secondary alarm of
other rules.

Alarm Restraining The parameters on the Basic and Condition tabs need to be set.
Rule by NE Type On the Condition tab, set the NE type, root alarm code, and correlated
alarm code.

l On the Basic tab, set the alarm name, description, rule status, and other
parameters as required.
l On the Location sub-tab, set the NE location of the alarm.
On the Alarm Code sub-tab, set the alarm code.

On the Others sub-tab, set the time of alarm occurrence, alarm type, alarm
severity, maintenance state, NE IP address, and remark.
l On the Action tab, set the rule-related action parameters.

6. Click OK.
– End of Steps –

3.9 Fault Handling Settings


With the experience of long-term network operation, users can summarize suggestions for
handling common faults. The suggestions can be set as alarm handling suggestions as a
reference for future operation. The U31 R22 network management system provides the
following functions for alarm handling suggestions: import, export, view and supplement.

3.9.1 Finding Alarm Handling Suggestions


This procedure enables the user to find fault alarm handling suggestions.

Steps
1. From the main menu, select Fault > Setting > Handling Suggestion Setting. The
Handling Suggestion Setting tab is displayed.

2. Enter the keyword(s) in the Click to enter the keyword to filter text box, and click
the button.
The Resource Type navigation tree displays all matched alarms. Select the desired
alarm. The right pane displays alarm causes and handling suggestions.

3-58

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

3. (Optional) For some important alarms, click the prompt link in the lower-left corner to
view more handling suggestions about the alarm.
– End of Steps –

3.9.2 Supplementing Alarm Handling Suggestions


This procedure describes how to add a supplement to the default handling suggestions
provided by the system.

Steps
1. From the menu, select Fault > Setting > Handling Suggestion Setting. The
Handling Suggestion Setting tab is displayed.
2. Select an alarm from the Resource Type tree, and enter supplement suggestions in
the User-defined Suggestions box, see Figure 3-21

Figure 3-21 Viewing the User-Defined Suggestion

3-59

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Caution!
The supplementary information cannot exceed 2000 characters; otherwise, it will be
directly discarded by the system form the 2000 character.

3. Click the Save button.


– End of Steps –

3.9.3 Exporting Handling Suggestions to a File


You can export the handling suggestions to a local path of in xml, txt, prn, html, pdf, xls,
xlsx, or csv format.

Steps
1. From the main menu, select Fault > Setting > Handling Suggestion Setting. The
Handling Suggestion Setting tab is displayed.
2. Select an alarm or a type of alarms from the Resource Type tree.
3. Click the Export button. The Save dialog box is displayed.
4. Select a file path and set the file name and type.

5. Click the Save button.


– End of Steps –

3.9.4 Importing Handling Suggestions


This procedure describes how to import a local file of handling suggestions to the U31 R22
for view.

Prerequisite
The file to be imported exists on the local computer.

Steps
1. From the main menu, select Fault > Setting > Handling Suggestion Setting. The
Handling Suggestion Setting tab is displayed.

2. Click the Import button. The Confirm message box is displayed.

3-60

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Note:
l You can only import files in .xls or csv format.
l Importing a file will only modify the advice description that the system has handled.
l The Handling Suggestion cannot exceed 2000 characters; otherwise, it will be
directly discarded by the system for the 2000 character.

3. Click OK. The Open dialog box is displayed.


4. Select a file to be imported and click the Open button to import the selected file.
– End of Steps –

3.10 Alarm Statistics


The U31 R22 system can perform statistics on history alarm data and display the statistic
results in table, bar chart, and pie chart.

3.10.1 Overview of Fault Statistics


In the left pane of the Fault Management window is the Statistic tree, see Figure 3-22.

Figure 3-22 Statistic Tree

The Statistic includes the following three types of nodes.


l Predefined statistic methods, including By NE, By NE Type, By Alarm Code, By
Time, By Group, and By ACK User. For example, if you double-click the Top10
node under By Alarm Code, the top 10 frequently occurring alarm codes and their
frequency are displayed in the right pane.
l Custom Statistic: You can perform basic statistics or busy time statistics as required.
For specific description of parameter settings, refer to 3.10.4 Customizing Statistics.
l Default Statistic Setting: allows users to set common statistic query conditions as
the default conditions. Double-click this node. The Default Statistic Setting dialog
box is displayed. The default statistic condition is modifiable. The statistic result will
be displayed after modification.

3-61

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3.10.2 Basic Statistics


This procedure describes how to operate the basic statistics.
Basic statistics refers to the simple statistics on average duration or occurrence of history
alarms for the specified object.

Context
l When summarizing statistic results, you can set the statistic conditions. In this way,
only the alarms meeting the specified conditions are summarized. Also, you can
set the maximum number of records to be displayed. For example, only the first 50
records are displayed.
l The name of a new statistic template cannot repeat an existing one.

Steps
1. Perform one of the following operations to open the History Alarm Basic Statistics
dialog box.
l From the main menu, select Fault > History Alarm Basic Statistics.
l From the main menu, select Statistics > History Alarm Statistics > History
Alarm Basic Statistics.
2. On the Basic tab, set Statistic Type, Statistic Row and View Setting.
3. Click the Condition tab, and set parameters on the Location, Alarm Code, and
Others sub-tabs.
4. Click OK. The statistic results are displayed in the right pane.
– End of Steps –

3.10.3 Busy Time Statistics


This procedure describes how to operate the busy time statistics.
Busy time refers to the time period when the traffic is comparatively busy in certain service.
The alarms generated at these moments might be of special concern.
Through busy time statistics, you can perform statistics of only history alarms generated
during busy time. In the same way as basic statistics, you can perform statistics by average
alarm duration or alarm occurrences.

Context
l When summarizing statistic results, you can set the statistic conditions. In this way,
only the alarms meeting the specified conditions are summarized. Also, you can
set the maximum number of records to be displayed. For example, you can set the
condition to display only the first 50 records.
l The name of new statistic template cannot repeat an existing one.
l Because the statistic granularity is accurate to hour, effective time segment can only
be set to hours.

3-62

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Steps
1. Perform one of the following operations to open the History Alarm Busy-Time
Statistics dialog box.
l From the main menu, select Fault > History Alarm Busy-Time Statistics.
l From the main menu, select Statistics > History Alarm Statistics > History
Alarm Busy-Time Statistics.
2. On the Basic tab, set Statistic Type, Effective Time and View Setting.
3. Click the Condition tab, and set parameters Location, Alarm Code, and Others on
the sub-tabs.
4. Click OK. The statistic results are displayed in the right pane.
– End of Steps –

3.10.4 Customizing Statistics


This procedure describes how to operate the custom statistics.
The custom statistics function provides a user-defined method for history alarm statistics.
You can set the template as required.

Prerequisite
l You have the authority to manage alarms.
l The Fault Management window is displayed.

Context
l You can use the defined statistic template to perform statistics on and analyze history
alarms.
l Two types of statistic templates are available: basic statistic template and busy-time
statistic template. This procedure uses a basic statistic template as an example, and
the operation for a busy-time statistic template is similar.

Steps
1. On the Statistic tab in the Fault Management window, right-click the Custom
Statistic node, and select New History Alarm Basic Statistic... from the shortcut
menu. The New History Alarm Basic Statistic dialog box is displayed.

2. Set the template name and click OK. The History Alarm Basic Statistics dialog box
is displayed.

3-63

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
l For the parameter settings in the History Alarm Basic Statistics dialog box, refer
to 3.10.2 Basic Statistics.
l After you set the statistic conditions, the custom statistic template is added under
the Custom Statistics node.

3. Right-click the new basic statistic template, and select Execute from the shortcut menu
to view the statistic result.

Note:
You can also display the statistic result in bar chart or pie chart.

l If the statistic result needs to be displayed in bar chart, click on the toolbar.
l If the statistic result needs to be displayed in pie chart, click on the toolbar.

– End of Steps –

3.10.5 Querying Historical Alarms by Specified Alarm Code


This procedure describes how to query the number of alarms based on specified historical
alarm codes and alarm generation time.

Steps
1. From the main menu, select Fault > History Alarm Important Alarm-Code
Statistics. The History Alarm Important Alarm-Code Statistics dialog box is
displayed.
2. From the left navigation tree on the Location tab, select the NEs whose historical
alarms you want to query.

To... Do...

Query alarms on all NEs


Click the All NEs option button.

Query alarms on specified NEs


Click the Specific NEs option button.

Expand the NE navigation tree, and select the NEs whose

alarms you want to query. Click or to add these


NEs to the right list.

(Optional) To remove a selected NE, select this NE from

the right list, and then click or .

3-64

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

3. Click the Alarm Code tab. On this tab, expand the alarm code list. Select the desired
alarm codes, and then click to add these alarm codes to the right list.
4. Click the Time tab. On this tab, perform one of the following operations as required.

To... Do...

Query the alarms generated within a Click the Range option button. Set the start time and the
specified period end time.

Query the alarms generated within Click the Latest option button. Set the number of days
specified days or weeks or weeks.

5. Perform the following operations as required.

To... Do...

Output the query result to the History Click OK.


Alarm Important Alarm-Code Statistics
window on the NMS

Save the query conditions into a template Click the Save As button. In the displayed Save As
dialog box, set Template Name and then click OK.

– End of Steps –

3.10.6 Managing Timed Statistical Task


This procedure describes how to manage the timed statistical task.

By using the timed statistic task function, you can specify a task which can periodically
perform statistics based on one template and export the statistic result to a specified path.

Context
You can select a predefined or custom statistic template to set a timed statistic task.
Timed statistic task includes four plans:
l By day: The task is executed at 5:00 am each day by default.
l By week: The task is executed at 5:00 am on Mondays by default.
l By week: The task is executed at 5:00 am on the first day of each month by default.
l Custom: The task is executed on the time you set.

Steps
1. Perform one of the following operations to open the Timing Statistic Task
Management tab.
l From the main menu, select Fault > Timing Statistic Task Management.
l From the main menu, select Statistics > History Alarm Statistics > Timing
Statistic Task Management.

3-65

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2. On the toolbar of the Timing Statistic Task Management tab, click the button.
The Timing Statistic Task dialog box is displayed.
3. Set a task name, template name, task time, task status, and task execution plan.

Note:

To view the details of the selected template, click the button.

4. (Optional) Click the Advanced Settings(F) button, and set parameters in the
displayed Advanced Settings dialog box.

Note:
Advanced settings enable the statistic result to be saved in a specified server and to
be sent to a specified E-mail as an attachment.

5. Click OK to return to the Timing Statistic Task dialog box.

6. Click OK to finish creating the timed statistic task.


The generated result files are displayed in the Timing Statistic Task Execute Result
list.

– End of Steps –

3.10.7 Managing Timed Export Tasks


By using timing export task, you can periodically filter alarms in accordance with the
specified time and condition you set and save the filtered alarms to files.

Steps
1. From the main menu, select Fault > Timing Export Task Management. The Timing
Export Alarm Task Management tab is displayed.

2. On the toolbar of the Timing Export Alarm Task Management tab, click the
button. The Timing Export Task dialog box is displayed.
3. On the Basic tab, set a task name, an export type, a task time, a task status, a file
type, and a task execution plan.

4. (Optional) Click the Advanced Settings(F) button, and set parameters in the
displayed Advanced Settings dialog box.

3-66

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Note:
Advanced settings enable the export result to be saved in a specified server.

5. Click the Condition tab.


6. Set query parameters on the Location, Alarm Code, Time, and Others tabs.
7. Click OK to finish creating the timing export task.
The generated result files are displayed in the Timing Export Task Execute Result
list.
– End of Steps –

3.11 Alarm and Notification Monitoring


If a fault or problem of a site device is detected, the monitoring tool generates an alarm.
The user can clear the fault or problem when detecting the alarm information.

3.11.1 Alarm Monitoring Policies


Alarm Monitoring Principles
The principles of the alarm monitoring are as follows.
l Critical and major alarms should be handled immediately, otherwise severe
consequences may be incurred. Therefore, such alarms should be sent to the
operator's cell phone with audio indications.
l For minor alarms and warnings, the system sends background alarms and SMS
alarms to related staff to inform system faults and hidden risks. Related staff can
then monitor system performance, analyze reasons and handle these alarms.

Recommended Alarm Monitoring Policies


Recommended alarm monitoring policies are as follows.
l Severity Priority Policy
The system forwards alarms on the highest severity level first when alarms of various
severity levels occur at the same time.
l Time Priority Policy
To minimize the influence of faults on services, immediately handling is required
once some alarms are reported. To ensure the timely notification of alarms to related
personnel, an audio indication or a short message should be used to inform the
alarm.
l Multi-Receiver Policy

3-67

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

In the alarm server, set multiple receiver on the server. This can ensure the alarm can
be handled in time.
l Multi-Way Policy
If only one way is used to send alarm information, immediate troubleshooting is
unavailable when this way fails to work. Therefore, it is recommended to adopt
multiple ways at the same time to avoid this case.

3.11.2 Alarm Monitoring Methods


Alarm Monitoring Methods
You can use any of the following three methods to monitor alarms in a network.
l Monitoring alarms via U31 R22
l Monitoring alarms via short message
l Monitoring alarms via E-mail

Comparison of Different Monitoring Methods


The tree methods can all monitor fault alarms. However, only monitoring via U31 R22
provides the function of checking system performance. The other two only provide alarm
information.

3.11.3 Alarm Monitoring via U31 R22


Objective
The fault management module monitors the whole U31 R22 system. When a part of the
system encounters a fault, the alarm service process sends an alarm message to the
server.

Function
Through U31 R22 alarm monitoring, the users can view performance statistics and alarm
information, so that they can analyze corresponding reasons.

Query Methods
To query alarm monitoring of the U31 R22, log in to the U31 R22 and query alarms on the
Fault Management window.

3.11.4 Alarm Monitoring via Short Message and E-mail


Description
Set the cell phone numbers and E-mail addresses of monitoring personnel in the
alarm forwarding template, and the alarm information will be sent to the monitoring

3-68

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

personnel, which can include the maintenance personnel of ZTE local office or the
telecommunications operator.

Function
To send alarm information to maintenance personnel when they are not on site so that they
can monitor the system faults.

3.11.5 Monitoring Real-Time Alarms


Real-time alarm monitoring performs real-time monitoring on active and history alarms.
Real-time monitoring on active alarms obtains alarm messages of devices and the network
in time, while monitoring on history alarms reflects alarm handling and fault recovery of the
system.

Steps
1. From the main menu, select Fault > Alarm Monitoring. The Alarm Monitoring tab
is displayed.
The system views the NEs to which the alarms occur, acknowledgement status, alarm
code, and raised time.
– End of Steps –

3.11.6 Monitoring Real-time Notifications


System notifications inform the user of the real-time operation status of the network.
Monitoring real-time notification reflects problems of different devices to be handled.

Steps
1. From the main menu, select Fault > Notification Monitoring. The Notification
Monitoring tab is displayed.
The system views the NEs to which the notifications occur, notification code, raised
time, and NE type.
– End of Steps –

3.11.7 Monitoring the Alarm Statistics by NE


This function lists the alarms of elements connected to the U31 R22 system based on
severity level.

Steps
1. From the main menu, select Fault > Alarm Monitoring by NE. The Alarm Monitoring
by NE tab is displayed.

3-69

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

The Alarm Monitor by NE tab lists the counts of critical alarms, major alarms, minor
alarms and warnings of each NE as well as the total count of alarms.
– End of Steps –

3.11.8 Monitoring the Alarm Statistics by NE Type


The U31 R22 system can count the active alarms of all severity levels by NE type in the
managed network.

Steps
1. From the main menu, select Fault > Alarm Monitoring by NE Type. The Alarm
Monitoring by NE Type tab is displayed.
The Monitor Alarms by NE Type tab lists the counts of critical alarms, major alarms,
minor alarms and warnings of each NE type as well as the total count of alarms.
– End of Steps –

3.12 Alarm Task Management


For a description of common alarm tasks, refer to Table 3-12.

Table 3-12 Common Alarm Tasks

Task Description

9.2.1.5 Backing Up and Deleting Alarm Data This task allows users to manually back up or
delete historical alarms and events.

9.3.1.3 Restoring Alarm Data This task allows users to manually restore
historical alarms and events.

11.5 Backing up and Deleting Alarm Data This task can automatically back up or delete the
alarm data regularly.

3.12.1 Creating a Scheduled Statistic Task This task collects alarm statistics in accordance
with the rule of statistic templates.

3.12.2 Creating a Scheduled Export Task This task filters alarms periodically in accordance
with the user-defined conditions, and saves the
results as files.

3.12.3 Creating a Suppressing Plan Task This task suppresses the alarms generated during
tasks such as project cutover and switchover.

3.12.1 Creating a Scheduled Statistic Task


This procedure describes how to create a scheduled statistic task. This task periodically
collects alarm statistics in accordance with rules defined in a statistic template, and saves
the results as files to the U31 R22 server or uploads the files to the FTP server.

3-70

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Prerequisite
You have the user permission of "Supervisor Role" or above.

Steps
1. From the main menu, select Fault > Timing Statistic Task Management. The Timing
Statistic Task Management tab is displayed.

Note:
You can suspend, activate, modify, delete, and refresh the created task displayed on
the tab.

2. Click . The Timing Statistic Task dialog box is displayed.


3. Set scheduled statistic task parameters. For the parameter descriptions, refer to Table
3-13.

Table 3-13 Parameter Descriptions for a Scheduled Statistic Task

Parameter Description

Task Name Enter a customized name for the scheduled


statistic task.

Template Name Select a task template for alarm statistics. You


can click View for specific rule descriptions.

Predefined Start Time Set the time when the alarm statistics starts.

Predefined End Time Set the time when the alarm statistics ends.

Task Status Status of the historical alarms in the statistic


period: Activated or Suspended.

File Type Format of the generated file: CSV, XML, XLS


(the template of this format can be customized),
or TXT.

Task Execution Plan Cycle of the task: By Day, By Week, By


Month, or Custom (you need to set the period
manually).

Note:
By default, the statistic results are saved in the following directory: \ppus\uca.ppu
\uca-fm.pmu\statistic\.

3-71

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

4. (Optional) You can forward the results through an email or save them as a file on the
FTP server.
a. Click Advanced Settings. The Advanced Settings dialog box is displayed.
b. Forward the results as an email or save the results on the FTP server. For the
advanced settings, refer to Table 3-14.

Table 3-14 Advanced Settings

Parameter Setting

Email Forward i. Click Enable to change the Email For-


ward tab into the editable status.

ii. Set the parameters of Email Address,


Email Subject, and Email Content.
The results will be forwarded to the preset
email address.

FTP Push Click Enable to change the FTP Push tab


into the editable status.
i. Set Protocol Type, IP Address, Port,
and Sub Folder.

ii. Enter the user name and the password.


You can also select Anonymous to per-
mit anonymous login.

iii. Click Test Connection to test the FTP


server connection.

iv. Click Select to specify a subdirectory to


save the statistic results.
The statistic results will be uploaded to
the FTP server and saved in the specified
subdirectory.

c. Click OK to return to the Timing Statistic Task dialog box.


5. Click OK.
– End of Steps –

3.12.2 Creating a Scheduled Export Task


This procedure describes how to create a scheduled export task. A scheduled export task
filters the equipment and the service alarms in accordance with the preset conditions, and
saves the results as files into the U31 R22 server or uploads the files to the FTP server.

Prerequisite
You have the user permission of "Supervisor Role" or above.

3-72

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Steps
1. From the main menu, select Fault > Timing Export Task Management. The Timing
Export Task Management tab is displayed.

Note:
You can suspend, activate, modify, delete, and refresh the created task displayed on
the tab.

2. Create a scheduled export task.

To... Do...

Create a scheduled export task


Click . The Timing Export Task dialog box is displayed.
for equipment alarms

Create a scheduled export task


Click . The Northbound Timing Export Task dialog box is
for northbound alarms
displayed.

Create a scheduled export task


Click . The Service Alarm Timing Export Task dialog box is
for service alarms
displayed.

3. Click the Basic tab, and set the parameters. For the parameter descriptions, refer to
Table 3-15.

Table 3-15 Parameter Descriptions for a Scheduled Export Task

Parameter Description

Task Name Enter a customized name for the scheduled export task.

Output Type Select the alarm type to be filtered: Active Alarms or History
Alarms.

Start Time Set the time when the alarm statistics starts.

End Time Set the time when the alarm statistics ends.

Task Status Status of the historical alarms in the statistic period: Activated
or Suspended.

File Type The parameter is available only in the Timing Export Task and
Service Alarm Timing Export Task dialog boxes.
Format of the generated file: CSV, XML, XLS (the template of this
format can be customized), or TXT.

3-73

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Description

Task Execution Plan The parameter is available only in the Timing Export Task and
Service Alarm Timing Export Task dialog boxes.
Cycle of the task: By Day, By Week, By Month, By Period (only
available to Active Alarms), or Custom (you need to set the period
manually).

Period Setting The parameter is available only in the Northbound Timing


Export Task dialog box.
Task execution period.

4. Click the Condition tab, and set the parameters on the Location or Service sub-tab.

To... Do...

Create a scheduled export


On the Location sub-tab, select an NE. When an alarm is generated
task for equipment alarms or
on the selected NE, the system displays an alarm message.
northbound alarms
l All NEs: Click the All NEs option button. When an alarm is
generated on any NE, the system displays an alarm message.
l Specific NEs: Click the Specific NEs option button, select an
NE from the list, and click or . An alarm message is
displayed only when an alarm is generated on the specified NE.

Create a scheduled export


On the Service sub-tab, click the Add button, and select the required
task for service alarms
service in the displayed Select Service dialog box.

5. On the Alarm Code sub-tab, select an alarm code. When the alarm of the selected
code is generated on the NEs, the system gives an alarm prompt.
l All Codes: Click the All Codes option button. When any alarm is generated on
the NEs, the system gives an alarm prompt.
l Specific Codes: Click the Specific Codes option button. Select an alarm from
the list, and click . An alarm prompt is given only when the alarm of the
specified code is generated on the NEs.

6. On the Time sub-tab, set the raised time and acknowledged time/unacknowledged
time of the alarm.

7. On the Others sub-tab, set the alarm type, data type, acknowledged state, NE IP, and
remark.

8. (Optional) Set the FTP server in the Timing Export Task and Service Alarm Timing
Export Task dialog boxes.

a. On the Basic tab, click Advanced Settings. The Advanced Settings dialog box
is displayed.
b. Save the exported file on the FTP server as described in Table 3-16.

3-74

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 3 Alarm Management

Table 3-16 FTP Server Parameter Setting

Parameter Setting

Enable Select it to enable the FTP server to receive


the files.

Protocol Type Select the protocol type of the FTP server:


FTP or SFTP.

IP Address Enter the IP address of the FTP server.

Port Enter the port number of the FTP server.

User Name Enter the user name to log in to the FTP


server.

Password Enter the password to log in to the FTP


server.

Anonymous Select Anonymous to permit anonymous


login.

Test Connection Click Test Connection to test the connection


to the FTP server.

Sub Folder Click Select to specify a subdirectory to save


the statistic results on the FTP server.

c. Click OK to return to the Timing Export Task dialog box.


9. Click OK.

– End of Steps –

3.12.3 Creating a Suppressing Plan Task


This procedure describes how to create a suppressing plan task. A suppressing plan task
suppresses the alarms generated during tasks such as cutover and switchover.

Prerequisite
You have the user permission of "Supervisor Role" or above.

Steps
1. From the main menu, select Fault > Suppress Plan Task Management. The
Suppress Plan Task Management tab is displayed.

3-75

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
You can suspend, activate, modify, delete, and refresh the created task displayed on
the tab.

2. Click . The Suppress Plan Task dialog box is displayed.


3. On the Basic tab, set the parameters. For the parameter descriptions, refer to Table
3-17.

Table 3-17 Parameter Descriptions for a Suppressing Plan Task

Parameter Description

Task Name Enter a customized name for the suppressing


plan task.

Task Type Select the engineering task type: Rearrange


Test, Resect and Joint, or Others.

Task Status The status of the created task: Activated or


Suspended.

Do not send the suppressed alarms to the Click the check box and the suppressed alarms
upper system will not be sent to the upper system.

Task Period Select the effective period of the suppressing


plan task.
l Effective Temporarily: The task is
temporarily effective in the period.
l Effective Everyday: The task is effective in
the period per day.

Detail Enter the specific information of the


suppressing plan task, such as the alarm type
to be suppressed and the information of the
engineering task.

4. Click the NE tab to set the NEs to be suppressed.


l All NEs: Click the All NEs option button. When an alarm is generated on any
NE, the system suppresses the alarm.
l Specific NEs: Click the Specific NEs option button. Select an NE from the list,
and click or . The system only suppresses the alarm generated on the
specified NE.

5. Click OK.

– End of Steps –

3-76

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4
Performance Management
Table of Contents
Performance Management Overview..........................................................................4-1
Performance Settings.................................................................................................4-6
Introduction to Measurement Task Management ......................................................4-15
Template Task Management.....................................................................................4-26
Performance Data Query..........................................................................................4-50
Real-Time Traffic Management.................................................................................4-69
Counter and Index Management ..............................................................................4-74
Threshold Tasks Management..................................................................................4-85

4.1 Performance Management Overview


The U31 R22 system provides a diversity of performance management functions for
monitoring the operation status of microwave transmission equipment to ensure the
efficiency, stability, and security of the managed network. It collects performance
data from the network, analyzes the collected data, and then provides the network
administrator with sufficient and complete information for the operation and maintenance
of the network. The network administrator can make appropriate operation policies based
on the network status to guarantee high-efficiency operation of the network.
The performance management functions of the U31 R22 can be grouped into the following
four types:
l Customization of Data Collection Tasks
By customizing a data collection task, you can enable the system to collect specific
performance data.
l Performance Data Collection
The system collects performance data and stores the collected data in its database in
accordance with predefined performance tasks.

l Performance Data Query


The system supports the query of performance data that has been collected and
stored in the database. It displays the query result on the client interface.

l Performance Threshold Management


The system supports the setting of upper and lower thresholds for key performance
indexes. Once the value of an index is higher than the upper threshold or lower than

4-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

the lower threshold, the fault management module of the system can raise a threshold
crossing alarm.

4.1.1 Term Overview


The following explains the basic concepts for your better understanding of performance
management operations described in this manual.
l Measure Object
Measure object can be a physical entity, a logic entity, or the combination of physical
entities and logic entities that need to be measured.
l Measurement Type
Measurement type is a basic element of measurement that supports the measurement
of different indexes of a measure object. Different measure objects involve different
measurement types. You can select a measurement type for a measurement
according to the indexes you want to measure.
l Counter
Counter is a specific measurement index involved in a measurement type. Each
measurement type has a number of measurement indexes.
l Collection Granularity
Collection granularity refers to the cycle of collecting data from boards in network
devices. The collection granularity can be set to 5 minutes, 15 minutes, or 1 hour.

Note:
The U31 R22 only supports the collection granularity of 15 minutes.

l Calculation Index
Calculation index is used to evaluate equipment performance. It is the arithmetic result
of related measurement items. The system already presets some calculation indexes
for generic applications.
l QoS
Quality of Service (QoS) is a network security mechanism and technology used
to solve network delay and congestion problems. It prevents important services
from being delayed or discarded when the network is overloaded or congested, and
therefore guarantees high-efficiency operation of the network.
l Measurement Task
Measurement task refers to a user-defined performance measurement task. After you
schedule and activate a measurement task, the system will automatically collect the
values of required performance parameters in accordance with the preset cycle. You

4-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

can know the network status by observing the performance statistics provided by the
system.
l Threshold Task
Threshold task, also called QoS task, reflects the service quality of network devices.
A threshold task is used to monitor the values of specific performance indexes. When
the calculated value of an index exceeds the upper threshold or lower than the preset
lower threshold preset in the task, a threshold crossing alarm is raised. When the
calculated value during a later measurement period is within the threshold range, the
threshold crossing alarm is cleared.

4.1.2 Performance Monitoring Scheme


The performance monitoring scheme of the ZXCTN is shown in Figure 4-1.

Figure 4-1 Performance Monitoring Scheme

4-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

4.1.3 Performance Management Window


The Performance Management window is shown in Figure 4-2.

Figure 4-2 Performance Management View

1. Main menu 4. Performance data display 5. Performance management


2. Main toolbar area toolbar
3. Navigation tree

Performance Menu
To use performance management functions, select corresponding commands on the
Performance menu, see Figure 4-3.

4-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Figure 4-3 Performance Menu

Performance Management Buttons on Main Toolbar


The main toolbar in the client window provides some shortcut buttons related to
performance management functions. You can click them to open corresponding
management tabs quickly.
Table 4-1 describes the functions of the performance-related buttons on the main toolbar.

Table 4-1 Performance Management Buttons on the Main Toolbar

Button Function

Performance Data Query

Real-time Data Query

Navigation Pane
The navigation pane in the client window varies with the active management view
displayed in the window. In the performance management view, the navigation pane
provides different topological trees to facilitate performance management operations.
On the top of the navigation pane are three tabs: Model Management, NE Tree, and
Template Management.
The following introduces the three tabs of the navigation pane in the performance
management view.
l On the Model Management tab, the Resource Type tree lists all the performance
measurement types and counters of all managed NEs in the system.
l On the NE Tree tab, a navigation tree lists all managed NEs in the system.

4-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l On the Template Management tab, the Template Management tree lists all available
templates that can be used for performance data query.

Performance Management Toolbar


The performance management toolbar varies with the active tab displayed in the
performance management view. It provides a number of shortcut buttons for quick
operations. Table 4-2 only introduces two common buttons on the toolbar.

Table 4-2 Common Buttons on the Performance Management Toolbar

Button Function

Select columns for displaying corresponding parameters in the performance


display pane.

Search for specific tasks or performance data in accordance with the


entered keyword.

4.2 Performance Settings


4.2.1 Setting Performance Module Parameters
This procedure describes how to set the performance module parameters of the login user
or all users. Parameters for the login user can be valid after logging in to the EMS again.

Steps
1. From the main menu, select System > Preferences. The Preferences dialog box is
displayed.
2. In the Preferences navigation tree, select Performance > Performance
Management Preferences. The performance module parameter setting interface is
displayed on the right.
3. To set parameters, refer to Table 4-3.

Table 4-3 Performance Module Parameter Setting

Parameter Description

Default display status in The meaning of each item is described below.


Measurement task management l All current tasks: all measurement tasks are
displayed.
l Current tasks-Activated: measurement tasks
activated are displayed.
l Current tasks-Suspended: measurement tasks
suspended are displayed.

4-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Parameter Description

l Current tasks-Deletion error: measurement tasks


whose consistency statuses are "Deletion error" are
displayed.
l Current tasks-Inconsistent: measurement tasks
whose consistency statuses are "Inconsistent" are
displayed.
l History tasks: history measurement tasks are
displayed.
l All tasks: all current and history measurement tasks
are displayed.

Default display status in The meaning of each item is described below.


Threshold task management l Activated tasks: Activated threshold tasks are
displayed.
l Suspended tasks: Suspended threshold tasks are
displayed.
l All tasks: All threshold tasks are displayed.

Date format in Files generated by Time display format in the performance query result.
template tasks

Show index in Counter and index The meaning of each item is described below.
management l All indexes: All performance indexes are displayed.
l Frequently used indexes: Indexes Frequently used
are displayed.

4. Click OK.
– End of Steps –

4.2.2 Configuring the Performance Mask


This procedure describes how to set unconcerned performance items from being reported
to the U31 R22. A masked performance item will not be reported to the U31 R22, but the
performance value is still counted.

Context
The default status of each performance item is unmasked.

4-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
The board does not report any masked performance item to the NMS and this will affect
normal supervision of network operation. Therefore, performance mask in network
operation should be avoided or this operation should be canceled in time once the
operation goal is achieved.

Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the navigation tree in the left pane, select NE Operation > Performance
Configuration > Performance Mask Configuration. The Performance Mask
Configuration area is displayed.
3. On the By Resource tab in the right pane, expand all performance items contained
by the cards configured in the NE to set the Mask Status.
l Select Mask Status: This performance item is masked.
l Clear Mask Status: This performance item is not masked.
4. Click Apply. A message box is displayed.
5. Click OK.
– End of Steps –

4.2.3 Setting Performance Thresholds


By setting performance thresholds, you can modify the digital performance thresholds of
the CTN NEs.

Context
Digital performance threshold is classified into 15-minute performance threshold and
24-hour performance threshold by the performance measurement period.
l 15-minute digital performance threshold has two performance threshold settings.
à Uni-threshold: In a period of 15 minutes, when a performance value exceeds
the maximum threshold, the system will automatically raise the performance
threshold crossing alarm. When each 15-minute period arrives, the alarm is
displayed, and all the performance values will be cleared and will be counted
from zero again.
à Bi-threshold: In a period of 15 minutes, when a performance value exceeds
the maximum threshold, the system will automatically raise the performance
threshold crossing alarm. When each 15-minute period arrives, the alarm is
displayed, and all the performance values will be cleared and will be counted

4-8

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

from zero again. When in another 15-minute period, the performance count is
lower than the minimum threshold from the start to the end, the system will raise
the performance threshold crossing alarm after 15 minutes.
l Digital 24-hour performance threshold: The 24-hour threshold is a uni-threshold. In a
period of 24 hours, when a performance value exceeds the maximum threshold, the
system will automatically raise the performance threshold crossing alarm. When the
period ends, the alarm is displayed, and all the performance values will be cleared
and will be counted from zero again.

Steps
1. In the Topology Management window, right-click an NE, and then select NE
Management from the shortcut menu. The NE Management window is displayed.
2. In the left navigation tree, select NE Operation > Performance Configuration
> Digital Performance Threshold Configuration. The Digital Performance
Threshold Configuration area is displayed.

3. From the Performance Granularity list in the right pane, select 15 minutes or 24
hours.

4. Expand the performance items, and double-click the parameters of Low, Pre-warning
Low, Pre-warning High, and High.

5. (Optional) Click to expand all performance items.


6. (Optional) Click Default to set the threshold parameters to the default values.
7. (Optional) Click Applyto to apply the threshold configuration of this NE to other NEs.
8. Click Apply. A message box is displayed.
9. Click OK.
– End of Steps –

4.2.4 Configuring Analog Performance Thresholds


This procedure describes how to set analog performance thresholds, including the low,
pre-warning low, pre-warning high, and high thresholds. The setting is applicable for CTN
and SDH NEs.

Steps
1. In the Topology Management window, right-click an NE, and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the navigation tree on the left, select NE Operation > Performance Configuration
> Analog Performance Threshold Configuration. The Analog Performance
Threshold Configuration area is displayed.

3. From the Select Board list, select the board to be configured.

4-9

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

4. Expand the performance items and set Low, Pre-warning Low, Pre-warning High,
and High for each item.

Note:
l You can click Default to set all performance items to their default values.
l (Optional) For a CTN NE, you can click Current Board Value to set all
performance items to their current board values.

5. Click Apply. A message box is displayed.

6. Click OK.
– End of Steps –

4.2.5 Setting Default Thresholds for Optical Modules


This procedure describes how to set default thresholds for optical modules. The default
thresholds can also be applied to other NEs. You can import a configuration file to modify
the default threshold parameters.

Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the navigation tree on the left, select NE Operation > Maintenance Management
> Optical Default Threshold Configuration. The Optical Default Threshold
Configuration area is displayed.
3. Perform the corresponding operations as required.

To... Do...

Apply the default Click the Apply button.


settings

Apply the settings to Click the Apply to... button.


other NEs

Import a prepared Click the Import button.


configuration file

– End of Steps –

4.2.6 Setting the CTN Performance Threshold in Batches


This procedure describes how to set the digital and analog performance thresholds of
multiple NEs at the same time.

4-10

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Prerequisite
Devices whose thresholds require to be set are online.

Steps
1. From the main menu, select Maintenance > BN NE Maintenance > CTN
Performance Threshold Batch Configuration. The CTN Performance Threshold
Batch Configuration window is displayed.
2. To set digital performance thresholds, perform the following operations.
a. In the Digital tab, select the performance items to be set from the Selectable item
navigation tree.

b. Click to move the performance items to the table on the right.

c. Select Performance Granularity.


d. In the table, set Low, Pre-warning Low, Pre-warning High, and High of each
performance.
e. Click Select NE..., and then select NEs in the Resource Selector dialog box.

f. Click Apply.
3. To set analog performance thresholds, perform the following operations.
a. In the Analog tab, select the performance items to be set from the Selectable
item navigation tree.

b. Click to move the performance items to the table on the right.


c. In the table, set Low, Pre-warning Low, Pre-warning High, and High of each
performance.
d. Click Select NE..., and then select NEs in the Resource Selector dialog box.
e. Click Apply.
4. (Optional) Import the template performance data as required.

To... Do...

Import the default Click Import, and then select Import Default Template.
performance threshold
data

Import the data through Click Import, and then select Import from File. Select the file in
the file the displayed dialog box.

5. (Optional) Export the performance data as a template: Click Export..., and then select
the storage path in the displayed dialog box. Click Export.

– End of Steps –

4-11

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

4.2.7 Configuring Zero Performance Suppression


You may choose to suppress all the current zero performance data or to suppress all
the history zero performance data. After setting the suppression conditions, all the zero
performance data meeting the requirements can be prevented from being sent to the NMS.

Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management dialog box is displayed.
2. In the navigation tree in the left pane, select NE Operation > Performance
Configuration > Zero Performance Suppression Configuration. The Zero
Performance Suppression Configuration area is displayed.
3. Select a board from the Select Card list.

Note:
l For the SNMP devices in earlier versions, the zero performance suppression
function can be configured on boards. Thus, you can select a board in this step.
l For the QX interface and nectconf interface devices, the zero performance
suppression function can be configured on NEs. You cannot select a board in
this step.
l If you do not set zero performance suppression, the NMS performance will be
affected.
l WDM NEs only support History 15-minute zero performance suppression.

4. Set the Suppression Status.


l Select Suppression Status: The zero performance of selected card is
suppressed.
l Clear Suppression Status: The zero performance of selected card is not
suppressed.
5. Click Apply. A message box is displayed.
6. Click OK.
– End of Steps –

4.2.8 Clearing the Performance Counter


The NCP board clears the records of local performance counter in accordance with the
clearing command from Manager, and the performance statistics will be relaunched.

Context
There are two clearance modes: Digital Counter Clearance and Analog Counter
Clearance.

4-12

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

l Digital Counter Clearance: Clear the current values of all performance items and start
to collect data from zero.
l Analog Counter Clearance: Set all performance values (maximum value, minimum
value and current value) to the current values.

Steps
l Clear the performance counter in the NE Management window.
1. In the Topology Management window, right-click an NE and select NE
Management from the shortcut menu. The NE Management window is
displayed.
2. In the navigation tree in the left pane, select NE Operation > Performance
Configuration > Performance Counter Clear. The Performance Counter
Clear area is displayed.

