Sie sind auf Seite 1von 328

DRAFT

Title page

Alcatel-Lucent TCO Suite


SWP TCO SUITE | Rel.1.8
for 9400AWY R.2.0 V2.0.6 and 9400AWY R.2.1 V2.1.2 & V2.1.3 & V2.1.4
User Manual

3DB 75003 CAAA


ISSUE 1
DRAFT

SEPTEMBER 2009
Legal notice
DRAFT
Legal notice

Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective
owners.
The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein.
Copyright © 2009 Alcatel-Lucent. All rights reserved.
DRAFT
DRAFT
Contents

About this document


Purpose ......................................................................................................................................................................................... xvii
xvii

What's new .................................................................................................................................................................................. xvii


xvii

Preliminary information ........................................................................................................................................................ xviii


xviii

avigation principles ............................................................................................................................................................. xviii


xviii

Structure of this manual ........................................................................................................................................................... xix


xix

otes on present edition ............................................................................................................................................................ xx


xx

Safety information ..................................................................................................................................................................... xxi


xxi

How to comment ........................................................................................................................................................................ xxi


xxi

Part I: TCO SUITE DESCRIPTION AND USAGE

1 SWP TCO SUITE Rel.1.8 SCOPES AND REQUIREMENTS

Overview ....................................................................................................................................................................................... 1-1


1-1

SWP TCO SUITE Rel.1.8 scopes, usability, features, and distribution to Customers ..................................... 1-2

SWP TCO SUITE Rel.1.8 User Manual scopes, distribution to Customers, and associated documentation
.................................................................................................................................................................................................. 1-31-3
1-3

PC requirements to run and install the SWP TCO SUITE Rel.1.8 .......................................................................... 1-4

PC Administrator privileges requirements to install and de-install the SWP TCO SUITE Rel.1.8
components ............................................................................................................................................................................... 1-5
1-5

2 ITEMS FOR SW DISTRIBUTION TO CUSTOMERS

Overview ....................................................................................................................................................................................... 2-1


2-1

CD-ROMs distributed to Customers ................................................................................................................................... 2-2

SWP TCO SUITE Rel.1.8 CD-ROM description .......................................................................................................... 2-4


DRAFT

otes on SWP CD–ROM identification, and Product Release ote ...................................................................... 2-6

...................................................................................................................................................................................................................................
3DB 75003 CAAA iii
Issue 1 September 2009
Contents
DRAFT
...................................................................................................................................................................................................................................

3 CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE NE, AND SECURITY POLICY

Overview ....................................................................................................................................................................................... 3-1


3-1

Types of physical access from the PC to the E ............................................................................................................ 3-2

PC– E network addressing rules ........................................................................................................................................ 3-8

Security policy .......................................................................................................................................................................... 3-16


3-16

4 GETTING STARTED

Overview ....................................................................................................................................................................................... 4-1


4-1

Preparation of the Craft Terminal based on SWP TCO SUITE Rel.1.8 ................................................................ 4-2

Equipment SW management by SWP TCO SUITE Rel.1.8 ...................................................................................... 4-2

Start up and functions of the TCO SUITE Rel.1.8 Main Menu screen ............................................................... 4-12

Checks the operator must do before accessing a E .................................................................................................. 4-14

Common behavior of E login, and application logoff, for the " E-interactive Provisioning Tool" and
"Alarms & Settings" ............................................................................................................................................................ 4-15
4-15

Close Current Session ............................................................................................................................................................ 4-23


4-23

Operational & Maintenance WebEML ............................................................................................................................ 4-24

Operational & Maintenance 1320CT ............................................................................................................................... 4-26

5 PROVISIONING TOOL

Overview ....................................................................................................................................................................................... 5-1


5-1

Introduction .................................................................................................................................................................................. 5-1


5-1

Provisioning Tool in not E–interactive modality (offline) ...................................................................................... 5-2

Provisioning Tool in E–interactive modality (online) ............................................................................................... 5-4

Full Configuration Procedure ................................................................................................................................................ 5-5


5-5

Configuration file conversion feature ................................................................................................................................. 5-7

6 ALARMS & SETTINGS

Overview ....................................................................................................................................................................................... 6-1


6-1

Alarms & Settings overview, start-up, and closing ....................................................................................................... 6-2

Alarms & Settings functions .................................................................................................................................................. 6-4


6-4

7 ACCEPTANCE TOOL
DRAFT

Overview ....................................................................................................................................................................................... 7-1


7-1
...................................................................................................................................................................................................................................
iv 3DB 75003 CAAA
Issue 1 September 2009
Contents

DRAFT
...................................................................................................................................................................................................................................

Acceptance Tool scope ............................................................................................................................................................ 7-2


7-2

Acceptance Tool start-up ......................................................................................................................................................... 7-4


7-4

Acceptance Tool in E–interactive modality (online) ................................................................................................. 7-4

Acceptance Tool in not E–interactive modality (offline) ...................................................................................... 7-18

8 NETO (NETWORK ELEMENT OVERVIEW)

Overview ....................................................................................................................................................................................... 8-1


8-1

General on EtO ........................................................................................................................................................................ 8-2


8-2

Summary of actions for the use of EtO .......................................................................................................................... 8-4

Details on EtO screen ......................................................................................................................................................... 8-12


8-12

E list management ............................................................................................................................................................... 8-19


8-19

9 9400AWY WEBEML

Overview ....................................................................................................................................................................................... 9-1


9-1

How to open the 9400AWY E WebEML main view ................................................................................................. 9-2

9400AWY main view organization ..................................................................................................................................... 9-3

View Area ..................................................................................................................................................................................... 9-5


9-5

Main tool bar ............................................................................................................................................................................... 9-9


9-9

Severity alarm synthesis, and Domain alarm synthesis ............................................................................................. 9-11

Management state control panel ........................................................................................................................................ 9-12


9-12

Access state (allow or inhibit E Craft Terminal access) ........................................................................................ 9-13

Introduction to the CT menu commands ........................................................................................................................ 9-14

10 ALARMS MONITOR AND EVENT LOG BROWSER

Overview .................................................................................................................................................................................... 10-1


10-1

Log switch .................................................................................................................................................................................. 10-2


10-2

Alarms Monitor ........................................................................................................................................................................ 10-3


10-3

Event Log Browser (ELB) ................................................................................................................................................. 10-24

11 MIB MANAGEMENT

Overview .................................................................................................................................................................................... 11-1


11-1

Craft Terminal commands for the management of MIB back-up files ................................................................ 11-2
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA v
Issue 1 September 2009
Contents
DRAFT
...................................................................................................................................................................................................................................

Default repository folders of MIB back-up files .......................................................................................................... 11-3

How to perform the MIB back-up ..................................................................................................................................... 11-4

How to perform the MIB restore ....................................................................................................................................... 11-7

How to remove a MIB back-up file from the repository folder ........................................................................... 11-10

12 NE SWP UPGRADE

Overview .................................................................................................................................................................................... 12-1


12-1

E SWP upgrade: introduction, restrictions, and upgrade cases ........................................................................... 12-2

Only for upgrade to 9400AWY V2.0.6 or V2.1.2: how to perform, by WebEML, the SWP download to the
E, and its activation .......................................................................................................................................................... 12-4
12-4

CT start–up, and check for the availability of the SWP to be downloaded ........................................................ 12-5

E login and initial operations (stations A and B) ...................................................................................................... 12-7

SW download to the E (station A) ................................................................................................................................. 12-9

Activation of the new Software Package on the E (station A) .......................................................................... 12-16

Additional operation for upgrade from older versions (station A) ...................................................................... 12-19

Operations on station B, and on the radio link (stations A and B) ...................................................................... 12-21

otes about E SW downgrade ...................................................................................................................................... 12-22

13 MANAGEMENT OF THE SECURITY FEATURES

Overview .................................................................................................................................................................................... 13-1


13-1

Management of “security by operator profiles” ........................................................................................................... 13-2

Management of “security by community string” ......................................................................................................... 13-5

Management of “security by access lists” ...................................................................................................................... 13-7

Part II: APPENDICES

14 Appendix A: PREPARATION OF THE CRAFT TERMINAL BASED ON SWP TCO SUITE Rel.1.8

Overview .................................................................................................................................................................................... 14-1


14-1

Operations sequence for the preparation of the Craft Terminal ............................................................................. 14-2

Functions of the other buttons of the Advanced Settings screen ......................................................................... 14-10

ote about TCO SUITE previous versions ................................................................................................................. 14-10


DRAFT

...................................................................................................................................................................................................................................
vi 3DB 75003 CAAA
Issue 1 September 2009
Contents

DRAFT
...................................................................................................................................................................................................................................

15 Appendix B: JRE INSTALLATION AND SWP TCO SUITE Rel.1.8 START UP

Overview .................................................................................................................................................................................... 15-1


15-1

eed for JRE installation ...................................................................................................................................................... 15-1


15-1

Standard behavior of SWP TCO SUITE Rel.1.8 start-up ......................................................................................... 15-2

Manual installation of Java JRE Package ....................................................................................................................... 15-3

Special conditions of SWP TCO SUITE Rel.1.8 start-up ........................................................................................ 15-5

16 Appendix C: LLMAN INSTALLATION, CONFIGURATION AND USE

Overview .................................................................................................................................................................................... 16-1


16-1

Foreword ..................................................................................................................................................................................... 16-2


16-2

Important warnings ................................................................................................................................................................. 16-2


16-2

Procedure for the LLMA installation, configuration and use .............................................................................. 16-3

Installation of LLMA from the SWP TCO SUITE Rel.1.8 CD-ROM ............................................................. 16-5

Installation and configuration of a Virtual etwork adapter for LLMA ....................................................... 16-11

Lower Layer settings ........................................................................................................................................................... 16-15


16-15

Check/set the " etwork Connections" order .............................................................................................................. 16-18

How to start and use the LLMA application ........................................................................................................... 16-20

17 Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED TELEPHONE NETWORK

Overview .................................................................................................................................................................................... 17-1


17-1

Introduction ............................................................................................................................................................................... 17-2


17-2

Certified equipment ................................................................................................................................................................ 17-2


17-2

Connection cables ................................................................................................................................................................... 17-3


17-3

Modem setting .......................................................................................................................................................................... 17-5


17-5

PC laptop "Dell Latitude" setting ...................................................................................................................................... 17-9


17-9

Setting up the connection ................................................................................................................................................... 17-10


17-10

Changing the ECT-equipment connection speed ...................................................................................................... 17-13

18 Appendix E: SWP TCO SUITE Rel.1.8 DEINSTALLATION

Overview .................................................................................................................................................................................... 18-1


18-1

Deinstallation of "Local copy of TCO Suite" and of "Local copy of WebEML" ............................................ 18-2
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA vii
Issue 1 September 2009
Contents
DRAFT
...................................................................................................................................................................................................................................

Deinstallation of Alcatel Lower Layers Manager & Tiny Tools ............................................................................ 18-2

Deinstallation of JRE ............................................................................................................................................................. 18-3


18-3

19 EDITORIAL INFORMATION

Overview .................................................................................................................................................................................... 19-1


19-1

Chapter scope, handbook identification, and archive method ................................................................................ 19-1

Description of changes with respect to the previous Issue ....................................................................................... 19-2

Document history .................................................................................................................................................................... 19-5


19-5
DRAFT

...................................................................................................................................................................................................................................
viii 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
List of tables

1-1 9400AWY Es and associated User Manuals ................................................................................................ 1-3

3-1 Typical Alcatel–Lucent RS232 cable and adapter ......................................................................................... 3-4

3-2 Typical Alcatel–Lucent Ethernet cables ............................................................................................................ 3-5

6-1 Operations allowed in the Alarms & Settings Main Menu screen, according to the AWY type and
Login profile ............................................................................................................................................................ 6-6
6-6

12-1 Procedure to upgrade the SWP in both stations of a radio link .............................................................. 12-4

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA ix
Issue 1 September 2009
DRAFT DRAFT
DRAFT
List of figures

3-1 Physical interfaces for the 9400AWY E management .............................................................................. 3-3

3-2 Access to E through E’s F interface (RS232 serial interface) on IDU MAI unit .................... 3-4

3-3 Access to E through E's Ethernet interface on IDU MAI unit ....................................................... 3-5

3-4 Access to E through E’s radio Interface and MS rings and chains ............................................... 3-6

3-5 E local access by one PC .................................................................................................................................. 3-12

3-6 Examples of E local and remote access by one PC, with Default Gateway or Static Route ... 3-13

3-7 Example of wrong local IP address definition .............................................................................................. 3-14

3-8 E access by more than one PC (example) ................................................................................................... 3-14

3-9 Example of OSPF Area configuration ............................................................................................................. 3-15

4-1 Flash Card content ..................................................................................................................................................... 4-3


4-3

4-2 Flash Card licence information (case of AWY V2.0.6 and V2.1.2) ........................................................ 4-4

4-3 Flash Card licence information (case of AWY V2.1.3 and V2.1.4) ........................................................ 4-5

4-4 Main phases of the equipment SW management ........................................................................................... 4-6

4-5 TCO Suite Main Menu screen ............................................................................................................................ 4-13

4-6 Connection parameter screen for the “ E–interactive Provisioning Tool” ....................................... 4-17

4-7 Connection parameter screen for the “Alarms & Settings” function ................................................... 4-18

4-8 etwork Adapter selection (example) ............................................................................................................. 4-19

4-9 etwork Adapter details ....................................................................................................................................... 4-20

4-10 Close Current Session: network settings restoration message (example) .......................................... 4-23

4-11 Close Current Session: etwork settings OK ............................................................................................... 4-23

5-1 Start of the “ ot E–interactive Provisioning Tool” ................................................................................... 5-2

5-2 “ ot E–interactive Provisioning Tool”: choice of E version .............................................................. 5-3


DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA xi
Issue 1 September 2009
List of figures
DRAFT
...................................................................................................................................................................................................................................

5-3 Start wizard screen of the “ ot E–interactive Provisioning Tool” ...................................................... 5-3

5-4 Start wizard screen of the “ E–interactive Provisioning Tool” ............................................................... 5-4

5-5 Provisioning Tool on-line guide ........................................................................................................................... 5-5

6-1 Alarms & Settings Main Menu screen ............................................................................................................... 6-4

6-2 Alarms & Settings "Date & Time Setting" request ....................................................................................... 6-8

6-3 Alarms & Settings "Configuration Setting" page .......................................................................................... 6-9

6-4 Alarms & Settings "Configuration Info" request ........................................................................................ 6-10

6-5 Alarms & Settings "Get Configuration File" request ................................................................................. 6-16

6-6 Alarms & Settings "Active Alarms: Static Page" ........................................................................................ 6-17

6-7 Alarms & Settings "Active Alarms: Automatic Page" .............................................................................. 6-17

6-8 Alarms & Settings "Power Measurement" request ..................................................................................... 6-18

6-9 Alarms & Settings "Modem Speed" request ................................................................................................. 6-19

6-10 Alarms & Settings "Licence Info" request ..................................................................................................... 6-20

6-11 Alarms & Settings " AT option" request ...................................................................................................... 6-21

6-12 AT router ................................................................................................................................................................. 6-22


6-22

7-1 Bench set–up and start–up of E–interactive Acceptance Tool ............................................................... 7-5

7-2 Authentication request for E login ................................................................................................................... 7-6

7-3 Main functions of the E–interactive Acceptance Tool .............................................................................. 7-7

7-4 Choose report template ............................................................................................................................................ 7-9

7-5 Functions available in the last step of the E-interactive Acceptance Tool ...................................... 7-12

7-6 Step 1 of the Acceptance Tool: Indoor installation visual inspection check ..................................... 7-13

7-7 Step 2 of the Acceptance Tool: Outdoor installation visual inspection check, and Antenna ....... 7-14

7-8 Step 3 of the Acceptance Tool: Channel protection switch, Loopback tests, Point to point BER
loop tests, and Rx level tests ............................................................................................................................ 7-14

7-9 Step 4 of the Acceptance Tool: Housekeeping input & output alarm acquisition, and Hop stability
test ............................................................................................................................................................................. 7-15
7-15

7-10 Step 5 of the Acceptance Tool: Equipment identification, and E software release ..................... 7-15

7-11 Step 6 of the Acceptance Tool: Acceptance ................................................................................................... 7-16

7-12 Step 7 of the Acceptance Tool: summary read–only tab panels and interactive buttons .............. 7-16
DRAFT

7-13 Functions available in Acceptance Tool in not E–interactive modality (offline) ......................... 7-19

...................................................................................................................................................................................................................................
xii 3DB 75003 CAAA
Issue 1 September 2009
List of figures

DRAFT
...................................................................................................................................................................................................................................

