Beruflich Dokumente
Kultur Dokumente
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright © 2014 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
R5.0 2014-12-30 Updated the following contents in this manual after the
NetNumen™ U31 R22 (V12.15.10) was issued:
R4.1 2014-06-30 l Added the “Exporting All Data”, Managing the CTN Ethernet
Service Access Information Report”, “Managing the
Bandwidth Resource Statistics Report”, and “Query in the
toolbar” after the NetNumen™ U31 R22 (V12.14.10P02) was
issued.
l Updated some configuration interfaces and menu items after
the NetNumen™ U31 R22 (V12.14.10P02) was issued.
R4.0 2013-12-20 l Updated some configuration interfaces and menu items after
the NetNumen™ U31 R22 (V12.14.10) was issued.
II
III
IV
VI
VII
VIII
IX
XI
Figures............................................................................................................. I
Tables ............................................................................................................ III
Glossary .......................................................................................................VII
XII
Intended Audience
This manual is intended for:
l Planning engineers
l Monitoring personnel
l Maintenance engineers
10, System Monitoring Describes how to monitor the U31 R22 server and database.
Conventions
This manual uses the following conventions.
Italics Variables in commands. It may also refer to other related manuals and documents.
Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters, and commands.
Constant Text that you type, program codes, filenames, directory names, and function names.
width
II
1-1
Caution!
Do not start/shut down the U31 R22 server program frequently.
1-2
Prerequisite
You have installed the U31 R22 server software successfully.
Steps
1. On the desktop of the Windows operating system, select Start > All Programs >
NetNumen(TM) U31 Unified Management System > U31console. The Console
window is displayed.
1-3
When Successful. is displayed in the Operation result column, it indicates that the
U31 R22 server is successfully started, see Figure 1-2.
Note:
l The displayed processes vary with the server size that is selected during the
server software installation. For details, refer to the displayed information in the
Console window.
l The U31 R22 console automatically starts all processes, and no manual operation
is required.
l The EMS console startup file console.exe is located in the ums-server directory
under the path where the EMS is installed.
– End of Steps –
1-4
Prerequisite
Steps
1. On the desktop of the Windows operating system, select Start > Programs >
NetNumen Unified Management System > NetNumen Client. The Login dialog
box is displayed.
2. Enter User Name, Password, and Server Address in the Login window.
Caution!
In the U31 R22, the default user name is admin, and the password is null. Be sure to
modify the password of the admin user after successful login for the first time to ensure
the account security.
Note:
In the Login window, click on the right side of the server address to display
the Config Bureau dialog box. In the Config Bureau dialog box, you can configure
bureau name and the corresponding server address. The configuration information
will be displayed in the drop-down list of the Server Address to facilitate the user to
select.
3. Click OK.
– End of Steps –
1-5
Prerequisite
The U31 R22 server is operating properly.
Steps
1. On the desktop of the Windows operating system, click Start, point to Programs >
NetNumen U31 Unified Network Management System, and click U31 Client Portal.
The Login dialog box is displayed.
Caution!
For the U31 R22, the default user is admin, and the password is null. The user should
modify the password after login.
3. Click OK.
– End of Steps –
Result
After successful login, the Portal dialog box is displayed, see Figure 1-3.
1-6
Button Description
Screen lock
Log out
Exit
About
1-7
Prerequisite
You have logged in to the U31 R22 client.
Steps
1. In the Portal dialog box, click on the toolbar. The Confirm message box is
displayed.
2. Click OK.
– End of Steps –
Prerequisite
You have logged in to the U31 R22 client portal.
Steps
1. In the Portal dialog box, click on the toolbar. A Confirm message box is displayed.
Perform one of the following operations as required.
To... Do...
Save the user name and server IP address for Click the Save option button.
this login
Delete the user name and server IP address Click the Delete option button.
for this login
2. Click OK.
– End of Steps –
Prerequisite
You have logged in to the U31 R22 client portal.
Steps
1. In the Portal dialog box, click on the toolbar. A Confirm message box is displayed.
2. Click OK.
– End of Steps –
1-8
Prerequisite
You have logged in to the U31 R22 client portal.
Steps
1. Perform any of the following operations as required.
To... Do...
Open the U31 Client window In the Clients area in the NetNumen U31 Portal window, click U31
Client
Open the Fault Management In the Clients area in the NetNumen U31 Portal window, click
window Fault Management.
Open the Performance In the Clients area in the NetNumen U31 Portal window, click
Management window Performance Management.
Open the System In the Clients area in the NetNumen U31 Portal window, click
Maintenance window System Maintenance.
– End of Steps –
Steps
1. From the client main menu, select System > Preferences. The Preferences dialog
box is displayed.
2. In the Preferences navigation tree, expand the System node. To set system
parameters, refer to Table 1-1.
1-9
To... Do...
Set automatic screen lock Select Screen Lock from the system navigation tree, and then
time set parameters in the right pane.
l Enabled: select whether to enable the automatic screen lock
function.
l Idle time (minute(s)): waiting time before the automatic
screen lock, in range of 1 to 6000.
l Lock type: Lock Screen or Lock Operation (click OK to
unlock the screen). Lock Operation, or press shortcut key
<Ctrl+U> to unlock the operation.)
Set the number of messages Select Message Area from the system navigation tree, and then
displayed in the message set parameters from the right pane.
area l Set Prompt Message Count: maximum number of prompt
messages, in range of 1 to 5000.
l Set Error Message Count: maximum number of error
messages, in range of 1 to 5000.
Set the number of displayed Select Query Settings from the system navigation tree, and then
query results set parameters from the right pane.
Query results count in one page: maximum number of query
results displayed in one page, in range of 50 to 500.
This setting does not take effects on the current active alarms, but
takes effects on the history data.
Set the window record when Select Window from the system navigation tree, and then set
exiting the client terminal parameters from the right pane.
Keep the position and the size of the main window the same as
in the last logout: If you select Enabled, the position and size of
the main window in previous logout will be kept when the client
terminal is enabled.
Customize the toolbar Select Toolbar Customization from the system navigation tree.
To set parameters, refer to 1.5.7 Configuring the Toolbar.
Set the prompting time of Select Tooltip Duration from the system navigation tree, and
hiding the tool then set Number of seconds before hiding tooltip. The value
range is in 1 to 1000.
1-10
To... Do...
Configure holiday Select Holiday Setting from the system navigation tree, and then
information set parameters from the right pane.
l Add a holiday: Click Create, and then set holiday name,
begin date, end data, and year in the Create Holiday dialog
box.
l Modify a holiday: Select the holiday to be modified, and then
click Modify. Modify begin date, end date, and year in the
Modify Holiday dialog box.
l Delete a holiday: Select the holiday to be deleted, and then
click Delete. Select the year in the Delete Holiday dialog
box.
3. Click OK.
– End of Steps –
Steps
1. From the client main menu, select System > Preference. The Preference dialog box
is displayed.
2. In the Preference navigation tree, select Security > Login User , and then set the
login user parameters on the right pane.
Parameter Description
Email Address You must enter the full E-mail address. For example, test@zte.com.cn
3. Select Security > Password Protection Question Setting, and then set the
parameters.
4. Click OK.
– End of Steps –
1-11
Context
You can perform any of the following operations to close the current window.
Steps
l From the client main menu, select Window > Close Current Window.
l At the upper-right corner of the main window, click the button.
l At the upper-right corner of the main window, click the button on the right of the
button, and select Close Current Window.
– End of Steps –
Context
You can perform any of the following operations to close all Windows.
Steps
l From the client main menu, select Window > Close All Windows.
l At the upper-right corner of the main window, click the button on the right of the
button, and select Close All Windows.
– End of Steps –
Prerequisite
You have opened several application views in the client window.
Context
You can perform any of the following operations to close other windows.
1-12
Steps
l From the client main menu, select Window > Close Other Windows.
l At the upper-right corner of the main window, click the button on the right of the
button, and select Close Other Windows.
– End of Steps –
Prerequisite
Before you begin, make sure that you have logged in to U31 R22 client.
Steps
1. When the toolbar is in showing status, select Window > Tool Bar to hide the toolbar.
2. When the toolbar is in hiding status, select Window > Tool Bar to display the toolbar.
– End of Steps –
Prerequisite
You have logged in to the U31 R22 client.
Steps
1. When the status bar is in showing status, select Window > Status Bar to hide the
status bar.
2. When the status bar is in hiding status, select Window > Status Bar to display the
status bar.
– End of Steps –
1-13
you start the client again, whether the message area is displayed depends on the state of
the message area before the client was closed last time.
Prerequisite
Before you begin, make sure that you have logged in to the U31 R22 client.
Steps
1. When the message area is in showing status, select Window > Message Area to hide
the message area.
2. When the toolbar is in hiding status, select Window > Message Area to display the
message area.
– End of Steps –
Prerequisite
The toolbar is displayed.
Steps
1. Right-click the blank of the toolbar on the client terminal, and then select Toolbar
Customization. The Toolbar Customization dialog box is displayed, see Figure 1-4.
1-14
To... Do...
– End of Steps –
1-15
Steps
1. Perform one of the following operations to open the Select Lock Type dialog box.
l From the main menu, select System > Lock Screen.
l On the toolbar, click the shortcut button .
2. Select a locking type.
Parameter Description
Lock Operation The GUI will be visible but operations are disabled.
Unlock method: press <Ctrl+U>. The Unlock dialog box is displayed. Enter
the correct user name and password, and click OK.
Steps
1. Open the Confirm message box by performing one of the following operations:
l From the main menu, select System > Logout.
l On the toolbar, click .
To... Do...
Save the login user name and server IP address Click the Save option button.
Delete the login user name and server IP Click the Delete option button.
address
2. Click OK.
– End of Steps –
1-16
Steps
1. From the main menu, select System > User Password Setting. The User Password
Setting dialog box is displayed.
2. Set the new password.
Parameter Description
Old Password Enter the current password. If the current password is null, you do not need
to enter.
New Enter the new password. The new password must be different from the last
Password five passwords.
Confirm Enter the new password again to confirm. User Password must be consistent
Password with Confirm Password.
– End of Steps –
Steps
1. From the client main menu, select System > Query System Time. The Query
System Time message box is displayed.
Steps
1. You can perform any of the following operations to open the Show Message dialog
box.
l From the client main menu, select Window > Message Area.
l Double-click at the bottom-left corner of the U31 R22 client window.
1-17
Copy In the Show Message dialog box, select the The selected message is copied
Selected message to be copied, and then click . to the clipboard.
Message
– End of Steps –
1-18
Function Description
l Topology Display
The U31 R22 system displays network resources by combining the NE tree and the
topology graph. Users can manage network resources in different views.
l Topology Operations
The U31 R22 provides the following topology operations:
à Searching topology nodes
à Switching between different views
à Backing up and printing the topology graph
à Moving topology graph
à Changing the displaying structure of topology graph
à Displaying full-screen view
2-1
2-2
Note:
l To display the pane of filter, legend and display overview in the Topology
Topology Menu
The commands on the Topology menu are shown in Figure 2-2.
2-3
Button Function
2-4
Button Function
Regional Zoom: If you select a region and click this button, only
the selected area in the current window is displayed.
Back to: displays the map layer of the previous operation. This
button changes in accordance with map layer change.
2-5
Button Function
Note:
If the pane of Filter, Legend and Display Overview are not displayed in the Topology
Management window, click the button to show the pane on the right.
NE Icons
NE icons refer to the icon of devices on the topology graph, see Figure 2-4.
2-6
Point the cursor to an NE icon and a message box appears to show the statistic information
of related alarms.
Prerequisite
The new image file meets system requirements and is stored on the client.
Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Type Icon. The type icons are displayed in the
right pane.
3. In the right list, click the button after the icon to be replaced. The Open dialog box
is displayed.
4. Select a file from the Open dialog box.
Note:
The icon image file must meet the following requirements:
l The selected image file must not exceed 50 KB.
l The icon of an NE tree node must not be more than 25×25 pixels.
l The icon of a topology node must not be more than 50×50 pixels.
2-7
Context
You can customize the linearity and line width displayed on the topology map for links.
Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Link Appearance.
3. In the right pane, click the link attribution box to be modified, and select a link style
and link width as required from the drop-down list.
4. Click OK.
– End of Steps –
Prerequisite
The new image file meets system requirements and is stored on the local computer.
Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Status Icon.
3. In the right list, click the button after the icon to be replaced. The Open dialog box
is displayed.
4. Select a file from the Open dialog box.
Note:
The icon image file must meet the following requirements: The selected image file
must not exceed 50 K. The icon of an NE tree node must not be more than 25*25
pixels. The icon of a topology node must not be more than 50*50 pixels.
2-8
5. Click the Open button to return to the Customize GUI Elements dialog box.
6. Click the OK button.
– End of Steps –
Context
l RGB: indicates the parameters of red, green, and blue.
l HSB: indicates the parameters of hue, saturation, and brightness.
Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Status Color. The status colors are displayed in
the right pane.
3. Click the button in the Status Color field. The Chooser Status Color dialog box
is displayed.
Note:
4. Select the color as required, and click Preview button to view the setting. The last
chosen color is displayed in the first box under the Recent section.
Note:
The HSB and the RGB of the selected color can be adjusted on the other two tabs.
HSB and RGB settings are interrelated. Adjusting one of them will change the other.
2-9
Note:
The parameters set here affect those on the RGB tab.
Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Status Order. The Customize Status Order
page is displayed in the right pane.
3. From the Displayed Status Icon box, select icons that do not need to be displayed.
Button Function
2-10
Button Function
5. Click OK.
Note:
Click the Default button to restore default settings.
– End of Steps –
Item Description
Alarm Displays the unidentified active alarms and the number of total active
alarms. If the node has no alarm, the item is not displayed.
Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Tooltips. The Customize Tooltips page is
displayed in the right pane.
3. Select an NE type from the Type list.
2-11
4. On the Basic Information , NE PM Monitoring, and BN TOPO tab, select the tip
message to be displayed.
5. Click the OK button to finish setting.
– End of Steps –
Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Customize Alarm. The Customize Alarm page is displayed
in the right pane.
3. Select the check box before each prompting type according to the description and your
needs.
4. Click OK to finish setting.
– End of Steps –
Steps
1. From the client main menu, select Topology > Display Style Management >
Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. From the left list, select Other. The other configurations are displayed in the right
pane.
l In the NE Tree Configuration area, select the Show Status Icon check box to
show status icon.
l In the Status Bar Configuration area, select the object to be displayed on the
status bar.
l In the Topology Graph Configuration area:
à Select The Parent Node of a Layer is Visible.
à Set Label Color.
à Set Background Color.
2-12
Note:
Minimum Number of Links to be Combined indicates that the links can be combined
into one and be expanded when the number of the links between two NEs is more than
or equal to the value.
Context
Log in to the U31 R22 client, and the system opens the Topology Management window by
default. If you open another view later, perform the following steps to switch to Topology
Management window again.
Steps
1. Perform one of the following optional operations to open the Topology Management
window.
l From the client main menu, select Topology > View Topology.
l Click the button on the toolbar.
l Select Topology Management from the drop-down menu on top right.
2-13
– End of Steps –
Steps
1. From the client main menu, select Topology > Refresh Data to refresh topology data.
– End of Steps –
Result
In the message area, double-click . The Show Message dialog box is displayed,
indicating the refreshed results, see Figure 2-6.
Steps
1. From the client main menu, select Topology > Display Style Management > Export
GUI Display Style. The Save dialog box is displayed.
2-14
2. Set file path and name in Save in box and File name text box respectively.
3. Click the Save button to export all display settings to a ZIP file.
– End of Steps –
Steps
1. From the client main menu, select Topology > Display Style Management > Import
GUI Display Style. The Open dialog box is displayed.
2. Select a zip file from the Look in box.
3. Click the Open button to import the file, and the display style of the current client
changes accordingly.
– End of Steps –
Steps
1. From the client main menu, select Topology > Set Alarm Display Style > Show NE
Alarms Table. The monitoring table is displayed at the bottom of the client.
Note:
Select an NE in the topology graph or on the NE Tree, and the alarm information of
the NE is displayed on the Active Alarms.
2. Select filter conditions from the Severity, ACK State and Visibility drop-down menu
to set the monitoring information you want to see.
3. You can use the buttons on the monitoring pane to handle the monitoring information.
For the operation descriptions, refer to Table 2-3.
2-15
Exporting i. Click the button, and select Export All Columns or Export Visible
monitoring Columns. The Save dialog box is displayed.
informa-
ii. Set file path, name, and type.
tion
iii. Click the Save button, and a message box is displayed prompting suc-
cess.
Printing i. Click the button. The Print Setup dialog box is displayed.
monitoring
ii. Set printing parameters.
informa-
tion iii. Click the Print button.
At most 5000 records can be printed at a time.
Pin table Used to stop refreshing the NE monitoring table. The current page will
remain unchanged.
Customize i. Click the button. The Customize Display Columns dialog box is dis-
display played.
columns
ii. select the check boxes corresponding to the columns you want to
show on the table.
iii. Click right or left arrow to add or remove the columns, and click up or
down arrow to adjust the sequence of columns displayed on the table.
Note:
If you have edited the handling measures, click the Save button before closing the
dialog box.
7. (Optional) In the dialog box showing the details of an alarm, perform the following
operations as required.
2-16
To... Do...
View previous message Click this button to show the details of the previous alarm message
in the dialog box.
View next message Click this button to show the details of the next alarm message in
the dialog box.
Add comments i. Click the button. The Comment dialog box is displayed.
ii. Type the comments or description in the text box, and click the
OK button.
Clear contents To clear the contents of this monitoring record, click the button and
click OK button in the displayed Confirm message box.
Forward message to i. Click the button. The Forwarding Setup dialog box is displayed.
related personnel via
ii. Select the forwarding mode: E-mail, phone number, or/and SMS.
SMS, E-mail, or phone
iii. Click the OK button.
Export the current i. Click the button. The Save dialog box is displayed.
message
ii. Set file name, path, and type.
iii. Click the Save button. You will be prompted of successful export.
– End of Steps –
Steps
1. From the client main menu, select Topology > Set Alarm Display Style > Display
Important Alarms Table. The important alarm table is displayed at the bottom of the
Topology Management window.
2. Set query conditions to query the monitor information of primary alarms.
a. In the Topology Management area, click . The Set Monitor Condition dialog
box is displayed.
b. Select an NE from the Location tab in the Set Monitor Condition dialog box.
2-17
d. Click to move selected alarm code(s) to the selected box on the right.
e. Click the Time tab to set alarm generating time.
f. Click the Others tab to set other parameters.
l Alarm Type: Select the check box to select the alarm types to be queried.
l Data Type: Select the check box to select the data types to be queried.
l Severity: Select the check box to select the perceived severity to be queried.
l ACK State: Select the check box to select alarms to be queried in
corresponding acknowledgement status.
l NE IP: If you want to query the alarm of a specified NE, enter the NE IP.
l Click the Advanced button, and set advanced parameters in the displayed
Advanced dialog box.
Parameter Description
Note:
The alarm levels and confirmation status can also be set by selecting options from
the Severity and ACK State drop-down menus.
g. Click OK.
– End of Steps –
Result
The queried result is displayed in the Important Alarms Table area at the bottom of the
Topology Management window.
2-18
Steps
1. In the Topology Management window, right-click an NE, and select Topology
Management > Set Rule from the shortcut menu. The Set Rules dialog box is
displayed.
Select a rule from the following list: IP Address Rule, Device Type Rule, and
Location Rule.
2. Select rules form the Rule Type list.
3. Configure the rules as required.
Parameter Description
IP Address Rule Enter the IP address in the text box. The semicolon ";" is used to separate
multiple IP addresses. The following three formats of strings can be used:
l A singe IP address, for example, 1.2.3.4
l An IP address ranges from a smaller address to a larger one connected
with "-", for example, 10.10.1.5–10.10.2.6
l IP address with "*" used at head or end to substitute for multiple
characters
Location Rule Enter the location in the text box. The semicolon ";" is used to separate
multiple locations.
l The asterisk "*" can replace any characters, and the question mask "?"
only replaces one character.
l The asterisk "*” is represented by "\*" , and the question mask "?" is
represented by "\?".
2-19
Parameter Description
à The asterisk "*" can replace any characters, and the question mask
"?" only replaces one character.
à The asterisk "*” is represented by "\*" , and the question mask "?" is
represented by "\?".
4. Click Save.
Note:
The objects created before the rule is enabled are not affected by the rule.
– End of Steps –
Steps
1. In the Topology Management window, right-click a node, and select Topology
Management > Set Member from the shortcut menu. The Set Member dialog box is
displayed.
2. In the Set Member dialog box, select an NE from the Available Items list, and click
the Add button to add the NE to the Selected Items list.
3. (Optional) Repeat step 2 to add multiple NEs.
4. Click OK.
– End of Steps –
Steps
1. In the Topology Management window, right-click a node, and select Topology
Management > Move Node from the shortcut menu. The Move Node dialog box is
displayed.
2-20
Steps
1. You can use any of the following methods to display the Statistical Information dialog
box.
l In the Topology Management window, right-click a node, and select Topology
Management > Show Statistical Information from the shortcut menu. The
Statistical Information dialog box is displayed.
l In the Topology Management window, right-click a node in the NE Tree list.
Select Topology Management > Show Statistical Information. The Statistical
Information dialog box is displayed.
l From the main menu, select Topology > Show Topology Statistics. The
Statistical Information dialog box is displayed.
2. View the number of NEs, connected NEs, disconnected NE, and offline NEs
3. (Optional) Click Export to export the statistical information.
The formats of exported files include txt, htm, pdf, xls, csv, prn, xlsx, and xml.
– End of Steps –
Steps
1. In the Topology Management window, right-click an NE, and select Fault
Management from the shortcut menu. The system displays the corresponding alarm
window of the NE.
– End of Steps –
2-21
Steps
1. In the Topology Management window, right-click an NE, and select Performance
Management from the shortcut menu. The system displays the corresponding
performance management window of the NE.
– End of Steps –
Steps
1. In the NE tree or topology graph, suspend the mouse on the NE for seconds. The
alarm information will be displayed automatically.
– End of Steps –
On the NE tree, you can query the corresponding nodes in one of the following ways. For
the differences between the three ways, refer to Table 2-5. The detailed operation of each
way is described in the following chapters.
2-22
Filter Only the NEs or groups whose names include "filtering condition" are displayed
on the NE tree.
Find NEs or groups whose names include "search condition" are highlighted on the
NE tree or in the topology view. You can click Find Next to locate other NEs or
groups meet the "search condition".
Filter by Resource Only the NEs meet the resource type displayed on the NE tree.
Type
In addition, you can perform the operations the same as the above through the right-click
menu on the node of the NE tree.
Prerequisite
You have learned of the related information of the NE node that you want to search.
Steps
1. Enter a keyword in the text box under the NE Tree tab, such as the name, see Figure
2-8.
Steps
1. On the right of the NE tree text box, click , and then click . The Find
dialog box is displayed.
2-23
2. Enter the querying condition, for example, the name of the NE or group.
3. Click Find Next to locate another NE or group.
– End of Steps –
Steps
1. On the right of the NE tree text box, click , and then click
. The Filter by Resource Type dialog box is displayed.
2. In the Resource Type tree, select the NE type to be filtered.
3. Click OK. Only NEs that meet the querying condition are displayed in the NE tree and
topology view.
– End of Steps –
2-24
Operations on the topology layer are described in the next few topics.
Prerequisite
The current layer is under a parent-node layer.
Steps
1. On the topology graph, right-click the blank, and select To Upper Layer from the
shortcut menu.
– End of Steps –
2-25
Prerequisite
The current node has at least one child node.
Steps
1. Expand a node: Right-click a node to be expanded on topology graph, and select
Topology Management > Show Node's Sublayer from the shortcut menu.
2. Collapse a node: Right-click a node to be collapsed on topology graph, and select
Topology Management > Hide Node's Sublayer from the shortcut menu.
– End of Steps –
Prerequisite
The current layer has at least one child-node layer.
Context
On the current map layer, you can expand all parent nodes and collapse all expanded
nodes.
l Expanding all nodes: to expand all parent nodes on the current layer and display all
their child nodes in one layer.
l Collapsing all nodes: to collapse all the expanded nodes.
Steps
1. Expanding all nodes: Right-click the blank of the topology graph, and select Show
Sublayer from the shortcut menu. All sub-layers are then shown on the current layer.
2. Collapsing all nodes: Right-click the blank of the topology graph, and select Hide
Sublayer from the shortcut menu. All expanded sub-nodes are then hidden, with all
their parent nodes being displayed.
– End of Steps –
Prerequisite
The current node has sub-nodes.
2-26
Steps
1. On the topology view, right-click a parent node, and select Topology Management >
To Lower Layer from the shortcut menu.
The topology information of the lower layer is displayed in the topology view.
– End of Steps –
For the description about buttons, refer to 2.2 Topology Management Window. The
common functions that use buttons are described below.
1. To lock NEs on the topology graph, click to lock NEs on the topology graph.
2. To unlock NEs on the topology graph, click .
1. Click the button on the toolbar. The Network Layout dialog box is displayed.
2. Select a layout type from the Layout Strategy list.
Note:
For a layout type, refer to the layout example in the Sample pane.
2-27
l Hierarchical Layout
l Tree Layout
l Radial Tree Layout
l Spring Embedded Layout
l Uniform Length Edges Layout
3. Click OK.
1. Click the button. The list of nodes you have viewed is displayed, see Figure 2-11.
Note:
l A table is displayed below the topology graph to show the search result.
l If no matching nodes are found, the Confirm message box is displayed, informing
you about the result.
2-28
Note:
You can click the button to exit full-screen display.
2-29
l If the topology information is listed in the table, the Customize Display Columns
dialog box is displayed.
l If the topology information is displayed on the topology graph, the Configure
Display Content dialog box is displayed.
2. Select the contents you want to display.
3. Click OK.
In the Topology window, click in the toolbar. The Legend tab is displayed in the right
pane.
l Click Filter below the Legend tab. The Filter dialog box is displayed.
l Click Configuration Display Content below the Legend tab. The Configure Display
Content dialog box is displayed. You can customize the contents to be displayed in
the Topology Management window.
Prerequisite
The legend page is displayed in the topology management view.
Steps
1. In the right pane of the Topology Management window, click the Filter link. The Filter
dialog box is displayed.
The Filter dialog box has two sub-pages, of which the Filter Tree is displayed by
default.
Note:
If the pane of Filter, Legend and Display Overview is not displayed in the Topology
Management window, click the button to show the pane on the right.
2-30
3. Select the check box before the nodes you want to display. The checked nodes are
displayed on the topology graph.
4. Click OK. The selected NEs are displayed on the topology graph.
– End of Steps –
Prerequisite
The legend page is displayed in the topology management view.
Steps
1. In the right pane of the Topology Management window, click the Filter link. The Filter
dialog box is displayed.
Note:
If the pane of Filter, Legend and Display Overview is not displayed in the Topology
Management window, click the button to show the pane on the right.
2. Click the Condition Filter optional button in the Filter dialog box.
3. Select a filtering method.
l Or: The NEs or Groups meeting one of the conditions will be displayed after
filtering.
l And: Only the NEs or Groups meeting both conditions will be displayed after
filtering.
4. Enter the filter condition in the NE(Group) Name and IP address text boxes.
2-31
Note:
You can also use the following wild cards: "?" represents one character, while "*"
represents two characters.
Use ";" to separate more than one IP addresses. You can enter three types of IP
address:
l A single IP address, for example, 1.2.3.4.
l An IP address range from a smaller address to a larger one connected with "-",
for example, 10.197.0.0-10.197.255.255.
l IP address with "*" used at head or end to substitute for multiple characters, for
example, *.10.10.10 and 10.197.10.*.
6. Click the OK button to display the nodes that meet the filter conditions on the topology
graph.
– End of Steps –
Context
l The system provides a default map as the background of the topology graph.
l The imported map file should be less than 1 MB, and in .gif or .jpg format.
Steps
1. Right-click the blank of the topology graph, and select Configure Map from the
shortcut menu. The Configure Map dialog box is displayed.
2. Click the Import... button in the File Setting group box to select a map file.
To... Do...
3. Set the horizontal and vertical coordinates in the Map Range group box.
2-32
Note:
You can only set the range for the imported map.
4. Click OK to save the settings. The imported map will be displayed as the background
of the topology graph.
– End of Steps –
Steps
1. Right-click any blank area in the Topology Management window, and select Create
Object > Virtual NE from the shortcut menu. The Create Virtual NE dialog box is
displayed.
2. Set the parameters in the Create Virtual NE dialog box.
Parameter Description
Parent Node By default, it is the parent node you selected from the shortcut menu. You can
select another parent node by clicking Select.
2-33
Parameter Description
Successively l To select the check box: After a virtual NE is created, the Create Virtual
Create NE dialog box is automatically displayed, and you can continue to create a
more virtual NE.
l To clear the check box: After a virtual NE is created, the Create Virtual NE
dialog box is not displayed.
3. Click OK.
The virtual NE is created successfully, and displayed in the NE tree and topology view.
– End of Steps –
Prerequisite
The virtual NE is created.
Steps
1. In the NE tree or on the topology graph, right-click the virtual NE to be modified, and
select Topology Management > Modify Virtual NE from the shortcut menu. The
Modify Virtual NE dialog box is displayed.
2. Modify the corresponding attributes.
3. Click OK.
– End of Steps –
Prerequisite
The virtual NE is created.
Steps
1. In the NE tree or on the topology graph, right-click a virtual NE, and select Topology
Management > Delete Virtual NE from the shortcut menu. The Confirm message
box is displayed.
2. Click Yes.
– End of Steps –
2-34
Prerequisite
The virtual NE is created.
Steps
1. In the NE tree or on the topology graph, right-click a virtual NE, and select Topology
Management > View Virtual NE from the shortcut menu. The View Virtual NE dialog
box is displayed.
Note:
To view the virtual NE attributes, you can also display the topology information in table.
– End of Steps –
Steps
1. Use any of the following methods to display the Create Virtual Link dialog box.
l Right-click the blank area in the Topology Management window, and then select
Create Object > Virtual Link from the shortcut menu. The Create Virtual Link
dialog box is displayed.
l Use the mouse pointer to select a rectangle covering two NEs in the topology.
Right-click either of the two NEs. Select Create Object > Virtual Link.
l Select an NE from the NE Tree or in the topology. Press Ctrl or Shift without
releasing the key, and select anther NE. Release the key and then right-click either
of the two NEs. Select Create Object > Virtual Link.
2-35
Note:
You can also open the Create Virtual Link dialog box in one of the following ways.
l Press the left mouse button and draw a rectangle on the topology graph to select
two NEs. Then right-click either NE, and select Create Virtual Link from the
shortcut menu.
l On the NE tree or the topology graph, click to select one NE, and press Ctrl (or
Shift) while clicking to select another NE. Next, right-click either NE, and select
Create Virtual Link from the shortcut menu.
Parameter Description
Source Starting NE of the virtual link. Click Source. Select a Node from the Select
Node Node dialog box.
Target Ending NE of the virtual link. Click Target. Select a Node from the Select Node
Node dialog box.
Succes- l To select the check box: After a virtual link is created, the Create Virtual
sively Cre- Link dialog box is automatically displayed, and you can continue to create a
ate more virtual link.
l To clear the check box: After a virtual NE is created, the Create Virtual Link
dialog box is not displayed.
3. Click OK.
– End of Steps –
Prerequisite
The virtual link is created.
2-36
Steps
1. In the NE tree or on the topology graph, right-click the virtual link to be modified, and
select Topology Management > Modify Virtual Link from the shortcut menu. The
Modify Virtual Link dialog box is displayed.
2. Modify the corresponding attributes.
3. Click OK.
– End of Steps –
Prerequisite
The virtual link is created.
Steps
1. In the NE tree or on the topology graph, right-click a virtual NE, and select Topology
Management > Delete Virtual Link from the shortcut menu. The Confirm message
box is displayed.
2. Click Yes.
– End of Steps –
Prerequisite
The virtual link is created.
Steps
1. On the NE tree or the topology graph, right-click a virtual NE, and select Topology
Management > View Virtual Link from the shortcut menu. The View Virtual Link
dialog box is displayed.
Note:
To view the virtual link attributes, you can also display the topology information in table.
– End of Steps –
2-37
Prerequisite
You have the user permissions of "Maintenance Role" or above.