3. Select 15 minutes performance or 24 hours performance from the


Performance Granularity list.
4. Select the performance item from the Unselected Items list.

5. Click to move the selected performance item to the Selected Items list.

Note:
Click All Clear to move all performance items from the Unselected Items list to
the Selected Items list.

6. Click Apply. A message box is displayed.


7. Click OK.
l Clear the performance counter in the Current Performance Data Query window.
1. Open the Current Performance Data Query window.
2. Right-click one or multiple performance entries, and select Performance Counter
Clear from the shortcut menu.

3. Click the button on the toolbar to refresh the current performance.

In the Current Performance Data Query window, all digital performances are
recollected from 0. All analog performances (maximum, minimum, and current
values) are displayed in the current values.

– End of Steps –

4-13

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

4.2.9 Setting Performance Rendering


Performance rendering is described as follows: The system performs the corresponding
logic calculation on the selected indexes or counters, and then filters according to the logic
operation results. If the results are true, the query results are displayed and the indexes
or counters are rendered with different colors to remind the user.

Context
When a user requires to focus on parameter values of one or multiple performance items,
the user can set the threshold values, corresponding background colors, and font colors for
these performance items with the performance rendering function. When the performance
parameter value meets the threshold, the performance data is displayed in the preset
background rendering color and font rendering color to remind the user that the parameter
value of the performance item reaches the threshold.

Steps
1. From the main menu, select Performance > History Performance Data Query. The
History Performance Data Query dialog box is displayed.
2. On the Index/Counter Selection tab, set index/counter selection parameters. For the
parameter descriptions, refer to Table 4-4.

Table 4-4 Descriptions for Parameters on the Index/Counter Selection Tab

Parameter Description

NE type Selects the NE type to be set in the drop-down list.

MO type It is unnecessary to set this parameter.

MO type Uses the default value checkpoint.

Available Expands each node, and then selects the performance items to be
indices/counters rendered.

Selected Displays the performance items selected from Available


indices/counters indices/counters, for example, CPU utilization.

3. Click the Logic button. The Logical Filtering/Rendering dialog box is displayed.

4. Select And or Or from Filter type.


l And operation: The system displays the query result only when the result of logic
operation set for each index or counter in the list is true.
l Or operation: The system displays the query result as long as the result of logic
operation set for one index or counter in the list is true.

5. Set Index/Counter as required, and then set Filter Operator and Filter Value to
define the filtering conditions, see Figure 4-4.

4-14

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Figure 4-4 Logical Filtering /Rendering Dialog Box

6. Click Rendering. The Threshold Rendering dialog box is displayed, see Figure 4-5.
Set the threshold value and rendering color for each threshold.

Figure 4-5 Threshold Rendering Dialog Box

7. Click OK to complete the configuration of filtering and rendering for each counter and
index.
8. Click OK.

– End of Steps –

4.3 Introduction to Measurement Task Management


You can create a performance check template in a measurement task. The performance
object and NE that need to be detected and the check time must be defined in the template.
The system will automatically collect the specified performance data in accordance with
the template and generate a network performance statistics result. In this way, you can
learn of the operational status of the network.

To open the Measurement Task Management tab, select Performance > Measurement
Task Management from the main menu. The Measurement Task Management tab is
displayed in the performance management view.

4-15

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Some buttons on the performance management toolbar of the Measurement Task


Management tab are unavailable. To activate those buttons, click a specific measurement
task in the measurement task list.
Table 4-5 describes the functions of the buttons on the performance management toolbar.

Table 4-5 Description of Toolbar Buttons on the Measurement Task Management Tab

Button Function Note

Create a measurement task. -

Modify a measurement task. Select a suspended task to activate


this button.

Delete a measurement task. Select a suspended task to activate


this button.

Activate a suspended measurement Select a suspended task to activate


task. this button.

Suspend an active measurement Select an active measurement task


task. in coherence status to activate this
button.

View the information of a Select a measurement task to activate


measurement task. this button.

View the coherence status of a Select a measurement task to activate


measurement task. this button.

Synchronize a measurement task Select a measurement task to activate


from the server to related network this button.
elements.

Refresh the measurement task list. -

Import a measurement task. -

Export a measurement task. Select a measurement task to activate


this button.

Check the integrity of a measurement -


task.

4.3.1 Creating a Measurement Task


This procedure describes how to collect performance data of the NEs in accordance
with the NE measurement task customized by the user. The NEs transmit the collected
performance data to the NMS in files.

4-16

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Prerequisite
The Measurement Task Management tab is displayed.

Context
One device type can only have one measurement task.

Steps
1. On the Measurement Task Management tab, perform one of the following operations
to open the Create Measurement Task dialog box.
l On the performance management toolbar, click .
l On the NE Tree tab, right-click a managed element, and then select Create
Measurement Task from the shortcut menu.
l In the measurement task list, right-click an existing task, and then select Create
Measurement Task from the shortcut menu.

2. On the Measurement Task tab, click the Measurement Task tab to configure the
parameters.

Parameter Description Setting Instruction

NE Type Measure the NE type of the task It is the NE type of the device

MO Type It is the type of the object to be Measure object type is also the manage
measured object type

PO Type It is the performance object of the It is composed of


measure task

Task Type There are two types of task types: Normal: You can select the performance
l Normal object
l ALL-PO ALL-PO: Create the task of all
performance objects belong to the
measure object type, and you do not
need to select the performance object.

3. Click the Location tab, and then set the parameters.

Parameter Description

Wildcard Level By selecting a wildcard level, you can select MO(s) in batch quickly. It
varies with the previously selected NE type and MO type. You can select
the NE location and the measure object in accordance with the needs of
the selected wildcard level.

NE Location Select the NE(s) you want to measure on the NE tree.


Selected

MO Location Select the MO(s) you want to measure on the MO tree.


Selected

4-17

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

4. Click the General tab, and then set the general information of the measurement task.

Parame- Description Setting Instruction


ter

Creator The default creator of the measurement -


task is the current login user of the client.

Task Name of the measurement task. Clearly describe the measurement task.
name The name cannot be the same as any
existing measurement task name.

Start time Set the start time of the period during Be sure that the start time is later than
which the measurement task will take the current system time of the client.
effect.

End time Set the end time of the period during Be sure that the end time is later than
which the measurement task will take the start time.
effect.

Status Select the status of the measurement If Suspend is selected, the


task from the drop-down box: Active or measurement task will not take
Suspend. effect after successful creation.

Granular- The collection granularity determines Select the data collection cycle: 15
ity the cycle of data collection from minutes.
corresponding boards.

Effective Set the exact implementation date of the Set the data in accordance with weeks
Date measurement task, weekly or monthly. or months. You can click the date to
Every day is selected by default. delete it.

Effective Set the time periods when the The time section can be one day or a
Time measurement task shall be performed period in one day.
during a day.

5. Click OK.
l The created measurement task is displayed in the measurement task list on the
Measurement Task Management tab.
l If the measurement task is active, the NE(s) collects required performance data
and transfers the collected data in the format of file to the U31 R22 in accordance
with the requirements of the measurement task.

– End of Steps –

4.3.2 Modifying a Measurement Task


This procedure describes how to modify a measurement task, including performance
object, wildcard level, NE position, measurement object position, task name, task start
time, end time, collection granularity, valid data, and valid period.

4-18

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Prerequisite
l The Measurement Task Management tab is displayed.
l The target measurement task to be modified is suspended and its consistency status
is normal.

Context
l You can only modify the time information when the current time is earlier than the time
that the measurement task starts.
l An active measurement task can be suspended only when its consistency status is
normal. Only a suspended task can be modified.
l The origin of the measurement task to be modified is client. That means the
measurement task is manually created by a user on a client.

Steps
1. On the Measurement Task Management tab, perform one of the following operations
to open the Modify Measurement Task dialog box.
l Select the measurement task from the measurement task list, and then click
on the toolbar.
l Right-click the measurement task in the measurement task list, and then select
Modify Measurement Task from the shortcut menu.
2. On the Measurement Task tab, modify the selection of PO(s) as needed.
3. Click OK.
– End of Steps –

4.3.3 Deleting a Measurement Task


This procedure describes how to delete a suspended measurement task. One or multiple
measurement tasks can be deleted at one time.

Prerequisite
l The Measurement Task Management tab is displayed.
l The measurement task to be deleted is suspended and its consistency status is
normal.

Note:

An active measurement task can be suspended only when its consistency status is normal.
And only a suspended task can be modified.

4-19

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. On the Measurement Task Management tab, perform one of the following operations
to open the Delete Measurement Task dialog box.
l Select the measurement task from the measurement task list, and then click
on the toolbar.
l Right-click the measurement task in the measurement task list, and then select
Delete Measurement Task from the shortcut menu.

Note:
To delete multiple measurement tasks at a time, press and hold Ctrl, and then click
the measurement tasks individually. After selecting all those measurement tasks, click
on the toolbar.

2. Click Yes. The system deletes the performance measurement task.


– End of Steps –

4.3.4 Activating a Measurement Task


When a measurement task is suspended, if the system needs to collect NE performance
data in accordance with the task rules, the measurement task must be activated.

Prerequisite
l You have the authority of measurement task management.
l The Measurement Task Management tab is displayed.
l The measurement task you want to activate is suspended.

Context
After the task is activated, the U31 R22 queries the performance data of the scheduled
time on the NEs and stores the data in the database.
In addition, the system checks the consistency status of each NE measurement task
involved in the measurement task. If the consistency status of an NE measurement task
is abnormal, the system deems that the activation of the measurement task fails.
Multiple measurement tasks of the same type can be activated or suspended at a time.

Steps
l Right-click the measurement task in the measurement task list, and then select
Activate Measurement Task from the shortcut menu.
l Select the measurement task from the measurement task list, and then click on
the toolbar.

4-20

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Note:
If multiple measurement tasks are activated at the same time, task origin of the multiple
measurement tasks must be consistent.

– End of Steps –

4.3.5 Suspending a Measurement Task


A suspended measurement task indicates that data collection stops. The system does not
collect performance data for a target NE in a scheduled collection time of the task.

Prerequisite
l The Measurement Task Management tab is displayed.
l The measurement task you want to suspend is active.
l The consistency status of the measurement task is normal.

Context
Only an active measurement task with normal consistency status can be suspended.
You can suspend the measurement tasks only from the client.
You can suspend multiple active measurement tasks of the same type at a time when the
origins of these tasks are the same.

Steps
l Right-click the measurement task in the measurement task list, and then select
Suspend Measurement Task from the shortcut menu.
l Select the measurement task from the measurement task list, and then click on
the toolbar.

Note:
If multiple measurement tasks are suspended at the same time, task origin of the
multiple measurement tasks must be consistent.

– End of Steps –

4.3.6 Viewing a Measurement Task


This procedure describes how to view the information of a measurement task.

4-21

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Prerequisite
l The Measurement Task Management tab is displayed.
l The measurement task to be viewed exists on the Measurement Task Management
tab.

Steps
1. On the Measurement Task Management tab, perform one of the following to open
the View Measurement Task dialog box.
l Double-click the measurement task in the measurement task list.
l Right-click the measurement task in the measurement task list, and then select
View Measurement Task from the shortcut menu.
l Select the measurement task in the measurement task list, and then click on
the toolbar.
2. In the View Measurement Task dialog box, the measurement task, location selection,
and basis information are displayed.
– End of Steps –

4.3.7 Checking the Consistency Status of a Measurement Task


This procedure describes how to check the consistency status of a measurement task.
Task consistency status is used to check whether a measurement task on the client and the
NE are consistent. If the task exists on the client but not on the NE, the task consistency
status is abnormal.

Prerequisite
The Measurement Task Management tab is displayed.

Steps
1. To open the View Consistency Status dialog box, perform one of the following
operations:
l Select the measurement task from the measurement task list, and then click
on the toolbar.
l Right-click the measurement task in the measurement task list, and select View
Consistency Status from the shortcut menu..
l Click the Consistency Status column in the measurement task management list.

2. View the measurement task status of NEs.

Button Function

View the details of an NE measurement task.

Synchronize an NE measurement task to corresponding NE.

4-22

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Button Function

Synchronize all NE measurement tasks to corresponding


NEs.

Delete an NE measurement task.

Delete all NE measurement tasks in the inconsistent status.

View the NE measurement tasks in the previous page.

View the NE measurement tasks in the next page.

3. Double-click a row in the list of the Consistency Status dialog box. The Detail dialog
box is displayed, indicating the details of the task.
– End of Steps –

4.3.8 Synchronizing a Measurement Task


If the parameters in the performance check task of an NE are inconsistent with those in
the measurement task template, the parameters in the template must be synchronized to
the NE task to ensure that both the parameters are consistent.

Prerequisite
The Measurement Task Management tab is displayed.

Steps
l To synchronize the measurement task, perform one of the following operations:
à Right-click the measurement task, and then select Synchronize Measurement
Task from the shortcut menu.

à Select the measurement task, and then click on the toolbar.

The system starts synchronizing the measurement task from the server to
corresponding NE(s). And after the completion of synchronization, a message
indicating the synchronization result is displayed on the status bar of the client
window.

– End of Steps –

4.3.9 Refreshing Measurement Tasks


Multiple users can manage a network via different clients connected to the U31 R22
server. If another user performs some operations related to measurement tasks, for
example, create a new measurement task, you may not immediately view the changes
of measurement tasks on your client due to the response time between the server and

4-23

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

different clients. In this case, you can refresh the measurement task list to synchronize
the latest information of measurement tasks from the server to your client.

Prerequisite
The Measurement Task Management tab is displayed

Steps
l To refresh the measurement task, perform one of the following operations:
à Right-click any measurement task in the measurement task list, and then select
Refresh Measurement Task from the shortcut menu.

à Click on the toolbar.

The local client synchronizes the latest measurement task information from the server
and then refreshes the measurement task list.
– End of Steps –

4.3.10 Importing a Measurement Task


The measurement tasks (*.xml or *.zip files) that are defined in advance can be imported.

Prerequisite
l The Measurement Task Management tab is displayed.
l The measurement task file to be imported is prepared.

Context
Make sure that the name of each measurement task defined in the *.xml or *.zip file is
different from those of existing measurement tasks in the system. A measurement task
with the same name as an existing task in the system cannot be imported.

Steps
1. On the Measurement Task Management tab, click the drop-down button on the
toolbar.

2. Select Import the File or Import the File and Use it as Template from the list. The
Import Measurement Task dialog box is displayed.
3. Perform one of the following operations as required.

4-24

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

To... Do...

Import the file Select the file to be imported, and click the Open button.

Import the file and


i. Select the file to be imported, and click the Open button. The Import
use it as template
Measurement Task dialog box is displayed.

ii. View the parameters of the measurement task in the file, and modify the
parameters that can be modified as required.

If the file includes multiple measurement tasks, the system displays the
Import Measurement Task dialog box for each measurement task. You
can modify the parameters of each measurement task as required. The file
is successfully imported only when all the measurement tasks are modified.

iii. Click OK. A message box is displayed.

iv. Click OK.

– End of Steps –

4.3.11 Exporting a Measurement Task


This procedure describes how to export a measurement task. The exported measurement
task is a ZIP file.

Prerequisite
l The Measurement Task Management tab is open.
l There is at least one measurement task to be exported.

Steps
1. On the Measurement Task Management tab, perform one of the following operations
to open the Export Measure Task dialog box.
l Right-click the measurement task, and then select Export Measurement Task
from the shortcut menu.
l Select the measurement task, and then click on the toolbar.

Note:

To export multiple measurement tasks, press and hold Ctrl and then click those tasks
individually. After selecting all those measurement tasks, click on the toolbar.

2. In the Export Measure Task dialog box, set the path for saving the file, the file name,
and file type.

4-25

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3. Click Save. The selected measurement task is exported to the specified directory.
– End of Steps –

4.3.12 Re-collecting Performance Data


If the performance data collected in accordance with a measurement task is incomplete,
you can re-collect the performance data on the client.

Prerequisite
l The Measurement Task Management tab is displayed.
l The measurement task used for re-collecting performance data is available in the sys-
tem.

Steps
1. On the Measurement Task Management tab, right-click the measurement task,
and then select Add Data Recollection from the shortcut menu. The Add Data
Recollection dialog box is displayed.
2. On the Measurement Task tab, modify the selection of POs as needed.
3. On the Location tab, set the start time, end time, and NE location.

4. Click OK to issue the re-collection command to corresponding NE(s).


The system starts re-collecting the performance data according to the settings.
– End of Steps –

4.4 Template Task Management


4.4.1 Introduction to Query Template and Template Task
This procedure describes how to open the Template Task window through the
performance and statistic menu item in the main men.

Query Template
A query template can be used for performance data query. By setting and saving query
conditions in a query template, you can conveniently query performance data based on
the preset query conditions.

Template Task
Either query template or common template can be used to schedule a performance data
query task, that is, a template task. The system can automatically start performance data
query in accordance with the settings in the template task and save the query result on the
server.

4-26

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

You can check the execution result of a template task to get the performance data you
want. By using the template task, it is unnecessary to set query conditions one by one
because the query template or common template in the template task already specifies
the query conditions, including the query granularity, NE location, and the MO location.
To open the Template Task tab in the client window, do one of the following:
l Select Performance > Template Task on the menu bar.
l Select Query&Statistics > Performance Stat > Template Task on the menu bar.
The following describes the template task pane and the task result pane on the Template
Task tab page.
l Template Task Pane
All template tasks in the system are listed in the template task pane.
Table 4-6 describes the functions of buttons on the toolbar on the top of the template
task pane.

Table 4-6 Description of Toolbar Buttons for Template Tasks

Button Function

Create a new template task based on a query template.

Create a new template task based on a common template.

Modify an existing template task.

View the information of a template task.

Delete a template task.

Query performance data in accordance with the selected template


task.

Activate a template task.

Suspend a template task.

Complete a template task.

Refresh template tasks.

Select the filtering range.

l Task Result Pane

The task result pane shows the execution result of template tasks. You can export or
run a template task again by clicking corresponding buttons on the toolbar on the top
of the task result pane.

4-27

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Table 4-7 describes the functions of some buttons on the toolbar.

Table 4-7 Description of Toolbar Buttons for Task Results

Button Function

Export task results.

Redo a template task.

4.4.2 Opening the Template Task Management Tab


This procedure describes how to open the Template Task Management tab through the
main menu.

Steps
1. Perform one of the following operations to open the Template Task Management tab.
l From the main menu, select Performance > Template Task Management
l From the main menu, select Statistics > Performance Statistics > Template
Task Management.
For the descriptions of function buttons on the toolbar, refer to Table 4-8.

Table 4-8 Function Button Descriptions

Button Description

Creates a new template task based on a query template.

Creates a new template task based on a common template.

Modifies an existing template task.

Views the information of a template task.

Deletes a template task.

Queries performance data in accordance with the selected


template task.

Activates a template task.

Suspends a template task.

Stops a template task.

Cancels waiting for a template task.

Refreshes template tasks.

4-28

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Button Description

Selects a filtering range.

After the template task is executed, the task execution result is displayed in the task
result list. For the descriptions of function buttons on the toolbar of the list, refer to
Table 4-9.

Table 4-9 Function Button Descriptions

Button Description

Exports task results.

Redoes a template task.

– End of Steps –

4.4.3 Query Template Operations


A query template can be used for performance data query. By setting and saving query
conditions in a query template, you can easily query performance data based on the preset
query conditions.
The parameters set in a query template include query indexes, query objects, and query
time.
A query template can be exported or imported between different U31 R22 systems.

4.4.3.1 Customizing a Performance Query Template


To query different types of performance values more conveniently, you can set common
performance query templates according to the actual service in the network.

Context
Performance templates include common templates, current performance query templates,
and history performance data query templates.

l The common template does not include query object/location selection information.
It applies to the following two scenarios: selecting the NE in the topology, and then
querying according to the template. Or, when querying according to the template,
selecting the target NE.
l When the current performance query template and history performance data query
template are created, the query object/location selection information is included. They
apply to the query on the specified NE according to the template. The two templates
cannot be selected when the NE is selected in the topology view and then query is
performed according to the template.

4-29

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l Current performance query templates and history performance data query templates
can be saved as common templates.
Common performance (current performance and history performance) query templates
defined by the user include:
l Board temperature current performance query
l Board voltage current performance query
l CPU current performance query
l RAM current performance query
l All NE optical power current performance query
l Convergence layer and above NE optical power history performance query
l Convergence core layer master link traffic and bandwidth utilization current
performance query
l Convergence core layer standby link traffic and bandwidth utilization history
performance (15 minutes) query
l Convergence core layer standby link traffic and bandwidth utilization history
performance (24 hours) query
l Access layer master link traffic and bandwidth utilization current performance query
l Access layer master link traffic and bandwidth utilization history performance (15
minutes) query
l Access layer master link traffic and bandwidth utilization history performance (24
hours) query
l Access layer equipment access interface traffic history performance (24 hours) query
l Core layer equipment access interface traffic history performance (24 hours) query

Steps
1. From the main menu, select Performance > Template Management. The Template
Management tab is displayed.
2. In the Template Management navigation tree, select Current Performance Data
Query Template.

Note:
When customizing the history performance query template, select History
Performance Data Query Template in the Template Management navigation tree.

3. Click . The Add Template dialog box is displayed.

4. Enter the template name, and then select Operation mode.


l Confirm before execution: When the index or counter reaches the query time, the
prompt information is displayed. The user should confirm whether to perform the
performance query.

4-30

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

l Direct execution: When the index or counter reaches the query time, the system
automatically performs the performance query.
5. Enter the template name, and then click the OK button. The Add Current
Performance Data Query dialog box is displayed.
6. Click the Counter Selection tab, see Figure 4-6. To set related parameters, refer to
Table 4-10.
Table 4-10 Descriptions for Parameters in the Counter Selection Tab

Parameter Description

NE type Selects the NE type to be set in the drop-down list.

Common template It is unnecessary to set this parameter.

NO type Uses the default value "checkpoint".

Granularity The granularity that the system collects the data. The options include
"15 minutes" and "24 hours".

Counters Expands each node, and selects the performance items to which the
performance query template focuses.

Selected counters The performance items selected from Counters are displayed in the area,
for example, CPU utilization.

4-31

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Figure 4-6 Index/Counter Selection Tab

7. Click the Location Selection tab. To set related parameters, refer to Table 4-11.

Table 4-11 Descriptions for Parameters in the Location Selection Tab

Parameter Description

Wildcard level Sets the range of the measurement object.

NE location(s) Sets the NE location where the measurement object is located.


When Wildcard level is set to All, it is unnecessary to set this parameter.

MO location(s) Sets the specified object.


When Wildcard level is set to All or NE, it is unnecessary to set this
parameter.

To set common performance query templates, refer to Table 4-12.

4-32

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Table 4-12 Common Performance Query Template Settings

Performance NE Type Selected Counter Wildcard


Query Level
Template

Board All CTN ValueofDe- l MaxValueofDetectingPointTemperature (℃) Board (main


temperature NEs tecting- l MinValueofDetectingPointTemperature (℃) control board)
current PointTem- l ValueofDetectingPointTemperature (℃)
performance perature
query (℃)

Module l MaxValueofModuleTemperature (℃) Board (main


Tempera- l MinValueofModuleTemperature (℃) control board)
ture (℃) l ModuleTemperature (℃)

Board voltage All CTN Inputvolt- Inputvoltage (V) Board (power


current NEs age (V) board)
performance
query

CPU current All CTN CPUutiliza- l MaxCPUutilizationratio Board (main


performance NEs tionratio l MinCPUutilizationratio control board)
query l CPUutilizationratio

RAM current All CTN RAMutiliza- l RAMutilizationratio Board (main


performance NEs tionratio l MaxRAMutilizationratio control board)
query l MinRAMutilizationratio

All NE optical All CTN Optical l MaxValueofOutputOpticalPower(dBm) Interface


power current NEs Power l MinValueofOutputOpticalPower(dBm) (line optical
performance l InputOpticalPower(dBm) interface)
query l MaxValueofReceivingOpticalPower(dBm)
l MinValueofReceivingOpticalPower(dBm)
l OutputOpticalPower(dBm)

Convergence Conver- Optical l MaxValueofOutputOpticalPower(dBm) Interface


layer and gence layer Power l MinValueofOutputOpticalPower(dBm) (line optical
above NE and above l InputOpticalPower(dBm) interface)
optical power NEs l MaxValueofReceivingOpticalPower(dBm)
history l MinValueofReceivingOpticalPower(dBm)
performance l OutputOpticalPower(dBm)
query

4-33

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Performance NE Type Selected Counter Wildcard


Query Level
Template

Convergence Conver- Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces


core layer gence core ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (interfaces
master link layer NEs l EthernetPhysical(ETPI)ReceiveCRCerror- of both ends
traffic and frames of the link
bandwidth l EthernetPhysical(ETPI)SendCRCerrorframes between
utilization l EthernetPhysical(ETPI)Receiveerrorframesra- convergence
current tio layer
performance l EthernetPhysical(ETPI)Senderrorframesratio equipment
query l EthernetPhysical(ETPI)Nearenddropratio and core
l EthernetPhysical(ETPI)Sendbandwidthusager- layer)
ate
l EthernetPhysical(ETPI)Receiveband-
widthusagerate

Convergence Conver- Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces


core layer gence core ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (interfaces
standby link layer NEs l EthernetPhysical(ETPI)ReceiveCRCerror- of both ends
traffic and frames of the link
bandwidth l EthernetPhysical(ETPI)SendCRCerrorframes between
utilization l EthernetPhysical(ETPI)Receiveerrorframesra- convergence
history tio layer and
performance l EthernetPhysical(ETPI)Senderrorframesratio standby core
(15 minutes) l EthernetPhysical(ETPI)Nearenddropratio layer)
query l EthernetPhysical(ETPI)Sendbandwidthusager-
ate
Convergence
l EthernetPhysical(ETPI)Receiveband-
core layer
widthusagerate
standby link
traffic and
bandwidth
utilization
history
performance
(24 hours)
query

4-34

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Performance NE Type Selected Counter Wildcard


Query Level
Template

Access layer Access Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces


master link layer NEs ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (interfaces
traffic and l EthernetPhysical(ETPI)ReceiveCRCerror- of both ends
bandwidth frames of the link
utilization l EthernetPhysical(ETPI)SendCRCerrorframes between
current l EthernetPhysical(ETPI)Receiveerrorframesra- access layer
performance tio equipment
query l EthernetPhysical(ETPI)Senderrorframesratio and master
l EthernetPhysical(ETPI)Nearenddropratio convergence
l EthernetPhysical(ETPI)Sendbandwidthusager- layer)
ate
l EthernetPhysical(ETPI)Receiveband-
widthusagerate

Access layer Access Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces


master link layer NEs ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (interfaces
traffic and l EthernetPhysical(ETPI)ReceiveCRCerror- of both ends
bandwidth frames of the link
utilization l EthernetPhysical(ETPI)SendCRCerrorframes between
history l EthernetPhysical(ETPI)Receiveerrorframesra- access layer
performance tio equipment
(15 minutes) l EthernetPhysical(ETPI)Senderrorframesratio and standby
query l EthernetPhysical(ETPI)Nearenddropratio convergence
l EthernetPhysical(ETPI)Sendbandwidthusager- layer)
Access layer
ate
master link
l EthernetPhysical(ETPI)Receiveband-
traffic and
widthusagerate
bandwidth
utilization
history
performance
(24 hours)
query

Access layer Access Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces


equipment layer NEs ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (access layer
access l EthernetPhysical(ETPI)ReceiveCRCerror- equipment
interface frames service
traffic history l EthernetPhysical(ETPI)SendCRCerrorframes access
performance l EthernetPhysical(ETPI)Receiveerrorframesra- interfaces)
(24 hours) tio
query l EthernetPhysical(ETPI)Senderrorframesratio
l EthernetPhysical(ETPI)Nearenddropratio

4-35

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Performance NE Type Selected Counter Wildcard


Query Level
Template

Core layer Core layer Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces


equipment NEs ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (core layer
access l EthernetPhysical(ETPI)ReceiveCRCerror- equipment
interface frames service
traffic history l EthernetPhysical(ETPI)SendCRCerrorframes access
performance l EthernetPhysical(ETPI)Receiveerrorframesra- interfaces)
(24 hours) tio
query l EthernetPhysical(ETPI)Senderrorframesratio
l EthernetPhysical(ETPI)Nearenddropratio

8. (Optional) Click Save as Common Template to save this template to a common


template. (optional)
9. Click OK.
After the template is created, the created performance query template is displayed in
the Template Management window. Right-click this template, and then select Query
by Template from the shortcut menu. The Current Performance Query dialog box
is displayed, and the query result is displayed.
– End of Steps –

4.4.3.2 Modifying the Attributes of a Query Template


The attributes that can be modified in a current performance data query template include
a template name and an operation mode.
The attributes that can be modified in a history performance data query template include
a template name, an operation mode, and access mode.

Prerequisite
The performance query template is created and performance data exist in the performance
database.

Context
You can only modify one template at a time.

Steps
1. From the main menu of the client window, select Performance > Template Task
Management. The Template Task Management tab is displayed.
2. In the left pane, click the Template Management tab.
3. Expand the template node to display the template list.

4-36

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

4. Right-click the query template you want to modify, and then select Modify Attribute
from the shortcut menu. The Modify Attribute dialog box is displayed.
5. Modify the template name and/or the operation mode as needed, and click OK. The
Confirm message box is displayed.
6. Click OK to save the modification.
– End of Steps –

4.4.3.3 Importing a Query Template


This procedure describes how import a query template from an *.xml file.

Prerequisite
The *.xml file containing the query template information is available on the local client.

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. In the left pane, click the Template Management tab.
3. In the Template Management tree, right-click the query template that you want to
import, and then select Import from the shortcut menu. The Import Template dialog
box is displayed.
4. Select the file to be imported, and then click Open.
5. Enter the template name, select the operation mode, and then click OK.

Note:
The import template name cannot be empty, and should not be the same as other
self-defined template names.
When a query template is imported, the indices and counters under it will also be
imported.

– End of Steps –

4.4.3.4 Exporting a Query Template


This procedure describes how export an existing query template to an *.xml file on the
local client.

Prerequisite
The query template that you want to export is available in the system.

4-37

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. In the left pane, click the Template Management tab.
3. In the Template Management tree, right-click the query template that you want to
export, and then select Export from the shortcut menu. The Export Template dialog
box is displayed.
4. Select the path for saving the template, enter the file name, and then click Save. A
message box is displayed.

5. Click OK. The query template is exported to a *.xml file in the specified path.
– End of Steps –

4.4.3.5 Deleting a Query Template


This procedure describes how to delete an unnecessary query template.

Prerequisite
The performance measurement task is created.

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. In the left pane, click the Template Management tab, and then expand the Template
Management node to show all query templates in the system.
3. Right-click the query template you want to delete, and then click Delete from the
shortcut menu. The Confirm message box is displayed.
4. Click OK. The query template is deleted.
– End of Steps –

4.4.4 Template Task Operations


4.4.4.1 Creating a Query Template Task
This procedure describes how to create a performance query task based on a query
template.

Prerequisite
The query template that you want to use for the template task is available in the system.

4-38

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.

2. Click on the toolbar. The Add Query Template Task dialog box is displayed.
3. Set the task name, template name, start & end time, task status, file type, and task
execution plan.

Note:
The File Type refers to the file type generated after the task is completed.

4. Click OK.
– End of Steps –

Result
l The newly-created query template task is displayed on the Template Task
Management tab. After the query template task is run every time, the system
generates a query result file on the server, and the execution result file information,
including file name and task execution time, is displayed in the file column on the
bottom of the window.
l To copy the result file from the server to the local client, select the result file, and then
click on the toolbar. The Save dialog box is displayed. Select the path for saving
the result file on the local client, enter the file name, and then click the Save button.
l A result file is generated when the task is performed every time. Time stamps are
used to distinguish query result files.
l Click on the toolbar to perform the template task again.

4.4.4.2 Creating a Common Template Task


This procedure describes how to create a template task based on a common template.

Prerequisite
l You have the authority of template task management.
l The common template you want to use for the template task is available in the system.

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.

2. Click on the toolbar. The Add Common Template Task dialog box is displayed.

4-39

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3. Set the task name, template name, start & end time, task status, file type, and task
execution plan.

Note:
You can select multiple common templates for a template task.

4. Click the Location Information tab.


5. Set the location group, wildcard level, NE location, and MO location, and then click
Save.

Note:
When multiple common templates are used in this template task, you need to set the
location information for all templates listed in the left pane.

6. Click the Time Information tab.


7. Set the query granularity, effective data, and effective time.
8. Click OK to complete the creation of a common template task.
l The newly-created common template task is displayed on the Template Task tab.
l The system generates a query result file and saves the file on the server every
time after the common template task is run. For details, refer to 4.4.4.1 Creating
a Query Template Task.
– End of Steps –

4.4.4.3 Modifying a Template Task


This procedure describes how to modify the name and execution policies of a suspended
template task.

Prerequisite
The template task you want to modify is suspended.

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. In the template task pane on the Template Management tab, select a template task
to be modified.

4-40

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

3. Perform one of the following operations to open the Modify Query Template dialog
box.
l Click on the toolbar.
l Right-click the template task you want to modify, and then select Modify Template
from the shortcut menu.
4. In the Modify Query Template dialog box, modify the information of the template task,
including the task name, template name, execution period, file type, and execution
schedule.
5. Click OK to save the modification.
– End of Steps –

4.4.4.4 Viewing a Template Task


This procedure describes how to view the information of a template task.

Prerequisite
You have created a template task.

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. Select a template from the left Template Management tree to display all the template
tasks under this template.
3. Perform one of the following operations to open the View Query Template dialog box:
l Double-click the template task.
l Select the template task, and then click on the toolbar.
l Right-click the template task, and then select View Template from the shortcut
menu.
4. After viewing the information of the template task, click OK to close the View Template
Task box.
– End of Steps –

4.4.4.5 Deleting a Template Task


This procedure describes how to delete an unnecessary template task.

Prerequisite
The template task you want to delete is suspended.

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.

4-41

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2. In the template task pane on the Template Management tab, select a template task
to be deleted.
3. To delete the template task, perform one of the following operations.
l Click on the toolbar.
l Right-click the template task, and then click Delete Template from the shortcut
menu.

Note:

To delete multiple template tasks at a time, press and hold Ctrl and then click the tasks
one by one. After selecting all those tasks, click on the toolbar.

4. In the Confirm message box, click OK.


– End of Steps –

4.4.4.6 Activating a Template Task


If the data performance of the NE is collected according to the rule of the suspended
template, this task should be activated.

Prerequisite
The template task you want to activate is suspended.

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. To activate the template task, perform one of the following operations.
l Click on the toolbar.
l Right-click the template task, and then select Activate Template Task from the
shortcut menu.

– End of Steps –

Result
The status of the template task changes from into .

4.4.4.7 Suspending a Template Task


When a template task is suspended status, the system stops data collection. When the
collection period of the task expires, the system does not collect the performance data of
the target NEs.

4-42

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Prerequisite
The template task is created and in activating status.

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. To suspend the template task, perform one of the following operations.
l Click on the toolbar.
l Right-click the template task, and then click Suspend Template from the shortcut
menu.
– End of Steps –

Result
The status of the template task changes from into .

4.4.4.8 Completing a Template Task


You can forcibly complete a template task before the preset end time of the task.

Prerequisite
l The template is created.
l The template task is activated or suspended.

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. Perform one of the following operations to open the Finish Template dialog box.
l Click on the toolbar.
l Right-click the template task, and then click Finish Template from the shortcut
menu.
3. In the Confirm message box, click OK.

– End of Steps –

4.4.4.9 Refreshing Template Tasks


You can get the latest information of template tasks by refreshing the task list on your client.

Prerequisite
You have the authority of template task management.

4-43

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. Perform one of the following operations to refresh the template task.
l Click on the toolbar.
l Right-click the template task, and then click Refresh from the shortcut menu.
– End of Steps –

4.4.5 Common Template Management


The U31 R22 provides common templates that predefine NE types, measure object
(MO) types, and performance objects (POs). You can use a common template to query
performance data according to the predefined query conditions after selecting the NE
location and MO location. The system also allows you to customize common templates
in accordance with the actual requirements for performance data query.

4.4.5.1 Introduction to Common Template Management


To open the Common Template tab in the client window, perform either of the following
operations:
l Select Performance > Query Template Management from the main menu.
l Select Statistics > Performance Statistics > Query Template Management from
the main menu.
The Template Management tab is displayed, see Figure 4-7.

Figure 4-7 Template Management Tab

4-44

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Table 4-13 describes the functions of the buttons on the toolbar of the Common Template
tab.

Table 4-13 Functions of Buttons on the Toolbar of Common Template Tab

Button Function

Create a common template.

Modify a common template.

View the information of a common template.

Delete common template(s).

Use a common template to query performance data.

Refresh the common template list.

Export all templates or a selected common template a file.

Import common template(s) from a file.

Select an NE type to show all the common templates of this


NE type.

For the function of searching.

Customize the columns to be displayed.

Select the filtering range.

4.4.5.2 Creating a Common Template


This procedure describes how to create a common template for later performance data
query.

Steps
1. From the main menu, select Performance > Query Template Management. The
Template Management tab is displayed.

2. On the toolbar, click . The Add Common Template dialog box is displayed.
3. Configure the parameters.

Parameter Description

Name Enter the template name

Description Enter additional information of the template

Access type Classified into three modes: share, private, and public.

4-45

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Description

Query type l Common query: Select available indices/counters to set access type
and statistic information including location group, query granularity, and
effective time.
l Current query: Select available indices/counters to query corresponding
performance parameters.

Available in- Set the NE type, MO type, and performance counter indexes for the template.
dices/coun- The selected counters are displayed in the Selected indices/counters area.
ters

4. (Optional) For the Common query type, set the logic condition.
a. Click Logic. The Logic Filtering/Rendering dialog box is displayed.
b. Configure the filter type.
In the Logic Filtering/Rendering dialog box, you can set the filtering and
rendering rules based on logical operation for each index or counter as needed.
The system will filter and render the query result in accordance with the rules,
including And or Or.
l If And is selected, the system displays the query result only when the result
of logic operation set for each index or counter in the list is true.
l If Or is selected, the system displays the query result as long as the result of
logic operation set for one index or counter in the list is true.
c. Select an index or a counter as needed, and define the filter conditions by setting
filter operation methods and filter values.
d. In the Rendering column, click the index/counter you need. The Threshold
Rendering dialog box is displayed.
e. Set threshold values and rendering colors for each threshold.
f. Click OK to close the Threshold Rendering dialog box.
g. Click OK to close the Logic Filtering/Rendering dialog box.
5. (Optional) For the Common query type, set the TopN condition.
a. Click TopN. The TOPN Filtering/Rendering dialog box is displayed.
b. Set filtering conditions.
Use an index or counter "Top Max N" as an example, and assume N = 1.
l No group: The system queries all the records, and then returns the maximum
record (if there are several records in the first place, the system only returns
the first record. No group is generally used for analyzing the maximum or
minimum values of all performance data.
l Group by time: The system queries all the records, and displays the record
of the maximum values in the query result of each hour. It is generally used
for analyzing the best or worst object at specific time point during a period.