8-1 Starting EtO clicking the shortcut to the Local Copy of WebEML ..................................................... 8-6

8-2 Starting EtO clicking the button “Operational & Maintenance WebEML” of TCO Suite Main
Menu screen ............................................................................................................................................................. 8-6
8-6

8-3 EtO initial screen .................................................................................................................................................... 8-7


8-7

8-4 Start Supervision for one E in EtO initial screen .................................................................................... 8-9

8-5 Operations possible for a supervised E ........................................................................................................ 8-11

8-6 Supervision and Alarm Synthesis round-shaped icons .............................................................................. 8-13

8-7 EtO screen: reduced screen .............................................................................................................................. 8-14

8-8 Alarm severity icon in system tray-bar ........................................................................................................... 8-14

8-9 EtO E Configuration View: E Information ......................................................................................... 8-15

8-10 EtO E Configuration View: E Description .......................................................................................... 8-15

8-11 EtO E Configuration View: Command Buttons .................................................................................... 8-17

8-12 EtO List Management ........................................................................................................................................ 8-19

9-1 9400AWY Main view organization (example) ............................................................................................... 9-4

9-2 Main tool bar ............................................................................................................................................................... 9-9


9-9

9-3 Views menu: example of “External Points” view ....................................................................................... 9-25

9-4 Views menu: example of “Line Interface” view .......................................................................................... 9-25

9-5 Views menu: example of “Performance” view ............................................................................................ 9-26

9-6 Views menu: example of “Radio” view .......................................................................................................... 9-26

9-7 Views menu: example of “Protection Schemes” view .............................................................................. 9-26

9-8 Views menu: example of “Loopback” view .................................................................................................. 9-27

10-1 Log Switch screen ................................................................................................................................................... 10-2

10-2 Alarms Monitor – Severity alarm synthesis and Current Alarms .......................................................... 10-6

10-3 Alarms Monitor – Alarm Log ............................................................................................................................. 10-6

10-4 Alarms Monitor – Shows only the major alarms ......................................................................................... 10-7

10-5 Example of multiple E Alarms Monitor (2 Es) ................................................................................... 10-11

10-6 Exporting the alarms and logs .......................................................................................................................... 10-18

10-7 avigate from AM to USM .............................................................................................................................. 10-20

10-8 avigate from USM to AM .............................................................................................................................. 10-21


DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA xiii
Issue 1 September 2009
List of figures
DRAFT
...................................................................................................................................................................................................................................

10-9 Event Log Table screen ...................................................................................................................................... 10-25

10-10 Export events screen ............................................................................................................................................ 10-26

11-1 Default repository folders of MIB back-up files .......................................................................................... 11-3

11-2 Start of the MIB back-up (example) ................................................................................................................. 11-5

11-3 MIB backup completed ......................................................................................................................................... 11-5

11-4 Check of the creation of the required MIB backup file (example) ....................................................... 11-6

11-5 Start of the MIB restore (example) ................................................................................................................... 11-8

11-6 Question box after the MIB restore .................................................................................................................. 11-9

11-7 Remotion of a MIB back-up file from the repository folder (example) ........................................... 11-11

11-8 MIB back-up file removed from the repository folder (example) ...................................................... 11-12

12-1 FTP login default screen .................................................................................................................................... 12-10

12-2 FTP login automatically set screen ................................................................................................................ 12-10

12-3 Empty “Init SW download” screen ................................................................................................................ 12-12

12-4 Selection of the descriptor file R94A.DSC (example for V2.1.2 download) ................................. 12-13

12-5 Init download start ................................................................................................................................................ 12-13

12-6 Init download confirmation request (example for V2.1.2 download) ............................................... 12-14

12-7 Download in progress ......................................................................................................................................... 12-14

12-8 Download completed ........................................................................................................................................... 12-14

12-9 Check of downloaded SW version ................................................................................................................. 12-15

12-10 Activation of the Standby SW bank .............................................................................................................. 12-17

12-11 Confirm selected action request ...................................................................................................................... 12-17

12-12 Successful SW management action ............................................................................................................... 12-18

12-13 E restart after successful SW management action ................................................................................ 12-18

13-1 Profile Management options ............................................................................................................................... 13-3

13-2 Changing Password screen .................................................................................................................................. 13-3

13-3 Users Management screen ................................................................................................................................... 13-4

13-4 Users Management help screen ......................................................................................................................... 13-4

13-5 Alarms & Settings “Community String” request ........................................................................................ 13-6


DRAFT

13-6 Access list configuration default screen ......................................................................................................... 13-8

...................................................................................................................................................................................................................................
xiv 3DB 75003 CAAA
Issue 1 September 2009
List of figures

DRAFT
...................................................................................................................................................................................................................................

13-7 Alarms & Settings “Access List Backup” request ...................................................................................... 13-9

13-8 Alarms & Settings “Access List Restore” request ...................................................................................... 13-9

14-1 Creation of folder for repository of SWP TCO SUITE Rel.1.8 files ................................................... 14-3

14-2 SWP TCO SUITE Rel.1.8 Advanced Settings screen ............................................................................... 14-4

14-3 Local copy of TCO Suite ...................................................................................................................................... 14-6

14-4 Local copy of WebEML (JUSM/CT) ............................................................................................................... 14-8

15-1 Java installation request ........................................................................................................................................ 15-2

15-2 JRE installation in progress ................................................................................................................................. 15-2

15-3 Security Questions: Secure Content ................................................................................................................. 15-6

15-4 Secure Questions: Allow Secure Content ....................................................................................................... 15-6

15-5 Execution confirmation (Security Warning) ................................................................................................. 15-7

15-6 Security Warning (English browser on Italian System) ............................................................................ 15-8

15-7 Internet Explorer browser: no JRE installed ................................................................................................. 15-9

15-8 Firefox plug-in search ........................................................................................................................................... 15-9

15-9 Firefox plug-in installation ................................................................................................................................ 15-10

16-1 Remotion of previous version of LLMA .................................................................................................... 16-8

16-2 Alcatel Lucent Lower Layers Manager installation completion ............................................................ 16-9

16-3 Available LLMA functions and helps (Windows XP example) ....................................................... 16-10

16-4 Start page of “Lower Layers IP Manager Setup Help” ........................................................................... 16-13

16-5 Start page of “Lower Layers LLC Protocol Setup Help” ...................................................................... 16-14

16-6 Lower Layers Settings screen .......................................................................................................................... 16-16

16-7 Start page of “Lower Layers Settings Help” .............................................................................................. 16-17

16-8 Check for the " etwork Connections" order .............................................................................................. 16-19

16-9 PC desktop Properties settings for LLMA ............................................................................................... 16-21

16-10 LLMA screen ...................................................................................................................................................... 16-23

17-1 ECT-Equipment connection via Public Switched Telephone etwork ............................................... 17-2

17-2 ECT-Local external Modem cable .................................................................................................................... 17-3

17-3 F Interface-Remote Modem cable ..................................................................................................................... 17-4


DRAFT

17-4 TD-32 AC modem dip-switch setting .............................................................................................................. 17-7


...................................................................................................................................................................................................................................
3DB 75003 CAAA xv
Issue 1 September 2009
List of figures
DRAFT
...................................................................................................................................................................................................................................

17-5 Alcatel Lower Layers utility ............................................................................................................................. 17-14


DRAFT

...................................................................................................................................................................................................................................
xvi 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
About this document
About this document

Purpose
This manual gives all information regarding the use of the Alcatel-Lucent SWP TCO
SUITE Rel.1.8.

What's new
The new features of the SWP TCO SUITE Rel.1.8 are:
• Management of 9400AWY R.2.1 running with the SWP 9400AWY R.2.1 V2.1.4
The main new features of 9400AWY V2.1.4 are:
– new Performance Monitoring tool
– possibility of management by the Alcatel-Lucent 5620SAM management system.
– new full-range power supply IDU units.
The detailed description of these features is given in the specific 9400AWY R.2.1
V2.1.4 User Manual (see Table 1-1, “9400AWY Es and associated User Manuals”
(p. 1-3))
• increase to max 15 of the OS/LCT/RCT access EtO instances that can be active at a
time over one 9400AWY E (see point 2 of “Constraints for E access by EtO”
(p. 8-3))
For additional information, refer to the Product Release ote

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA xvii
Issue 1 September 2009
About this document
DRAFT
...................................................................................................................................................................................................................................

Preliminary information
1. Warranty
Any warranty must be referred exclusively to the terms of the contract of sale of the
equipment to which this handbook refers to.
Alcatel-Lucent makes no warranty of any kind with regards to this manual, and
specifically disclaims the implied warranties of merchantability and fitness for a
particular purpose. Alcatel-Lucent will not be liable for errors contained herein or for
damages, whether direct, indirect, consequential, incidental, or special, in connection
with the furnishing, performance, or use of this material.
2. Information
The product specification and/or performance levels contained in this document are
for information purposes only and are subject to change without notice. They do not
represent any obligation on the part of Alcatel-Lucent.
3. Copyright otification
The technical information of this manual is the property of Alcatel-Lucent and must
not be copied, reproduced or disclosed to a third party without written consent.

Navigation principles
This manual is delivered to Customers in electronic format only (file Adobe Acrobat pdf,
and/or in html format) inside the specific SWP TCO SUITE Rel.1.8 CD-ROM.
This file can be used both in PC and Unix WS environments or any other environment for
which a suitable Acrobat Reader has been envisaged by Adobe.
In particular take into account that, in order to open correctly this pdf file, the use of
Acrobat Reader Version 5.0 at least is mandatory. If opened with previous versions of
Adobe Acrobat Reader, incomplete document views will be produced.
For a comfortable navigation, two hyperlink types are present:
• those inside the text window, marked by blue text corresponding to a cross-reference
to a figure, table, part, section, chapter, paragraph, numbered list, and page: by
clicking such a blue text, you are led to the referenced component
• the bookmarks, present on the left side of the text window. They represent the on-line
handbook "table of contents". Bookmarks can be expanded (clicking on [+]) or
reduced (clicking on [-]). By clicking on one bookmark, you are led to the referenced
part.
ote: the bookmark window is not visible if you use Acrobat reader in "full-screen"
modality.
For further information, refer to Acrobat reader help on-line.
DRAFT

...................................................................................................................................................................................................................................
xviii 3DB 75003 CAAA
Issue 1 September 2009
About this document

DRAFT
...................................................................................................................................................................................................................................

Structure of this manual


Information in this manual is divided into the following parts:
1. Front matter
This part, with table of contents, lists of figures and tables, and general information.
2. Part I: “TCO SUITE DESCRIPTIO A D USAGE”
This part describes the SWP TCO SUITE Rel.1.8 and its most frequently used
functions:
I TRODUCTORILY DESCRIPTIO S
Read these chapters before using the SWP applications:
• Chapter 1, “SWP TCO SUITE Rel.1.8 SCOPES A D REQUIREME TS”
“This chapter sums up the scopes of the SWP TCO SUITE Rel.1.8, describes the
scopes of this manual, and describes the PC requirements necessary to run the
SWP TCO SUITE Rel.1.8.” (p. 1-1)
• Chapter 2, “ITEMS FOR SW DISTRIBUTIO TO CUSTOMERS”
“This chapter describes the items foreseen for the system SW (that resident inside
the equipment, and that for the E management)” (p. 2-1)
• Chapter 3, “CO ECTIO S BETWEE THE CRAFT TERMI AL A D THE
E, A D SECURITY POLICY”
“This chapter describes the types of physical access and the rules to observe
(network addresses and security) , to configure and allow the access from the
SWP TCO SUITE–based Craft Terminal to the E.” (p. 3-1)
OPERATIVE DESCRIPTIO S
• Chapter 4, “GETTI G STARTED”
“This chapter gives the basic information for the use of the SWP TCO SUITE
Rel.1.8.” (p. 4-1)
• Chapter 5, “PROVISIO I G TOOL”
“This chapter describes in detail the functions of the Main Menu's "Provisioning
Tool".” (p. 5-1)
• Chapter 6, “ALARMS & SETTI GS”
“This chapter describes in detail the Main Menu's "Alarms & Settings" functions.”
(p. 6-1)
• Chapter 7, “ACCEPTA CE TOOL”
“This chapter describes in detail the functions of the Main Menu’s “Acceptance
Tool”, used during the radio link line-up and commissioning.” (p. 7-1)
• Chapter 8, “ ETO ( ETWORK ELEME T OVERVIEW)”
“This chapter describes in detail the functions of EtO.” (p. 8-1)
• Chapter 9, “9400AWY WEBEML”
“This chapter describes in detail the organization and the functions of the
WebEML (Craft Terminal).” (p. 9-1)
• Chapter 10, “ALARMS MO ITOR A D EVE T LOG BROWSER”
“This chapter describes in detail the functions of Alarms Monitor and Event Log
Browser embedded in EtO application.” (p. 10-1)
• Chapter 11, “MIB MA AGEME T”
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA xix
Issue 1 September 2009
About this document
DRAFT
...................................................................................................................................................................................................................................

“This chapter describes how to perform the E MIB back-up and restore
operations, introduced in the ” (p. 11-1)“Procedures for the management of the
E software” (p. 4-6)
• Chapter 12, “ E SWP UPGRADE”
“This chapter describes how to upgrade to a new SWP any 9400AWY Rel.2.x E,
presently running with a previous SWP.” (p. 12-1)
3. Part II: “APPE DICES”
This part describes the less frequently used functions of the SWP TCO SUITE
Rel.1.8, and provides additional information.
• Chapter 14, “Appendix A: PREPARATIO OF THE CRAFT TERMI AL
BASED O SWP TCO SUITE Rel.1.8”
“This Appendix describes the Advanced Settings screen, and details all phases
necessary to copy and/or install the SWP components from the SWP TCO SUITE
Rel.1.8 CD-ROM, in the PC environment.” (p. 14-1)
• Chapter 15, “Appendix B: JRE I STALLATIO A D SWP TCO SUITE Rel.1.8
START UP”
“This Appendix describes how to install the required version of JRE, the standard
behavior of the SWP TCO SUITE Rel.1.8 start-up, as well as some special
conditions that may occur during it, and the countermeasures to take.” (p. 15-1)
• Chapter 16, “Appendix C: LLMA I STALLATIO , CO FIGURATIO A D
USE”
“This Appendix explains the operations to be done on the PC to allow the E
management through the E's F serial port.” (p. 16-1)
• Chapter 17, “Appendix D: CT- E CO ECTIO VIA PUBLIC SWITCHED
TELEPHO E ETWORK”
• “This Appendix explains the operations necessary to allow the remote connection
to the E's F–Interface, from a local PC configured as CT, through a switched
telephone line of the standard Public Telephone etwork.” (p. 17-1)
• Chapter 18, “Appendix E: SWP TCO SUITE Rel.1.8 DEI STALLATIO ”
“This Appendix describes how to de-install from the PC the SWP TCO SUITE
Rel.1.8 components.” (p. 18-1)

Notes on present edition


• This Issue 01 is the first validated and released edition associated to SWP TCO
SUITE Rel.1.8.
• WAR I G ABOUT SWP VERSIO :
– The SWP TCO SUITE version is written on the SWP CD-ROM you own, and that
contains this manual
– The SWP TCO SUITE Rel.1.8 is meant to be used only with the Alcatel-Lucent
9400AWY etwork Elements specified in the column E of Table 1-1,
“9400AWY Es and associated User Manuals” (p. 1-3)
DRAFT

...................................................................................................................................................................................................................................
xx 3DB 75003 CAAA
Issue 1 September 2009
About this document

DRAFT
...................................................................................................................................................................................................................................

– If you have a SWP TCO SUITE version different from 1.8 , do not use this
manual, but that specific for such a version.
– This manual is validated in conjunction with SWP TCO SUITE version 1.8 only.
Information relevant to SWP versions different from 1.8 , if any, must be
considered preliminary, subject to change and without any obligation on the part
of Alcatel-Lucent.

Safety information
This document does not contain any safety information (cautions or warnings) because
the SWP TCO SUITE Rel.1.8 is a software product.
Important! When working with any hardware that is associated with any piece of
software, always refer to the safety information that the hardware manufacturer provides
for that particular piece of hardware. For example, when working with a PC, refer to
safety information that is provided in the PC manufacturer documentation. When working
with any Alcatel-Lucent network element, refer to safety information that is provided in
the Alcatel-Lucent documentation for that particular E.
General safety recommendations: the safety recommendations here below must be
considered to avoid injuries on persons and/or damage to the equipment:
1. Service Personnel
Installation and service must be carried out by authorized persons having appropriate
technical training and experience necessary to be aware of hazardous operations
during installation and service, so as to prevent any personal injury or danger to other
persons, as well as prevent damaging the equipment.
2. Service Personnel skill
Service Personnel must have an adequate technical background on telecommunica-
tions and in particular on the Alcatel-Lucent 9400AWY etwork Elements specified
in Table 1-1, “9400AWY Es and associated User Manuals” (p. 1-3)
3. Access to the Equipment
Access to the Equipment in use must be restricted to Service Personnel only.
4. Safety Rules
Recommended safety rules are indicated in the specific " E User Manual" (see Table
1-1, “9400AWY Es and associated User Manuals” (p. 1-3))
5. Cautions to avoid equipment damage
Please refer to the specific " E User Manual" (see Table 1-1, “9400AWY Es and
associated User Manuals” (p. 1-3))

How to comment
To comment on this document, go to the Online Comment Form (http://infodoc.
alcatel-lucent.com/comments/) or e-mail your comments to the Comments Hotline
(comments@alcatel-lucent.com) .
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA xxi
Issue 1 September 2009
DRAFT DRAFT
DRAFT
Part I: TCO SUITE DESCRIPTION
AND USAGE

Overview
Purpose
This part describes the SWP TCO SUITE and its most frequently used functions.