Steps
1. Right-click a blank area in the Topology Management window, and select Create
Object > Common Group. The Create Common Group dialog box is displayed.
2. Set the attributes of the common group referring to the following table.
Parameter Description
Parent Node Click Select and select a node (other group or NE) where you want to create
a group.
Name Enter the group ID. Common groups under one parent node cannot have the
same name.
2-38
Note:
If the Successively Create check box is selected, after a common group is created,
the Create Common Group dialog box is displayed automatically to create another
common group.
3. Click OK.
– End of Steps –
Result
In the left NE Tree in the Topology Management window, the new group is displayed
under the selected parent node.
Prerequisite
You have the user permissions of "Maintenance Role" or above.
Context
The type groups cannot have the same name under the same parent node.
Steps
1. Right-click a blank area in the Topology Management window, and select Create
Object > Type Group from the menu. The Create Type Group dialog box is displayed.
2. Click the Select... button. The Select Node dialog box is displayed.
3. Select the parent node of the new group, and then click OK.
Note:
The parent node here can be other groups or NEs.
2-39
To... Do...
Create a batch of
i. Click the Create a Batch of Groups tab.
groups
ii. Select all the device types to be grouped.
Groups of all selected device types are created and all groups are located
under the selected parent node.
Create a single
i. Click the Create a single group tab
group
ii. Enter the group name and group description.
The writing specifications vary with rule types, and you should enter the rule
based on a message.
The rules for the type groups include No Rule, IP Address Rule, Location
Rule, and Device Type Rule. All writing specifications are given in the bottom
of the dialog box.
The new single group is displayed under the selected parent node.
– End of Steps –
Prerequisite
You have the user permissions of "Maintenance Role" or above.
Steps
1. Right-click a blank area in the Topology Management window, and select Create
Object > Location Group from the menu. The Create Location Group dialog box is
displayed.
2-40
Note:
The parent node here can be other groups or NEs.
Note:
l The writing specifications vary with rule types, and you should enter the rule based
on the message.
l The rules for the location groups include No Rule/IP Address Rule/Location
Rule/Device Type Rule. All writing specifications are given in the bottom of the
dialog box.
l If Successively Create is selected, the Create Location Group dialog box is
automatically displayed after a location group is created, and you can continue to
create a more location group.
6. Click OK.
The new location group is displayed under the selected parent node.
– End of Steps –
Prerequisite
You have the user permissions of "Maintenance Role" or above.
Steps
1. In the Topology Management window, select an NE or a group in the object tree in
the left pane.
2. Right-click an NE or a group, and select Topology Management > Set Member from
the shortcut menu. The Set Member dialog box is displayed.
2-41
To... Do...
Add a member
Only an NE but not a group can be added as a member.
i. Select an NE from the Available Items pane, and click to move the
selected NE to the Selected Items pane.
Delete a
member i. Select an NE from the Selected Items pane, and click to move the selected
NE to the Available Items pane.
– End of Steps –
Prerequisite
The group is created.
Context
This section takes deleting a type group as an example. Other groups can also be deleted
in the similar way.
Steps
1. In the NE tree or on the topology graph, right-click a group, and select Topology
Management > Delete Type Group from the shortcut menu. The Confirm message
box is displayed.
Note:
The shortcut menus vary with the types of objects.
– End of Steps –
2-42
Prerequisite
The group is created.
Context
This section takes viewing a type group as an example. Other groups can also be viewed
in the similar way.
Steps
1. In the NE tree or on the topology graph, right-click a group, and select Topology
Management > View Type Group. The View Group dialog box is displayed.
Note:
The shortcut menus vary with the types of objects.
To view the group attributes, you can also display the topology information in table.
For this operation, see "Showing the Topology Information in Table" in the chapter
"Operations on Topology Graph".
– End of Steps –
2-43
2-44
3.1 Overview
Alarm information is displayed if a fault or prompt message occurs during system
operation. The fault management module monitors the operational status of the U31
R22 system in a centralized manner, and collects real-time alarms and notifications of
boards, databases, and the server. If a fault occurs, the module immediately displays
the accurate fault information to help the administrator locate and troubleshoot the fault
for stable operation of the system.
If a fault occurs, the module immediately displays the accurate fault information to help
the administrator locate and troubleshoot the fault for stable operation of the system.
In addition, the module also provides accurate, timely, and necessary alarm data for
operators, network management departments, and vendors.
Alarm
An alarm is a prompt message indicating faults that occur during the system operation and
have negative effects on the system service and reliability.
3-1
This kind of faults may impact the proper system operation. Therefore, once it occurs, the
user must immediately find out the cause and troubleshoot it.
Notification
Notification is reported when a fault or event that cannot be recovered occurs in the
network, such as the restart of a board and the fake power failure of a board.
Such faults or events are generally caused by some occasional factors, such as the sudden
change of the environment. Therefore, no special handling is required for notifications.
However, if a notification is displayed frequently, it is required to find out the cause and
troubleshoot it.
Active alarm
An active alarm indicates the occurrence of a fault that has not been removed yet.
History Alarm
A history alarm indicates the occurrence of a fault that has already been removed.
Alarm Clearing
A notification that an alarm has been cleared is reported after the corresponding fault is
successfully removed.
Alarm Shielding
The alarms are not reported to the NMS server in accordance with customized conditions.
Alarm Code
An alarm code is a unique sequence number used to identify an alarm for fault
management.
3-2
Main Menu
Main menu provides menus for configuring system attributes, including topology
management, fault management, performance management, and help.
Toolbar
Toolbar provides buttons for carrying out common sub-functions of each module. Fault
management module contains the following buttons:
3-3
Management tree organizes all the fault management functions in the form of a tree. The
nodes under the tree root indicate corresponding functions. The user can perform alarm
query operations and related settings easily by using Management tree.
NE Tree organizes NEs in the form of a tree. The nodes under the tree root indicate
different functional units of the NEs. Adjacent nodes under the tree are in parallel or
hierarchical relationship. NE tree demonstrates the real physical relationships among the
functional units of each managed NE.
3-4
Status Bar
The status bar shows the information of the current login user and the server.
By Data Types
l Common alarm
l Status event
l Common event
l Network Management alarm
l Network Management event
3-5
l Threshold alarm
l Pre–warning alarm
l Switch event
By Acknowledged Status
l Acknowledged
l Unacknowledged
When an alarm occurs, solve the problem in accordance with this manual. If the problem
persists, inform the local ZTE office.
Flow
General flow of removing alarms is described as follows.
1. Identify the alarm code, severity level, description, and components involved.
2. Analyze the causes of alarms and the effects on the system.
3. Perform appropriate handling measures to troubleshoot the alarms based on the
information gathered in steps 1 and 2.
4. Check the result of the handling operation.
3-6
Steps
1. On the U31 R22 server, select Start > Program > NetNumen U31 Unified Network
Management System > U31 Config Center. The NetNumen U31 Unified Network
Management System-Configuration Center window is displayed.
2. In the left navigation tree, select Common Configuration > Common Property.
3. On the server tab on the right, select Server > Global Configuration > Alarm.
4. Select Fault Management: The severity name of major alarm, and then enter the
name in Value of config.
5. Repeat step 4 to set the name of another alarm severity level.
6. Click the Save button, and then click the OK button in the displayed dialog box.
– End of Steps –
Steps
1. On the U31 R22 server, select Start > Program > NetNumen(TM) U31 Unified
Network Management System > U31 Config Center. The NetNumen U31 Unified
Network Management System-Configuration Center window is displayed.
2. In the left navigation tree, select Common Configuration > Common Property.
3. On the server tab on the right, select Server > Global Configuration > Alarm.
4. Select To select the default sort mode for the alarm tables, and then select the sort
mode in Value of config.
l 1: sort by the time of alarm occurrence.
l 0: sort by the default system policy.
5. Click the Save button, and then click the OK button in the displayed dialog box.
– End of Steps –
3-7
Prerequisite
Sound files required already exist. The .aif, .au, .mid, and .wav formats are supported.
Context
You can set alarm colors and sounds through the following operation. To set whether
flashing and sound are required when the alarm occurs, refer to "Setting the Alarm Flash
and Sound". To set the range in which the alarm prompt takes effect, refer to "Setting the
Alarm Prompt".
Steps
1. From the main menu, select System > Preference. The Preference dialog box is
displayed.
2. In the Preference navigation tree on the left, select Fault > Alarm Sound and Color.
The Sound Setting and Color Setting tabs are displayed on the right.
3. Set alarm sounds.
a. On the Sound Setting tab, click Choose... to select different sound files for alarms
of different alarm levels.
b. Click Play to play the selected sound file.
Note:
To set the alarm sound to mute, select Mute after the corresponding alarm level.
c. In the Sound Model area, select Sound According to the Highest Severity of
Unacknowledged Alarms or Sound When Alarm Messages Are Received.
d. (Optional) To set the sound when the alarm is cleared, select Sound When
Alarms Are Restored.
e. (Optional) To recover the default alarm sound setting, click Restore Default
Sound.
4. Set alarm colors.
a. Click the Color Setting tab.
b. Click the drop-down lists next to the different alarm levels, and then select the
different alarm colors.
3-8
5. Click OK.
6. (Optional) To recover the default alarm colors, click Restore Default Color.
– End of Steps –
Prerequisite
The user has the operation authority of alarm management.
Steps
1. From the main menu, select Fault > Alarm Panel. The Alarm Panel dialog box is
displayed, see Figure 3-6.
2. Click Flash to set whether the alarm panel flashes when an alarm is generated.
l : It indicates that the alarm panel flashes when an alarm is
generated.
l : It indicates that the alarm panel does not flash when an alarm is
generated.
3. Click Sound to set whether the alarm panel makes a sound when an alarm is
generated.
l : It indicates that the alarm panel makes a sound when an alarm is
generated.
3-9
l : It indicates that the alarm panel does not make a sound when an
alarm is generated.
4. Click to close the Alarm Panel dialog box.
– End of Steps –
Prerequisite
You have the operation permission of alarm management.
Steps
1. From the main menu, select Fault > Setting > Alarm Prompting Setting. The Alarm
Prompting Setting window is displayed.
BN-xTN EMS Alarm Prompt Default Rule is displayed in the Alarm Prompting
Setting window.
2. (Optional) Check the EMS alarm prompting default rule.
a. Double-click BN-xTN EMS Alarm Prompt Default Rule. The Alarm Prompting
Setting dialog box is displayed.
b. Click the Alarm Code tab in Condition, and check the prompting rule of the EMS
default alarm code.
c. Click OK.
Parameter Description
Rule status Select the state after the alarm prompt is created.
l Activated: This alarm prompt takes effect immediately.
l Suspended: This alarm prompt does not take effect immediately until
this alarm is activated manually.
3-10
Parameter Description
Note:
After Notify by Sound is selected, if the alarm meeting the condition is generated,
only the specified sound is played for prompt. The system will not play the sound.
5. Click the Condition tab. Set the alarm information such as locations and alarm types.
a. Click the Location tab, and then select NEs on which alarms are generated. When
alarms are generated on the specified NEs, the system will give prompts.
l From the NE Type list, select an NE type.
l Perform one of the following operations as required.
To... Do...
Display alarm prompts for Click the All NEs option button.
all NEs
Display alarm prompts for Click the Specific NEs option button. Select the NEs to
specified NEs
be set, and then click or to move the selected
NEs to the right list. Prompts will be displayed only for
alarms generated on the NEs selected.
b. Click the Alarm Code tab, and then select the alarms. If the alarm selected is
generated on the NE selected, the system gives a prompt.
l All Codes: When All Codes is generated, if any alarm is generated on the
NE, the system gives a prompt.
l Specific Codes: After selecting Specific Codes, select the alarms, and then
click to move the selected alarm codes into the area selected. Only the
selected alarm is generated on the NE, the system gives a prompt.
c. Click the Others tab, and then select the alarm type, data type, alarm level,
acknowledge status, NE IP, and additional text.
6. Click OK.
– End of Steps –
3-11
Prerequisite
You have the operation permission of alarm management.
Context
If the number of times that the same alarm occurs reaches a threshold in a specified time,
these alarms are called intermittent alarms.
Intermittent alarms are integrated to a root alarm which has the highest alarm level among
all correlated alarms. Only this root alarm is displayed on the U31 R22. You can view all
the correlated alarms through this root alarm.
Steps
1. In the operation window of the U31 R22, select Fault > Setting > Intermittent Alarm
Setting. The Intermittent Alarm Setting window is displayed, see Figure 3-7.
2. Click the button on the toolbar. The Intermittent Alarm Setting dialog box is
displayed, see Figure 3-8.
3-12
3. Set intermittent alarms. For a description of the parameters, refer to Table 3-2.
Parameter Description
Discard the correlated If this check box is selected, the correlated alarms are discarded.
alarms cleared during the If intermittent alarms are integrated to a root alarm, other
intermittence correlated alarms are displayed on the U31 R22. You can delete
these correlated alarms from the NMS database as required.
3-13
a. Click the Set alarms to be processed button. The Set alarms to be processed
dialog box is displayed.
b. On the Location tab, select the NE type to be queried.
By default, all NE types are selected.
c. On the Alarm Code tab, select the alarm code to be queried.
By default, all alarm codes are selected.
d. On the Others tab, set Raised Time, Alarm Type, Severity, NE IP, and
Remark(Fuzzy Match) of the intermittent alarms.
e. Click OK to return to the Intermittent Alarm Setting dialog box.
5. Click OK.
6. (Optional) View correlated alarms through the root alarm displayed on the U31 R22.
a. In the operation window of the U31 R22, select Fault > Alarm Monitoring. The
Alarm Monitoring window is displayed, see Figure 3-9.
In the Root Alarm Indicator column, the alarms marked with + and Root Alarm
are root alarms.
b. Select a root alarm, and click the + icon. The Roort-Correlated Alarm
Relationship Tree dialog box is displayed.
The correlated alarms of this root alarm are displayed in the dialog box.
c. Select the Display All Alarms check box to view all the deleted correlated alarms.
– End of Steps –
3-14
Related Tasks
l Refreshing Intermittent Alarms
On the toolbar of the Intermittent Alarm Setting window, click the button.
l Modifying Intermittent Alarms
In the Intermittent Alarm Setting window, use either of the following methods to
modify intermittent alarms:
à Select an intermittent alarm configuration item, and click the button on the
toolbar.
à Right-click an intermittent alarm configuration item, and select Modify from the
shortcut menu.
l Suspending Intermittent Alarms
Note:
Intermittent alarms can be suspended only if the status of intermittent alarms is set to
Activated.
In the Intermittent Alarm Setting window, use either of the following methods to
suspend intermittent alarms:
à Select an intermittent alarm configuration item, and click the button on the
toolbar.
à Right-click an intermittent alarm configuration item, and select Suspend from the
shortcut menu.
l Activating Intermittent Alarms
Note:
Intermittent alarms can be activated only if the status of intermittent alarms is set to
Suspended.
In the Intermittent Alarm Setting window, use either of the following methods to
activate intermittent alarms:
à Select an intermittent alarm configuration item, and click the button on the
toolbar.
à Right-click an intermittent alarm configuration item, and select Activate from the
shortcut menu.
3-15
Note:
Intermittent alarms can be deleted only if the status of intermittent alarms is set to
Suspended.
In the Intermittent Alarm Setting window, use either of the following methods to
delete intermittent alarms:
à Select an intermittent alarm configuration item, and click the button on the
toolbar.
à Right-click an intermittent alarm configuration item, and select Delete from the
shortcut menu.
Steps
1. From the main menu, select Fault > Setting > Alarm Code Description Setting. The
Alarm Code Description Setting window is displayed.
2. From the Code Group list, select a resource type, and click OK. The alarm codes of
the selected resource type are displayed in the list.
3. Perform one of the following operations to open the User Defined Alarm Code Setup
dialog box.
l Double-click the alarm you want to redefine.
l Click the alarm to be redefined, and click the button.
l Right-click the alarm code to be redefined, and select Modify from the shortcut
menu.
4. Enter the new code name.
– End of Steps –
3-16
Context
l Tandem: The alarm signal output port of the NE is cascaded to that of another NE to
output the alarm signals of the NE. If the cascading mode is used, cascading cables
should be installed.
l Non tandem: The signal ports between NEs are not cascaded.
Steps
1. In the Topology Management window, right-click an NE, and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the NE Operation navigation tree, select Alarm Configuration > External Alarm
Tandem Configuration. The External Alarm Tandem Configuration area is
displayed.
3. In the Tandem Mode column, select a board tandem mode as required.
4. Click the Apply button, and click OK in a displayed message box.
– End of Steps –
Prerequisite
The user has the operation authority of alarm management.
Steps
1. From the main menu, select Fault > Setting > Severity Regarding Setting. The
Severity Regarding Setting window is displayed.
2. In the Code Group list, select a group. The alarms belonging to this group will be
automatically listed in the Severity Regarding Setting window.
3. (Optional) Add resources for an alarm code.
a. Right-click an alarm code. Select New. In the displayed dialog box, select the
resources (NE or NE types) that you want to add.
b. Click OK. The Severity Regarding Setting window is displayed. You can view
the newly added resources under the alarm code.
4. Click the alarm entry whose alarm level is to be redefined. In the Custom Severity
list box, select the target alarm level.
After the target alarm level is selected, the red exclamation mark is displayed in Modify
Flag, see Figure 3-10.
3-17
Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration >
Alarm Mask Configuration. The Alarm Mask Configuration area is displayed.
3. On the Mask By Resource tab, expand all alarms contained by the boards configured
in the NE to set the Mask Status for alarms.
l Select Mask Status: The alarm is masked.
l Clear Mask Status: The alarm is not masked.
4. Click Apply. A message box is displayed.
5. Click OK.
The alarms whose Mask Status is selected will not be detected. The blocked alarms
will not be displayed in the current alarm window and not be counted in the alarm
board.
– End of Steps –
Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the Customized Resource tree in the left pane, select a board.
3-18
3. In the navigation tree in the left pane, select Board Operation > Alarm Configuration
> Alarm Mask Configuration. The Alarm Mask Configuration area is displayed.
4. On the Mask By Resource tab, expand all alarms contained by the board to set the
Mask Status for alarms.
l Select Mask Status: The alarm is masked.
l Clear Mask Status: The alarm is not masked.
5. Click Apply. A message box is displayed.
6. Click OK.
The alarms whose Mask Status is selected will not be reported to the main control
board of the NE or to the NMS. The blocked alarms will not be displayed in the current
alarm window and not be counted in the alarm board.
– End of Steps –
Context
Alarm preload is only applicable to the LOS alarm. For three modes of alarm preload, refer
to table below.
Reverse The alarm status of the alarm source is You can set unused ports to Reverse
Preload the opposite of the actual alarm. Preload. When these ports are used
again, you can set them to Auto
Recover Preload or Non Preload.
Auto Recover The alarm state of the port without l When there is an LOS alarm, the
Preload service loaded is not reported to the "loss of input signal" alarm is not
EMS. After service is loaded on the port, generated.
the alarm state will be reported to the l After the LOS alarm is removed, the
system. port recovers to normal state and
alarm preload can be cleared.
For example, when no service is loaded on the port of a service board, the "loss of input
signal" alarm is generated for the port.
1. The alarm of the port is set to reverse preload mode, and the alarm is removed.
2. Service is loaded to the port, and the port generates an alarm. The alarms of the port
on the EMS and NE are inconsistent.
3-19
3. The alarm of the port is set to non preload mode, and the alarm is removed. The
alarms on the EMS and NE are consistent.
Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. Perform one of the following operations to open the Alarm Preload Configuration
window.
l In the NE Operation navigation tree in the left pane, select Alarm Configuration
> Alarm Preload Configuration.
l In the Topology Management window, double-click an NE, right-click a board
in the Rack Chart window, and select Alarm Preload Configuration from the
shortcut menu.
l In the Customized Resource navigation tree in the NE Management window,
select a board, and select Alarm Configuration > Alarm Preload Configuration
from the Board Operation navigation tree.
3. Select a board from the Select Board list.
4. Set the Alarm Preload mode for the port: Auto Recover Preload, Reverse Preload,
or None Preload.
You can set alarm preload in batches, that is, you can select multiple ports, and then
right-click and select an alarm preload mode from the shortcut menu, see Figure 3-11.
Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
3-20
2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration
> Alarm Severity Configuration. The Alarm Severity Configuration area is
displayed.
The right pane displays the alarm events supported by the NE.
3. Perform one of the following operations to set the alarm severity:
l Select an alarm, and then click Alarm Severity to set its alarm severity to critical,
major, minor, or warning.
l Click Import to import an existed template.
l Select one or multiple alarms, and then right-click and select an alarm severity
from the shortcut menu.
4. Perform the following operations as required.
To... Do...
6. Click OK.
– End of Steps –
Prerequisite
You have the operation right for alarm management.
3-21
Steps
1. In the operation window of the U31 R22, select Alarm > Alarm Monitoring. The
Alarm Monitoring window is displayed.
2. Right-click the desired alarm, to which you must pay special attention. Select
Specified Alarms Monitoring from the shortcut menu. The Specified Alarms
Monitoring window is displayed, see Figure 3-12.
In the U31, you can press Shift + Ctrl to concurrently select multiple alarms. In the
Specified Alarms Monitoring window, you can pay special attention to these alarms.
l Click the button, select Export All Columns or Export Visible Columns,
and export the current alarms to a specified folder for saving purposes.
l Click the button to print the current alarms in paper.
l Click the button to update the current alarms in real-time and capture the latest
alarm information.
l Click the button. The Customize Display Columns dialog box is displayed.
You can customize the columns to be displayed as required.
– End of Steps –
3-22
When an event is converted into an ADMC alarm, it is displayed as an active alarm for ease
of query. The U31 allows you to configure automatic recovery rules for an ADMC alarm.
After an ADMC alarm is received for some time, you can configure it to be automatically
or manually cleared in the U31.
Prerequisite
You have the operation right for alarm management.
Steps
1. Select Fault > Setting > BN-xCTN Event Transforms to ADMC Alarm from the menu
bar. The BN-xCTN Event Transforms to ADMC Alarm dialog box is displayed, see
Figure 3-13.
The left Selectable Event pane allows you to query them as historical alarms. The
right ADMC Transformed Event pane allows you to query them as active alarms.
2. In the left Selectable event navigation tree, select the desired event, and then click
3. Click the OK button. The procedure for configuring ADMC alarms is complete.
– End of Steps –
3-23
Context
l Alarm Raise Ack Time: Indicates the time after which a generated alarm is regarded
as generated.
l Alarm Clear Ack Time: Indicates the time after which a cleared alarm is regarded as
cleared.
Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management dialog box is displayed.
2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration
> Alarm Parameter Configuration. The Alarm Parameter Configuration area is
displayed.
3. Set whether the UAS is used for alarm filtering from the UAS filtering type list.
4. Select a time value from the Alarm Raise Ack Time list.
5. Select a time value from the Alarm Clear Ack Time list.
6. Click Apply. A message box is displayed.
7. Click OK.
– End of Steps –
Prerequisite
You have installed and configured the sensors used for reporting the environmental
alarms, such as temperature/humidity of equipment room, door opening/closing, fire
alarm, ventilation, or cooling system on the NE.
Context
Parameters may vary with different types of NEs.
Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
3-24
2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration
> External Alarm Configuration. The External Alarm Configuration area is
displayed.
The right pane will display all the external alarms that can be configured.
Note:
The quantity of the external alarms supported by the NMS is determined by the product
model. Refer to the corresponding product manuals for details.
On (High Voltage Alarm) Reports an alarm when receiving external alarm signals
(high voltage)
Off (Low Voltage Alarm) Reports an alarm when receiving no external alarm signals
(low voltage)
– End of Steps –
Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration >
Alarm Audibility and Visibility Configuration. The Alarm Audibility and Visibility
Configuration area is displayed.
5. Click OK.
– End of Steps –
3-25
Context
l This function is applicable to the SDH series NEs, such as ZXMP S150, ZXMP S200,
ZXMP S325, ZXMP S330, ZXMP S380, ZXMP S385, ZXMP S390 and ZXONE 5800.
l This function is applicable to the SDH series cards, such as OL64, OL64FEC, OL16,
OL4, OL1, EL1, OL4/1, OL256, OPS1, LP1, OEL1, S4A, S16A, and S64A.
Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the left navigation tree, select NE Operation > Alarm Configuration > Free AU
Alarm Detect Configuration. The Free AU Alarm Detect Configuration area is
displayed.
3. Select a board to set in the Select Board drop-down list.
The right pane will display all ports that can be set in the selected board.
4. Select Detect in the Free AU Alarm Detect Configure list.
5. Click Apply.
– End of Steps –
Configuration Requirement
As shown in Figure 3-14, ZXCTN equipment (NE1) receives the alarm information from
the external equipment through the alarm input interface on the main control board, and
then displays the information on the network management window. NE1 is connected to
NE2 in cascading mode. Local alarms generated on NE1 are output to NE2 through the
alarm output interface on the main control board so that the NE1 alarms can be viewed on
NE2.
3-26
Configuration Plan
l Configure the external alarm input interface on NE1.
NE1 receives power supply alarms of the external equipment through the first channel
of external alarm input of RSCCU3[0–1–13]. The power supply alarms are input
through high-level signals.
l Configure the alarm cascading output function on NE1, and the alarm cascading input
function on NE2.
l Configure the alarm audible function on NE1 so that NE1 can output ring alarms to
the cabinet through the LAMP interface.
For the configurations of the NE boards, refer to Table 3-4.
NE Slot Board
NE1 5 RSCCU2
NE2 13 RSCCU3
Configuration Procedure
1. Configure the external alarm input interface.
In External Alarm Configuration of NE1, set external alarm attributes. For details,
refer to Table 3-5.
Parameter NE1
Equipment RSCCU3[0–1–13]
3-27
Prerequisite
The NE whose active alarms will be synchronized is connected properly to the U31 R22.
Context
You can perform the following operation to directly synchronize the active alarms of a
specified NE:
3-28
Steps
1. Use any of the following methods to display the Synchronize Active Alarms dialog
box.
l From the main menu, select Fault > Synchronize Active Alarms. The
Synchronize Active Alarms dialog box is displayed.
l In the Topology Management window, right-click an NE, select Active Alarm
from the shortcut menu, and click in the displayed Active Alarm dialog box.
l In the Topology Management window, right-click an NE, select Fault
Management > Active Alarms from the shortcut menu, and click in the
displayed Active Alarms dialog box.
l In the NE Alarm Table window on the bottom of the Topology Management view,
click .
2. In the NE Type list, select one or multiple NE types.
3. In the NE area, select one or multiple NEs, and click or to add the NE(s) to the
Selected area.
l : to add the selected NE node to the Selected area.
l : to add the selected NE node and its sub-node to the Selected area.
Prerequisite
The NE whose historical alarms will be recollected is connected properly to the U31 R22.
Steps
1. In the Topology Management window, select Fault > Recollect History Alarms.
The Recollect History Alarms dialog box is displayed.
3. In the NE area, select one or multiple NEs, and click to add the NE(s) to the
Selected area.
4. Click OK. A message box is displayed.
3-29
5. Click OK.
After the recollection is successful, you can double-click in the lower-left corner
to view the alarm recollection success information in the displayed Show Message
dialog box.
– End of Steps –
Steps
l From the topology view, select one or multiple NEs. The current alarms of the NE(s)
are displayed on the bottom of the view in real time.
l (Only applicable for bearer and transmission NEs) In the topology view, right-click one
or multiple NEs, and then select Active Alarm or History Alarm from the shortcut
menu to view related alarms.
l In the topology view, right-click one or multiple NEs, select Fault Management from
the shortcut menu to perform the related operation. The right-click menu of Fault
Management is shown in Figure 3-15.
3-30
– End of Steps –
Steps
1. Perform the following operations as required to query alarms.
l Click the button. The Alarm Monitoring tab is displayed.
l Click the button. The Query Active Alarms dialog box is displayed.
l Click the button. The Query History Alarms dialog box is displayed.
– End of Steps –
Steps
l Method 1: query the alarm by selecting Fault > Alarm Monitoring.
1. From the main menu, select Fault > Alarm Monitoring. The Alarm Monitoring
window is displayed.
2. In the Management Tree navigation tree, double-click the node under Active
Alarms, History Alarms, and Notifications to query the related alarms. In
addition, the user can double-click the node under Custom Query to query the
related alarms according to the template customized. The alarm query navigation
tree is shown in Figure 3-16.
3-31
l Method 2: query the alarm by selecting Fault > Query Active Alarms and Fault >
Query History Alarms.
To... Do...
Query current a. From the main menu, select Fault > Query Active Alarms. The Query
alarms Active Alarms dialog box is displayed.
c. Click the Alarm Code tab, and then select the alarm code to be queried.
By default, all alarm codes are selected. (optional)
d. Click the Time tab, and then select the time when the alarm is generated
and acknowledged/unacknowledged time. (optional)
3-32
To... Do...
e. Click the Others tab, and then set Alarm Type, Data Type, Severity,
ACK State, and NE IP. (optional)
f. Click OK. The corresponding alarms are displayed in the Query Active
Alarms window.
Query historical a. In the main menu, select Fault > Query History Alarms. The Query
alarms History Alarms dialog box is displayed.
c. Click the Alarm Code tab, and then select the alarm code to be queried.
By default, all alarm codes are selected. (optional)
d. Click the Time tab, and then set the time when the history was generated,
alarm recovery time, acknowledged/unacknowledged time, and duration.
e. Click the Others tab, and then set Alarm Type, Data Type, Severity,
ACK State, and NE IP. (optional)
f. Click OK. The corresponding alarms are displayed in the Query History
Alarms window.
– End of Steps –
Steps
1. From the main menu, select Service > Service View. The Service View window is
displayed.
2. Perform the following operations as required.
To... Do...
3-33
To... Do...
ii. Right-click the service to be queried, and select Query > Active
Alarm (Inc Server Layer) from the shortcut menu.
– End of Steps –
Steps
1. In the Topology Management window, double-click an NE whose alarms need to be
queried. The Rack Chart window is displayed.
2. Perform the following operations as required.
To... Do...
Query the active alarms of a board Right-click a board, and select Active Alarm from the
shortcut menu to view the active alarms of the board in the
Active Alarm dialog box.
Query the historical alarms of a board Right-click a board, and select History Alarm from the
shortcut menu to view the historical alarms of the board in
the History Alarm dialog box.
– End of Steps –
Steps
1. Open the BN NE Resource View window in one of the following ways.
l On the toolbar, click the button. The BN NE Resource View window is
displayed.
3-34
Context
You can query current notifications of a specified NE in the Topology Management
window.
To... Do...
View current In the Topology Management window, right-click the NE or the NE node, and
notifications then select Fault Management > Notifications
Steps
1. Query notifications in one of the following ways.
To... Do...
Query notifications through the main menu i. From the main menu, select Fault > Query
Notifications. The Query Notifications
window is displayed.
3-35
Query notifications through NEs In the NE Tree in the left pane of the Fault
Management window, right-click the NE node
to be queried, and select Notifications from
the shortcut menu. The query results will be
listed on the right pane.
– End of Steps –
Prerequisite
The user has the operation authority of alarm management.
Context
Figure 3-17 illustrates the default alarm query templates provided by the U31 R22.
3-36
The common customized alarm (active alarm and historical alarm) query templates
include:
l Ethernet port alarm query in the entire network
l SDH optical port alarm query in the entire network
l NE link disconnection alarm query in the entire network
l LCT login event query
l EMS server CPU/memory/database utilization threshold crossed alarm query
This procedure describes how to create a current alarm query template. You can create a
historical alarm query template in a similar way.
Steps
1. In the operation window of the U31 R22, select Fault > Alarm Monitoring. The Alarm
Monitoring window is displayed.
2. In Management Tree on the left, right-click Alarm Query > Custom Query > My
Query, and then select New Active Alarm Query from the shortcut menu. The Query
Active Alarms dialog box is displayed.
3-37
Note:
When customizing the historical alarm query template, select New History Alarm
Query from the shortcut menu. The Query History Alarms dialog box is displayed.
To... Do...
Query all NEs in the whole network Click the All NEs option button.
ii. Select the specified NE in the list on the left, and then click
4. Click the Alarm Code tab, and then select Specific Codes.
5. In the Resource Type navigation tree, select BN-xTN > CTN.
6. Select the resource type in the CTN node according to the template type to be
customized.