4-46

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

l Group by location: To group in accordance with the performance object, the


system queries all the records, and then returns the maximum record of each
record. This type is generally used for analyzing the performance of each
object at the best time or worst time during a period.
c. Select an index or a counter as needed, and define the filter conditions by setting
filter operation methods and filter values.
d. In the Rendering column, click the index/counter you need. The Threshold
Rendering dialog box is displayed.
e. Set threshold values and rendering colors for each threshold.

f. Click OK to close the Threshold Rendering dialog box.


g. Click OK to close the TOPN Filtering/Rendering dialog box.
6. click OK to complete creating the common template.

– End of Steps –

Related Tasks
l Viewing a Common Template
Right-click the template, and then click View Template from the shortcut menu, or on
the toolbar, click .
l Refreshing Common Templates
Right-click any common template, and then click Refresh from the shortcut menu, or
on the toolbar, click .
l Deleting a Common Template

Right-click the template, and then click Delete Template from the shortcut menu, or
on the toolbar, click .

4.4.5.3 Modifying a Common Template


This procedure describes how to modify a common template. You can modify user-defined
common templates but not modify system-defined common templates.

Steps
1. From the main menu, select Performance > Template Management. The Template
Management tab is displayed.
2. Select a common template, and perform one of the following operations to open the
Modify Common Template dialog box.
l Right-click the template, and then click Modify Template from the shortcut menu.
l On the toolbar, click .

3. Modify the settings of the template as needed.

4-47

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

4. Click OK.
– End of Steps –

4.4.5.4 Viewing a Common Template


This procedure describes how to view a common template.

Steps
1. From the main menu, select Performance > Template Management. The Template
Management tab is displayed.

2. Select a common template, and perform one of the following operations to open the
View Common Template dialog box.
l Right-click the template, and then click View Template from the shortcut menu.
l On the toolbar, click .
3. View the parameter settings of the template.
– End of Steps –

4.4.5.5 Deleting a Common Template


This procedure describes how to delete an unnecessary common template. You can delete
user-defined common templates but not delete system-defined common templates.

Steps
1. From the main menu, select Performance > Template Management. The Template
Management tab is displayed.
2. Select a common template, and perform one of the following operations to open the
Delete Template dialog box.
l Right-click the template, and then click Delete Template from the shortcut menu.
l On the toolbar, click .
3. Click OK.
– End of Steps –

4.4.5.6 Refreshing Common Templates


This procedure describes how to obtain the latest information of common templates on the
server.

Steps
1. From the main menu, select Performance > Template Management. The Template
Management tab is displayed.

2. Perform one of the following operations to refresh common templates.

4-48

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

l Right-click any common template in the template list, and then click Refresh from
the shortcut menu.
l On the toolbar, click .
– End of Steps –

4.4.5.7 Exporting a Common Template to a File


This procedure describes how to export a common template to an *.xml file on the local
client. The system supports two export modes: exporting the selected template(s) or
exporting all templates.

Steps
1. From the main menu, select Performance > Query Template Management. The
Template Management tab is displayed.
2. Perform the following operations as required.

To... Do...

Export the selected


Right-click a common template to be exported, and select Export Selected
template
Template(s) from the shortcut menu. The Export Template dialog box is
displayed.

Export all templates


Right-click any common template, and select Export All Templates from the
shortcut menu. The Export Template dialog box is displayed.

Note:
You can also perform the following operation to open the Export Template dialog box:
Select a common template to be exported, and click the drop-down button on
the toolbar to select Export Selected Template(s) or Export All Templates from the
list.

3. Set the path for saving the common template and the file name.
4. Click Save. A message box is displayed.
5. Click OK.
The common template is exported to an *.xml file under the specified path.
– End of Steps –

4.4.5.8 Importing a Common Template from a File


This procedure describes how to import a common template to an *.xml file on the local
client.

4-49

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Prerequisite
The file containing the information of the common template you want to import is available
on the local client.

Steps
1. From the main menu, select Performance > Query Template Management. The
Template Management tab is displayed.
2. Perform one of the following operations to open the Import Template dialog box.
l On the toolbar, click .
l Right-click any common template, and select Import Template from the shortcut
menu.
3. Find the file to be imported, and click Open. The Import Common Template dialog
box is displayed.

Note:
The template number and name cannot be duplicated with the number and the name
of the common template in the system.

4. Select the template you want to import, and click OK.


The imported common template is displayed in the Common Template list.
– End of Steps –

4.5 Performance Data Query


4.5.1 Performance Query
Performances can be queried on the EMS in the following ways:
l Query in the topology view.
l Query in the main menu.
l Query in the service view.
l Query in the rack diagram.
l Query in the resource view.

4.5.1.1 Querying Performances in the Topology View


This procedure describes how to query the current and history performances of an NE
through a shortcut menu in the Topology Management window.

4-50

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Prerequisite
l You have the operation authority of performance management.
l The performance measurement task is created, and the performance data exists in
the performance database.
l The link is created on the NE whose performance requires to be queried.

Steps
l Query the current performance of the NE.
In the Topology Management window, select one or multiple NEs, and then select
Performance Management > Current Performance Data Query. The Add Current
Performance Data Query dialog box is displayed.
The performances queried are displayed in the Current Performance Data Query
window. By default, the current performance data of 15 minute granularity is queried.

l Query the history performance of the NE.


1. In the Topology Management window, select one or multiple NEs or links, and
then select Performance Management > History Performance Data Query.
The History Performance Data Query dialog box is displayed.

2. On the Index/Counter Selection tab. Set the related parameters. For a


description of the parameters, refer to Table 4-14.

Table 4-14 Parameter Descriptions for Counter Selection

Parameter Description

Common template Selects the system common template or user-defined common


template. In addition, the template may not be selected.

MO type Uses the default value "checkpoint".

Available When Common template is not selected, the user can expand each
indices/counters node and select the performance items to be queried.

Selected The performance items selected from Counters are displayed in the
indices/counters area.

3. On the Object Selection tab. Set the related parameters. For a description of the
parameters, refer to Table 4-15.

Table 4-15 Parameter Descriptions for Object Selection

Parameter Description

Location group Selects the location group, for example, Query raw data.

Wildcard level Selects the wildcard level, for example, Board.

4-51

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Description

NE location(s) From the EMS Server navigation tree, select the NE to be


queried.
If Wildcard level is set to All or NE, this parameter does not
need to be set.

MO location(s) Select the corresponding measurement object. For example,


if Wildcard level is set to Board, select the corresponding
board from the MO navigation tree.
If Wildcard level is set to All or NE, this parameter does not
need to be set.

4. On the Time Selection tab. Set the related parameters. For a description of the
parameters, refer to Table 4-16.

Table 4-16 Parameter Descriptions for Time Selection

Parameter Description

Query granularity The period that the system performs the performance data
query.

Time settings The time period when the system queries the performance
data.

Effective date The system only queries the performance data on the effective
date.

Effective time The system only queries the performance data in the effective
time period.

5. Click OK. The performances queried are displayed in the History Performance
Data Query window.
– End of Steps –

4.5.1.2 Querying Performances in the Main Menu


A user can query the NE performance in the main menu in five ways. For the ways of
querying performances in the main menu, refer to Table 4-17.

Table 4-17 Ways of Querying Performances in the Main Menu

Menu Description

Performance > Realtime Monitors the realtime performance of boards, ports, tunnels, PWs,
Traffic Management > CIPs, and L3 VPNs.
Realtime Traffic Monitoring

Performance > Current Queries the current performance of the NE.


Performance Data Query

4-52

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Menu Description

Performance > History Queries the historical performance of the NE.


Performance Data Query

Performance > l Queries the performance values on the equipment in a period


Straight-through directly (that is, history performance values on the equipment
Performance Data Query side).
l The difference between the straight-through performance and
history performance data is that the straight-through performance
is saved on the equipment side but the history performance data
is saved on the EMS.
l The straight-through performances can be queried only through
the menu.

Performance > Query Queries the performances through the common template or
Template Management user-defined template.

Performance > Archive Displays archived data in various forms based on the specified query
Query conditions.

Prerequisite
l The user has the operation authority of performance management.
l The performance measurement task is created, and the performance data exists in
the performance database.

Steps
l Monitor real-time performance.
1. In the operation window of the U31 R22, select Performance > Realtime Traffic
Management > Realtime Traffic Monitoring. The Realtime Traffic Monitoring
window is displayed.

2. Set NE, Mo Type, and Mo DN as required.


3. In the Start Settings area, click the Immediately or Delay option button.
4. Set the sample period.

5. In the Stop Settings area, click the Set Sample times or Set Stop time option
button.
6. Click Start.

l Query the current performance.

1. In the operation window of the U31 R22, select Performance > Current
Performance Data Query. The Add Current Performance Data Query dialog
box is displayed.

4-53

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2. Set the query parameters in the Counter Selection and Location Selection tabs.
The way to set parameters in the main menu is the same as that in the topology
view.
3. On the Counter Selection tab, set the related parameters. For a description of
the parameters, refer to Table 4-18.

Table 4-18 Parameter Descriptions for Counter Selection

Parameter Description

Common template Selects the system common template or user-defined common


template. Or, the template may not be selected.

MO type Uses the default checkpoint.

Counters If Common template is not selected, you can expand


each node in the Counters navigation tree and select the
performance items to be queried.

Selected counters The performance items selected from the Counters navigation
tree are displayed in the area.

4. On the Location Selection tab. Set the related parameters. For a description of
the parameters, refer to Table 4-19.

Table 4-19 Parameter Descriptions for Location Selection

Parameter Description

Wildcard level Selects the wildcard level, for example, Board.

NE location(s) From the EMS Server navigation tree, select the NE to be


queried.
If Wildcard level is set to All or NE, this parameter does not
need to be set.

MO location(s) Select the corresponding measurement object. For example,


if Wildcard level is set to Board, select the corresponding
board from the MO navigation tree.
If Wildcard level is set to All or NE, this parameter does not
need to be set.

5. Click OK. The performance queried is displayed in the Current Performance Data
Query window.

4-54

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Note:
After the query conditions are set, you can click Save as Query Template and Save
as Common Template to save the conditions into a query template and a common
template respectively.

l Query the history performance.


1. In the main menu, select Performance > History Performance Data Query. The
History Performance Data Query dialog box is displayed.

Note:
In addition, the user can click on the toolbar to open the History Performance
Data Query dialog box.

2. In the Index/Counter Selection, Object Selection, and Time Selection tabs, set
query parameters. The way to set parameters in the main menu is the same as
that in the topology view.
3. Click OK. The performance queried is displayed in the History Performance Data
Query window.

Note:
After the query conditions are set, you can click Save as Query Template and Save
as Common Template to save the conditions into a query template and a common
template respectively.

l Query the equipment straight-through performance.


1. In the main menu, select Performance > Straight-through Performance Data
Query. The Add Straight-through Performance Data Query dialog box is
displayed.
2. Click the Counter Selection tab, see Figure 4-8. To set query parameters, refer
to Table 4-20.

Table 4-20 Descriptions for Parameters in the Counter Selection Tab

Parameter Description

NE type Selects the NE type to be queried in the drop-down list.

4-55

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Description

MO type Uses the default value "checkpoint".

Granularity The granularity that the system collects the data. The options
include "15 minutes" and "24 hours".

Time settings Sets the time period that the straight-through performance
is queried.

Counters Expands each node and selects the performance items to be


queried.

Selected counters The performance items selected from Counters are displayed
in the area, for example, CPU utilization.

Figure 4-8 Counter Selection Tab

3. Click the Location Selection tab. To set related parameters, refer to Table 4-21.

4-56

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Table 4-21 Descriptions for Parameters in the Location Selection Tab

Parameter Description

Wildcard level Sets the range of the measurement object.

NE location(s) Sets the NE location where the measurement object is located.


When the user selects All or NE from Wildcard level, it is not
necessary to set this parameter.

MO location(s) Select the corresponding measurement object.


When the user selects All or NE from Wildcard level, it is not
necessary to set this parameter.

4. Click OK. The straight-through performances queried are displayed in the


Straight-through Performance Data Query window.
l Query the performance based on the template.
1. In the main menu, select Performance > Query Template Management. The
Template Management window is displayed.

2. Select the template type in the template management navigation tree on the left.
All templates of this type are displayed on the right of the window, see Figure 4-9.

Figure 4-9 Template Management Window

3. Right-click a template, and then select Query by Template from the shortcut
menu, or click on the toolbar. The Add Current Performance Data Query
dialog box is displayed.

Note:
In the Add Current Performance Data Query dialog box, parameters in the
Counter Selection tab are preset in the template. These parameters can be
modified by the user before the query. Parameters in the Location Selection
need to be set here.

4. Click the Location Selection tab, and then set the related parameters.

4-57

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

5. Click OK. The performances queried according to the template are displayed in
the Current Performance Data Query window.
l Query archived data.
1. In the main menu, select Performance > Archive Query. The Archive Query
dialog box is displayed.
2. On the Index/Counter Selection tab, set the parameters. For a description of the
parameters, refer to Table 4-22.

Table 4-22 Parameter Descriptions for Querying Archived Data

Parameter Description

NE type Select the desired NE types from the drop-down list.

MO type Use the default value (checkpoint).

Available indices/counters Expand the nodes and select the performance items that you
want to query.

Selected indices/counters Displays the selected indices or counters, for example, the
number of ETC frames lost.

3. Click the Object Selection tab. Set the parameters. For a description of the
parameters, refer to Table 4-23.

Table 4-23 Object Selection Parameter Descriptions

Parameter Description

Location group Select Query raw data, Group by all NEs,


or Group by NE.

Wildcard level Select All, NE, or Ethernet Port.

NE location(s) selected Expand the nodes to select the desired NE


locations.

MO location(s) selected Displays the selected NE locations.

4. Click the Time Selection tab. Set the parameters. For a description of the
parameters, refer to Table 4-24.

Table 4-24 Time Selection Parameter Descriptions

Parameter Description

Query Granularity Select fifteen minutes or one day.

Time settings Set the query period as required. You can


directly select a day, a week, a month or a
holiday. You can also customize a period.

Effective date Select the effective dates.

4-58

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Parameter Description

Effective time Set a start time and an end time to specify


a effective period, and then you can add
this period. You can also delete an existing
period.

5. Click OK.

Note:

After the query conditions are set, you can click Save as Query Template and Save
as Common Template to save the conditions into a query template and a common
template respectively.

– End of Steps –

4.5.1.3 Querying Performances in the Service View


This procedure describes how to query the current performance and history performance
of the service in the service view through a shortcut menu.

Prerequisite
l You have the operation authority of performance management.
l The performance measurement task is created, and the performance data exists in
the performance database.
l The link is established for the NE of which the current performance needs to be
queried.

Steps
1. From the main menu, select Service > Service View. The Service View window is
displayed.
2. Perform the following operations as required.

4-59

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To... Do...

Query the current In the service list, right-click the service to be queried, and then select Query
performance of the > Current Performance. The current performance corresponding to the
service service is displayed in the window.

Query the history


i. In the service list, right-click the service to be queried, and then select
performance of the
Query > History Performance from the shortcut menu. The History
service
Performance Data Query dialog box is displayed.

ii. Set parameters on the Index/Counter Selection, Object Selection,


and Time Selection tabs, and then click OK. The history performance
corresponding to the service is displayed in the window.

Query the current In the service list, right-click the service to be queried, and then select Query
performance including > Current Performance (Inc Server Layer). The current performances
the service layer corresponding to the service and its server layer service are displayed in
the window.

Query the history


i. In the service list, right-click the service to be queried, and then select
performance including
Query > History Performance (Inc Server Layer) from the shortcut
the service layer
menu. The History Performance Data Query dialog box is displayed.

ii. Set parameters on the Index/Counter Selection, Object Selection,


and Time Selection tabs, and then click OK. The history performances
corresponding to the service and its server layer service are displayed in
the window.

– End of Steps –

4.5.1.4 Querying Performances in the Rack View


This procedure describes how to query the current performance and history performance
of a board in the rack diagram through a shortcut menu.

Prerequisite
l You have the operation authority of performance management.
l The performance measurement task is created, and the performance data exists in
the performance database.
l The link is established for the NE of which the current performance needs to be
queried.

Steps
1. In the Topology Management window, double-click the NE to be queried. The Rack
Chart window is displayed.
2. Perform the following operations as required.

4-60

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

To... Do...

Query the current


i. Right-click the board, and select Current Performance from the
performance of the
shortcut menu. The Current Performance Data Query window is
NE
displayed.

ii. View the current performance of the board.

Query the history


i. Right-click the board, and select History Performance from the
performance of the
shortcut menu. The History Performance Data Query dialog box is
NE
displayed.

ii. Set parameters on the Index/Counter Selection, Object Selection,


and Time Selection tabs, and click OK. The Query-checkpoint
window is displayed.

iii. View the history performance of the board.

– End of Steps –

4.5.1.5 Querying the Performance in the Resource View


This procedure describes how to view the current performance and historical performance
of an NE and the historical performance of a link in the resource view.

Prerequisite
l You have the operation authority of performance management.
l The performance measurement task is created, and the performance data exists in
the performance database.
l The link is created on the NE whose performance requires to be queried.

Steps
1. Open the BN NE Resource View window in either of the following ways.
l On the toolbar, click the icon. The BN NE Resource View window is
displayed.
l In the Topology Management view, select Configuration > BN-IP NE
Configuration > BN NE Resource View. The BN NE Resource View window
is displayed.
l In the Topology Management view, right-click one NE, and then select BN NE
Resource View. The BN NE Resource View window is displayed.

2. Perform the following operations as required.

4-61

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To... Do...

Query the current performance Right-click one NE, and then select the shortcut menu
of the NE Performance Management > Current Performance Data Query.

Query the history performance


i. Right-click one NE or one link, and then select the shortcut
of the NE or the link
menu Performance Management > History Performance
Data Query. The History Performance Data Query dialog
box is displayed.

ii. Set the Index/Counter Selection, Object Selection and


Time Selection, and click OK. The performances queried are
displayed in the History Performance Data Query window.

– End of Steps –

4.5.2 Operations on the Query Result


4.5.2.1 Viewing the Query Result in a Chart or Table
The query result of performance data is displayed in table mode by default in the
Performance Management window. You can switch the display mode of performance
data between table and chart.

Prerequisite
l You have the authority of performance management.
l The performance data query result window is displayed.

Context
l There are three types of chart display: bar chart, line chart, and pie chart.
l Chart display is available only to history performance data.

Steps
l Perform the following operations to display the query result in chart mode.

1. In the Query-checkpoint window, click on the toolbar. The Chart window is


displayed.

2. Set the chart type, chart attribute, chart style, query object, index or counter.

3. Click the Apply button. The performance data is displayed in the chart.
l To display the query result in table mode, click Table. The performance data is
displayed in the list.

– End of Steps –

4-62

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

4.5.2.2 Exporting the Query Result


This procedure describes how to export the query result of performance data to a specified
file.

Prerequisite
The performance data query result window is displayed.

Context
The formats of exported files include txt, htm, pdf, xls, csv, prn, xlsx, and xml.
A maximum of 10,000 data records can be exported to one file. If the query result has
more than 100,000 data records, the data records will be exported in two or more files.

Steps
1. In the Query-checkpoint window, click on the toolbar. The Save dialog box is
displayed.
2. Set the path for saving the file, file name, and file type.

Note:
For the history performance data, you can set report title, measurement type, query
time, editor, and creating time in the Save dialog box.

3. Click Save.
– End of Steps –

4.5.2.3 Exporting All the Query Results


This procedure describes how to export all historical data query results to a specified file.

Prerequisite
The performance data query result window is displayed.
At least one group of performance data is queried.

Context
The exported files is in txt, htm, pdf, xls, csv, prn, xlsx, or xml format.

Steps
1. In the Query-checkpoint window, click on the toolbar. The Export All dialog box
is displayed.

4-63

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2. Set the export scope, file type for saving, and file directory.
3. Click OK.
– End of Steps –

4.5.2.4 Printing the Query Result


This procedure describes how to print the query result of performance data.

Prerequisite
l The performance data query result window is displayed.
l The connection between the printer and the system is normal.

Context
l Only the history performance data can be printed.
l The system can print 5,000 data records at most. If the query result has more than
5,000 data records, the extra data records cannot be printed.

Steps
1. In the Query-checkpoint window, click on the toolbar. The Print Setup dialog
box is displayed.
2. Set print parameters on the General, Page Setup, and Advance tabs as required.
3. Click Preview All to view the printing result.
4. Click the Print button.
– End of Steps –

4.5.3 Performance Data Integrity Report


4.5.3.1 Overview of Performance Data Integrity Report
The integrity of collected performance data is the base that ensures the accurate query,
statistics, analysis and report of performance data.

The U31 R22 system collects performance data according to the conditions set in
measurement tasks and stores the collected performance data in its database when the
managed NEs and the U31 R22 server are running properly and the communication
between them is normal. When the connection between an NE and the server is
interrupted, U31 R22 cannot collect the performance data of the NE, which impairs the
integrity of performance data.
U31 R22 provides the function of performance data integrity report. By using this function,
you can check the integrity of performance data of each measurement type stored in the
database and find the period(s) during the required performance data is absent.

4-64

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

If some performance data is found absent in the database, you can initiate a re-collection
process to collect the performance data and store the collected data in the database.

4.5.3.2 Checking the Integrity of Performance Data


This procedure describes how to check the integrity of collected performance data.

Prerequisite
l You have the authority of performance management.
l The system has collected performance data in accordance with the measurement
tasks in the system and stored the collected data in the database.

Steps
1. From the main menu, select Performance > Data Integrity Query. The Add Data
Integrity Query dialog box is displayed.
2. Click the Object Selection tab.
3. Select the NE type, MO type and PO you want to check.

Note:
Multiple POs can be selected in the PO area.

4. Click the Location Selection tab, and then select the NE(s).
5. Click the Time Selection tab, and then select Query Data Source and Time settings.
6. Click OK.

– End of Steps –

Result
The Data Integrity Query tab is displayed to show the integrity of the selected PO.

The Integrity Status column shows the data integrity of each NE.
l Have Data means that the performance data at each collection point (every 15
minutes by default) during the query period is available.
l No Data means that no performance data at each collection point is queried.
Suppose the query period is a day. If the system succeeds to query the performance
data at collection points during a period (00:00:00 to 12:00:00), but fails to query
performance data at collection points during the other period (12:00:00 to 00:00:00),
the integrity query result will be displayed on two rows, with the Integrity Status as
Have Data and No Data respectively.

4-65

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l You can perform the operations on the data integrity result by using the toolbar buttons
on the Data Integrity Query tab.

4.5.3.3 Saving the Integrity Report


This procedure describes how to export and save the integrity report of performance data
to the local device.

Prerequisite
l You have entered the Data Integrity Query tab.
l You have checked the integrity of performance data and the integrity report is dis-
played in the client window.

Context
The integrity report of performance data can be saved as a *xml, *.txt, *.htm, *.pdf, *.csv,
*prn, *xlsx, or *.xls file.

Steps
1. On the Data Integrity Query tab, click on the toolbar. The Save dialog box is
displayed.
2. Select the path for saving the query result and enter the file name.
3. Select the File Type, and then click Save.
– End of Steps –

4.5.3.4 Locating the Source Board of Performance


This procedure describes how to locate the source board of a current or historical
performance entry.

Prerequisite
l You have the authority of performance management.
l The performance data query result window is displayed.

Steps
1. In the Current Performance Data Query or History Performance Data Query
window, right-click a performance entry, and select Open Rack Chart from the
shortcut menu. The Rack Chart window is displayed.

The board on which this performance occurs is selected in the rack chart.

– End of Steps –

4-66

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

4.5.3.5 Locating the Source NE of Performance


This procedure describes how to locate the source NE of a current or historical
performance entry.

Prerequisite
l You have the authority of performance management.
l The performance data query result window is displayed.

Steps
1. In the Current Performance Data Query or History Performance Data Query
window, right-click a performance entry, and select Locate Alarm to NE from the
shortcut menu. The Topology Management window is displayed.
The icon of the NE on which this performance occurs is selected on the topology graph.
– End of Steps –

4.5.3.6 Clearing Performance Counter


This procedure describes how to clear the current performance. In that case, digital
performance is recollected from 0 and analog performance is set to the current values,
which is convenient for recollecting the current performance.

Prerequisite
l You have the authority of performance management.
l The performance data query result window is displayed.

Context
Only the current performance counter can be cleared.

Steps
1. In the Current Performance Data Query window, right-click one or multiple
performance entries, and select Clear Performance Counter from the shortcut
menu.

2. On the toolbar, click the button to refresh the current performance of the system.
– End of Steps –

4.5.4 Overview of Performance Data Integrity Report


The integrity of collected performance data is the base that ensures the accurate query,
statistics, analysis and report of performance data.
The U31 R22 system collects performance data according to the conditions set in
measurement tasks and stores the collected performance data in its database when the

4-67

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

managed NEs and the U31 R22 server are running properly and the communication
between them is normal. When the connection between an NE and the server is
interrupted, U31 R22 cannot collect the performance data of the NE, which impairs the
integrity of performance data.
U31 R22 provides the function of performance data integrity report. By using this function,
you can check the integrity of performance data of each measurement type stored in the
database and find the period(s) during the required performance data is absent.
If some performance data is found absent in the database, you can initiate a re-collection
process to collect the performance data and store the collected data in the database.

4.5.4.1 Checking the Integrity of Performance Data


This procedure describes how to check the integrity of collected performance data.

Prerequisite
l You have the authority of performance management.
l The system has collected performance data in accordance with the measurement
tasks in the system and stored the collected data in the database.

Steps
1. From the main menu, select Performance > Data Integrity Query. The Add Data
Integrity Query dialog box is displayed.
2. Click the Object Selection tab.
3. Select the NE type, MO type and PO you want to check.

Note:
Multiple POs can be selected in the PO area.

4. Click the Location Selection tab, and then select the NE(s).
5. Click the Time Selection tab, and then select Query Data Source and Time settings.
6. Click OK.
– End of Steps –

Result
The Data Integrity Query tab is displayed to show the integrity of the selected PO.
The Integrity Status column shows the data integrity of each NE.
l Have Data means that the performance data at each collection point (every 15
minutes by default) during the query period is available.

4-68

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

l No Data means that no performance data at each collection point is queried.


Suppose the query period is a day. If the system succeeds to query the performance
data at collection points during a period (00:00:00 to 12:00:00), but fails to query
performance data at collection points during the other period (12:00:00 to 00:00:00),
the integrity query result will be displayed on two rows, with the Integrity Status as
Have Data and No Data respectively.
l You can perform the operations on the data integrity result by using the toolbar buttons
on the Data Integrity Query tab.

4.5.4.2 Saving the Integrity Report


This procedure describes how to export and save the integrity report of performance data
to the local device.

Prerequisite
l You have entered the Data Integrity Query tab.
l You have checked the integrity of performance data and the integrity report is
displayed in the client window.

Context
The integrity report of performance data can be saved as a *xml, *.txt, *.htm, *.pdf, *.csv,
*prn, *xlsx, or *.xls file.

Steps
1. On the Data Integrity Query tab, click on the toolbar. The Save dialog box is
displayed.
2. Select the path for saving the query result and enter the file name.
3. Select the File Type, and then click Save.
– End of Steps –

4.6 Real-Time Traffic Management


4.6.1 Setting the Display Style
This procedure describes how to set the display style of data packets and bytes in real-time
traffic monitoring. The display style is activated after the monitoring data panel is enabled
next time.

Steps
1. From the main menu, select Performance > Realtime Traffic Management > Display
Style Setup. The Display Style Setup dialog box is displayed.

4-69

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2. Select the display style of data packets from the Package/Frame list, for example,
packets.
3. Select the display style of bytes from the Byte list, for example, Mbps.
4. Select the unit from the Times/Num list, for example, times.
5. Click OK. A message box is displayed.
– End of Steps –

4.6.2 Monitoring Real-Time Traffic


This procedure describes how to monitor the real-time traffic of boards, ports, tunnels,
PWs, and L3 VPN.

Prerequisite
l You have the permissions to perform the operation.
l The monitored NEs are online.

Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Management Monitoring. The Realtime Management Monitoring dialog
box is displayed.
2. Set parameters of real-time traffic monitoring parameters. For the parameter
descriptions, refer to Table 4-25.

Table 4-25 Parameter Descriptions for Real-Time Traffic Monitoring

Parameter Description

Task Name Enter a task name.

NE i. Click . The Resource Selector dialog box is displayed.

ii. Select an NE from the Resource list.

iii. Click OK to return to the Real Time Monitor dialog box.

MO Type Select a monitored object from the drop-down list, for example, Port.

MO DN i. Click . The Resource Selector dialog box is displayed.

ii. Select a resource from the Resource list.

iii. Click OK to return to the Real Time Monitor dialog box.


When the MO type is L3VPN, you can select multiple MO DNs.

Start Settings Select Immediately or Delay.

Sample Period(s) Select a sampling period from the list, or select Other to set a
self-defined sampling period.
Range of a self-defined sampling period: 20 to 900.

4-70

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Parameter Description

Stop Settings Select Manual, Set Sample times, or Set Stop time.

3. Click Start.
– End of Steps –

4.6.3 Real-Time Traffic Task Management


4.6.3.1 Querying Real-Time Traffic Tasks
This procedure describes how to set query conditions for querying current tasks, historical
tasks, and detailed performance data collected by the tasks.

Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Traffic Task. The Realtime Traffic Task window is displayed.
This procedure uses querying current tasks as an example.
2. In the left navigation tree, select the NE on which the real-time traffic tasks are to be
queried.
3. On the Current Task tab, set the task start mode, task state, monitoring object type,
and start & end time in the Query Condition area.
4. Click Query. The current traffic monitoring tasks of the selected NE are displayed in
the list.
5. Query the performance data.
a. Select a task from the current task list.
b. Click Show Monitor Data. The PM Realtime Monitor dialog box is displayed.
You can view the performance data in graphics or tables.
– End of Steps –

4.6.3.2 Creating Real-Time Traffic Tasks


This procedure describes how to create real-time traffic tasks.

Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Traffic Task from the menu. The Realtime Traffic Task window is
displayed.

2. Click Create. The Create Monitor Task dialog box is displayed.

3. Set parameters. For the parameter descriptions, refer to Table 4-26.

4-71

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Table 4-26 Parameter Descriptions for Real-Time Monitoring Tasks

Parameter Setting Description

Task Name Enter a task name. Range: 1 to 30 characters.

Task Type Select a task type, for example, Single The two task types are described as
me task. follows:
l A single NE task can monitor
ports, tunnels, PWs, or L3 VPNs
of an NE.
l An E2E task can monitor the traffic
of tunnels or PWs between NEs.

NE i. Click . The Resource Selec- l If the Task Type is Single me


tor dialog box is displayed. task, you need to configure this
parameter.
ii. Select an NE from the Resource
l If the Task Type is E2E task,
list.
you do not need to configure this
iii. Click Ok to return to the Create parameter.
Monitor Task dialog box.

Mo Type Select a monitored object from the –


drop-down list, for example, Port.

Mo DN i. Click . The Resource Selec- If the Mo type is L3VPN, you can


tor dialog box is displayed. select multiple Mo DNs.

ii. Select a resource from the Re-


source list.

iii. Click Ok to return to the Create


Monitor Task dialog box.

Start Settings Select Immediately or Delay. –

Sample Select a sampling period from the list, Range of a self-defined sampling
Period(s) or select Other to set a self-defined period: 20 to 900.
sampling period.

Stop Settings Select Manual, Set Sample times, or –


Set Stop time.

4. Click OK. A message box is displayed.

5. Click OK.
– End of Steps –

4.6.3.3 Modifying a Real-Time Traffic Task


This procedure describes how to modify the name of a real-time traffic task.

4-72

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Traffic Task from the menu. The Realtime Traffic Task window is
displayed.
2. In the left navigation tree, select the NE on which the real-time traffic task is to be
modified.
3. Click Query. The current traffic monitoring tasks of the selected NE are displayed in
the list.
4. Select the task to be modified, and then click Modify. The Modify PM Realtime
Monitor Task dialog box is displayed.
5. Modify the task name.
6. Click OK. A message box is displayed.

7. Click OK.

– End of Steps –

4.6.3.4 Stopping a Real-Time Traffic Task Manually


This procedure describes how to manually stop a real-time traffic monitoring task.

Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Traffic Task. The Realtime Traffic Task window is displayed.
2. In the left navigation tree, select the NE on which the real-time traffic task is to be
stopped.
3. Click Query. The current traffic monitoring tasks of the selected NE are displayed in
the list.

4. Select the task to be stopped, and then click Stop & End Monitoring. The Confirm
message box is displayed.

5. Click Yes. A message box is displayed.


6. Click OK.
The stopped task is displayed on the History Task tab.

– End of Steps –

4.6.3.5 Deleting a Real-Time Traffic Task


This procedure describes how to delete a stopped real-time traffic monitoring task.

Prerequisite
The real-time traffic monitoring task is stopped.

4-73

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Traffic Task from the menu. The Realtime Traffic Task window is
displayed.
2. Click the History Task tab.
3. In the left navigation tree, select the NE on which the real-time traffic task is to be
deleted.
4. Click Query. The historical traffic monitoring tasks of the selected NE are displayed
in the list.
5. Select the task to be deleted, and then click Delete. The Confirm message box is
displayed.
6. Click Yes. A message box is displayed.
7. Click OK.
– End of Steps –

4.7 Counter and Index Management


4.7.1 Introduction to Counter and Index Management
The management objects of a performance threshold task (also called threshold task) are
counters and/or indexes. You can define a threshold task for monitoring specific index(es).
To define an index, you need to specify its name, formula and type.
Performance indexes can be classified into the following four types in accordance with
their importance and usage.
l Key Performance Index (KPI)
A KPI is an index that indicates a key performance of a network. The purpose of a
threshold task is to monitor one or more KPIs. When the system detects that the value
of a KPI exceeds the threshold range specified in the task, a threshold crossing alarm
is raised. Threshold crossing alarms are classified into four levels by severity: critical,
major, minor and warning. All KPI threshold crossing alarms have the same alarm
code.
l Performance Index (PI)
A PI is a common index that indicates a network performance. A PI is for a single
object measured.
l Statistical Performance Index (SPI)
An SPI is the count of a measure object based on a specific statistic rule. AN SPI is
for a type of measured objects. A statistic rule is a logic expression, for example, call
completion ratio ≥ 95%.
l User-defined Performance Index

4-74

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

You can also define and manage performance index in accordance with the actual
requirements in the system. If a customized index is not used any longer, you can
modify or delete the formula of the index.

Note:
l The default indexes provided by the system cannot be modified or deleted.
l The value of each counter in a KPI formula comes from basic measured data.

KPIs can be used in the following scenarios:

l Creation of Threshold Task


Only KPIs are used in threshold tasks. If a KPI is used in a threshold task, the
system determines whether to raise a threshold crossing alarm after comparing the
KPI value with the preset thresholds in accordance with the threshold task. The
threshold crossing alarms that are triggered by different KPIs have the same alarm
code but different details.
l Query of KPI Value

On request of querying the value of a KPI, the system calculates the value in
accordance with the KPI formula and displays the calculation result on the client
interface. The system can also query corresponding counters from the database to
calculate the history value of a KPI. It displays the calculation result of the history KPI
value, which reflects the variation of the KPI during a period.

l Generation of KPI Report


The system provides several report templates based on KPI formulas for generating
KPI reports. You can know the operation status of the network by checking the
value variation of KPIs in busy hours from the KPI reports generated based on these
templates, which reflect the operation status of the network.

4.7.2 Counter Management


4.7.2.1 Viewing the Counter Types of a Measurement Object
The counter is located under the performance counter sub-note of each measurement
object. This procedure describes how to view the counter types of a measurement object.

Prerequisite
l You have the authority of counter management.
l You have completed the configuration of the NE that you want to query.

4-75

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Expand the Resource Type tree in the Model Management pane to find the measure
object you want to view.
3. Expand the measure object node and then click Counter to show the counter types of
the measure object on the Counter and Index Management tab.
– End of Steps –

4.7.2.2 Viewing the Counters of a Type


This procedure describes how to view the counters involved in a specific counter type.

Prerequisite
l You have the authority of counter management.
l You have completed the data configuration of the NE you want to view.

Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Expand the Resource Type tree in the Model Management pane to find the measure
object you want to view.
3. Expand the measure object node, and then perform one of the following operations to
show all counters of a counter type on the Counter and Index Management tab.
l Click before the Counter node under the measure object, and then click the
counter type you want to view.
l Click the Counter node, and then double-click the counter type displayed on the
Counter And Index Management tab.

Note:

To show all counters of the measure object, right-click the measure object node or the
Counter node, and then click Show Counter from the shortcut menu.

– End of Steps –

4-76

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

4.7.3 Index Management


4.7.3.1 Creating an Index
Besides the predefined indexes provided by the system, the U31 R22 supports
user-defined indexes, which can also be used in threshold tasks.

Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Expand the Resource Type tree in the Model Management pane to find the object
you want to measure.

3. Click before the measure object node, and then select the index node (This
procedure uses key performance as an example).

4. Click on the toolbar. The New Index dialog box is displayed.

Note:
To open the New Index dialog box, you can also right-click the Key PI node, and then
click New Index from the shortcut menu.

5. Click the Basic Information tab, and set the parameters.

Parameter Description

Name Enter a character string consisting of 1 to 300 characters as the index


name, which must be different from the name of any existing index in
the system.

Description Keep this text box blank if no other information is needed.

NE type Select the NE type.

MO type Select the MO type.

Display format Select the format of the index value from the Display Format drop-down
list box in accordance with the type of the index you want to create:
"Integer", "Float", "Percent" or "Boolean (1/0)".
The following introduces the constraint relationship between index type
and value format.
l For KPI, the value format can be "Integer", "Float", "Percent" or
"Boolean (1/0)".
l For PI, the value type can be "Integer", "Float", or "Percent".
l For SPI, the value type can only be "Boolean (1/0)".

4-77

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Description

Format The index value type has a constraint relationship with the index type
selected in step 3:
l For KPI, the value format can be "Integer", "Float", "Percent" or
"Boolean (1/0)".
l For PI, the value type can be "Integer", "Float", or "Percent".
l For SPI, the value type can only be "Boolean (1/0)".

Special string (blank) Select special string.

Index value Enter the exception value of the index, which is the calculation result
when the denominator of the index formula is zero.

6. Click the Index Formula tab, and then edit the formula in accordance with the
counter and operators. A formula can be displayed in name style or ID style. You
can view counter names and IDs. For example, packet loss ratio = Loss packets
/ Total packets, where the number of packets lost and the total number of packets
are counters.