Contents

Chapter 1, SWP TCO SUITE Rel.1.8 SCOPES A D REQUIREME TS 1-1


Chapter 2, ITEMS FOR SW DISTRIBUTIO TO CUSTOMERS 2-1
Chapter 3, CO ECTIO S BETWEE THE CRAFT TERMI AL A D THE 3-1
E, A D SECURITY POLICY
Chapter 4, GETTI G STARTED 4-1
Chapter 5, PROVISIO I G TOOL 5-1
Chapter 6, ALARMS & SETTI GS 6-1
Chapter 7, ACCEPTA CE TOOL 7-1
Chapter 8, ETO ( ETWORK ELEME T OVERVIEW) 8-1
Chapter 9, 9400AWY WEBEML 9-1
Chapter 10, ALARMS MO ITOR A D EVE T LOG BROWSER 10-1
Chapter 11, MIB MA AGEME T 11-1
Chapter 12, E SWP UPGRADE 12-1
Chapter 13, MA AGEME T OF THE SECURITY FEATURES 13-1
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA I-1
Issue 1 September 2009
DRAFT DRAFT
DRAFT
1 S1WP TCO SUITE Rel.1.8
SCOPES AND
REQUIREMENTS

Overview
Purpose
This chapter sums up the scopes of the SWP TCO SUITE Rel.1.8, describes the scopes of
this manual, and describes the PC requirements necessary to run the SWP TCO SUITE
Rel.1.8.

Contents

SWP TCO SUITE Rel.1.8 scopes, usability, features, and distribution to 1-2
Customers
SWP TCO SUITE Rel.1.8 User Manual scopes, distribution to Customers, and 1-3
associated documentation
PC requirements to run and install the SWP TCO SUITE Rel.1.8 1-4
PC Administrator privileges requirements to install and de-install the SWP TCO 1-5
SUITE Rel.1.8 components

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 1-1
Issue 1 September 2009
SWP TCO SUITE Rel.1.8 SCOPES AND REQUIREMENTS SWP TCO SUITE Rel.1.8 scopes, usability, features, and
DRAFT
distribution to Customers
...................................................................................................................................................................................................................................

SWP TCO SUITE Rel.1.8 scopes, usability, features, and


distribution to Customers
.
1. SWP scopes
The main objective of the SWP TCO SUITE Rel.1.8 is to offer, to Customers working
with Alcatel-Lucent 9400AWY Rel.2.0 and Rel.2.1 radio transmission products, new
management features, with no need to update the E-resident software, or to update
the existing E-specific SWP CD-ROM.
2. SWP usability
The use of all features of the SWP TCO SUITE Rel.1.8 is allowed with the
Alcatel-Lucent 9400AWY etwork Elements running with:
SWP 9400AWY R.2.0 V2.0.6

SWP 9400AWY R.2.1 V2.1.2

SWP 9400AWY R.2.1 V2.1.3

• SWP 9400AWY R.2.1 V2.1.4
3. SWP features for 9400AWY V2.0.6 and V2.1.2 E management
With respect to the E SW management tools:
• embedded TCO Suite
• 1320CT-based Craft Terminal
included in the:
• SWP 9400AWY R.2.0 V2.0.6 CD-ROM
• SWP 9400AWY R.2.1 V2.1.2 CD-ROM
the SWP TCO SUITE Rel.1.8 provides the following features:
• full Microsoft Windows Vista™ support
new full-Java EtO ( etwork Element Overview), replacing the functions of the

ES ( etwork Element Synthesis)
• new full-Java WebEML (Craft Terminal), replacing the functions of the 1320CT
ote: to avoid problems to the users of the E SW management tools included in
the E–specific SWP CD–ROM listed above, this new WebEML maintains the
same structure (main view, menu bar, screens organization, parameter name and
position, etc.) with a few differences, described in this manual.
4. SWP features for 9400AWY V2.1.3 and V2.1.4 E management
Differently from 9400AWY E running with V2.0.6 or V2.1.2, the 9400AWY E
running with V2.1.3 or V2.1.4 has no 1320CT–based Craft Terminal management
tools.
The 9400AWY E running with V2.1.3 or V2.1.4 can be managed only by the SWP
TCO SUITE.
5. SWP distribution to Customers
The SWP TCO SUITE Rel.1.8 is a standalone product delivered on a specific
CD-ROM.
DRAFT

...................................................................................................................................................................................................................................
1-2 3DB 75003 CAAA
Issue 1 September 2009
SWP TCO SUITE Rel.1.8 SCOPES AND REQUIREMENTS SWP TCO SUITE Rel.1.8 User Manual scopes, distribution

DRAFT
to Customers, and associated documentation
...................................................................................................................................................................................................................................

SWP TCO SUITE Rel.1.8 User Manual scopes, distribution to


Customers, and associated documentation
1. SWP TCO SUITE Rel.1.8 User Manual scope
• The specific “ E User Manual” (see Table 1-1, “9400AWY Es and associated
User Manuals” (p. 1-3)) gives all information regarding:
- the E, from system and hardware points of view
- the E SW management tools included in the specific "SWP E CD-ROM",
supplied with the E equipment
• The scope of this SWP TCO SUITE Rel.1.8 User Manual is to provide, in a way as
concise as possible, only the description of features of the SWP TCO SUITE
Rel.1.8 E SW management tools, that are different from those of the "SWP E
CD-ROM" cited above (with some exceptions).
• Therefore, to retrieve E-specific information, or any other information
referenced to in the following, this SWP TCO SUITE Rel.1.8 User Manual must
be always used together with the specific " E User Manual" having the P/
specified in Table 1-1, “9400AWY Es and associated User Manuals” (p. 1-3).
2. SWP TCO SUITE Rel.1.8 User Manual distribution to Customers
This manual is delivered to Customers in electronic format only (file Adobe Acrobat
pdf) inside the specific SWP TCO SUITE Rel.1.8 CD-ROM.
3. Associated documentation
Table 1-1 9400AWY NEs and associated User Manuals
NE and Manual P/N of the NE User Manual
9400AWY R.2.0 V2.0.6 User Manual 3DB06687LAAA
9400AWY R.2.1 V2.1.2 User Manual 3DB16142GAAA
9400AWY R.2.1 V2.1.3 User Manual 3DB16142JAAA
9400AWY R.2.1 V2.1.4 User Manual 3DB16142KAAA

otes:
• The specific E User Manual is present in a documentation CD–ROM automatically
delivered to Customer together with the equipment it refers to (one copy for each
terminal).
• In some cases, depending on the Edition of the E User Manual, the cross references
to it, specified in this manual (section name, chapter name, paragraph name), could
not correspond exactly to the referenced part. In this case, you can find the cross
referenced information in another part of the specific “ E User Manual“.
• In the following of this manual, when a generic reference to the “ E User Manual“ is
specified, you must obviously use that corresponding to the specific E you are
working with.
• For further information on the 9400AWY documentation set and additional
documents, please refer to the " E User Manual".
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 1-3
Issue 1 September 2009
SWP TCO SUITE Rel.1.8 SCOPES AND REQUIREMENTS PC requirements to run and install the SWP TCO SUITE
DRAFT
Rel.1.8
...................................................................................................................................................................................................................................

PC requirements to run and install the SWP TCO SUITE Rel.1.8


To run and install (if required) all functions of the SWP TCO SUITE Rel.1.8, a PC
meeting these requirements is necessary:
1. HW Configuration (minimum requirements)

- CPU: Pentium III 850 MHz


- RAM: 512 Mbytes (1 Gbytes suggested for Windows Vista)
- Hard Disk space: 4 Gbytes
- Display Resolution: 1024×768 pixel
- CD-ROM Drive: 24X
- Communication Interfaces:
• Ethernet Card 10/100 Mbits/sec is mandatory, if local / remote
communication with E's Ethernet port or TCP/IP network is required (if
both connections are required contemporarily, two Ethernet Cards are
needed)
• RS-232-C serial port (9.6 to 57.6 Kbits/sec) is suggested, if local
communication with E's ECT serial port (F-interface) is required. In
alternative, for the usage of the E's F-interface with any PC having no
RS232 serial port (but obviously with USB ports available), it is possible
to use an "USB to RS232 adapter"
Refer to “Types of physical access from the PC to the E” (p. 3-2), for details on
how to connect the PC to the Es, by local or remote connection.

2. Windows Versions
• Windows 2000 till SP4
• Windows XP till SP2 (Professional Edition only)
• Windows Vista
Warnings:
a. only one Windows version can be present in the same PC
b. only Windows versions in English language are supported
c. for all Windows versions, it is mandatory to de–activate the Firewall installed
d. restriction for Windows Vista: with Windows Vista, the SWP download for E
upgrade cannot use LLMA (therefore the E’s F interface must not be used for
the SWP download)
3. Additional SW requirements
• Java Runtime Environment (JRE): JRE 6 update 3
ote: the necessary version is included in the SWP CD-ROM
• Browser supported:
• for Windows 2000 and XP:
- Microsoft Internet Explorer 6.0 (6.0.2900.2180 SP1+)
- or Microsoft Internet Explorer 7.0 (7.0 .5730.11C0+)
• for Windows Vista:
DRAFT

...................................................................................................................................................................................................................................
1-4 3DB 75003 CAAA
Issue 1 September 2009
SWP TCO SUITE Rel.1.8 SCOPES AND REQUIREMENTS PC requirements to run and install the SWP TCO SUITE

DRAFT
Rel.1.8
...................................................................................................................................................................................................................................

- Microsoft Internet Explorer 7.0 (7.0 .5730.11C0+)


• for Windows 2000, XP, and Vista:
- Mozilla Firefox v2.x starting from v2.0.0.12
• Used browser window should be at least as larger as 1024x768
Warning: it is mandatory to manually disable system and browser proxy
configurations prior to use both “ E–interactive Provisioning Tool” and ”Alarms
& Settings” (web server) functions; otherwise, the IP connection from the PC’s
web server to the E cannot take place.
4. PC settings for its use inside the TCP/IP network
ote: you have nothing to do, if you are employing a PC already configured for
TCP/IP communication (e.g. already used for any Alcatel-Lucent 1320CT-based or
EtO-based applications).
These settings include the following types of configuration:
• PC hostname
• Communication Protocol : TCP/IP (if not automatically configured)
• IP address
• IP mask
These settings depend on the Windows version employed. Refer to its documentation,
to know how to perform them.

PC Administrator privileges requirements to install and


de-install the SWP TCO SUITE Rel.1.8 components
The PC Administrator privileges are necessary to install:
• the Java Runtime Environment (JRE), automatically or manually: see Chapter 15,
“Appendix B: JRE I STALLATIO A D SWP TCO SUITE Rel.1.8 START UP”
• the Alcatel-Lucent-proprietary LLMA and related Tiny Tools: see Chapter 16,
“Appendix C: LLMA I STALLATIO , CO FIGURATIO A D USE”
The PC Administrator privileges are also necessary to de-install them: see Chapter 18,
“Appendix E: SWP TCO SUITE Rel.1.8 DEI STALLATIO ”

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 1-5
Issue 1 September 2009
DRAFT DRAFT
DRAFT
2 I2TEMS FOR SW
DISTRIBUTION TO
CUSTOMERS

Overview
Purpose
This chapter describes the items foreseen for the system SW (that resident inside the
equipment, and that for the E management)

Contents

CD-ROMs distributed to Customers 2-2


SWP TCO SUITE Rel.1.8 CD-ROM description 2-4
otes on SWP CD–ROM identification, and Product Release ote 2-6

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 2-1
Issue 1 September 2009
ITEMS FOR SW DISTRIBUTION TO CUSTOMERS CD-ROMs distributed to Customers
DRAFT
...................................................................................................................................................................................................................................

CD-ROMs distributed to Customers


The scope of this paragraph is to compare the SW products present in the CD-ROMs:
• 9400AWY R.2.0 V2.0.6 CD-ROM
• 9400AWY R.2.1 V2.1.2 CD-ROM
• 9400AWY R.2.1 V2.1.3 CD-ROM
• 9400AWY R.2.1 V2.1.4 CD-ROM
• SWP TCO SUITE Rel.1.8 CD-ROM
1. E-specific equipment-resident software
The software necessary for the system working (equipment-resident software) is
present in the Flash Card delivered with the equipment, and inserted in the IDU
MAI unit.
Refer to “Flash Card content” (p. 4-3) for details.
2. E-specific software components for Equipment Controller and Peripheral Units
of 9400AWY (IDU and ODU)
These SW components are used whenever you have a:
• 9400AWY R.2.0 E running with SWP version < V2.0.6, and you want to
upgrade it to SWP version ⇒ V2.0.6 , by means of the SW download function
• 9400AWY R.2.1 E running with SWP version < V2.1.2, and you want to
upgrade it to SWP version ⇒ V2.1.2 , by means of the SW download function
• 9400AWY R.2.1 E running with SWP version < V2.1.3, and you want to
upgrade it to SWP version ⇒ V2.1.3 , by means of the SW download function
• 9400AWY R.2.1 E running with SWP version < V2.1.4, and you want to
upgrade it to SWP version ⇒ V2.1.4 , by means of the SW download function
These E-specific SW components:
are present respectively in the:

- 9400AWY R.2.0 V2.0.6 CD-ROM
- 9400AWY R.2.1 V2.1.2 CD-ROM
- 9400AWY R.2.1 V2.1.3 CD-ROM
- 9400AWY R.2.1 V2.1.4 CD-ROM
• are not present in the SWP TCO SUITE Rel.1.8 CD-ROM
3. Additional software products
• JRE (Java Runtime Environment), that is present, with the necessary specific
version, in the following CD-ROMs:
- 9400AWY R.2.0 V2.0.6 CD-ROM
- 9400AWY R.2.1 V2.1.2 CD-ROM
- SWP TCO SUITE Rel.1.8 CD-ROM
otes:
JRE is automatically installed in the PC at first insertion of the CD-ROM.
The JRE version present in the SWP TCO SUITE Rel.1.8 CD-ROM is higher than
that of JRE present in the other CD–ROMs listed above.
DRAFT

...................................................................................................................................................................................................................................
2-2 3DB 75003 CAAA
Issue 1 September 2009
ITEMS FOR SW DISTRIBUTION TO CUSTOMERS CD-ROMs distributed to Customers

DRAFT
...................................................................................................................................................................................................................................

The 9400AWY R.2.1 V2.1.3 and 9400AWY R.2.1 V2.1.4 CD–ROMs do not
contain any JRE component.
• LLMA (Lower Layer MA ager), that must be explicitly installed in the PC,
whenever the use of the E's local F interface (RS232 serial interface) is required.
This software product is present in the following CD-ROMs:
- 9400AWY R.2.0 V2.0.6 CD-ROM
- 9400AWY R.2.1 V2.1.2 CD-ROM
- SWP TCO SUITE Rel.1.8 CD-ROM
ote: the LLMA version present in the SWP TCO SUITE Rel.1.8 CD–ROM is
higher than that of LLMA present in the other CD–ROMs.
Moreover:
- it is also higher than that of LLMA present in the SWP TCO SUITE Rel.1.6
CD–ROM,
- but is equal to that of LLMA present in the SWP TCO SUITE Rel.1.7
CD–ROM.
4. E management SW tools
a. contained in the SWP TCO SUITE Rel.1.8 CD-ROM: refer to “SWP TCO
SUITE Rel.1.8 CD-ROM contents” (p. 2-4)
b. contained in the E-specific SWP CD-ROM:
they are the:
- embedded TCO Suite
- 1320CT-based Craft Terminal
present respectively in the:
- 9400AWY R.2.0 V2.0.6 CD-ROM
- 9400AWY R.2.1 V2.1.2 CD-ROM
The installation and use of these E management SW tools is explained in the
specific " E User Manual"
ote: the 9400AWY R.2.1 V2.1.3 and 9400AWY R.2.1 V2.1.4 CD–ROMs do not
contain any E management SW tool.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 2-3
Issue 1 September 2009
ITEMS FOR SW DISTRIBUTION TO CUSTOMERS SWP TCO SUITE Rel.1.8 CD-ROM description
DRAFT
...................................................................................................................................................................................................................................