7. Click to add the alarm code to the specified area, see Figure 3-18.
3-38
Note:
In the Click to enter the keyword to filter text box, enter the alarm code key word to
query.
For the settings of common alarm query templates, refer to Table 3-7.
Ethernet port alarm All NE types Ethernet ETPI l Ethernet Physical (ETPI) Ethernet Port Link
query in the entire (4203) Down (37)
network l Ethernet Physical (ETPI) Ethernet Port Half
Duplex Link (617)
l Ethernet Physical (ETPI) LOS (8)
l Ethernet Physical (ETPI) Ethernet Port
Oscillation (3573)
3-39
SDH optical port alarm All NE types SDH Port (4092) l SDH Port Missing Laser Module (137)
query in the entire l SDH Port Unauthenticated Laser Module
network (101)
l SDH Port LOS (8)
l SDH Port Transmit Failure (TF) (67)
l SDH Port Laser Module Fault (138)
l SDH Port Input Optical Power(dBm)
threshold crossed (50)
l SDH Port Output Optical Power(dBm)
threshold crossed (241)
l SDH Port Optical module rate mismatch with
port (621)
l SDH Port Laser Bias Current(mA) threshold
crossed (239)
l SDH Port Laser Temperature(℃) threshold
crossed (240)
NE disconnection alarm All NE types OMC Alarm (6) The link between the server and the NE is broken
query in the entire (1014)
network
BN EMS Alarm l BN EMS Alarm NE Communication Failure
(4237) (79)
l Link to Gateway NE is Broken (12063)
LCT login event query All NE types Board (4033) l Board LCT Login (3438)
l Board LCT Logout (18260)
U31 server Network OMC Alarm (6) l CPU usage of application server overload
CPU/memory/database (1002)
usage off-limit alarm l Ram usage of application server overload
query (1003)
l Database space usage too large (1008)
l Hard disk usage of database server overload
(1001)
l The capacity of the PM database has
exceeded the threshold (1027)
8. (Optional) When the historical alarm query template is created, click the Time tab, and
then set the time range.
9. Click the OK button. The Query Active Alarms dialog box is displayed.
10. On the toolbar, click . The New Query dialog box is displayed.
11. In the Query Name text box, enter the template name, and then click OK to save the
template, see Figure 3-19.
3-40
In Management Tree on the left, select Alarm Query > Custom Query > My
Query. The customized alarm query template name is displayed, see Figure 3-20.
Double-click it to check the query result.
– End of Steps –
Steps
1. Perform the following operations as required.
To... Do...
Export query
i. In the Management tree in the Fault Management window, expand the
conditions
Alarm Query node.
ii. Right-click a query condition node, and select Export condition from the
shortcut menu. The Save dialog box is displayed.
iii. Select a file path in the Save in box, and set a file name and file type.
3-41
To... Do...
iv. Click the Save button. The query condition is saved in .xml file to the
specified local path.
Import query
i. In the Management tree in the Fault Management window, expand the
conditions
Custom Query node under the Alarm Query node.
The file to be imported must be an .xml file previously exported from one
query condition.
iii. Select a file path, and set a file name and file type, and click the Open button.
– End of Steps –
Steps
1. In the Management tree in the Fault Management window, right-click a query
condition, and select Copy from the shortcut menu.
2. In the Management tree, right-click the Custom Query node, and select Paste from
shortcut menu.
– End of Steps –
3-42
Steps
1. In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Detail from the shortcut menu. The Detail dialog box is displayed.
2. View alarm details and handling suggestions.
Note:
The two fields NE and Location combine to describe the NE with specific board
location that reports the alarm.
Related Service(s) describes the NE with the specific board that is affected by the
alarm.
If the alarm does not affect other NEs, the Related Service(s) is null.
– End of Steps –
Steps
1. From the main menu, select Fault > Query Archived History Alarms. The Query
Archived History Alarms window is displayed.
2. From the left navigation tree on the Location tab, select the NEs whose historical
alarms you want to query, and click or to add these NEs to the right list.
3. (Optional) To remove an NE whose historical alarms you do not want to query, select
the NE from the right list and then click or .
4. Click the Alarm Code tab. Select the desired alarm codes from the left list, and then
click to add these alarm codes to the right list.
5. (Optional) To remove a selected alarm code, select it from the right list and then click
.
6. Click the Time tab. Set the parameters. For a description of the parameters, refer to
Table 3-8.
Parameter Description
3-43
Parameter Description
Cleared Time Required. This parameter indicates the time when these
alarms are cleared.
7. Click the Others tab. In the Alarm Type area, set the alarm types that you want to
query. For a description of the parameters, refer to Table 3-9.
Parameter Description
Alarm Type Select the types of the NE alarms that you want to query.
Options include Equipment Alarm and Communications
Alarm.
Data Type Select the data types of the alarms that you want to query.
Options include Common Alarm and Switch Event.
Original Severity Select the severity levels of the alarms that you want to query.
Options include Critical, Major, Minor and Warning.
– End of Steps –
Steps
1. In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Related History Alarms from the shortcut menu.
The Related History Alarms tab is displayed in the Fault Management window,
listing all history alarms related to the selected active alarm.
3-44
Note:
If the selected active alarm has no relative history alarms, the Confirm message box
is displayed, prompting that no matching record is found.
– End of Steps –
Context
Note that the influence of related rules is not certain on the selected alarm.
Steps
1. In the Fault Management window, right-click an alarm in a displayed history alarm list.
2. Select Related Rules from the shortcut menu. The Related Rules dialog box is
displayed.
3. Double-click a rule in the rule list. A dialog box is displayed, displaying the detailed
parameters of this rule.
– End of Steps –
Steps
1. In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Handling Suggestions from the shortcut menu.
2. View suggested suggestions on the Handling Suggestions tab in a displayed dialog
box.
– End of Steps –
3-45
Steps
l In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Locate Alarm to NE from the shortcut menu. The Topology Management
window is displayed.
The icon of the NE to which an alarm occurs is selected on the topology graph.
– End of Steps –
Steps
1. In the Fault Management window, right-click an alarm in a displayed alarm list,
and select Open Rack Chart from the shortcut menu. The Rack Chart window is
displayed.
2. Right-click the board on the rack, and select Active Alarm. The Active Alarm dialog
box is displayed. The active alarm information of the board is listed in this dialog box.
– End of Steps –
Steps
1. In the Fault Management window, open any active alarm or history alarm list.
2. In the Relates Service(s) column, click the service that is associated with the alarm
to view the service.
– End of Steps –
3-46
Steps
1. From the main menu, select Maintenance > Task Management > Show Timing Task.
The Task Management window is displayed.
2. From the Task Management navigation tree, select Common Task > Alarm
Background Task > Automatically Acknowledge History Alarms Setting. The
Automatically Acknowledge History Alarms Setting window is displayed.
4. Click .
– End of Steps –
Steps
1. In the Fault Management window, open a list of active alarms, and right-click an
unacknowledged alarm record.
2. Select Acknowledge from the shortcut menu. The Alarm Acknowledge dialog box
is displayed.
3. Enter comments in the Comment text box, and click OK.
– End of Steps –
Result
The status of the selected alarm turns from Unacknowledged to Acknowledged.
Meanwhile, the client will record detailed information of this acknowledgment, including
time, user, and the acknowledged alarm.
3-47
Steps
1. In the Fault Management window, open a list of active alarms by double-clicking a
node under Alarm Query in the Management tree, and right-click an acknowledged
alarm record.
2. Select Unacknowledge from the shortcut menu. The Alarm Unacknowledge dialog
box is displayed.
3. Enter comments in the Comment text box, and click OK.
– End of Steps –
Result
The ACK state (Acknowledging status) of the selected alarm turns from Acknowledged
to Unacknowledged.
Steps
1. In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Clear from the shortcut menu. The Confirm message box is displayed.
2. Click OK to clear the alarm.
Note:
If an alarm clearing rule has been set, the system will automatically clear the received
alarms meeting the set conditions, and move them to the history alarm list directly.
– End of Steps –
Result
The cleared alarm is moved from the active alarm list to the history alarm list. To check
the details of this alarm, query it from the history alarms.
3-48
Steps
1. In the Fault Management window, select the current alarm to be monitored.
2. Right-click the alarm and select Specified Alarms Monitoring from the shortcut
menu. The Specified Alarms Monitoring window is displayed.
Note:
– End of Steps –
Steps
1. In the Fault Management window, right-click an alarm in a displayed alarm list, and
select Comment from the shortcut menu. The Comment dialog box is displayed.
2. Enter the comment in the text box and click OK button.
– End of Steps –
Result
Add comments to the alarm successfully.
When you create a rule, the system will initialize parameters in the created rule in
accordance with corresponding attribute values of the selected alarm message.
Steps
1. In the Fault Management window, right-click an active alarm in a displayed alarm list,
and select Create a Rule from the shortcut menu.
3-49
2. Select a rule from the sub-menu, for example, Alarm Acknowledging Rule. The
Alarm Acknowledging Rule dialog box is displayed.
3. Set parameters on the Basic and Condition tabs.
4. Click OK to complete the creation of the new rule.
– End of Steps –
Prerequisite
The printer is correctly connected and configured.
Steps
1. In the Fault Management window, open a list of history or active alarms.
Tip:
To preview the printing effect, click the Preview All button.
– End of Steps –
Steps
1. In the Fault Management window, open a list of history or active alarms
2. Click the button, and select Export All Columns or Export Visible Columns.
The Save dialog box is displayed.
3. Select a file path from the Save in list, and set a file name and file type.
3-50
4. Click the Save button. A message box is displayed, indicating that the file is exported
successfully.
5. Click OK.
– End of Steps –
Steps
1. From the main menu, select Fault > Setting > Alarm Forwarding Template Setting.
The Alarm Forwarding Template Setting dialog box is displayed.
2. Set forwarding parameters in the SMS Template, Mail Subject, and Mail Contents
text boxes.
3. Click OK.
– End of Steps –
Prerequisite
l The OMC server is connected to the SMS center and the mail server.
l The mobile phone number and the E-mail address to be forwarded to are available.
Steps
1. In the Fault Management window, right-click an alarm in a displayed alarm list, and
select Forward from the shortcut menu. The Forward Alarm dialog box is displayed.
2. Enter the information of the specified person in the E-mail and Phone text boxes.
3. On the Forward by email tab, enter the email subject and content.
4. On the Forward by SMS tab, enter the short message content.
5. Click OK.
– End of Steps –
3-51
Delivery to Database
It specifies whether to store the rule-meeting alarms in the database.
Alarm Ac- l Global Yes Yes Rules meeting the rule are automatically
knowledge- validity acknowledged. When a rule-meeting
ment Rule l Forward alarm is reported, it will be acknowledged
validity automatically.
Alarm l Global Yes Yes Rules meeting the rule are automatically
Clearance validity cleared. When a rule-meeting alarm is
Rule l Forward reported, it will be cleared automatically.
validity
Alarm Filter l User Not stored when Not reported Rules meeting the rule are automatically
Rule validity, if restrained. when filtered. When a rule-meeting alarm is
specific restrained. reported, it will be filtered automatically.
user is The two filter types are:
selected. Display filter: the filtered alarms are not
Otherwise, displayed.
global Alarm suppression: The filtered alarms are
validity. neither displayed nor stored in database.
l Backward
validity for
3-52
"display"
filter
l Forward
validity
when
restrained
Alarm l Global Yes Yes Used to display only one record for alarms
Merging Rule validity from the same source caused by the same
l Forward fault.
validity
Alarm Count l Global Yes Yes Used to count the occurrences of alarms.
Rule validity If the number of occurrences exceeds the
l Forward threshold value within a set period, a new
validity alarm is generated.
3-53
Alarm l Global Yes Yes Set for restraining the report of an alarm
Restrain Rule validity depending on another. If alarm A depends
- NE l Forward on B, only alarm B is reported under this
validity rule. This rule enables the alarms of
different NEs to restrain each other.
3-54
Alarm l Global Yes Yes Set for restraining the report of an alarm
Restrain validity depending on another. If alarm A depends
Rule-NE Type l Forward on B, only alarm B is reported under this
validity rule. This rule enables the alarms of the
same NE of the same NE type to restrain
each other.
Note:
There might be slight differences in specific rules among products or versions of the same
product.
In the Rule Setting dialog box, right-click the rule to be suspended and select Disable on
shortcut menu to suspend the rule.
3-55
In the Rule Setting dialog box, click the button to refresh alarm information.
Steps
1. From the main menu, select Fault > Setting > Rule Setting. The Rule Setting tab is
displayed.
2. On the toolbar, click the button. The New dialog box is displayed.
3. Select an alarm rule.
4. Click OK. The dialog box of the corresponding alarm rule is displayed.
5. Set rule parameters.
Rule parameters vary with different alarm rules. For the parameters descriptions of all
alarm rules, refer to Table 3-11.
Rule Description
Alarm Filtering The parameters on the Basic and Condition tabs need to be set.
Rule Both the alarm masking rule and alarm filtering rule restrain alarms. The
Acknowledging l The alarm masking rule discards the alarm when the NE reports an
Rule alarm, and the alarm filtering rule discards the alarm after the U31 R22
receives an alarm.
Alarm Clearing
l The masked alarm does not occupy network bandwidth, and the alarm
Rule
filtered from the U31 R22 still occupies network bandwidth.
Alarm Delaying
Rule
Alarm Masking
Rule
3-56
Rule Description
NAF Alarm
Filtering Rule
Notification The parameters on the Basic and Condition tabs need to be set.
Filtering Rule The notification filtering rule is only applicable to a newly reported
notification.
Repeated
Notification
Filtering Rule
Repeated History The parameters on the Basic and Condition tabs need to be set.
Alarm Filtering The historical alarm filtering rule is only applicable to a newly reported
Rule notification.
Alarm Merging The parameters on the Basic, Condition, and Action tabs need to be set.
Rule l Only the earliest alarm that satisfies the requirement of the alarm
merging rule is displayed on the Rule Setting tab. You can click
"+" before the alarm to display the merged alarms. If the alarm is
recovered, the alarm merging rule will re-select another alarm to be
displayed.
l To view other alarms filtered by the rule, you can select Others >
Advanced > Invisible in the Query Active Alarms dialog box.
Alarm Persisting The parameters on the Basic, Condition, and Action tabs need to be set.
Rule Suppose the persisting state of a new alarm is unacknowledged. After the
alarm changes to active state, the system will remove the alarm.
Alarm Counting The parameters on the Basic, Condition, and Action tabs need to be set.
Rule l After the alarm counting rule is created, the U31 R22 system will
enable alarm occurrence frequency sampling to count the times of
alarm occurrence after the alarm meeting the rule occurs.
l If the number of times of alarm occurrence in a specified duration
exceeds the threshold, the system will automatically create an alarm
that specifies alarm severity and details.
l If the system detects the counting alarm created in the previous
counting duration, it will modify the times of alarm occurrence in the
details of the counting alarm instead of creating a new alarm.
l If the system has created a new counting alarm and then detects that
the number of times of alarm occurrence in the previous counting
duration does not exceed the threshold, the system will remove the
existing alarm.
Alarm Forwarding The parameters on the Basic, Condition, and Action tabs need to be set.
Rule
3-57
Rule Description
Alarm Restraining The parameters on the Basic, Root Alarm, and Correlated Alarm tabs
Rule by NE need to be set.
l On the Root Alarm tab, set the location and alarm code.
l On the Correlated Alarm tab, set the location and alarm code.
The correlated primary and secondary alarms must have different alarm
description. The primary alarm of a rule cannot be a secondary alarm of
other rules.
Alarm Restraining The parameters on the Basic and Condition tabs need to be set.
Rule by NE Type On the Condition tab, set the NE type, root alarm code, and correlated
alarm code.
l On the Basic tab, set the alarm name, description, rule status, and other
parameters as required.
l On the Location sub-tab, set the NE location of the alarm.
On the Alarm Code sub-tab, set the alarm code.
On the Others sub-tab, set the time of alarm occurrence, alarm type, alarm
severity, maintenance state, NE IP address, and remark.
l On the Action tab, set the rule-related action parameters.
6. Click OK.
– End of Steps –
Steps
1. From the main menu, select Fault > Setting > Handling Suggestion Setting. The
Handling Suggestion Setting tab is displayed.
2. Enter the keyword(s) in the Click to enter the keyword to filter text box, and click
the button.
The Resource Type navigation tree displays all matched alarms. Select the desired
alarm. The right pane displays alarm causes and handling suggestions.
3-58
3. (Optional) For some important alarms, click the prompt link in the lower-left corner to
view more handling suggestions about the alarm.
– End of Steps –
Steps
1. From the menu, select Fault > Setting > Handling Suggestion Setting. The
Handling Suggestion Setting tab is displayed.
2. Select an alarm from the Resource Type tree, and enter supplement suggestions in
the User-defined Suggestions box, see Figure 3-21
3-59
Caution!
The supplementary information cannot exceed 2000 characters; otherwise, it will be
directly discarded by the system form the 2000 character.
Steps
1. From the main menu, select Fault > Setting > Handling Suggestion Setting. The
Handling Suggestion Setting tab is displayed.
2. Select an alarm or a type of alarms from the Resource Type tree.
3. Click the Export button. The Save dialog box is displayed.
4. Select a file path and set the file name and type.
Prerequisite
The file to be imported exists on the local computer.
Steps
1. From the main menu, select Fault > Setting > Handling Suggestion Setting. The
Handling Suggestion Setting tab is displayed.
3-60
Note:
l You can only import files in .xls or csv format.
l Importing a file will only modify the advice description that the system has handled.
l The Handling Suggestion cannot exceed 2000 characters; otherwise, it will be
directly discarded by the system for the 2000 character.
3-61
Context
l When summarizing statistic results, you can set the statistic conditions. In this way,
only the alarms meeting the specified conditions are summarized. Also, you can
set the maximum number of records to be displayed. For example, only the first 50
records are displayed.
l The name of a new statistic template cannot repeat an existing one.
Steps
1. Perform one of the following operations to open the History Alarm Basic Statistics
dialog box.
l From the main menu, select Fault > History Alarm Basic Statistics.
l From the main menu, select Statistics > History Alarm Statistics > History
Alarm Basic Statistics.
2. On the Basic tab, set Statistic Type, Statistic Row and View Setting.
3. Click the Condition tab, and set parameters on the Location, Alarm Code, and
Others sub-tabs.
4. Click OK. The statistic results are displayed in the right pane.
– End of Steps –
Context
l When summarizing statistic results, you can set the statistic conditions. In this way,
only the alarms meeting the specified conditions are summarized. Also, you can
set the maximum number of records to be displayed. For example, you can set the
condition to display only the first 50 records.
l The name of new statistic template cannot repeat an existing one.
l Because the statistic granularity is accurate to hour, effective time segment can only
be set to hours.
3-62
Steps
1. Perform one of the following operations to open the History Alarm Busy-Time
Statistics dialog box.
l From the main menu, select Fault > History Alarm Busy-Time Statistics.
l From the main menu, select Statistics > History Alarm Statistics > History
Alarm Busy-Time Statistics.
2. On the Basic tab, set Statistic Type, Effective Time and View Setting.
3. Click the Condition tab, and set parameters Location, Alarm Code, and Others on
the sub-tabs.
4. Click OK. The statistic results are displayed in the right pane.
– End of Steps –
Prerequisite
l You have the authority to manage alarms.
l The Fault Management window is displayed.
Context
l You can use the defined statistic template to perform statistics on and analyze history
alarms.
l Two types of statistic templates are available: basic statistic template and busy-time
statistic template. This procedure uses a basic statistic template as an example, and
the operation for a busy-time statistic template is similar.
Steps
1. On the Statistic tab in the Fault Management window, right-click the Custom
Statistic node, and select New History Alarm Basic Statistic... from the shortcut
menu. The New History Alarm Basic Statistic dialog box is displayed.
2. Set the template name and click OK. The History Alarm Basic Statistics dialog box
is displayed.
3-63
Note:
l For the parameter settings in the History Alarm Basic Statistics dialog box, refer
to 3.10.2 Basic Statistics.
l After you set the statistic conditions, the custom statistic template is added under
the Custom Statistics node.
3. Right-click the new basic statistic template, and select Execute from the shortcut menu
to view the statistic result.
Note:
You can also display the statistic result in bar chart or pie chart.
l If the statistic result needs to be displayed in bar chart, click on the toolbar.
l If the statistic result needs to be displayed in pie chart, click on the toolbar.
– End of Steps –
Steps
1. From the main menu, select Fault > History Alarm Important Alarm-Code
Statistics. The History Alarm Important Alarm-Code Statistics dialog box is
displayed.
2. From the left navigation tree on the Location tab, select the NEs whose historical
alarms you want to query.
To... Do...
3-64
3. Click the Alarm Code tab. On this tab, expand the alarm code list. Select the desired
alarm codes, and then click to add these alarm codes to the right list.
4. Click the Time tab. On this tab, perform one of the following operations as required.
To... Do...
Query the alarms generated within a Click the Range option button. Set the start time and the
specified period end time.
Query the alarms generated within Click the Latest option button. Set the number of days
specified days or weeks or weeks.
To... Do...
Save the query conditions into a template Click the Save As button. In the displayed Save As
dialog box, set Template Name and then click OK.
– End of Steps –
By using the timed statistic task function, you can specify a task which can periodically
perform statistics based on one template and export the statistic result to a specified path.
Context
You can select a predefined or custom statistic template to set a timed statistic task.
Timed statistic task includes four plans:
l By day: The task is executed at 5:00 am each day by default.
l By week: The task is executed at 5:00 am on Mondays by default.
l By week: The task is executed at 5:00 am on the first day of each month by default.
l Custom: The task is executed on the time you set.
Steps
1. Perform one of the following operations to open the Timing Statistic Task
Management tab.
l From the main menu, select Fault > Timing Statistic Task Management.
l From the main menu, select Statistics > History Alarm Statistics > Timing
Statistic Task Management.
3-65
2. On the toolbar of the Timing Statistic Task Management tab, click the button.
The Timing Statistic Task dialog box is displayed.
3. Set a task name, template name, task time, task status, and task execution plan.
Note:
4. (Optional) Click the Advanced Settings(F) button, and set parameters in the
displayed Advanced Settings dialog box.
Note:
Advanced settings enable the statistic result to be saved in a specified server and to
be sent to a specified E-mail as an attachment.
– End of Steps –
Steps
1. From the main menu, select Fault > Timing Export Task Management. The Timing
Export Alarm Task Management tab is displayed.
2. On the toolbar of the Timing Export Alarm Task Management tab, click the
button. The Timing Export Task dialog box is displayed.
3. On the Basic tab, set a task name, an export type, a task time, a task status, a file
type, and a task execution plan.
4. (Optional) Click the Advanced Settings(F) button, and set parameters in the
displayed Advanced Settings dialog box.
3-66
Note:
Advanced settings enable the export result to be saved in a specified server.
3-67
In the alarm server, set multiple receiver on the server. This can ensure the alarm can
be handled in time.
l Multi-Way Policy
If only one way is used to send alarm information, immediate troubleshooting is
unavailable when this way fails to work. Therefore, it is recommended to adopt
multiple ways at the same time to avoid this case.
Function
Through U31 R22 alarm monitoring, the users can view performance statistics and alarm
information, so that they can analyze corresponding reasons.
Query Methods
To query alarm monitoring of the U31 R22, log in to the U31 R22 and query alarms on the
Fault Management window.
3-68
personnel, which can include the maintenance personnel of ZTE local office or the
telecommunications operator.
Function
To send alarm information to maintenance personnel when they are not on site so that they
can monitor the system faults.
Steps
1. From the main menu, select Fault > Alarm Monitoring. The Alarm Monitoring tab
is displayed.
The system views the NEs to which the alarms occur, acknowledgement status, alarm
code, and raised time.
– End of Steps –
Steps
1. From the main menu, select Fault > Notification Monitoring. The Notification
Monitoring tab is displayed.
The system views the NEs to which the notifications occur, notification code, raised
time, and NE type.
– End of Steps –
Steps
1. From the main menu, select Fault > Alarm Monitoring by NE. The Alarm Monitoring
by NE tab is displayed.
3-69
The Alarm Monitor by NE tab lists the counts of critical alarms, major alarms, minor
alarms and warnings of each NE as well as the total count of alarms.
– End of Steps –
Steps
1. From the main menu, select Fault > Alarm Monitoring by NE Type. The Alarm
Monitoring by NE Type tab is displayed.
The Monitor Alarms by NE Type tab lists the counts of critical alarms, major alarms,
minor alarms and warnings of each NE type as well as the total count of alarms.
– End of Steps –
Task Description
9.2.1.5 Backing Up and Deleting Alarm Data This task allows users to manually back up or
delete historical alarms and events.
9.3.1.3 Restoring Alarm Data This task allows users to manually restore
historical alarms and events.
11.5 Backing up and Deleting Alarm Data This task can automatically back up or delete the
alarm data regularly.
3.12.1 Creating a Scheduled Statistic Task This task collects alarm statistics in accordance
with the rule of statistic templates.
3.12.2 Creating a Scheduled Export Task This task filters alarms periodically in accordance
with the user-defined conditions, and saves the
results as files.
3.12.3 Creating a Suppressing Plan Task This task suppresses the alarms generated during
tasks such as project cutover and switchover.
3-70
Prerequisite
You have the user permission of "Supervisor Role" or above.
Steps
1. From the main menu, select Fault > Timing Statistic Task Management. The Timing
Statistic Task Management tab is displayed.
Note:
You can suspend, activate, modify, delete, and refresh the created task displayed on
the tab.
Parameter Description
Predefined Start Time Set the time when the alarm statistics starts.
Predefined End Time Set the time when the alarm statistics ends.
Note:
By default, the statistic results are saved in the following directory: \ppus\uca.ppu
\uca-fm.pmu\statistic\.
3-71
4. (Optional) You can forward the results through an email or save them as a file on the
FTP server.
a. Click Advanced Settings. The Advanced Settings dialog box is displayed.
b. Forward the results as an email or save the results on the FTP server. For the
advanced settings, refer to Table 3-14.
Parameter Setting
Prerequisite
You have the user permission of "Supervisor Role" or above.
3-72
Steps
1. From the main menu, select Fault > Timing Export Task Management. The Timing
Export Task Management tab is displayed.
Note:
You can suspend, activate, modify, delete, and refresh the created task displayed on
the tab.
To... Do...
3. Click the Basic tab, and set the parameters. For the parameter descriptions, refer to
Table 3-15.
Parameter Description
Task Name Enter a customized name for the scheduled export task.
Output Type Select the alarm type to be filtered: Active Alarms or History
Alarms.
Start Time Set the time when the alarm statistics starts.
End Time Set the time when the alarm statistics ends.
Task Status Status of the historical alarms in the statistic period: Activated
or Suspended.
File Type The parameter is available only in the Timing Export Task and
Service Alarm Timing Export Task dialog boxes.
Format of the generated file: CSV, XML, XLS (the template of this
format can be customized), or TXT.
3-73
Parameter Description
Task Execution Plan The parameter is available only in the Timing Export Task and
Service Alarm Timing Export Task dialog boxes.
Cycle of the task: By Day, By Week, By Month, By Period (only
available to Active Alarms), or Custom (you need to set the period
manually).
4. Click the Condition tab, and set the parameters on the Location or Service sub-tab.
To... Do...
5. On the Alarm Code sub-tab, select an alarm code. When the alarm of the selected
code is generated on the NEs, the system gives an alarm prompt.
l All Codes: Click the All Codes option button. When any alarm is generated on
the NEs, the system gives an alarm prompt.
l Specific Codes: Click the Specific Codes option button. Select an alarm from
the list, and click . An alarm prompt is given only when the alarm of the
specified code is generated on the NEs.
6. On the Time sub-tab, set the raised time and acknowledged time/unacknowledged
time of the alarm.
7. On the Others sub-tab, set the alarm type, data type, acknowledged state, NE IP, and
remark.
8. (Optional) Set the FTP server in the Timing Export Task and Service Alarm Timing
Export Task dialog boxes.
a. On the Basic tab, click Advanced Settings. The Advanced Settings dialog box
is displayed.
b. Save the exported file on the FTP server as described in Table 3-16.
3-74
Parameter Setting
– End of Steps –
Prerequisite
You have the user permission of "Supervisor Role" or above.
Steps
1. From the main menu, select Fault > Suppress Plan Task Management. The
Suppress Plan Task Management tab is displayed.
3-75
Note:
You can suspend, activate, modify, delete, and refresh the created task displayed on
the tab.
Parameter Description
Do not send the suppressed alarms to the Click the check box and the suppressed alarms
upper system will not be sent to the upper system.
5. Click OK.
– End of Steps –
3-76
4-1
the lower threshold, the fault management module of the system can raise a threshold
crossing alarm.
Note:
The U31 R22 only supports the collection granularity of 15 minutes.
l Calculation Index
Calculation index is used to evaluate equipment performance. It is the arithmetic result
of related measurement items. The system already presets some calculation indexes
for generic applications.
l QoS
Quality of Service (QoS) is a network security mechanism and technology used
to solve network delay and congestion problems. It prevents important services
from being delayed or discarded when the network is overloaded or congested, and
therefore guarantees high-efficiency operation of the network.
l Measurement Task
Measurement task refers to a user-defined performance measurement task. After you
schedule and activate a measurement task, the system will automatically collect the
values of required performance parameters in accordance with the preset cycle. You
4-2
can know the network status by observing the performance statistics provided by the
system.
l Threshold Task
Threshold task, also called QoS task, reflects the service quality of network devices.
A threshold task is used to monitor the values of specific performance indexes. When
the calculated value of an index exceeds the upper threshold or lower than the preset
lower threshold preset in the task, a threshold crossing alarm is raised. When the
calculated value during a later measurement period is within the threshold range, the
threshold crossing alarm is cleared.
4-3
Performance Menu
To use performance management functions, select corresponding commands on the
Performance menu, see Figure 4-3.
4-4
Button Function
Navigation Pane
The navigation pane in the client window varies with the active management view
displayed in the window. In the performance management view, the navigation pane
provides different topological trees to facilitate performance management operations.
On the top of the navigation pane are three tabs: Model Management, NE Tree, and
Template Management.
The following introduces the three tabs of the navigation pane in the performance
management view.
l On the Model Management tab, the Resource Type tree lists all the performance
measurement types and counters of all managed NEs in the system.
l On the NE Tree tab, a navigation tree lists all managed NEs in the system.
4-5
l On the Template Management tab, the Template Management tree lists all available
templates that can be used for performance data query.
Button Function
Steps
1. From the main menu, select System > Preferences. The Preferences dialog box is
displayed.
2. In the Preferences navigation tree, select Performance > Performance
Management Preferences. The performance module parameter setting interface is
displayed on the right.
3. To set parameters, refer to Table 4-3.
Parameter Description
4-6
Parameter Description
Date format in Files generated by Time display format in the performance query result.
template tasks
Show index in Counter and index The meaning of each item is described below.
management l All indexes: All performance indexes are displayed.
l Frequently used indexes: Indexes Frequently used
are displayed.
4. Click OK.
– End of Steps –
Context
The default status of each performance item is unmasked.
4-7
Note:
The board does not report any masked performance item to the NMS and this will affect
normal supervision of network operation. Therefore, performance mask in network
operation should be avoided or this operation should be canceled in time once the
operation goal is achieved.
Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the navigation tree in the left pane, select NE Operation > Performance
Configuration > Performance Mask Configuration. The Performance Mask
Configuration area is displayed.
3. On the By Resource tab in the right pane, expand all performance items contained
by the cards configured in the NE to set the Mask Status.
l Select Mask Status: This performance item is masked.
l Clear Mask Status: This performance item is not masked.
4. Click Apply. A message box is displayed.
5. Click OK.
– End of Steps –
Context
Digital performance threshold is classified into 15-minute performance threshold and
24-hour performance threshold by the performance measurement period.
l 15-minute digital performance threshold has two performance threshold settings.
à Uni-threshold: In a period of 15 minutes, when a performance value exceeds
the maximum threshold, the system will automatically raise the performance
threshold crossing alarm. When each 15-minute period arrives, the alarm is
displayed, and all the performance values will be cleared and will be counted
from zero again.