Note:
The following describes the meanings of four special keys on the on-screen keyboard:
l C followed with a number indicates a counter.
l Gr indicates the collection granularity.
l P followed with a number indicates a performance index.
l NO indicates the number of measure objects.

In the Editor formula area, the formula is displayed in two styles: name style and ID
style.
7. Click the Preset Threshold tab, and set the parameters.

Parameter Description

Up The larger the value the more serious the alarm level

Down The smaller the value the more serious the alarm level

Up and Down The "Up and Down" direction means that the index follows the alarm
threshold rules in both "Up" and "Down" directions. For example,
the environment temperature and the rotate speed of fans must be
within a proper range, which cannot be too high or too low.

4-78

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Parameter Description

Critical Critical alarms are generated when the performance indices exceed
the critical value. When the performance indices are lower than the
Major
critical value, alarms are removed.
Minor
When the direction is "Up", set the thresholds based on the following
Warning constraints:
l Warning alarm threshold < Minor alarm threshold - Delta
l Minor alarm threshold < Major alarm threshold - Delta
l Major alarm threshold < Critical alarm threshold - Delta
When the direction is "Down", set the thresholds based on the
following constraints:
l Warning alarm threshold > Minor alarm threshold + Delta
l Minor alarm threshold > Major alarm threshold + Delta
l Major alarm threshold > Critical alarm threshold + Delta
The unit of alarm thresholds is related to the unit of the measurement
items.

Delta A performance threshold consists of a threshold value and a delta


(that is, a hysteresis value).
The purpose of a delta is to avoid frequent switching between alarm
generation and disappearance. A performance threshold with a
delta actually provides two thresholds: a higher threshold and a
lower threshold.
For example, suppose the threshold for critical alarm is 30% and
corresponding delta is 2%. Then the higher threshold for critical
alarm of the performance index is 32%; while the lower threshold is
28%. If the delta of a threshold is 0, we can consider that the higher
threshold and the lower threshold are equal.

8. Click OK to finish the configuration.

Note:
The system judges the validity of the index formula. If the index formula is invalid,
a message will pop up to prompt the error. If the index formula is valid, the system
prompts the successful creation of the index and allocates a unique ID to the index.
The new index is displayed in corresponding index list

– End of Steps –

4.7.3.2 Modifying an Index


This procedure describes how to modify an index.

4-79

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Prerequisite
l You have the authority of index management.
l The index you want to modify is a user-defined index.

Context
l The default performance indexes provided by the system cannot be modified.
l Only one index can be modified at a time.
l The MO type, NE type and index value format of user-defined indexes cannot be
modified.

Steps
1. From the main menu, select Performance > Counter And Index Management. The
Counter And Index Management tab is displayed.
2. Perform one of the following operations to open the Modify Index dialog box:
l Right-click the index to be modified, and then click Modify Index from the shortcut
menu.
l Click the index to be modified, and then click on the toolbar.
3. In the Modify Index dialog box, modify the information as needed.

Note:
For the description of the parameters in the dialog box, refer to 4.7.3.1 Creating an
Index.

4. Click OK in the Modify Index dialog box to confirm the modification. A message box
indicating modification success is displayed.
5. Click OK to complete the modification.
– End of Steps –

4.7.3.3 Viewing an Index


This procedure describes how to view the details of an index.

Prerequisite
l You have the authority of index management.
l The index you want to view is a user-defined index

Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter And Index Management tab is displayed.

4-80

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

2. Expand the Resource Type tree in the Model Management pane to find the measure
object.

3. In the text box, enter key words to find the target index.
4. After finding the target index you want to view, perform one of the following operations
to open the View Index box.
l Right-click the target index and then click View Index from the shortcut menu.
l Select the target index, and then click on the toolbar.
l Right-click the target index.
– End of Steps –

4.7.3.4 Deleting an Index


This procedure describes how to manually delete the performance indexes which are no
longer used.

Prerequisite
l You have the authority of index management.
l The index you want to delete is a user-defined index.

Context
You can forcibly delete multiple indexes at the same time.

Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. In the index list, find the user-defined index you want to delete, and then perform one
of the following operations:
l Right-click one or multiple target indexes (or press the Ctrl key), and then select
Delete index from the shortcut menu.
l Select one or multiple target indexes, and then click on the toolbar.
3. In the Confirm message box, click OK.
– End of Steps –

4.7.3.5 Moving an Index


In the U31 R22 system, you can create different index groups for the effective management
of user-defined indexes.
Only user-defined indexes can be moved from an index group to another index group.

Prerequisite
l You have the authority of index management.

4-81

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l The index you want to move is a user-defined index.

Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. In the index list, perform one of the following operations to open the Move Index dialog
box.
l Right-click one or multiple indexes, and then click Move Index from the shortcut
menu.
l Click one or multiple indexes, and then click on the toolbar.
3. In the Move Index dialog box, select the group to which you want to move the index,
and then click OK. A message box is displayed, indicating that the index is successfully
moved.
4. Click OK.
– End of Steps –

4.7.3.6 Exporting Indexes to a File


This procedure describes how to export specific indexes in the system to an *.xml file. All
indexes or selected indexes can be exported.

Prerequisite
l You have the authority of index management.
l The index you want to export is a user-defined index.

Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Perform the following operations as required.

To... Do...

Export all indexes


On the toolbar, click the drop-down button, and select Export
Indexes of All Rows. The Save dialog box is displayed.

Export the selected


i. From the index list, select one or multiple indexes to be exported.
indexes
ii. On the toolbar, click the drop-down button, and select Export
Indexes of Selected Rows. The Save dialog box is displayed.

3. In the Save dialog box, set the path for saving the index file and file name.
4. Click the Save button. A message box is displayed, indicating that the indexes are
successfully exported.

4-82

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

5. Click OK.
– End of Steps –

4.7.3.7 Importing Indexes from a File


This procedure describes how to import predefined indexes from an *.xml file to the system.

Prerequisite
l You have the authority of index management.
l The .xml file containing the information of the indexes you want to import is available
on the local client.

Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Perform one of the following operations to open the Import Index dialog box:
l Right-click any index, and select Index Export from the shortcut menu.
l Click on the toolbar.
3. In the Import Index dialog box, select the index file (*.xml).
4. click the Open button to select the index(es) to be imported in the Index Export dialog
box.
5. Click the Import button. A message box is displayed, indicating that the indexes are
imported successfully.

Note:
If Overwrite is selected in the Index ID conflict options area, a newly imported index
will forcibly overwrite an existing index with the same name. If the name of an index
to be imported is same as that of an existing index in the system, the index will fail to
be exported by default.
If Append is selected, a new index will be assigned a new ID. The name of a new index
cannot be the same as any existing index name, but the content of the new index can
be the same as that of an existing one. t

– End of Steps –

4.7.3.8 Refreshing Indexes


Multiple users can manage indexes in the U31 R22 system via different clients connected
to the server. If another user performs some operations related to indexes, for example,
create a new index or modify an index, you may not immediately view the changes of

4-83

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

indexes on your client due to the response time between the server and different clients.
In this case, you can refresh the indexes to synchronize the latest index information from
the server to your client.

Steps
1. From the main menu, click Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Perform one of the following operations to refresh the indexes in the system:
l Right-click any node in the Resource Type tree, and then click Refresh from the
shortcut menu.
l Click on the toolbar.
– End of Steps –

4.7.4 Index Group Management


4.7.4.1 Creating an Index Group
To effectively manage indexes of different types, you can create a new index group by the
type of index, for example, PI, KPI or SPI. Specific user-defined indexes can be moved
into the group based on a certain rule.

Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. On the left Model Management tab, expand the Resource Type > BN-xTN > CTN
navigation tree.
3. Expand the performance index of the target index type, and right-click the
corresponding performance index node, for example, right-click Key PI, and then
click New Group from the shortcut menu. The New Group dialog box is displayed.
4. Enter the group name in the Group Name text box, and click OK.
The created group is displayed under the Key PI node.
– End of Steps –

4.7.4.2 Modifying an Index Group


This procedure describes how to modify an index group.

Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. On the left Model Management tab, expand the Resource Type > BN-xTN > CTN
navigation tree.

4-84

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

3. Expand the performance index of the target index type, and click the corresponding
performance index node. This procedure uses Key PI as an example.
4. Right-click the index group in the index list, and then select Modify Group from the
shortcut menu. The Modify Group dialog box is displayed.
5. Enter a new name in the Group Name text box.
6. Click OK.
– End of Steps –

4.7.4.3 Deleting an Index Group


This procedure describes how to delete an index group.

Steps
1. From the main menu, Select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. On the left Model Management tab, expand the Resource Type > BN-xTN > CTN
navigation tree.
3. Expand the performance index of the target NE type, and the click the corresponding
performance index node.
4. Right-click the index group in the index list, and then select Delete Group. The
Confirm message box is displayed.
5. Click OK.
– End of Steps –

4.8 Threshold Tasks Management


4.8.1 Creating a Threshold Task
This procedure describes how to create a threshold task. A threshold task monitors the
measurement data within a preset duration. When an index is higher or lower than the
preset threshold, an alarm is generated.

Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.

2. Click on the toolbar. The Add Threshold Task dialog box is displayed.
3. On the Threshold Task tab, set the NE type, MO type, and Threshold index by
performing the following steps:
a. Select an NE type from the NE type list, for example, ZXCTN 6120.

4-85

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
You can select multiple NE types.

b. Select an MO type from the MO type list, for example, checkpoint.


c. Click Add Index. The Select Indices/Counters dialog box is displayed.
You can filter the index or counter in the following way: enter the querying condition
in the text box, and then click .
d. Select indexes and counters, and then click OK to return to the Threshold Task
tab.
e. Select an index, and then click Modify Threshold. The Modify Threshold dialog
box is displayed.
f. Set the alarm direction and alarm thresholds.

g. Click OK to return to the Threshold Task tab.


4. Click the Location tab. The Location tab is displayed.
5. Set Monitor level, Wildcard level, NE location, and MO location by performing the
following steps:
a. Select a monitoring level from the Monitor level list, for example, "checkpoint"
MO layer.

b. Select a wildcard level from the Wildcard level list, for example, NE.
c. Select the NE location in the NE location area.

Note:
If the wildcard level is All, you do not need to set the NE location.

d. Select the MO location in the MO location area.

Note:
If the wildcard level is All or NE, you do not need to set the MO location.

6. Click the General tab. The General tab is displayed.


For parameter descriptions, refer to Table 4-27.

4-86

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

Table 4-27 Descriptions for Parameters on the General Page

Parameter Description

Task status l Activated: The task is activated after it is created. The


threshold task will automatically trigger a threshold alarm in
the configured effective time.
l Suspended: The task is suspended after it is created. The
threshold task will not automatically trigger a threshold alarm
in the configured effective time.

Granularity Indicates the frequency that the threshold task is performed.

7. Set parameters of the threshold task by performing the following steps:


a. In the Task name text box, enter a task name.
b. Set the Start time and End time.

c. Select the status from the Task status list, for example, Activated.
d. Select the granularity from the Granularity list, for example, 15 minute(s).
e. In the Effective date area, select the week or month, and then select a date, for
example, Monday.
f. In the Effective time area, select the start time and end time, and then click Add
to add the duration to the list below.
8. Click OK. The creation of a threshold task is completed.
– End of Steps –

4.8.2 Querying Threshold Tasks


This procedure describes how to query the status and other information of threshold tasks
on the U31 R22, such as MO Type and Index Names.

Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.

2. In the left navigation tree, select the NE on which threshold tasks are created.

3. In the upper-right corner, select the task status from the Display Status list, for
example, Activated tasks.
All activated threshold tasks on the NE are displayed in the list.

– End of Steps –

4-87

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

4.8.3 Modifying a Threshold Task


This procedure describes how to modify a threshold task. The modifiable parameters
include Threshold index, Monitor level, Wildcard level, NE location, MO location,
Task name, End time, Granularity, Effective date, and Effective time.

Prerequisite
The status of the threshold task is suspended.

Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.

2. In the left navigation tree, select the NE on which threshold tasks are created.
3. In the upper-right corner, select Suspended tasks from the Display Status list.
4. Right-click the threshold task to be modified and select Modify Threshold Task from
the shortcut menu. The Modify Threshold Task dialog box is displayed.

5. Modify the parameters as needed.

Note:
The dimmed parameters cannot be modified.

– End of Steps –

4.8.4 Deleting a Threshold Task


This procedure describes how to delete a threshold task.

Prerequisite
The status of the threshold task is suspended.

Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.
2. In the left navigation tree, select the NE on which threshold tasks are created.

3. In the upper-right corner, select Suspended tasks from the Display Status list.
4. Right-click the threshold task to be deleted and select Delete Threshold Task from
the shortcut menu. The Delete Threshold Task dialog box is displayed.

4-88

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 4 Performance Management

5. Click OK.
– End of Steps –

4.8.5 Suspending a Threshold Task


This procedure describes how to change the status of a threshold task from Activated to
Suspended.

Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.
2. In the left navigation tree, select the NE on which threshold tasks are created.

3. In the upper-right corner, select Activated tasks from the Display Status list.
4. Right-click the threshold task to be suspended, and select Suspend Threshold Task
from the shortcut menu.
– End of Steps –

4.8.6 Activating a Threshold Task


This procedure describes how to change the status of a threshold task from Suspended
to Activated.

Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.
2. In the left navigation tree, select the NE on which threshold tasks are created.
3. In the upper-right corner, select Suspended tasks from the Display Status list.

4. Right-click the threshold task to be activated, and select Activate Threshold Task
from the shortcut menu.

– End of Steps –

4-89

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

This page intentionally left blank.

4-90

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5
Report Management
Table of Contents
Public Report .............................................................................................................5-1
CTN Resource Analysis Report ................................................................................5-11
CTN Statistics Report ...............................................................................................5-13
OTN Report..............................................................................................................5-17
MSTP Proprietary Report .........................................................................................5-28
End-to-End Report Management ..............................................................................5-29

5.1 Public Report


5.1.1 Managing Statistical Reports on NEs
By querying statistical reports on one or multiple NEs, you can learn the statistics on these
NEs, for example, the configurations, quantities, number of devices at the corresponding
network layer, percentages, and rates. You can also customize query conditions.

Context
This function is applicable to the SDH, CTN, WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report
> Managed Elements Statistics Report from the main menu. The Managed
Elements’ Statistics Report dialog box is displayed.
2. In the left Device Resource navigation tree, select the desired NEs.
3. Click Query to check the configuration information about the selected NEs.
4. Perform the following operations as required.

To... Do...

Save the NE configuration Click Export.


information locally

Print the NE configuration Click Print.


information

5. Click the Statistics tab. Select an option from the Statistic Condition list. For a
description of the parameters, refer to Table 5-1.

5-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Table 5-1 Statistical Condition Parameter Descriptions

Parameter Description

According to the device Queries the rate level, quantity and percentage of each selected
type NE, and the total number of selected NEs.

According to the network Queries the number of selected NEs at each network level.
level

According to the Queries the device type, number, and percentage of each selected
configured highest service NE and the total number of selected NEs based on the highest,
rate configured service rate.

Define Customizes the statistical conditions (such as IP Address) and the


items (such as Number) to be displayed in a result.

6. Click Query.
7. (Optional) Customize query conditions.
a. On the Statistic tab, select Define. The Define Statistic Conditions dialog box
is displayed.

b. Click New. Set Define Name. From the left list, select the desired query
conditions. Click Right. The selected conditions are moved to the right list.

Note:
To delete a selected condition from the right list, select it and then click Left.

c. Click Apply. Click Close. From the Statistic Condition list, select the newly
added condition.

8. Perform the following operations as required.

To... Do...

Save the NE statistics locally Click the Export button.

Print the NE statistics Click the Print button.

– End of Steps –

5.1.2 Managing Statistical Reports on Slots


By querying the statistical reports on slots, you can know the board information on and slot
usage of one or multiple NEs.

5-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

Context
This function is applicable to the CTN, WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > Slot
Statistics Report from the main menu. The NE Slot Information Report dialog box
is displayed.
2. In the left Device Resource navigation tree, select the NEs whose slot information
you want to query.
3. Click Query. The configurations of the selected NEs are displayed.

4. Perform the following operations as required.

To... Do...

Save the slot information locally Click Export.

Print the slot information Click Print.

5. Click the Statistics tab. From the Statistic Condition list, select the default
condition—Slot Utilization Statistic.
6. Click Query to view the rack type, shelf type, number of used slots, number of available
slots, total number of slots, and usage of a used slot of each selected NE.
7. Perform the following operations as required.

To... Do...

Save the slot statistics on the selected NEs locally Click the Export button.

Print the slot statistics on the selected NEs Click the Print button.

– End of Steps –

5.1.3 Managing the Statistical Reports on Boards


By querying the statistical reports on boards, you can learn the board configuration of
one or more NEs, including the device type, board label, board silkscreen name, software
version, hardware version, port number, occupied number, PCB version, application
version, FPGA version, Boot version, IPMC version, IPMI version, serial number, and
part number.

Context
This function is applicable to the SDH, CTN, WDM and OTN NEs.

5-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report >
Managed Boards Statistics Report from the main menu. The Managed Boards
Statistics Report dialog box is displayed.
2. In the left Device Resource navigation tree, select the required NEs.
3. (Optional) Click Synchronize Board Hardware Information to synchronize the board
hardware information.

Note:
You can also query the PCB version, application version, FPGA version, Boot version,
serial number, and component number.
On the U31 R22 client, select Configuration > Export Engineering Device Info >
Export Transmission Engineering Device Info from the main menu to perform the
operations.

4. Click Query to view the board configuration report.


For a description of the parameters, refer to Table 5-2.
Table 5-2 Parameter Descriptions for the Statistical Report on a Board

Parameter Description

Port Number The number of the ports provided by the board.

Occupied Number The number of the ports on which services are configured.

IPMC Version Hardware version of the IPMC sub-card.

IPMI Version IPMC version of the IPMC sub-card.

5. Perform the following operations as required.

To... Do...

Save the board information Click Export.


locally

Print the board information Click Print.

6. Click the Statistics tab. Set the parameters and then click Query. For a description
of the parameters, refer to Table 5-3.
Table 5-3 Statistical Condition Parameter Descriptions

Parameter Description

Software/Hardware Version Queries the device type, device version, software version,
Statistic hardware version, and board quantity of the selected NEs.

5-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

Parameter Description

Board Type Statistic Queries the board types and quantities of the selected NEs.

Utilized Rate Statistic Queries the usage of each board of the selected NEs.

Board Version Basiced on Queries software version and quantity of each type of board of
Board Types the selected NEs.

Board Version Basiced on Queries software version and quantity of each type of device of
Device the selected NEs.

Define Customizes the statistical conditions, for example, NE Name and


Board Label.

7. (Optional) Customize statistical conditions.


a. From the Statistic Condition list, select Define. The Define Statistic Conditions
dialog box is displayed.
b. Click New. The New Statistic Condition dialog box is displayed.
c. Set Define Name. From the left list, select the desired conditions and then click
Right to add the conditions to the right list.

Note:
To remove a selected condition, select it from the right list and then click Left.

d. Click Apply, and then click Close. From the Statistic Condition list, select the
newly added condition set. Click Query.
8. Perform the following operations as required.

To... Do...

Save the board statistics on the selected NEs Click the Export button.
locally

Print the board statistics on the selected NEs Click the Print button.

– End of Steps –

5.1.4 Managing Statistical Reports on Ports


This procedure describes how to query the statistical reports on ports. The information
includes the number of ports, the rate of each port, and the service on each port.

Context
This operation is applicable to the SDH, CTN, WDM and OTN NEs.

5-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. From the main menu, select Statistics > Bearer NE Report > Ports Statistics
Report. The Ports Statistics Report dialog box is displayed.
2. From the left Device Resource list, select the NEs whose port information you want
to query.
3. Click Query. The port configuration information about the selected NEs is displayed.
4. Perform the following operations as required.

To... Do...

Save the port information locally Click Export.

Print the port information Click Print.

5. Click the Statistics tab. From the left Device Resource list, select the NEs whose
port information you want to query. From the Statistic Condition list on the right,
select a query condition. For a description of the parameters, refer to Table 5-4.

Table 5-4 Query Condition Parameter Descriptions

Parameter Description

Client Port Statistic Queries the used ports and the relevant
services, and the unused ports and the
services that can be carried.

Service Type Statistics Queries the information about the usage of


ports that carry specified services.

Layer Rate Statistic Queries port information by layer.

Define Customizes query conditions such as NE


Name, Board Name, Port, Layer Rate,
Configured Service Type and Comment.

6. (Optional) Customize query conditions.


a. Select Define from the Statistic Condition list. The Define Statistic Conditions
dialog box is displayed.
b. Click New, and the New Statistic Condition dialog box is displayed.

c. Enter a name in Define Name. From the left list, select the statistical conditions
that you want to add, and then click Right. The selected conditions are added to
the right list.

5-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

Note:
To remove a selected condition, select it from the right Statistic Condition list and
then click Left.

d. Click Apply. On the Define Statistic Conditions dialog box, click Close. The
Ports Statistics Report dialog box is displayed. From the Statistic Condition
list, select the newly added name.
7. Click Query.

8. Perform the following operations as required.

To... Do...

Save the port statistics locally Click Export.

Print the port statistics Click Print.

– End of Steps –

5.1.5 Managing the Link Statistics Report


You can learn about the link layer, link rate, and number of links by querying the link
statistics report.

Context
This function applies to the SDH, CTN, and WDM/OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > Links
Statistics Report from the main menu. The Links Statistics Report dialog box is
displayed.

2. Select an NE from the Device Resource navigation tree. Select an option from the
Statistic Condition list.

3. Click Query. The statistical results are displayed in the Query Result list .

For a description of the link statistics report, refer to Table 5-5.

5-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Table 5-5 Parameter Descriptions for Link Statistics Report

Parameter Description

Link Level Determines a link level in accordance with the device levels of the
NEs on both ends of the link.
If the device levels of the NEs at both ends of the link are
consistent, Link Level is the device level, such as Core Layer,
Convergence Layer, Access Layer, Core-Convergence Layer,
or Convergence-Access Layer.
If the device levels of the NEs at both ends of the link are
inconsistent Link Level is Other.

Link Rate Determined by the physical interfaces between the two ends of a
link.

4. Click the Statistics tab. Set the parameters. For a description of the parameters, refer
to Table 5-6.

Table 5-6 Statistical Condition Parameter Descriptions

Parameter Description

According to the link rate Queries the rate and quantity of each link of the selected NE by
link level.

Define Customizes the statistical conditions such as Connection Name


and Source NE.

5. (Optional) Customize statistical conditions.


a. From the Statistic Condition list, select Define. The Define Statistic Conditions
dialog box is displayed.
b. Click New. The New Statistic Condition dialog box is displayed.
c. Set Define Name. From the left list, select the desired conditions and then click
Right to add the conditions to the right list.

Note:

To remove a selected condition, select it from the right list and then click Left.

d. Click Apply, and then click Close. From the Statistic Condition list, select the
newly added condition set. Click Query.

6. Perform the following operations as required.

5-8

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

To... Do...

Export the statistical results Click the Export button.

Print the statistical results Click the Print button.

– End of Steps –

5.1.6 Managing the Protection Group Information Report


By querying the protection group information report of NEs, you can learn the protection
group information of one or more NEs.

Context
This function is applicable to the SDH, CTN, WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report >
Protection Group Information Report from the main menu. The Protection Group
Information Report dialog box is displayed.
2. In the left Device Resource navigation tree, select the required NEs.
3. Click Query to view the protection group information of the NEs.
4. Perform the following operations as required.

To... Do...

Save the protection group information of the NEs Click the Export button.
to a local hard disk

Print the protection group of the NEs Click the Print button.

– End of Steps –

5.1.7 Managing the CTN/SDH Device Port Status Statistics Report


Through the statistical report of the CTN/SDH device port status, you can learn about the
port type, total quantity of the ports, quantity of occupied and idle ports, and utilization.

Context
This function applies to the SDH/CTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bear NE Report >
CTN/SDH Port Status Statistics Report from the main menu. The CTN/SDH Port
Status Statistics Report dialog box is displayed.

5-9

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2. Select an NE from the Device Resource navigation tree.


3. Click Query. The statistical results are displayed in the Query Result list.
For a description of the Port Status parameter on the CTN/SDH port status detailed
report, refer to Table 5-7.

Table 5-7 CTN/SDH Port Status Parameter Description

Parameter Description

Port Status Indicates the service occupancy status of the device port.
The status includes Opened, free, and unknown.

4. Perform the following operations as required.

To... Do...

Save the statistical results of port state Click the Export button.

Print the statistical results of port state Click the Print button.

– End of Steps –

5.1.8 Managing the CTN/SDH Port Status Statistics Report


By querying the CTN/SDH port status statistics report, you can learn the port status of one
or more NEs.

Context
This function is applicable to the SDH and CTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report >
CTN/SDH Port Status Statistic Report from the main menu. The CTN/SDH Port
Status Statistic Report dialog box is displayed.
2. In the left Device Resource navigation tree, select the required NEs.
3. Click Query. The NE port status statistics are displayed in the Query Result list.

4. Perform the following operations as required.

To... Do...

Save the NE port status to a local hard disk Click the Export button.

Print the NE port status Click the Print button.

– End of Steps –

5-10

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

5.2 CTN Resource Analysis Report


5.2.1 Managing the CTN Link Looping Statistics Report
Through the CTN link looping statistics report, you can learn about the number and rate of
the rings formed by the links, and number of the super-large rings.

Context
l This function applies to the CTN NEs.
l The report function requires the support of License.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Resource Analysis > Links Become Ring Statistics Report from the main menu.
The Links Become Ring Statistics Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query. The statistical results are displayed in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the statistical results Click the Export button.

Print the statistical results Click the Print button.

– End of Steps –

5.2.2 Managing the CTN Loop Information Report


Through the CTN loop information report, you can learn about the rate, number of the
members, members’ names, and the accessing personnel in the CTN circle link.

Context
l This function applies to the CTN NEs.
l The report function requires the support of License.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Resource Analysis > Ring Link Information Report from the main menu. The Ring
Link Information Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query. The statistical results are displayed in the Query Result list.
4. Perform the following operations as required.

5-11

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To... Do...

Save the query results Click the Export button.

Print the query results Click the Print button.

– End of Steps –

5.2.3 Managing the Logic Resource Statistics Report


This procedure describes how to manage the logic resource statistics report, such as
creating and modifying a statistics template, setting statistics parameters, and exporting
statistics information. Through this report, you can check the actual flow, configuration
flow, PW quantity on the tunnel, service performance, and resource rationality analysis.

Context
The report function requires the support of License.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Resource Analysis > LogicResource Statistics Report from the main menu. The
Logic Resource Statistics Report dialog box is displayed.
2. From the Device Resource navigation tree in the top left pane, select an NE whose
information is to be collected.
3. From the All Templates navigation tree in the left pane, select a template.
4. In the Setup area in the right pane, set Flow Units, Collection granularity, and set
parameters in the Utility Color Setting (%) and Actual Traffic Duration areas.

Note:
If you need to set a color mark for the alarm level of the resource utilization ratio, click
the Warning or Severe button. The Color Setting dialog box is displayed. Select a
color for the Warning or Severe level of the resource utilization.

5. Click Obtain Resources.


The information meeting with the requirements is displayed in the right pane of Logic
Resource Statistics Report dialog box.
6. Click Execute Statistics.
After the analysis progress is completed, The maximum flow, minimum flow, and
minimum utilization ratio in the period during which this service is operating are
displayed in the list.

5-12

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

7. Perform the following operations as required.

To... Do...

Create a statistics
i. Click New. The Statistical Analysis Template - Custom Template
template
dialog box is displayed.

ii. Set Template Name, and select a resource type and statistic item(s).

iii. Click OK to return to the Logic Resource Statistics Report dialog box.

The new template is displayed under the All Template navigation tree in
the left pane.

Modify statistics
i. From the All Template navigation tree in the left pane, select a template
resource
to be modified.

ii. Click Modify. The Statistical Analysis Template - Configure Traffic


dialog box is displayed.

iii. Modify the resource type and statistics items of the template as required.

iv. Click OK.

Export the logic


i. Click Export. The Logic Resource Statistics Report - Template
resource statistics
Name: Configure Traffic dialog box is displayed.
report
ii. Click the icon. The Save dialog box is displayed.

iii. Set the export path.

iv. Click Save to return to the Logic Resource Statistics Report -


Template Name: Configure Traffic dialog box.

v. Click Export File.

– End of Steps –

5.3 CTN Statistics Report


5.3.1 Managing the CTN NE Service Count Report
Through the NE service count report, you can learn about the number of services that are
configured on various NEs, including the number of tunnels, PWs, protection groups, TDM
services, Ethernet services, MEGs, static routes, and BFDs.

Context
This function applies to all CTN NEs.

5-13

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > Ne Service Count Report. The Ne Service Count Report dialog box is
displayed.
2. From the Device Resource navigation tree, select the NE whose services are to be
collected.
3. Click Query. The statistics results are displayed in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the statistics results Click the Export button.

Print the statistics results Click the Print button.

– End of Steps –

5.3.2 Managing the CTN SFP Statistics Report


Through the CTN SFP statistics report, you can query the optical module information of
NEs, including the detail information about the device type, port, manufacturing date, serial
No., and sending and receiving bands.

Context
This function is applicable to all CTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > CTN SFP Statistic Report from the main menu. The CTN SFP Statistic
Report dialog box is displayed.
2. In the left Device Resource navigation tree, select the required NEs.
3. (Optional) If the device hardware information is not synchronized to the network
management, the optical module information cannot be queried. To perform the
synchronization, perform the following operations:
a. Click Synchronization Board Hardware Information. The Synchronization
Board Hardware Information dialog box is displayed.
b. In the Customized Resource navigation tree, select the NE to be synchronized.
c. Click Start Synchronize.
d. After the synchronization is completed, click OK.
4. Click Query. The SFP statistics of the NEs are displayed in the Query Result list.
5. Perform the following operations as required.

5-14

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

To... Do...

Save the SFP statistics of the NEs Click the Export button.

Print the SFP statistics information of the NEs Click the Print button.

– End of Steps –

5.3.3 Managing the NE Rate Statistics Report


Through the CTN NE rate statistics report, you can learn about the NE type, rate, quantity,
and proportions of the various types in the network.

Context
This function applies to the CTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > NE Rate Statistics Report from the main menu. The NE Rate Statistics
Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query. The statistical results are displayed in the Query Result list.

4. Perform the following operations as required.

To... Do...

Save the statistical results Click the Export button.

Print the statistical results Click the Print button.

– End of Steps –

5.3.4 Managing the L3 Interface Information Report


Through the CTN L3 interface information report, you can learn about the L3 interface
information of NEs, including the port type, seal type, SVLAN, CVLAN, IP address, MAC
address, and domain.

Context
This function applies to all CTN NEs.

5-15

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > L3 Interface Information Report. The L3 Interface Information Report
dialog box is displayed.
2. From the Device Resource navigation tree, select the NE to be queried.
3. Click Query. The statistics results are displayed in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the statistics results Click the Export button.

Print the statistics results Click the Print button.

– End of Steps –

5.3.5 Managing the CTN NE Version Statistics Report


Through the CTN NE version statistics report, you can learn about the version information
of NEs, including the device type, software version, and interface version.

Context
This function applies to all CTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > Equipment Version Statistics Report. The Equipment Version Statistics
Report dialog box is displayed.
2. From the Device Resource navigation tree, select the NE to be queried.
3. Click Query. The statistics results are displayed in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the statistics results Click the Export button.

Print the statistics results Click the Print button.

– End of Steps –

5-16

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

5.3.6 Managing the CTN Ethernet Service Access Information


Report
Through the CTN Ethernet service access information report, you can learn about the
service point, external VLAN, internal VLAN, service ID, and service description of Ethernet
service access.

Context
This function applies to all CTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > Ethernet Service Access Information Report. The Ethernet Service
Access Information Report dialog box is displayed.
2. From the Device Resource navigation tree, select the NE to be queried.
3. Click Query. The statistics results are displayed in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the statistics results Click the Export button.

Print the statistics results Click the Print button.

– End of Steps –

5.4 OTN Report


5.4.1 Managing the Shelf Information Report
Through the shelf information report, you can query the shelf label, shelf type, and the
affiliated shelf of one or multiple NEs.

Context
This function is applicable to the WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Shelf Configuration Report from the main menu. The Shelf Configuration
Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.

3. Click Query. The shelf information is displayed in the Query Result list.

5-17

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Figure 5-1 Shelf Information

4. Click the Statistics tab. From the Statistic Condition list, select According to the
shelf type. The information about the type, quantity and percentage of each shelf on
the selected NE are displayed, see the following figure.

Figure 5-2 Self Statistics by Type

5. Perform the following operations as required.

To... Do...

Save the shelf information report to a local hard Click the Export button.
disk

Print the shelf information report Click the Print button.

– End of Steps –

5-18

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

5.4.2 Managing the Information Report of the Board Components


Through the information report of the OTN board components, users can query the
information of the OTN board components: including PN, SN, manufacturer, and
manufacturer OUI.

Context
This function is applicable to the WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > WDM Board Component Information Report from the main menu. The
WDM Board Component Information Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the board component information in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the information report of the board Click the Export button.
components to the local hard disk

Print the information report of the board Click the Print button.
components

– End of Steps –

5.4.3 Managing the Adjustable Power Margin Report


Through Adjustable Power Margin Report, users can query the adjustable power margin
in the entire network.

Context
This function is applicable to the WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Adjustable Power Margin Report from the main menu. The Adjustable
Power Margin Report dialog box is displayed.
2. Select the OMS check box below Basic Attribute on the left.
The Setting area is displayed.
3. Click Setting. The Select Service dialog box is displayed.
4. Select one or multiple resources from the Select Service dialog box, and click Add.

5-19

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

The selected resource is added to the Selected Result area.


5. Click OK to return to the Adjustable Power Margin Report dialog box
6. Click Query to view the adjustable power margin in the Query Result list.
7. Perform the following operations as required.

To... Do...

Save the adjustable power margin report to a Click the Export button.
local hard disk

Print the adjustable power margin report Click the Print button.

– End of Steps –

5.4.4 Managing Port State Report


Through OTN port state report, users can query the related information about the port of
a single or multiple NEs, such as Is Alarm, Is Alarm Mask, and Is Loop Back.

Context
This function is applicable to the WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Port State Data Report from the main menu. The Port State Data Report
dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the port state in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the port state report to a local hard disk Click the Export button.

Print the port state report Click the Print button.

– End of Steps –

5.4.5 Managing the Fixed Attenuator Report


Through the fixed attenuator report, users can query relative information of the fixed
attenuator in a single NE or multiple NEs.

Context
This function is applicable to the WDM and OTN NEs.

5-20

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Fix Attenuator Report from the main menu. The Fix Attenuator Report
dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the fixed attenuator information in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the fixed attenuator report to a local hard Click the Export button.
disk

Print the fixed attenuator report Click the Print button.

– End of Steps –

5.4.6 Managing the Wavelength Allocation Report


Through the wavelength allocation report, users can query the wavelength allocation
information of one or multiple NEs, such as frequency, port allocation, and attenuation.

Context
This function is applicable to the WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Wave Assign Report from the main menu. The Wave Assign Report dialog
box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the wave allocation information in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the wavelength allocation report to a Click the Export button.


local hard disk

Print the wavelength allocation report Click the Print button.

– End of Steps –

5-21

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

5.4.7 Managing the Dispersion Compensation Report


Through the dispersion compensation report, you can learn about the dispersion
compensation information of WDM NEs, such as the port, leveling mode, step, tracking
mode, LOF treatment, and destination dispersion.

Context
This function applies to all WDM/OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Dispersive Compensation Report from the main menu. The Dispersive
Compensation Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the dispersive compensation information in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the statistical results Click the Export button.

Print the statistical results Click the Print button.

– End of Steps –

5.4.8 Managing the Optical Module Information Report


Through the optical module information report, you can learn about the optical module
information of NEs, such as the port, module type, interface type, rate, transmission
distance, service type, fiber type, and lightwave frequency.

Context
This function applies to all WDM/OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Optical Module Info Report from the main menu. The Optical Module Info
Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.

3. Click Query to view the optical module information in the Query Result list.
4. Perform the following operations as required.

5-22

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

To... Do...

Save the statistical results Click the Export button.

Print the statistical results Click the Print button.

– End of Steps –

5.4.9 Managing the Configuration Report of GCC Byte Use Mode


By configuring the report in the GCC byte use mode, users can query the information such
as GCC byte and use mode configuration.

Context
This function is applicable to the WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > GCC Byte Use Mode Configuration Report from the main menu. The GCC
Byte Use Mode Configuration Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the GCC byte use mode configuration in the Query Result list.

4. Perform the following operations as required.

To... Do...

Save the configuration report of GCC byte use Click the Export button.
mode to a local hard disk

Print the configuration report of GCC byte use Click the Print button.
mode

– End of Steps –

5.4.10 Managing the FEC Mode Configuration Report


Through the FEC mode configuration report, you can learn about the NE, board, and port
information for configuring the FEC mode.

Context
This function applies to the SDH, CTN, and WDM/OTN NEs.

5-23

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > FEC Mode Configuration Report from the main menu. The FEC Mode
Configuration Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the FEC mode configuration in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the query results Click the Export button.

Print the query results Click the Print button.

– End of Steps –

5.4.11 Managing the Customer Information Report


Through the customer information report, you can query customer’s information, such as
user name, credit level, and contact information.

Context
This function is applicable to the SDH, CTN, WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report >
OTN Report > Customer Information Report from the main menu. The Customer
Information Report dialog box is displayed.
2. Click Query to view the customer information in the Query Result list.
3. Perform the following operations as required.

To... Do...

Save the customer information report to the local Click the Export button.
hard disk

Print the customer information report Click the Print button.

– End of Steps –

5.4.12 Managing the Configuration Report of the Service Mapping


Mode
Through the configuration report of the service mapping mode, users and mapping
information of the port of a single or multiple NEs.

5-24

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

Context
This function is applicable to the WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Service Mapping Mode Configuration Report(X) from the main menu.
The Service Mapping Mode Configuration Report(X) dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the service mapping mode configuration in the Query Result list.
4. Perform the following operations as required.

To... Do...

Save the configuration report of the service Click the Export button.
mapping mode to the local hard disk

Print the configuration report of the service Click the Print button.
mapping mode

– End of Steps –

5.4.13 Managing the Customer Service Running State Report


Through the customer service running state report, you can query the normal running time,
and unavailable time of the services that have been applied.

Prerequisite
The U31 R22 system has the customer who has the corresponding service.

Context
This function is applicable to the WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > BN xTN Configuration
Report > OTN Report > Customer Service Running State Report from the main
menu. The Customer Service Running State Report dialog box is displayed.
2. Set the customer information.
a. Click Setting. The Resource Selector dialog box is displayed.
b. Select a customer from the Resource Selector dialog box, and click Add.
The selected customer is added to the Selected Result area. The user can add
multiple customers by repeating this operation.
c. Click OK to return to the Customer Service Running State Report dialog box

5-25

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3. Set the Start Time and End Time for the customer service.
4. Click Query. The service information of the customer is displayed in Query Result
list.
5. Perform the following operations as required.