SWP TCO SUITE Rel.1.8 CD-ROM description


SWP TCO SUITE Rel.1.8 CD-ROM part number
The P/ of the SWP TCO SUITE Rel.1.8 CD-ROM, containing this manual, is written on
the CD-ROM itself you own.

SWP TCO SUITE Rel.1.8 CD-ROM contents


The following software products are contained in the SWP TCO SUITE Rel.1.8
CD-ROM:
1. TCO Suite Main Menu
The TCO Suite Main Menu is the starting point of this SWP, with the screen depicted
in Figure 4-5, “TCO Suite Main Menu screen” (p. 4-13). The functions available are:
• Provisioning Tool : it starts a wizard tool, which allows to configure completely
and easily one 9400AWY V2.0.6 or V2.1.2 or V2.1.3 or V2.1.4 E, in not
E-interactive (off-line), or in E-interactive (on-line) modality. This tool allows
also to modify a configuration created previously, and to get the configuration
from a running E.
• Alarms & Settings : it starts a NE-interactive function, allowing the user to
login a E through the use of the E web server via a generic Internet browser, to
monitor the status of E alarms and to get and/or set some E's parameters
• Start of one NEtO session : see next point 2
• Start of 1320CT : it is meant for old 9400AWY Es backward compatibility
only
• Advanced Settings : functions to install the SWP in PC
2. EtO
EtO ( etwork Element Overview) is the starting point to make a full supervision
and control of the most recent Alcatel-Lucent radio transmission Es: 9400AWY
from version V2.0.6, 9400AWY from version V2.1.2.
ote: EtO is used also for the Alcatel–Lucent radio transmission 9500MPR Es (all
versions), but you must be aware that the SWP TCO SUITE Rel.1.8 does not manage
any version of 9500MPR Es.
It allows to perform the following operations on one E:
start its supervision

run the Alarm Monitor function

perform its login, launching the WebEML application specific for the E type and

version (see next point 3)
3. WebEML (full-Java Local and Remote Craft Terminal)
The WebEML is used for the complete E management, allowing the dialogue
between the Craft Terminal and the E.
Each E type and version has its own WebEML SW package.
The SWP TCO SUITE Rel.1.8 contains the WebEML SW packages for:
• 9400AWY V2.0.6
DRAFT

• 9400AWY V2.1.2
...................................................................................................................................................................................................................................
2-4 3DB 75003 CAAA
Issue 1 September 2009
ITEMS FOR SW DISTRIBUTION TO CUSTOMERS SWP TCO SUITE Rel.1.8 CD-ROM description

DRAFT
...................................................................................................................................................................................................................................

• 9400AWY V2.1.3
• 9400AWY V2.1.4
4. Additional software products
• JRE (Java Runtime Environment), that is automatically installed in the PC at first
insertion of the SWP TCO SUITE Rel.1.8 CD-ROM
• LLMA (Lower Layer MA ager), that must be explicitly installed in the PC,
whenever the use of the E's local F interface (RS232 serial interface) is required.
ote: as specified in previous point 2 , the SWP TCO SUITE Rel.1.8 CD-ROM does
not contain the E-specific software components for E upgrading. If necessary, they
must be retrieved from the E-specific SWP CD-ROM.

Language options of the SWP TCO SUITE Rel.1.8


All E management tools included in the SWP TCO SUITE Rel.1.8 are natively in
English, and cannot be provided in other languages, with the exception of the WebEML
menus.
The conversion of the WebEML menus, which are natively in English, in other languages
is possible, on contract basis (this process is called localization). The following languages
are supported: Spanish, Italian, German, French. Localization is not done in the standard
CT product, but is in charge of Alcatel-Lucent local units. Please refer to them for
additional information.

Additional requirements for the use of the SWP TCO SUITE Rel.1.8
1. E software state
• the E type must be ULS, and the SWP active version in the E's Flash Card
must be:
- V2.0.6 (if 9400AWY R.2.0)
- V2.1.2 or V2.1.3 or V2.1.4 (if 9400AWY R.2.1)
This check can be done making the E supervision by EtO, then reading the E
type (ULS) and version.
• any 9400AWY E, that must be accessed in local or remote way by the SWP
TCO SUITE applications, must have already a valid “local IP address” and a valid
“Ethernet Configuration IP address”, and such addresses must be known by the
Operator.
2. Security
Operations allowed by the SWP TCO SUITE’s SW tools are submitted to security
controls, described in Chapter 13, “MA AGEME T OF THE SECURITY
FEATURES”
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 2-5
Issue 1 September 2009
ITEMS FOR SW DISTRIBUTION TO CUSTOMERS SWP TCO SUITE Rel.1.8 CD-ROM description
DRAFT
...................................................................................................................................................................................................................................

3. Operator skills
• the Operator shall be familiar with the use of personal computers in WINDOWS
environment (versions specified in point 2 of “PC requirements to run and install
the SWP TCO SUITE Rel.1.8” (p. 1-4), internally to which the etwork Element's
application software operates.
• the Operator must be familiar with all the functionalities of the 9400AWY R.2.0
and/or 9400AWY R.2.1 equipment.
• furthermore, for a number of configuration applications, the operator shall be
aware of some specifications of the International Standard Organization (ISO) and
of the standards applied to the Synchronous Digital Hierarchy (SDH) (CCITT
Recommendations).

Notes on SWP CD–ROM identification, and Product Release


Note
These notes apply both to the “SWP TCO SUITE CD–ROMs”, and to the “SWP
9400AWY V2.x.x CD–ROMs”:
1. SWP CD–ROM identification
• each SWP is distributed by means of a specific SWP CD–ROM
• a SWP is identified by its “Denomination”, “P/ ” (Part umber) and “CS”
(Change Status), that are printed on the CD–ROM’s label
• a SWP with new Version Level, providing main features in addition to those of the
previous Version Level SWP, is distributed by means of a SWP CD–ROM having
new “Denomination”, new “P/ ” (Part umber), and “CS” restarting from 01
a SWP patch version, if any, is created to correct SW bugs, and/or to add minor

features, and is distributed by means of a SWP CD–ROM, that can be identified:
- by the same “P/ ” of the former CD–ROM, but with an incremented “CS”
number (e.g. CS=02 instead of previous CS=01)
- or by a new “P/ ”, and “CS” restarting from 01
2. Product Release ote
• the Product Release ote contains information not strictly necessary for
Customers (like the SW Package Identification data, the list of SW Package
Components, the list of ECT SW Sub-Components, the description of new
features and modifications, restrictions and known problems, etc.).
• the Product Release ote is neither contained in the SWP CD-ROM nor
automatically delivered to Customers.
• the Product Release ote is available only on specific request to your
Alcatel-Lucent local dealer, specifying the SWP CD-ROM P/ and CS (edition)
printed on the SWP CD-ROM itself.
DRAFT

...................................................................................................................................................................................................................................
2-6 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
3 3 ONNECTIONS BETWEEN
C
THE CRAFT TERMINAL AND
THE NE, AND SECURITY
POLICY
Overview
Purpose
This chapter describes the types of physical access and the rules to observe (network
addresses and security) , to configure and allow the access from the SWP TCO
SUITE–based Craft Terminal to the E.

Contents

Types of physical access from the PC to the E 3-2


PC– E network addressing rules 3-8
Security policy 3-16

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 3-1
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE Types of physical access from the PC to the NE
DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Types of physical access from the PC to the NE


The access to a 9400AWY E, for its management by the PC running the SWP TCO
SUITE Rel.1.8 software , can be on the following interfaces of the 9400AWY E:
• Figure 3-2, “Access to E through E’s F interface (RS232 serial interface) on IDU
MAI unit” (p. 3-4)
• Figure 3-3, “Access to E through E's Ethernet interface on IDU MAI unit”
(p. 3-5)
• Figure 3-4, “Access to E through E’s radio Interface and MS rings and chains”
(p. 3-6)
otes for all types of access:
1. Depending on physical interface, the use of some SW management tools has some
restrictions.
2. LCT and RCT
The specification of LCT (Local Craft Terminal) and RCT (Remote Craft Terminal),
in following figures, is relevant to the CT characterization for the supervised E. This
implies different command feasibility behaviors (some commands cannot be executed
by RCT).
3. Max number of contemporary accesses to the same E
For the E access by:
• Main Menu E–interactive functions ( ”on–line Provisioning Tool” and “Alarms
& Settings” ), up to five Ethernet user connections are supported at the same time
on a single E
• WebEML (through EtO) and OS, refer to “Constraints for E access by EtO”
(p. 8-3)
DRAFT

...................................................................................................................................................................................................................................
3-2 3DB 75003 CAAA
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE Types of physical access from the PC to the NE

DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Figure 3-1 Physical interfaces for the 9400AWY NE management

Comparison with the E management software tools of the:


• 9400AWY R.2.0 V2.0.6 CD-ROM,
• and of the 9400AWY R.2.1 V2.1.2 CD-ROM
with the E management software tools of the SWP TCO SUITE Rel.1.8:
• there is no need of manual interface customization for alternative use of F-interface or
Ethernet-interface
• the access to the E requires always the E address specification, even in case of
PC- E interconnection by F-interface

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 3-3
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE Types of physical access from the PC to the NE
DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Figure 3-2 Access to NE through NE’s F interface (RS232 serial interface) on IDU
MAIN unit

Table 3-1 Typical Alcatel–Lucent RS232 cable and adapter


Cable / Adapter P/N Notes
RS232 cable 1AB054120027 Standard RS232 cable
USB to RS232 adapter 1AF11294AA** In addition to the standard RS232 cable,
for the usage of the E’s F–interface with
any PC having no RS232 serial port (but
obviously with USB ports available)

Accessing the E by its F Interface:


• you can use the EtO applications (WebEML and Alarms Monitor)
• you cannot use the E-interactive applications of the SWP TCO SUITE Main Menu
(Provisioning Tool, Alarms & Settings, and Acceptance Tool)
• the CT characterization is always LCT.
Warning: for the use of the F interface, the LLMA installation and configuration must
be performed, as described in Chapter 16, “Appendix C: LLMA I STALLATIO ,
CO FIGURATIO A D USE”
Refer to the Chapter 17, “Appendix D: CT- E CO ECTIO VIA PUBLIC
SWITCHED TELEPHO E ETWORK”, to know how to implement the connection via
the public switched telephone network.
DRAFT

...................................................................................................................................................................................................................................
3-4 3DB 75003 CAAA
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE Types of physical access from the PC to the NE

DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Figure 3-3 Access to NE through NE's Ethernet interface on IDU MAIN unit

Table 3-2 Typical Alcatel–Lucent Ethernet cables


type length (m) P/N
normal (direct) cable 1 3CC52141AAAA
5 3CC52141ABAA
15 3CC52141ACAA
cross–connect cable 1 3CC52142AAAA
5 3CC52142ABAA

Accessing the E locally by its Ethernet Interface:


• you can use all EtO applications (WebEML and Alarms Monitor) and all the
E-interactive applications of the SWP TCO SUITE Main Menu (Provisioning Tool,
Alarms & Settings, and Acceptance Tool)
• the CT characterization is always LCT.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 3-5
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE Types of physical access from the PC to the NE
DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Figure 3-4 Access to NE through NE’s radio Interface and NMS rings and chains

Refer to the specific " E User Manual" for details on the MS connections.
DRAFT

...................................................................................................................................................................................................................................
3-6 3DB 75003 CAAA
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE Types of physical access from the PC to the NE

DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Considering the access to the Station B from the PC connected to the Station A in figure
above, if the PC is connected to:
• the Ethernet interface of the Station A, you can access the Station B using all EtO
applications (WebEML and Alarms Monitor) and all the E-interactive applications of
the SWP TCO SUITE Main Menu (Provisioning Tool, Alarms & Settings, and
Acceptance Tool)
• the F interface of the Station A, you can access the Station B:
– using the EtO applications (WebEML and Alarms Monitor)
– but not using the E-interactive applications of the SWP TCO SUITE Main Menu
(Provisioning Tool, Alarms & Settings, and Acceptance Tool)
• the CT characterization is always RCT.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 3-7
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE PC–NE network addressing rules
DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

PC–NE network addressing rules


Purpose
This paragraph describes the network address rules that must be observed to allow a PC
(running the SWP TCO SUITE) the access to one or more 9400AWY Es.
The following matters are described:
• “ E’s management interfaces” (p. 3-8)
• “ E’s “local IP address” and “Ethernet Configuration IP address”” (p. 3-9)
• “ E reachability from the CT” (p. 3-10)
• “ etworking scenarios for PC connection to the E’s local IP address” (p. 3-11)

NE’s management interfaces


For its management by SWP TCO SUITE tools, the 9400AWY E has:
• one Ethernet management interface, which is used to access the E, and that is
identified by its “local IP address” and “Ethernet Configuration IP address”
• one point–to–point TM –RF interface toward the other E of the radio link
• and one selectable point–to–point TM –V11 or TM –G703 interface toward another
co–located E
• all point–to–point interfaces (TM –RF, and TM –V11 or TM –G703) are
unnumbered and borrow the IP address from the “local IP address”.
DRAFT

...................................................................................................................................................................................................................................
3-8 3DB 75003 CAAA
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE PC–NE network addressing rules

DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

NE’s “local IP address” and “Ethernet Configuration IP address”


As delivered from Alcatel–Lucent Factory, the E’s addresses:
• “local IP address”, used to identify uniquely the E inside the Transmission
Management etwork (TM )
• and the “Ethernet Configuration IP address”, used to identify uniquely the E’s
Ethernet management interface inside the TCP/IP network
are both set at default value “10.0.1.2”, as shown in screen below (one of the steps of the
Full Configuration Procedure described in Chapter 5, “PROVISIO I G TOOL”

These values can be maintained only until the E remains disconnected from the TCP/IP
network and from the TM , and must be changed to have them different from those of
the other Es present in the accessible network. Their setting is foreseen in the
commissioning phase; for details, refer to the specific “ E User Manual”.
In the commissioning phase, you can define the “local IP address” and “Ethernet
Configuration IP address”:
• with the same value (suggested solution)
• or with different values
ote: if such E addresses are different, they must not belong to the same
subnetwork, as in following correct example:
• “local IP address” = 151.98.96.221
• and “Ethernet Configuration IP address” = 151.98.97.232 with IP Mask =
255.255.255.0
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 3-9
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE PC–NE network addressing rules
DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

ote: in the case these E addresses are different:


• the “local IP address” is that to be always used to access the E by EtO
application
• the “Ethernet Configuration IP address” is that to be always used to access the E
by the “ E–interactive Provisioning Tool” and ”Alarms & Settings” (web server)
functions.