à Bi-threshold: In a period of 15 minutes, when a performance value exceeds
the maximum threshold, the system will automatically raise the performance
threshold crossing alarm. When each 15-minute period arrives, the alarm is
displayed, and all the performance values will be cleared and will be counted
4-8
from zero again. When in another 15-minute period, the performance count is
lower than the minimum threshold from the start to the end, the system will raise
the performance threshold crossing alarm after 15 minutes.
l Digital 24-hour performance threshold: The 24-hour threshold is a uni-threshold. In a
period of 24 hours, when a performance value exceeds the maximum threshold, the
system will automatically raise the performance threshold crossing alarm. When the
period ends, the alarm is displayed, and all the performance values will be cleared
and will be counted from zero again.
Steps
1. In the Topology Management window, right-click an NE, and then select NE
Management from the shortcut menu. The NE Management window is displayed.
2. In the left navigation tree, select NE Operation > Performance Configuration
> Digital Performance Threshold Configuration. The Digital Performance
Threshold Configuration area is displayed.
3. From the Performance Granularity list in the right pane, select 15 minutes or 24
hours.
4. Expand the performance items, and double-click the parameters of Low, Pre-warning
Low, Pre-warning High, and High.
Steps
1. In the Topology Management window, right-click an NE, and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the navigation tree on the left, select NE Operation > Performance Configuration
> Analog Performance Threshold Configuration. The Analog Performance
Threshold Configuration area is displayed.
4-9
4. Expand the performance items and set Low, Pre-warning Low, Pre-warning High,
and High for each item.
Note:
l You can click Default to set all performance items to their default values.
l (Optional) For a CTN NE, you can click Current Board Value to set all
performance items to their current board values.
6. Click OK.
– End of Steps –
Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management window is displayed.
2. In the navigation tree on the left, select NE Operation > Maintenance Management
> Optical Default Threshold Configuration. The Optical Default Threshold
Configuration area is displayed.
3. Perform the corresponding operations as required.
To... Do...
– End of Steps –
4-10
Prerequisite
Devices whose thresholds require to be set are online.
Steps
1. From the main menu, select Maintenance > BN NE Maintenance > CTN
Performance Threshold Batch Configuration. The CTN Performance Threshold
Batch Configuration window is displayed.
2. To set digital performance thresholds, perform the following operations.
a. In the Digital tab, select the performance items to be set from the Selectable item
navigation tree.
f. Click Apply.
3. To set analog performance thresholds, perform the following operations.
a. In the Analog tab, select the performance items to be set from the Selectable
item navigation tree.
To... Do...
Import the default Click Import, and then select Import Default Template.
performance threshold
data
Import the data through Click Import, and then select Import from File. Select the file in
the file the displayed dialog box.
5. (Optional) Export the performance data as a template: Click Export..., and then select
the storage path in the displayed dialog box. Click Export.
– End of Steps –
4-11
Steps
1. In the Topology Management window, right-click an NE and select NE Management
from the shortcut menu. The NE Management dialog box is displayed.
2. In the navigation tree in the left pane, select NE Operation > Performance
Configuration > Zero Performance Suppression Configuration. The Zero
Performance Suppression Configuration area is displayed.
3. Select a board from the Select Card list.
Note:
l For the SNMP devices in earlier versions, the zero performance suppression
function can be configured on boards. Thus, you can select a board in this step.
l For the QX interface and nectconf interface devices, the zero performance
suppression function can be configured on NEs. You cannot select a board in
this step.
l If you do not set zero performance suppression, the NMS performance will be
affected.
l WDM NEs only support History 15-minute zero performance suppression.
Context
There are two clearance modes: Digital Counter Clearance and Analog Counter
Clearance.
4-12
l Digital Counter Clearance: Clear the current values of all performance items and start
to collect data from zero.
l Analog Counter Clearance: Set all performance values (maximum value, minimum
value and current value) to the current values.
Steps
l Clear the performance counter in the NE Management window.
1. In the Topology Management window, right-click an NE and select NE
Management from the shortcut menu. The NE Management window is
displayed.
2. In the navigation tree in the left pane, select NE Operation > Performance
Configuration > Performance Counter Clear. The Performance Counter
Clear area is displayed.
5. Click to move the selected performance item to the Selected Items list.
Note:
Click All Clear to move all performance items from the Unselected Items list to
the Selected Items list.
In the Current Performance Data Query window, all digital performances are
recollected from 0. All analog performances (maximum, minimum, and current
values) are displayed in the current values.
– End of Steps –
4-13
Context
When a user requires to focus on parameter values of one or multiple performance items,
the user can set the threshold values, corresponding background colors, and font colors for
these performance items with the performance rendering function. When the performance
parameter value meets the threshold, the performance data is displayed in the preset
background rendering color and font rendering color to remind the user that the parameter
value of the performance item reaches the threshold.
Steps
1. From the main menu, select Performance > History Performance Data Query. The
History Performance Data Query dialog box is displayed.
2. On the Index/Counter Selection tab, set index/counter selection parameters. For the
parameter descriptions, refer to Table 4-4.
Parameter Description
Available Expands each node, and then selects the performance items to be
indices/counters rendered.
3. Click the Logic button. The Logical Filtering/Rendering dialog box is displayed.
5. Set Index/Counter as required, and then set Filter Operator and Filter Value to
define the filtering conditions, see Figure 4-4.
4-14
6. Click Rendering. The Threshold Rendering dialog box is displayed, see Figure 4-5.
Set the threshold value and rendering color for each threshold.
7. Click OK to complete the configuration of filtering and rendering for each counter and
index.
8. Click OK.
– End of Steps –
To open the Measurement Task Management tab, select Performance > Measurement
Task Management from the main menu. The Measurement Task Management tab is
displayed in the performance management view.
4-15
Table 4-5 Description of Toolbar Buttons on the Measurement Task Management Tab
4-16
Prerequisite
The Measurement Task Management tab is displayed.
Context
One device type can only have one measurement task.
Steps
1. On the Measurement Task Management tab, perform one of the following operations
to open the Create Measurement Task dialog box.
l On the performance management toolbar, click .
l On the NE Tree tab, right-click a managed element, and then select Create
Measurement Task from the shortcut menu.
l In the measurement task list, right-click an existing task, and then select Create
Measurement Task from the shortcut menu.
2. On the Measurement Task tab, click the Measurement Task tab to configure the
parameters.
NE Type Measure the NE type of the task It is the NE type of the device
MO Type It is the type of the object to be Measure object type is also the manage
measured object type
Task Type There are two types of task types: Normal: You can select the performance
l Normal object
l ALL-PO ALL-PO: Create the task of all
performance objects belong to the
measure object type, and you do not
need to select the performance object.
Parameter Description
Wildcard Level By selecting a wildcard level, you can select MO(s) in batch quickly. It
varies with the previously selected NE type and MO type. You can select
the NE location and the measure object in accordance with the needs of
the selected wildcard level.
4-17
4. Click the General tab, and then set the general information of the measurement task.
Task Name of the measurement task. Clearly describe the measurement task.
name The name cannot be the same as any
existing measurement task name.
Start time Set the start time of the period during Be sure that the start time is later than
which the measurement task will take the current system time of the client.
effect.
End time Set the end time of the period during Be sure that the end time is later than
which the measurement task will take the start time.
effect.
Granular- The collection granularity determines Select the data collection cycle: 15
ity the cycle of data collection from minutes.
corresponding boards.
Effective Set the exact implementation date of the Set the data in accordance with weeks
Date measurement task, weekly or monthly. or months. You can click the date to
Every day is selected by default. delete it.
Effective Set the time periods when the The time section can be one day or a
Time measurement task shall be performed period in one day.
during a day.
5. Click OK.
l The created measurement task is displayed in the measurement task list on the
Measurement Task Management tab.
l If the measurement task is active, the NE(s) collects required performance data
and transfers the collected data in the format of file to the U31 R22 in accordance
with the requirements of the measurement task.
– End of Steps –
4-18
Prerequisite
l The Measurement Task Management tab is displayed.
l The target measurement task to be modified is suspended and its consistency status
is normal.
Context
l You can only modify the time information when the current time is earlier than the time
that the measurement task starts.
l An active measurement task can be suspended only when its consistency status is
normal. Only a suspended task can be modified.
l The origin of the measurement task to be modified is client. That means the
measurement task is manually created by a user on a client.
Steps
1. On the Measurement Task Management tab, perform one of the following operations
to open the Modify Measurement Task dialog box.
l Select the measurement task from the measurement task list, and then click
on the toolbar.
l Right-click the measurement task in the measurement task list, and then select
Modify Measurement Task from the shortcut menu.
2. On the Measurement Task tab, modify the selection of PO(s) as needed.
3. Click OK.
– End of Steps –
Prerequisite
l The Measurement Task Management tab is displayed.
l The measurement task to be deleted is suspended and its consistency status is
normal.
Note:
An active measurement task can be suspended only when its consistency status is normal.
And only a suspended task can be modified.
4-19
Steps
1. On the Measurement Task Management tab, perform one of the following operations
to open the Delete Measurement Task dialog box.
l Select the measurement task from the measurement task list, and then click
on the toolbar.
l Right-click the measurement task in the measurement task list, and then select
Delete Measurement Task from the shortcut menu.
Note:
To delete multiple measurement tasks at a time, press and hold Ctrl, and then click
the measurement tasks individually. After selecting all those measurement tasks, click
on the toolbar.
Prerequisite
l You have the authority of measurement task management.
l The Measurement Task Management tab is displayed.
l The measurement task you want to activate is suspended.
Context
After the task is activated, the U31 R22 queries the performance data of the scheduled
time on the NEs and stores the data in the database.
In addition, the system checks the consistency status of each NE measurement task
involved in the measurement task. If the consistency status of an NE measurement task
is abnormal, the system deems that the activation of the measurement task fails.
Multiple measurement tasks of the same type can be activated or suspended at a time.
Steps
l Right-click the measurement task in the measurement task list, and then select
Activate Measurement Task from the shortcut menu.
l Select the measurement task from the measurement task list, and then click on
the toolbar.
4-20
Note:
If multiple measurement tasks are activated at the same time, task origin of the multiple
measurement tasks must be consistent.
– End of Steps –
Prerequisite
l The Measurement Task Management tab is displayed.
l The measurement task you want to suspend is active.
l The consistency status of the measurement task is normal.
Context
Only an active measurement task with normal consistency status can be suspended.
You can suspend the measurement tasks only from the client.
You can suspend multiple active measurement tasks of the same type at a time when the
origins of these tasks are the same.
Steps
l Right-click the measurement task in the measurement task list, and then select
Suspend Measurement Task from the shortcut menu.
l Select the measurement task from the measurement task list, and then click on
the toolbar.
Note:
If multiple measurement tasks are suspended at the same time, task origin of the
multiple measurement tasks must be consistent.
– End of Steps –
4-21
Prerequisite
l The Measurement Task Management tab is displayed.
l The measurement task to be viewed exists on the Measurement Task Management
tab.
Steps
1. On the Measurement Task Management tab, perform one of the following to open
the View Measurement Task dialog box.
l Double-click the measurement task in the measurement task list.
l Right-click the measurement task in the measurement task list, and then select
View Measurement Task from the shortcut menu.
l Select the measurement task in the measurement task list, and then click on
the toolbar.
2. In the View Measurement Task dialog box, the measurement task, location selection,
and basis information are displayed.
– End of Steps –
Prerequisite
The Measurement Task Management tab is displayed.
Steps
1. To open the View Consistency Status dialog box, perform one of the following
operations:
l Select the measurement task from the measurement task list, and then click
on the toolbar.
l Right-click the measurement task in the measurement task list, and select View
Consistency Status from the shortcut menu..
l Click the Consistency Status column in the measurement task management list.
Button Function
4-22
Button Function
3. Double-click a row in the list of the Consistency Status dialog box. The Detail dialog
box is displayed, indicating the details of the task.
– End of Steps –
Prerequisite
The Measurement Task Management tab is displayed.
Steps
l To synchronize the measurement task, perform one of the following operations:
à Right-click the measurement task, and then select Synchronize Measurement
Task from the shortcut menu.
The system starts synchronizing the measurement task from the server to
corresponding NE(s). And after the completion of synchronization, a message
indicating the synchronization result is displayed on the status bar of the client
window.
– End of Steps –
4-23
different clients. In this case, you can refresh the measurement task list to synchronize
the latest information of measurement tasks from the server to your client.
Prerequisite
The Measurement Task Management tab is displayed
Steps
l To refresh the measurement task, perform one of the following operations:
à Right-click any measurement task in the measurement task list, and then select
Refresh Measurement Task from the shortcut menu.
The local client synchronizes the latest measurement task information from the server
and then refreshes the measurement task list.
– End of Steps –
Prerequisite
l The Measurement Task Management tab is displayed.
l The measurement task file to be imported is prepared.
Context
Make sure that the name of each measurement task defined in the *.xml or *.zip file is
different from those of existing measurement tasks in the system. A measurement task
with the same name as an existing task in the system cannot be imported.
Steps
1. On the Measurement Task Management tab, click the drop-down button on the
toolbar.
2. Select Import the File or Import the File and Use it as Template from the list. The
Import Measurement Task dialog box is displayed.
3. Perform one of the following operations as required.
4-24
To... Do...
Import the file Select the file to be imported, and click the Open button.
ii. View the parameters of the measurement task in the file, and modify the
parameters that can be modified as required.
If the file includes multiple measurement tasks, the system displays the
Import Measurement Task dialog box for each measurement task. You
can modify the parameters of each measurement task as required. The file
is successfully imported only when all the measurement tasks are modified.
– End of Steps –
Prerequisite
l The Measurement Task Management tab is open.
l There is at least one measurement task to be exported.
Steps
1. On the Measurement Task Management tab, perform one of the following operations
to open the Export Measure Task dialog box.
l Right-click the measurement task, and then select Export Measurement Task
from the shortcut menu.
l Select the measurement task, and then click on the toolbar.
Note:
To export multiple measurement tasks, press and hold Ctrl and then click those tasks
individually. After selecting all those measurement tasks, click on the toolbar.
2. In the Export Measure Task dialog box, set the path for saving the file, the file name,
and file type.
4-25
3. Click Save. The selected measurement task is exported to the specified directory.
– End of Steps –
Prerequisite
l The Measurement Task Management tab is displayed.
l The measurement task used for re-collecting performance data is available in the sys-
tem.
Steps
1. On the Measurement Task Management tab, right-click the measurement task,
and then select Add Data Recollection from the shortcut menu. The Add Data
Recollection dialog box is displayed.
2. On the Measurement Task tab, modify the selection of POs as needed.
3. On the Location tab, set the start time, end time, and NE location.
Query Template
A query template can be used for performance data query. By setting and saving query
conditions in a query template, you can conveniently query performance data based on
the preset query conditions.
Template Task
Either query template or common template can be used to schedule a performance data
query task, that is, a template task. The system can automatically start performance data
query in accordance with the settings in the template task and save the query result on the
server.
4-26
You can check the execution result of a template task to get the performance data you
want. By using the template task, it is unnecessary to set query conditions one by one
because the query template or common template in the template task already specifies
the query conditions, including the query granularity, NE location, and the MO location.
To open the Template Task tab in the client window, do one of the following:
l Select Performance > Template Task on the menu bar.
l Select Query&Statistics > Performance Stat > Template Task on the menu bar.
The following describes the template task pane and the task result pane on the Template
Task tab page.
l Template Task Pane
All template tasks in the system are listed in the template task pane.
Table 4-6 describes the functions of buttons on the toolbar on the top of the template
task pane.
Button Function
The task result pane shows the execution result of template tasks. You can export or
run a template task again by clicking corresponding buttons on the toolbar on the top
of the task result pane.
4-27
Button Function
Steps
1. Perform one of the following operations to open the Template Task Management tab.
l From the main menu, select Performance > Template Task Management
l From the main menu, select Statistics > Performance Statistics > Template
Task Management.
For the descriptions of function buttons on the toolbar, refer to Table 4-8.
Button Description
4-28
Button Description
After the template task is executed, the task execution result is displayed in the task
result list. For the descriptions of function buttons on the toolbar of the list, refer to
Table 4-9.
Button Description
– End of Steps –
Context
Performance templates include common templates, current performance query templates,
and history performance data query templates.
l The common template does not include query object/location selection information.
It applies to the following two scenarios: selecting the NE in the topology, and then
querying according to the template. Or, when querying according to the template,
selecting the target NE.
l When the current performance query template and history performance data query
template are created, the query object/location selection information is included. They
apply to the query on the specified NE according to the template. The two templates
cannot be selected when the NE is selected in the topology view and then query is
performed according to the template.
4-29
l Current performance query templates and history performance data query templates
can be saved as common templates.
Common performance (current performance and history performance) query templates
defined by the user include:
l Board temperature current performance query
l Board voltage current performance query
l CPU current performance query
l RAM current performance query
l All NE optical power current performance query
l Convergence layer and above NE optical power history performance query
l Convergence core layer master link traffic and bandwidth utilization current
performance query
l Convergence core layer standby link traffic and bandwidth utilization history
performance (15 minutes) query
l Convergence core layer standby link traffic and bandwidth utilization history
performance (24 hours) query
l Access layer master link traffic and bandwidth utilization current performance query
l Access layer master link traffic and bandwidth utilization history performance (15
minutes) query
l Access layer master link traffic and bandwidth utilization history performance (24
hours) query
l Access layer equipment access interface traffic history performance (24 hours) query
l Core layer equipment access interface traffic history performance (24 hours) query
Steps
1. From the main menu, select Performance > Template Management. The Template
Management tab is displayed.
2. In the Template Management navigation tree, select Current Performance Data
Query Template.
Note:
When customizing the history performance query template, select History
Performance Data Query Template in the Template Management navigation tree.
4-30
l Direct execution: When the index or counter reaches the query time, the system
automatically performs the performance query.
5. Enter the template name, and then click the OK button. The Add Current
Performance Data Query dialog box is displayed.
6. Click the Counter Selection tab, see Figure 4-6. To set related parameters, refer to
Table 4-10.
Table 4-10 Descriptions for Parameters in the Counter Selection Tab
Parameter Description
Granularity The granularity that the system collects the data. The options include
"15 minutes" and "24 hours".
Counters Expands each node, and selects the performance items to which the
performance query template focuses.
Selected counters The performance items selected from Counters are displayed in the area,
for example, CPU utilization.
4-31
7. Click the Location Selection tab. To set related parameters, refer to Table 4-11.
Parameter Description
4-32
4-33
4-34
4-35
Prerequisite
The performance query template is created and performance data exist in the performance
database.
Context
You can only modify one template at a time.
Steps
1. From the main menu of the client window, select Performance > Template Task
Management. The Template Task Management tab is displayed.
2. In the left pane, click the Template Management tab.
3. Expand the template node to display the template list.
4-36
4. Right-click the query template you want to modify, and then select Modify Attribute
from the shortcut menu. The Modify Attribute dialog box is displayed.
5. Modify the template name and/or the operation mode as needed, and click OK. The
Confirm message box is displayed.
6. Click OK to save the modification.
– End of Steps –
Prerequisite
The *.xml file containing the query template information is available on the local client.
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. In the left pane, click the Template Management tab.
3. In the Template Management tree, right-click the query template that you want to
import, and then select Import from the shortcut menu. The Import Template dialog
box is displayed.
4. Select the file to be imported, and then click Open.
5. Enter the template name, select the operation mode, and then click OK.
Note:
The import template name cannot be empty, and should not be the same as other
self-defined template names.
When a query template is imported, the indices and counters under it will also be
imported.
– End of Steps –
Prerequisite
The query template that you want to export is available in the system.
4-37
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. In the left pane, click the Template Management tab.
3. In the Template Management tree, right-click the query template that you want to
export, and then select Export from the shortcut menu. The Export Template dialog
box is displayed.
4. Select the path for saving the template, enter the file name, and then click Save. A
message box is displayed.
5. Click OK. The query template is exported to a *.xml file in the specified path.
– End of Steps –
Prerequisite
The performance measurement task is created.
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. In the left pane, click the Template Management tab, and then expand the Template
Management node to show all query templates in the system.
3. Right-click the query template you want to delete, and then click Delete from the
shortcut menu. The Confirm message box is displayed.
4. Click OK. The query template is deleted.
– End of Steps –
Prerequisite
The query template that you want to use for the template task is available in the system.
4-38
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. Click on the toolbar. The Add Query Template Task dialog box is displayed.
3. Set the task name, template name, start & end time, task status, file type, and task
execution plan.
Note:
The File Type refers to the file type generated after the task is completed.
4. Click OK.
– End of Steps –
Result
l The newly-created query template task is displayed on the Template Task
Management tab. After the query template task is run every time, the system
generates a query result file on the server, and the execution result file information,
including file name and task execution time, is displayed in the file column on the
bottom of the window.
l To copy the result file from the server to the local client, select the result file, and then
click on the toolbar. The Save dialog box is displayed. Select the path for saving
the result file on the local client, enter the file name, and then click the Save button.
l A result file is generated when the task is performed every time. Time stamps are
used to distinguish query result files.
l Click on the toolbar to perform the template task again.
Prerequisite
l You have the authority of template task management.
l The common template you want to use for the template task is available in the system.
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. Click on the toolbar. The Add Common Template Task dialog box is displayed.
4-39
3. Set the task name, template name, start & end time, task status, file type, and task
execution plan.
Note:
You can select multiple common templates for a template task.
Note:
When multiple common templates are used in this template task, you need to set the
location information for all templates listed in the left pane.
Prerequisite
The template task you want to modify is suspended.
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. In the template task pane on the Template Management tab, select a template task
to be modified.
4-40
3. Perform one of the following operations to open the Modify Query Template dialog
box.
l Click on the toolbar.
l Right-click the template task you want to modify, and then select Modify Template
from the shortcut menu.
4. In the Modify Query Template dialog box, modify the information of the template task,
including the task name, template name, execution period, file type, and execution
schedule.
5. Click OK to save the modification.
– End of Steps –
Prerequisite
You have created a template task.
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. Select a template from the left Template Management tree to display all the template
tasks under this template.
3. Perform one of the following operations to open the View Query Template dialog box:
l Double-click the template task.
l Select the template task, and then click on the toolbar.
l Right-click the template task, and then select View Template from the shortcut
menu.
4. After viewing the information of the template task, click OK to close the View Template
Task box.
– End of Steps –
Prerequisite
The template task you want to delete is suspended.
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
4-41
2. In the template task pane on the Template Management tab, select a template task
to be deleted.
3. To delete the template task, perform one of the following operations.
l Click on the toolbar.
l Right-click the template task, and then click Delete Template from the shortcut
menu.
Note:
To delete multiple template tasks at a time, press and hold Ctrl and then click the tasks
one by one. After selecting all those tasks, click on the toolbar.
Prerequisite
The template task you want to activate is suspended.
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. To activate the template task, perform one of the following operations.
l Click on the toolbar.
l Right-click the template task, and then select Activate Template Task from the
shortcut menu.
– End of Steps –
Result
The status of the template task changes from into .
4-42
Prerequisite
The template task is created and in activating status.
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. To suspend the template task, perform one of the following operations.
l Click on the toolbar.
l Right-click the template task, and then click Suspend Template from the shortcut
menu.
– End of Steps –
Result
The status of the template task changes from into .
Prerequisite
l The template is created.
l The template task is activated or suspended.
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. Perform one of the following operations to open the Finish Template dialog box.
l Click on the toolbar.
l Right-click the template task, and then click Finish Template from the shortcut
menu.
3. In the Confirm message box, click OK.
– End of Steps –
Prerequisite
You have the authority of template task management.
4-43
Steps
1. From the main menu, select Performance > Template Task Management. The
Template Task Management tab is displayed.
2. Perform one of the following operations to refresh the template task.
l Click on the toolbar.
l Right-click the template task, and then click Refresh from the shortcut menu.
– End of Steps –
4-44
Table 4-13 describes the functions of the buttons on the toolbar of the Common Template
tab.
Button Function
Steps
1. From the main menu, select Performance > Query Template Management. The
Template Management tab is displayed.
2. On the toolbar, click . The Add Common Template dialog box is displayed.
3. Configure the parameters.
Parameter Description
Access type Classified into three modes: share, private, and public.
4-45
Parameter Description
Query type l Common query: Select available indices/counters to set access type
and statistic information including location group, query granularity, and
effective time.
l Current query: Select available indices/counters to query corresponding
performance parameters.
Available in- Set the NE type, MO type, and performance counter indexes for the template.
dices/coun- The selected counters are displayed in the Selected indices/counters area.
ters
4. (Optional) For the Common query type, set the logic condition.
a. Click Logic. The Logic Filtering/Rendering dialog box is displayed.
b. Configure the filter type.
In the Logic Filtering/Rendering dialog box, you can set the filtering and
rendering rules based on logical operation for each index or counter as needed.
The system will filter and render the query result in accordance with the rules,
including And or Or.
l If And is selected, the system displays the query result only when the result
of logic operation set for each index or counter in the list is true.
l If Or is selected, the system displays the query result as long as the result of
logic operation set for one index or counter in the list is true.
c. Select an index or a counter as needed, and define the filter conditions by setting
filter operation methods and filter values.
d. In the Rendering column, click the index/counter you need. The Threshold
Rendering dialog box is displayed.
e. Set threshold values and rendering colors for each threshold.
f. Click OK to close the Threshold Rendering dialog box.
g. Click OK to close the Logic Filtering/Rendering dialog box.
5. (Optional) For the Common query type, set the TopN condition.
a. Click TopN. The TOPN Filtering/Rendering dialog box is displayed.
b. Set filtering conditions.
Use an index or counter "Top Max N" as an example, and assume N = 1.
l No group: The system queries all the records, and then returns the maximum
record (if there are several records in the first place, the system only returns
the first record. No group is generally used for analyzing the maximum or
minimum values of all performance data.
l Group by time: The system queries all the records, and displays the record
of the maximum values in the query result of each hour. It is generally used
for analyzing the best or worst object at specific time point during a period.
4-46
– End of Steps –
Related Tasks
l Viewing a Common Template
Right-click the template, and then click View Template from the shortcut menu, or on
the toolbar, click .
l Refreshing Common Templates
Right-click any common template, and then click Refresh from the shortcut menu, or
on the toolbar, click .
l Deleting a Common Template
Right-click the template, and then click Delete Template from the shortcut menu, or
on the toolbar, click .
Steps
1. From the main menu, select Performance > Template Management. The Template
Management tab is displayed.
2. Select a common template, and perform one of the following operations to open the
Modify Common Template dialog box.
l Right-click the template, and then click Modify Template from the shortcut menu.
l On the toolbar, click .
4-47
4. Click OK.
– End of Steps –
Steps
1. From the main menu, select Performance > Template Management. The Template
Management tab is displayed.
2. Select a common template, and perform one of the following operations to open the
View Common Template dialog box.
l Right-click the template, and then click View Template from the shortcut menu.
l On the toolbar, click .
3. View the parameter settings of the template.
– End of Steps –
Steps
1. From the main menu, select Performance > Template Management. The Template
Management tab is displayed.
2. Select a common template, and perform one of the following operations to open the
Delete Template dialog box.
l Right-click the template, and then click Delete Template from the shortcut menu.
l On the toolbar, click .
3. Click OK.
– End of Steps –
Steps
1. From the main menu, select Performance > Template Management. The Template
Management tab is displayed.
4-48
l Right-click any common template in the template list, and then click Refresh from
the shortcut menu.
l On the toolbar, click .
– End of Steps –
Steps
1. From the main menu, select Performance > Query Template Management. The
Template Management tab is displayed.
2. Perform the following operations as required.
To... Do...
Note:
You can also perform the following operation to open the Export Template dialog box:
Select a common template to be exported, and click the drop-down button on
the toolbar to select Export Selected Template(s) or Export All Templates from the
list.
3. Set the path for saving the common template and the file name.
4. Click Save. A message box is displayed.
5. Click OK.
The common template is exported to an *.xml file under the specified path.
– End of Steps –
4-49
Prerequisite
The file containing the information of the common template you want to import is available
on the local client.
Steps
1. From the main menu, select Performance > Query Template Management. The
Template Management tab is displayed.
2. Perform one of the following operations to open the Import Template dialog box.
l On the toolbar, click .
l Right-click any common template, and select Import Template from the shortcut
menu.
3. Find the file to be imported, and click Open. The Import Common Template dialog
box is displayed.
Note:
The template number and name cannot be duplicated with the number and the name
of the common template in the system.
4-50
Prerequisite
l You have the operation authority of performance management.
l The performance measurement task is created, and the performance data exists in
the performance database.
l The link is created on the NE whose performance requires to be queried.
Steps
l Query the current performance of the NE.
In the Topology Management window, select one or multiple NEs, and then select
Performance Management > Current Performance Data Query. The Add Current
Performance Data Query dialog box is displayed.
The performances queried are displayed in the Current Performance Data Query
window. By default, the current performance data of 15 minute granularity is queried.
Parameter Description
Available When Common template is not selected, the user can expand each
indices/counters node and select the performance items to be queried.
Selected The performance items selected from Counters are displayed in the
indices/counters area.
3. On the Object Selection tab. Set the related parameters. For a description of the
parameters, refer to Table 4-15.
Parameter Description
Location group Selects the location group, for example, Query raw data.
4-51
Parameter Description
4. On the Time Selection tab. Set the related parameters. For a description of the
parameters, refer to Table 4-16.
Parameter Description
Query granularity The period that the system performs the performance data
query.
Time settings The time period when the system queries the performance
data.
Effective date The system only queries the performance data on the effective
date.
Effective time The system only queries the performance data in the effective
time period.
5. Click OK. The performances queried are displayed in the History Performance
Data Query window.
– End of Steps –
Menu Description
Performance > Realtime Monitors the realtime performance of boards, ports, tunnels, PWs,
Traffic Management > CIPs, and L3 VPNs.
Realtime Traffic Monitoring
4-52
Menu Description
Performance > Query Queries the performances through the common template or
Template Management user-defined template.
Performance > Archive Displays archived data in various forms based on the specified query
Query conditions.
Prerequisite
l The user has the operation authority of performance management.
l The performance measurement task is created, and the performance data exists in
the performance database.
Steps
l Monitor real-time performance.
1. In the operation window of the U31 R22, select Performance > Realtime Traffic
Management > Realtime Traffic Monitoring. The Realtime Traffic Monitoring
window is displayed.
5. In the Stop Settings area, click the Set Sample times or Set Stop time option
button.
6. Click Start.
1. In the operation window of the U31 R22, select Performance > Current
Performance Data Query. The Add Current Performance Data Query dialog
box is displayed.
4-53
2. Set the query parameters in the Counter Selection and Location Selection tabs.
The way to set parameters in the main menu is the same as that in the topology
view.
3. On the Counter Selection tab, set the related parameters. For a description of
the parameters, refer to Table 4-18.
Parameter Description
Selected counters The performance items selected from the Counters navigation
tree are displayed in the area.
4. On the Location Selection tab. Set the related parameters. For a description of
the parameters, refer to Table 4-19.
Parameter Description
5. Click OK. The performance queried is displayed in the Current Performance Data
Query window.
4-54
Note:
After the query conditions are set, you can click Save as Query Template and Save
as Common Template to save the conditions into a query template and a common
template respectively.
Note:
In addition, the user can click on the toolbar to open the History Performance
Data Query dialog box.
2. In the Index/Counter Selection, Object Selection, and Time Selection tabs, set
query parameters. The way to set parameters in the main menu is the same as
that in the topology view.
3. Click OK. The performance queried is displayed in the History Performance Data
Query window.
Note:
After the query conditions are set, you can click Save as Query Template and Save
as Common Template to save the conditions into a query template and a common
template respectively.
Parameter Description
4-55
Parameter Description
Granularity The granularity that the system collects the data. The options
include "15 minutes" and "24 hours".
Time settings Sets the time period that the straight-through performance
is queried.
Selected counters The performance items selected from Counters are displayed
in the area, for example, CPU utilization.
3. Click the Location Selection tab. To set related parameters, refer to Table 4-21.
4-56
Parameter Description
2. Select the template type in the template management navigation tree on the left.
All templates of this type are displayed on the right of the window, see Figure 4-9.
3. Right-click a template, and then select Query by Template from the shortcut
menu, or click on the toolbar. The Add Current Performance Data Query
dialog box is displayed.
Note:
In the Add Current Performance Data Query dialog box, parameters in the
Counter Selection tab are preset in the template. These parameters can be
modified by the user before the query. Parameters in the Location Selection
need to be set here.