To... Do...

Save the report of the customer service running Click the Export button.
status to a local hard disk

Print the report of the customer service running Click the Print button.
status

– End of Steps –

5.4.14 Managing the OPM Optical Channel Performance Report


Through the OPM optical channel performance report, you can query the relative
information of the OPM optical channel performance, such as power value, Signal to
Noise Ratio (SNR), and wavelength offset.

Context
This function is applicable to the WDM and OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > OPM Optical Channel Performance Report(Y) from the main menu. The
OPM Optical Channel Performance Report(Y) dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the OPM optical channel performance information in the Query
Result list.
4. Perform the following operations as required.

To... Do...

Save the OPM optical channel performance Click the Export button.
report to a local hard disk

Print the OPM optical channel performance report Click the Print button.

– End of Steps –

5-26

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

5.4.15 Managing the Bandwidth Resource Statistics Report


Through the bandwidth resource statistics report, you can learn about the bandwidth
resource information of OMSs, such as the total bandwidth and frequency, used
bandwidth, available bandwidth, and occupancy rate.

Context
This function applies to all WDM/OTN NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Bandwidth Resource Statistics from the main menu. The Bandwidth
Resource Statistics dialog box is displayed.
2. Select an OMS from the OMS Resource navigation tree.
3. Click Refresh to view the service bandwidth information.
4. Perform the following operations as required.

To... Do...

Save the statistical results Click the Export button.

Print the statistical results Click the Print button.

– End of Steps –

5.4.16 Managing Frequency Statistics of Tunnels Between Two NEs


This procedure describes how to query frequency statistics (including the frequencies and
their usage) of tunnels between two NEs.

Steps
1. From the main menu, select Statistics > Bearer NE Report > OTN Report > Two
Channel Static Report. The Two Channel Static Report dialog box is displayed.
2. From the Direction list, select Unidirection or Bidirection.

3. In the Begin area, click Browse. The Resource Selector dialog box is displayed.
Select a source NE and then click OK.
4. In the End area, click Browse. The Resource Selector dialog box is displayed. Select
a destination NE and then click OK.

5. (Optional) If there are other NEs between the two NEs, click Browse in the Middle
Nes area. Select the NEs between the two NEs and then click OK.
6. Click Query.

7. Perform the following operations as required.

5-27

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To... Do...

Save the report locally Click Export.

Print the report Click Print.

– End of Steps –

5.5 MSTP Proprietary Report


5.5.1 Managing the MSTP Cross-Connect Service Report
By querying the MSTP cross-connect service report, you can learn the cross-connect
service information of one or more NEs.

Context
This function is applicable to the SDH NEs.

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > MSTP
Report > MSTP Cross Connection Report from the main menu. The MSTP Cross
Connection Report dialog box is displayed.

2. From the left Device Resource navigation tree, select the required NEs.
3. Click Query to view the cross-connect service information of the NEs.
4. Perform the following operations as required.

To... Do...

Save the cross-connect service information of the Click the Export button.
NEs to a local hard disk

Print the cross connect information of the NEs Click the Print button.

– End of Steps –

5.5.2 Managing the SFP Statistics Report of MSTP Equipment


This procedure describes how to query the SFP statistics report of MSTP equipment to
learn the SFP statistics of one or multiple NEs.

Context
This function is applicable to the SDH NEs.

5-28

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

Steps
1. In the Topology Management window, select Statistics > Bearer NE Report >
MSTP Report > MSTP SFP Statistics Report from the main menu. The MSTP SFP
Statistics Report dialog box is displayed.
2. From the left Device Resource navigation tree, select the required NEs.
3. (Optional) If the device hardware information is not synchronized to the network
management, the SFP information cannot be queried. To perform the synchronization,
perform the following operations:
a. Click Synchronize Board Hardware Information. The Synchronize Board
Hardware Information dialog box is displayed.
b. Click Start Synchronize.
c. After synchronization, click Close.
4. (Optional) Click Synchronize Board Hardware Information to synchronize the board
hardware information.
5. Click Query to view the SFP statistics of NEs.
6. Perform the following operations as required.

To... Do...

Save the SFP statistics of NEs to a local hard disk Click the Export button.

Print the SFP statistics of NEs Click the Print button.

– End of Steps –

5.6 End-to-End Report Management


5.6.1 Managing the Service Data Report
This procedure describes how to export the statistics information of end-to-end services
through the service data report. You can know properties of each service, such as State,
Customer, and Create Time.

Steps
1. In the Topology Management window, select Statistics > E2E Report Management
from the main menu. The E2E Report Management dialog box is displayed.
2. From the navigation tree in the Report area in the left pane, select E2E Report
Management > Service Data Report.
3. (Optional) In the Filter Condition area in the left pane, set filtering conditions as
required.
4. Set Display mode.

5-29

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l Rate first: displays the filtered results with the service rate as the index.
l NE first: displays the filtered results with the service NE as the index.
5. Click Filter in All.
The protection subnets that meet filtering conditions are displayed in the list in the right
pane.
For a description of the service data report, refer to Table 5-8.

Table 5-8 Parameter Descriptions for the Service Data Report

Parameter Description

Consistent Stat Identifies the matching degree between end-to-end services and
single-point configuration data.
Options: Consistent, Inconsistent, Exception, and Extend.
Normally, the end-to-end service that is just discovered
automatically has the highest matching degree, whose Consistent
State is Consistent. If you modify the service through single-point
operations, the consistent state of the end-to-end service might
change.

SNC Type Categories of services based on the service topology. Normally,


single end-A or end-Z services are simple services.

Fixed State Whether the service is configured on the NMS.


If the service is configured in the hardware of the device rather than
on the NMS, this services is triggered automatically after the device
is powered on, such as transparent transmission services.
If the service is configured on the NMS, Fixed State is Unfix.

6. Export the service data report as required. For the corresponding procedures, refer to
Table 5-9.

Table 5-9 Operations for Exporting the Service Data Report

To... Do...

Export the report as a i. Select File from the Export list. The Save dialog box is displayed.
file
ii. Set Save in, File Name, and Files of Type.

iii. Click Save.

Print the report i. Select Print from the Export list. The Print Setup dialog box is
displayed.

ii. Set parameters on the General, Page Setup, and Advanced tabs.

iii. Click Print.

– End of Steps –

5-30

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

5.6.2 Managing the Service Statistics Report


This procedure describes how to export the statistics information of customer-related
end-to-end services through the service statistics report. You can know properties of each
service, such as Total Number, State, and Customer Name.

Steps
1. In the Topology Management window, select Statistics > E2E Report Management
from the main menu. The E2E Report Management dialog box is displayed.
2. From the navigation tree in the Report area in the left pane, select E2E Report
Management > Service Statistics Report.
3. (Optional) In the Filter Condition area in the left pane, set filtering conditions as
required.
4. Click Filter in All.
The services that meet filtering conditions are displayed in the list in the right pane.

Note:
The corresponding value is displayed in State only if Configuration State, Service
State, or Usage State is set.

For a description of the service statistics report, refer to Table 5-10.


Table 5-10 Parameter Descriptions for Service Statistics Report

Parameter Description

Configure/Service/Usage Service state.


State l Configure State: Whether the configuration data of the NMS
is delivered to the device successfully.
If all the configuration data of an end-to-end service is delivered
to the device successfully, Configure State is Active. If the
configuration data of an end-to-end service is not delivered to
the device successfully, Configure State is Deactive. If only
some configuration data is delivered to the device successfully,
Configure State is Partially Active.
l Service State: Whether the service is operating.

Layer Rate Rate of the network layer where a service is located. Layer
Rate includes SMT-1 Regenerator Section, GE, E1/VC12, L2L3
Bridge, Line Type Ethernet Rate, LAN Type Ethernet Rate(Work
Server-Layer Service Number), TREE Type Ethernet Rate(Work
Server-Layer Service Number), and Multi-Segment PW.

Total Number Total number of each service.

5-31

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

5. Export the report as required. For the corresponding procedures, refer to Table 5-11.

Table 5-11 Operations for Exporting the Service Statistics Report

To ... Do...

Export the report as a i. Select File from the Export list. The Save dialog box is displayed.
file
ii. Set Save in, File Name, and Files of Type.

iii. Click Save.

Print the report i. Select Print from the Export list. The Print Setup dialog box is
displayed.

ii. Set parameters on the General, Page Setup, and Advanced tabs.

iii. Click Print.

– End of Steps –

5.6.3 Managing the MSTP Fiber Usage Statistic Information Report


This procedure describes how to export the statistic information of MSTP fiber connection
usage rate through the report. You can know the usage rate of the optical connections in
the network.

Prerequisite
You have the user permission of "Supervisor Role" or above.

Steps
1. In the Topology Management window, select Statistics > E2E Report Management
from the main menu. The E2E Report Management dialog box is displayed.
2. From the navigation tree in the Report area in the left pane, select E2E Report
Management > MSTP Fiber Usage Statistic Report.
3. (Optional) In the Filter Condition area, set filtering conditions as required.
4. Click Filter in All.
The services that meet filtering conditions are displayed in the list in the right pane.
5. Export the MSTP fiber usage statistics report as required. For the corresponding
procedures, refer to Table 5-12.

Table 5-12 Operations for Exporting the MSTP Fiber Usage Statistics Report

To... Do...

Export the report as a i. Select File from the Export list. The Save dialog box is displayed.
file
ii. Set Save in, File Name, and Files of Type.

iii. Click Save.

5-32

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

To... Do...

Print the report i. Select Print from the Export list. The Print Setup dialog box is
displayed.

ii. Set parameters on the General, Page Setup, and Advanced tabs.

iii. Click Print.

– End of Steps –

5.6.4 Managing the Isolated Cross Connection Data Report


This procedure describes how to export the statistic information of isolated cross
connections through the report. You can clean the corresponding isolated cross
connections in the network.

Steps
1. In the Topology Management window, select Statistics > E2E Report Management
from the main menu. The E2E Report Management dialog box is displayed.
2. From the navigation tree in the Report area in the left pane, select E2E Report
Management > Isolated Cross Connection Data Report.
3. In the Filter Condition area, set filtering conditions as required.
4. Click Filter in All.
The services that meet filtering conditions are displayed in the list in the right pane.
5. Export the isolated cross connection data report as required. For the corresponding
procedures, refer to Table 5-13.

Table 5-13 Operations for Exporting the Isolated Cross Connection Data Report

To... Do...

Export the report as a i. Select File from the Export list. The Save dialog box is displayed.
file
ii. Set Save in, File Name, and Files of Type.

iii. Click Save.

Print the report i. Select Print from the Export list. The Print Setup dialog box is
displayed.

ii. Set parameters on the General, Page Setup, and Advanced tabs.

iii. Click Print.

– End of Steps –

5-33

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

5.6.5 Managing the Protection Subnet Report


This procedure describes how to export the statistics information of protection subnets
through the report. The statistics information includes type, rate, status, and service
information.

Steps
1. In the Topology Management window, select Statistics > E2E Report Management
from the main menu. The E2E Report Management dialog box is displayed.
2. From the navigation tree in the Report area in the left pane, select E2E Report
Management > Protection Subnet Report.
3. (Optional) In the Filter Condition area, set filtering conditions as required.
4. Click Filter in All.
The services that meet filtering conditions are displayed in the list in the right pane.
For a description of the protection subnet report, refer to Table 5-14.
Table 5-14 Parameter Descriptions for Protection Subnet Report

Parameter Description

Open Type Distinguishes TNP networking mode.


l Open: The working path and the protection path have the
same source but different destinations.
l Close: The working path and the protection path have the
same source and destination.

Consistent State Identifies the matching degree between end-to-end services and
single-point configuration data.
Options: Consistent, Inconsistent, and Defect.
Normally, the end-to-end service that is just discovered
automatically has the highest matching degree, whose Consistent
State is Consistent. If you modify the service through single-point
operations, the consistent state of the end-to-end service might
change.

Return Mode Whether service signals are switched from the protection path to
the working path after the working path recovers. If so, Return
Mode is Revertive. Otherwise, Return Mode is Non-Revertive.

WTR (minutes) If the working path recovers, service signals are not switched
from the protection path to the working path immediately. After a
period of time (WTR (minutes), service signals are switched to the
working path for transmission.

Delay Time (100ms) If the working path is faulty, service signals are not switched from
the working path to the protection path immediately. If the working
path is still faulty after a period of time (Delay Time (100ms) ),
service signals are switched to the protection path for transmission.

5-34

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 5 Report Management

5. Export the protection subnet report as required. For the corresponding procedures,
refer to Table 5-15.

Table 5-15 Operations for Exporting the Protection Subnet Report

To... Do...

Export the report as a i. Select File from the Export list. The Save dialog box is displayed.
file
ii. Set Save in, File Name, and Files of Type.

iii. Click Save.

Print the report i. Select Print from the Export list. The Print Setup dialog box is
displayed.

ii. Set parameters on the General, Page Setup, and Advanced tabs.

iii. Click Print.

– End of Steps –

5-35

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

This page intentionally left blank.

5-36

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6
Security Management
Table of Contents
Overview ....................................................................................................................6-1
Setting User Account Rule .........................................................................................6-8
Role Management ....................................................................................................6-10
Role Set Management..............................................................................................6-16
Operation Set Management......................................................................................6-20
Department Management.........................................................................................6-26
User Management....................................................................................................6-28
Other Functions........................................................................................................6-35

6.1 Overview
6.1.1 Overview of Security Management
U31 R22 provides security management functions to ensure proper and reliable operation
of the U31 R22. By using the security management functions, the system administrator
can create security policies, maintain user accounts and manage roles, role sets and
departments. In addition, the administrator can assign different authorities to different
users so that these users are limited to access and manage certain network resources.

The security management functions of the U31 R22 can be classified into two parts:
l Security policy customization: Security policies are applicable to all users of the
system, such as the user account management rule and the security event rule.
l Integrated management of roles, role sets, operation sets, departments and users:
The integrated management functions support the system administrator to specify
operation and management policies for individual users.

Select Security from the main menu. The submenus are displayed, see Figure 6-1.

6-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Figure 6-1 Security Menu

To open the Security Management view, perform one of the following operations. Figure
6-2 shows the security management view.
l Click Security > Role Management on main menu.
l Click button.
l Click button.

6-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

Figure 6-2 Security Management View

1. Menu Bar 3. Navigation Pane 4. Security Management


2. Toolbar Pane

6.1.2 Basic Concepts in Security Management


To better understand the security management model, it is necessary to first introduce
some basic concepts, including role, role set, operation set, department, and user.

l Role
A role specifies the management permission for a user group, including the operation
permission and manageable resources.

à The operation permission defines what specific functional modules of the


U31 R22 that the user group can use. For example, if a role has the operation
permission of the log management module, the users with the role can perform
log management operations, such as querying and maintaining logs.
à The manageable resources defines the subnetworks and/or network elements
that the role can manage.

6-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
Operation permission and manageable resources define two aspects of the role’s
authority. The definition of the two aspects is independent of each other. But role’s
authorities are defined by the two aspects together. For example, if a role has the
operation permission of log management, and its manageable resources are base
stations, the actual authority of the role is to manage the logs of base stations.

l Role Set

A role set is a combination of roles. The management permission of a role set involves
the authorities of all roles in the role set.
After specifying a role set, you can easily assign authorities to a system administrator
or subnetwork administrator by giving the management permissions of all roles in the
role set to the administrator at a time.
l Operation Set
An operation set is a combination of operations assigned to a role. An operation set is
assigned to a role, which has the permission of all operations specified in the operation
set.
l Department

Departments are specified in the U31 R22 to simulate the actual administrative
departments. In this way, the system administrator can easily organize and manage
users in the U31 R22. A newly-created user must belong to a department.

Note:

By default, a newly-created user belongs to the root department of the system unless
specially required.

l User

A user is an operator who is authorized to log in to the system and perform


operations in the system. While creating a user, the system administrator assigns
the management permission to the user by specifying a role or role set and allocates
the user to a department in accordance with the actual situation.

6.1.3 Relation Model


The relations among user, role, role set, department, operation permission, and
manageable resources are illustrated in Figure 6-3.

6-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

Figure 6-3 Relation Model of Security Management

The following explains the relation model of security management.


l A user is administered by a department.
l The management permission of a user depends on the role set assigned to the user.
l A role set includes one role or a series of roles. Accordingly, the management
permission of a role set is the collection of management permissions of all roles in
the role set.
l The management authority of a role depends on the operation permission and
manageable resources specified for the role.

6.1.4 Security Management Solution


After fully understanding the relation model of security management, you can work out
a security management solution in accordance with the network scale, administrative
division, and permission allocation.
Suppose a telecommunication operator in a province plans to use the U31 R22 system
to manage all digital microwave transmission devices over the province. Several branch
offices are distributed in the province. Each office only manages the devices in the area

6-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

administrated by it. Table 6-1 provides a security management solution for the operator,
which specifies the departments, role sets, roles, operation sets, users, and their relations.

6-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

Table 6-1 Security Management Example

Department Role Role Operation Set Role Description User


Set

None None System Administrator The default user in the system Admin
administrator with the highest authorities and
independent of all departments.

Provincial None Province System The MW (microwave) equipment MWAd-


Office administrator administrator administrator who has the authority min
to manage all microwave devices in
the province.

None Province on-duty Monitor Ordinary operator who can monitor MWW-
personnel all MW devices in the province. atch

Branch Office None Branch System The MW equipment administrator MWAd-


1 Administrator administrator who has the authority to manage min1
all microwave devices in the area
administered by the branch office 1.

None Branch on-duty Monitor Ordinary operator who can perform MWW-
personnel routine monitoring operations atch1
on all MW devices in the area
administrated by branch office 1.

Branch Office None Branch System The MW equipment administrator MWAd-


2 Administrator administrator who has the authority to manage min2
all microwave devices in the area
administered by the branch office 2.

None Branch on-duty Monitor Ordinary operator who can perform MWW-
personnel routine monitoring operations atch2
on all MW devices in the area
administrated by branch office 2.

Branch Office None Branch System The MW equipment administrator MWAd-


N Administrator administrator who has the authority to manage minN
all microwave devices in the area
administered by the branch office N.

None Branch on-duty Monitor Ordinary operator who can perform MWW-
personnel routine monitoring operations atchN
on all MW devices in the area
administrated by branch office N.

6-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

6.2 Setting User Account Rule


The user account rule specifies the password policy, account lockout policy and the
account checkup policy of users.

Prerequisite
You have the authority to perform this operation.

Steps
1. On the menu bar of the client window, select Security > Set User Account Rule. The
Set User Account Rule dialog box is displayed, see Figure 6-4.

Figure 6-4 Set User Account Rule Dialog Box

2. Set parameters to customize user account rule.

6-8

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

The following table describes the parameters in the Customize User Account Rule
dialog box.

Rule Parameter Description

Password Enable Weak Password Check Select this check box to check for
Policy weak password.

Minimum Length Minimum password length (value


range: 0-20).

Maximum Length Maximum password length (value


range: 0-20).

Can not be last used password Value range: 1-100


within

Can not be last used Value range: 1-100

Notify password expiry before *** Value range: 1-90


days

Same positions of new and old Value range: 1- 20


passwords must be different with at
least

In case of login failure, lock the Value range: 1 -10


account for

Character sets of the old and the new Value range: 1- 20


password should differ at least

User must modify overdue Select and the user must modify
password when login overdue password before logging in
the system.
If the check box is not selected, the
user can login without modifying
overdue password.

Account Lock - Set locking rule for the account. The


Rule locked account must be unlocked by
system administrator admin. There
are three options:
l Never Lock: Never Lock
l Lock Permanently: Lock
permanently
l Lock Temporarily: Lock
temporarily

Lock at unsuccessful attempts of Lock the account at specified times


*** times of entering wrong password (value
range: 2-20).

6-9

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Rule Parameter Description

The locking type: Lock Permanently


or Lock Temporarily

Unlock after *** hours Unlock after specified hours (value


range: 1-72).
The locking type: Lock Temporarily

Lock account with IP Select to Lock the account with IP.

The user admin not lock Select and Admin account is not
locked.

Account Can not be last used user accounts Select and the user account must
Checking deleted in *** days not repeat any deleted account in
specified previous days (value range:
1-100).

Notify account expiry before *** Select and the system will notify
days account expiry in specified days
(value range: 1-90).

Note:
To restore default setting, click Default button.

3. Click OK button to finish setting.


– End of Steps –

6.3 Role Management


By using the role management functions, you can perform the following operations:
l Specifying the operation permission and manageable resources of a role.
l Setting the IP address range that can be used by a role.
l Locking or unlocking a role.
If a role is locked, the user as the role cannot use the operation permission of the role.
After an authorized user logs in to the NMS, the user only can perform the operations
within the role authority range, view the authorized NEs and perform the corresponding
operations on these NEs. The unauthorized NEs are not visible.
The role management is the basis of role set management and user management. Roles
are members of a role set. A user must be assigned with a role or a role set before logging
in to the system. Therefore, proper definition and assignment of roles is the foundation for
security management.
The U31 R22 supports the following role management functions:

6-10

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

l Creating a Role: set the name, description, locking status, operation permission and
operation set to create a new role.
l Modifying a Role: modify the description, locking status, operation permission and
operation set of an existing role.
l Duplicating a Role: duplicate an existing role and create a new role based on the
information of the duplicated role.
l Deleting a Role: delete a useless role.
l View assigned users: view users assigned with a role.
l Locking a Role: lock a role to disable the operation permission specified by the role.
You can modify a locked role.

Note:
AdministratorRole, MaintenanceRole, SupervisorRole, and OperatorRole are four
predefined roles. Users cannot modify or delete them. In addition, users cannot duplicate
AdministratorRole.

6.3.1 Creating a Role


This procedure describes how to create a role in accordance with the security management
plan.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Right-lick Role in the navigation tree, and select Create Role from the shortcut menu.
3. On the right pane, set parameters of creating a role. For the parameter descriptions,
refer to Table 6-2.

Table 6-2 Parameter Descriptions for Creating a Role

Parameter Description Value Range Default Value

Role Name Enter the role name in this 1-50 character(s) "new role" + Number
box. This parameter is (Sequence number
mandatory. of the newly created
role, e.g. "new role2")

Role Enter the description of the 1-100 character(s) -


Description role. This parameter is
optional.

6-11

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Description Value Range Default Value

Lock the Role Select this check box to Check box Not selected
lock the role.
Once the role is locked,
the user assigned with
the role is deprived of
corresponding operation
permission. If a user is only
assigned with the locked
role, the system does not
permit the login of this user.

Resource Tree Define manageable Select from the resource Not selected
resources for the role. tree.
The node has four types of
status:
l Red cross on the icon:
No right.
l Blue icon: having
defined right.
l Red arrow on the icon:
sharing the authority
of parent icon.
l No red arrow: not
sharing authority of
parent icon.

Operation Set Define the operation Default operation set: No authority


Name authority of the role. l Administrator Right
(Unavailable)
l System
Maintenance Right
l Operation Right
l View Right
l No Right
Customized operation
set

4. Enter the role name and description that are easy to identify. The Role Name must
be unique.

5. Set operation set for the node on Resource Tree in Access Rights pane.
l To follow the authority of the parent node, right-click the node, and select Follow
Up Right from the shortcut menu. To synchronize the authority of the node with
the sub-nodes, right-click the node, and select Synchronize All Lower Right
from the shortcut menu.

6-12

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

l To view the operation permission of different modules in an operation set,


double-click the operation set. For example, double-click Operation Right in the
operation set. The Operation Set Configuration dialog box is displayed.
6. Click OK to finish the creation of a new role.
– End of Steps –

6.3.2 Modifying a Role


An existing role can be modified as needed, including its description, lockup status, and
permission. Note that the role name is unmodifiable.
Users can also view attributes of a role in modifying operations.

Context

Note:
If the operation permission of a role is changed, the system will force login users with that
role to log out. The operation permission of the users changes correspondingly after they
re-log in to the system.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. To turn the attributes of a role into modifiable status, perform one of the following
options.
l Right-click a role node in the Role Management pane, and select Modify Role
from the shortcut menu.
l Select a role node in the Role Management pane, and click Modify button at the
bottom-right corner.

Note:

Users cannot modify predefined roles.

3. Modify the attributes of the role in modifiable status.


4. Click OK to save modifications.

– End of Steps –

6-13

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

6.3.3 Duplicating a Role


By duplicating an existing role, you can quickly create a new role similar to an existing
role. The duplicated role has the attributes of the existing role, thus making creation of
new roles easier.

Prerequisite
The role to be duplicated has already been created.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the Role Management pane, right-click the role to be duplicated under Role, and
select Duplicate Role from the shortcut menu.

Note:

The user cannot duplicate this role due to the special authority of AdministratorRole.

3. Set parameters in Basic Information and Access Rights.

Note:
For the parameter descriptions, refer to 6.3.1 Creating a Role.

4. Click OK to complete duplication.


– End of Steps –

6.3.4 Deleting a Role


This procedure describes how to delete a useless role.

Prerequisite
The role to be deleted is created.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.

6-14

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

2. Right-click the role to be deleted in the navigation tree, and select Delete Role from
the shortcut menu. The Delete Role dialog box is displayed.

Note:
The user cannot delete the role which is predefined in the system.

3. Click Yes to delete the role.

Note:
l If a user assigned with the deleted role has logged in to the system, the user will
be forced to log out and required to log in to the system again.
l If a user is assigned with the deleted role only, the user will be deleted and forced
to log out.

– End of Steps –

6.3.5 Viewing Users Assigned with a Role


This procedure describes how to view users assigned with a certain role.

Prerequisite
The role to be viewed is created.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the navigation tree, right-click a role and select View Assigned Users from the
shortcut menu. The Assigned Users dialog box is displayed.

3. View information of users assigned with that role.


4. Click OK.

– End of Steps –

6.3.6 Locking a Role


When a role is locked, the user assigned with that role cannot perform the authority
specified in the operation set of the role.

6-15

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Prerequisite
The role to be locked is available and unlocked.

Context
You cannot lock the default roles of the U31 R22 system: system administrator, system
maintainer, system operator, and system supervisor.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the navigation tree on the left pane, click the role to be locked. The attributes of the
role is displayed in the right pane.
3. Click Modify to make the attributes modifiable.
4. Select Lock the Role check box.
5. Click OK. The designated role is locked.

Note:
If the designated user is locked, the user will be prompted with the Confirm message
box. The user should click Yes button to exit login. After logging in to the system
again, the user will be assigned with No Right permission, that is, the user cannot
perform any operation.

– End of Steps –

6.4 Role Set Management


A role set combines the operation authorities of several roles. If you need to assign a
user with the collected authorities of several roles, you can define a role set to make the
definition easier. A user assigned with a role set has the authorities of all roles in it.

6.4.1 Creating a Role Set


This procedure describes how to create a new role set with some roles in it.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the navigation tree on the left pane, right-click the Role Set node, and select Create
Role Set from the shortcut menu.

6-16

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

3. In the right pane, set parameters in Basic Information and Role Set Assignment for
the new role set. For the parameter descriptions, refer to Table 6-3.

Table 6-3 Parameter Descriptions for Creating a Role Set

Parameters Description Value Range Default Value

Role Set Name Enter the role set name 1-50 character(s) "new roleset" + number
in this box. This parameter is (Sequence number
mandatory. of the newly created
role set, e.g. "new
roleset1")

Role Set Enter the description of 1-100 character(s) -


Description the role set. This parameter is
optional.

Lock the Role Set Select this check box to Check Box Not Selected
lock the role set.
If a user is only
assigned with the
locked role set, the
system does not permit
the login of this user
again.

Available Roles Roles can be selected Read out from the Read out from the
in the system. Select System System
the roles needed and
click button, to add
roles to the Assigned
Roles box.

Assigned Roles Roles assigned to the Selected from No role selected


role set. Available Roles

4. Click OK. A new role set is created.


– End of Steps –

6.4.2 Modifying a Role Set


An existing role set can be modified as needed, including its description, locking status,
and roles. Note that the role set name is unmodifiable. Before modification, the user can
also view the attributes of the role set.

Prerequisite
The role set to be modified is available in the system.

6-17

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the left navigation tree, right-click the role set to be modified, and select Modify
Role Set from the shortcut menu.
3. Set parameters in the right pane.

Note:
For specific operation and description of parameters, refer to 6.4.1 Creating a Role
Set.
If a role set is modified, the system will force login users with this role set to log out.
When logging in to the system again, these users have updated operation authorities.

4. Click OK to save modification.


– End of Steps –

6.4.3 Duplicating a Role Set


The system provides role set duplication function for the convenience of creating a role set
with similar rights.
The duplicated role set has the properties of an existing role set, thus making the creation
of new role sets easier.

Prerequisite
The role set to be duplicated has been created.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the left navigation tree, right-click the role set to be duplicated, and select Duplicate
Role Set from the shortcut menu.
3. Set parameters in Basic Information and Role Set Assignment in the right pane.

Note:
For specific operation and description of parameters, refer to 6.4.1 Creating a Role
Set.

6-18

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

4. Click OK.
– End of Steps –

6.4.4 Deleting a Role Set


This procedure describes how to delete useless role sets.

Prerequisite
The role set to be deleted is created.

Context
l If a user assigned with the deleted role set has logged in to the system, the user will
be forced to log out and required to re-log in to the system.
l If a user is assigned with the deleted role set only, the user will be deleted and forced
to log out.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the left navigation tree, right-click the role set to be deleted, and select Delete Role
Set from the shortcut menu.
– End of Steps –

6.4.5 Viewing Users Assigned with a Role Set


This procedure describes how to view users assigned with a certain role set.

Prerequisite
The role set has been added.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.

2. In the left navigation tree, right-click the role set to be viewed, and select View
Assigned Users from the shortcut menu. The Assigned Users dialog box is
displayed.

3. View the users to which the role set is assigned.

– End of Steps –

6-19

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

6.4.6 Locking a Role Set


When a role set is locked, users assigned with the role set cannot perform the operations
of the operation set specified in that role set.

Prerequisite
You have created the role set to be locked.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the left navigation tree, right-click the role set to be locked, and select Modify Role
Set from the shortcut menu.
3. In the modifiable status, select the Lock the Role Set check box.
4. Click OK to lock the role set.

Note:
If login users assigned with that role set will be prompted with a Confirm message
box. Click OK button to exit the client, and the login dialog box is displayed again.
After logging in again, the user assigned with the locked role set cannot perform the
operations specified in that role set.

– End of Steps –

6.5 Operation Set Management


An operation set is a collection of operation permissions assigned to a role. You can assign
one operation set to a role. The role assigned with an operation set is permitted to perform
all operations specified in this operation set.
The U31 R22 supports the following functions for operation set management.
l View an Operation Set: view the information of an operation set, including its name,
description, and operation assignment.
l Create an Operation Set: set the name, description and permitted operations to create
an operation set.
l Modify an Operation Set: modify the description and operation assignment of an
operation set.
l Duplicate an Operation Set: create a similar new operation set by duplicating an
existing operation set and modifying some properties.
l Delete an Operation Set: delete a useless operation set from the list.
l View All Permitted Operations: view all permitted operations of an operation set.

6-20

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

l Export an Operation Set: export the information of all operation sets to an Excel (*.xls)
file.
l Import an Operation Set: import an operation set from an Excel (*.xls) file to create
an operation set.

Note:
Administrator Right, System Maintenance Right, Operation Right, View Right, and
No Right are predefined operation sets in the system. Users cannot modify or delete them.

6.5.1 Creating an Operation Set


This procedure describes how to create a new operation set and assign operation
permissions to it.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. Right-click an operation set in the operation set pane, and select Create an Operation
Set from the shortcut menu. The Create an Operation Set dialog box is displayed.
4. Set parameters for creating an operation set. For the parameter descriptions, refer to
Table 6-4.

Table 6-4 Parameter Descriptions for Creating an Operation Set

Parameters Description

Operation Set Name Enter the name of the operation set.

Operation Set Description Enter the description of the operation set.

Operation Tree Assign operation permission by selecting specific nodes


on the operation tree.
l Select a parent node, and all its child nodes will be
selected.
l Select a child node, and its parent node will be
selected at the same time.
l Enter keywords in input search text text box, and
click button to display the tree nodes with the typed
keywords.

5. Click OK.
– End of Steps –

6-21

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

6.5.2 Viewing the Information of an Operation Set


This procedure describes how to view the description and operation assignment of an
operation set.

Prerequisite
The operation set to be viewed is available in the system.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. In the right pane, right-click the operation set to be viewed, and select Browse
Operation Set from the shortcut menu. The Browse the Operation Set dialog box
is displayed.
4. View the operation set information.
– End of Steps –

6.5.3 Modifying an Operation Set


You can only modify customized operation set, including its description and assignment.
Note that the name cannot be modified.

Prerequisite
The operation set to be modified is available in the system.

Context
You have no right to modify the following default operation sets:
l Administrator Right
l System Maintenance Right
l Operation Right
l View Right
l No Right

Note:
When an operation set is modified, users assigned with that operation set will be required
to log in again.
If an operation set is deleted, the role(s) assigned with the operation set will be assigned
with No Right permission, that is, they cannot perform any operation.

6-22

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. In the right pane, right-click the operation set to be modified, and select Modify
Operation Set from the shortcut menu. The Modify Operation Set dialog box is
displayed.
4. Set parameters, including Operation Set Description and new assignment of
operation permissions.

Note:
For specific description of parameters, refer to 6.5.1 Creating an Operation Set.

5. Click OK.
– End of Steps –

6.5.4 Duplicating an Operation Set


By duplicating an existing operation set, you can quickly create a new operation set similar
to the existing one by modifying some information of the existing one.

Prerequisite
The operation set to be duplicated is available in the system.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. In the right pane, right-click the operation set to be duplicated, and select Duplicate
the Operation Set from the shortcut menu. The Duplicate the Operation Set dialog
box is displayed.
4. Set parameters, including General Information and Operation Set Configuration
Information (selecting the operation nodes in the tree).

Note:
For specific description of parameters, refer to 6.5.1 Creating an Operation Set.

6-23

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

5. Click OK. The duplicated operation set is displayed in the operation list.
– End of Steps –

6.5.5 Deleting an Operation Set


This procedure describes how to delete a useless operation set.

Prerequisite
The operation set to be deleted is available in the system.

Context
When an operation set is deleted, roles assigned with that operation set will have No Right
operation permission.
When an operation set is deleted, users assigned with relevant role(s) will be required to
re-log in.
You have no right to modify the following default operation sets:

l Administrator Right
l System Maintenance Right
l Operation Right
l View Right
l No Right

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.

3. In the operation set list, right-click the operation set to be deleted, and select Delete
Operation Set from the shortcut menu. The Confirm message box is displayed.
4. Click Yes.
– End of Steps –

6.5.6 Viewing All Permitted Operations of an Operation Set


This procedure describes how to view all permitted operations of an operation set.

Prerequisite
The operation set to be viewed is available in the system.

6-24

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. In the right pane, right-click the operation set to be viewed, and select View All
Operations from the shortcut menu. The View All Operations dialog box is
displayed.
4. View permitted operations by clicking tree nodes.
– End of Steps –

6.5.7 Exporting Customized Operation Sets


This procedure describes how to export customized operation sets. You can only export
the operation sets to an Excel (*.xls) file.

Prerequisite
The operation set to be exported is available in the system.

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the right pane, right-click the operation set to be exported, and select Export
All Customized Operation Sets from the shortcut menu. The Save dialog box is
displayed.
3. Set the path for saving the customized operation sets and file name.

4. Click Save.
– End of Steps –

6.5.8 Importing an Operation Set


This procedure describes how to import an operation set.

You can only import operations sets from a *.xls file. Be sure that the content format of the
file to be imported is the same as the format of the *.xls file generated when you export all
operation sets.

Prerequisite
The file to be imported is available.

6-25

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. Right-click the operation list, and select Import Operation Sets from the shortcut
menu. The Open dialog box is displayed.
4. Select the file to be imported.
5. Click OK. The imported operation sets are displayed in the operation list in the right
pane.

– End of Steps –

6.6 Department Management


The concept of department is used in the U31 R22 system to manage users in accordance
with their actual administrative divisions. In practical applications, you can create
departments in accordance with the functions of actual network management departments
so as to manage departments where users belong.

6.6.1 Creating a Department


The system provides a root department by default. All newly-created departments are
subordinates of the root department.

Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click the Root Department node in the navigation tree, and select New
Sub-department from shortcut menu.
3. Set parameters on the Basic Information tab. For the parameter descriptions, refer
to Table 6-5.

Table 6-5 Parameter Descriptions for Creating a Department

Parameter Description Value Range Default Value

Department Name Enter the name of the 1-50 character(s) "New Department" +
new department. (Mandatory) Number (Sequence
number of newly
created department)

Department Enter the description 1-100 character(s) None


Description of new department. (Optional)

6-26

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

Parameter Description Value Range Default Value

Superior Department Select the superior Select from the tree Current department
department for the
new department.

Note:
For the description of the user that belongs to the department, refer to 6.7.1 Creating
a User.

4. Click OK. A new department is created.


– End of Steps –

6.6.2 Modifying a Department


This procedure describes how to modify the properties of an existing department,
including the department name, description and superior department. You can also view
the properties of the department in modification process.

Prerequisite
The department to be modified is created.

Context
You can modify the name of the default Root Department provided by the system as
required.

Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.

2. Right-click the department to be modified on the department tree, and select Modify
from the shortcut menu.

3. In the right pane, modify Basic Information, including Department Description and
its root department.

Note:
For specific description of parameters, refer to 6.6.1 Creating a Department.

6-27

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

4. Click OK.
– End of Steps –

6.6.3 Deleting a Department


This procedure describes how to delete a department.
If the department to be deleted is assigned to a user or it has sub-departments, it
cannot be deleted. Therefore, make sure that the department is not assigned and its
sub-departments have been deleted before deleting a department.

Prerequisite
The department to be deleted is created.

Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click the department to be modified in the department tree, and select Delete
from the shortcut menu. The Confirm message box is displayed.
3. Click Yes.
– End of Steps –

6.7 User Management


User management is the most important part of security management.
By using user management functions, the system administrator can create users, query
the information of users, modify users, assign rights to users, set the working period for
users, query the login logs of users, delete users, and lock users.
In actual operation, you can use the name and password of a created user to log in to
the U31 R22 system and perform network management operations that are consistent
with the operation authorities assigned to the user. You can only view the authorized NEs
and perform the corresponding operations on these NEs. The unauthorized NEs are not
visible.

6.7.1 Creating a User


When setting user name and password for a new user, the system administrator can also
set the validity period (days) of the account and password, the roles or role sets assigned
to the user, the department that the user belongs to and the maximum login number of a
same user account.