NE reachability from the CT


1. Foreword
The CT must be able to reach the E, through one of the local or remote connections
described in “Types of physical access from the PC to the E” (p. 3-2)
The access rules are different according to the type of application used; if you access a
E from your PC:
a. through the F–interface, and by the EtO application, the E’s “local IP
address” must be always used, and there are no network constraints
b. through the Ethernet interface, and by the EtO application, for which the E’s
“local IP address” must be always used, it is necessary to build a networking
relationship, according to the PC– E connection scenario, between:
- the IP address of the PC
- the local IP address of the E
- the Ethernet Configuration IP address of the E
as described in “ etworking scenarios for PC connection to the E’s local IP
address” (p. 3-11)
c. through the Ethernet interface, and by the “ E–interactive Provisioning Tool”
and ”Alarms & Settings” applications (web server operations), any problems
between the IP addresses of the PC and the E are solved automatically, choosing
“Local” or “Remote” in the application start screen, as described in “Common
behavior of E login, and application logoff, for the " E-interactive Provisioning
Tool" and "Alarms & Settings"” (p. 4-15)
2. How to check the E reachability from the CT
ote: Usually, these operations have to be performed once only (i.e., whenever you
have not done them previously for the specific E). This check is not necessary in
case of PC– E connection through the F–interface.
To make this check, open the Windows Command Prompt application and execute the
command:
ping <space> E_address <space>
Verify the connection, then close the command window.
ote: in case the “local IP address” and “Ethernet Configuration IP address” are
different from each other, perform this check for both.
DRAFT

...................................................................................................................................................................................................................................
3-10 3DB 75003 CAAA
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE PC–NE network addressing rules

DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Networking scenarios for PC connection to the NE’s local IP address


These scenarios describe the networking address configurations necessary to allow a PC
(running the SWP TCO SUITE) to access a 9400AWY E through its “local IP
address”.
ote: Address values are given as examples. Moreover:
“address_value/24” means “with IP mask = 255.255.255.0”

In this case, if the “address_value” is that of the subnet 192.168.1.0, all addresses
192.168.1.0 to 192.168.1.255 are stated as belonging to the subnet
• “address_value/32” means “with IP mask = 255.255.255.255”
In this case, if the “address_value” is that of the subnet 192.168.1.0, only the
address 192.168.1.0 is stated as belonging to the subnet
1. E local access by one PC
See Figure 3-5, “ E local access by one PC” (p. 3-12):
• the CT accesses the E using the “local IP address”; the S MP traps are sent by
E using the “local IP address” as source IP address
• it is possible to configure the “Ethernet Configuration IP address” with the same
value used for “local IP address”
• the subnet must be defined both on the PC and the E
2. E local and remote access by one PC, with Default Gateway or Static Route, or
OSPF
• in this scenario, to reach the local and remote Es by their own “local IP
address”, the PC must be configured with a Default Gateway or Static Route
having as gateway the “Ethernet Configuration IP address” of the local E
(192.168.1.1 in Figure 3-6, “Examples of E local and remote access by one PC,
with Default Gateway or Static Route” (p. 3-13))
• at the same time the CT must be reachable by the remote E using a Static Route
on the remote E, or enabling OSPF on both local and remote Es
Warning: if both the “local IP address” and the “Ethernet Configuration IP
address” of the local E belong to the same subnetwork, the “local IP address” of
the local and remote Es must never belong to the same subnetwork. E.g. the
scenario of Figure 3-7, “Example of wrong local IP address definition” (p. 3-14) does
not work:
3. E access by more than one PC
To allow more than one PC to access the Es in the network, their “local IP address”,
and the IP addresses of the PCs, must belong to different subnets, as shown in Figure
3-8, “ E access by more than one PC (example)” (p. 3-14)
4. otes on OSPF routing
• the OSPF routing protocol can be activated on each point–to–point interface
(TM –RF, TM –V11, and TM –G703) and on the “Ethernet Configuration IP
address” interface
• the 9400AWY E can act as ABR (Area Border Router) managing a maximum of
4 areas (Backbone + 3 areas). It is possible to assign different OSPF areas to each
point–to–point interface, and to the “Ethernet Configuration IP address” interface
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 3-11
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE PC–NE network addressing rules
DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

• an OSPF area can be configured as Stub Area. Configuring a Stub Area reduces
the topological database size and reduces the memory requirements for E inside
that area for Es that are not ABR
• the OSPF Area Identifier can take a form similar to an IP address A.B.C.D
• the Area 0 or Backbone has Area ID 0.0.0.0
• the Area ID has not any correlation with the IP address of the interface that
belongs to that area
• enabling OSPF, static routing information configured on one E are automatically
redistributed as OSPF external routes inside the OSPF areas active on this E
• static routings are not redistributed inside the OSPF areas configured as Stub Area
• if OSPF is enabled on Es, static routes, if needed, have to be added only on the
E reached by Ethernet (called Gateway E)
• in case of CT not directly connected to the Gateway E, the Ethernet interface of
this E must be reachable in order to make the software download working
• see Figure 3-9, “Example of OSPF Area configuration” (p. 3-15)

Figure 3-5 NE local access by one PC


DRAFT

...................................................................................................................................................................................................................................
3-12 3DB 75003 CAAA
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE PC–NE network addressing rules

DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Figure 3-6 Examples of NE local and remote access by one PC, with Default
Gateway or Static Route (1 of 2)

Figure 3-6 Examples of NE local and remote access by one PC, with Default
Gateway or Static Route (2 of 2)

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 3-13
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE PC–NE network addressing rules
DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Figure 3-7 Example of wrong local IP address definition

Figure 3-8 NE access by more than one PC (example)


DRAFT

...................................................................................................................................................................................................................................
3-14 3DB 75003 CAAA
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE PC–NE network addressing rules

DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Figure 3-9 Example of OSPF Area configuration

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 3-15
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE Security policy
DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Security policy
Summary of security features
The aim of the security features of 9400AWY system is to protect the E from all
undesired accesses.
The following security features are available:
• usable on AWY V2.0.6, V2.1.2, V2.1.3, and V2.1.4:
– “Security by operator profile” (p. 3-17)
This is a standard feature, allowing the E access only through a User ame and
Password set, valid for the specific E.
As delivered from Alcatel–Lucent factory, the Flash Card contains only one
default Administrator User ame and Password set.
• usable on AWY V2.1.3 and V2.1.4 only:
– “Security by community string” (p. 3-19)
This feature is associated to the EtO applications, and allows to assign to the E
a “community string”. An user who wants to access such a E, must provide this
“community string” before to supervise and login the E.
– “Security by access lists” (p. 3-20)
The E management operations that can be done by means of the SWP TCO
SUITE are grouped in different services: ”snmp”, “http”, “ftp” and “telnet”. The
feature Security by access lists allows to write an access list table, for each one of
the services stated above, containing the IP addresses allowed to perform that
specific service.
Both these security features are optional. For both these security features, the Flash
Card (as delivered from Alcatel–Lucent factory) contains default parameters,
corresponding to “security feature not active”.
ote: The management of the security features is described in Chapter 13,
“MA AGEME T OF THE SECURITY FEATURES”
DRAFT

...................................................................................................................................................................................................................................
3-16 3DB 75003 CAAA
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE Security policy

DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Security by operator profile


1. User ame and Password
To login a E, whichever the physical access method, you must have a User ame
and Password set, valid for the specific E.
User ame and Password are requested by a prompt screen like this:

At first installation time, one default Administrator user is available only, with
(lower case) :
• User ame= initial
• Password = initialing
Otherwise, use the Login information the Administrator has assigned you.
In the login procedure, the username is displayed on the screen, while the clear–text
password is not displayed on the screen. After 3 times of consecutive unsuccessful E
login attempts, the CT– E logical interface closes the login procedure. To access the
E, a new login action must be performed.
Warning: the change of the password of this Administrator user is strongly
suggested, to be done at the end of all commissioning phases. Further this initial user,
the Administrator is allowed to create/delete users belonging to the predefined
profiles.
2. Login profiles
Each user (identified by a User ame and a Password) is associated to one of the
predefined profiles.
The predefined profiles are the following:
• Administrator (both for OS interface and CT/MibBrowser interface)
The Administrator can do everything on the E. In particular, only the
Administrator can manage the security features summed up in “Summary of
security features” (p. 3-16):
– add/remove users, besides changing own password and those of all users
– set/change/remove the community string
– set/change/remove the access lists
– export the access lists from a E, and import them in another E.
• Constructor (only for OS interface)
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 3-17
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE Security policy
DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

This Operator can do everything on the E also to access to the Manager List
by-passing the RM checks, but for this Operator some administration functions
are disabled: for example the Constructor cannot add or remove operators, and
cannot do backup and restore.
This user profile is related only to OS system and so not stored on MIB E.
• Operator (both for OS interface and CT/MibBrowser interface)
This Operator has in charge the operation at network level, not at radio site.
This Operator can change her/his own user password.
This Operator cannot manage network configuration, only for TP Configuration,
due to dangerous isolation of E.
This Operator cannot do backup/restore, or restart E. Also the provisioning of
equipment is not supported, as well the operations requiring the operator presence
on the radio site.
• CraftPerson (only for CT/MibBrowser interface)
This Operator has in charge the installation and the maintenance at radio site.
This Operator can do everything on E system, but cannot manage the security
features, but can change her/his own user password.
• Viewer (both for OS interface and CT/MibBrowser interface)
This Operator can only explore the E.
This Operator can change her/his own user password.
3. Operations allowed to Login profiles, according to functions, access, and local
access status
• E-interactive Provisioning Tool (described in Chapter 5, “PROVISIO I G
TOOL”)
- allowed to the Administrator, CraftPerson, and Operator
- denied to the Viewer
• Alarms & Settings: (described in Chapter 6, “ALARMS & SETTI GS”) : refer
to Table 6-1, “Operations allowed in the Alarms & Settings Main Menu screen,
according to the AWY type and Login profile” (p. 6-6)
• E–interactive Acceptance Tool (described in Chapter 7, “ACCEPTA CE
TOOL”
- allowed to the Administrator and CraftPerson
- denied to the Operator and Viewer
• WebEML (described in Chapter 9, “9400AWY WEBEML”) : refer to “Security by
operator profile” (p. 9-15)
DRAFT

...................................................................................................................................................................................................................................
3-18 3DB 75003 CAAA
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE Security policy

DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Security by community string


ote: available on AWY V2.1.3 and V2.1.4 Es only
This feature is associated to the EtO applications only.
As delivered from Alcatel–Lucent factory, the Flash Card contains the “community
string” = “private” as default value. When EtO is opened, it contains always
“community string” = “private” as default value. This condition corresponds to “security
by community string” not active.
The E Administrator, if modifies the E’s own “community string” ( as described in
“Management of “security by community string”” (p. 13-5) ), must communicate this
string to the users who should be authorized to supervise and login the E. Any of these
users, to be authorized to access such a E, must provide this “community string” before
to supervise and login the E, as described in Step 2 of “Operations with EtO” (p. 8-6).
For the system behaviors when the “community string” of a E is modified, while an user
has a EtO session opened on the same E (supervision, WebEML, and Alarms
Monitoring), refer to the points b and c of the “Procedures for the management of the
“security by community string”” (p. 13-5).

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 3-19
Issue 1 September 2009
CONNECTIONS BETWEEN THE CRAFT TERMINAL AND THE Security policy
DRAFT
NE, AND SECURITY POLICY
...................................................................................................................................................................................................................................

Security by access lists


ote: available on AWY V2.1.3 and V2.1.4 Es only
This feature is associated to all SWP TCO SUITE applications.
The E management operations that can be done by means of the SWP TCO SUITE are
performed using the following different services:
• snmp: all E–interactive operations performed accessing the E by EtO (Chapter
8, “ ETO ( ETWORK ELEME T OVERVIEW)”)
• http : all E–interactive operations performed accessing the E starting from the
Main Menu screen (Figure 4-5, “TCO Suite Main Menu screen” (p. 4-13)) :
– E–interactive Provisioning Tool
– Alarms & Settings
• ftp : all E–interactive operations corresponding to:
– downloading a file from the E (e.g. the “Get Configuration File” (p. 6-16))
– uploading a file to the E (e.g. the “Configuration Setting” (p. 6-9))
• telnet: telnet is the protocol used when the access to the E is performed by EtO
from a Remote Craft Terminal
ote that, to perform some operations, more than one of the stated services are used. For
example:
• both snmp and telnet are used to login a E by EtO from a Remote Craft Terminal
• both http and ftp are used to download a file from a E using the “Alarms &
Settings” functions.
In the Flash Card, for each one of the stated services, there is an “Access List” table, as
shown in Figure 13-6, “Access list configuration default screen” (p. 13-8).
In the Flash Card, as delivered from Alcatel–Lucent factory, all these four “Access List”
tables contain “0.0.0.0” as default value in the “IP Address” and in the “IP Mask” fields.
This condition corresponds to “security by access lists” not active.
The E Administrator, if wants to limit the use of one of the stated services to a specific
list of managers, must insert and enable their “IP Address” and their “IP Mask” into the
corresponding “Access List” table, as described in “Management of “security by access
lists”” (p. 13-7). After this setting, any user, whose PC’s “IP Address” is not listed in an
“Access List” table, will not be authenticated for the use of the corresponding service (for
the specific E).
DRAFT

...................................................................................................................................................................................................................................
3-20 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
4 GETTING STARTED
4

Overview
Purpose
This chapter gives the basic information for the use of the SWP TCO SUITE Rel.1.8.

Contents

Preparation of the Craft Terminal based on SWP TCO SUITE Rel.1.8 4-2
Equipment SW management by SWP TCO SUITE Rel.1.8 4-2
Start up and functions of the TCO SUITE Rel.1.8 Main Menu screen 4-12
Checks the operator must do before accessing a E 4-14
Common behavior of E login, and application logoff, for the " E-interactive 4-15
Provisioning Tool" and "Alarms & Settings"
Close Current Session 4-23
Operational & Maintenance WebEML 4-24
Operational & Maintenance 1320CT 4-26

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-1
Issue 1 September 2009
GETTING STARTED Preparation of the Craft Terminal based on SWP TCO
DRAFT
SUITE Rel.1.8
...................................................................................................................................................................................................................................

Preparation of the Craft Terminal based on SWP TCO SUITE


Rel.1.8
The first thing you must do is to copy the TCO SUITE Rel.1.8 software from the
CD-ROM to your PC , as described in the Chapter 14, “Appendix A: PREPARATIO OF
THE CRAFT TERMI AL BASED O SWP TCO SUITE Rel.1.8”, even if some
functions can be run directly from the CD-ROM.
ote: the functions that can be run directly from the TCO SUITE Rel.1.8 CD-ROM,
without performing the copy procedures of the Chapter 14, “Appendix A:
PREPARATIO OF THE CRAFT TERMI AL BASED O SWP TCO SUITE Rel.1.8” ,
are those described in:
• Chapter 5, “PROVISIO I G TOOL”
• Chapter 6, “ALARMS & SETTI GS”
• Chapter 7, “ACCEPTA CE TOOL”
• “Operational & Maintenance 1320CT” (p. 4-26)

Equipment SW management by SWP TCO SUITE Rel.1.8


Purpose
This paragraph introduces the information regarding the equipment software
management.
The following matters are described:
• “Flash Card” (p. 4-2)
• “Flash Card types” (p. 4-2)
• “Flash Card content” (p. 4-3)
• “Procedures for the management of the E software” (p. 4-6)

Flash Card
A Flash Card is always plugged into the IDU Main board; it contains the whole
Equipment programs and configuration data.

Flash Card types


Various types of Flash Cards are available; each of them allows a fixed max system
throughput [i.e. the max number of user interfaces, in terms of equivalent Mb/s traffic,
and the supported modulation (4QAM and/or 16QAM) ].
Each type of Flash Card is identified by a Logistical Item P/ , and by a licence
information.
Please refer to the specific " E User Manual" for details on the available types of Flash
Card and their identification.
DRAFT

...................................................................................................................................................................................................................................
4-2 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Equipment SW management by SWP TCO SUITE Rel.1.8

DRAFT
...................................................................................................................................................................................................................................

WAR I G: the Flash Cards of 9400AWY R.2.0 and of 9400AWY R.2.1 are not
interchangeable.

Flash Card content


The Flash Card contains the whole Equipment programs and configuration data, as shown
in Figure 4-1, “Flash Card content” (p. 4-3)
With reference to it, the following matters are described:
• “Licence information” (p. 4-4)
• “SW instances” (p. 4-5)
• “ E data” (p. 4-5)
( **Comment: EXT FIGURE CHA GED **)

Figure 4-1 Flash Card content

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-3
Issue 1 September 2009
GETTING STARTED Equipment SW management by SWP TCO SUITE Rel.1.8
DRAFT
...................................................................................................................................................................................................................................

Licence information
1. Case of AWY V2.0.6 and V2.1.2: fixed licence information
The licence information can be read by the WebEML command Supervision → SW
Key , which opens the screen of Figure 4-2, “Flash Card licence information (case of
AWY V2.0.6 and V2.1.2)” (p. 4-4), or by the Licence Info screen of the “Alarms &
Settings” function:
• the SW Key number indicates the licence information
• the SW Key code indicates the fixed max system throughput.
In this case, you can change the max system throughput only replacing physically the
Flash Card with another type (another P/ , allowing the desired system throughput).
2. Case of AWY V2.1.3 and V2.1.4: dynamically changeable licence information
The licence information can be read by the WebEML command Supervision → SW
Key , which opens the screen of Figure 4-3, “Flash Card licence information (case of
AWY V2.1.3 and V2.1.4)” (p. 4-5), or by the Licence Info screen of the “Alarms &
Settings” function:
• the Serial umber is that physically associated to the Flash Card
• the Licence String indicates the fixed max system throughput
• the Set Licence Key field indicates the licence, associated to the Flash Card’s
Serial umber, and implicitly defines its current Licence String.
In this case you can change the max system throughput asking Alcatel–Lucent a new
Licence Key pattern, associated to the Flash Card’s Serial umber, then introducing
it (by copy and paste) in the Set Licence Key field, at last clicking the button Apply.

Figure 4-2 Flash Card licence information (case of AWY V2.0.6 and V2.1.2)
DRAFT

...................................................................................................................................................................................................................................
4-4 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Equipment SW management by SWP TCO SUITE Rel.1.8

DRAFT
...................................................................................................................................................................................................................................