4. Click the Location Selection tab, and then set the related parameters.
4-57
5. Click OK. The performances queried according to the template are displayed in
the Current Performance Data Query window.
l Query archived data.
1. In the main menu, select Performance > Archive Query. The Archive Query
dialog box is displayed.
2. On the Index/Counter Selection tab, set the parameters. For a description of the
parameters, refer to Table 4-22.
Parameter Description
Available indices/counters Expand the nodes and select the performance items that you
want to query.
Selected indices/counters Displays the selected indices or counters, for example, the
number of ETC frames lost.
3. Click the Object Selection tab. Set the parameters. For a description of the
parameters, refer to Table 4-23.
Parameter Description
4. Click the Time Selection tab. Set the parameters. For a description of the
parameters, refer to Table 4-24.
Parameter Description
4-58
Parameter Description
5. Click OK.
Note:
After the query conditions are set, you can click Save as Query Template and Save
as Common Template to save the conditions into a query template and a common
template respectively.
– End of Steps –
Prerequisite
l You have the operation authority of performance management.
l The performance measurement task is created, and the performance data exists in
the performance database.
l The link is established for the NE of which the current performance needs to be
queried.
Steps
1. From the main menu, select Service > Service View. The Service View window is
displayed.
2. Perform the following operations as required.
4-59
To... Do...
Query the current In the service list, right-click the service to be queried, and then select Query
performance of the > Current Performance. The current performance corresponding to the
service service is displayed in the window.
Query the current In the service list, right-click the service to be queried, and then select Query
performance including > Current Performance (Inc Server Layer). The current performances
the service layer corresponding to the service and its server layer service are displayed in
the window.
– End of Steps –
Prerequisite
l You have the operation authority of performance management.
l The performance measurement task is created, and the performance data exists in
the performance database.
l The link is established for the NE of which the current performance needs to be
queried.
Steps
1. In the Topology Management window, double-click the NE to be queried. The Rack
Chart window is displayed.
2. Perform the following operations as required.
4-60
To... Do...
– End of Steps –
Prerequisite
l You have the operation authority of performance management.
l The performance measurement task is created, and the performance data exists in
the performance database.
l The link is created on the NE whose performance requires to be queried.
Steps
1. Open the BN NE Resource View window in either of the following ways.
l On the toolbar, click the icon. The BN NE Resource View window is
displayed.
l In the Topology Management view, select Configuration > BN-IP NE
Configuration > BN NE Resource View. The BN NE Resource View window
is displayed.
l In the Topology Management view, right-click one NE, and then select BN NE
Resource View. The BN NE Resource View window is displayed.
4-61
To... Do...
Query the current performance Right-click one NE, and then select the shortcut menu
of the NE Performance Management > Current Performance Data Query.
– End of Steps –
Prerequisite
l You have the authority of performance management.
l The performance data query result window is displayed.
Context
l There are three types of chart display: bar chart, line chart, and pie chart.
l Chart display is available only to history performance data.
Steps
l Perform the following operations to display the query result in chart mode.
2. Set the chart type, chart attribute, chart style, query object, index or counter.
3. Click the Apply button. The performance data is displayed in the chart.
l To display the query result in table mode, click Table. The performance data is
displayed in the list.
– End of Steps –
4-62
Prerequisite
The performance data query result window is displayed.
Context
The formats of exported files include txt, htm, pdf, xls, csv, prn, xlsx, and xml.
A maximum of 10,000 data records can be exported to one file. If the query result has
more than 100,000 data records, the data records will be exported in two or more files.
Steps
1. In the Query-checkpoint window, click on the toolbar. The Save dialog box is
displayed.
2. Set the path for saving the file, file name, and file type.
Note:
For the history performance data, you can set report title, measurement type, query
time, editor, and creating time in the Save dialog box.
3. Click Save.
– End of Steps –
Prerequisite
The performance data query result window is displayed.
At least one group of performance data is queried.
Context
The exported files is in txt, htm, pdf, xls, csv, prn, xlsx, or xml format.
Steps
1. In the Query-checkpoint window, click on the toolbar. The Export All dialog box
is displayed.
4-63
2. Set the export scope, file type for saving, and file directory.
3. Click OK.
– End of Steps –
Prerequisite
l The performance data query result window is displayed.
l The connection between the printer and the system is normal.
Context
l Only the history performance data can be printed.
l The system can print 5,000 data records at most. If the query result has more than
5,000 data records, the extra data records cannot be printed.
Steps
1. In the Query-checkpoint window, click on the toolbar. The Print Setup dialog
box is displayed.
2. Set print parameters on the General, Page Setup, and Advance tabs as required.
3. Click Preview All to view the printing result.
4. Click the Print button.
– End of Steps –
The U31 R22 system collects performance data according to the conditions set in
measurement tasks and stores the collected performance data in its database when the
managed NEs and the U31 R22 server are running properly and the communication
between them is normal. When the connection between an NE and the server is
interrupted, U31 R22 cannot collect the performance data of the NE, which impairs the
integrity of performance data.
U31 R22 provides the function of performance data integrity report. By using this function,
you can check the integrity of performance data of each measurement type stored in the
database and find the period(s) during the required performance data is absent.
4-64
If some performance data is found absent in the database, you can initiate a re-collection
process to collect the performance data and store the collected data in the database.
Prerequisite
l You have the authority of performance management.
l The system has collected performance data in accordance with the measurement
tasks in the system and stored the collected data in the database.
Steps
1. From the main menu, select Performance > Data Integrity Query. The Add Data
Integrity Query dialog box is displayed.
2. Click the Object Selection tab.
3. Select the NE type, MO type and PO you want to check.
Note:
Multiple POs can be selected in the PO area.
4. Click the Location Selection tab, and then select the NE(s).
5. Click the Time Selection tab, and then select Query Data Source and Time settings.
6. Click OK.
– End of Steps –
Result
The Data Integrity Query tab is displayed to show the integrity of the selected PO.
The Integrity Status column shows the data integrity of each NE.
l Have Data means that the performance data at each collection point (every 15
minutes by default) during the query period is available.
l No Data means that no performance data at each collection point is queried.
Suppose the query period is a day. If the system succeeds to query the performance
data at collection points during a period (00:00:00 to 12:00:00), but fails to query
performance data at collection points during the other period (12:00:00 to 00:00:00),
the integrity query result will be displayed on two rows, with the Integrity Status as
Have Data and No Data respectively.
4-65
l You can perform the operations on the data integrity result by using the toolbar buttons
on the Data Integrity Query tab.
Prerequisite
l You have entered the Data Integrity Query tab.
l You have checked the integrity of performance data and the integrity report is dis-
played in the client window.
Context
The integrity report of performance data can be saved as a *xml, *.txt, *.htm, *.pdf, *.csv,
*prn, *xlsx, or *.xls file.
Steps
1. On the Data Integrity Query tab, click on the toolbar. The Save dialog box is
displayed.
2. Select the path for saving the query result and enter the file name.
3. Select the File Type, and then click Save.
– End of Steps –
Prerequisite
l You have the authority of performance management.
l The performance data query result window is displayed.
Steps
1. In the Current Performance Data Query or History Performance Data Query
window, right-click a performance entry, and select Open Rack Chart from the
shortcut menu. The Rack Chart window is displayed.
The board on which this performance occurs is selected in the rack chart.
– End of Steps –
4-66
Prerequisite
l You have the authority of performance management.
l The performance data query result window is displayed.
Steps
1. In the Current Performance Data Query or History Performance Data Query
window, right-click a performance entry, and select Locate Alarm to NE from the
shortcut menu. The Topology Management window is displayed.
The icon of the NE on which this performance occurs is selected on the topology graph.
– End of Steps –
Prerequisite
l You have the authority of performance management.
l The performance data query result window is displayed.
Context
Only the current performance counter can be cleared.
Steps
1. In the Current Performance Data Query window, right-click one or multiple
performance entries, and select Clear Performance Counter from the shortcut
menu.
2. On the toolbar, click the button to refresh the current performance of the system.
– End of Steps –
4-67
managed NEs and the U31 R22 server are running properly and the communication
between them is normal. When the connection between an NE and the server is
interrupted, U31 R22 cannot collect the performance data of the NE, which impairs the
integrity of performance data.
U31 R22 provides the function of performance data integrity report. By using this function,
you can check the integrity of performance data of each measurement type stored in the
database and find the period(s) during the required performance data is absent.
If some performance data is found absent in the database, you can initiate a re-collection
process to collect the performance data and store the collected data in the database.
Prerequisite
l You have the authority of performance management.
l The system has collected performance data in accordance with the measurement
tasks in the system and stored the collected data in the database.
Steps
1. From the main menu, select Performance > Data Integrity Query. The Add Data
Integrity Query dialog box is displayed.
2. Click the Object Selection tab.
3. Select the NE type, MO type and PO you want to check.
Note:
Multiple POs can be selected in the PO area.
4. Click the Location Selection tab, and then select the NE(s).
5. Click the Time Selection tab, and then select Query Data Source and Time settings.
6. Click OK.
– End of Steps –
Result
The Data Integrity Query tab is displayed to show the integrity of the selected PO.
The Integrity Status column shows the data integrity of each NE.
l Have Data means that the performance data at each collection point (every 15
minutes by default) during the query period is available.
4-68
Prerequisite
l You have entered the Data Integrity Query tab.
l You have checked the integrity of performance data and the integrity report is
displayed in the client window.
Context
The integrity report of performance data can be saved as a *xml, *.txt, *.htm, *.pdf, *.csv,
*prn, *xlsx, or *.xls file.
Steps
1. On the Data Integrity Query tab, click on the toolbar. The Save dialog box is
displayed.
2. Select the path for saving the query result and enter the file name.
3. Select the File Type, and then click Save.
– End of Steps –
Steps
1. From the main menu, select Performance > Realtime Traffic Management > Display
Style Setup. The Display Style Setup dialog box is displayed.
4-69
2. Select the display style of data packets from the Package/Frame list, for example,
packets.
3. Select the display style of bytes from the Byte list, for example, Mbps.
4. Select the unit from the Times/Num list, for example, times.
5. Click OK. A message box is displayed.
– End of Steps –
Prerequisite
l You have the permissions to perform the operation.
l The monitored NEs are online.
Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Management Monitoring. The Realtime Management Monitoring dialog
box is displayed.
2. Set parameters of real-time traffic monitoring parameters. For the parameter
descriptions, refer to Table 4-25.
Parameter Description
MO Type Select a monitored object from the drop-down list, for example, Port.
Sample Period(s) Select a sampling period from the list, or select Other to set a
self-defined sampling period.
Range of a self-defined sampling period: 20 to 900.
4-70
Parameter Description
Stop Settings Select Manual, Set Sample times, or Set Stop time.
3. Click Start.
– End of Steps –
Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Traffic Task. The Realtime Traffic Task window is displayed.
This procedure uses querying current tasks as an example.
2. In the left navigation tree, select the NE on which the real-time traffic tasks are to be
queried.
3. On the Current Task tab, set the task start mode, task state, monitoring object type,
and start & end time in the Query Condition area.
4. Click Query. The current traffic monitoring tasks of the selected NE are displayed in
the list.
5. Query the performance data.
a. Select a task from the current task list.
b. Click Show Monitor Data. The PM Realtime Monitor dialog box is displayed.
You can view the performance data in graphics or tables.
– End of Steps –
Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Traffic Task from the menu. The Realtime Traffic Task window is
displayed.
4-71
Task Type Select a task type, for example, Single The two task types are described as
me task. follows:
l A single NE task can monitor
ports, tunnels, PWs, or L3 VPNs
of an NE.
l An E2E task can monitor the traffic
of tunnels or PWs between NEs.
Sample Select a sampling period from the list, Range of a self-defined sampling
Period(s) or select Other to set a self-defined period: 20 to 900.
sampling period.
5. Click OK.
– End of Steps –
4-72
Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Traffic Task from the menu. The Realtime Traffic Task window is
displayed.
2. In the left navigation tree, select the NE on which the real-time traffic task is to be
modified.
3. Click Query. The current traffic monitoring tasks of the selected NE are displayed in
the list.
4. Select the task to be modified, and then click Modify. The Modify PM Realtime
Monitor Task dialog box is displayed.
5. Modify the task name.
6. Click OK. A message box is displayed.
7. Click OK.
– End of Steps –
Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Traffic Task. The Realtime Traffic Task window is displayed.
2. In the left navigation tree, select the NE on which the real-time traffic task is to be
stopped.
3. Click Query. The current traffic monitoring tasks of the selected NE are displayed in
the list.
4. Select the task to be stopped, and then click Stop & End Monitoring. The Confirm
message box is displayed.
– End of Steps –
Prerequisite
The real-time traffic monitoring task is stopped.
4-73
Steps
1. From the main menu, select Performance > Realtime Traffic Management >
Realtime Traffic Task from the menu. The Realtime Traffic Task window is
displayed.
2. Click the History Task tab.
3. In the left navigation tree, select the NE on which the real-time traffic task is to be
deleted.
4. Click Query. The historical traffic monitoring tasks of the selected NE are displayed
in the list.
5. Select the task to be deleted, and then click Delete. The Confirm message box is
displayed.
6. Click Yes. A message box is displayed.
7. Click OK.
– End of Steps –
4-74
You can also define and manage performance index in accordance with the actual
requirements in the system. If a customized index is not used any longer, you can
modify or delete the formula of the index.
Note:
l The default indexes provided by the system cannot be modified or deleted.
l The value of each counter in a KPI formula comes from basic measured data.
On request of querying the value of a KPI, the system calculates the value in
accordance with the KPI formula and displays the calculation result on the client
interface. The system can also query corresponding counters from the database to
calculate the history value of a KPI. It displays the calculation result of the history KPI
value, which reflects the variation of the KPI during a period.
Prerequisite
l You have the authority of counter management.
l You have completed the configuration of the NE that you want to query.
4-75
Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Expand the Resource Type tree in the Model Management pane to find the measure
object you want to view.
3. Expand the measure object node and then click Counter to show the counter types of
the measure object on the Counter and Index Management tab.
– End of Steps –
Prerequisite
l You have the authority of counter management.
l You have completed the data configuration of the NE you want to view.
Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Expand the Resource Type tree in the Model Management pane to find the measure
object you want to view.
3. Expand the measure object node, and then perform one of the following operations to
show all counters of a counter type on the Counter and Index Management tab.
l Click before the Counter node under the measure object, and then click the
counter type you want to view.
l Click the Counter node, and then double-click the counter type displayed on the
Counter And Index Management tab.
Note:
To show all counters of the measure object, right-click the measure object node or the
Counter node, and then click Show Counter from the shortcut menu.
– End of Steps –
4-76
Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Expand the Resource Type tree in the Model Management pane to find the object
you want to measure.
3. Click before the measure object node, and then select the index node (This
procedure uses key performance as an example).
Note:
To open the New Index dialog box, you can also right-click the Key PI node, and then
click New Index from the shortcut menu.
Parameter Description
Display format Select the format of the index value from the Display Format drop-down
list box in accordance with the type of the index you want to create:
"Integer", "Float", "Percent" or "Boolean (1/0)".
The following introduces the constraint relationship between index type
and value format.
l For KPI, the value format can be "Integer", "Float", "Percent" or
"Boolean (1/0)".
l For PI, the value type can be "Integer", "Float", or "Percent".
l For SPI, the value type can only be "Boolean (1/0)".
4-77
Parameter Description
Format The index value type has a constraint relationship with the index type
selected in step 3:
l For KPI, the value format can be "Integer", "Float", "Percent" or
"Boolean (1/0)".
l For PI, the value type can be "Integer", "Float", or "Percent".
l For SPI, the value type can only be "Boolean (1/0)".
Index value Enter the exception value of the index, which is the calculation result
when the denominator of the index formula is zero.
6. Click the Index Formula tab, and then edit the formula in accordance with the
counter and operators. A formula can be displayed in name style or ID style. You
can view counter names and IDs. For example, packet loss ratio = Loss packets
/ Total packets, where the number of packets lost and the total number of packets
are counters.
Note:
The following describes the meanings of four special keys on the on-screen keyboard:
l C followed with a number indicates a counter.
l Gr indicates the collection granularity.
l P followed with a number indicates a performance index.
l NO indicates the number of measure objects.
In the Editor formula area, the formula is displayed in two styles: name style and ID
style.
7. Click the Preset Threshold tab, and set the parameters.
Parameter Description
Up The larger the value the more serious the alarm level
Down The smaller the value the more serious the alarm level
Up and Down The "Up and Down" direction means that the index follows the alarm
threshold rules in both "Up" and "Down" directions. For example,
the environment temperature and the rotate speed of fans must be
within a proper range, which cannot be too high or too low.
4-78
Parameter Description
Critical Critical alarms are generated when the performance indices exceed
the critical value. When the performance indices are lower than the
Major
critical value, alarms are removed.
Minor
When the direction is "Up", set the thresholds based on the following
Warning constraints:
l Warning alarm threshold < Minor alarm threshold - Delta
l Minor alarm threshold < Major alarm threshold - Delta
l Major alarm threshold < Critical alarm threshold - Delta
When the direction is "Down", set the thresholds based on the
following constraints:
l Warning alarm threshold > Minor alarm threshold + Delta
l Minor alarm threshold > Major alarm threshold + Delta
l Major alarm threshold > Critical alarm threshold + Delta
The unit of alarm thresholds is related to the unit of the measurement
items.
Note:
The system judges the validity of the index formula. If the index formula is invalid,
a message will pop up to prompt the error. If the index formula is valid, the system
prompts the successful creation of the index and allocates a unique ID to the index.
The new index is displayed in corresponding index list
– End of Steps –
4-79
Prerequisite
l You have the authority of index management.
l The index you want to modify is a user-defined index.
Context
l The default performance indexes provided by the system cannot be modified.
l Only one index can be modified at a time.
l The MO type, NE type and index value format of user-defined indexes cannot be
modified.
Steps
1. From the main menu, select Performance > Counter And Index Management. The
Counter And Index Management tab is displayed.
2. Perform one of the following operations to open the Modify Index dialog box:
l Right-click the index to be modified, and then click Modify Index from the shortcut
menu.
l Click the index to be modified, and then click on the toolbar.
3. In the Modify Index dialog box, modify the information as needed.
Note:
For the description of the parameters in the dialog box, refer to 4.7.3.1 Creating an
Index.
4. Click OK in the Modify Index dialog box to confirm the modification. A message box
indicating modification success is displayed.
5. Click OK to complete the modification.
– End of Steps –
Prerequisite
l You have the authority of index management.
l The index you want to view is a user-defined index
Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter And Index Management tab is displayed.
4-80
2. Expand the Resource Type tree in the Model Management pane to find the measure
object.
3. In the text box, enter key words to find the target index.
4. After finding the target index you want to view, perform one of the following operations
to open the View Index box.
l Right-click the target index and then click View Index from the shortcut menu.
l Select the target index, and then click on the toolbar.
l Right-click the target index.
– End of Steps –
Prerequisite
l You have the authority of index management.
l The index you want to delete is a user-defined index.
Context
You can forcibly delete multiple indexes at the same time.
Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. In the index list, find the user-defined index you want to delete, and then perform one
of the following operations:
l Right-click one or multiple target indexes (or press the Ctrl key), and then select
Delete index from the shortcut menu.
l Select one or multiple target indexes, and then click on the toolbar.
3. In the Confirm message box, click OK.
– End of Steps –
Prerequisite
l You have the authority of index management.
4-81
Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. In the index list, perform one of the following operations to open the Move Index dialog
box.
l Right-click one or multiple indexes, and then click Move Index from the shortcut
menu.
l Click one or multiple indexes, and then click on the toolbar.
3. In the Move Index dialog box, select the group to which you want to move the index,
and then click OK. A message box is displayed, indicating that the index is successfully
moved.
4. Click OK.
– End of Steps –
Prerequisite
l You have the authority of index management.
l The index you want to export is a user-defined index.
Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Perform the following operations as required.
To... Do...
3. In the Save dialog box, set the path for saving the index file and file name.
4. Click the Save button. A message box is displayed, indicating that the indexes are
successfully exported.
4-82
5. Click OK.
– End of Steps –
Prerequisite
l You have the authority of index management.
l The .xml file containing the information of the indexes you want to import is available
on the local client.
Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Perform one of the following operations to open the Import Index dialog box:
l Right-click any index, and select Index Export from the shortcut menu.
l Click on the toolbar.
3. In the Import Index dialog box, select the index file (*.xml).
4. click the Open button to select the index(es) to be imported in the Index Export dialog
box.
5. Click the Import button. A message box is displayed, indicating that the indexes are
imported successfully.
Note:
If Overwrite is selected in the Index ID conflict options area, a newly imported index
will forcibly overwrite an existing index with the same name. If the name of an index
to be imported is same as that of an existing index in the system, the index will fail to
be exported by default.
If Append is selected, a new index will be assigned a new ID. The name of a new index
cannot be the same as any existing index name, but the content of the new index can
be the same as that of an existing one. t
– End of Steps –
4-83
indexes on your client due to the response time between the server and different clients.
In this case, you can refresh the indexes to synchronize the latest index information from
the server to your client.
Steps
1. From the main menu, click Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. Perform one of the following operations to refresh the indexes in the system:
l Right-click any node in the Resource Type tree, and then click Refresh from the
shortcut menu.
l Click on the toolbar.
– End of Steps –
Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. On the left Model Management tab, expand the Resource Type > BN-xTN > CTN
navigation tree.
3. Expand the performance index of the target index type, and right-click the
corresponding performance index node, for example, right-click Key PI, and then
click New Group from the shortcut menu. The New Group dialog box is displayed.
4. Enter the group name in the Group Name text box, and click OK.
The created group is displayed under the Key PI node.
– End of Steps –
Steps
1. From the main menu, select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. On the left Model Management tab, expand the Resource Type > BN-xTN > CTN
navigation tree.
4-84
3. Expand the performance index of the target index type, and click the corresponding
performance index node. This procedure uses Key PI as an example.
4. Right-click the index group in the index list, and then select Modify Group from the
shortcut menu. The Modify Group dialog box is displayed.
5. Enter a new name in the Group Name text box.
6. Click OK.
– End of Steps –
Steps
1. From the main menu, Select Performance > Counter and Index Management. The
Counter and Index Management tab is displayed.
2. On the left Model Management tab, expand the Resource Type > BN-xTN > CTN
navigation tree.
3. Expand the performance index of the target NE type, and the click the corresponding
performance index node.
4. Right-click the index group in the index list, and then select Delete Group. The
Confirm message box is displayed.
5. Click OK.
– End of Steps –
Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.
2. Click on the toolbar. The Add Threshold Task dialog box is displayed.
3. On the Threshold Task tab, set the NE type, MO type, and Threshold index by
performing the following steps:
a. Select an NE type from the NE type list, for example, ZXCTN 6120.
4-85
Note:
You can select multiple NE types.
b. Select a wildcard level from the Wildcard level list, for example, NE.
c. Select the NE location in the NE location area.
Note:
If the wildcard level is All, you do not need to set the NE location.
Note:
If the wildcard level is All or NE, you do not need to set the MO location.
4-86
Parameter Description
c. Select the status from the Task status list, for example, Activated.
d. Select the granularity from the Granularity list, for example, 15 minute(s).
e. In the Effective date area, select the week or month, and then select a date, for
example, Monday.
f. In the Effective time area, select the start time and end time, and then click Add
to add the duration to the list below.
8. Click OK. The creation of a threshold task is completed.
– End of Steps –
Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.
2. In the left navigation tree, select the NE on which threshold tasks are created.
3. In the upper-right corner, select the task status from the Display Status list, for
example, Activated tasks.
All activated threshold tasks on the NE are displayed in the list.
– End of Steps –
4-87
Prerequisite
The status of the threshold task is suspended.
Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.
2. In the left navigation tree, select the NE on which threshold tasks are created.
3. In the upper-right corner, select Suspended tasks from the Display Status list.
4. Right-click the threshold task to be modified and select Modify Threshold Task from
the shortcut menu. The Modify Threshold Task dialog box is displayed.
Note:
The dimmed parameters cannot be modified.
– End of Steps –
Prerequisite
The status of the threshold task is suspended.
Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.
2. In the left navigation tree, select the NE on which threshold tasks are created.
3. In the upper-right corner, select Suspended tasks from the Display Status list.
4. Right-click the threshold task to be deleted and select Delete Threshold Task from
the shortcut menu. The Delete Threshold Task dialog box is displayed.
4-88
5. Click OK.
– End of Steps –
Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.
2. In the left navigation tree, select the NE on which threshold tasks are created.
3. In the upper-right corner, select Activated tasks from the Display Status list.
4. Right-click the threshold task to be suspended, and select Suspend Threshold Task
from the shortcut menu.
– End of Steps –
Steps
1. From the main menu, select Performance > Threshold Task Management. The
Threshold Task Management tab is displayed.
2. In the left navigation tree, select the NE on which threshold tasks are created.
3. In the upper-right corner, select Suspended tasks from the Display Status list.
4. Right-click the threshold task to be activated, and select Activate Threshold Task
from the shortcut menu.
– End of Steps –
4-89
4-90
Context
This function is applicable to the SDH, CTN, WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report
> Managed Elements Statistics Report from the main menu. The Managed
Elements’ Statistics Report dialog box is displayed.
2. In the left Device Resource navigation tree, select the desired NEs.
3. Click Query to check the configuration information about the selected NEs.
4. Perform the following operations as required.
To... Do...
5. Click the Statistics tab. Select an option from the Statistic Condition list. For a
description of the parameters, refer to Table 5-1.
5-1
Parameter Description
According to the device Queries the rate level, quantity and percentage of each selected
type NE, and the total number of selected NEs.
According to the network Queries the number of selected NEs at each network level.
level
According to the Queries the device type, number, and percentage of each selected
configured highest service NE and the total number of selected NEs based on the highest,
rate configured service rate.
6. Click Query.
7. (Optional) Customize query conditions.
a. On the Statistic tab, select Define. The Define Statistic Conditions dialog box
is displayed.
b. Click New. Set Define Name. From the left list, select the desired query
conditions. Click Right. The selected conditions are moved to the right list.
Note:
To delete a selected condition from the right list, select it and then click Left.
c. Click Apply. Click Close. From the Statistic Condition list, select the newly
added condition.
To... Do...
– End of Steps –
5-2
Context
This function is applicable to the CTN, WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > Slot
Statistics Report from the main menu. The NE Slot Information Report dialog box
is displayed.
2. In the left Device Resource navigation tree, select the NEs whose slot information
you want to query.
3. Click Query. The configurations of the selected NEs are displayed.
To... Do...
5. Click the Statistics tab. From the Statistic Condition list, select the default
condition—Slot Utilization Statistic.
6. Click Query to view the rack type, shelf type, number of used slots, number of available
slots, total number of slots, and usage of a used slot of each selected NE.
7. Perform the following operations as required.
To... Do...
Save the slot statistics on the selected NEs locally Click the Export button.
Print the slot statistics on the selected NEs Click the Print button.
– End of Steps –
Context
This function is applicable to the SDH, CTN, WDM and OTN NEs.
5-3
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report >
Managed Boards Statistics Report from the main menu. The Managed Boards
Statistics Report dialog box is displayed.
2. In the left Device Resource navigation tree, select the required NEs.
3. (Optional) Click Synchronize Board Hardware Information to synchronize the board
hardware information.
Note:
You can also query the PCB version, application version, FPGA version, Boot version,
serial number, and component number.
On the U31 R22 client, select Configuration > Export Engineering Device Info >
Export Transmission Engineering Device Info from the main menu to perform the
operations.
Parameter Description
Occupied Number The number of the ports on which services are configured.
To... Do...
6. Click the Statistics tab. Set the parameters and then click Query. For a description
of the parameters, refer to Table 5-3.
Table 5-3 Statistical Condition Parameter Descriptions
Parameter Description
Software/Hardware Version Queries the device type, device version, software version,
Statistic hardware version, and board quantity of the selected NEs.
5-4
Parameter Description
Board Type Statistic Queries the board types and quantities of the selected NEs.
Utilized Rate Statistic Queries the usage of each board of the selected NEs.
Board Version Basiced on Queries software version and quantity of each type of board of
Board Types the selected NEs.
Board Version Basiced on Queries software version and quantity of each type of device of
Device the selected NEs.
Note:
To remove a selected condition, select it from the right list and then click Left.
d. Click Apply, and then click Close. From the Statistic Condition list, select the
newly added condition set. Click Query.
8. Perform the following operations as required.
To... Do...
Save the board statistics on the selected NEs Click the Export button.
locally
Print the board statistics on the selected NEs Click the Print button.
– End of Steps –
Context
This operation is applicable to the SDH, CTN, WDM and OTN NEs.
5-5
Steps
1. From the main menu, select Statistics > Bearer NE Report > Ports Statistics
Report. The Ports Statistics Report dialog box is displayed.
2. From the left Device Resource list, select the NEs whose port information you want
to query.
3. Click Query. The port configuration information about the selected NEs is displayed.
4. Perform the following operations as required.
To... Do...
5. Click the Statistics tab. From the left Device Resource list, select the NEs whose
port information you want to query. From the Statistic Condition list on the right,
select a query condition. For a description of the parameters, refer to Table 5-4.
Parameter Description
Client Port Statistic Queries the used ports and the relevant
services, and the unused ports and the
services that can be carried.
c. Enter a name in Define Name. From the left list, select the statistical conditions
that you want to add, and then click Right. The selected conditions are added to
the right list.
5-6
Note:
To remove a selected condition, select it from the right Statistic Condition list and
then click Left.
d. Click Apply. On the Define Statistic Conditions dialog box, click Close. The
Ports Statistics Report dialog box is displayed. From the Statistic Condition
list, select the newly added name.
7. Click Query.
To... Do...
– End of Steps –
Context
This function applies to the SDH, CTN, and WDM/OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > Links
Statistics Report from the main menu. The Links Statistics Report dialog box is
displayed.
2. Select an NE from the Device Resource navigation tree. Select an option from the
Statistic Condition list.
3. Click Query. The statistical results are displayed in the Query Result list .
5-7
Parameter Description
Link Level Determines a link level in accordance with the device levels of the
NEs on both ends of the link.
If the device levels of the NEs at both ends of the link are
consistent, Link Level is the device level, such as Core Layer,
Convergence Layer, Access Layer, Core-Convergence Layer,
or Convergence-Access Layer.
If the device levels of the NEs at both ends of the link are
inconsistent Link Level is Other.
Link Rate Determined by the physical interfaces between the two ends of a
link.
4. Click the Statistics tab. Set the parameters. For a description of the parameters, refer
to Table 5-6.
Parameter Description
According to the link rate Queries the rate and quantity of each link of the selected NE by
link level.
Note:
To remove a selected condition, select it from the right list and then click Left.
d. Click Apply, and then click Close. From the Statistic Condition list, select the
newly added condition set. Click Query.
5-8
To... Do...
– End of Steps –
Context
This function is applicable to the SDH, CTN, WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report >
Protection Group Information Report from the main menu. The Protection Group
Information Report dialog box is displayed.
2. In the left Device Resource navigation tree, select the required NEs.
3. Click Query to view the protection group information of the NEs.
4. Perform the following operations as required.
To... Do...
Save the protection group information of the NEs Click the Export button.
to a local hard disk
Print the protection group of the NEs Click the Print button.
– End of Steps –
Context
This function applies to the SDH/CTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bear NE Report >
CTN/SDH Port Status Statistics Report from the main menu. The CTN/SDH Port
Status Statistics Report dialog box is displayed.
5-9
Parameter Description
Port Status Indicates the service occupancy status of the device port.
The status includes Opened, free, and unknown.
To... Do...
Save the statistical results of port state Click the Export button.
Print the statistical results of port state Click the Print button.
– End of Steps –
Context
This function is applicable to the SDH and CTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report >
CTN/SDH Port Status Statistic Report from the main menu. The CTN/SDH Port
Status Statistic Report dialog box is displayed.
2. In the left Device Resource navigation tree, select the required NEs.
3. Click Query. The NE port status statistics are displayed in the Query Result list.
To... Do...
Save the NE port status to a local hard disk Click the Export button.
– End of Steps –
5-10
Context
l This function applies to the CTN NEs.
l The report function requires the support of License.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Resource Analysis > Links Become Ring Statistics Report from the main menu.
The Links Become Ring Statistics Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query. The statistical results are displayed in the Query Result list.
4. Perform the following operations as required.
To... Do...