6-28

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click a department node in the Root Department navigation tree, and select
New User from the shortcut menu.
3. Click Basic Information tab to set parameter. For the parameter descriptions, refer
to Table 6-6.

Table 6-6 Parameter Descriptions of the Basic Tab

Parameter Description Value Range Default Value

User Name Enter the login user 1-50 character(s), "New User" + Number
name of the new user. Mandatory (Example: New
User1)

Full Name Enter more detailed 1-100 character(s) None


user information.

User Password Set the login 1-100 character(s), None


password. The the password
password length must length must meet
meet the requirement the minimum limit
specified by security specified in "user
policy settings (user account rule" of
account rule). security policy.

Confirm Password Enter the same 1-100 character(s) None


password again
to confirm the
password set in User
Password.

User Must Modify Select the check box Select the check box None
Password Before to require the user to
Next Login modify the password
before logging in to
the system the next
time.

User Can Not Change Select the check box Select the check box None
Password to forbid the user to
modify the password.

6-29

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Description Value Range Default Value

Set User Maximum Enter the validity days 1-500 None


Password Age (days) of user password. If
the password exists
beyond that period,
the user must modify
the password.

Set User Minimum Enter the validity days 1-499 None


Password Age (days) of user password. If
the password exists
within that period, the
user must not modify
the password.

Disable Disable a user name Select the check box None

Minimum Password The minimum 0-20 None


Length password length set
by the user.

Maximum Password The maximum 6-20 None


Length password length set
by the user.

Cannot Be Last Used The password cannot 0-100 None


Password(s) be the same as the
recent passwords
within the specific
times.

Temporary User Specifies whether Select the check box None


the user to be the
temporary user.

Auto Disable Limit In Enter a number of 1-500 None


Case Of Idle Account days. If the user
(days) account is idle for
that number of
days, the account
will be disabled
automatically.

Set Account Validity The user account will 1-500 None


(days) be valid only for the
number of days you
set here.

6-30

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

Parameter Description Value Range Default Value

User Status Display information None Not Selected


of the user account,
including its creator,
creating time, and the
password activation
time.

Lock at Password If the entered 0-20 3


Error passwords are wrong
within the specific
times, the user will be
locked.

4. Click the Right tab to assign role(s) or role set(s) to the user.
5. Click the Log View Range tab to select the logs that the user can view.

6. Click the User Department tab to select the department which the user belongs to.

Note:
l You can assign a user to only one department.
l The default department for a new user is "Root Department".

7. Click the Advanced Information tab to set additional information of the user. For the
parameter descriptions, refer to Table 6-7.

Table 6-7 Parameter Descriptions of the Advanced Information Tab

Parameter Description Value Range Default


Value

User Descriptions Enter the detailed information 1 to 100 characters. None


of the user to be created.

Phone Number Phone number of the new 1-50 numbers or hyphens None
user "-", optional

Email E-mail address of the new A legal E-mail address of None


user 1-100 characters, optional

Concurrent Logins Maximum number of 1-255 10


concurrent login users that
use the same user account.

Login Type Login type Password Password

6-31

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Description Value Range Default


Value

User Working Time Set or view the allowable Click Set Or View button None
working hours of the user by to set allowable working
days in a week. hours.

IP Range The allowable IP range from 0.0.0.1-255.255.255.255 None


which the user can log in.

GUI MAC Binding The allowable MAC address - None


Setting of the client equipment from
which the user can log in.

8. Click OK. A new user is created.


– End of Steps –

6.7.2 Modifying a User


This procedure describes how to modify the properties of a created user.
All the properties of a user except the user name can be modified. You can also use this
operation to view the user properties.

Prerequisite
The user to be modified has been created.

Context
l For the default "admin" user created by the system, the system administrator can
modify such information as the password by using this function. However, some of
the properties cannot be modified for the "admin" user. For example, the working time
must be valid in all time, and the user cannot be disabled.
l If the authorizations of the login user are modified, the user will be forced to log out.
After re-logging in to the system, the user's authorities are updated.

Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click the user to be modified in the left navigation tree, and select Modify from
the shortcut menu.

3. Modify the user properties in the right pane.

6-32

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

Note:
For specific description of parameters, refer to 6.7.1 Creating a User.

4. Click OK.
– End of Steps –

6.7.3 Duplicating a User


The system provides user duplication function for the convenience of creating similar users.
This function uses the existing user as a template, based on which new users can be
created, thus making the creation of new users easier.

Prerequisite
The user to be duplicated has been created.

Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.

2. Right-click a user to be duplicated in the left tree, and select Duplicate from the
shortcut menu.
3. Modify the user properties in the right pane.

Note:
For description of parameters, refer to 6.7.1 Creating a User.

4. Click OK. A new user will be created based on duplication.


– End of Steps –

6.7.4 Deleting a User


The system administrator can delete useless users.

Prerequisite
The user to be deleted is available.

6-33

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Context
l The system administrator ("admin" ) cannot be deleted.
l If the login user is deleted, the user will be forced to log out. Using the deleted user
to log in later, you will be prompted that the user does not exist.

Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click the user to be deleted on the department tree, and select Delete from the
shortcut menu. The Confirm message box is displayed.
3. Click Yes.
– End of Steps –

6.7.5 Viewing Rights


This procedure describes how to view a user’s operation rights for specified resources of
the NMS.

Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. In the Root Department navigation tree, right-click the user whose rights are to
queried, and select View Rights from the shortcut menu. The View Rights dialog
box is displayed.
3. Select a resource from the Resource Tree navigation tree.
The user’s operation rights for the resource are displayed in the Rights of User admin
area.
– End of Steps –

6.7.6 Comparing Rights


This procedure describes how to compare two users’ operation rights for the resources
managed by the NMS.

Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. In the Root Department navigation tree, right-click a user, and select Compare
Rights from the shortcut menu. The Compare Rights dialog box is displayed.
3. Select another user for comparison, and click OK. The Compare Rights dialog box is
displayed.

6-34

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

4. Select a resource from the Resource Tree navigation tree.


The two users’ operation rights for this resource are displayed in the Rights of User
areas.
– End of Steps –

6.7.7 Exporting Rights


This procedure describes how to export a user’s operation rights for all the resources to
the local computer.

Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. In the Root Department navigation tree, right-click the user whose operation rights
you want to export, and select Export Rights from the shortcut menu. The Save
dialog box is displayed.
3. Set a name for the file, and click Save. A message box is displayed.
4. Click OK.
– End of Steps –

6.8 Other Functions


6.8.1 Viewing User Lockup Records
The user account rules define conditions for locking users, that is, the number of times
incorrect passwords are entered. If a user input the wrong password for up to the specified
times, the account will be locked. The system administrator can view user lockup records
and unlock users.

Steps
1. From the main menu, select Security > User Lock Details. The User Lock Details
dialog box is displayed.
2. To unlock the user, click Unlock. The user is thus unlocked and can re-log in to the
system.

3. Click Refresh to obtain the latest information of locked user accounts.


4. Click Close.

– End of Steps –

6-35

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

6.8.2 Modifying the Passwords of Common Users in Batches


This function can only modify the ordinary user’s password, and is limited by weak
password and password modification security restriction. However, if a user belongs to
the role of system administrator, then its password will not be changed.

Steps
1. From the main menu, select Security > Batch Modify Common Users' Passwords.
The Batch Modify Common Users' Passwords dialog box is displayed.
2. Set a new password, and select the users that require password modification.
3. Click OK.
– End of Steps –

6.8.3 Managing Login Users


This function allows you to view the information of login users, including the IP address,
login time, and login type. You can also send a message to them or force them to log out.

Steps
1. From the main menu, select Security > Login User Management. The Login User
Management dialog box is displayed.
2. Select a login user, and perform the following operations as required.

To... Do...

Force the login user to exit the Click Force To Logout to force a user to log out. After that,
system the user can log into the system immediately.

Send message to the login user Click Send Message to send the message to the login user.

Refresh the login user list Click Refresh button to request information of login users
again from the server.

– End of Steps –

6.8.4 Setting User Blacklist


Only system administrator is authorized to set the blacklist. The users in the blacklist
cannot log in to the system.

Steps
1. From the menu bar, select Security > User Blacklist. The User Blacklist dialog box
is displayed.
2. From the All users list, select the user(s) to be added to the black list.

3. Click to add the user(s) to the blacklist.

6-36

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 6 Security Management

4. Click OK. A message box is displayed.


5. Click OK.

Note:

Select users in the blacklist (in the right box) and click button to remove them from
the blacklist.

– End of Steps –

6.8.5 Cleaning up Accounts


This procedure describes how to disable or delete the accounts of the U31 R22 system
through the account cleanup function.

Steps
1. In the operation window of the U31 R22, select Security > Clean Up Accounts. The
Clean Up Accounts dialog box is displayed.
2. On the Disabled Accounts or Accounts to Be Deleted tab, select the accounts to
be disabled or deleted.

Note:
If you select Disable accounts that are idle in the last 60 day(s) in the Account
Cleanup Conditions area, this step is not required.

a. Select the accounts to be disabled or deleted from the Matching Accounts area.

b. Click to add the users to the area on the right.

3. Click OK. A message box is displayed.

4. Click OK.
– End of Steps –

6.8.6 Setting User Login Mode


The U31 R22 NMS supports multiple-user and single-user login modes. By default,
multiple-user login mode is used. This procedure describes how to set user mode to
single-user login mode.

6-37

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Prerequisite
At least one client is successfully connected to the server.

Context
If multiple users are logging in to the system at the same time, you can set a single user
login mode through the client and the system will force to disconnect other users.

Steps
1. In the operation window of the U31 R22, select Security > Set User Login Mode.
The Set User Login Mode dialog box is displayed.
2. Select the Single user login mode check box.
3. Click OK. The Confirm message box is displayed.
4. Click OK.

– End of Steps –

6.8.7 Setting specified Time for Auto-Logout


This procedure describes how to set specified auto-logout time. If no operation is
performed within the specified time, the client will be automatically logged out of to
prevent unprofessional personnel from using the client.

Steps
1. From the main menu, select Security > Set Logout Idle Time. The Set Logout Idle
Time dialog box is displayed.
2. In the Automatically log out after text box, enter a number.
3. From the All Users list, select the users that you want to set auto-logout time for.

4. Click to add these users to the right Selected Users list.


5. Click OK. A message box is displayed. Click OK.
– End of Steps –

6-38

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 7
Log Management
Table of Contents
Overview of Log Management....................................................................................7-1
Introduction to Log Management View........................................................................7-2
Managing Logs by Type .............................................................................................7-2
Customizing Log Query ..............................................................................................7-7
Maintaining Logs ......................................................................................................7-13

7.1 Overview of Log Management


Log management provides effective tools for the system administrator to track the
operation status of the system, locate system faults, and trace the operations of users.
Common users can also use log management function to review previous operations and
oversee the working status of the system.
Log management enables you to record and manage logs. By using log management
operations, you can query and back up logs, and view the details of logs. You can also
get the needed logs by setting filter conditions.
Logs are classified into three types by content: operation logs, security logs and system
logs.
l Operation Log
Operation logs record operation information, including log ID, operation level, user
name, operation name, host address, command function, operation details, operation
result, cause of operation failure, connection mode, operating object, starting time,
ending time and the information of related logs.

l Security Log
Security logs record the login information of users, including log ID, user name, host
address, log name, operation time, access mode and details.

l System Log
System logs record the completion state of scheduled tasks on the server, including
log ID, operation level, source, log name, details, host address, starting time and
ending time of tasks.

Only users with relevant rights can perform log management operations.

7-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

7.2 Introduction to Log Management View


Do one of the following to open the Log Management view:
l On the menu bar of the client window, click Security > Log Management.
l On the Common toolbar of the client window, click button.
The window with Log Management view includes five main parts, see Figure 7-1.

Figure 7-1 Log Management View

1. Main Menu Bar 3. Log Management Toolbar 5. Log Navigation Tree


2. Common Toolbar 4. Log Management Pane

7.3 Managing Logs by Type


7.3.1 Viewing Log Records
The system supports the query of logs of current date or all logs by their types.

Steps
1. Perform one of the following to open the Log Management window.
l From the main menu, select Security > Log Management.
l On the toolbar, click the button.

7-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 7 Log Management

2. In the Log Management tree in the left pane, double-click any node, or right-click
any node, and select Run from the short menu. The corresponding log information is
displayed in the right pane of Log Management.
– End of Steps –

Related Tasks
Refreshing logs: click . The latest operation logs are displayed.

7.3.2 Querying Operation Logs


This procedure describes how to filter operation logs by user, period, or operation
information.

Steps
1. From the main menu, select Security > Query Operation Log. The Set Operation
Log Query Conditions dialog box is displayed.
Setting Query Conditions on the Basic Tab

2. In the User Information area, set the following query conditions as required.

To... Do...

Query the operation logs of a specified user


Click . The Select User dialog
box is displayed. Select the user whose operation
logs you want to query.

Query the logs of operations performed on a


Click . The Select Host
specified host
Address dialog box is displayed. Select the IP
address of the host whose operation logs you
want to query. Click OK.

3. In the Operation Start Time area, perform one of the following operations.

To... Do...

Query the operation logs within a specified period Click the Range option button. Set the start time
and the end time.

Query the operation logs within specified days Click the Latest option button. Set the number
or weeks of days or weeks.

4. In the Operation Information area, perform the following operations as required.

7-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To... Do...

Query the logs of specified operations performed Select the Operation: User initiated check
box. Click Select. From the Operation Tree list,
select the desired operation types. Click OK.

Query the logs of operations performed on Select the Operation Resource check box.
specified resources Click Select. In the displayed Select Operation
Resource dialog box, select the desired
resources. Click OK.

Query operation logs by resource address Click Select next to Resource Address.
The Select Resource Address dialog box is
displayed. Select the IP addresses. Click OK.

Query operation logs by operation result From the Operation Result list, select a
condition.

Query operation logs by failure cause Enter specified fields for a fuzzy query.

Setting Query Conditions on the Advanced Tab


5. In the Other Information area, set the parameters.
a. Select a connection mode from the Connection Mode list.

b. Select All, 1-Very Important, 2-Important, 3-Notice or 4-Normal from the Rank
list.
c. In the Detail text box, enter specified fields for a fuzzy query.

6. After setting the conditions, click OK.


– End of Steps –

7.3.3 Querying Security Logs


This procedure describes how to query security logs of a specified user or host of the NMS.

Steps
1. From the main menu, select Security > Query Security Log. The Set Security Log
Query Conditions dialog box is displayed.

Setting Query Conditions on the Basic Tab

2. In the Source Information area, set the following query conditions as required.

7-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 7 Log Management

To... Do...

Query security logs by user name


Click . The Select User dialog
box is displayed. Select the user whose security
logs you want to query.

Query security logs by host address


Click . The Select Host
Address dialog box is displayed. Select the IP
address of the host the security logs of which you
want to query. Click OK.

3. In the Operation Start Time area, perform one of the following operations as required.

To... Do...

Query the security logs within a specified period Click the Range option button. Set the start time
and the end time.

Query the security logs within specified days or Click the Latest option button. Set the number
weeks of days or weeks.

4. In the Log Name Information area, click . In the displayed Select a


log name dialog box, select a log name and then click OK.
Setting Query Conditions on the Advanced Tab
5. In the Other Information area, set the parameters.
a. Select a connection mode from the Connection Mode list.

b. In the Detail text box, enter specified fields for a fuzzy query.
6. After setting the conditions, click OK.
– End of Steps –

7.3.4 Querying System Logs


This procedure describes how to query system logs including logs of operations that users
perform on the NMS or NEs, and logs that are automatically generated.

Steps
1. From the main menu, select Security > Query System Log. The Set System Log
Query Conditions dialog box is displayed.

Setting Query Conditions on the Basic Tab

2. In the Source Information area, set the following query conditions as required.

7-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To... Do...

Query system logs by source


Click . The Select Log Source
dialog box is displayed. Select a desired source.

Query system logs by log name


Click . The Select Log Name
dialog box is displayed. Select a desired log
name. Click OK.

3. In the Operation Start Time area, select either of the following query conditions as
required.

To... Do...

Query the system logs within a specified period Click the Range option button. Set the start time
and the end time.

Query the system logs within specified days or Click the Latest option button. Set the number
weeks of days or weeks.

4. In the According to Names area, click . In the displayed Select Host


Address dialog box, select the desired host IP address. Click OK.
Setting Query Conditions on the Advanced Tab

5. In the Other Information area, set the parameters.


a. Select a rank from the Rank list.
b. In the Detail text box, enter specified fields for a fuzzy query.
6. After setting the conditions, click OK.
– End of Steps –

7.3.5 Refreshing Logs


This procedure describes how to refresh log information.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.

2. In the Log Management tree in the left pane, double-click All Operation Log to
display all logs on the current tab.

3. Click . The latest operation logs are displayed.


– End of Steps –

7-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 7 Log Management

7.3.6 Querying Log Information


This procedure describes how to query all the operation logs. For how to query all system
logs and security logs, refer to this procedure.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.

2. In the Log Management tree in the left pane, double-click All Operation Log to
display all logs.
3. Enter a keyword in the Enter the keyword to filter text box. The relevant results are
displayed on the current tab.

Note:

You can also search for specific logs one by one as follows: click on the toolbar,
enter a keyword in the displayed Find dialog box, and click Find Next.

– End of Steps –

7.4 Customizing Log Query


7.4.1 Customizing a Log Query Condition
You can customize a log query condition of one type according to the preset conditions,
such as user name, host address, time range, and log name.

Context
This procedure uses operation log query as an example, and the security log query
conditions and system log query conditions can be set in the similar way.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.

2. In the Log Management tree in the left pane, right-click Custom Query, and then
select New Operation Log Query from the shortcut menu. The Set Operation Log
Query Conditions dialog box is displayed.

7-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
The parameters in Set Operation Log Query Conditions dialog box are a little
different when you select New Security Log Query or New System Log Query in
step 2.

3. Set query parameters on the Basic tab. For the parameter descriptions, refer to Table
7-1.
Table 7-1 Description of Parameters on the Basic Tab

Applicable Log Parameters Description


Type

Operation Log User Name Enter or select a user name for querying related
Security Log logs.

Operation Log Host Address Enter or select an IP address for querying related
Security Log logs.
System Log

Operation Log From Select operation starting time.


Security Log
System Log

Security Log To Select operation ending time.


System Log

Operation Log Operation: User Select to query specific types of user initiated
initiated operations.

Operation Log Operation Select to query operation resource.


Resource

Operation Log Resource Address Fuzzy match by address.

Operation Log Operation Result Select an operation result as a query condition from
corresponding drop-down list box. The following
options are available:
l All
l Successful Operation
l Failed Operation
l Unfinished Operation

Operation Log Failure Reason Enter a character string in corresponding box. The
system will search for logs whose failure reason
fuzzily match the character string.

Security Log Log Name Click corresponding Select button and then select
System Log a log name as a query condition in the displayed
Select Log Name dialog box.

7-8

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 7 Log Management

4. Click the Advanced tab to set advanced parameters. For the parameter descriptions,
refer to Table 7-2.

Table 7-2 Description of Advanced Query Parameters

Applicable Log Parameters Description


Type

Operation Log Connection Select the connection mode of the client. The following
Security Log Mode options are available:
l All
l GUI
l TELNET
l SSH
l North Access
l ERT

Operation Log Rank Select different levels of importance for querying logs.
The following options are available:
l All
l 1–VERY IMPORTANT
l 2–IMPORTANT
l 3–NOTICE
l 4–NORMAL

System Log Rank Select different levels of importance for querying logs.
The following options are available:
l All Rank
l 1–EMERGENCY
l 2–Allert
l 3–ERROR
l 4–WARNING
l 5–NOTICE
l 6–INFORMATION

Operation Log Detail Fuzzy match the character string you type in the text box.
Security Log
System Log

5. Click OK to run the operation log query condition. The queried results are displayed
on the relevant tab in Log Management.

6. Close the results tab. The Confirm message box is displayed.


7. Click Yes. The New Query dialog box is displayed.

8. Enter a name in the Query Name text box, and click OK to save the customized query
condition. The new query condition is listed under Custom Query in the navigation
tree.
9. Click OK.

7-9

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

The user-defined query condition is successfully created and displayed in the log
navigation tree.
– End of Steps –

7.4.2 Importing Query Conditions


You can import query conditions directly from a *.xml file that already specifies the query
conditions. After the successful import, a new customized log query condition is displayed.

Prerequisite
The *.xml file for the importing query conditions is available on the local client.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, right-click Custom Query and then
select Import Query Conditions from the shortcut menu. The Import a Query
Condition dialog box is displayed.
3. Select the file to be imported, and then click Open to import the query condition. The
imported query condition is displayed under the Custom Query node in the left pane.

Note:
The imported file must be *.xml format.

4. Right-click the imported query condition, and select Run to show the query results.
– End of Steps –

7.4.3 Editing Query Conditions


You can change the query conditions set in a customized log query condition as needed.

Prerequisite
The log query condition to be modified is created.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. Right-click a query condition to be modified under Custom Query, and select Edit from
the shortcut menu. The Set System Log Query Conditions dialog box is displayed.

7-10

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 7 Log Management

3. Set query parameters on the Basic tab, and click OK to perform the edited query. The
results are displayed in the right pane.
4. Close the tab in the Log Management window. The Confirm message box is
displayed.
5. Click Yes to save the edited query condition.
– End of Steps –

7.4.4 Exporting a Query Condition


This procedure describes how to export the query conditions of a customized log query
condition to a *.xml file and save the file on the local client.

Prerequisite
The log query condition to be exported is created.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. Right-click a query condition to be exported under Custom Query, and select Export
Query Conditions from the shortcut menu. The Export a Query Condition dialog
box is displayed.
3. Set a path for saving the file and a file name, and click Save.

Note:
The query condition can only be exported as a *.xml file.

– End of Steps –

7.4.5 Saving a Customized Condition as Another Condition


This procedure describes how to save an existing log query condition as another condition.

Prerequisite
The log query condition to be saved as another one is created.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.

7-11

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2. In the Log Management tree in the left pane, right-click the log query condition and
then select Save As from the shortcut menu. The Save Query As dialog box is
displayed.
3. Enter the new name, and click OK.
A new log query condition is displayed under Custom Query in the Log Management
tree, containing the same query conditions as the original one.
– End of Steps –

7.4.6 Deleting a Customized Log Query Condition


This procedure describes how to delete a customized log query condition.

Prerequisite
The log query condition to be deleted is created.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, right-click a query condition to be
deleted under Custom Query, and select Delete from the shortcut menu. The
Confirm message box is displayed.
3. Click OK.
The deleted log query condition is removed from the Log Management tree.
– End of Steps –

7.4.7 Renaming a Customized Log Query Condition


This procedure describes how to rename a customized log query condition.

Prerequisite
The log query condition to be renamed is created.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, right-click Custom Query and then
select Rename from the shortcut menu. The Rename Query dialog box is displayed.
3. Enter the new name, and click OK.
The name of selected customized log query condition changes accordingly.
– End of Steps –

7-12

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 7 Log Management

7.5 Maintaining Logs


7.5.1 Automatically Exporting Logs to a File
This procedure describes how to export logs to a file in the remote or local server by using
the Log Output Config node in the navigation tree.

Context
The U31 R22 provides two file transfer modes:
l File Transfer Config is used for scheduled export. If you set parameters in the
transfer mode of File Transfer Config, the system will carry out the query based
on the query condition you specify at planned time. The query result will be exported
to a designated file on the server.
l Syslog Config is used for real-time export. If you set parameters in the transfer mode
Syslog Config, the system will carry out the query immediately. The query result will
be exported to a designated file on the server.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, double-click Log Output Config. The
Log Output Config tab is displayed in the right pane.
3. Select a transmission mode.
4. Click the Modify button.
5. Set the file transfer configuration parameters. For the parameter descriptions, refer to
Table 7-3.
Table 7-3 Parameter Descriptions for File Transfer Mode Configuration

Transmis- Parameter Description


sion Mode

File Transfer Log Type Select the log type(s) you want to export from the check boxes,
Config including:
l Operation Log
l Security Log
l System Log
Click the Edit Query Condition button after each log type to set
the query condition. For this setting, refer to 7.4.1 Customizing
a Log Query Condition.

File Type Choose the exporting file type from the drop-down box. The
Choose options include:
l TXT
l Xml

7-13

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Transmis- Parameter Description


sion Mode

l EXCEL
l CSV

Output to Select the check box to set the remote server information,
Remote Server including:
l File Transfer Protocol: designate the file transfer protocol
(FTP or SFTP)
l Host Server: Address of the remote host server
l Port: Remote server port
l User Name: Login user name
l User Password: Login password
l Remote Service Path: Designates the path of the remote
server. Click the Please Choose button to choose the path
the path of the remote server.

Output to Local Select the check box to export logs to local server. Click Please
Server Choose to select a path.

Planning Type How often you want to export logs, including the following
options:
l Every Hour
l Every Day

Execute Time Set the executing time for exporting plan.

Syslog Log Type Select the types of logs you want to export. The check box
Config options include:
l Operation Log
l Security Log
l System Log

Syslog Server IP Address of Syslog Server


Address

Syslog Server Syslog Server Port


Port

Character Select a character set from the drop-down box for the output
file. The options include:
l ASCII
l GB2312
l GBK
l ISO-8859-1
l Unicode
l UTF-8

6. Click OK.

7-14

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 7 Log Management

7. (Optional) To cancel auto-export of log information, click Clear Configurations.


– End of Steps –

7.5.2 Manually Exporting Logs to a File


The procedure describes how to export the queried logs from the system to a *.txt, *.htm,
*.pdf, *.xml, *.prn, *.xls, *.xlsx or *.csv file and save the file on the local client.

Context
This procedure uses all operation logs as an example, and the other logs are exported in
the same way.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, double-click All Operation Log, or
right-click All Operation Log and select Run from the shortcut menu. The operation
logs are displayed in the right pane.

3. On the toolbar, click the button. The Save dialog box is displayed.
4. Set the path for saving the file, file name, and file type.
5. Click Save. The queried logs based on the current query condition are exported into
the specified file.
– End of Steps –

7.5.3 Printing Logs


This procedure describes how to print out Today’s Operation Log on a paper.

Prerequisite
The connection between the client and the printer is normal.

Context
This procedure uses all security logs as an example, and the other logs are printed in the
same way.

Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, double-click any node, such as All
Security Log. The logs based on the current condition are displayed in the right pane.

7-15

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3. On the Log Management toolbar, click . The Print Setting dialog box is displayed.
4. Set parameters on the General tab. For the parameter descriptions, refer to Table 7-4.

Table 7-4 Parameter Descriptions on the General Tab

Parameter Description

Name Select a connected printer.

Print Range Select the printing range of pages. The options


include:
l All: print all pages.
l Pages (to): set the specific range of
pages.

Copies Enter the number of copies.

5. Click the Page Setup tab, and set parameters on the Page Setup tab. For the
parameter descriptions, refer to Table 7-4.

Table 7-5 Parameter Descriptions on the Page Setup Tab

Parameter Description

Paper Size Select the printing paper size. The A4 value


is recommended.

Orientation Select the orientation. The options include:


l Portrait: vertical
l Landscape: horizontal

Margins Set the position of text body on paper (Unit:


mm).

6. Click the Advanced tab, and set parameters on Advanced tab.


There are three printing styles: Recommended Setup, Typical Setup, and Simple
Setup.
Logs are printed in columns. You can select one of the following display modes as
required:
l Hide Column Name
l Show Column Name in First Page
l Show Column Name in Every Page

The columns on the page are sorted first if you select the Vertical Pages Priority
check box.
You can select one of the three printing styles: Recommended Setup, Typical Setup,
and Simple Setup.

Or you can select in accordance with needs.

7-16

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 7 Log Management

l Select the way column names are showed in the printed table: Hide Column
Name, Show Column Name in First Page or Show Column Name in Every
Page.
l Select the information you want to display on printed page in the box on the right.
7. Click Preview All to preview the printed page in the displayed Print Preview dialog
box.

8. Click . The system starts to print out the log information.


– End of Steps –

7-17

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

This page intentionally left blank.

7-18

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 8
NE Data Management
Table of Contents
Synchronizing Data of the NE.....................................................................................8-1
NE Data Backup and Recovery ..................................................................................8-4
Managing NCP Data ..................................................................................................8-6

8.1 Synchronizing Data of the NE


8.1.1 Uploading the Data
This procedure describes how to upload the actual configuration data of the NE to the NMS
database so as to cover the data in the NMS database.

Prerequisite
l You have the user permissions of "Operator Role" or above.
l The NE status is "online" and the link status normal.

Steps
1. In the Topology Management window, right-click an NE, and select Data
Synchronization from the shortcut menu. The Data Synchronization dialog box is
displayed.
2. On the Upload tab, and select the data item from the Upload Data Item area.
3. Click Upload. The Confirm message box is displayed.
4. Click Yes.
The Upload Progress scroll bar displays the uploading process, and the Result area
displays the detailed uploading information.
– End of Steps –

8.1.2 Comparing the Data


This procedure describes how to compare the configuration data of the NE with the data
in the NMS so as to apply the comparison result to the NE maintenance.

Prerequisite
l You have the user permissions of "Operator Role" or above.

8-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l The NE status is "online" and the link status normal.

Steps
1. In the Topology Management window, right-click an NE, and select Data
Synchronization from the shortcut menu. The Data Synchronization dialog box is
displayed.
2. Click the Compare tab.
3. Select the NE from the Please select NE(s) list.
4. Select the data item from the Compare Data Item area.
5. (Optional) Select the Show Inconsistent Data Only check box to display the
inconsistent data items in the comparison result. Otherwise, all the compared data
items will be displayed.
6. Click Compare.
The Compare Progress scroll bar displays the data comparison process, and the
Result area displays the detailed comparison information.

– End of Steps –

8.1.3 Downloading the Data


This procedure describes how to download the data in the NMS database to the actual NE
so as to cover the data in the NE.

Prerequisite
l You have the user permissions of "Operator Role" or above.
l The NE status is "online" and the link status normal.

Context

Caution!
Downloading the data may interrupt the service.

Steps
1. In the Topology Management window, right-click an NE, and select Data
Synchronization from the shortcut menu. The Data Synchronization dialog box is
displayed.
2. Click the Download tab.

3. Select the NE from the Please select NE(s) list.

8-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 8 NE Data Management

4. (Optional) Select the NCP board from the Select NE list.


5. Select the data item from the Download Data Item area.
6. Click Download. The Confirm message box is displayed.
7. Click Yes.
The Download Progress scroll bar displays the downloading process, and the Result
area displays the detailed downloading information.
– End of Steps –

8.1.4 Setting Automatic Uploading Comparison


The automatic uploading comparison function supports the timely uploading comparison
of the entire network. This function is used to compare the consistency of the NMS and
device data when the NMS is being upgraded from T3 or E300 to U31.

Steps
1. In the operation window of the U31 R22, select Maintenance > BN NE Maintenance
> consistency management > Auto Uploading Compare Configuration. The Auto
Uploading Compare Configuration window is displayed.

2. Set a policy for the automatic uploading comparison.


a. Enter a period for executing the task in the Execute Policy text box.
b. Set a start time for the task.
c. Click the Active option button.
3. Click Apply. A message box is displayed.
4. Click OK.

Note:
l This function is used only for NMS upgrade from T3 or E300 to U31. By default,
this function is disabled on U31 to prevent onsite data conflict.
l After the system completes a comparison task, a message box is displayed,
indicating that the task is completed. You can download the comparison result
and view it on the local computer.

– End of Steps –

8-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

8.2 NE Data Backup and Recovery


8.2.1 Backing Up NE Data
This procedure describes how to back up the configuration data of specific NE(s) to the
local computer for restoration of historical data in future.

Prerequisite
You have the user permissions of "Maintenance Role" or above.

Context
The function is applicable to WDM NEs.

Steps
1. In the Topology Management window, right-click the NE whose data is to be backed
up, and select Backup and Restore > Backup NE from the shortcut menu. The
Backup NE dialog box is displayed.
2. (Optional) To re-select an NE to be backed up, perform the following operations.
a. Click the Select NE button. The Resource Selector dialog box is displayed.
b. Select the NE to be backed up, and click OK to return to the Backup NE dialog
box.
3. In the File Name text box, enter the name of the backup file.
4. In the File Directory text box, enter the storage path of the backup file.

5. (Optional) In the Description text box, enter the description of the backup file.
6. Click Backup. The NE data starts to be backed up.
The Progress Info shows the detailed backup process. The Progress bar shows the
percentage of completion. After the backup is completed, a Message box is displayed.
7. Click OK.
– End of Steps –

8.2.2 Restoring NE Data


This procedure describes how to restore the backup configuration data to the database or
equipment.

Prerequisite
l You have the user permissions of "Maintenance Role" or above.
l The backup file is available.

8-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 8 NE Data Management

Context
The function is applicable to WDM NEs.

Steps
1. In the Topology Management window, right-click the NE whose data is to be backed
up, and select Backup and Restore > Restore NE from the shortcut menu. The
Restore NE dialog box is displayed.
2. (Optional) If the selected NE is not the NE whose data is to be restored, click Select
NE. The Resource Selector dialog box is displayed. Select the NE to be restored.
3. Click Select File. The Query Backup Information dialog box is displayed.

4. Perform one of the following operations as required.

If... Then...

In the Select Directory area, The table displays the detailed information of the backup file in
Default Directory is selected. the default storage directory.

In the Select Directory area, i. In the File Directory entry box, enter the path of the backup
Other Directory is selected. file.

ii. Click Query.


The table displays the detailed information of the backup
file in the storage directory.

Note:
To filter the backup files in the table, select the Only display files with same device
type.

5. Click OK to return to the Restore NE dialog box.


The Select File, File Directory, Backup IP, and Data Type entry boxes display the
data information to be restored.

Note:
If the backup IP does not need to be restored, you can clear the Restore backup IP
check box.

6. Select Restore mode.

8-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
l Restore to database: The backup data is restored to the U31 R22 database. The
equipment data is not affected.
l Restore to device: The backup data is restored to the equipment. The equipment
data is overwritten.

7. Click Restore. The NE data starts to be restored.


The Progress Info shows the detailed restoration process. The Progress bar shows
the percentage of completion. After the restoration is completed, the Message box is
displayed.
8. Click OK.
– End of Steps –

8.3 Managing NCP Data


8.3.1 Clearing NCP Database
This procedure describes how to clear the data saved in the main control board of the
NE. After the clearing operation, the main control board has no basic database. You need
to download the database. At this moment, the main control board only keeps the IP
addresses of the original NEs, and the NMS can still monitor the NEs.

Prerequisite
l The NEs are online.
l You have the user permissions of "Maintenance Role" or above.

Context
The function is applicable to WDM NEs.

Note:

After the NCP database is cleared, resetting the board will interrupt the services. Be
cautious to use it.

Steps
1. In the Topology Management window, right-click an NE, and select NE Management
from the shortcut menu. The NE Management window is displayed.

8-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 8 NE Data Management

2. In the NE Operation navigation tree, select NE Operation > NE Data Management


> Clear NCP Database. The Confirm message box is displayed.
3. Click OK to clear the NCP database.
– End of Steps –

8.3.2 Backing up and Restoring NCP Data


This procedure describes how to back up and restore the NCP data of the WDM NEs,
including manual backup, auto backup, data recovery, and backup data check.

Prerequisite
l The NEs are online and properly communicate with the NMS.
l You have the user permissions of "Maintenance Role" or above.

Context
The function is applicable to WDM NEs.

Steps
1. From the Topology Management window, select the NE.
2. Right-click the NE, and then select NE Management from the shortcut menu. The NE
Management window is displayed.
3. In the NE Operation navigation tree, select NE Operation > Maintenance
Management > Backup and Restorement of NCP. The Backup and Restorement
of NCP dialog box is displayed.

Note:
You can also use the following method to display the Backup and Restorement of
NCP dialog box.
In the Topology Management window, right-click an NE to be restored, and select
Backup And Restore > Backup and Restorement of NCP from the shortcut menu.
The follow-up operation will be described in the sub-chapter.

– End of Steps –

8.3.2.1 Manually Backing up NCP Data


This procedure describes how to manually back up the NCP data, and upload the NCP
backup data file to the FTP server.

8-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. In the Backup and Restorement of NCP dialog box, click the Manual Backup tab.
2. Set NCP backup parameters. For the a description of the parameters, refer to Table
8-1.

Table 8-1 Parameter Descriptions for NCP Backup Configuration

Parameter Description

File Name Name of the NCP backup data file. The format is "NE ID"_"date".

Up FTP Whether to upload the NCP backup data file to the FTP server.

FTP Protocol Type Type of the FTP protocol

FTP IP Ensure that the FTP IP address is valid.

FTP Port FTP server port. The value ranges from 1 to 65535.

FTP User Name User name to log in to the FTP server.

FTP Password Password to log in to the FTP server.

FTP Path Path for saving the files in the FTP server.

3. (Optional) To upload the backup data to the FTP server, select the FTP IP\FTP
Port\FTP Path keep same as up FTP check box.

4. (Optional) To back up the wason data, select the wason check box.
5. Click Backup.
– End of Steps –

8.3.2.2 Automatically Backing up NCP


This procedure describes how to automatically back up the NCP data file. The user can
back up the NCP data in the specified time.

Steps
1. In the Backup and Restorement of NCP dialog box, click the Auto Backup tab.
2. Set NCP backup parameters. For the a description of the parameters, refer to Table
8-2.

Table 8-2 Parameter Descriptions for NCP Backup Configuration

Parameter Description

File Name Name of the NCP backup data file. The format is "NE ID"_"date".

Up FTP Whether to upload the NCP backup data file to the FTP server.

FTP Protocol Type Type of the FTP protocol

FTP IP Ensure that the FTP IP address is valid.

8-8

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 8 NE Data Management

Parameter Description

FTP Port FTP server port. The value ranges from 1 to 65535.

FTP User Name User name to log in to the FTP server.

FTP Password Password to log in to the FTP server.

FTP Path Path for saving the files in the FTP server.

Backup Period (days) Automatic backup period. The value ranges from 1 to 9999.

Backup Time Automatic backup time. The value ranges from 00:00:00 to
23:59:59.

3. (Optional) To upload the backup data to the FTP server, select the FTP IP\FTP
Port\FTP Path keep same as up FTP check box.
4. (Optional) To back up the wason data, select the wason check box.
5. Click Apply.
– End of Steps –

8.3.2.3 Restoring Data


This procedure describes how to restore the NCP backup data. The user can select the
local backup file or the backup file in FTP.

Steps
1. In the Backup and Restorement of NCP dialog box, click the Data Restore tab.
2. Set NCP restoration parameters. For the a description of the parameters, refer to
Table 8-3.

Table 8-3 Parameter Descriptions for NCP Restoration Configuration

Parameter Description

Restore From FTP Restore the NCP data from the FTP server.

Up FTP Whether to upload the NCP backup data file to the FTP server.