Figure 4-3 Flash Card licence information (case of AWY V2.1.3 and V2.1.4)

SW instances
The SW COMMIT VERSIO is that used by the system.
The SW STA D–BY VERSIO instance is created the first time a SW download from
CT to the E is performed.
As supplied by Alcatel–Lucent factory, the SWP–version downloaded in Factory is the
most recently released at the date of Flash Card delivery to the Customer, so that the SW
instances present in the flash card are:
• the SW COMMIT VERSIO
• and the SW STA D–BY, loaded with the SW version immediately previous
(maintenance release) with respect to the COMMIT one.
NE data
ote: as shown in Figure 4-1, “Flash Card content” (p. 4-3), differently from SW
instances, E data are present as a single instance in the Flash Card.
1. Base configuration
It is defined by the Flash Card’s licence information. It means that you can change
the system configuration data only within its throughput limits.
The licence information can be modified as described in “Licence information”
(p. 4-4).
2. MIB
The MIB ( Management Information Base) contains all E configuration data.
As supplied by Alcatel-Lucent factory, the E configuration data are set to default
values.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-5
Issue 1 September 2009
GETTING STARTED Equipment SW management by SWP TCO SUITE Rel.1.8
DRAFT
...................................................................................................................................................................................................................................

Procedures for the management of the NE software

Figure 4-4 Main phases of the equipment SW management

ote: the " E SW download & activation" is necessary only in case of upgrading of
the E SWP (see next point 7).
DRAFT

...................................................................................................................................................................................................................................
4-6 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Equipment SW management by SWP TCO SUITE Rel.1.8

DRAFT
...................................................................................................................................................................................................................................

The procedures for the management of the E software, described in the following, are
related to the contents of the Flash Card, described in “Flash Card content” (p. 4-3):
• First–time equipment start–up and commissioning
• Changing E data
• E data backup
• E data restore
• Flash Card licence management
• Flash Card replacement
• Upgrading of the E SWP
• System restart
1. First–time equipment start–up and commissioning
It must be done according to the instructions given in the specific " E User Manual",
more precisely:
• section SW I STALLATIO A D COMMISSIO I G
- chapter Line-Up and Commissioning
After the commissioning completion, create a folder, specific for the E, containing
the following files:
• the MIB back-up ".bar" file , and the E configuration back-up ".qcml" file (see
next point 3)
• the TRS (Test Result Sheet & Site Acceptance Test Protocol) report by means of
the Acceptance Tool of the TCO SUITE’s Main Menu ( see Chapter 7,
“ACCEPTA CE TOOL” ). This can be used, in the future, to compare the system
performance to that verified at the commissioning phase time.
and maintain this folder updated whenever you make changes on the E data.
2. Changing E data
E data, contained in the MIB, can be changed (within the limits implicitly defined
by the employed Flash Card type), by the suitable commands of:
• the WebEML
• the E-interactive Provisioning Tool
• the Alarms & Settings functions
Changes of the E data are submitted to the “Security policy” (p. 3-16)
3. E data backup
The E data backup must be always performed:
• at the end of the commissioning (see previous point 1)
• every time you change any E data (see previous point 2)
• every time you upgrade the E SWP (see next point 7)
WAR I G: if you change the E data without performing the back–up operations
here described, in case of troubles you will have to create again the E configuration
data from the beginning, wasting time and with high probability of errors.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-7
Issue 1 September 2009
GETTING STARTED Equipment SW management by SWP TCO SUITE Rel.1.8
DRAFT
...................................................................................................................................................................................................................................

Every time you change any E data, you must always save them by both the
following two procedures (they are both necessary, because some data are present
only in one of the two back-up files ) :
a. MIB back up (".bar" file)
Refer to .“How to perform the MIB back-up” (p. 11-4)
b. E configuration back-up (".qcml" file)
There are two alternative, but equivalent, ways:
- using the function “Get Configuration File” (p. 6-16) of the "Alarms & Settings"
tool. In this case the save screen appears:

- or clicking the button Get Configuration from NE in the Start wizard screen
of the " E-interactive Provisioning Tool" (see point “Provisioning Tool in
E–interactive modality (online)” (p. 5-4) of Chapter 5, “PROVISIO I G
TOOL”). In this case the “Last wizard screen of the “ E–interactive Provisioning
Tool”” (p. 4-8) appears ), where you must click the Save as ... button:
In both cases, save the file, giving it a mnemonic name and choosing the directory
for save.
Last wizard screen of the “ E–interactive Provisioning Tool”

4. E data restore
Whenever you must restore in the E the data you have previously saved by the
procedures of previous point 3, perform the data restore operations in the following
order:
a. at first, perform the E configuration restore (".qcml" file)
There are two alternative, but equivalent, ways:
DRAFT

...................................................................................................................................................................................................................................
4-8 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Equipment SW management by SWP TCO SUITE Rel.1.8

DRAFT
...................................................................................................................................................................................................................................

- using the function Configuration Setting of the "Alarms & Settings" tool (see
“Configuration Setting” (p. 6-9)), at first browsing the back-up file, then clicking
on the button Apply Configuration
- or clicking the button Open Configuration in the Start wizard screen of the
" E-interactive Provisioning Tool" (see point “Provisioning Tool in
E–interactive modality (online)” (p. 5-4) of Chapter 5, “PROVISIO I G
TOOL”). In this case, the following file selection screen opens, where you must
browse the back-up file, and then click on the button Open
Then, the “Last wizard screen of the “ E–interactive Provisioning Tool”” (p. 4-8)
opens, but with the button Apply enabled: click on it to send the configuration file
to the E. In alternative, click on Modify parameters, to check the
configuration before sending it to the E.
WAR I G: In some cases (depending on the data that have been changed), an
automatic system restart is executed (see next point 8), and the CT– E
communication is lost. Therefore, wait the time necessary for the restart
completion, after which you can perform again the E login.

b. then, perform the MIB restore (".bar" file)


Refer to “How to perform the MIB restore” (p. 11-7).
5. Flash Card licence management
The Flash Card licence management allows to improve the max system throughput. It
can be done:
• for AWY V2.0.6 and V2.1.2, physically replacing the Flash Card with another
type, as described in following point 6
or, only for AWY V2.1.3 and V2.1.4, as described in previous point “Case of

AWY V2.1.3 and V2.1.4: dynamically changeable licence information” (p. 4-4)
6. Flash Card replacement
The Flash Card replacement implies always the E data backup (before the
replacement) and restore operations (after the replacement), described in previous
points 3 and 4
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-9
Issue 1 September 2009
GETTING STARTED Equipment SW management by SWP TCO SUITE Rel.1.8
DRAFT
...................................................................................................................................................................................................................................

The Flash Card replacement may be required for two reasons:


a. Flash Card replacement with another type (i.e. another licence information), to
improve the max system throughput.
This type of replacement must be done according to the instructions given in the
specific " E User Manual" ) , more precisely:
- section MAI TE A CE A D UPGRADE
• chapter System hardware upgrade
- paragraph Installation of a new Flash Card to improve system capacity
ote: the physical replacement of the Flash Card is necessary only for AWY
V2.0.6 and V2.1.2; in the case of AWY V2.1.3 and V2.1.4, the licence information
is managed without the physical replacement of the Flash Card, as described in
previous point “Case of AWY V2.1.3 and V2.1.4: dynamically changeable licence
information” (p. 4-4)
b. Flash Card replacement with the same type (i.e. the same licence information),
for corrective maintenance (i.e. when the Flash Card is suspected faulty).
This type of replacement must be done according to the instructions given in the
specific " E User Manual" ) , more precisely:
- section MAI TE A CE A D UPGRADE
• chapter Spare Flash Card management and replacement procedures
- paragraph Flash Card replacement procedure
7. Upgrading of the E SWP
This procedure is envisaged whenever a new E SWP release (new with respect to
that presently loaded in the system) is supplied to Customer by the relevant E SWP
CD-ROM.
E.g. the SWP 9400AWY V2.1.2 CD-ROM is supplied to a Customer owing a
9400AWY R.2.1 E running with a SW version < V2.1.2 (V2.1.1, for example).
It means that the SW COMMIT VERSIO bank in the Flash Card contains the SW
components of the version V2.1.1 (see point “SW instances” (p. 4-5)) and must be
replaced by those of the version V2.1.2.
With reference to such an example, the SWP upgrading corresponds to make the
following operations:
• at first, the loading of the new V2.1.2 SW components in the Flash Card's SW
STA D-BY VERSIO bank (taking them from the SWP 9400AWY V2.1.2
CD-ROM)
• secondly, the swap of the SW COMMIT VERSIO and SW STA D-BY
VERSIO banks, automatically followed by a system restart, which loads the new
SW components in all peripherals.
The E SW upgrading must be done according to the instructions given in Chapter
12, “ E SWP UPGRADE”
8. System restart
The system restart (reloading of all RAMs present in the system with information
stored in the Flash Card and reset of all peripherals) :
• is performed automatically in one of the following conditions:
– after the activation of a new SWP
– after a MIB restore and activation
DRAFT

...................................................................................................................................................................................................................................
4-10 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Equipment SW management by SWP TCO SUITE Rel.1.8

DRAFT
...................................................................................................................................................................................................................................

– only in some cases, depending on affected data, after the download of a


configuration “.qcml” file
– after system power off / on
• can be performed manually by the operator in one of the following ways:
– pushing the reset button on the IDU Main Unit
– with the E logged in by WebEML, by the command Supervision ⇒ Restart
E; clicking OK on the confirmation box ( ”Do you really want to restart this
E?” ), the system restart begins.
About 2 to 5 minutes are necessary for system restart.
WAR I G: at the system restart beginning, the CT– E communication, if open, is
lost. Therefore, if necessary, you must perform again the E–interactive application,
waiting the time necessary for the restart completion.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-11
Issue 1 September 2009
GETTING STARTED Start up and functions of the TCO SUITE Rel.1.8 Main
DRAFT
Menu screen
...................................................................................................................................................................................................................................

Start up and functions of the TCO SUITE Rel.1.8 Main Menu


screen
There are two ways to launch the SWP TCO SUITE Rel.1.8 Main Menu screen:
1. directly from the SWP TCO SUITE Rel.1.8 CD-ROM:
a. Verify that your PC meets the requirements described in “PC requirements to run
and install the SWP TCO SUITE Rel.1.8” (p. 1-4)
b. Insert the SWP TCO SUITE Rel.1.8 CD-ROM in your PC
c. If never done previously, the start-up of the SWP TCO SUITE Rel.1.8 is
performed automatically (it installs, if necessary, the JRE required version), and
the Figure 4-5, “TCO Suite Main Menu screen” (p. 4-13) opens.
ote. in case of problems, or for start–up details, refer to Chapter 15, “Appendix
B: JRE I STALLATIO A D SWP TCO SUITE Rel.1.8 START UP” (in
particular, take into account that the installation of the JRE requires the PC
Administrator privileges).
2. clicking the shortcut to the Local Copy of the TCO Suite
ote: to use this modality, the SWP TCO SUITE Local version, and the relevant
shortcut, must have been created previously, as described in Step 6 of “Operations
sequence for the preparation of the Craft Terminal” (p. 14-2).
The Figure 4-5, “TCO Suite Main Menu screen” (p. 4-13) opens.
( **Comment: EXT FIGURE EW **)
DRAFT

...................................................................................................................................................................................................................................
4-12 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Start up and functions of the TCO SUITE Rel.1.8 Main

DRAFT
Menu screen
...................................................................................................................................................................................................................................

Figure 4-5 TCO Suite Main Menu screen

The functions of the various buttons is summarized below.


ote: before clicking any button, please read the instructions given in the relevant
chapter or paragraph.
A see Chapter 5, “PROVISIO I G TOOL”

Comparison with the E management software tools of the:


• 9400AWY R.2.0 V2.0.6 CD-ROM,
• and of the 9400AWY R.2.1 V2.1.2 CD-ROM
With the SWP TCO SUITE Rel.1.8, the button "Provisioning Tool" combines the functions
of the "Pre-Provisioning Tool" and "Set-Up Tool".

B see Chapter 6, “ALARMS & SETTI GS”


C see “Close Current Session” (p. 4-23)
D see “Operational & Maintenance WebEML” (p. 4-24)
E see “Operational & Maintenance 1320CT” (p. 4-26)
F see Chapter 7, “ACCEPTA CE TOOL”
G the Advanced Settings button is present only in CD–ROM version. See Chapter 14,
“Appendix A: PREPARATIO OF THE CRAFT TERMI AL BASED O SWP TCO
SUITE Rel.1.8”
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-13
Issue 1 September 2009
GETTING STARTED Checks the operator must do before accessing a NE
DRAFT
...................................................................................................................................................................................................................................

Checks the operator must do before accessing a NE


The SWP TCO SUITE includes not E–interactive applications, and E–interactive
applications.
For all E–interactive applications, the checks that any operator must perform before
attempting the access from her/his PC (running the SWP TCO SUITE) to a 9400AWY
E, are summed up below:
ote: usually, these checks have to be performed once only (i.e., whenever you have
not done them previously for the specific E).
List of requirements and checks
1. the operator must know the E’s “local IP address” and/or the “Ethernet
Configuration IP address”, that must have already been defined correctly inside the
network from both physical and logical points of view. ote:
• the “local IP address” is that to be always used to access the E by EtO
application
the “Ethernet Configuration IP address” is that to be always used to access the

E by the “ E–interactive Provisioning Tool” and ”Alarms & Settings” (web
server) functions.
For details, refer to “ E’s “local IP address” and “Ethernet Configuration IP
address”” (p. 3-9), and to “ etworking scenarios for PC connection to the E’s local
IP address” (p. 3-11).
2. the PC must be able to reach the E. To make this check, if necessary, refer to “How
to check the E reachability from the CT” (p. 3-10)
3. if more than one network adapter is present in the PC, you must know which is that
used for the PC– E connection (its identity could be required in the login procedure)
4. if not yet done, it is mandatory to manually disable system and browser proxy
configurations prior to use the web server operations; otherwise, the IP connection
from the PC’s web server to the E cannot take place.
5. the operator must have an User ame and Password set, valid for the E that must be
logged–in.
This information must be provided by the E Administrator to the user.
ote: the operations allowed, after the successful login, depend on the E login
profile.
For details, refer to “Security by operator profile” (p. 3-17).
6. only for AWY V2.1.3 or V2.1.4 E, and only for access by EtO: if the E
Administrator has defined a “community string” (different from the default value) for
the specific E, the operator must know it.
This information must be provided by the E Administrator to the user.
For details, refer to “Security by community string” (p. 3-19).
7. only for AWY V2.1.3 or V2.1.4 E: if the E Administrator has defined the “security
by access lists” for the specific E, the operator must know whether or not the IP
address of her/his PC is enabled to the specific services she/he wants to perform.
This information must be provided by the E Administrator to the user.
For details, refer to “Security by access lists” (p. 3-20).
DRAFT

...................................................................................................................................................................................................................................
4-14 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Common behavior of NE login, and application logoff, for

DRAFT
the "NE-interactive Provisioning Tool" and "Alarms &
...................................................................................................................................................................................................................................
Settings"

Common behavior of NE login, and application logoff, for the


"NE-interactive Provisioning Tool" and "Alarms & Settings"
When to use
The " E-interactive Provisioning Tool" functions are described in “Provisioning Tool in
E–interactive modality (online)” (p. 5-4).
The "Alarms & Settings" functions are described in Chapter 6, “ALARMS &
SETTI GS”
This procedure is referenced to by them, for executing the E login, and the application
logoff.

Related Information
This task does not have any related information.

Before you begin


Constraints and preliminary checks
WAR I G: as specified in “Types of physical access from the PC to the E” (p. 3-2),
these functions must not be launched if the PC– E connection is done through the F
interface, whichever the addressed E is (local or remote).
Before to run one of these functions (clicking the suitable button of the Main Menu) you
must make the following checks:
1. perform the checks listed in “Checks the operator must do before accessing a E”
(p. 4-14)
2. in addition, if the PC– E connection is physically local (i.e. through the direct
connection by a cross–connect Ethernet cable between the PC and E Ethernet ports,
or by an Ethernet switch), you must know if:
• the IP address of the PC
• and the Ethernet Configuration IP address of the E (see “ E’s “local IP
address” and “Ethernet Configuration IP address”” (p. 3-9))
belong, or not, to the same subnetwork This implies a different choice between
“Local” or “Remote” in the application start screen (Step 6 of “ E login procedure”
(p. 4-16)).
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-15
Issue 1 September 2009
GETTING STARTED Common behavior of NE login, and application logoff, for
DRAFT
the "NE-interactive Provisioning Tool" and "Alarms &
...................................................................................................................................................................................................................................
Settings"
NE login procedure
...................................................................................................................................................................................................

1 If necessary, perform "Close Current Session", clicking the Main Menu relevant button
ote: The first time you use the " E-interactive Provisioning Tool" or the "Alarms &
Settings" function, you should not need to perform the "Close Current Session". Refer
to the Step 2 of “Application logoff procedure” (p. 4-22), to understand this need at a
second time. Anyway, if you like to know the current situation, click this button: the
screen Figure 4-11, “Close Current Session: etwork settings OK” (p. 4-23) certifies
that you start from a clear condition.
...................................................................................................................................................................................................