– End of Steps –
Context
l This function applies to the CTN NEs.
l The report function requires the support of License.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Resource Analysis > Ring Link Information Report from the main menu. The Ring
Link Information Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query. The statistical results are displayed in the Query Result list.
4. Perform the following operations as required.
5-11
To... Do...
– End of Steps –
Context
The report function requires the support of License.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Resource Analysis > LogicResource Statistics Report from the main menu. The
Logic Resource Statistics Report dialog box is displayed.
2. From the Device Resource navigation tree in the top left pane, select an NE whose
information is to be collected.
3. From the All Templates navigation tree in the left pane, select a template.
4. In the Setup area in the right pane, set Flow Units, Collection granularity, and set
parameters in the Utility Color Setting (%) and Actual Traffic Duration areas.
Note:
If you need to set a color mark for the alarm level of the resource utilization ratio, click
the Warning or Severe button. The Color Setting dialog box is displayed. Select a
color for the Warning or Severe level of the resource utilization.
5-12
To... Do...
Create a statistics
i. Click New. The Statistical Analysis Template - Custom Template
template
dialog box is displayed.
ii. Set Template Name, and select a resource type and statistic item(s).
iii. Click OK to return to the Logic Resource Statistics Report dialog box.
The new template is displayed under the All Template navigation tree in
the left pane.
Modify statistics
i. From the All Template navigation tree in the left pane, select a template
resource
to be modified.
iii. Modify the resource type and statistics items of the template as required.
– End of Steps –
Context
This function applies to all CTN NEs.
5-13
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > Ne Service Count Report. The Ne Service Count Report dialog box is
displayed.
2. From the Device Resource navigation tree, select the NE whose services are to be
collected.
3. Click Query. The statistics results are displayed in the Query Result list.
4. Perform the following operations as required.
To... Do...
– End of Steps –
Context
This function is applicable to all CTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > CTN SFP Statistic Report from the main menu. The CTN SFP Statistic
Report dialog box is displayed.
2. In the left Device Resource navigation tree, select the required NEs.
3. (Optional) If the device hardware information is not synchronized to the network
management, the optical module information cannot be queried. To perform the
synchronization, perform the following operations:
a. Click Synchronization Board Hardware Information. The Synchronization
Board Hardware Information dialog box is displayed.
b. In the Customized Resource navigation tree, select the NE to be synchronized.
c. Click Start Synchronize.
d. After the synchronization is completed, click OK.
4. Click Query. The SFP statistics of the NEs are displayed in the Query Result list.
5. Perform the following operations as required.
5-14
To... Do...
Save the SFP statistics of the NEs Click the Export button.
Print the SFP statistics information of the NEs Click the Print button.
– End of Steps –
Context
This function applies to the CTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > NE Rate Statistics Report from the main menu. The NE Rate Statistics
Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query. The statistical results are displayed in the Query Result list.
To... Do...
– End of Steps –
Context
This function applies to all CTN NEs.
5-15
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > L3 Interface Information Report. The L3 Interface Information Report
dialog box is displayed.
2. From the Device Resource navigation tree, select the NE to be queried.
3. Click Query. The statistics results are displayed in the Query Result list.
4. Perform the following operations as required.
To... Do...
– End of Steps –
Context
This function applies to all CTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > Equipment Version Statistics Report. The Equipment Version Statistics
Report dialog box is displayed.
2. From the Device Resource navigation tree, select the NE to be queried.
3. Click Query. The statistics results are displayed in the Query Result list.
4. Perform the following operations as required.
To... Do...
– End of Steps –
5-16
Context
This function applies to all CTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > CTN
Report > Ethernet Service Access Information Report. The Ethernet Service
Access Information Report dialog box is displayed.
2. From the Device Resource navigation tree, select the NE to be queried.
3. Click Query. The statistics results are displayed in the Query Result list.
4. Perform the following operations as required.
To... Do...
– End of Steps –
Context
This function is applicable to the WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Shelf Configuration Report from the main menu. The Shelf Configuration
Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query. The shelf information is displayed in the Query Result list.
5-17
4. Click the Statistics tab. From the Statistic Condition list, select According to the
shelf type. The information about the type, quantity and percentage of each shelf on
the selected NE are displayed, see the following figure.
To... Do...
Save the shelf information report to a local hard Click the Export button.
disk
– End of Steps –
5-18
Context
This function is applicable to the WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > WDM Board Component Information Report from the main menu. The
WDM Board Component Information Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the board component information in the Query Result list.
4. Perform the following operations as required.
To... Do...
Save the information report of the board Click the Export button.
components to the local hard disk
Print the information report of the board Click the Print button.
components
– End of Steps –
Context
This function is applicable to the WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Adjustable Power Margin Report from the main menu. The Adjustable
Power Margin Report dialog box is displayed.
2. Select the OMS check box below Basic Attribute on the left.
The Setting area is displayed.
3. Click Setting. The Select Service dialog box is displayed.
4. Select one or multiple resources from the Select Service dialog box, and click Add.
5-19
To... Do...
Save the adjustable power margin report to a Click the Export button.
local hard disk
Print the adjustable power margin report Click the Print button.
– End of Steps –
Context
This function is applicable to the WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Port State Data Report from the main menu. The Port State Data Report
dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the port state in the Query Result list.
4. Perform the following operations as required.
To... Do...
Save the port state report to a local hard disk Click the Export button.
– End of Steps –
Context
This function is applicable to the WDM and OTN NEs.
5-20
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Fix Attenuator Report from the main menu. The Fix Attenuator Report
dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the fixed attenuator information in the Query Result list.
4. Perform the following operations as required.
To... Do...
Save the fixed attenuator report to a local hard Click the Export button.
disk
– End of Steps –
Context
This function is applicable to the WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Wave Assign Report from the main menu. The Wave Assign Report dialog
box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the wave allocation information in the Query Result list.
4. Perform the following operations as required.
To... Do...
– End of Steps –
5-21
Context
This function applies to all WDM/OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Dispersive Compensation Report from the main menu. The Dispersive
Compensation Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the dispersive compensation information in the Query Result list.
4. Perform the following operations as required.
To... Do...
– End of Steps –
Context
This function applies to all WDM/OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Optical Module Info Report from the main menu. The Optical Module Info
Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the optical module information in the Query Result list.
4. Perform the following operations as required.
5-22
To... Do...
– End of Steps –
Context
This function is applicable to the WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > GCC Byte Use Mode Configuration Report from the main menu. The GCC
Byte Use Mode Configuration Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the GCC byte use mode configuration in the Query Result list.
To... Do...
Save the configuration report of GCC byte use Click the Export button.
mode to a local hard disk
Print the configuration report of GCC byte use Click the Print button.
mode
– End of Steps –
Context
This function applies to the SDH, CTN, and WDM/OTN NEs.
5-23
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > FEC Mode Configuration Report from the main menu. The FEC Mode
Configuration Report dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the FEC mode configuration in the Query Result list.
4. Perform the following operations as required.
To... Do...
– End of Steps –
Context
This function is applicable to the SDH, CTN, WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report >
OTN Report > Customer Information Report from the main menu. The Customer
Information Report dialog box is displayed.
2. Click Query to view the customer information in the Query Result list.
3. Perform the following operations as required.
To... Do...
Save the customer information report to the local Click the Export button.
hard disk
– End of Steps –
5-24
Context
This function is applicable to the WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Service Mapping Mode Configuration Report(X) from the main menu.
The Service Mapping Mode Configuration Report(X) dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the service mapping mode configuration in the Query Result list.
4. Perform the following operations as required.
To... Do...
Save the configuration report of the service Click the Export button.
mapping mode to the local hard disk
Print the configuration report of the service Click the Print button.
mapping mode
– End of Steps –
Prerequisite
The U31 R22 system has the customer who has the corresponding service.
Context
This function is applicable to the WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > BN xTN Configuration
Report > OTN Report > Customer Service Running State Report from the main
menu. The Customer Service Running State Report dialog box is displayed.
2. Set the customer information.
a. Click Setting. The Resource Selector dialog box is displayed.
b. Select a customer from the Resource Selector dialog box, and click Add.
The selected customer is added to the Selected Result area. The user can add
multiple customers by repeating this operation.
c. Click OK to return to the Customer Service Running State Report dialog box
5-25
3. Set the Start Time and End Time for the customer service.
4. Click Query. The service information of the customer is displayed in Query Result
list.
5. Perform the following operations as required.
To... Do...
Save the report of the customer service running Click the Export button.
status to a local hard disk
Print the report of the customer service running Click the Print button.
status
– End of Steps –
Context
This function is applicable to the WDM and OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > OPM Optical Channel Performance Report(Y) from the main menu. The
OPM Optical Channel Performance Report(Y) dialog box is displayed.
2. Select an NE from the Device Resource navigation tree.
3. Click Query to view the OPM optical channel performance information in the Query
Result list.
4. Perform the following operations as required.
To... Do...
Save the OPM optical channel performance Click the Export button.
report to a local hard disk
Print the OPM optical channel performance report Click the Print button.
– End of Steps –
5-26
Context
This function applies to all WDM/OTN NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > OTN
Report > Bandwidth Resource Statistics from the main menu. The Bandwidth
Resource Statistics dialog box is displayed.
2. Select an OMS from the OMS Resource navigation tree.
3. Click Refresh to view the service bandwidth information.
4. Perform the following operations as required.
To... Do...
– End of Steps –
Steps
1. From the main menu, select Statistics > Bearer NE Report > OTN Report > Two
Channel Static Report. The Two Channel Static Report dialog box is displayed.
2. From the Direction list, select Unidirection or Bidirection.
3. In the Begin area, click Browse. The Resource Selector dialog box is displayed.
Select a source NE and then click OK.
4. In the End area, click Browse. The Resource Selector dialog box is displayed. Select
a destination NE and then click OK.
5. (Optional) If there are other NEs between the two NEs, click Browse in the Middle
Nes area. Select the NEs between the two NEs and then click OK.
6. Click Query.
5-27
To... Do...
– End of Steps –
Context
This function is applicable to the SDH NEs.
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report > MSTP
Report > MSTP Cross Connection Report from the main menu. The MSTP Cross
Connection Report dialog box is displayed.
2. From the left Device Resource navigation tree, select the required NEs.
3. Click Query to view the cross-connect service information of the NEs.
4. Perform the following operations as required.
To... Do...
Save the cross-connect service information of the Click the Export button.
NEs to a local hard disk
Print the cross connect information of the NEs Click the Print button.
– End of Steps –
Context
This function is applicable to the SDH NEs.
5-28
Steps
1. In the Topology Management window, select Statistics > Bearer NE Report >
MSTP Report > MSTP SFP Statistics Report from the main menu. The MSTP SFP
Statistics Report dialog box is displayed.
2. From the left Device Resource navigation tree, select the required NEs.
3. (Optional) If the device hardware information is not synchronized to the network
management, the SFP information cannot be queried. To perform the synchronization,
perform the following operations:
a. Click Synchronize Board Hardware Information. The Synchronize Board
Hardware Information dialog box is displayed.
b. Click Start Synchronize.
c. After synchronization, click Close.
4. (Optional) Click Synchronize Board Hardware Information to synchronize the board
hardware information.
5. Click Query to view the SFP statistics of NEs.
6. Perform the following operations as required.
To... Do...
Save the SFP statistics of NEs to a local hard disk Click the Export button.
– End of Steps –
Steps
1. In the Topology Management window, select Statistics > E2E Report Management
from the main menu. The E2E Report Management dialog box is displayed.
2. From the navigation tree in the Report area in the left pane, select E2E Report
Management > Service Data Report.
3. (Optional) In the Filter Condition area in the left pane, set filtering conditions as
required.
4. Set Display mode.
5-29
l Rate first: displays the filtered results with the service rate as the index.
l NE first: displays the filtered results with the service NE as the index.
5. Click Filter in All.
The protection subnets that meet filtering conditions are displayed in the list in the right
pane.
For a description of the service data report, refer to Table 5-8.
Parameter Description
Consistent Stat Identifies the matching degree between end-to-end services and
single-point configuration data.
Options: Consistent, Inconsistent, Exception, and Extend.
Normally, the end-to-end service that is just discovered
automatically has the highest matching degree, whose Consistent
State is Consistent. If you modify the service through single-point
operations, the consistent state of the end-to-end service might
change.
6. Export the service data report as required. For the corresponding procedures, refer to
Table 5-9.
To... Do...
Export the report as a i. Select File from the Export list. The Save dialog box is displayed.
file
ii. Set Save in, File Name, and Files of Type.
Print the report i. Select Print from the Export list. The Print Setup dialog box is
displayed.
ii. Set parameters on the General, Page Setup, and Advanced tabs.
– End of Steps –
5-30
Steps
1. In the Topology Management window, select Statistics > E2E Report Management
from the main menu. The E2E Report Management dialog box is displayed.
2. From the navigation tree in the Report area in the left pane, select E2E Report
Management > Service Statistics Report.
3. (Optional) In the Filter Condition area in the left pane, set filtering conditions as
required.
4. Click Filter in All.
The services that meet filtering conditions are displayed in the list in the right pane.
Note:
The corresponding value is displayed in State only if Configuration State, Service
State, or Usage State is set.
Parameter Description
Layer Rate Rate of the network layer where a service is located. Layer
Rate includes SMT-1 Regenerator Section, GE, E1/VC12, L2L3
Bridge, Line Type Ethernet Rate, LAN Type Ethernet Rate(Work
Server-Layer Service Number), TREE Type Ethernet Rate(Work
Server-Layer Service Number), and Multi-Segment PW.
5-31
5. Export the report as required. For the corresponding procedures, refer to Table 5-11.
To ... Do...
Export the report as a i. Select File from the Export list. The Save dialog box is displayed.
file
ii. Set Save in, File Name, and Files of Type.
Print the report i. Select Print from the Export list. The Print Setup dialog box is
displayed.
ii. Set parameters on the General, Page Setup, and Advanced tabs.
– End of Steps –
Prerequisite
You have the user permission of "Supervisor Role" or above.
Steps
1. In the Topology Management window, select Statistics > E2E Report Management
from the main menu. The E2E Report Management dialog box is displayed.
2. From the navigation tree in the Report area in the left pane, select E2E Report
Management > MSTP Fiber Usage Statistic Report.
3. (Optional) In the Filter Condition area, set filtering conditions as required.
4. Click Filter in All.
The services that meet filtering conditions are displayed in the list in the right pane.
5. Export the MSTP fiber usage statistics report as required. For the corresponding
procedures, refer to Table 5-12.
Table 5-12 Operations for Exporting the MSTP Fiber Usage Statistics Report
To... Do...
Export the report as a i. Select File from the Export list. The Save dialog box is displayed.
file
ii. Set Save in, File Name, and Files of Type.
5-32
To... Do...
Print the report i. Select Print from the Export list. The Print Setup dialog box is
displayed.
ii. Set parameters on the General, Page Setup, and Advanced tabs.
– End of Steps –
Steps
1. In the Topology Management window, select Statistics > E2E Report Management
from the main menu. The E2E Report Management dialog box is displayed.
2. From the navigation tree in the Report area in the left pane, select E2E Report
Management > Isolated Cross Connection Data Report.
3. In the Filter Condition area, set filtering conditions as required.
4. Click Filter in All.
The services that meet filtering conditions are displayed in the list in the right pane.
5. Export the isolated cross connection data report as required. For the corresponding
procedures, refer to Table 5-13.
Table 5-13 Operations for Exporting the Isolated Cross Connection Data Report
To... Do...
Export the report as a i. Select File from the Export list. The Save dialog box is displayed.
file
ii. Set Save in, File Name, and Files of Type.
Print the report i. Select Print from the Export list. The Print Setup dialog box is
displayed.
ii. Set parameters on the General, Page Setup, and Advanced tabs.
– End of Steps –
5-33
Steps
1. In the Topology Management window, select Statistics > E2E Report Management
from the main menu. The E2E Report Management dialog box is displayed.
2. From the navigation tree in the Report area in the left pane, select E2E Report
Management > Protection Subnet Report.
3. (Optional) In the Filter Condition area, set filtering conditions as required.
4. Click Filter in All.
The services that meet filtering conditions are displayed in the list in the right pane.
For a description of the protection subnet report, refer to Table 5-14.
Table 5-14 Parameter Descriptions for Protection Subnet Report
Parameter Description
Consistent State Identifies the matching degree between end-to-end services and
single-point configuration data.
Options: Consistent, Inconsistent, and Defect.
Normally, the end-to-end service that is just discovered
automatically has the highest matching degree, whose Consistent
State is Consistent. If you modify the service through single-point
operations, the consistent state of the end-to-end service might
change.
Return Mode Whether service signals are switched from the protection path to
the working path after the working path recovers. If so, Return
Mode is Revertive. Otherwise, Return Mode is Non-Revertive.
WTR (minutes) If the working path recovers, service signals are not switched
from the protection path to the working path immediately. After a
period of time (WTR (minutes), service signals are switched to the
working path for transmission.
Delay Time (100ms) If the working path is faulty, service signals are not switched from
the working path to the protection path immediately. If the working
path is still faulty after a period of time (Delay Time (100ms) ),
service signals are switched to the protection path for transmission.
5-34
5. Export the protection subnet report as required. For the corresponding procedures,
refer to Table 5-15.
To... Do...
Export the report as a i. Select File from the Export list. The Save dialog box is displayed.
file
ii. Set Save in, File Name, and Files of Type.
Print the report i. Select Print from the Export list. The Print Setup dialog box is
displayed.
ii. Set parameters on the General, Page Setup, and Advanced tabs.
– End of Steps –
5-35
5-36
6.1 Overview
6.1.1 Overview of Security Management
U31 R22 provides security management functions to ensure proper and reliable operation
of the U31 R22. By using the security management functions, the system administrator
can create security policies, maintain user accounts and manage roles, role sets and
departments. In addition, the administrator can assign different authorities to different
users so that these users are limited to access and manage certain network resources.
The security management functions of the U31 R22 can be classified into two parts:
l Security policy customization: Security policies are applicable to all users of the
system, such as the user account management rule and the security event rule.
l Integrated management of roles, role sets, operation sets, departments and users:
The integrated management functions support the system administrator to specify
operation and management policies for individual users.
Select Security from the main menu. The submenus are displayed, see Figure 6-1.
6-1
To open the Security Management view, perform one of the following operations. Figure
6-2 shows the security management view.
l Click Security > Role Management on main menu.
l Click button.
l Click button.
6-2
l Role
A role specifies the management permission for a user group, including the operation
permission and manageable resources.
6-3
Note:
Operation permission and manageable resources define two aspects of the role’s
authority. The definition of the two aspects is independent of each other. But role’s
authorities are defined by the two aspects together. For example, if a role has the
operation permission of log management, and its manageable resources are base
stations, the actual authority of the role is to manage the logs of base stations.
l Role Set
A role set is a combination of roles. The management permission of a role set involves
the authorities of all roles in the role set.
After specifying a role set, you can easily assign authorities to a system administrator
or subnetwork administrator by giving the management permissions of all roles in the
role set to the administrator at a time.
l Operation Set
An operation set is a combination of operations assigned to a role. An operation set is
assigned to a role, which has the permission of all operations specified in the operation
set.
l Department
Departments are specified in the U31 R22 to simulate the actual administrative
departments. In this way, the system administrator can easily organize and manage
users in the U31 R22. A newly-created user must belong to a department.
Note:
By default, a newly-created user belongs to the root department of the system unless
specially required.
l User
6-4
6-5
administrated by it. Table 6-1 provides a security management solution for the operator,
which specifies the departments, role sets, roles, operation sets, users, and their relations.
6-6
None None System Administrator The default user in the system Admin
administrator with the highest authorities and
independent of all departments.
None Province on-duty Monitor Ordinary operator who can monitor MWW-
personnel all MW devices in the province. atch
None Branch on-duty Monitor Ordinary operator who can perform MWW-
personnel routine monitoring operations atch1
on all MW devices in the area
administrated by branch office 1.
None Branch on-duty Monitor Ordinary operator who can perform MWW-
personnel routine monitoring operations atch2
on all MW devices in the area
administrated by branch office 2.
None Branch on-duty Monitor Ordinary operator who can perform MWW-
personnel routine monitoring operations atchN
on all MW devices in the area
administrated by branch office N.
6-7
Prerequisite
You have the authority to perform this operation.
Steps
1. On the menu bar of the client window, select Security > Set User Account Rule. The
Set User Account Rule dialog box is displayed, see Figure 6-4.
6-8
The following table describes the parameters in the Customize User Account Rule
dialog box.
Password Enable Weak Password Check Select this check box to check for
Policy weak password.
User must modify overdue Select and the user must modify
password when login overdue password before logging in
the system.
If the check box is not selected, the
user can login without modifying
overdue password.
6-9
The user admin not lock Select and Admin account is not
locked.
Account Can not be last used user accounts Select and the user account must
Checking deleted in *** days not repeat any deleted account in
specified previous days (value range:
1-100).
Notify account expiry before *** Select and the system will notify
days account expiry in specified days
(value range: 1-90).
Note:
To restore default setting, click Default button.
6-10
l Creating a Role: set the name, description, locking status, operation permission and
operation set to create a new role.
l Modifying a Role: modify the description, locking status, operation permission and
operation set of an existing role.
l Duplicating a Role: duplicate an existing role and create a new role based on the
information of the duplicated role.
l Deleting a Role: delete a useless role.
l View assigned users: view users assigned with a role.
l Locking a Role: lock a role to disable the operation permission specified by the role.
You can modify a locked role.
Note:
AdministratorRole, MaintenanceRole, SupervisorRole, and OperatorRole are four
predefined roles. Users cannot modify or delete them. In addition, users cannot duplicate
AdministratorRole.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Right-lick Role in the navigation tree, and select Create Role from the shortcut menu.
3. On the right pane, set parameters of creating a role. For the parameter descriptions,
refer to Table 6-2.
Role Name Enter the role name in this 1-50 character(s) "new role" + Number
box. This parameter is (Sequence number
mandatory. of the newly created
role, e.g. "new role2")
6-11
Lock the Role Select this check box to Check box Not selected
lock the role.
Once the role is locked,
the user assigned with
the role is deprived of
corresponding operation
permission. If a user is only
assigned with the locked
role, the system does not
permit the login of this user.
Resource Tree Define manageable Select from the resource Not selected
resources for the role. tree.
The node has four types of
status:
l Red cross on the icon:
No right.
l Blue icon: having
defined right.
l Red arrow on the icon:
sharing the authority
of parent icon.
l No red arrow: not
sharing authority of
parent icon.
4. Enter the role name and description that are easy to identify. The Role Name must
be unique.
5. Set operation set for the node on Resource Tree in Access Rights pane.
l To follow the authority of the parent node, right-click the node, and select Follow
Up Right from the shortcut menu. To synchronize the authority of the node with
the sub-nodes, right-click the node, and select Synchronize All Lower Right
from the shortcut menu.
6-12
Context
Note:
If the operation permission of a role is changed, the system will force login users with that
role to log out. The operation permission of the users changes correspondingly after they
re-log in to the system.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. To turn the attributes of a role into modifiable status, perform one of the following
options.
l Right-click a role node in the Role Management pane, and select Modify Role
from the shortcut menu.
l Select a role node in the Role Management pane, and click Modify button at the
bottom-right corner.
Note:
– End of Steps –
6-13
Prerequisite
The role to be duplicated has already been created.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the Role Management pane, right-click the role to be duplicated under Role, and
select Duplicate Role from the shortcut menu.
Note:
The user cannot duplicate this role due to the special authority of AdministratorRole.
Note:
For the parameter descriptions, refer to 6.3.1 Creating a Role.
Prerequisite
The role to be deleted is created.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
6-14
2. Right-click the role to be deleted in the navigation tree, and select Delete Role from
the shortcut menu. The Delete Role dialog box is displayed.
Note:
The user cannot delete the role which is predefined in the system.
Note:
l If a user assigned with the deleted role has logged in to the system, the user will
be forced to log out and required to log in to the system again.
l If a user is assigned with the deleted role only, the user will be deleted and forced
to log out.
– End of Steps –
Prerequisite
The role to be viewed is created.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the navigation tree, right-click a role and select View Assigned Users from the
shortcut menu. The Assigned Users dialog box is displayed.
– End of Steps –
6-15
Prerequisite
The role to be locked is available and unlocked.
Context
You cannot lock the default roles of the U31 R22 system: system administrator, system
maintainer, system operator, and system supervisor.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the navigation tree on the left pane, click the role to be locked. The attributes of the
role is displayed in the right pane.
3. Click Modify to make the attributes modifiable.
4. Select Lock the Role check box.
5. Click OK. The designated role is locked.
Note:
If the designated user is locked, the user will be prompted with the Confirm message
box. The user should click Yes button to exit login. After logging in to the system
again, the user will be assigned with No Right permission, that is, the user cannot
perform any operation.
– End of Steps –
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the navigation tree on the left pane, right-click the Role Set node, and select Create
Role Set from the shortcut menu.
6-16
3. In the right pane, set parameters in Basic Information and Role Set Assignment for
the new role set. For the parameter descriptions, refer to Table 6-3.
Role Set Name Enter the role set name 1-50 character(s) "new roleset" + number
in this box. This parameter is (Sequence number
mandatory. of the newly created
role set, e.g. "new
roleset1")
Lock the Role Set Select this check box to Check Box Not Selected
lock the role set.
If a user is only
assigned with the
locked role set, the
system does not permit
the login of this user
again.
Available Roles Roles can be selected Read out from the Read out from the
in the system. Select System System
the roles needed and
click button, to add
roles to the Assigned
Roles box.
Prerequisite
The role set to be modified is available in the system.
6-17
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the left navigation tree, right-click the role set to be modified, and select Modify
Role Set from the shortcut menu.
3. Set parameters in the right pane.
Note:
For specific operation and description of parameters, refer to 6.4.1 Creating a Role
Set.
If a role set is modified, the system will force login users with this role set to log out.
When logging in to the system again, these users have updated operation authorities.
Prerequisite
The role set to be duplicated has been created.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the left navigation tree, right-click the role set to be duplicated, and select Duplicate
Role Set from the shortcut menu.
3. Set parameters in Basic Information and Role Set Assignment in the right pane.
Note:
For specific operation and description of parameters, refer to 6.4.1 Creating a Role
Set.
6-18
4. Click OK.
– End of Steps –
Prerequisite
The role set to be deleted is created.
Context
l If a user assigned with the deleted role set has logged in to the system, the user will
be forced to log out and required to re-log in to the system.
l If a user is assigned with the deleted role set only, the user will be deleted and forced
to log out.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the left navigation tree, right-click the role set to be deleted, and select Delete Role
Set from the shortcut menu.
– End of Steps –
Prerequisite
The role set has been added.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the left navigation tree, right-click the role set to be viewed, and select View
Assigned Users from the shortcut menu. The Assigned Users dialog box is
displayed.
– End of Steps –
6-19
Prerequisite
You have created the role set to be locked.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the left navigation tree, right-click the role set to be locked, and select Modify Role
Set from the shortcut menu.
3. In the modifiable status, select the Lock the Role Set check box.
4. Click OK to lock the role set.
Note:
If login users assigned with that role set will be prompted with a Confirm message
box. Click OK button to exit the client, and the login dialog box is displayed again.
After logging in again, the user assigned with the locked role set cannot perform the
operations specified in that role set.
– End of Steps –
6-20
l Export an Operation Set: export the information of all operation sets to an Excel (*.xls)
file.
l Import an Operation Set: import an operation set from an Excel (*.xls) file to create
an operation set.
Note:
Administrator Right, System Maintenance Right, Operation Right, View Right, and
No Right are predefined operation sets in the system. Users cannot modify or delete them.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. Right-click an operation set in the operation set pane, and select Create an Operation
Set from the shortcut menu. The Create an Operation Set dialog box is displayed.
4. Set parameters for creating an operation set. For the parameter descriptions, refer to
Table 6-4.
Parameters Description
5. Click OK.
– End of Steps –
6-21
Prerequisite
The operation set to be viewed is available in the system.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. In the right pane, right-click the operation set to be viewed, and select Browse
Operation Set from the shortcut menu. The Browse the Operation Set dialog box
is displayed.
4. View the operation set information.
– End of Steps –
Prerequisite
The operation set to be modified is available in the system.
Context
You have no right to modify the following default operation sets:
l Administrator Right
l System Maintenance Right
l Operation Right
l View Right
l No Right
Note:
When an operation set is modified, users assigned with that operation set will be required
to log in again.
If an operation set is deleted, the role(s) assigned with the operation set will be assigned
with No Right permission, that is, they cannot perform any operation.
6-22
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. In the right pane, right-click the operation set to be modified, and select Modify
Operation Set from the shortcut menu. The Modify Operation Set dialog box is
displayed.
4. Set parameters, including Operation Set Description and new assignment of
operation permissions.
Note:
For specific description of parameters, refer to 6.5.1 Creating an Operation Set.
5. Click OK.
– End of Steps –
Prerequisite
The operation set to be duplicated is available in the system.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. In the right pane, right-click the operation set to be duplicated, and select Duplicate
the Operation Set from the shortcut menu. The Duplicate the Operation Set dialog
box is displayed.
4. Set parameters, including General Information and Operation Set Configuration
Information (selecting the operation nodes in the tree).
Note:
For specific description of parameters, refer to 6.5.1 Creating an Operation Set.
6-23
5. Click OK. The duplicated operation set is displayed in the operation list.
– End of Steps –
Prerequisite
The operation set to be deleted is available in the system.
Context
When an operation set is deleted, roles assigned with that operation set will have No Right
operation permission.
When an operation set is deleted, users assigned with relevant role(s) will be required to
re-log in.
You have no right to modify the following default operation sets:
l Administrator Right
l System Maintenance Right
l Operation Right
l View Right
l No Right
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. In the operation set list, right-click the operation set to be deleted, and select Delete
Operation Set from the shortcut menu. The Confirm message box is displayed.
4. Click Yes.
– End of Steps –
Prerequisite
The operation set to be viewed is available in the system.
6-24
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. In the right pane, right-click the operation set to be viewed, and select View All
Operations from the shortcut menu. The View All Operations dialog box is
displayed.
4. View permitted operations by clicking tree nodes.
– End of Steps –
Prerequisite
The operation set to be exported is available in the system.
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. In the right pane, right-click the operation set to be exported, and select Export
All Customized Operation Sets from the shortcut menu. The Save dialog box is
displayed.
3. Set the path for saving the customized operation sets and file name.
4. Click Save.
– End of Steps –
You can only import operations sets from a *.xls file. Be sure that the content format of the
file to be imported is the same as the format of the *.xls file generated when you export all
operation sets.
Prerequisite
The file to be imported is available.
6-25
Steps
1. From the main menu, select Security > Role Management. The Role Management
window is displayed.
2. Select a role in the left navigation tree.
3. Right-click the operation list, and select Import Operation Sets from the shortcut
menu. The Open dialog box is displayed.
4. Select the file to be imported.
5. Click OK. The imported operation sets are displayed in the operation list in the right
pane.
– End of Steps –
Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click the Root Department node in the navigation tree, and select New
Sub-department from shortcut menu.
3. Set parameters on the Basic Information tab. For the parameter descriptions, refer
to Table 6-5.
Department Name Enter the name of the 1-50 character(s) "New Department" +
new department. (Mandatory) Number (Sequence
number of newly
created department)
6-26
Superior Department Select the superior Select from the tree Current department
department for the
new department.
Note:
For the description of the user that belongs to the department, refer to 6.7.1 Creating
a User.
Prerequisite
The department to be modified is created.
Context
You can modify the name of the default Root Department provided by the system as
required.
Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click the department to be modified on the department tree, and select Modify
from the shortcut menu.
3. In the right pane, modify Basic Information, including Department Description and
its root department.
Note:
For specific description of parameters, refer to 6.6.1 Creating a Department.
6-27
4. Click OK.
– End of Steps –
Prerequisite
The department to be deleted is created.
Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click the department to be modified in the department tree, and select Delete
from the shortcut menu. The Confirm message box is displayed.
3. Click Yes.
– End of Steps –
6-28
Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click a department node in the Root Department navigation tree, and select
New User from the shortcut menu.
3. Click Basic Information tab to set parameter. For the parameter descriptions, refer
to Table 6-6.
User Name Enter the login user 1-50 character(s), "New User" + Number
name of the new user. Mandatory (Example: New
User1)
User Must Modify Select the check box Select the check box None
Password Before to require the user to
Next Login modify the password
before logging in to
the system the next
time.