FTP Protocol Type Type of the FTP protocol

FTP IP Ensure that the FTP IP address is valid.

FTP Port FTP server port. The value ranges from 1 to 65535.

FTP User Name User name to log in to the FTP server.

FTP Password Password to log in to the FTP server.

FTP Path Path for saving the files in the FTP server.

File Name Name of the NCP backup data file. The format is "NE ID"_"date".

Select File Select the file from NCP. It is valid when Restore From FTP is
not selected.

8-9

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3. (Optional) To upload the backup data to the FTP server, select the FTP IP\FTP
Port\FTP Path keep same as up FTP check box.
4. (Optional) To restore the wason data, select the wason check box.
5. Click Restore.
– End of Steps –

8.3.2.4 Viewing Backup Files


This procedure describes how to view, print or save the related information of the NCP
backup files on the NCP board.

Steps
1. In the Backup and Restorement of NCP dialog box, click the View Backup File tab.
2. (Optional) To query the Wason data, select the wason check box.
3. Click Query to query the related information.
– End of Steps –

8-10

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 9
NMS DataBackup and
Restoration
The U31 R22 provides multiple ways of backup and restoration. For details, refer to Table
9-1.

Table 9-1 Description of the Backup and Restoration Modes

Backup and Description


Restoration
Mode

EMS backup and l Applies to various scenarios of the bearer network.


restoration l During the backup and restoration, you must ensure that the objects to be
backed up and restored belong to the same version, same scale, and same
product component.
l Supports auto backup.

dbtool backup l Applies to various scenarios of the bearer network.


and restoration l Supports cross-version data restoration. The data of the old version can be
restored to the new version.
l Dose not support auto backup.

Note:
The backup data of various backup modes are completely different, and cannot be used
alternately. Meaning that you cannot user the backup data of the EMS platform as the
restoration data of the dbtool.

Table of Contents
Comparison for Backing Up and Restoring the U31 Data ..........................................9-1
System Backup ..........................................................................................................9-5
System Restoration ..................................................................................................9-15

9.1 Comparison for Backing Up and Restoring the U31


Data
You can use the following three modes to back up and restore the data:

9-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l U31 EMS
l dbtool tool
l Offline tool

U31 EMS Mode


For the backup and restoration items supported by the U31 EMS, refer to Table 9-2.

Table 9-2 Backup and Restoration Items of the U31 System

Backup and Restoration Description


Item

Whole database structure Structures of all the databases used by the EMS (including the
structures of all the database objects in the database).

Basic data All the basic data of the EMS. This item only backs up data records,
but does not back up the historical data such as table structures,
historical alarms, notifications, logs, or original performance data.
These historical data is backed up by using another backup function.

File Version files, operation files, and configuration files of the EMS.

Log data Historical data such as operation logs, security logs, and system logs.

Alarm data Historical data such as historical alarms and notifications.

Performance data Historical data such as original performance data.

• The restoration of the whole database structure and files needs the help of the offline tool.

The U31 EMS supports the following two backup modes:


l Automatic backup
The EMS system performs the automatic backup every day by default and manages
the backup files in accordance with the directory monitoring conditions set by the
directory monitoring.
During the automatic backup, the backup files are saved to the EMS server by default
or the FTP server that is manually specified.
l Manual backup

The backup can be executed at any time. Generally, the backup is executed before
or after the operations such as software upgrade, system patch loading, and system
parameter modification, and user network data modification.
During the manual backup, the backup files are saved to the NMS server by default
or downloaded to the client computer.

dbtool Tool Mode


For the backup and restoration items supported by the dbtool tool, refer to Table 9-3.

9-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 9 NMS DataBackup and Restoration

Table 9-3 Backup and Restoration Items of the dbtool Tool

Backup and Restoration Description


Item

Basic data All the basic data of the EMS. This item only backs up data records,
but not the historical data such as table structures, historical alarms,
notifications, logs, or original performance data. There is a separate
backup function for these historical data.

Offline Tool
For the backup and restoration items supported by the offline tool, refer to Table 9-4.

Table 9-4 Backup and Restoration Items of the Offline Tool

Backup and Restoration Description


Item

Whole database structure Structures of all the databases used by the EMS (including the
structures of all the database objects in the database). The backup
for the whole database structure only backs up the table structure of
the database. No data record is backed up. Therefore, this item must
be used together with the basic data, files, log data, alarm data, and
performance data.

Basic data All the basic data of the EMS. This item only backs up data records,
but not the historical data such as table structures, historical alarms,
notifications, logs, or original performance data. There is a separate
backup function for these historical data.

File Version files, operation files, and configuration files of the EMS.

Comparison for the Backup and Restoration Modes


For the comparisons of the application scenarios, features, and operation methods of the
three backup and restoration methods, refer to Table 9-5.

Table 9-5 Application Scenarios for the Backup and Restoration

Method Application Scenario Feature Operation Method

U31 Supports the backup and l The data backup is l EMS Data Backup with
EMS restoration between the completed. the U31
same EMS versions, the l The backup and l EMS Data Restoration
same databases, the same restoration speeds are with the U31
installation components, fast, and the generated
and the EMSs of the same files are large.
scales. l The data item of
l During the backup, the whole database
ensure that the structure cannot be
EMS server and the

9-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Method Application Scenario Feature Operation Method

database are operating restored. The help of


properly. the offline tool is needed.
l During the restoration,
ensure that the EMS
server is shut down,
and the database is
operating properly.

dbtool Supports the backup l The data backup and


Tool and restoration between restoration are not
different EMS versions and completed. Only basic
different databases. data can be backed up
l During the backup, or restored.
ensure that the l The backup and
database is operating restoration speeds are
properly. It is fast, and the generated
unnecessary to start file is small.
the EMS server.
l During the restoration,
ensure that the EMS
server is closed,
and the database
is operating properly.

Offline Supports the backup and l The data backup


Tool restoration between the and restoration is
same EMS versions, the not completed. Only
same scales, and the same the whole database
installation components. structure, basic data,
To restore the database and files are backed up
structure, the data versions or restored.
must be the same. l The backup and
l During the backup, restoration speeds are
ensure that the EMS slow, and the generated
server is shut down files are large.
and the database is
operating properly.
l During the restoration,
ensure that the EMS
server is closed,
and the database
is operating properly.

9-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 9 NMS DataBackup and Restoration

Note:
After you have used the offline tool to restore the whole database structure, you must
restore the basic data to ensure normal start of the EMS.

Note:
The backup data is saved on the file server (FTP/SFTP) of the U31 server by default. On
the EMS client, you can select Maintenance > Remote Backup Path Configuration to
modify the default remote storage path for the backup files.

9.2 System Backup


Backup Period
l Periodical backup: The U31 R22 executes the backup and clears the backup files
automatically. For details, refer to 11.1 Task Management.
l Manual backup: After and before the operations of upgrading software, uploading
system patches, modifying system parameters, and modifying user’s network data,
you can manually backup the data.

Backup Contents
l Database structure backup: Backs up all the database structures used by the NMS
(including all the structures of the database objects).
l Basic data backup: Backs up all the basic data for NMS. Only backups the data
records, rather than table structure, history alarms, notifications, logs, original
performance data. Because these historical data have their own backup functions.
l File backup: Backups up the version files, runtime files, and configuration files for the
NMS.
l Log data backup: Backups operation logs, security logs, and system logs.
l Alarm data backup: Backups history alarms and notifications.
l Performance data backup: Backup original performance data.

Backup Position
The backup data is save in the file server (FTP/SFTP) of the U31 R22 server. You can
modify the default system backup position to be the third-party FTP server in NetNumen
Config Center.

9-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

9.2.1 EMS Data Backup with the U31


9.2.1.1 Backing Up the Whole DB Structure
This procedure describes how to back up the whole database structure. This operation is
generally required before upgrading the system.

Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
2. In the Backup and Restore navigation tree, select Backup > Backup Whole DB
Structure. The parameter settings are displayed in the right pane.
3. (Optional) To modify the path for saving the backup file on the server, click the Browse
button on the right of Backup File Save Path at Server. .
4. (Optional) To modify the path for saving the downloaded backup file on the client, select
the Backup File Download Path at Client check box, and click the Browse button
on the right of Backup File Download Path at Client.

Note:
Select the Backup File Download Path at Client check box to save the backup file
on both the server and client.

5. Click Execute to execute whole database structure backup.


The Executed Result box displays the backup process.
– End of Steps –

9.2.1.2 Backing Up Basic Data


This procedure describes how to back up the basic data, which includes transmission
network configuration database, NE configuration database, end-to-end database,
common platform database, common alarm database, and common performance
database. Logs and history alarms do not include historical alarms, notifications, logs,
and original performance.

Prerequisite
You have the right to perform this operation.

Steps
1. In the client main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.

9-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 9 NMS DataBackup and Restoration

2. In the Backup and Restore navigation tree, select Backup > Backup Basic Data.
The parameter settings are displayed in the right pane.
3. (Optional) To modify the path for saving the backup file on the server, click Browse on
the right of Backup File Save Path at Server.
4. (Optional) To modify the path for saving the downloaded backup file on the client, select
the Backup File Download Path at Client check box, and click Browse on the right
of Backup File Download Path at Client.

Note:

Select the Backup File Download Path at Client check box to save the backup file
on both the server and the client.

5. Click Execute to back up the basic data.


The Executed Result box displays the backup process.
– End of Steps –

9.2.1.3 Backing Up Files


This procedure describes how to back up files.

Context
There are three types of files: version files, configuration files, and runtime files.
l Version files: files generated on the server except runtime files. For example, par and
jar files of the fault management module, third-party files such as lib, *.exe, *.bat and
*.sql.
l Configuration files: files related to configuration generated on the server. including
*.property, *.deploy, *.ini and *.lcs files. You should set parameters of these files when
installing and maintaining the system.
l Running files: files generated on the server during the runtime, including those only
written on the disk, or cache files, such as .xml files of system performance data and
.xml files with command line dynamically loaded. These files are helpful for locating
and troubleshooting system faults, but not directly helpful for common users.

Note:
The backup runtime files do not include log files.

9-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
2. In the Backup and Restore navigation tree, select Backup > Backup File. The
parameter settings are displayed in the right pane.
3. Select data types under Backup content.
4. (Optional) To modify the path for saving the backup file on the server, click the Browse
button on the right of Backup File Save Path at Server.
5. (Optional) To modify the path for saving the downloaded backup file on the client, select
the Backup File Download Path at Client check box, and click the Browse button
on the right of Backup File Download Path at Client.

Note:

Select the Backup File Download Path at Client check box to save the backup file
on both the server and the client.

6. Click Execute button to execute whole database backup.


The Executed Result box displays the backup process.
– End of Steps –

9.2.1.4 Backing Up and Deleting Log Data


This procedure describes how to back up and delete three types of logs: operation logs,
system logs, and security logs.

Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.

2. In the Backup and Restore navigation tree, select Backup > Backup and Deletion
Log Data. The parameter settings are displayed in the right pane.
3. Set deletion and backup parameters as required. For parameter descriptions, refer to
Table 9-6.

9-8

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 9 NMS DataBackup and Restoration

Table 9-6 Description of Parameters for Backup and Deletion

Parameter Value Range Description

Backup and Deletion Back up only, back up Options:


Operation and delete, delete only l Back up only: The system will only back up the log data
generated during the specified time range.
l Back up and delete: The system will back up the log data
and then delete the data within the specified time range.
l Delete only: The system will only delete the log data
generated during specified time range.

Backup and Deletion operation log, system Select the contents to be backed up and/or deleted.
Operation Content log, and security log

Backup Filter Type All, latest T day(s), T Specify the time range within which the data is backed up. If
day(s) ago, latest T you select Latest T Day(s), the log data within the latest T
month(s), T month(s) ago days will be backed up. T can be set in the T Time text box.

Delete Filter Type T day(s) ago, latest T Specify the time range within which the data is deleted. If you
day(s) select Latest T Day(s), the performance data within the latest
T days will be deleted. T can be set in the T Time text box.

Note:
The time specified in the filtering type uses the reference clock in the time zone where
the server is located.

4. (Optional) To modify the path for saving the backup file on the server, Click the Browse
button on the right of Backup File Save Path at Server.
5. (Optional) To modify the path for saving the downloaded backup file on the client, select
the Backup File Download Path at Client check box, and click the Browse button
on the right of Backup File Download Path at Client.

Note:
Select the Backup File Download Path at Client check box to save the backup file
on both the server and the client.

6. Click Execute to back up and/or delete log data.

The Executed Result box displays the backup and/or deleting process.
– End of Steps –

9-9

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

9.2.1.5 Backing Up and Deleting Alarm Data


This procedure describes how to back up and delete alarm and notification data, including
history alarms and notifications.
This task is executed only once.

Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
2. In the Backup and Restore navigation tree, select Backup > Backup and Deletion
Alarm Data. The parameter settings are displayed in the right pane.
3. Set deletion and backup parameters as required. For the parameter descriptions, refer
to Table 9-7.

Table 9-7 Description of Parameters for Backup and Deletion

Parameter Value Range Description

Backup and Back up only, back Options:


Deletion up and delete, l Back up only: The system will only back up the log data generated
Operation delete only during the specified time range.
l Back up and delete: The system will back up the log data and then
delete the data within the specified time range.
l Delete only: The system will only delete the log data generated
during specified time range.

Backup and History alarms and Select the contents to be backed up and/or deleted.
Deletion notifications
Operation
Content

Backup Filter All, latest T day(s), Specify the time range within which the data is backed up. If you select
Type T day(s) ago, latest Latest T Day(s), the alarm data within the latest T days will be backed
T month(s), T up. T can be set in the T Time text box.
month(s) ago

Deletion Filter T day(s) ago, latest Specify the time range within which the data is deleted. If you select
Type T day(s) Latest T Day(s), the alarm data within the latest T days will be deleted. T
can be set in the T Time text box.

Note:

The time specified in the filtering type uses the reference clock in the time zone where
the server is located.

9-10

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 9 NMS DataBackup and Restoration

4. (Optional) To modify the path for saving the backup file on the server, click the Browse
button on the right of Backup File Save Path at Server.
5. (Optional) To modify the path for saving the downloaded backup file on the client, select
the Backup File Download Path at Client check box, and click the Browse button
on the right of Backup File Download Path at Client.

Note:
Select the Backup File Download Path at Client check box to save the backup file
on both the server and the client.

6. Click Execute to back up and/or delete alarm data.


The Executed Result box displays the backup and/or deleting process.
– End of Steps –

9.2.1.6 Backing Up and Deleting Performance Data


This procedure describes how to back up and delete performance data, including the
original table, hour table and day table
This task is executed only once.

Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
2. In the Backup and Restore navigation tree, select Backup > Backup and Deletion
PM Data. The parameter settings are displayed in the right pane.
3. Set deletion and backup parameters as required. For the parameter descriptions, refer
to Table 9-8.

Table 9-8 Description of Parameters for Backup and Deletion

Parameter Value Range Description

Backup and Back up only, back Options:


Deletion up and deletion, l Back up only: The system will only back up the log data generated
Operation deletion only during the specified time range.
l Back up and delete: The system will back up the log data and then
delete the data within the specified time range.
l Delete only: The system will only delete the log data generated
during specified time range.

NE Type NE types managed Select the target NE types.


by the system

9-11

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Parameter Value Range Description

Data Type Origin table, hour Select the type of the performance database tables to be backed up
table, day table and/or deleted.

Performance Select all, deselect Select the performance statistical table for NE types. Type a keyword in
Management all the Enter filter text text box to find specific table(s).
Object Table

Backup Filter All, latest T day(s), Specify the time range within which the data is backed up. If you select
Type T day(s) ago, latest Latest T Day(s), that means backing up the performance data within the
T month(s), T latest T days. T can be set in the T Time text box.
month(s) ago

Deletion Filter T day(s) ago Specify the time range within which the data is deleted. If you select
Type Latest T Day(s), that means deleting the performance data generated in
the latest T days. T can be set in the T Time text box.

Note:
The time specified in the filtering type uses the reference clock in the time zone where
the server is located.

4. (Optional) To modify the path for saving the backup file on the server, click the Browse
button on the right of Server path where store the backup file.

Note:

If Backup File Download Path at Client is selected, it indicates that the backed up
file is saved on both the server and the client

5. Click Execute to back up and/or delete performance data.


The Executed Result box displays the backup and/or deleting process.

– End of Steps –

9.2.2 Backing Up the Data with the dbtool Tool


On the engineering site, if the EMS server version is being updated, you can use the dbtool
tool to back up the basic data.

9-12

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 9 NMS DataBackup and Restoration

Context
The execution file of the dbtool tool is dbtool.bat. The path is \ums-server\utils\db
tool under the U31 EMS installation path.

Prerequisite
l The database operates normally.
l No IP-type device exists in the U31 EMS because the data of the IP-type device cannot
be backed up.

Steps
1. On the U31 server computer, enable the dbtool tool in accordance with the operation
system type.
l Windows: /ums-server/utils/dbtool/dbtool.bat
l Linux: /ums-server/utils/dbtool/dbtool.sh
l Solaris: /ums-server/utils/dbtool/dbtool.sh

2. For a description of the related parameters, refer to Table 9-9.

Table 9-9 dbtool Window Parameter Description

Parameter Description

Language The language displayed in the dbtool window.

DBMS Type Select the DBMS type in accordance with the operation system
type:
l Windows: SQL Server.
l Linux and Solaris: Oracle.

DBMS IP IP address of the U31 server.

DBMS Port Use the default value, such as 1433.

DBA Administrator name set when the EMS database is installed,


such as sa.

Password Administrator password set when the EMS database is


installed.

3. After the parameters are set, click Login. The main window of the database tool is
displayed.
4. In the dbtool navigation tree, select Backup EMS. The Backup EMS tab is displayed.

5. (Optional) Set a backup name in the Basic Data area.


6. Select a backup option in the Option area.

9-13

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Note:
Only Basic Data is selected here. The options for alarm, log, and perform are only
used to for internal fault location. They are not released to the outside.

7. Click Backup. The system starts to back up the basic data.


8. After the backup, a message box is displayed. Click OK.
– End of Steps –

Related Tasks
Restoring the Data with the dbtool Tool

9.2.3 Backing Up the Data with the Offline Tool


This procedure describes how to use the offline tool to back up the whole database
structure, basic data, and files.

Prerequisite
l The U31 server has exited.
l The database status is normal.

Steps
1. On the U31 server computer, enable the offline restoration tool in accordance with the
operation system type.
l Windows: /ums-server/utils/usf-backup/run.bat
l Linux: /ums-server/utils/usf-backup/run.sh
l Solaris: /ums-server/utils/usf-backup/run.sh
2. Perform the following operations as needed.

To... Do...

Back up the whole In the left Restore and Backup navigation tree, select Restore and Backup
database structure > Backup Whole DB Structure . The Backup Whole DB Structure dialog
box is displayed.

Back up the basic In the left Restore and Backup navigation tree, select Restore and Backup >
data Backup Basic Data. The Backup Basic Data dialog box is displayed.

Back up files In the left Restore and Backup navigation tree, select Restore and Backup >
Backup File. The Backup File dialog box is displayed.

3. Click Browse on the right of the Select the backup file list, and select a storage path
for the backup files.

9-14

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 9 NMS DataBackup and Restoration

4. Click Execute.
– End of Steps –

9.3 System Restoration


The U31 R22 provides a database restoration function. Figure 9-1 shows the database
restoration flow.

Figure 9-1 Database Restoration Flow of the U31 R22

9-15

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

9.3.1 EMS Data Restoration with the U31


9.3.1.1 Restoring Basic Data
This procedure describes how to restore the backup basic data to the database. To restore
the basic data, the U31 R22 server needs to be stopped. The restoration is conducted via
the client restoration tool. During the restoration, the U31 R22 client will be unusable.

Prerequisite
l You have the user rights of "Administrator Role".
l The basic data backup file is available.

Steps
1. From the Topology Management window, select Maintenance > System Backup
and Restore. The System Backup and Restore window is displayed.
2. Select Backup and Restore > Restore > Restoring Basic Data from the left
navigation tree. The Basic Data Restore dialog box is displayed.
3. Click Start. The Basic Data Restore dialog box is displayed.
4. Select the backup file as required.

If... Then...

You have backed up the i. Select the Local Backup File.


basic data in the current EMS
ii. Click Browse. The Open dialog box is displayed.
database, and the backed up
data is in current computer. iii. Select the basic data file.

iv. Click Open.

You have backed up the basic i. Select the FTP Backup File.
data file in the local database,
ii. The Open dialog box is displayed.
and the backed up data file is
on the U31 R22 server or a iii. (Optional) The basic data backup directory /backu

third-party FTP server. p/sysbak/basicdb on the U31 R22 server is dis-


played by default. If the basic data file to be restored
is in the FTP server of the third-party, enter FTP://user
name:password@IP address:port number in the
Look In area. Press Enter for confirmation. For example,
FTP://abc:123@10.8.8.1:36

iv. Select the basic data file.

v. Click Open.

5. (Optional) Select Back up the current data before the restoration? If you choose
to back up the current data first, the system will automatically roll back in case
the restoration fails.

9-16

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 9 NMS DataBackup and Restoration

Note:
It is recommended to select this option so that the NMS can be restored to the status
before the restoration in case the restoration fails.
It is recommended to choose this option before restoring the basic data file so as to
ensure that the EMS can restore to the status before in case the restoration fails.

6. Click Execute.
– End of Steps –

9.3.1.2 Restoring Log Data


This procedure describes how to restore the backup log data to the database.

Prerequisite
The log backup file is available.

Steps
1. In the Backup and Restore navigation tree, select Restore > Restore Log Data. The
parameter settings are displayed in the right pane.
2. Click the Browse button. The Open dialog box is displayed.
3. Select the backup file, and click the Open button to return to the System Backup and
Restore window.
4. Click Execute to execute data backup.
The log data is successfully restored.
– End of Steps –

9.3.1.3 Restoring Alarm Data


This procedure describes how to restore the backup alarm data to the database as
required.

Prerequisite
The alarm backup file is available.

Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.

9-17

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

2. In the Backup and Restore navigation tree, select Restore > Restore Alarm Data.
The parameter settings are displayed in the right pane.
3. Click the Browse button. The Open dialog box is displayed.
4. Select the backup file, and click the Open button to return to the System Backup and
Restore window.
5. Click Execute to execute data backup.
– End of Steps –

9.3.1.4 Restoring Performance Data


This procedure describes how to restore the backup performance data to the database as
required.

Prerequisite
The performance backup file is available.

Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
2. In the Backup and Restore navigation tree, select Restore > Restore PM Data. The
parameter settings are displayed in the right pane.
3. Click the Browse button. The Open dialog box is displayed.
4. Select the backup file, and click the Open button to return to the System Backup and
Restore window.
5. Click Execute to execute data backup.
– End of Steps –

9.3.2 Restoring the Data with the dbtool Tool


To restore the data between different EMS versions, different databases, different scales,
or different installation components, you can use dbtool to restore the basic data, log
alarms, or performance data.

Note:

To avoid the fault caused by the failed restoration, back up the current EMS data before
the data restoration.

9-18

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 9 NMS DataBackup and Restoration

Prerequisite
l The U31 server has exited.
l The database status is normal.
l The data is backed up in advance.

Context
The execution file of the dbtool tool is dbtool.bat. The path is \ums-server\utils\db
tool under the U31 EMS installation path.

Steps
1. On the U31 server computer, enable the dbtool tool in accordance with the operation
system type.
l Windows: /ums-server/utils/dbtool/dbtool.bat
l Linux: /ums-server/utils/dbtool/dbtool.sh
l Solaris: /ums-server/utils/dbtool/dbtool.sh

2. For a description of the related parameters, refer to Table 9-10.

Table 9-10 Dbtool Window Parameter Descriptions

Parameter Description

Language The language displayed in the dbtool window.

DBMS Type Select the DBMS type in accordance with the operation system
type:
l Windows: SQL Server.
l Linux and Solaris: Oracle.

DBMS IP IP address of the U31 server.

DBMS Port Use the default value, such as 1433.

DBA Administrator name set when the EMS database is installed,


such as sa.

Password Administrator password set when the EMS database is


installed.

3. After the parameters are set, click Login. The main window of the database tool is
displayed.
4. In the dbtool navigation tree, select Restore EMS. The Restore EMS tab is displayed.

9-19

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

5. Set the restoration file.


a. Click Browse behind Directory. The Open dialog box is displayed.
b. Select the .zip file under the backup file.

c. Click Open to return to the Restore EMS tab.


6. Select one or multiple data items from the Option area.
7. Click Restore. The Warning dialog box is displayed.
8. Click Yes.
– End of Steps –

Related Tasks
Backing Up the Data with the dbtool Tool

9.3.3 Restoring the Data with the Offline Tool


This procedure describes how to use the offline tool to restore the whole database
structure, basic data, and files.

9-20

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 9 NMS DataBackup and Restoration

Note:
Under normal circumstances, only the basic data restored in the engineering application
can meet the requirements.

Prerequisite
l The U31 server has exited.
l The data is backed up.

Context

Note:
After a file is restored, you must run the \ums-server\utils\operationmodel\ope
rationmodel.bat file to initialize the service model.

Steps
1. On the U31 server computer, enable the offline restoration tool in accordance with the
operation system type.
l Windows: /ums-server/utils/usf-backup/run.bat
l Linux: /ums-server/utils/usf-backup/run.sh
l Solaris: /ums-server/utils/usf-backup/run.sh
2. Perform the following operations as needed.

To ... Do ...

Restore the whole database i. In the left navigation tree, select Restore and Backup >
structure Restore Whole DB Structure . The Restore Whole DB
Structure dialog box is displayed.

ii. Click Browse on the right of the Select the Backup File,
and then select the backup data.

iii. (Optional) Click Advanced Configuration. Configure a


storage path for the data files as needed.

Restore the basic data i. In the left Restore and Backup navigation tree, select Re-
store and Backup > Restore Basic Data. The Restore
Basic Data window is displayed.

ii. Click Browse on the right of the Select the Backup File,
and then select the backup data.

9-21

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

To ... Do ...

Restore files i. In the left Restore and Backup navigation tree, select Re-
store and Backup > Restore File. The Restore File win-
dow is displayed.

ii. Click the Browse button on the right of the Select the
Backup File text box to select the files to be backed up.

iii. Click the Browse button on the right of the Select the
Backup File text box to select the files to be restored.

iv. Click the Browse button on the right of the File Restoration
Path text box to select the restoration path.

v. Select a file type from the File Type list. Options include
Configuration File, Running File, and Version File.

3. Click Execute. The restoration result is displayed in the Execution Result area.
– End of Steps –

Related Tasks
Backing Up the Data with the Offline Tool

9-22

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 10
System Monitoring
Table of Contents
System Monitoring....................................................................................................10-1
System Monitor View-Introduction ............................................................................10-1
Application Server Monitor .......................................................................................10-2
Database Server Monitor..........................................................................................10-4

10.1 System Monitoring


Functions
The system monitoring module provided by U31 R22 is a unified maintenance and
management platform used to monitor the servers and the database. It can automatically
identify the application server and the database server in the system and display their
information on the client interface.
The system monitoring module provides the following functions:
l View and monitor the performance of the application server and the database server,
including the information and utilization of memory, CPU and hard disks.
l View and monitor the resources in the database, such as used space, table space,
data table and process information.

Opening the System Monitor View


On the main menu of the U31 R22 client, select Maintenance > System Monitor. The
System Monitor view is displayed.

10.2 System Monitor View-Introduction


The system monitoring module provides a unified platform for system maintenance and
management. By using system monitoring module, users can add devices to be managed,
and monitor and maintain successfully the added application server and database server.

On the main menu of the U31 R22 client, select Maintenance > System Monitoring. The
System Monitoring window is displayed, see Figure 10-1.

10-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Figure 10-1 System Monitoring Window

1. Navigation Tree 2. System Monitoring View

10.3 Application Server Monitor


10.3.1 Viewing the Basic Information of Application Server
This procedure describes how to view the basic information of application server.

Steps
1. In the System Monitor navigation tree, click the icon of the application server. The
basic information is displayed in the right pane.
– End of Steps –

10.3.2 Configuring Server Performance Monitoring


This procedure describes how to set the monitoring thresholds for CPU, memory, and hard
disk. When the practical values exceed the monitoring thresholds, alarm messages are
sent.

Steps
1. In the System Monitor navigation tree, click the icon of the application server.
The basic information is displayed in the right pane, divided into three boxes: Server
Performance Monitor, Server Performance View, and Server Information.

10-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 10 System Monitoring

2. Click the Configure button under Monitor Server Performance . The Configure
Performance Monitoring dialog box is displayed.
3. Select the monitoring object, such as CPU, memory monitoring, and hard disc
monitoring.
4. (Optional) If CPU, RAM Monitoring is selected, you need to set CPU, memory
monitoring threshold, and monitoring period.
5. (Optional) If HD Monitoring is selected, you need to set the hard disc monitoring
threshold, and monitoring period.
6. Click OK.
– End of Steps –

10.3.3 Starting Server Performance Monitor


When a server performance monitor stops, you can restart the server performance monitor,
so that the monitoring thresholds take effect again.

Steps
1. In the System Monitor navigation tree, click the icon of the application server.
The basic information is displayed in the right pane, divided into three boxes: Server
Performance Monitor, Server Performance View, and Server Information.
2. Click the Run button in the Server Performance Monitor box to start the performance
monitor.
– End of Steps –

10.3.4 Suspending Server Performance Monitor


This procedure describes how to stop a server performance monitor that has been
activated previously.

Steps
1. In the System Monitor navigation tree, click the icon of the application server.
The basic information is displayed in the right pane, divided into three boxes: Server
Performance Monitor, Server Performance View, and Server Information.

2. Click the Suspend button in the Server Performance Monitor box to stop the
performance monitor.
– End of Steps –

10-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

10.3.5 Viewing Monitoring Information of the Application Server


The system can monitor the performance of the application server in real time. You can
set the periods for monitoring the utilization of CPU, memory and hard disk of the server
and check the current utilization of them.

Steps
1. In the System Monitor navigation tree, click the icon of the application server.
The basic information is displayed in the right pane, divided into three boxes: Server
Performance Monitor, Server Performance View, and Server Information.
2. Click the View button under Server Performance View. The View Application
Server Performance dialog box is displayed.
3. View the monitoring information of the application server.

– End of Steps –

10.4 Database Server Monitor


10.4.1 Viewing the Basic Information of Database Server
This procedure describes how to view the basic information of database server, including
device name, device type, database type, database port, database version, and host IP
address.

Steps
1. In the System Monitor navigation tree, click the icon of database server. The
basic information is displayed in the right pane.
– End of Steps –

10.4.2 Configuring Database Resource Monitor


This procedure describes how to configure the Database Resource Monitor to monitor
the database server. You can set the thresholds for both hard disk space and table space
and set the monitoring period. When the size of the used hard disk or table space exceeds
the threshold, the system generates an alarm.

Steps
1. In the System Monitor navigation tree, click the icon of the database server.
The basic information is displayed in the right pane, divided into three boxes:
Database Resource Monitor, Query Database Resource, and Basic Information
of Database Server.

10-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 10 System Monitoring

2. Click the Configure button under Database Resource Monitor. The Configure
Database Monitor dialog box is displayed.
3. Select monitoring object(s) from the Monitor Selection area.
l Select the Total Database Usage Monitoring check box and set a threshold in
the Usage Threshold (GB) text box.
l Select the Table Space Usage Monitoring check box and set a monitoring type
and threshold in the Table Space Usage Monitoring area.
4. Set the monitoring period in the Period Description area.
5. Click OK.

– End of Steps –

10.4.3 Starting Database Resource Monitor


When a database resource monitor stops, you can restart the monitor, so that the
monitoring thresholds take effect again.

Steps
1. In the System Monitor navigation tree, click the icon of the database server.
The basic information is displayed in the right pane, divided into three boxes:
Database Resource Monitor, Query Database Resource, and Basic Information
of Database Server.
2. Click the Run button in the right of the Database Resource Monitor box to start the
database resource monitor.
– End of Steps –

10.4.4 Suspending Database Resource Monitor


This procedure describes how to stop the database resource monitor when it is running.

Steps
1. In the System Monitor navigation tree, click the icon of the database server.
The basic information is displayed in the right pane, divided into three boxes:
Database Resource Monitor, Query Database Resource, and Basic Information
of Database Server.

2. Click the Suspend button in the right of the Database Resource Monitor box to stop
the database resource monitor.
– End of Steps –

10-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

10.4.5 Viewing Database Resource Information


This procedure describes how to view the current information of table space, data tables,
and processes of the database, and how to refresh information.

Steps
1. In the System Monitor navigation tree, click the icon of the database server.
The basic information is displayed in the right pane, divided into three boxes:
Database Resource Monitor, Query Database Resource, and Basic Information
of Database Server.

2. Click the View button under Query Database Resource. The View Database
Resources dialog box is displayed.
3. Click the three tabs Database Information, Table Information, and Process
Information to view corresponding information.
4. Click the Synchronize button to refresh database information.

After the synchronization is completed, the system enters the data into the table again.
5. (Optional) To export data to the local computer, click Export Data.
– End of Steps –

10-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 11
Task Management
Table of Contents
Task Management ....................................................................................................11-1
Introduction to Task Management View ....................................................................11-3
Backing up and Deleting Log Data ...........................................................................11-3
Backing up and Deleting Performance Data .............................................................11-4
Backing up and Deleting Alarm Data ........................................................................11-5
Viewing the Backup Logs of Basic Data ...................................................................11-6
Viewing the Backup Logs of the Whole Database Structure......................................11-6
Viewing the File Backup Logs ..................................................................................11-6
File Clearing Tasks ...................................................................................................11-7
Modifying the Task Starting Time ..............................................................................11-8

11.1 Task Management


Functions
The task management module is used to manage all scheduled tasks, which are listed on
the task navigation tree. The system predefines five types of scheduled tasks, including
Historical Data Archiving, Configuration Data Backup, File and Database Backup,
File Clean-up, and Alarm Background Task.
The predefined four types of tasks, with preset parameters, will be carried out automatically
at scheduled time. For the four types of tasks, you can perform the following operations,
which are described in Table 11-1.

Table 11-1 Task Type - Operations Reference

Task Type Available Operation

Historical Data Archiving l Refresh a task


l Modify a task
l Save a task
l Cancel the modification of a task
l View tasks missed
l View logs
l Set capacity
l Suspend backup

11-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Task Type Available Operation

Configuration Data Backup l View logs


l Suspend the task
l Activate the task
l Suspend the task
l Modify the task
l Save the task
l Cancel the modification of the task

File and Database Backup l Modify a task


l Save a task
l Cancel the modification
l View logs
l Suspend backup
l Activate a task
l Suspend a task

File Clean-up l Modify a task


l Executive a task
l View file information
l View logs
l Query tasks
l Customize columns to be displayed

Alarm Background Task l Refresh the task


l Modify the task
l View logs
l Save the task
l Cancel the modification of the task
l Activate the task
l Suspend the task

Note:
To modify the task executing time, refer to 11.10 Modifying the Task Starting Time.

Opening Task Management View


On the main menu of U31 R22 system, select Maintenance > Task Management > Show
Timing Task. The Task Management window is displayed.

11-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 11 Task Management

11.2 Introduction to Task Management View


The task management module is used to manage all scheduled tasks in the system.
All tasks are listed under the task navigation tree as tree nodes. The corresponding
operation windows of tasks and the implementation logic on the server are all provided
by task-related modules.
On the main menu of the U31 R22 client, select Maintenance > Task Management >
Show Timing Task. The Task Management window is displayed, see Figure 11-1.

Figure 11-1 Task Management View

1. Main menu 3. Navigation tree


2. Toolbar 4. Task management tree

11.3 Backing up and Deleting Log Data


It is necessary to backup and delete log data regularly because the increasing size of the
database can influence the system stability. This task runs once a day.
At predefined time, the system carries out this task automatically.

Context
The buttons used in this task provide the following functions:

To... Do...

Modify the export information and period Click on the toolbar to change the Backup
information of a task Description area into the editable status.

11-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Save the modifications to the task Click on the toolbar.

Cancel the modifications to the task Click on the toolbar.

View tasks that are not executed Click on the toolbar.

Obtain the latest task information when multiple Click on the toolbar.
clients coexist

View the information about the task execution Click on the toolbar.

Set the capacity of the database Click on the toolbar.

Steps
1. In the left navigation tree in the Task Management window, select Common Task >
Historical Data Archiving > Log Data Backup and Deletion Task. The task details
are displayed in the right pane.
2. On the toolbar, click the button.
3. Select the log type(s) to be backed up.
4. Click the button.
– End of Steps –

11.4 Backing up and Deleting Performance Data


It is necessary to backup and delete performance data regularly because the increasing
size of the database can influence the system stability. This task runs once a day
automatically at predefined time. Before deletion, you can choose whether to back up
performance data.

Context
The buttons used in this task provide the following functions:

To... Do...

Modify the export information and period


Click on the toolbar to change the Backup
information of a task
Description area into the editable status.

Save the modifications to the task


Click on the toolbar.

Cancel the modifications to the task


Click on the toolbar.

Obtain the latest task information when multiple


Click on the toolbar.
clients coexist

View the information about the task execution


Click on the toolbar.

View tasks that are not executed


Click on the toolbar.

11-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 11 Task Management

Steps
1. In the left navigation tree in the Task Management window, select Common Task >
Historical Data Archiving > PM Data Backup and Deletion Task. The task details
are displayed in the right pane.

2. Click the button.


3. Select the log type(s) to be backed up.

4. Click the button.


– End of Steps –

11.5 Backing up and Deleting Alarm Data


It is necessary to backup and delete log data regularly because the increasing size of the
database can influence the system stability. This task runs once a day automatically at
predefined time.

Context
The buttons used in this task provide the following functions:

To... Do...

Modify the export information and period Click on the toolbar to change the Backup
information of the task Description view into the editable status.

Save the modifications to the task Click on the toolbar.

Cancel the modifications to the task Click on the toolbar.

View tasks that are not executed Click on the toolbar.

Obtain the latest task information when multiple Click on the toolbar.
clients coexist

View the information about the task execution Click on the toolbar.

Set the capacity of the database Click on the toolbar.

Steps
1. In the left navigation tree in the Task Management window, select Common Task
> Historical Data Archiving > Alarm Data Backup and Deletion Task. The task
details are displayed in the right pane.

2. Click the button.

3. Select the log type(s) to be backed up.


4. Click the button.

– End of Steps –

11-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

11.6 Viewing the Backup Logs of Basic Data


The Basic Data Backup task backs up all current basic data, except the table structure
and history data.

Steps
1. In the left navigation tree in the Task Management window, select Common Task >
Configuration Data Backup > Backup Basic Data . The task backup and period
information is displayed in the right pane.
2. Click the button. The View Log dialog box is displayed.
3. View the backup logs.
– End of Steps –

11.7 Viewing the Backup Logs of the Whole Database


Structure
Whole database structure backup backs up the structures of all databases used by the
system, and that of all database objects and the basic data in these databases every day,
except the history data.