2 From the Figure 4-5, “TCO Suite Main Menu screen” (p. 4-13), launch the application
you want (" E-interactive Provisioning Tool", or "Alarms & Settings") , and enter the
connection parameters.
For:
• the " E-interactive Provisioning Tool", refer to next Step 3
• the "Alarms & Settings", refer to next Step 4
...................................................................................................................................................................................................

3 To run the " E-interactive Provisioning Tool", click the specific button of the Figure
4-5, “TCO Suite Main Menu screen” (p. 4-13)

The Figure 4-6, “Connection parameter screen for the “ E–interactive Provisioning
Tool”” (p. 4-17) opens, where you must:
1. specify "Connect to E" (1),
2. then enter the E IP address (2) as detailed in next Step 5,
3. then specify Local or Remote (3), as detailed in next Step 6,
4. and, at last, clicking OK button (4).
If more than one network adapter is found in the PC, the choice of which to use is
forwarded to the user (next Step 7).
Otherwise (only one network adapter is found in the PC), if the PC- E connection is
correctly established, the E login screen appears (next Step 8)
DRAFT

...................................................................................................................................................................................................................................
4-16 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Common behavior of NE login, and application logoff, for

DRAFT
the "NE-interactive Provisioning Tool" and "Alarms &
...................................................................................................................................................................................................................................
Settings"

Figure 4-6 Connection parameter screen for the “NE–interactive Provisioning Tool”

...................................................................................................................................................................................................

4 To run the "Alarms & Settings" function, click the specific button of the Figure 4-5,
“TCO Suite Main Menu screen” (p. 4-13) :

The screen of Figure 4-7, “Connection parameter screen for the “Alarms & Settings”
function” (p. 4-18) opens, where you must:
1. enter the E IP address (1) as detailed in next Step 5,
2. then specify Local or Remote (2), as detailed in next Step 6,
3. and, at last, clicking OK button (3).
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-17
Issue 1 September 2009
GETTING STARTED Common behavior of NE login, and application logoff, for
DRAFT
the "NE-interactive Provisioning Tool" and "Alarms &
...................................................................................................................................................................................................................................
Settings"

If more than one network adapter is found in the PC, the choice of which to use is
forwarded to the user (next Step 7)
Otherwise (only one network adapter is found in the PC), if the PC- E connection is
correctly established, the E login screen appears (next Step 8).

Figure 4-7 Connection parameter screen for the “Alarms & Settings” function

...................................................................................................................................................................................................

5 Specification of E IP address in the:


• Figure 4-6, “Connection parameter screen for the “ E–interactive Provisioning
Tool”” (p. 4-17)
• or Figure 4-7, “Connection parameter screen for the “Alarms & Settings” function”
(p. 4-18)
WAR I G: if the “local IP address” and “Ethernet Configuration IP address” are
different, you must specify the “Ethernet Configuration IP address” (for details, refer
to “ E’s “local IP address” and “Ethernet Configuration IP address”” (p. 3-9)).
DRAFT

...................................................................................................................................................................................................................................
4-18 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Common behavior of NE login, and application logoff, for

DRAFT
the "NE-interactive Provisioning Tool" and "Alarms &
...................................................................................................................................................................................................................................
Settings"
...................................................................................................................................................................................................

6 Specification of "Local" or "Remote" in the:


• Figure 4-6, “Connection parameter screen for the “ E–interactive Provisioning
Tool”” (p. 4-17)
• or Figure 4-7, “Connection parameter screen for the “Alarms & Settings” function”
(p. 4-18)
According to the checks you should have done in “Constraints and preliminary checks”
(p. 4-15) :
1. if the PC- E connection is physically remote (i.e. through IP network, or through
Radio interface, or through MS rings and chains), specify Remote
2. if the PC- E connection is physically local (i.e. through the direct connection by a
cross-connect Ethernet cable between the PC and E Ethernet ports, or by an Ethernet
switch), and the IP address of the PC and the Ethernet Configuration IP
address of the E:
• belong to the same subnetwork, specify Remote
• do not belong to the same subnetwork, specify Local
As a consequence of the Local specification, the application adds
semi-permanently an IP address to your PC, to allow it to reach the E.
This semi-permanently added IP address is cleared performing the "Close Current
Session" (see Step 2 of “Application logoff procedure” (p. 4-22), or restarting the
PC.
...................................................................................................................................................................................................

7 Choice of the network adapter, if required


The application performs a search on user's computer resources in order to find all
network adapters related to active (enabled) network connections [see point 3 of “Checks
the operator must do before accessing a E” (p. 4-14). Then, if more than one network
adapter is found, the user must select the one to use. An example of selection box is
shown in Figure 4-8, “ etwork Adapter selection (example)” (p. 4-19):

Figure 4-8 Network Adapter selection (example)

Such figure is an example created to show the possible layout. Actually, if user's PC owns
one network adapter only and the "Alcatel Virtual etwork Card for Lower Layers", the
selection is automatically done without bothering the user, which will not see the dialog
DRAFT

box shown in Figure 4-8, “ etwork Adapter selection (example)” (p. 4-19).
...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-19
Issue 1 September 2009
GETTING STARTED Common behavior of NE login, and application logoff, for
DRAFT
the "NE-interactive Provisioning Tool" and "Alarms &
...................................................................................................................................................................................................................................
Settings"

WAR I G: the virtual network card you may have created for the LLMA (by the
procedures described in Chapter 16, “Appendix C: LLMA I STALLATIO ,
CO FIGURATIO A D USE”) must never be selected to connect the PC to the E,
for running the “ E–interactive Provisioning Tool” and the “Alarms & Settings”
functions.
To know more information about adapters details, by clicking the "Details" toggle button
some supplemental information are shown as in Figure 4-9, “ etwork Adapter details”
(p. 4-20) :

Figure 4-9 Network Adapter details

etwork adapters configuration is saved in XML format using the AML ( etwork
Adapter Markup Language) format in the AML directory inside user's personal
directory usually located inside "Documents And Settings" directory on system disk.
When the user clicks "Apply" in screen of Figure 4-8, “ etwork Adapter selection
(example)” (p. 4-19) or Figure 4-9, “ etwork Adapter details” (p. 4-20), and if, in Step 6
you had specified:
• "Remote", then the PC- E connection is set-up using the selected network adapter
(without performing any adaptation)
• "Local", then a new address is added to the network adapter, to allow the PC
connection to the specified E, and the PC- E connection is set-up.
At last, if the PC- E connection is correctly established, the E login screen appears
(following Step 8 )
...................................................................................................................................................................................................

8 E login and application opening


If the PC- E connection is correctly established, the E login screen opens, where user is
asked to provide his/her User ame and Password (for details, see point 1 of “Security by
operator profile” (p. 3-17)):
DRAFT

...................................................................................................................................................................................................................................
4-20 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Common behavior of NE login, and application logoff, for

DRAFT
the "NE-interactive Provisioning Tool" and "Alarms &
...................................................................................................................................................................................................................................
Settings"

After having filled the fields "User ame" and "Password", followed by the "Apply"
button clicking, if login successful:
• in case of " E-interactive Provisioning Tool", the Figure 5-4, “Start wizard screen of
the “ E–interactive Provisioning Tool”” (p. 5-4) opens
• in case of "Alarms & Settings", the Figure 6-1, “Alarms & Settings Main Menu
screen” (p. 6-4) opens
E...................................................................................................................................................................................................
N D O F S T E P S

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-21
Issue 1 September 2009
GETTING STARTED Common behavior of NE login, and application logoff, for
DRAFT
the "NE-interactive Provisioning Tool" and "Alarms &
...................................................................................................................................................................................................................................
Settings"
Application logoff procedure
...................................................................................................................................................................................................

1 Exit from the application " E-interactive Provisioning Tool" or the "Alarms & Settings",
clicking of the relevant screen
...................................................................................................................................................................................................

2 If necessary, perform "Close Current Session", clicking the Main Menu relevant button.
Explanation:
After having exiting the application for a certain E …
… and if, in Step 6 of the “ E login procedure” (p. 4-16) you have specified:
• "Remote", you have nothing to do to launch one of the applications " E-interactive
Provisioning Tool" or the "Alarms & Settings" for the same or another E
• "Local", you have to decide if the semi-permanent change on the used network
adapter must:
– remain. In this case, if you run again the " E-interactive Provisioning Tool" or the
"Alarms & Settings", no question is raised, and the connection to the E
previously connected is established again;
– be removed. In this case, click the "Close Current Session" button and the network
settings restoration message (Figure 4-10, “Close Current Session: network
settings restoration message (example)” (p. 4-23)) will appear, certifying that the
network adapter restoration has been done, and that you can now launch one of
the applications " E-interactive Provisioning Tool" or the "Alarms & Settings"
for another E.
END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
4-22 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Close Current Session

DRAFT
...................................................................................................................................................................................................................................

Close Current Session


This function is run clicking the following button of Main Menu screen (Figure 4-5,
“TCO Suite Main Menu screen” (p. 4-13)):

This function allows to close current session restoring the network settings modified by a
previous run of the " E-interactive Provisioning Tool" or "Alarms & Settings" in "Local"
mode (as described in Step 6 of the “ E login procedure” (p. 4-16)).
It means that, if you have previously used one of such functions, and you want to use the
same function with another E, before clicking the relevant buttons, you must at first
click on the button “Close Current Session”.
The Figure 4-10, “Close Current Session: network settings restoration message
(example)” (p. 4-23) shows the message certifying the network adapter restoration:

Figure 4-10 Close Current Session: network settings restoration message (example)

Figure 4-11, “Close Current Session: etwork settings OK” (p. 4-23) shows that you can
run the " E-interactive Provisioning Tool" or "Alarms & Settings" starting from a
"cleared" condition.

Figure 4-11 Close Current Session: Network settings OK


DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-23
Issue 1 September 2009
GETTING STARTED Operational & Maintenance WebEML
DRAFT
...................................................................................................................................................................................................................................

Operational & Maintenance WebEML


This button launches the EtO application. Before to click it, read carefully the following
warnings:
1. WAR I G 1: for the use of this function, the Local copy of WebEML (Jusm/CT)
must have already been performed, as described in Step 7 of “Operations sequence for
the preparation of the Craft Terminal” (p. 14-2).
2. WAR I G 2: in case of CT– E connection through the F interface (see Figure 3-2,
“Access to E through E’s F interface (RS232 serial interface) on IDU MAI unit”
(p. 3-4)), before to click the button Operational & Maintenance WebEML, you
must perform all operations described in Step 3 of “Preliminary operations” (p. 8-4),
i.e.:
• check of LLMA (Lower Layer MA ager) installation and configuration
• PC desktop properties System standby and System hibernates both set to ever
• manual start of LLMA
This function is run clicking the following button of the Figure 4-5, “TCO Suite Main
Menu screen” (p. 4-13) :

After having launched this functions, two behaviors are possible:


• Standard behavior: if the Local copy of WebEML (Jusm/CT) has been
performed, this function runs the EtO application, opening the Figure 8-3, “ EtO
initial screen” (p. 8-7)
ote: for EtO usage, refer to the Chapter 8, “ ETO ( ETWORK ELEME T
OVERVIEW)”
• Special conditions: if the Local copy of WebEML (Jusm/CT) is not found in the
default local place, this function asks the user if there is a previously performed local
copy:
DRAFT

...................................................................................................................................................................................................................................
4-24 3DB 75003 CAAA
Issue 1 September 2009
GETTING STARTED Operational & Maintenance WebEML

DRAFT
...................................................................................................................................................................................................................................

Selecting:
• Yes, you will have to specify the folder where the WebEML is; then this function will
run EtO in the specified folder.
• o, this function asks if user wants to perform the WebEML Local Copy, by the
following question box:
WAR I G: the Local copy of WebEML (Jusm/CT) can be done only from the SWP
TCO SUITE Rel.1.8 CD–ROM.

If, in this question box, you select:


– o, this function exits.
– Yes, the WebEML is copied from the CD-ROM to a specified folder (as described
in the Step 7 of “Operations sequence for the preparation of the Craft Terminal”
(p. 14-2), then EtO is started.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 4-25
Issue 1 September 2009
GETTING STARTED Operational & Maintenance 1320CT
DRAFT
...................................................................................................................................................................................................................................

Operational & Maintenance 1320CT


This function runs the 1320CT software application previously installed on user’s PC, and
is meant for old 9400AWY Es backward compatibility. Before to click it, read carefully
the following warnings:
1. WAR I G 1: if user’s PC does not have a 1320CT platform installed, an error
message is shown to user (besides, take into account that no 1320CT installation can
be performed by the SWP TCO SUITE CD–ROM, because it does not contain the
relevant SW components).
2. WAR I G 2: the 1320CT application must not be used with 9400AWY Es running
with V2.1.3 or V2.1.4.
3. WAR I G 3:: in case of CT– E connection through the F interface (see Figure 3-2,
“Access to E through E’s F interface (RS232 serial interface) on IDU MAI unit”
(p. 3-4)), before to click the button Operational & Maintenance 1320CT, you must
perform the same operations envisaged for EtO launch, described in Step 3 of
“Preliminary operations” (p. 8-4) , i.e. :
• check of LLMA (Lower Layer MA ager) installation and configuration
• PC desktop properties System standby and System hibernates both set to ever
• manual start of LLMA
This function is run clicking the following button of the Figure 4-5, “TCO Suite Main
Menu screen” (p. 4-13):

If the 1320CT software application is present on user's PC, the etwork Element
Synthesis ( ES) screen opens:

For ES usage, refer to the specific " E User Manual".


DRAFT

...................................................................................................................................................................................................................................
4-26 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
5 PROVISIONING TOOL
5

Overview
Purpose
This chapter describes in detail the functions of the Main Menu's "Provisioning Tool".

Contents

Introduction 5-1
Provisioning Tool in not E–interactive modality (offline) 5-2
Provisioning Tool in E–interactive modality (online) 5-4
Full Configuration Procedure 5-5
Configuration file conversion feature 5-7

Introduction
ote: Besides from the Local Copy of the TCO Suite, the "Provisioning Tool" can
be run also directly from the TCO SUITE Rel.1.8 CD-ROM, without performing the
copy procedures of the Chapter 14, “Appendix A: PREPARATIO OF THE CRAFT
TERMI AL BASED O SWP TCO SUITE Rel.1.8”
This function allows to create, modify and/or apply provisioning files in two ways:
• “Provisioning Tool in not E–interactive modality (offline)” (p. 5-2)
• or “Provisioning Tool in E–interactive modality (online)” (p. 5-4)
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 5-1
Issue 1 September 2009
PROVISIONING TOOL Provisioning Tool in not NE–interactive modality (offline)
DRAFT
...................................................................................................................................................................................................................................

Provisioning Tool in not NE–interactive modality (offline)


This modality allows the off-line creation and modification of a ".qcml" configuration
provisioning file, without accessing any E.
This ".qcml" file will be after used to configure the E (after having logged it) with a
simple load command.
This function is run clicking the following button of Main Menu screen ( Figure 4-5,
“TCO Suite Main Menu screen” (p. 4-13) ) :

The screen Figure 5-1, “Start of the “ ot E–interactive Provisioning Tool”” (p. 5-2)
opens, where you have to specify Do not connect to NE (offline), and then click OK

Figure 5-1 Start of the “Not NE–interactive Provisioning Tool”

After clicking the OK button, the following prompt screen Figure 5-2, ““ ot
E–interactive Provisioning Tool”: choice of E version” (p. 5-3) appears, where you
must choose the 9400AWY system type, and then click OK:
( **Comment: EXT FIGURE CHA GED **)
DRAFT

...................................................................................................................................................................................................................................
5-2 3DB 75003 CAAA
Issue 1 September 2009
PROVISIONING TOOL Provisioning Tool in not NE–interactive modality (offline)

DRAFT
...................................................................................................................................................................................................................................

Figure 5-2 “Not NE–interactive Provisioning Tool”: choice of NE version

After clicking OK, the screen Figure 5-3, “Start wizard screen of the “ ot E–interactive
Provisioning Tool”” (p. 5-3) appears.

Figure 5-3 Start wizard screen of the “Not NE–interactive Provisioning Tool”

This is the first screen of the “Full Configuration Procedure” (p. 5-5)
ote: see also the “Configuration file conversion feature” (p. 5-7)

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 5-3
Issue 1 September 2009
PROVISIONING TOOL Provisioning Tool in NE–interactive modality (online)
DRAFT
...................................................................................................................................................................................................................................