User Can Not Change Select the check box Select the check box None
Password to forbid the user to
modify the password.
6-29
6-30
4. Click the Right tab to assign role(s) or role set(s) to the user.
5. Click the Log View Range tab to select the logs that the user can view.
6. Click the User Department tab to select the department which the user belongs to.
Note:
l You can assign a user to only one department.
l The default department for a new user is "Root Department".
7. Click the Advanced Information tab to set additional information of the user. For the
parameter descriptions, refer to Table 6-7.
Phone Number Phone number of the new 1-50 numbers or hyphens None
user "-", optional
6-31
User Working Time Set or view the allowable Click Set Or View button None
working hours of the user by to set allowable working
days in a week. hours.
Prerequisite
The user to be modified has been created.
Context
l For the default "admin" user created by the system, the system administrator can
modify such information as the password by using this function. However, some of
the properties cannot be modified for the "admin" user. For example, the working time
must be valid in all time, and the user cannot be disabled.
l If the authorizations of the login user are modified, the user will be forced to log out.
After re-logging in to the system, the user's authorities are updated.
Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click the user to be modified in the left navigation tree, and select Modify from
the shortcut menu.
6-32
Note:
For specific description of parameters, refer to 6.7.1 Creating a User.
4. Click OK.
– End of Steps –
Prerequisite
The user to be duplicated has been created.
Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click a user to be duplicated in the left tree, and select Duplicate from the
shortcut menu.
3. Modify the user properties in the right pane.
Note:
For description of parameters, refer to 6.7.1 Creating a User.
Prerequisite
The user to be deleted is available.
6-33
Context
l The system administrator ("admin" ) cannot be deleted.
l If the login user is deleted, the user will be forced to log out. Using the deleted user
to log in later, you will be prompted that the user does not exist.
Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. Right-click the user to be deleted on the department tree, and select Delete from the
shortcut menu. The Confirm message box is displayed.
3. Click Yes.
– End of Steps –
Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. In the Root Department navigation tree, right-click the user whose rights are to
queried, and select View Rights from the shortcut menu. The View Rights dialog
box is displayed.
3. Select a resource from the Resource Tree navigation tree.
The user’s operation rights for the resource are displayed in the Rights of User admin
area.
– End of Steps –
Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. In the Root Department navigation tree, right-click a user, and select Compare
Rights from the shortcut menu. The Compare Rights dialog box is displayed.
3. Select another user for comparison, and click OK. The Compare Rights dialog box is
displayed.
6-34
Steps
1. From the main menu, select Security > User Management. The User Management
window is displayed.
2. In the Root Department navigation tree, right-click the user whose operation rights
you want to export, and select Export Rights from the shortcut menu. The Save
dialog box is displayed.
3. Set a name for the file, and click Save. A message box is displayed.
4. Click OK.
– End of Steps –
Steps
1. From the main menu, select Security > User Lock Details. The User Lock Details
dialog box is displayed.
2. To unlock the user, click Unlock. The user is thus unlocked and can re-log in to the
system.
– End of Steps –
6-35
Steps
1. From the main menu, select Security > Batch Modify Common Users' Passwords.
The Batch Modify Common Users' Passwords dialog box is displayed.
2. Set a new password, and select the users that require password modification.
3. Click OK.
– End of Steps –
Steps
1. From the main menu, select Security > Login User Management. The Login User
Management dialog box is displayed.
2. Select a login user, and perform the following operations as required.
To... Do...
Force the login user to exit the Click Force To Logout to force a user to log out. After that,
system the user can log into the system immediately.
Send message to the login user Click Send Message to send the message to the login user.
Refresh the login user list Click Refresh button to request information of login users
again from the server.
– End of Steps –
Steps
1. From the menu bar, select Security > User Blacklist. The User Blacklist dialog box
is displayed.
2. From the All users list, select the user(s) to be added to the black list.
6-36
Note:
Select users in the blacklist (in the right box) and click button to remove them from
the blacklist.
– End of Steps –
Steps
1. In the operation window of the U31 R22, select Security > Clean Up Accounts. The
Clean Up Accounts dialog box is displayed.
2. On the Disabled Accounts or Accounts to Be Deleted tab, select the accounts to
be disabled or deleted.
Note:
If you select Disable accounts that are idle in the last 60 day(s) in the Account
Cleanup Conditions area, this step is not required.
a. Select the accounts to be disabled or deleted from the Matching Accounts area.
4. Click OK.
– End of Steps –
6-37
Prerequisite
At least one client is successfully connected to the server.
Context
If multiple users are logging in to the system at the same time, you can set a single user
login mode through the client and the system will force to disconnect other users.
Steps
1. In the operation window of the U31 R22, select Security > Set User Login Mode.
The Set User Login Mode dialog box is displayed.
2. Select the Single user login mode check box.
3. Click OK. The Confirm message box is displayed.
4. Click OK.
– End of Steps –
Steps
1. From the main menu, select Security > Set Logout Idle Time. The Set Logout Idle
Time dialog box is displayed.
2. In the Automatically log out after text box, enter a number.
3. From the All Users list, select the users that you want to set auto-logout time for.
6-38
l Security Log
Security logs record the login information of users, including log ID, user name, host
address, log name, operation time, access mode and details.
l System Log
System logs record the completion state of scheduled tasks on the server, including
log ID, operation level, source, log name, details, host address, starting time and
ending time of tasks.
Only users with relevant rights can perform log management operations.
7-1
Steps
1. Perform one of the following to open the Log Management window.
l From the main menu, select Security > Log Management.
l On the toolbar, click the button.
7-2
2. In the Log Management tree in the left pane, double-click any node, or right-click
any node, and select Run from the short menu. The corresponding log information is
displayed in the right pane of Log Management.
– End of Steps –
Related Tasks
Refreshing logs: click . The latest operation logs are displayed.
Steps
1. From the main menu, select Security > Query Operation Log. The Set Operation
Log Query Conditions dialog box is displayed.
Setting Query Conditions on the Basic Tab
2. In the User Information area, set the following query conditions as required.
To... Do...
3. In the Operation Start Time area, perform one of the following operations.
To... Do...
Query the operation logs within a specified period Click the Range option button. Set the start time
and the end time.
Query the operation logs within specified days Click the Latest option button. Set the number
or weeks of days or weeks.
7-3
To... Do...
Query the logs of specified operations performed Select the Operation: User initiated check
box. Click Select. From the Operation Tree list,
select the desired operation types. Click OK.
Query the logs of operations performed on Select the Operation Resource check box.
specified resources Click Select. In the displayed Select Operation
Resource dialog box, select the desired
resources. Click OK.
Query operation logs by resource address Click Select next to Resource Address.
The Select Resource Address dialog box is
displayed. Select the IP addresses. Click OK.
Query operation logs by operation result From the Operation Result list, select a
condition.
Query operation logs by failure cause Enter specified fields for a fuzzy query.
b. Select All, 1-Very Important, 2-Important, 3-Notice or 4-Normal from the Rank
list.
c. In the Detail text box, enter specified fields for a fuzzy query.
Steps
1. From the main menu, select Security > Query Security Log. The Set Security Log
Query Conditions dialog box is displayed.
2. In the Source Information area, set the following query conditions as required.
7-4
To... Do...
3. In the Operation Start Time area, perform one of the following operations as required.
To... Do...
Query the security logs within a specified period Click the Range option button. Set the start time
and the end time.
Query the security logs within specified days or Click the Latest option button. Set the number
weeks of days or weeks.
b. In the Detail text box, enter specified fields for a fuzzy query.
6. After setting the conditions, click OK.
– End of Steps –
Steps
1. From the main menu, select Security > Query System Log. The Set System Log
Query Conditions dialog box is displayed.
2. In the Source Information area, set the following query conditions as required.
7-5
To... Do...
3. In the Operation Start Time area, select either of the following query conditions as
required.
To... Do...
Query the system logs within a specified period Click the Range option button. Set the start time
and the end time.
Query the system logs within specified days or Click the Latest option button. Set the number
weeks of days or weeks.
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, double-click All Operation Log to
display all logs on the current tab.
7-6
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, double-click All Operation Log to
display all logs.
3. Enter a keyword in the Enter the keyword to filter text box. The relevant results are
displayed on the current tab.
Note:
You can also search for specific logs one by one as follows: click on the toolbar,
enter a keyword in the displayed Find dialog box, and click Find Next.
– End of Steps –
Context
This procedure uses operation log query as an example, and the security log query
conditions and system log query conditions can be set in the similar way.
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, right-click Custom Query, and then
select New Operation Log Query from the shortcut menu. The Set Operation Log
Query Conditions dialog box is displayed.
7-7
Note:
The parameters in Set Operation Log Query Conditions dialog box are a little
different when you select New Security Log Query or New System Log Query in
step 2.
3. Set query parameters on the Basic tab. For the parameter descriptions, refer to Table
7-1.
Table 7-1 Description of Parameters on the Basic Tab
Operation Log User Name Enter or select a user name for querying related
Security Log logs.
Operation Log Host Address Enter or select an IP address for querying related
Security Log logs.
System Log
Operation Log Operation: User Select to query specific types of user initiated
initiated operations.
Operation Log Operation Result Select an operation result as a query condition from
corresponding drop-down list box. The following
options are available:
l All
l Successful Operation
l Failed Operation
l Unfinished Operation
Operation Log Failure Reason Enter a character string in corresponding box. The
system will search for logs whose failure reason
fuzzily match the character string.
Security Log Log Name Click corresponding Select button and then select
System Log a log name as a query condition in the displayed
Select Log Name dialog box.
7-8
4. Click the Advanced tab to set advanced parameters. For the parameter descriptions,
refer to Table 7-2.
Operation Log Connection Select the connection mode of the client. The following
Security Log Mode options are available:
l All
l GUI
l TELNET
l SSH
l North Access
l ERT
Operation Log Rank Select different levels of importance for querying logs.
The following options are available:
l All
l 1–VERY IMPORTANT
l 2–IMPORTANT
l 3–NOTICE
l 4–NORMAL
System Log Rank Select different levels of importance for querying logs.
The following options are available:
l All Rank
l 1–EMERGENCY
l 2–Allert
l 3–ERROR
l 4–WARNING
l 5–NOTICE
l 6–INFORMATION
Operation Log Detail Fuzzy match the character string you type in the text box.
Security Log
System Log
5. Click OK to run the operation log query condition. The queried results are displayed
on the relevant tab in Log Management.
8. Enter a name in the Query Name text box, and click OK to save the customized query
condition. The new query condition is listed under Custom Query in the navigation
tree.
9. Click OK.
7-9
The user-defined query condition is successfully created and displayed in the log
navigation tree.
– End of Steps –
Prerequisite
The *.xml file for the importing query conditions is available on the local client.
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, right-click Custom Query and then
select Import Query Conditions from the shortcut menu. The Import a Query
Condition dialog box is displayed.
3. Select the file to be imported, and then click Open to import the query condition. The
imported query condition is displayed under the Custom Query node in the left pane.
Note:
The imported file must be *.xml format.
4. Right-click the imported query condition, and select Run to show the query results.
– End of Steps –
Prerequisite
The log query condition to be modified is created.
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. Right-click a query condition to be modified under Custom Query, and select Edit from
the shortcut menu. The Set System Log Query Conditions dialog box is displayed.
7-10
3. Set query parameters on the Basic tab, and click OK to perform the edited query. The
results are displayed in the right pane.
4. Close the tab in the Log Management window. The Confirm message box is
displayed.
5. Click Yes to save the edited query condition.
– End of Steps –
Prerequisite
The log query condition to be exported is created.
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. Right-click a query condition to be exported under Custom Query, and select Export
Query Conditions from the shortcut menu. The Export a Query Condition dialog
box is displayed.
3. Set a path for saving the file and a file name, and click Save.
Note:
The query condition can only be exported as a *.xml file.
– End of Steps –
Prerequisite
The log query condition to be saved as another one is created.
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
7-11
2. In the Log Management tree in the left pane, right-click the log query condition and
then select Save As from the shortcut menu. The Save Query As dialog box is
displayed.
3. Enter the new name, and click OK.
A new log query condition is displayed under Custom Query in the Log Management
tree, containing the same query conditions as the original one.
– End of Steps –
Prerequisite
The log query condition to be deleted is created.
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, right-click a query condition to be
deleted under Custom Query, and select Delete from the shortcut menu. The
Confirm message box is displayed.
3. Click OK.
The deleted log query condition is removed from the Log Management tree.
– End of Steps –
Prerequisite
The log query condition to be renamed is created.
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, right-click Custom Query and then
select Rename from the shortcut menu. The Rename Query dialog box is displayed.
3. Enter the new name, and click OK.
The name of selected customized log query condition changes accordingly.
– End of Steps –
7-12
Context
The U31 R22 provides two file transfer modes:
l File Transfer Config is used for scheduled export. If you set parameters in the
transfer mode of File Transfer Config, the system will carry out the query based
on the query condition you specify at planned time. The query result will be exported
to a designated file on the server.
l Syslog Config is used for real-time export. If you set parameters in the transfer mode
Syslog Config, the system will carry out the query immediately. The query result will
be exported to a designated file on the server.
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, double-click Log Output Config. The
Log Output Config tab is displayed in the right pane.
3. Select a transmission mode.
4. Click the Modify button.
5. Set the file transfer configuration parameters. For the parameter descriptions, refer to
Table 7-3.
Table 7-3 Parameter Descriptions for File Transfer Mode Configuration
File Transfer Log Type Select the log type(s) you want to export from the check boxes,
Config including:
l Operation Log
l Security Log
l System Log
Click the Edit Query Condition button after each log type to set
the query condition. For this setting, refer to 7.4.1 Customizing
a Log Query Condition.
File Type Choose the exporting file type from the drop-down box. The
Choose options include:
l TXT
l Xml
7-13
l EXCEL
l CSV
Output to Select the check box to set the remote server information,
Remote Server including:
l File Transfer Protocol: designate the file transfer protocol
(FTP or SFTP)
l Host Server: Address of the remote host server
l Port: Remote server port
l User Name: Login user name
l User Password: Login password
l Remote Service Path: Designates the path of the remote
server. Click the Please Choose button to choose the path
the path of the remote server.
Output to Local Select the check box to export logs to local server. Click Please
Server Choose to select a path.
Planning Type How often you want to export logs, including the following
options:
l Every Hour
l Every Day
Syslog Log Type Select the types of logs you want to export. The check box
Config options include:
l Operation Log
l Security Log
l System Log
Character Select a character set from the drop-down box for the output
file. The options include:
l ASCII
l GB2312
l GBK
l ISO-8859-1
l Unicode
l UTF-8
6. Click OK.
7-14
Context
This procedure uses all operation logs as an example, and the other logs are exported in
the same way.
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, double-click All Operation Log, or
right-click All Operation Log and select Run from the shortcut menu. The operation
logs are displayed in the right pane.
3. On the toolbar, click the button. The Save dialog box is displayed.
4. Set the path for saving the file, file name, and file type.
5. Click Save. The queried logs based on the current query condition are exported into
the specified file.
– End of Steps –
Prerequisite
The connection between the client and the printer is normal.
Context
This procedure uses all security logs as an example, and the other logs are printed in the
same way.
Steps
1. From the main menu, select Security > Log Management. The Log Management
window is displayed.
2. In the Log Management tree in the left pane, double-click any node, such as All
Security Log. The logs based on the current condition are displayed in the right pane.
7-15
3. On the Log Management toolbar, click . The Print Setting dialog box is displayed.
4. Set parameters on the General tab. For the parameter descriptions, refer to Table 7-4.
Parameter Description
5. Click the Page Setup tab, and set parameters on the Page Setup tab. For the
parameter descriptions, refer to Table 7-4.
Parameter Description
The columns on the page are sorted first if you select the Vertical Pages Priority
check box.
You can select one of the three printing styles: Recommended Setup, Typical Setup,
and Simple Setup.
7-16
l Select the way column names are showed in the printed table: Hide Column
Name, Show Column Name in First Page or Show Column Name in Every
Page.
l Select the information you want to display on printed page in the box on the right.
7. Click Preview All to preview the printed page in the displayed Print Preview dialog
box.
7-17
7-18
Prerequisite
l You have the user permissions of "Operator Role" or above.
l The NE status is "online" and the link status normal.
Steps
1. In the Topology Management window, right-click an NE, and select Data
Synchronization from the shortcut menu. The Data Synchronization dialog box is
displayed.
2. On the Upload tab, and select the data item from the Upload Data Item area.
3. Click Upload. The Confirm message box is displayed.
4. Click Yes.
The Upload Progress scroll bar displays the uploading process, and the Result area
displays the detailed uploading information.
– End of Steps –
Prerequisite
l You have the user permissions of "Operator Role" or above.
8-1
Steps
1. In the Topology Management window, right-click an NE, and select Data
Synchronization from the shortcut menu. The Data Synchronization dialog box is
displayed.
2. Click the Compare tab.
3. Select the NE from the Please select NE(s) list.
4. Select the data item from the Compare Data Item area.
5. (Optional) Select the Show Inconsistent Data Only check box to display the
inconsistent data items in the comparison result. Otherwise, all the compared data
items will be displayed.
6. Click Compare.
The Compare Progress scroll bar displays the data comparison process, and the
Result area displays the detailed comparison information.
– End of Steps –
Prerequisite
l You have the user permissions of "Operator Role" or above.
l The NE status is "online" and the link status normal.
Context
Caution!
Downloading the data may interrupt the service.
Steps
1. In the Topology Management window, right-click an NE, and select Data
Synchronization from the shortcut menu. The Data Synchronization dialog box is
displayed.
2. Click the Download tab.
8-2
Steps
1. In the operation window of the U31 R22, select Maintenance > BN NE Maintenance
> consistency management > Auto Uploading Compare Configuration. The Auto
Uploading Compare Configuration window is displayed.
Note:
l This function is used only for NMS upgrade from T3 or E300 to U31. By default,
this function is disabled on U31 to prevent onsite data conflict.
l After the system completes a comparison task, a message box is displayed,
indicating that the task is completed. You can download the comparison result
and view it on the local computer.
– End of Steps –
8-3
Prerequisite
You have the user permissions of "Maintenance Role" or above.
Context
The function is applicable to WDM NEs.
Steps
1. In the Topology Management window, right-click the NE whose data is to be backed
up, and select Backup and Restore > Backup NE from the shortcut menu. The
Backup NE dialog box is displayed.
2. (Optional) To re-select an NE to be backed up, perform the following operations.
a. Click the Select NE button. The Resource Selector dialog box is displayed.
b. Select the NE to be backed up, and click OK to return to the Backup NE dialog
box.
3. In the File Name text box, enter the name of the backup file.
4. In the File Directory text box, enter the storage path of the backup file.
5. (Optional) In the Description text box, enter the description of the backup file.
6. Click Backup. The NE data starts to be backed up.
The Progress Info shows the detailed backup process. The Progress bar shows the
percentage of completion. After the backup is completed, a Message box is displayed.
7. Click OK.
– End of Steps –
Prerequisite
l You have the user permissions of "Maintenance Role" or above.
l The backup file is available.
8-4
Context
The function is applicable to WDM NEs.
Steps
1. In the Topology Management window, right-click the NE whose data is to be backed
up, and select Backup and Restore > Restore NE from the shortcut menu. The
Restore NE dialog box is displayed.
2. (Optional) If the selected NE is not the NE whose data is to be restored, click Select
NE. The Resource Selector dialog box is displayed. Select the NE to be restored.
3. Click Select File. The Query Backup Information dialog box is displayed.
If... Then...
In the Select Directory area, The table displays the detailed information of the backup file in
Default Directory is selected. the default storage directory.
In the Select Directory area, i. In the File Directory entry box, enter the path of the backup
Other Directory is selected. file.
Note:
To filter the backup files in the table, select the Only display files with same device
type.
Note:
If the backup IP does not need to be restored, you can clear the Restore backup IP
check box.
8-5
Note:
l Restore to database: The backup data is restored to the U31 R22 database. The
equipment data is not affected.
l Restore to device: The backup data is restored to the equipment. The equipment
data is overwritten.
Prerequisite
l The NEs are online.
l You have the user permissions of "Maintenance Role" or above.
Context
The function is applicable to WDM NEs.
Note:
After the NCP database is cleared, resetting the board will interrupt the services. Be
cautious to use it.
Steps
1. In the Topology Management window, right-click an NE, and select NE Management
from the shortcut menu. The NE Management window is displayed.
8-6
Prerequisite
l The NEs are online and properly communicate with the NMS.
l You have the user permissions of "Maintenance Role" or above.
Context
The function is applicable to WDM NEs.
Steps
1. From the Topology Management window, select the NE.
2. Right-click the NE, and then select NE Management from the shortcut menu. The NE
Management window is displayed.
3. In the NE Operation navigation tree, select NE Operation > Maintenance
Management > Backup and Restorement of NCP. The Backup and Restorement
of NCP dialog box is displayed.
Note:
You can also use the following method to display the Backup and Restorement of
NCP dialog box.
In the Topology Management window, right-click an NE to be restored, and select
Backup And Restore > Backup and Restorement of NCP from the shortcut menu.
The follow-up operation will be described in the sub-chapter.
– End of Steps –
8-7
Steps
1. In the Backup and Restorement of NCP dialog box, click the Manual Backup tab.
2. Set NCP backup parameters. For the a description of the parameters, refer to Table
8-1.
Parameter Description
File Name Name of the NCP backup data file. The format is "NE ID"_"date".
Up FTP Whether to upload the NCP backup data file to the FTP server.
FTP Port FTP server port. The value ranges from 1 to 65535.
FTP Path Path for saving the files in the FTP server.
3. (Optional) To upload the backup data to the FTP server, select the FTP IP\FTP
Port\FTP Path keep same as up FTP check box.
4. (Optional) To back up the wason data, select the wason check box.
5. Click Backup.
– End of Steps –
Steps
1. In the Backup and Restorement of NCP dialog box, click the Auto Backup tab.
2. Set NCP backup parameters. For the a description of the parameters, refer to Table
8-2.
Parameter Description
File Name Name of the NCP backup data file. The format is "NE ID"_"date".
Up FTP Whether to upload the NCP backup data file to the FTP server.
8-8
Parameter Description
FTP Port FTP server port. The value ranges from 1 to 65535.
FTP Path Path for saving the files in the FTP server.
Backup Period (days) Automatic backup period. The value ranges from 1 to 9999.
Backup Time Automatic backup time. The value ranges from 00:00:00 to
23:59:59.
3. (Optional) To upload the backup data to the FTP server, select the FTP IP\FTP
Port\FTP Path keep same as up FTP check box.
4. (Optional) To back up the wason data, select the wason check box.
5. Click Apply.
– End of Steps –
Steps
1. In the Backup and Restorement of NCP dialog box, click the Data Restore tab.
2. Set NCP restoration parameters. For the a description of the parameters, refer to
Table 8-3.
Parameter Description
Restore From FTP Restore the NCP data from the FTP server.
Up FTP Whether to upload the NCP backup data file to the FTP server.
FTP Port FTP server port. The value ranges from 1 to 65535.
FTP Path Path for saving the files in the FTP server.
File Name Name of the NCP backup data file. The format is "NE ID"_"date".
Select File Select the file from NCP. It is valid when Restore From FTP is
not selected.
8-9
3. (Optional) To upload the backup data to the FTP server, select the FTP IP\FTP
Port\FTP Path keep same as up FTP check box.
4. (Optional) To restore the wason data, select the wason check box.
5. Click Restore.
– End of Steps –
Steps
1. In the Backup and Restorement of NCP dialog box, click the View Backup File tab.
2. (Optional) To query the Wason data, select the wason check box.
3. Click Query to query the related information.
– End of Steps –
8-10
Note:
The backup data of various backup modes are completely different, and cannot be used
alternately. Meaning that you cannot user the backup data of the EMS platform as the
restoration data of the dbtool.
Table of Contents
Comparison for Backing Up and Restoring the U31 Data ..........................................9-1
System Backup ..........................................................................................................9-5
System Restoration ..................................................................................................9-15
9-1
l U31 EMS
l dbtool tool
l Offline tool
Whole database structure Structures of all the databases used by the EMS (including the
structures of all the database objects in the database).
Basic data All the basic data of the EMS. This item only backs up data records,
but does not back up the historical data such as table structures,
historical alarms, notifications, logs, or original performance data.
These historical data is backed up by using another backup function.
File Version files, operation files, and configuration files of the EMS.
Log data Historical data such as operation logs, security logs, and system logs.
• The restoration of the whole database structure and files needs the help of the offline tool.
The backup can be executed at any time. Generally, the backup is executed before
or after the operations such as software upgrade, system patch loading, and system
parameter modification, and user network data modification.
During the manual backup, the backup files are saved to the NMS server by default
or downloaded to the client computer.
9-2
Basic data All the basic data of the EMS. This item only backs up data records,
but not the historical data such as table structures, historical alarms,
notifications, logs, or original performance data. There is a separate
backup function for these historical data.
Offline Tool
For the backup and restoration items supported by the offline tool, refer to Table 9-4.
Whole database structure Structures of all the databases used by the EMS (including the
structures of all the database objects in the database). The backup
for the whole database structure only backs up the table structure of
the database. No data record is backed up. Therefore, this item must
be used together with the basic data, files, log data, alarm data, and
performance data.
Basic data All the basic data of the EMS. This item only backs up data records,
but not the historical data such as table structures, historical alarms,
notifications, logs, or original performance data. There is a separate
backup function for these historical data.
File Version files, operation files, and configuration files of the EMS.
U31 Supports the backup and l The data backup is l EMS Data Backup with
EMS restoration between the completed. the U31
same EMS versions, the l The backup and l EMS Data Restoration
same databases, the same restoration speeds are with the U31
installation components, fast, and the generated
and the EMSs of the same files are large.
scales. l The data item of
l During the backup, the whole database
ensure that the structure cannot be
EMS server and the
9-3
9-4
Note:
After you have used the offline tool to restore the whole database structure, you must
restore the basic data to ensure normal start of the EMS.
Note:
The backup data is saved on the file server (FTP/SFTP) of the U31 server by default. On
the EMS client, you can select Maintenance > Remote Backup Path Configuration to
modify the default remote storage path for the backup files.
Backup Contents
l Database structure backup: Backs up all the database structures used by the NMS
(including all the structures of the database objects).
l Basic data backup: Backs up all the basic data for NMS. Only backups the data
records, rather than table structure, history alarms, notifications, logs, original
performance data. Because these historical data have their own backup functions.
l File backup: Backups up the version files, runtime files, and configuration files for the
NMS.
l Log data backup: Backups operation logs, security logs, and system logs.
l Alarm data backup: Backups history alarms and notifications.
l Performance data backup: Backup original performance data.
Backup Position
The backup data is save in the file server (FTP/SFTP) of the U31 R22 server. You can
modify the default system backup position to be the third-party FTP server in NetNumen
Config Center.
9-5
Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
2. In the Backup and Restore navigation tree, select Backup > Backup Whole DB
Structure. The parameter settings are displayed in the right pane.
3. (Optional) To modify the path for saving the backup file on the server, click the Browse
button on the right of Backup File Save Path at Server. .
4. (Optional) To modify the path for saving the downloaded backup file on the client, select
the Backup File Download Path at Client check box, and click the Browse button
on the right of Backup File Download Path at Client.
Note:
Select the Backup File Download Path at Client check box to save the backup file
on both the server and client.
Prerequisite
You have the right to perform this operation.
Steps
1. In the client main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
9-6
2. In the Backup and Restore navigation tree, select Backup > Backup Basic Data.
The parameter settings are displayed in the right pane.
3. (Optional) To modify the path for saving the backup file on the server, click Browse on
the right of Backup File Save Path at Server.
4. (Optional) To modify the path for saving the downloaded backup file on the client, select
the Backup File Download Path at Client check box, and click Browse on the right
of Backup File Download Path at Client.
Note:
Select the Backup File Download Path at Client check box to save the backup file
on both the server and the client.
Context
There are three types of files: version files, configuration files, and runtime files.
l Version files: files generated on the server except runtime files. For example, par and
jar files of the fault management module, third-party files such as lib, *.exe, *.bat and
*.sql.
l Configuration files: files related to configuration generated on the server. including
*.property, *.deploy, *.ini and *.lcs files. You should set parameters of these files when
installing and maintaining the system.
l Running files: files generated on the server during the runtime, including those only
written on the disk, or cache files, such as .xml files of system performance data and
.xml files with command line dynamically loaded. These files are helpful for locating
and troubleshooting system faults, but not directly helpful for common users.
Note:
The backup runtime files do not include log files.
9-7
Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
2. In the Backup and Restore navigation tree, select Backup > Backup File. The
parameter settings are displayed in the right pane.
3. Select data types under Backup content.
4. (Optional) To modify the path for saving the backup file on the server, click the Browse
button on the right of Backup File Save Path at Server.
5. (Optional) To modify the path for saving the downloaded backup file on the client, select
the Backup File Download Path at Client check box, and click the Browse button
on the right of Backup File Download Path at Client.
Note:
Select the Backup File Download Path at Client check box to save the backup file
on both the server and the client.
Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
2. In the Backup and Restore navigation tree, select Backup > Backup and Deletion
Log Data. The parameter settings are displayed in the right pane.
3. Set deletion and backup parameters as required. For parameter descriptions, refer to
Table 9-6.
9-8
Backup and Deletion operation log, system Select the contents to be backed up and/or deleted.
Operation Content log, and security log
Backup Filter Type All, latest T day(s), T Specify the time range within which the data is backed up. If
day(s) ago, latest T you select Latest T Day(s), the log data within the latest T
month(s), T month(s) ago days will be backed up. T can be set in the T Time text box.
Delete Filter Type T day(s) ago, latest T Specify the time range within which the data is deleted. If you
day(s) select Latest T Day(s), the performance data within the latest
T days will be deleted. T can be set in the T Time text box.
Note:
The time specified in the filtering type uses the reference clock in the time zone where
the server is located.
4. (Optional) To modify the path for saving the backup file on the server, Click the Browse
button on the right of Backup File Save Path at Server.
5. (Optional) To modify the path for saving the downloaded backup file on the client, select
the Backup File Download Path at Client check box, and click the Browse button
on the right of Backup File Download Path at Client.
Note:
Select the Backup File Download Path at Client check box to save the backup file
on both the server and the client.
The Executed Result box displays the backup and/or deleting process.
– End of Steps –
9-9
Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
2. In the Backup and Restore navigation tree, select Backup > Backup and Deletion
Alarm Data. The parameter settings are displayed in the right pane.
3. Set deletion and backup parameters as required. For the parameter descriptions, refer
to Table 9-7.
Backup and History alarms and Select the contents to be backed up and/or deleted.
Deletion notifications
Operation
Content
Backup Filter All, latest T day(s), Specify the time range within which the data is backed up. If you select
Type T day(s) ago, latest Latest T Day(s), the alarm data within the latest T days will be backed
T month(s), T up. T can be set in the T Time text box.
month(s) ago
Deletion Filter T day(s) ago, latest Specify the time range within which the data is deleted. If you select
Type T day(s) Latest T Day(s), the alarm data within the latest T days will be deleted. T
can be set in the T Time text box.
Note:
The time specified in the filtering type uses the reference clock in the time zone where
the server is located.
9-10
4. (Optional) To modify the path for saving the backup file on the server, click the Browse
button on the right of Backup File Save Path at Server.
5. (Optional) To modify the path for saving the downloaded backup file on the client, select
the Backup File Download Path at Client check box, and click the Browse button
on the right of Backup File Download Path at Client.
Note:
Select the Backup File Download Path at Client check box to save the backup file
on both the server and the client.
Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
2. In the Backup and Restore navigation tree, select Backup > Backup and Deletion
PM Data. The parameter settings are displayed in the right pane.
3. Set deletion and backup parameters as required. For the parameter descriptions, refer
to Table 9-8.
9-11
Data Type Origin table, hour Select the type of the performance database tables to be backed up
table, day table and/or deleted.
Performance Select all, deselect Select the performance statistical table for NE types. Type a keyword in
Management all the Enter filter text text box to find specific table(s).
Object Table
Backup Filter All, latest T day(s), Specify the time range within which the data is backed up. If you select
Type T day(s) ago, latest Latest T Day(s), that means backing up the performance data within the
T month(s), T latest T days. T can be set in the T Time text box.
month(s) ago
Deletion Filter T day(s) ago Specify the time range within which the data is deleted. If you select
Type Latest T Day(s), that means deleting the performance data generated in
the latest T days. T can be set in the T Time text box.