Steps
1. In the left navigation tree in the Task Management window, select Common Task >
Version and Database Backup > Backup Whole DB Structure. The whole database
backup and period information is displayed in the right pane.
2. Click the button. The View Log dialog box is displayed.
3. View the logs.
– End of Steps –

11.8 Viewing the File Backup Logs


This procedure describes how to view the backup logs of the file system.

Context
The File System Backup task backs up version files, configuration files and runtime files
on the server every day.

l Version files refer to all files generated by the U31 R22 server, except those generated
during runtime.
l Configuration files refer to the files related to configuration generated on the server.
l Runtime files refer to the files generated on the server during runtime.

11-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 11 Task Management

Steps
1. In the left navigation tree in the Task Management window, select Common Task >
Version and Database Backup > Backup File. The file system backup and period
information is displayed in the right pane.
2. Click the button. The View Log dialog box is displayed.
3. View the logs.
– End of Steps –

11.9 File Clearing Tasks


11.9.1 Modifying Monitor Attributes
The system monitors the directories where various query files generated by tasks are
stored. Once the size of a directory exceeds the preset threshold, the system clear the
files in the directory in accordance with the task settings.

Context
You can modify the monitoring attributes, including directory settings and cleanup settings.
This procedure uses modifying the Performance Query FTP Directory Monitoring
attributes as an example.

Steps
1. In the left navigation tree in the Task Management window, select Common Task >
File Clear-up > Directory Monitoring. The monitoring task details are displayed in
the right pane.
2. Select a task from the list.

3. Click . The Performance Query FTP Directory Monitoring dialog box is


displayed.
4. Set the parameters, and click OK.
– End of Steps –

11.9.2 Executing Monitoring Tasks Immediately


You can manually execute a task by clicking the Instantly Execute button before the preset
time.

Context
You can modify the monitoring attributes, including directory settings and cleanup settings.
This procedure uses modifying the Performance Query FTP Directory Monitoring
attributes as an example.

11-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Steps
1. In the left navigation tree in the Task Management window, select Common Task >
File Clean-up > Directory Monitoring. The monitoring task details are displayed in
the right pane.
2. Select Performance Query FTP Directory Monitoring from the task list.
3. Click the Instantly Execute button. The Confirm message box is displayed.
4. Click Yes.
– End of Steps –

11.10 Modifying the Task Starting Time


This procedure describes how to modify the task time.

Context
You can modify the start time of the five predefined types of tasks, including history
data backup and deletion, configuration data backup, version and database backup, file
clearing, and alarm background tasks. You can only modify the start time by hour. The
actual start time of a task might be the preset time plus an offset, which takes 10 minutes
as the granularity, between 0 and 60 minutes. (If the preset time is 18:00, for example,
the start time might be 18:10, 18:20, etc.)

Steps
1. From the main menu, select Maintenance > Task Management > Modify Task Start
Time. The Modify Task Start Time dialog box is displayed.
2. Select a task based in the Task Sort field.

3. Click the button. The Modify Time dialog box is displayed.


4. Set the start time, and click OK.
– End of Steps –

11-8

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 12
Troubleshooting
Table of Contents
Troubleshooting Flow ...............................................................................................12-1
Methods for Collecting Failure Information................................................................12-3
Common Troubleshooting Methods ..........................................................................12-3
Common Troubleshooting Tools ...............................................................................12-4
Troubleshooting Precautions and Requirements.......................................................12-5
Contacting Technical Support ...................................................................................12-6
Troubleshooting of Server Failures ...........................................................................12-6
Troubleshooting of Ethernet Switch Failures...........................................................12-10
Troubleshooting of Software Failures .....................................................................12-13
Failure of Querying Performance Data ...................................................................12-17

12.1 Troubleshooting Flow


When a failure occurs in the U31 R22 system, you need to observe the fault symptom,
analyze the service flow and involved network elements (NEs), and then locate the exact
module where the failure occurs based on the understanding of system composition. After
locating the failure, repair the faulty module in accordance with proper handling method or
the instructions provided in this manual.
Figure 12-1 illustrates the general troubleshooting flow of the U31 R22 system.

12-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Figure 12-1 Troubleshooting Flow

The following describes the general flow of troubleshooting in the U31 R22 system.
1. Determine the failure conditions.

Perform simple service tests to find the conditions of the failure.


2. Collect failure information.

12-2

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 12 Troubleshooting

Record the details of the failure symptom, related alarms displayed on the fault
management view, operation information of the system, and handling operations
that have been done. Use the maintenance functions provided by the system (for
example, service observation, and performance statistics) to collect and save related
information at the time when the failure occurs.
3. Analyze the failure and find out the failure type.
Determine the possible causes of the failure and find out the type of the failure by
analyzing the failure symptom and related information collected from the system.
4. Locate the cause of the failure.
Analyze the service flow and related NE(s) based on the conditions when the failure
occurs to find out the real cause of the failure.
5. Remove the failure.
Perform handling operations according to the failure cause to remove the failure.
6. Record the troubleshooting process.
After the troubleshooting, record the failure symptom and handling method in detail so
that other maintenance personnel can refer to the handling experience to troubleshoot
similar failures.

12.2 Methods for Collecting Failure Information


In the case of a failure, the first thing you need to do is collecting all information related
to the failure. For those failures that you cannot remove from the system, information
collection is also important because you need provide useful information to ZTE's support
engineers for troubleshooting them.
The following summarizes basic methods of how to collect required information related to
a failure.
l Check operation logs of related modules.
l Use a packet catcher to collect packets.
l Perform basic network tests, for example, ping, telnet, and traceroute.
l Check operation logs, including the operation logs of related service, the operating
system, and dual servers.
l Check and analyze related alarms.
l Perform tests on the actual service.

12.3 Common Troubleshooting Methods


A number of methods can be used to troubleshoot failures in the U31 R22 system. In actual
situation, the flexible combination of different methods is recommended when it is hard to
determine whether a failure is a software failure or a hardware failure. Being familiar with
all the troubleshooting methods is helpful for you to troubleshoot failures in the system
quickly.

12-3

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

The following introduces four common troubleshooting methods for your reference.
l Comparison Method
The comparison method is a simple method that you can use to find the difference
between the faulty configuration data (or faulty device) and the correct configuration
data (or normal device) by comparing them and then locate the failure by analyzing
the difference.
l Replacement Method
The replacement method is a simple and practical troubleshooting method that you
can use to determine whether a hardware is faulty. For example, use a board of the
same type to replace the possible faulty board. If the failure disappears after the
replacement, it can be concluded that the replaced board is faulty.
l System Simplification Method
The system simplification method is a troubleshooting method that you can use to
locate a failure by observing the simplest system after removing all the other irrelevant
hardware. If the failure still exists in the simplest system, it can be concluded that the
failure locates in a hardware in the simplest system. If the failure does not exist in
the simplest system, add the previously-removed hardware to the system one by one.
Once the failure appears after a hardware is added, it can be concluded that the added
hardware is faulty. Then you can replace the faulty hardware to restore the system.
l Failure Code Analysis Method
The failure code analysis method is a troubleshooting method that you can use to
diagnose software and service failures. The system provides failure codes and causes
for all operation failures. You can conveniently determine the cause of an operation
failure by checking corresponding failure code.
The following gives two examples of how to combine different methods for troubleshooting
failures.
l Example 1: To troubleshoot a hardware failure, you need to observe the indicator
lights of the hardware, and then use the replacement method and comparison method
to judge whether the hardware is working properly.
l Example 2: To troubleshoot a software or service failure, you need to use the
maintenance functions of the system to find possible causes by checking and
analyzing the failure code, related logs and data in the system.

12.4 Common Troubleshooting Tools


Some tools can be used to facilitate the troubleshooting of the U31 R22 system, including
log viewer, packet catcher, and Management Information Base (MIB) browser. The
following gives a brief introduction to these common tools.
l Log Viewer
By using the log viewer, you can view the log of operations and the log of operation
errors that are automatically recorded by the operating system. In this way, you can .

12-4

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 12 Troubleshooting

When a failure occurs, you can view the operation log to find the operation when the
failure occurs and judge whether the failure is caused by this operation, and locate
the failure cause by analyzing the operation error log.
l Packet Catcher
The packet catcher can be used to catch needed data from network ports, and
translate the data into a format that can be easily understood and analyzed by end
users.
l MIB Browser
The MIB browser is used to obtain the attributes of Simple Network Management
Protocol (SNMP). It can extract data from an NE agent and compare the data with
that in corresponding NE and U31 R22.

12.5 Troubleshooting Precautions and Requirements


Be familiar with the following precautions and requirements before you begin a
troubleshooting procedure.
l Prepare common tools that may be used during the troubleshooting, for example, flat
screwdriver, cross screwdriver, test pencil, and network cable crimper pliers.
l Follow the safety regulations and precautions specified by the operator in the
equipment room during troubleshooting.

Note:
The operator is recommended to establish rules and regulations to control and
direct the troubleshooting operations in equipment rooms, and authorize qualified
maintenance personnel to perform troubleshooting operations, to prevent new
failures caused by improper operations during troubleshooting.

l Before troubleshooting, back up service data and operation parameters.


l During troubleshooting, collect all failure-related data for analyzing and finding the
failure cause, and record useful information in detail, for example, failure symptoms,
version information, and data changes.
l After troubleshooting, fill in the troubleshooting log to record all details of the
troubleshooting procedure. Add shift records to the log for the troubleshooting
that cannot be completed in a day. Such troubleshooting may involve different
maintenance personnel.
l Begin a troubleshooting procedure immediately when a failure occurs. If you fail to
remove a failure, contact your local ZTE office for support. Frequently update the
contact information of your local ZTE office and paste the latest contact information of
your local ZTE office on an eye-catching place so that you can contact the local office
in time in the case of emergency.

12-5

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

12.6 Contacting Technical Support


In the following cases, contact your local ZTE office for technical support immediately.
l Occurrence of a critical failures, for example, interruption of part or all services
l Occurrence of a failure that cannot be removed in accordance with the instructions
provided by this manual
l Occurrence of a failure that cannot be removed in accordance with the handling
methods you already know
l Occurrence of a failure that cannot be removed in accordance with your
troubleshooting experience on similar failures
Before contact technical support, prepare the following information, which may be required
by ZTE support engineers.

l Failure details, including occurrence time, location, and failure symptoms


l Log files on the server and the client
l Data collected by a packet catcher
l Details of the troubleshooting operations you have done
l Remote login method, and the contact phone number
You can contact your local ZTE office for the following support:
l Field Support
ZTE maintenance engineers go to the field to troubleshoot the failure
l Phone Support
ZTE maintenance engineers guide the field engineers to troubleshoot the failure by
phone.
l Remote Support
ZTE maintenance engineers log in to the system or equipment remotely to
troubleshoot the failure.

12.7 Troubleshooting of Server Failures


12.7.1 An Indicator of the Server Lights Red
Symptom
An indicator on the front panel of the server lights red.

Analysis
An indicator glowing in red usually indicates a hardware failure, which may be caused by

l Loose hardware part in the server.


l Hardware damage in the server.

12-6

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 12 Troubleshooting

Troubleshooting
The following describes the troubleshooting procedure of this failure.
1. Check for any loose hardware part in the server.
l If any loose part is found, use a proper tool to fasten the part.
l If no loose part is found, proceed to Step 2.
2. Contact the manufacturer of the server for technical support after the following
preparations:
l Find the hardware manual of the server, which is delivered with the server
together, and then read the description of indicators in the manual to judge the
current status of the server.
l Write down the serial number of the server.

Result Verification
After the failure is removed, the indicator of the server glows in green.

12.7.2 An Indicator of the Server Lights Yellow


Symptom
An indicator on the front panel of the server lights in yellow.

Analysis
The meaning of yellow indicator varies with the actual model of the server. An indicator
glowing in yellow usually indicates a hardware failure, which may be caused by
l Loose hardware part in the server.
l Hardware damage in the server.

Troubleshooting
The following describes the troubleshooting procedure of this failure.
1. Check for any loose hardware part in the server.
l If any loose part is found, use a proper tool to fasten the part.
l If no loose part is found, proceed to Step 2.
2. Contact the manufacturer of the server for technical support after the following
preparations:
l Find the hardware manual of the server, which is delivered with the server
together, and then read the description of indicators in the manual to judge the
current status of the server.
l Write down the serial number of the server.

Result Verification
After the failure is removed, the indicator of the server glows in green.

12-7

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

12.7.3 The Indicator of a Hard Disk Lights Red


Symptom
The indicator of a hard disk lights red.

Analysis
The indicator lighting red indicates that the hard disk is damaged.

Note:
Generally, a Redundant Array of Inexpensive Disks (RAID) is configured for the U31 R22
system. That is, multiple disks are used to keep the data integrity and reliability of the
system.

Troubleshooting
When a hard disk in the system is damaged, do the following:
1. Contact the manufacturer of the hard disk to obtain a new hard disk.
2. Contact your local ZTE office for replacing the damaged hard disk.

Result Verification
After the replacement of the damaged hard disk, the indicator of the new hard disk lights
green.

12.7.4 Startup Failure of the Server


Symptom
The server fails to start up after power on.

Analysis
The startup failure of the server may be caused by
l Power module failure of the server
l Hardware damage of the server, for example, hard disk damage, I/O confliction, CPU
failure, and memory failure
l Startup errors, for example, file system damage

Troubleshooting
To troubleshoot the startup failure of the server, do the following:
1. Observe the status indicator of each power module.

12-8

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 12 Troubleshooting

l If the indicator of a power module is off, the power module fails. Replace it with a
new power module.
l If the indicators of all power modules light green, proceed to the next step.
2. Check for loosen part or hardware damage in the server.
l If a loosen part is found, fix the part and then check whether the server can start
up successfully.
l If a damaged part is found, replace it with a good one, and then check whether
the server can start up successfully.
l If no loosen or damaged part is found, proceed to the next step.
3. Check the error information if an error message is prompted during the startup of the
server.
l If the error indicates a file system damage, reboot the server into security mode or
maintenance mode, and then repair the file system. After that, restart the server
and check whether it can start up successfully.
l If the error is not caused by file system damage, proceed to the next step.
4. Record the error information, and then contact your local ZTE office for technical
support.

Result Verification
The server can start up successfully.

12.7.5 Remote Login Failure to the Server


Symptom
You can successfully ping the server, but cannot log in to the server remotely via
Telecommunication Network Protocol (TELNET) or Secure Shell (SSH).

Analysis
The possible causes of this failure include:
l The server fails to start up because of file system damage.
l The file system is full.
l An exception happens in the TELNET or SSH service.

Troubleshooting
Log in to the server via a serial port, and then troubleshoot the remote login failure as
follows:
1. Check whether the server is started without errors. If some error is found, restart the
server into maintenance mode or security mode. Observe the error message on the
screen during restart, and troubleshoot the error.
2. Check whether the file system is full. In the case of full file system, clear junk files in
the system and ensure that the utilization of the root partition or the boot disk does not
exceed 80%.

12-9

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

3. Check whether the TELNET or SSH service is successfully started. If the service is
not started or started with an exception, restart the TELNET or SSH service.
4. If you fail to troubleshoot the remote login failure, contact your local ZTE office for
technical support.

Result Verification
You can successfully log in to the server remotely.

12.8 Troubleshooting of Ethernet Switch Failures


12.8.1 Indicators of the Switch Port Connected to the Server Are Off
Symptom
Two indicators of the network port on the switch are off after you connect the U31 R22
server to the switch with a network cable. The status of the indicators indicates that no
device is connected to this port.

Analysis
The possible causes of this problem include:
l The network port of the switch fails.
l The network cable is defective.
l The peer network port on the server fails, which is connected to the switch with the
network cable.

Troubleshooting
To troubleshoot this problem, do the following:
1. Check whether the network port on the Ethernet switch works properly.
Log in to the switch via a serial port, and then run the following command in a command
terminal to view the status of the network port.
show port Port No.

l If the network port fails to work properly, replace the switch, or connect the network
cable to a normal network port on the switch.
l If the network port works properly, proceed to the next step.
2. Check whether the network cable is defective.
Insert both connectors of the network cable to corresponding ports of a network cable
tester, and observe the indicators on the tester.
l If some indicator(s) on the network cable test is off, the network cable is defective.
In this case, replace the network cable.
l If all indicators on the network cable test are on, the network cable is good.
Proceed to the next step.

12-10

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 12 Troubleshooting

3. Check whether the network adapter in the U31 R22 server is normal.
a. Enable the Terminal window on the server through the ifconfig -a command to view
the status of the network adapter in the server. If the status of the network adapter
is normal, the system feedback information is shown in Figure 12-2.

Figure 12-2 View the Status of Network Adapter

l If the system cannot identify the network adapter, install a proper driver for
the network adapter.
l If the status of the network adapter is not "UP", use the following command
to activate this network adapter.
ifconfig Network Adapter Name plumb

b. If the status of the network adapter is "UP", use the netstat -i command to check
the data transmission information of the network adapter, including the received
package count, sent package count, error package count, analyze the information
and judge whether the network adapter is working properly.
If the network adapter is normal, proceed to the next step.
4. If you fail to troubleshoot this failure after using the previously-mentioned methods,
collect the failure information and contact your local ZTE office for technical support.

Result Verification
Insert the network cable to the network port on the switch. Both indicators of the network
port light green after a while.

12.8.2 Indicators of the Switch Port Connected to the Server Light


Solid Yellow
Symptom
Two indicators of the network port on the switch light solid yellow after you connect the
U31 R22 server to the switch with a network cable. The status of the indicators indicates
that network connection is unavailable between the switch and the server.

Analysis
The possible causes of this problem include:
l The network port of the switch fails.
l The network cable is defective.
l The peer network port on the server fails, which is connected to the switch with the
network cable.

12-11

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Troubleshooting
To troubleshoot this problem, perform the following:
1. Check whether the network port on the Ethernet switch works properly.
Log in to the switch via a serial port, and then run the following command in a command
terminal to view the status of the network port.

show port Port No.

l If the network port fails to work properly, replace the switch, or connect the network
cable to a normal network port on the switch.
l If the network port works properly, proceed to the next step.
2. Check whether the network adapter in the U31 R22 server is normal.
a. Enable the Terminal window on the server through the ifconfig -a command to view
the status of the network adapter in the server. If the network adapter is normal,
the system feedback information is shown in Figure 12-3.

Figure 12-3 View the Status of Network Adapter

l If the system cannot identify the network adapter, install a proper driver for
the network adapter.
l If the status of the network adapter is not "UP", use the following command
to activate this network adapter.

ifconfig Network Adapter Name plumb

b. If the status of the network adapter is "UP", use the netstat -i command to check
the data transmission information of the network adapter, including the received
package count, sent package count, error package count, analyze the information
and judge whether the network adapter is working properly.
If the network adapter is normal, proceed to the next step.
3. Check whether the network cable is good.
Insert both connectors of the network cable to corresponding ports of a network cable
tester, and observe the indicators on the tester.
l If some indicator(s) on the network cable test is off, the network cable is defective.
In this case, replace the network cable.
l If all indicators on the network cable test are on, the network cable is good.
Proceed to the next step.
4. If you fail to troubleshoot this failure after using the previously-mentioned methods,
collect the failure information and contact your local ZTE office for technical support.

12-12

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 12 Troubleshooting

Result Verification
The indicators of the network port light green.

12.9 Troubleshooting of Software Failures


12.9.1 Failure of Removing the Server Program
Symptom
The operating system prompts "version is running" when you remove the U31 R22
server program from the server although you already exited the server program.

Analysis
Some related process is still running after you exited the U31 R22 server program.

Troubleshooting
l Troubleshooting of Windows operating system
1. Press Ctrl+Alt+Del. The Task Manager dialog box is displayed.
2. Find the processes start with "zte_", and then right-click it. Select End Processe
from the shortcut menu.
3. Repeat the previous step to end all the processes start with "zte_".
4. In the service list of the Computer Management window, stop MySQL, ZX DHCP
Service, and ZXISAM DHCP Web Business services.
5. (Optional) If you cannot uninstall the sever through the above three steps. Restart
the sever and then uninstall it again.
l Troubleshooting of Linux/Solaris operating system
1. Open the command line terminal on the sever as a root user. Enter the following
command. The running processes are displayed.
#prstat –a
2. End all the processes start with "zte_".
For example, there is a current running process "zte_console1", and its
corresponding PID is 8892. Enter the following command in the command line
to close the process:
#kill 8892
3. Execute the #prstat –a command, if there is no process starts with "zte_", the
installation is successful.
4. (Optional) If you cannot uninstall the sever through the above three steps. Restart
the sever and then uninstall it again.

Result Verification
You can successfully remove the U31 R22 server program from the server.

12-13

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

12.9.2 Insufficient Disk Space During Server Installation


Symptom
During the installation of the U31 R22 server program, the system does not pass
the detection of system information with the message "Database Detection:
Detecting is not passed" prompted, see Figure 12-4.

Figure 12-4 NetNumen Setup - System Information Detection (Database Detection Not
Passed)

Analysis
The space of the disk where the installation directory of the server program locates does
not meet the previously-set space requirements of database.

Troubleshooting
To solve this problem for continuing the installation of the server program, do the following:
1. In the NetNumen Setup - System information detection window, click Back to return
to the NetNumen Setup - Database config window.
2. Select the product, and then click Modify Path. The Database Configuration dialog
box is displayed, see Figure 12-5.

12-14

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 12 Troubleshooting

Figure 12-5 Database Configuration Dialog Box

Note:
l You cannot install the NMS to the system disk.
l It is not recommended to modify the size of the database space.

3. Change the path for saving the database file. Click OK. A confirm message box is
displayed. Click Yes.
4. Repeat step 2 to 3 to change the paths for saving the database files of other products.
5. After decreasing the space size allocated to the database, click Next in the NetNumen
Setup - Database config window.
The system passes the database detection if the disk meets the space requirements
of the database, see Figure 12-6.

Figure 12-6 NetNumen Setup - System Information Detection (Database Detection


Passed)

Result Verification
All detections are passed, and you can continue the installation of the U31 R22 server
program.

12-15

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

12.9.3 FTP Server Start Error


Symptom
The startup of the server program fails with the following message prompted:

FATAL [com.zte.ums.uep.psf.ftp.server.FtpServer] ftp server start error!


java.io.IOException: ftp server start error! The port *** has been used!

Analysis
The port of FTP (File Transfer Protocol) is occupied by another process and error occurs.

Troubleshooting
You can assign another FTP port to the process so that the process can release the FTP
port needed by the server program. Or configure the server to use another port for the
communication with NEs.
The following describes how to change the FTP port used by the server program in the
NetNumen Configuration Center.

1. On the server, use the following command in a Terminal window to open the uif
directory under the installation directory of the server program and then run the runP
lugCenter.sh file.

# cd export/home/NetNumenU31/uif
# ./runPlugCenter.sh

The Network Configuration Center window is displayed, see Figure 12-7.

Figure 12-7 NetNumen Configuration Center

12-16

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 12 Troubleshooting

Note:
If your U31 R22 server program is installed on a Windows operating system,
double-click the runPlugCenter.bat file under the uif directory.

2. In the left pane of the NetNumen Configuration Center window, expand the
Common Configuration node, and then click Common Configuration.
3. In the right pane, click the Server tab, expand the Global Configuration node, and
then click the FTP port.
4. On the lower part of the right pane, enter the No. of the new port (for example, 21111)
in the Value of config box, see Figure 12-8

Figure 12-8 FTP Port

5. Click Save All to save the change of FTP port.


6. Click Close to exit the NetNumen Configuration Center.

Result Verification
Run the server program again. The U31 R22 server starts up successfully without FTP
server error.

12.10 Failure of Querying Performance Data


Symptom
The query result has no data when you query performance data in the U31 R22 system.

Analysis
The possible causes of the failure of performance data query include:

12-17

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

l No measurement task is created in the U31 R22 system to collect the performance
data you want.
l The measurement task used to collect the performance data you want is not activated.
l The measurement task does not collect the performance data you want because the
time period set in the task does not cover that of the desired performance data.
l The communication between the NE(s) and the U31 R22 server has problem.

Troubleshooting
To troubleshoot the query failure of performance data, do the following:
1. In the client window of U31 R22, select Performance > Measurement Task
Management on the menu bar. The Measurement Task Management tab is
displayed.
2. On the Measurement Task Management tab, view the information of measurement
tasks in the list to find whether a measurement task is responsible for collecting the
performance data you want.
l If no, create a new measurement task for collecting the desired performance data.
Then the troubleshooting is completed.

Note:
For how to create a measurement task, refer to 4.3.1 Creating a Measurement
Task.

l If yes, proceed to the next step.


3. Check the status of the measurement task in the Task Status column on the
Measurement Task Management tab.
l If the status of the measurement task is "Suspend", right-click the measurement
task, and then click Activate Measurement Task on the shortcut menu to activate
the measurement task. Then the troubleshooting is completed.
l If the status of the measurement task is "Active", proceed to the next step.
4. On the Measurement Task Management tab, check the start time and end time of
the measurement task to find whether the collection period of the measurement task
covers the time period set for querying performance data.
l If no, modify the collection period of the measurement task in accordance with
the instructions in 《 etNumen U31 R22 Unified Network Management System
Performance Management Operation Guide 》 .
l If yes, proceed to the next step.
5. In the client window of U31 R22, open the Topology Management window, and then
check whether the NE whose performance data you want to query is online.
If the NE is offline, check and make sure that the IP address of the NE is correctly
configured on the server and the network connection between the NE and the U31
R22 server is normal.

12-18

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Chapter 12 Troubleshooting

Result Verification
You can successfully query the performance data you want in the U31 R22 system.

12-19

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

This page intentionally left blank.

12-20

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Figures
Figure 1-1 Operation Flow of the U31 R22................................................................ 1-2
Figure 1-2 Operation Result Display ......................................................................... 1-4
Figure 1-3 Portal ....................................................................................................... 1-7
Figure 1-4 Toolbar Customization Dialog Box.......................................................... 1-15
Figure 2-1 Topology Management Window ............................................................... 2-3
Figure 2-2 Topology Menu ........................................................................................ 2-4
Figure 2-3 Topology Graph Toolbar ........................................................................... 2-4
Figure 2-4 NE Icons .................................................................................................. 2-6
Figure 2-5 Alarm Color Illustration............................................................................. 2-7
Figure 2-6 Show Message Dialog Box .................................................................... 2-14
Figure 2-7 NE Tree ................................................................................................. 2-22
Figure 2-8 Entering a Keyword................................................................................ 2-23
Figure 2-9 Current Layer......................................................................................... 2-25
Figure 2-10 Topology Graph Toolbar ....................................................................... 2-27
Figure 2-11 Viewed Nodes ...................................................................................... 2-28
Figure 3-1 Fault Management View User Interface ................................................... 3-3
Figure 3-2 Management Tree.................................................................................... 3-4
Figure 3-3 NE Tree ................................................................................................... 3-4
Figure 3-4 Statistic Tree............................................................................................ 3-5
Figure 3-5 Alarm Panel ............................................................................................. 3-9
Figure 3-6 Alarm Panel Dialog Box ........................................................................... 3-9
Figure 3-7 Intermittent Alarm Setting Window ......................................................... 3-12
Figure 3-8 Intermittent Alarm Setting Dialog Box .................................................... 3-13
Figure 3-9 Alarm Monitoring Window ...................................................................... 3-14
Figure 3-10 Severity Regarding Setting Window ..................................................... 3-18
Figure 3-11 Setting Alarm Preload in Batches ......................................................... 3-20
Figure 3-12 Specified Alarms Monitoring Window ............................................... 3-22
Figure 3-13 BN-xTN Event Transforms to ADMC Alarm Dialog Box ........................ 3-23
Figure 3-14 Configuration Example (Alarm Setting) ................................................ 3-27
Figure 3-15 Right-Click Menu of Fault Management ............................................... 3-31
Figure 3-16 Alarm Query Navigation Tree ............................................................... 3-32
Figure 3-17 Default Alarm Query Templates ........................................................... 3-37

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Figure 3-18 Query Active Alarms Dialog Box .......................................................... 3-39


Figure 3-19 Entering a User-Defined Alarm Template Name ................................... 3-41
Figure 3-20 User-Defined Alarm Query Template Name ......................................... 3-41
Figure 3-21 Viewing the User-Defined Suggestion .................................................. 3-59
Figure 3-22 Statistic Tree........................................................................................ 3-61
Figure 4-1 Performance Monitoring Scheme ............................................................. 4-3
Figure 4-2 Performance Management View .............................................................. 4-4
Figure 4-3 Performance Menu .................................................................................. 4-5
Figure 4-4 Logical Filtering /Rendering Dialog Box.................................................. 4-15
Figure 4-5 Threshold Rendering Dialog Box ........................................................... 4-15
Figure 4-6 Index/Counter Selection Tab .................................................................. 4-32
Figure 4-7 Template Management Tab .................................................................. 4-44
Figure 4-8 Counter Selection Tab............................................................................ 4-56
Figure 4-9 Template Management Window ............................................................. 4-57
Figure 5-1 Shelf Information.................................................................................... 5-18
Figure 5-2 Self Statistics by Type............................................................................ 5-18
Figure 6-1 Security Menu.......................................................................................... 6-2
Figure 6-2 Security Management View...................................................................... 6-3
Figure 6-3 Relation Model of Security Management.................................................. 6-5
Figure 6-4 Set User Account Rule Dialog Box........................................................... 6-8
Figure 7-1 Log Management View ............................................................................ 7-2
Figure 9-1 Database Restoration Flow of the U31 R22 ........................................... 9-15
Figure 10-1 System Monitoring Window.................................................................. 10-2
Figure 11-1 Task Management View ....................................................................... 11-3
Figure 12-1 Troubleshooting Flow........................................................................... 12-2
Figure 12-2 View the Status of Network Adapter ................................................... 12-11
Figure 12-3 View the Status of Network Adapter ................................................... 12-12
Figure 12-4 NetNumen Setup - System Information Detection (Database Detection
Not Passed)........................................................................................ 12-14
Figure 12-5 Database Configuration Dialog Box ................................................... 12-15
Figure 12-6 NetNumen Setup - System Information Detection (Database Detection
Passed) .............................................................................................. 12-15
Figure 12-7 NetNumen Configuration Center ........................................................ 12-16
Figure 12-8 FTP Port ............................................................................................ 12-17

II

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Tables
Table 1-1 System Parameter Setting....................................................................... 1-10
Table 1-2 Parameter Description of Select Lock Type Dialog Box ........................... 1-16
Table 2-1 Description of Topology Toolbar Buttons .................................................... 2-4
Table 2-2 Tooltip Item Descriptions ......................................................................... 2-11
Table 2-3 Toolbar on Monitoring Pane..................................................................... 2-16
Table 2-4 View Details of Alarm Information ............................................................ 2-17
Table 2-5 Differences Between the Three Ways...................................................... 2-23
Table 3-1 Descriptions for Parameters in the Basic Tab.......................................... 3-10
Table 3-2 Parameter Descriptions for Intermittent Alarm Setting ............................. 3-13
Table 3-3 Descriptions for Three Modes of Alarm Preload....................................... 3-19
Table 3-4 Board Configuration Plan Table (Alarm Setting)....................................... 3-27
Table 3-5 External Alarm Parameters (Alarm Setting) ............................................. 3-27
Table 3-6 External Alarm Tandem Parameters (Alarm Setting) ................................ 3-28
Table 3-7 Common Alarm Query Template Settings ................................................ 3-39
Table 3-8 Time Parameter Descriptions .................................................................. 3-43
Table 3-9 Parameter Descriptions for the Others Tab .............................................. 3-44
Table 3-10 Alarm Management Rule ....................................................................... 3-52
Table 3-11 Alarm Rule Parameter Descriptions ....................................................... 3-56
Table 3-12 Common Alarm Tasks ........................................................................... 3-70
Table 3-13 Parameter Descriptions for a Scheduled Statistic Task .......................... 3-71
Table 3-14 Advanced Settings ................................................................................ 3-72
Table 3-15 Parameter Descriptions for a Scheduled Export Task ............................ 3-73
Table 3-16 FTP Server Parameter Setting............................................................... 3-75
Table 3-17 Parameter Descriptions for a Suppressing Plan Task ............................ 3-76
Table 4-1 Performance Management Buttons on the Main Toolbar............................ 4-5
Table 4-2 Common Buttons on the Performance Management Toolbar ..................... 4-6
Table 4-3 Performance Module Parameter Setting .................................................... 4-6
Table 4-4 Descriptions for Parameters on the Index/Counter Selection Tab............. 4-14
Table 4-5 Description of Toolbar Buttons on the Measurement Task Management
Tab......................................................................................................... 4-16
Table 4-6 Description of Toolbar Buttons for Template Tasks................................... 4-27
Table 4-7 Description of Toolbar Buttons for Task Results ....................................... 4-28

III

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

Table 4-8 Function Button Descriptions ................................................................... 4-28


Table 4-9 Function Button Descriptions ................................................................... 4-29
Table 4-10 Descriptions for Parameters in the Counter Selection Tab ................... 4-31
Table 4-11 Descriptions for Parameters in the Location Selection Tab .................. 4-32
Table 4-12 Common Performance Query Template Settings ................................... 4-33
Table 4-13 Functions of Buttons on the Toolbar of Common Template Tab.............. 4-45
Table 4-14 Parameter Descriptions for Counter Selection ...................................... 4-51
Table 4-15 Parameter Descriptions for Object Selection ......................................... 4-51
Table 4-16 Parameter Descriptions for Time Selection ........................................... 4-52
Table 4-17 Ways of Querying Performances in the Main Menu ............................... 4-52
Table 4-18 Parameter Descriptions for Counter Selection ...................................... 4-54
Table 4-19 Parameter Descriptions for Location Selection ..................................... 4-54
Table 4-20 Descriptions for Parameters in the Counter Selection Tab ..................... 4-55
Table 4-21 Descriptions for Parameters in the Location Selection Tab..................... 4-57
Table 4-22 Parameter Descriptions for Querying Archived Data .............................. 4-58
Table 4-23 Object Selection Parameter Descriptions............................................... 4-58
Table 4-24 Time Selection Parameter Descriptions ................................................. 4-58
Table 4-25 Parameter Descriptions for Real-Time Traffic Monitoring ....................... 4-70
Table 4-26 Parameter Descriptions for Real-Time Monitoring Tasks........................ 4-72
Table 4-27 Descriptions for Parameters on the General Page ................................. 4-87
Table 5-1 Statistical Condition Parameter Descriptions ............................................. 5-2
Table 5-2 Parameter Descriptions for the Statistical Report on a Board..................... 5-4
Table 5-3 Statistical Condition Parameter Descriptions ............................................. 5-4
Table 5-4 Query Condition Parameter Descriptions................................................... 5-6
Table 5-5 Parameter Descriptions for Link Statistics Report ..................................... 5-8
Table 5-6 Statistical Condition Parameter Descriptions ............................................. 5-8
Table 5-7 CTN/SDH Port Status Parameter Description .......................................... 5-10
Table 5-8 Parameter Descriptions for the Service Data Report ............................... 5-30
Table 5-9 Operations for Exporting the Service Data Report ................................... 5-30
Table 5-10 Parameter Descriptions for Service Statistics Report ............................ 5-31
Table 5-11 Operations for Exporting the Service Statistics Report ........................... 5-32
Table 5-12 Operations for Exporting the MSTP Fiber Usage Statistics
Report.................................................................................................... 5-32
Table 5-13 Operations for Exporting the Isolated Cross Connection Data
Report.................................................................................................... 5-33
Table 5-14 Parameter Descriptions for Protection Subnet Report ........................... 5-34

IV

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Tables

Table 5-15 Operations for Exporting the Protection Subnet Report.......................... 5-35
Table 6-1 Security Management Example ................................................................. 6-7
Table 6-2 Parameter Descriptions for Creating a Role............................................. 6-11
Table 6-3 Parameter Descriptions for Creating a Role Set ...................................... 6-17
Table 6-4 Parameter Descriptions for Creating an Operation Set ............................ 6-21
Table 6-5 Parameter Descriptions for Creating a Department.................................. 6-26
Table 6-6 Parameter Descriptions of the Basic Tab ................................................ 6-29
Table 6-7 Parameter Descriptions of the Advanced Information Tab..................... 6-31
Table 7-1 Description of Parameters on the Basic Tab .............................................. 7-8
Table 7-2 Description of Advanced Query Parameters .............................................. 7-9
Table 7-3 Parameter Descriptions for File Transfer Mode Configuration ................. 7-13
Table 7-4 Parameter Descriptions on the General Tab ............................................ 7-16
Table 7-5 Parameter Descriptions on the Page Setup Tab ...................................... 7-16
Table 8-1 Parameter Descriptions for NCP Backup Configuration ............................ 8-8
Table 8-2 Parameter Descriptions for NCP Backup Configuration ............................ 8-8
Table 8-3 Parameter Descriptions for NCP Restoration Configuration ...................... 8-9
Table 9-1 Description of the Backup and Restoration Modes .................................... 9-1
Table 9-2 Backup and Restoration Items of the U31 System .................................... 9-2
Table 9-3 Backup and Restoration Items of the dbtool Tool ...................................... 9-3
Table 9-4 Backup and Restoration Items of the Offline Tool....................................... 9-3
Table 9-5 Application Scenarios for the Backup and Restoration............................... 9-3
Table 9-6 Description of Parameters for Backup and Deletion................................... 9-9
Table 9-7 Description of Parameters for Backup and Deletion................................. 9-10
Table 9-8 Description of Parameters for Backup and Deletion................................. 9-11
Table 9-9 dbtool Window Parameter Description .................................................... 9-13
Table 9-10 Dbtool Window Parameter Descriptions ................................................ 9-19
Table 11-1 Task Type - Operations Reference......................................................... 11-1

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Tables

This page intentionally left blank.

VI

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


Glossary
ADMC
- Auto Detected Manually Cleared
CPU
- Central Processing Unit
CTN
- Converged Transport Network
FTP
- File Transfer Protocol
GUI
- Graphical User Interface
IP
- Intelligent Peripheral
IP
- Internet Protocol
KPI
- Key Performance Indicator

LOS
- Loss of Signal

MIB
- Management Information Base
NE
- Network Element
OTN
- Optical Transport Network
PI
- Performance Index
QoS
- Quality of Service
RAID
- Redundant Array of Independent Disks

SDH
- Synchronous Digital Hierarchy
SMS
- Short Message Service

VII

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential


NetNumen™ U31 R22 Operation Guide (Common Operations)

SNMP
- Simple Network Management Protocol
SNR
- Subscription-Notification-Request
SPI
- Statistical Performance Index
SSH
- Secure Shell
TELNET
- Telecommunication Network Protocol
UAS
- User Agent Server
WDM
- Wavelength Division Multiplexing

VIII

SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential

Das könnte Ihnen auch gefallen