Note:
The time specified in the filtering type uses the reference clock in the time zone where
the server is located.
4. (Optional) To modify the path for saving the backup file on the server, click the Browse
button on the right of Server path where store the backup file.
Note:
If Backup File Download Path at Client is selected, it indicates that the backed up
file is saved on both the server and the client
– End of Steps –
9-12
Context
The execution file of the dbtool tool is dbtool.bat. The path is \ums-server\utils\db
tool under the U31 EMS installation path.
Prerequisite
l The database operates normally.
l No IP-type device exists in the U31 EMS because the data of the IP-type device cannot
be backed up.
Steps
1. On the U31 server computer, enable the dbtool tool in accordance with the operation
system type.
l Windows: /ums-server/utils/dbtool/dbtool.bat
l Linux: /ums-server/utils/dbtool/dbtool.sh
l Solaris: /ums-server/utils/dbtool/dbtool.sh
Parameter Description
DBMS Type Select the DBMS type in accordance with the operation system
type:
l Windows: SQL Server.
l Linux and Solaris: Oracle.
3. After the parameters are set, click Login. The main window of the database tool is
displayed.
4. In the dbtool navigation tree, select Backup EMS. The Backup EMS tab is displayed.
9-13
Note:
Only Basic Data is selected here. The options for alarm, log, and perform are only
used to for internal fault location. They are not released to the outside.
Related Tasks
Restoring the Data with the dbtool Tool
Prerequisite
l The U31 server has exited.
l The database status is normal.
Steps
1. On the U31 server computer, enable the offline restoration tool in accordance with the
operation system type.
l Windows: /ums-server/utils/usf-backup/run.bat
l Linux: /ums-server/utils/usf-backup/run.sh
l Solaris: /ums-server/utils/usf-backup/run.sh
2. Perform the following operations as needed.
To... Do...
Back up the whole In the left Restore and Backup navigation tree, select Restore and Backup
database structure > Backup Whole DB Structure . The Backup Whole DB Structure dialog
box is displayed.
Back up the basic In the left Restore and Backup navigation tree, select Restore and Backup >
data Backup Basic Data. The Backup Basic Data dialog box is displayed.
Back up files In the left Restore and Backup navigation tree, select Restore and Backup >
Backup File. The Backup File dialog box is displayed.
3. Click Browse on the right of the Select the backup file list, and select a storage path
for the backup files.
9-14
4. Click Execute.
– End of Steps –
9-15
Prerequisite
l You have the user rights of "Administrator Role".
l The basic data backup file is available.
Steps
1. From the Topology Management window, select Maintenance > System Backup
and Restore. The System Backup and Restore window is displayed.
2. Select Backup and Restore > Restore > Restoring Basic Data from the left
navigation tree. The Basic Data Restore dialog box is displayed.
3. Click Start. The Basic Data Restore dialog box is displayed.
4. Select the backup file as required.
If... Then...
You have backed up the basic i. Select the FTP Backup File.
data file in the local database,
ii. The Open dialog box is displayed.
and the backed up data file is
on the U31 R22 server or a iii. (Optional) The basic data backup directory /backu
v. Click Open.
5. (Optional) Select Back up the current data before the restoration? If you choose
to back up the current data first, the system will automatically roll back in case
the restoration fails.
9-16
Note:
It is recommended to select this option so that the NMS can be restored to the status
before the restoration in case the restoration fails.
It is recommended to choose this option before restoring the basic data file so as to
ensure that the EMS can restore to the status before in case the restoration fails.
6. Click Execute.
– End of Steps –
Prerequisite
The log backup file is available.
Steps
1. In the Backup and Restore navigation tree, select Restore > Restore Log Data. The
parameter settings are displayed in the right pane.
2. Click the Browse button. The Open dialog box is displayed.
3. Select the backup file, and click the Open button to return to the System Backup and
Restore window.
4. Click Execute to execute data backup.
The log data is successfully restored.
– End of Steps –
Prerequisite
The alarm backup file is available.
Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
9-17
2. In the Backup and Restore navigation tree, select Restore > Restore Alarm Data.
The parameter settings are displayed in the right pane.
3. Click the Browse button. The Open dialog box is displayed.
4. Select the backup file, and click the Open button to return to the System Backup and
Restore window.
5. Click Execute to execute data backup.
– End of Steps –
Prerequisite
The performance backup file is available.
Steps
1. From the main menu, select Maintenance > System Backup and Restore. The
System Backup and Restore window is displayed.
2. In the Backup and Restore navigation tree, select Restore > Restore PM Data. The
parameter settings are displayed in the right pane.
3. Click the Browse button. The Open dialog box is displayed.
4. Select the backup file, and click the Open button to return to the System Backup and
Restore window.
5. Click Execute to execute data backup.
– End of Steps –
Note:
To avoid the fault caused by the failed restoration, back up the current EMS data before
the data restoration.
9-18
Prerequisite
l The U31 server has exited.
l The database status is normal.
l The data is backed up in advance.
Context
The execution file of the dbtool tool is dbtool.bat. The path is \ums-server\utils\db
tool under the U31 EMS installation path.
Steps
1. On the U31 server computer, enable the dbtool tool in accordance with the operation
system type.
l Windows: /ums-server/utils/dbtool/dbtool.bat
l Linux: /ums-server/utils/dbtool/dbtool.sh
l Solaris: /ums-server/utils/dbtool/dbtool.sh
Parameter Description
DBMS Type Select the DBMS type in accordance with the operation system
type:
l Windows: SQL Server.
l Linux and Solaris: Oracle.
3. After the parameters are set, click Login. The main window of the database tool is
displayed.
4. In the dbtool navigation tree, select Restore EMS. The Restore EMS tab is displayed.
9-19
Related Tasks
Backing Up the Data with the dbtool Tool
9-20
Note:
Under normal circumstances, only the basic data restored in the engineering application
can meet the requirements.
Prerequisite
l The U31 server has exited.
l The data is backed up.
Context
Note:
After a file is restored, you must run the \ums-server\utils\operationmodel\ope
rationmodel.bat file to initialize the service model.
Steps
1. On the U31 server computer, enable the offline restoration tool in accordance with the
operation system type.
l Windows: /ums-server/utils/usf-backup/run.bat
l Linux: /ums-server/utils/usf-backup/run.sh
l Solaris: /ums-server/utils/usf-backup/run.sh
2. Perform the following operations as needed.
To ... Do ...
Restore the whole database i. In the left navigation tree, select Restore and Backup >
structure Restore Whole DB Structure . The Restore Whole DB
Structure dialog box is displayed.
ii. Click Browse on the right of the Select the Backup File,
and then select the backup data.
Restore the basic data i. In the left Restore and Backup navigation tree, select Re-
store and Backup > Restore Basic Data. The Restore
Basic Data window is displayed.
ii. Click Browse on the right of the Select the Backup File,
and then select the backup data.
9-21
To ... Do ...
Restore files i. In the left Restore and Backup navigation tree, select Re-
store and Backup > Restore File. The Restore File win-
dow is displayed.
ii. Click the Browse button on the right of the Select the
Backup File text box to select the files to be backed up.
iii. Click the Browse button on the right of the Select the
Backup File text box to select the files to be restored.
iv. Click the Browse button on the right of the File Restoration
Path text box to select the restoration path.
v. Select a file type from the File Type list. Options include
Configuration File, Running File, and Version File.
3. Click Execute. The restoration result is displayed in the Execution Result area.
– End of Steps –
Related Tasks
Backing Up the Data with the Offline Tool
9-22
On the main menu of the U31 R22 client, select Maintenance > System Monitoring. The
System Monitoring window is displayed, see Figure 10-1.
10-1
Steps
1. In the System Monitor navigation tree, click the icon of the application server. The
basic information is displayed in the right pane.
– End of Steps –
Steps
1. In the System Monitor navigation tree, click the icon of the application server.
The basic information is displayed in the right pane, divided into three boxes: Server
Performance Monitor, Server Performance View, and Server Information.
10-2
2. Click the Configure button under Monitor Server Performance . The Configure
Performance Monitoring dialog box is displayed.
3. Select the monitoring object, such as CPU, memory monitoring, and hard disc
monitoring.
4. (Optional) If CPU, RAM Monitoring is selected, you need to set CPU, memory
monitoring threshold, and monitoring period.
5. (Optional) If HD Monitoring is selected, you need to set the hard disc monitoring
threshold, and monitoring period.
6. Click OK.
– End of Steps –
Steps
1. In the System Monitor navigation tree, click the icon of the application server.
The basic information is displayed in the right pane, divided into three boxes: Server
Performance Monitor, Server Performance View, and Server Information.
2. Click the Run button in the Server Performance Monitor box to start the performance
monitor.
– End of Steps –
Steps
1. In the System Monitor navigation tree, click the icon of the application server.
The basic information is displayed in the right pane, divided into three boxes: Server
Performance Monitor, Server Performance View, and Server Information.
2. Click the Suspend button in the Server Performance Monitor box to stop the
performance monitor.
– End of Steps –
10-3
Steps
1. In the System Monitor navigation tree, click the icon of the application server.
The basic information is displayed in the right pane, divided into three boxes: Server
Performance Monitor, Server Performance View, and Server Information.
2. Click the View button under Server Performance View. The View Application
Server Performance dialog box is displayed.
3. View the monitoring information of the application server.
– End of Steps –
Steps
1. In the System Monitor navigation tree, click the icon of database server. The
basic information is displayed in the right pane.
– End of Steps –
Steps
1. In the System Monitor navigation tree, click the icon of the database server.
The basic information is displayed in the right pane, divided into three boxes:
Database Resource Monitor, Query Database Resource, and Basic Information
of Database Server.
10-4
2. Click the Configure button under Database Resource Monitor. The Configure
Database Monitor dialog box is displayed.
3. Select monitoring object(s) from the Monitor Selection area.
l Select the Total Database Usage Monitoring check box and set a threshold in
the Usage Threshold (GB) text box.
l Select the Table Space Usage Monitoring check box and set a monitoring type
and threshold in the Table Space Usage Monitoring area.
4. Set the monitoring period in the Period Description area.
5. Click OK.
– End of Steps –
Steps
1. In the System Monitor navigation tree, click the icon of the database server.
The basic information is displayed in the right pane, divided into three boxes:
Database Resource Monitor, Query Database Resource, and Basic Information
of Database Server.
2. Click the Run button in the right of the Database Resource Monitor box to start the
database resource monitor.
– End of Steps –
Steps
1. In the System Monitor navigation tree, click the icon of the database server.
The basic information is displayed in the right pane, divided into three boxes:
Database Resource Monitor, Query Database Resource, and Basic Information
of Database Server.
2. Click the Suspend button in the right of the Database Resource Monitor box to stop
the database resource monitor.
– End of Steps –
10-5
Steps
1. In the System Monitor navigation tree, click the icon of the database server.
The basic information is displayed in the right pane, divided into three boxes:
Database Resource Monitor, Query Database Resource, and Basic Information
of Database Server.
2. Click the View button under Query Database Resource. The View Database
Resources dialog box is displayed.
3. Click the three tabs Database Information, Table Information, and Process
Information to view corresponding information.
4. Click the Synchronize button to refresh database information.
After the synchronization is completed, the system enters the data into the table again.
5. (Optional) To export data to the local computer, click Export Data.
– End of Steps –
10-6
11-1
Note:
To modify the task executing time, refer to 11.10 Modifying the Task Starting Time.
11-2
Context
The buttons used in this task provide the following functions:
To... Do...
Modify the export information and period Click on the toolbar to change the Backup
information of a task Description area into the editable status.
11-3
Obtain the latest task information when multiple Click on the toolbar.
clients coexist
View the information about the task execution Click on the toolbar.
Steps
1. In the left navigation tree in the Task Management window, select Common Task >
Historical Data Archiving > Log Data Backup and Deletion Task. The task details
are displayed in the right pane.
2. On the toolbar, click the button.
3. Select the log type(s) to be backed up.
4. Click the button.
– End of Steps –
Context
The buttons used in this task provide the following functions:
To... Do...
11-4
Steps
1. In the left navigation tree in the Task Management window, select Common Task >
Historical Data Archiving > PM Data Backup and Deletion Task. The task details
are displayed in the right pane.
Context
The buttons used in this task provide the following functions:
To... Do...
Modify the export information and period Click on the toolbar to change the Backup
information of the task Description view into the editable status.
Obtain the latest task information when multiple Click on the toolbar.
clients coexist
View the information about the task execution Click on the toolbar.
Steps
1. In the left navigation tree in the Task Management window, select Common Task
> Historical Data Archiving > Alarm Data Backup and Deletion Task. The task
details are displayed in the right pane.
– End of Steps –
11-5
Steps
1. In the left navigation tree in the Task Management window, select Common Task >
Configuration Data Backup > Backup Basic Data . The task backup and period
information is displayed in the right pane.
2. Click the button. The View Log dialog box is displayed.
3. View the backup logs.
– End of Steps –
Steps
1. In the left navigation tree in the Task Management window, select Common Task >
Version and Database Backup > Backup Whole DB Structure. The whole database
backup and period information is displayed in the right pane.
2. Click the button. The View Log dialog box is displayed.
3. View the logs.
– End of Steps –
Context
The File System Backup task backs up version files, configuration files and runtime files
on the server every day.
l Version files refer to all files generated by the U31 R22 server, except those generated
during runtime.
l Configuration files refer to the files related to configuration generated on the server.
l Runtime files refer to the files generated on the server during runtime.
11-6
Steps
1. In the left navigation tree in the Task Management window, select Common Task >
Version and Database Backup > Backup File. The file system backup and period
information is displayed in the right pane.
2. Click the button. The View Log dialog box is displayed.
3. View the logs.
– End of Steps –
Context
You can modify the monitoring attributes, including directory settings and cleanup settings.
This procedure uses modifying the Performance Query FTP Directory Monitoring
attributes as an example.
Steps
1. In the left navigation tree in the Task Management window, select Common Task >
File Clear-up > Directory Monitoring. The monitoring task details are displayed in
the right pane.
2. Select a task from the list.
Context
You can modify the monitoring attributes, including directory settings and cleanup settings.
This procedure uses modifying the Performance Query FTP Directory Monitoring
attributes as an example.
11-7
Steps
1. In the left navigation tree in the Task Management window, select Common Task >
File Clean-up > Directory Monitoring. The monitoring task details are displayed in
the right pane.
2. Select Performance Query FTP Directory Monitoring from the task list.
3. Click the Instantly Execute button. The Confirm message box is displayed.
4. Click Yes.
– End of Steps –
Context
You can modify the start time of the five predefined types of tasks, including history
data backup and deletion, configuration data backup, version and database backup, file
clearing, and alarm background tasks. You can only modify the start time by hour. The
actual start time of a task might be the preset time plus an offset, which takes 10 minutes
as the granularity, between 0 and 60 minutes. (If the preset time is 18:00, for example,
the start time might be 18:10, 18:20, etc.)
Steps
1. From the main menu, select Maintenance > Task Management > Modify Task Start
Time. The Modify Task Start Time dialog box is displayed.
2. Select a task based in the Task Sort field.
11-8
12-1
The following describes the general flow of troubleshooting in the U31 R22 system.
1. Determine the failure conditions.
12-2
Record the details of the failure symptom, related alarms displayed on the fault
management view, operation information of the system, and handling operations
that have been done. Use the maintenance functions provided by the system (for
example, service observation, and performance statistics) to collect and save related
information at the time when the failure occurs.
3. Analyze the failure and find out the failure type.
Determine the possible causes of the failure and find out the type of the failure by
analyzing the failure symptom and related information collected from the system.
4. Locate the cause of the failure.
Analyze the service flow and related NE(s) based on the conditions when the failure
occurs to find out the real cause of the failure.
5. Remove the failure.
Perform handling operations according to the failure cause to remove the failure.
6. Record the troubleshooting process.
After the troubleshooting, record the failure symptom and handling method in detail so
that other maintenance personnel can refer to the handling experience to troubleshoot
similar failures.
12-3
The following introduces four common troubleshooting methods for your reference.
l Comparison Method
The comparison method is a simple method that you can use to find the difference
between the faulty configuration data (or faulty device) and the correct configuration
data (or normal device) by comparing them and then locate the failure by analyzing
the difference.
l Replacement Method
The replacement method is a simple and practical troubleshooting method that you
can use to determine whether a hardware is faulty. For example, use a board of the
same type to replace the possible faulty board. If the failure disappears after the
replacement, it can be concluded that the replaced board is faulty.
l System Simplification Method
The system simplification method is a troubleshooting method that you can use to
locate a failure by observing the simplest system after removing all the other irrelevant
hardware. If the failure still exists in the simplest system, it can be concluded that the
failure locates in a hardware in the simplest system. If the failure does not exist in
the simplest system, add the previously-removed hardware to the system one by one.
Once the failure appears after a hardware is added, it can be concluded that the added
hardware is faulty. Then you can replace the faulty hardware to restore the system.
l Failure Code Analysis Method
The failure code analysis method is a troubleshooting method that you can use to
diagnose software and service failures. The system provides failure codes and causes
for all operation failures. You can conveniently determine the cause of an operation
failure by checking corresponding failure code.
The following gives two examples of how to combine different methods for troubleshooting
failures.
l Example 1: To troubleshoot a hardware failure, you need to observe the indicator
lights of the hardware, and then use the replacement method and comparison method
to judge whether the hardware is working properly.
l Example 2: To troubleshoot a software or service failure, you need to use the
maintenance functions of the system to find possible causes by checking and
analyzing the failure code, related logs and data in the system.
12-4
When a failure occurs, you can view the operation log to find the operation when the
failure occurs and judge whether the failure is caused by this operation, and locate
the failure cause by analyzing the operation error log.
l Packet Catcher
The packet catcher can be used to catch needed data from network ports, and
translate the data into a format that can be easily understood and analyzed by end
users.
l MIB Browser
The MIB browser is used to obtain the attributes of Simple Network Management
Protocol (SNMP). It can extract data from an NE agent and compare the data with
that in corresponding NE and U31 R22.
Note:
The operator is recommended to establish rules and regulations to control and
direct the troubleshooting operations in equipment rooms, and authorize qualified
maintenance personnel to perform troubleshooting operations, to prevent new
failures caused by improper operations during troubleshooting.
12-5
Analysis
An indicator glowing in red usually indicates a hardware failure, which may be caused by
12-6
Troubleshooting
The following describes the troubleshooting procedure of this failure.
1. Check for any loose hardware part in the server.
l If any loose part is found, use a proper tool to fasten the part.
l If no loose part is found, proceed to Step 2.
2. Contact the manufacturer of the server for technical support after the following
preparations:
l Find the hardware manual of the server, which is delivered with the server
together, and then read the description of indicators in the manual to judge the
current status of the server.
l Write down the serial number of the server.
Result Verification
After the failure is removed, the indicator of the server glows in green.
Analysis
The meaning of yellow indicator varies with the actual model of the server. An indicator
glowing in yellow usually indicates a hardware failure, which may be caused by
l Loose hardware part in the server.
l Hardware damage in the server.
Troubleshooting
The following describes the troubleshooting procedure of this failure.
1. Check for any loose hardware part in the server.
l If any loose part is found, use a proper tool to fasten the part.
l If no loose part is found, proceed to Step 2.
2. Contact the manufacturer of the server for technical support after the following
preparations:
l Find the hardware manual of the server, which is delivered with the server
together, and then read the description of indicators in the manual to judge the
current status of the server.
l Write down the serial number of the server.
Result Verification
After the failure is removed, the indicator of the server glows in green.
12-7
Analysis
The indicator lighting red indicates that the hard disk is damaged.
Note:
Generally, a Redundant Array of Inexpensive Disks (RAID) is configured for the U31 R22
system. That is, multiple disks are used to keep the data integrity and reliability of the
system.
Troubleshooting
When a hard disk in the system is damaged, do the following:
1. Contact the manufacturer of the hard disk to obtain a new hard disk.
2. Contact your local ZTE office for replacing the damaged hard disk.
Result Verification
After the replacement of the damaged hard disk, the indicator of the new hard disk lights
green.
Analysis
The startup failure of the server may be caused by
l Power module failure of the server
l Hardware damage of the server, for example, hard disk damage, I/O confliction, CPU
failure, and memory failure
l Startup errors, for example, file system damage
Troubleshooting
To troubleshoot the startup failure of the server, do the following:
1. Observe the status indicator of each power module.
12-8
l If the indicator of a power module is off, the power module fails. Replace it with a
new power module.
l If the indicators of all power modules light green, proceed to the next step.
2. Check for loosen part or hardware damage in the server.
l If a loosen part is found, fix the part and then check whether the server can start
up successfully.
l If a damaged part is found, replace it with a good one, and then check whether
the server can start up successfully.
l If no loosen or damaged part is found, proceed to the next step.
3. Check the error information if an error message is prompted during the startup of the
server.
l If the error indicates a file system damage, reboot the server into security mode or
maintenance mode, and then repair the file system. After that, restart the server
and check whether it can start up successfully.
l If the error is not caused by file system damage, proceed to the next step.
4. Record the error information, and then contact your local ZTE office for technical
support.
Result Verification
The server can start up successfully.
Analysis
The possible causes of this failure include:
l The server fails to start up because of file system damage.
l The file system is full.
l An exception happens in the TELNET or SSH service.
Troubleshooting
Log in to the server via a serial port, and then troubleshoot the remote login failure as
follows:
1. Check whether the server is started without errors. If some error is found, restart the
server into maintenance mode or security mode. Observe the error message on the
screen during restart, and troubleshoot the error.
2. Check whether the file system is full. In the case of full file system, clear junk files in
the system and ensure that the utilization of the root partition or the boot disk does not
exceed 80%.
12-9
3. Check whether the TELNET or SSH service is successfully started. If the service is
not started or started with an exception, restart the TELNET or SSH service.
4. If you fail to troubleshoot the remote login failure, contact your local ZTE office for
technical support.
Result Verification
You can successfully log in to the server remotely.
Analysis
The possible causes of this problem include:
l The network port of the switch fails.
l The network cable is defective.
l The peer network port on the server fails, which is connected to the switch with the
network cable.
Troubleshooting
To troubleshoot this problem, do the following:
1. Check whether the network port on the Ethernet switch works properly.
Log in to the switch via a serial port, and then run the following command in a command
terminal to view the status of the network port.
show port Port No.
l If the network port fails to work properly, replace the switch, or connect the network
cable to a normal network port on the switch.
l If the network port works properly, proceed to the next step.
2. Check whether the network cable is defective.
Insert both connectors of the network cable to corresponding ports of a network cable
tester, and observe the indicators on the tester.
l If some indicator(s) on the network cable test is off, the network cable is defective.
In this case, replace the network cable.
l If all indicators on the network cable test are on, the network cable is good.
Proceed to the next step.
12-10
3. Check whether the network adapter in the U31 R22 server is normal.
a. Enable the Terminal window on the server through the ifconfig -a command to view
the status of the network adapter in the server. If the status of the network adapter
is normal, the system feedback information is shown in Figure 12-2.
l If the system cannot identify the network adapter, install a proper driver for
the network adapter.
l If the status of the network adapter is not "UP", use the following command
to activate this network adapter.
ifconfig Network Adapter Name plumb
b. If the status of the network adapter is "UP", use the netstat -i command to check
the data transmission information of the network adapter, including the received
package count, sent package count, error package count, analyze the information
and judge whether the network adapter is working properly.
If the network adapter is normal, proceed to the next step.
4. If you fail to troubleshoot this failure after using the previously-mentioned methods,
collect the failure information and contact your local ZTE office for technical support.
Result Verification
Insert the network cable to the network port on the switch. Both indicators of the network
port light green after a while.
Analysis
The possible causes of this problem include:
l The network port of the switch fails.
l The network cable is defective.
l The peer network port on the server fails, which is connected to the switch with the
network cable.
12-11
Troubleshooting
To troubleshoot this problem, perform the following:
1. Check whether the network port on the Ethernet switch works properly.
Log in to the switch via a serial port, and then run the following command in a command
terminal to view the status of the network port.
l If the network port fails to work properly, replace the switch, or connect the network
cable to a normal network port on the switch.
l If the network port works properly, proceed to the next step.
2. Check whether the network adapter in the U31 R22 server is normal.
a. Enable the Terminal window on the server through the ifconfig -a command to view
the status of the network adapter in the server. If the network adapter is normal,
the system feedback information is shown in Figure 12-3.
l If the system cannot identify the network adapter, install a proper driver for
the network adapter.
l If the status of the network adapter is not "UP", use the following command
to activate this network adapter.
b. If the status of the network adapter is "UP", use the netstat -i command to check
the data transmission information of the network adapter, including the received
package count, sent package count, error package count, analyze the information
and judge whether the network adapter is working properly.
If the network adapter is normal, proceed to the next step.
3. Check whether the network cable is good.
Insert both connectors of the network cable to corresponding ports of a network cable
tester, and observe the indicators on the tester.
l If some indicator(s) on the network cable test is off, the network cable is defective.
In this case, replace the network cable.
l If all indicators on the network cable test are on, the network cable is good.
Proceed to the next step.
4. If you fail to troubleshoot this failure after using the previously-mentioned methods,
collect the failure information and contact your local ZTE office for technical support.
12-12
Result Verification
The indicators of the network port light green.
Analysis
Some related process is still running after you exited the U31 R22 server program.
Troubleshooting
l Troubleshooting of Windows operating system
1. Press Ctrl+Alt+Del. The Task Manager dialog box is displayed.
2. Find the processes start with "zte_", and then right-click it. Select End Processe
from the shortcut menu.
3. Repeat the previous step to end all the processes start with "zte_".
4. In the service list of the Computer Management window, stop MySQL, ZX DHCP
Service, and ZXISAM DHCP Web Business services.
5. (Optional) If you cannot uninstall the sever through the above three steps. Restart
the sever and then uninstall it again.
l Troubleshooting of Linux/Solaris operating system
1. Open the command line terminal on the sever as a root user. Enter the following
command. The running processes are displayed.
#prstat –a
2. End all the processes start with "zte_".
For example, there is a current running process "zte_console1", and its
corresponding PID is 8892. Enter the following command in the command line
to close the process:
#kill 8892
3. Execute the #prstat –a command, if there is no process starts with "zte_", the
installation is successful.
4. (Optional) If you cannot uninstall the sever through the above three steps. Restart
the sever and then uninstall it again.
Result Verification
You can successfully remove the U31 R22 server program from the server.
12-13
Figure 12-4 NetNumen Setup - System Information Detection (Database Detection Not
Passed)
Analysis
The space of the disk where the installation directory of the server program locates does
not meet the previously-set space requirements of database.
Troubleshooting
To solve this problem for continuing the installation of the server program, do the following:
1. In the NetNumen Setup - System information detection window, click Back to return
to the NetNumen Setup - Database config window.
2. Select the product, and then click Modify Path. The Database Configuration dialog
box is displayed, see Figure 12-5.
12-14
Note:
l You cannot install the NMS to the system disk.
l It is not recommended to modify the size of the database space.
3. Change the path for saving the database file. Click OK. A confirm message box is
displayed. Click Yes.
4. Repeat step 2 to 3 to change the paths for saving the database files of other products.
5. After decreasing the space size allocated to the database, click Next in the NetNumen
Setup - Database config window.
The system passes the database detection if the disk meets the space requirements
of the database, see Figure 12-6.
Result Verification
All detections are passed, and you can continue the installation of the U31 R22 server
program.
12-15
Analysis
The port of FTP (File Transfer Protocol) is occupied by another process and error occurs.
Troubleshooting
You can assign another FTP port to the process so that the process can release the FTP
port needed by the server program. Or configure the server to use another port for the
communication with NEs.
The following describes how to change the FTP port used by the server program in the
NetNumen Configuration Center.
1. On the server, use the following command in a Terminal window to open the uif
directory under the installation directory of the server program and then run the runP
lugCenter.sh file.
# cd export/home/NetNumenU31/uif
# ./runPlugCenter.sh
12-16
Note:
If your U31 R22 server program is installed on a Windows operating system,
double-click the runPlugCenter.bat file under the uif directory.
2. In the left pane of the NetNumen Configuration Center window, expand the
Common Configuration node, and then click Common Configuration.
3. In the right pane, click the Server tab, expand the Global Configuration node, and
then click the FTP port.
4. On the lower part of the right pane, enter the No. of the new port (for example, 21111)
in the Value of config box, see Figure 12-8
Result Verification
Run the server program again. The U31 R22 server starts up successfully without FTP
server error.
Analysis
The possible causes of the failure of performance data query include:
12-17
l No measurement task is created in the U31 R22 system to collect the performance
data you want.
l The measurement task used to collect the performance data you want is not activated.
l The measurement task does not collect the performance data you want because the
time period set in the task does not cover that of the desired performance data.
l The communication between the NE(s) and the U31 R22 server has problem.
Troubleshooting
To troubleshoot the query failure of performance data, do the following:
1. In the client window of U31 R22, select Performance > Measurement Task
Management on the menu bar. The Measurement Task Management tab is
displayed.
2. On the Measurement Task Management tab, view the information of measurement
tasks in the list to find whether a measurement task is responsible for collecting the
performance data you want.
l If no, create a new measurement task for collecting the desired performance data.
Then the troubleshooting is completed.
Note:
For how to create a measurement task, refer to 4.3.1 Creating a Measurement
Task.
12-18
Result Verification
You can successfully query the performance data you want in the U31 R22 system.
12-19
12-20
II
III
IV
Table 5-15 Operations for Exporting the Protection Subnet Report.......................... 5-35
Table 6-1 Security Management Example ................................................................. 6-7
Table 6-2 Parameter Descriptions for Creating a Role............................................. 6-11
Table 6-3 Parameter Descriptions for Creating a Role Set ...................................... 6-17
Table 6-4 Parameter Descriptions for Creating an Operation Set ............................ 6-21
Table 6-5 Parameter Descriptions for Creating a Department.................................. 6-26
Table 6-6 Parameter Descriptions of the Basic Tab ................................................ 6-29
Table 6-7 Parameter Descriptions of the Advanced Information Tab..................... 6-31
Table 7-1 Description of Parameters on the Basic Tab .............................................. 7-8
Table 7-2 Description of Advanced Query Parameters .............................................. 7-9
Table 7-3 Parameter Descriptions for File Transfer Mode Configuration ................. 7-13
Table 7-4 Parameter Descriptions on the General Tab ............................................ 7-16
Table 7-5 Parameter Descriptions on the Page Setup Tab ...................................... 7-16
Table 8-1 Parameter Descriptions for NCP Backup Configuration ............................ 8-8
Table 8-2 Parameter Descriptions for NCP Backup Configuration ............................ 8-8
Table 8-3 Parameter Descriptions for NCP Restoration Configuration ...................... 8-9
Table 9-1 Description of the Backup and Restoration Modes .................................... 9-1
Table 9-2 Backup and Restoration Items of the U31 System .................................... 9-2
Table 9-3 Backup and Restoration Items of the dbtool Tool ...................................... 9-3
Table 9-4 Backup and Restoration Items of the Offline Tool....................................... 9-3
Table 9-5 Application Scenarios for the Backup and Restoration............................... 9-3
Table 9-6 Description of Parameters for Backup and Deletion................................... 9-9
Table 9-7 Description of Parameters for Backup and Deletion................................. 9-10
Table 9-8 Description of Parameters for Backup and Deletion................................. 9-11
Table 9-9 dbtool Window Parameter Description .................................................... 9-13
Table 9-10 Dbtool Window Parameter Descriptions ................................................ 9-19
Table 11-1 Task Type - Operations Reference......................................................... 11-1
VI
LOS
- Loss of Signal
MIB
- Management Information Base
NE
- Network Element
OTN
- Optical Transport Network
PI
- Performance Index
QoS
- Quality of Service
RAID
- Redundant Array of Independent Disks
SDH
- Synchronous Digital Hierarchy
SMS
- Short Message Service
VII
SNMP
- Simple Network Management Protocol
SNR
- Subscription-Notification-Request
SPI
- Statistical Performance Index
SSH
- Secure Shell
TELNET
- Telecommunication Network Protocol
UAS
- User Agent Server
WDM
- Wavelength Division Multiplexing
VIII