Provisioning Tool in NE–interactive modality (online)


By this modality, you access one E, not using the Craft Terminal application, but the E
web server; its main steps are:
• launch the application and the connection with the target E,
• recover a configuration file "configuration_name.qcml" previously created (e.g.
through the " ot E-interactive Provisioning Tool" described in previous point
“Provisioning Tool in not E–interactive modality (offline)” (p. 5-2) ), or get
configuration data from the E
• check/modify the configuration,
• apply the configuration to the target E.
WAR I G: when the traffic is running, the use of the Provisioning Tool in
E–interactive modality, may cause E1 and/or Ethernet traffic interruption.
Procedure
1. Start of the application
To start this application, and login the E, strictly follow instructions given in
“Common behavior of E login, and application logoff, for the " E-interactive
Provisioning Tool" and "Alarms & Settings"” (p. 4-15).
2. Use of the application
After having successfully connected to the E and logged-in it, the Figure 5-4, “Start
wizard screen of the “ E–interactive Provisioning Tool”” (p. 5-4) appears.
This is the first screen of the “Full Configuration Procedure” (p. 5-5)
See also the “Configuration file conversion feature” (p. 5-7)
3. Exiting from the application
Strictly follow instructions given in “Application logoff procedure” (p. 4-22)

Figure 5-4 Start wizard screen of the “NE–interactive Provisioning Tool”


DRAFT

...................................................................................................................................................................................................................................
5-4 3DB 75003 CAAA
Issue 1 September 2009
PROVISIONING TOOL Full Configuration Procedure

DRAFT
...................................................................................................................................................................................................................................

Full Configuration Procedure


This procedure allows a full system configuration through a guided process, based on a
reduced set of screens (steps). The related windows are displayed by a "Wizard Tool"
according to a specific step sequence.
Clicking the Help button in the Start wizard screen:
• of the " ot E-interactive Provisioning Tool" (see Figure 5-3, “Start wizard screen of
the “ ot E–interactive Provisioning Tool”” (p. 5-3))
• or of the " E-interactive Provisioning Tool" (see Figure 5-4, “Start wizard screen of
the “ E–interactive Provisioning Tool”” (p. 5-4))
the Figure 5-5, “Provisioning Tool on-line guide” (p. 5-5) screen opens (example for
9400AWY R.2.1 V2.1.3) :

Figure 5-5 Provisioning Tool on-line guide

Please, follow this guide, to have all information necessary for choosing and filling the
various fields of each step, to go forward and backward within the procedure steps, and to
save or get the ".qcml" configuration file, or apply the configuration to the E.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 5-5
Issue 1 September 2009
PROVISIONING TOOL Full Configuration Procedure
DRAFT
...................................................................................................................................................................................................................................

In addition, to get system hardware-related information you may not find in the online
guide, refer to the specific " E User Manual", more precisely:
• section E MA AGEME T BY SOFTWARE APPLICATIO S
- chapter Provisioning
or, for some older User Manuals:
• section I STALLATIO A D COMMISSIO I G
- chapter Line up and commissioning
DRAFT

...................................................................................................................................................................................................................................
5-6 3DB 75003 CAAA
Issue 1 September 2009
PROVISIONING TOOL Configuration file conversion feature

DRAFT
...................................................................................................................................................................................................................................

Configuration file conversion feature


After having clicked the button Open Configuration in:
• Figure 5-3, “Start wizard screen of the “ ot E–interactive Provisioning Tool””
(p. 5-3)
• or in Figure 5-4, “Start wizard screen of the “ E–interactive Provisioning Tool””
(p. 5-4)
you can also specify a ".qcml" configuration file that was created on a 9400AWY system
running with a SWP version < V2.0.6, or < V2.1.2, or < V2.1.3, or < V2.1.4.
In this case, the Configuration file conversion feature converts the source file (or tries
to do it) to the target format, according to the following rules:
1. in not E-interactive modality, if in the E version choice screen ( Figure 5-2, ““ ot
E–interactive Provisioning Tool”: choice of E version” (p. 5-3) ) you have
selected:
a. Version V2.0.6 , you can select a ".qcml" configuration file that was created on a
9400AWY system running with one of following versions of 9400AWY R.2.0:
V2.0.4 (only if configured for ETSI market) and V2.0.5.
The result. if successful, will be the file conversion to the target format V2.0.6
b. Version V2.1.2, you can select a ".qcml" configuration file that was created on a
9400AWY system running with one of following versions of: :
• 9400AWY R.2.0: V2.0.4 (only if configured for ETSI market), V2.0.5, and
V2.0.6
• 9400AWY R.2.1: V2.1.0 and V2.1.1
The result. if successful, will be the file conversion to the target format V2.1.2
c. Version V2.1.3, you can select a “.qcml” configuration file that was created on a
9400AWY system running with one of following versions of: :
• 9400AWY R.2.0: V2.0.4 (only if configured for ETSI market), V2.0.5, and
V2.0.6
• 9400AWY R.2.1: V2.1.0 , V2.1.1, and V2.1.2
The result. if successful, will be the file conversion to the target format V2.1.3
d. Version V2.1.4, you can select a “.qcml” configuration file that was created on a
9400AWY system running with one of following versions of: :
• 9400AWY R.2.0: V2.0.4 (only if configured for ETSI market), V2.0.5, and
V2.0.6
• 9400AWY R.2.1: V2.1.0 , V2.1.1, V2.1.2, and V2.1.3
The result. if successful, will be the file conversion to the target format V2.1.4
2. in E-interactive modality, if you have logged in a 9400AWY with:
- Version V2.0.6, the format conversion feature is as in point a above
- Version V2.1.2, the format conversion feature is as in point b above
- Version V2.1.3, the format conversion feature is as in point c above
- Version V2.1.4, the format conversion feature is as in point d above
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 5-7
Issue 1 September 2009
DRAFT DRAFT
DRAFT
6 ALARMS & SETTINGS
6

Overview
Purpose
This chapter describes in detail the Main Menu's "Alarms & Settings" functions.

Contents

Alarms & Settings overview, start-up, and closing 6-2


Alarms & Settings functions 6-4

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-1
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings overview, start-up, and closing
DRAFT
...................................................................................................................................................................................................................................

Alarms & Settings overview, start-up, and closing


When to use
Every time you must start and use any Alarms & Settings function, and when you must
close it.

Related Information
This task does not have any related information.

Before you begin


The "Alarms & Settings" function is a E-interactive function, allowing the user to login
a E through the use of the E web server via a generic Internet browser, in order to
monitor the status of E alarms and to get and/or set some E's parameters.
This function is run clicking the following button of the Figure 4-5, “TCO Suite Main
Menu screen” (p. 4-13):

ote: Besides from the Local Copy of the TCO Suite, the "Provisioning Tool" can
be run also directly from the TCO SUITE Rel.1.8 CD-ROM, without performing the
copy procedures of the Chapter 14, “Appendix A: PREPARATIO OF THE CRAFT
TERMI AL BASED O SWP TCO SUITE Rel.1.8”
DRAFT

...................................................................................................................................................................................................................................
6-2 3DB 75003 CAAA
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings overview, start-up, and closing

DRAFT
...................................................................................................................................................................................................................................

Procedure
...................................................................................................................................................................................................

1 Start of the application


To start this application, and login the E, strictly follow instructions given in “Common
behavior of E login, and application logoff, for the " E-interactive Provisioning Tool"
and "Alarms & Settings"” (p. 4-15)
...................................................................................................................................................................................................

2 Use of the application


After having successfully connected to the E and logged-in it, the screen of Figure 6-1,
“Alarms & Settings Main Menu screen” (p. 6-4) appears.
Refer to “Alarms & Settings functions” (p. 6-4) for the use of the various functions.
...................................................................................................................................................................................................

3 Exiting from the application


Strictly follow instructions given in “Application logoff procedure” (p. 4-22)
END O F S T E P S
...................................................................................................................................................................................................

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-3
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions
DRAFT
...................................................................................................................................................................................................................................

Alarms & Settings functions


( **Comment: EXT FIGURE CHA GED **)

Figure 6-1 Alarms & Settings Main Menu screen


DRAFT

...................................................................................................................................................................................................................................
6-4 3DB 75003 CAAA
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions

DRAFT
...................................................................................................................................................................................................................................

User can perform desired operations by clicking on proper label in proposed menu. The
behavior of the Web Server for each of menu entry is detailed in the following.
Logout button gives the user the possibility to clear its authentication parameters and
reload the initial page (Figure 6-1, “Alarms & Settings Main Menu screen” (p. 6-4) ) for
starting a new session.
The links between pages are available by following standard procedures and correct
"navigation" steps. If the user will follow non–authorized processes or will try to search
for other pages, a "404" error will show the "Page ot Found" result. In this case, the user
will be allowed to get back to initial login page and he has to redo the whole login
process.
Before you proceed, read carefully following warnings:
1. WAR I G 1: according to your Login profile ( refer to “Security by operator
profile” (p. 3-17) for details ) you can or cannot be enabled to some functions, as
specified in Table 6-1, “Operations allowed in the Alarms & Settings Main Menu
screen, according to the AWY type and Login profile” (p. 6-6)
2. WAR I G 2: when PC to E connection is established, a time–out for an automatic
logout is set, so that after 5 minutes of connection without user operations, the
application logs out automatically (for security purposes), and user is obliged to
repeat again login.
3. WAR I G 3: if, during the usage of the Alarms & Settings functions, the connected
E becomes unavailable (e.g. for network problems, or after having loaded E data
which modify the E IP address), the sand–glass symbol appears and no operations
are longer possible. In this case, close the Alarms & Settings session, then verify the
E reachability (e.g. by ping function), and login it again.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-5
Issue 1 September 2009
DRAFT DRAFT

6-6
Table 6-1 Operations allowed in the Alarms & Settings Main Menu screen, according to the AWY type and Login profile
Function
Operation allowed according to Login profile
Available for AWY type
Function type 2.0.6 &
ALARMS & SETTINGS

2.1.3 & 2.1.4 Administrator CraftPerson Operator Viewer


2.1.2
“Date & Time Setting”
YES YES set & read read only read only read only
(p. 6-7)
“Configuration Setting”
YES YES YES YES O O
(p. 6-9)
“Configuration Info” (p. 6-10) YES YES YES YES YES YES
“Get Configuration File”
YES YES YES YES YES YES
(p. 6-16)
“Active Alarms” (p. 6-17) YES YES YES YES YES YES
“Power Measurement”
YES YES set & read set & read read only read only
(p. 6-18)
YES
YES YES (with licence
“Licence Info” (p. 6-20) (with licence read only read only read only
(read only) management)
management)
“Community string” (p. 13-5) O YES YES O O O
“Access List Restore”
O YES YES O O O
(p. 13-8)
“Access List Backup”
O YES YES O O O
(p. 13-8)
“Modem Speed” (p. 6-19) YES YES set & read set & read read only read only
“ AT option” (p. 6-21) YES YES set & read set & read O O

Issue 1 September 2009


3DB 75003 CAAA
Alarms & Settings functions

...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
ALARMS & SETTINGS Alarms & Settings functions

DRAFT
...................................................................................................................................................................................................................................

Date & Time Setting


According to Table 6-1, “Operations allowed in the Alarms & Settings Main Menu
screen, according to the AWY type and Login profile” (p. 6-6) :
• for “set & read” authorized users, this function allows to modify E internal time so
that it can be automatically aligned with user’s PC internal time or the user can set its
preferred time and date on E. Also, it is possible, for the user, to verify the status of
TP configuration for automatic synchronization using a couple of TP server (main
and back–up).
• the “read only” authorized users cannot make any setting operation.
There are two functions available to authorized users:
1. E Time Setting with OS time;
2. GMT Time Manual Setting.
In the first situation (Figure 6-2, “Alarms & Settings "Date & Time Setting" request”
(p. 6-8) below) the user will see his/hers PC internal time and by clicking on apply, E
will receive UTC time based on PC configuration.
For example: if user's PC is configured as located in central Europe (CET or CEST time
zones) and it shows 2006-08-25 11:40:00, by clicking "Apply" button E web server will
receive 2006-08-25 09:40 due to Daylight Saving (summer) Time one hour difference
with respect to normal time and to one hour time difference between CET time zone and
GMT time zone.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-7
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions
DRAFT
...................................................................................................................................................................................................................................

Figure 6-2 Alarms & Settings "Date & Time Setting" request

The other function allows user to directly send a specific date and time information to E
without bothering on time zones but simply specifying all the information needed.
In both cases there could be some short delays (few seconds) between applied time shown
after the operation and current time or selected time.
In case of enabled TP, this page won't allow to modify E time and date
DRAFT

...................................................................................................................................................................................................................................
6-8 3DB 75003 CAAA
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions

DRAFT
...................................................................................................................................................................................................................................

Configuration Setting
According to Table 6-1, “Operations allowed in the Alarms & Settings Main Menu
screen, according to the AWY type and Login profile” (p. 6-6) :
• for authorized users, the Configuration Setting process allows the operator for sending
to E the operator’s desired configuration.
• the unauthorized users cannot see this screen.
The Configuration Setting process allows the allowed operator for sending to E the
operator's desired configuration.

Figure 6-3 Alarms & Settings "Configuration Setting" page

To carry out this operation, you must browse from your PC a configuration file
"configuration_name.qcml" previously created (e.g. through the Provisioning Tool), and
then click on Apply Configuration button.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-9
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions
DRAFT
...................................................................................................................................................................................................................................

Configuration Info
The "Configuration Info" function allows the user to download the full E system report.
Selecting (by click) this function from main menu will show the user a "Save File" screen
(Figure 6-4, “Alarms & Settings "Configuration Info" request” (p. 6-10)below) that gives
the user the capability to browse its system in order to select the path where to save the
full report file.
ote: With some browsers (e.g. Mozilla), it is necessary to specify a text-reading
application (e.g. WORD PAD) to open and read correctly the file.

Figure 6-4 Alarms & Settings "Configuration Info" request

This screen content, shape, graphics and layout all depend on operating system version
and language and on used browser too. The report file is a text file that describes the
configuration of the E. It contains all the information once added to the quick
configuration report or in the current configuration view used in the former versions. An
example of this file content is shown below:
CONFIGURATION INFO
==================
Site Name: uls213_107
Site Location: tp
INSTALLED SOFTWARE:
––––––––––––––––––––––––––
[Active SW Package: R94A – V02.01.03]
Status: Committed
Operational State: Enabled
SW Units:
OC_R – V03.00.01 – Size(Bytes): 1334619
EC – V03.03.17 – Size(Bytes): 2787100
NETWORK EQUIPMENT CONFIGURATION:
––––––––––––––––––––––––––
DRAFT

NE Configuration Type:1+1 HSB 16E1 –GETH (PSU4860) EPS

...................................................................................................................................................................................................................................
6-10 3DB 75003 CAAA
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions

DRAFT
...................................................................................................................................................................................................................................

Market: ETSI
Capacity: 32E1
Modulation: 16QAM
TRIBUTARY CONFIGURATION:
––––––––––––––––––––––––––
Impedance: Balanced 120 Ohm
E1 Port #1: Signal Mode: Unframed
E1 Port #2: Signal Mode: Unframed
E1 Port #3: Signal Mode: Disabled
E1 Port #4: Signal Mode: Disabled
E1 Port #5: Signal Mode: Disabled
E1 Port #6: Signal Mode: Disabled
E1 Port #7: Signal Mode: Disabled
E1 Port #8: Signal Mode: Disabled
E1 Port #9: Signal Mode: Disabled
E1 Port #10: Signal Mode: Disabled
E1 Port #11: Signal Mode: Disabled
E1 Port #12: Signal Mode: Disabled
E1 Port #13: Signal Mode: Disabled
E1 Port #14: Signal Mode: Disabled
E1 Port #15: Signal Mode: Disabled
E1 Port #16: Signal Mode: Disabled
DATA CONFIGURATION:
––––––––––––––––––––––––––
[Ethernet Port 33]
Status: Disabled
Auto Negotiation: Enabled
Speed without AutoNegotiation: 100 Mbit/s
Flow Control Status (tx): Asymmetric
AutoNegAdvertise rate ability:
10base Half Enable
10base Full Enable
100base Half Enable
100base Full Enable
1000base Full Enable
Qos Classification Mode:
802.1p
Vlan Accept Frame Type:
all
Vlan Pvid:
1
Vlan Priority:
0
Autolink Shutdown Status:
Disabled
Rate control value:
0
[Ethernet Port 34]
Status: Disabled
Auto Negotiation: Enabled
Speed without AutoNegotiation: 100 Mbit/s
Flow Control Status (tx): Asymmetric
DRAFT

AutoNegAdvertise rate ability:


...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-11
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions
DRAFT
...................................................................................................................................................................................................................................

10base Half Enable


10base Full Enable
100base Half Enable
100base Full Enable
1000base Full Enable
Qos Classification Mode:
802.1p
Vlan Accept Frame Type:
all
Vlan Pvid:
1
Vlan Priority:
0
Autolink Shutdown Status:
Disabled
Rate control value:
0
[Ethernet Port 35]
Status: Disabled
Auto Negotiation: Enabled
Speed without AutoNegotiation: 100 Mbit/s
Flow Control Status (tx): Asymmetric
AutoNegAdvertise rate ability:
10base Half Enable
10base Full Enable
100base Half Enable
100base Full Enable
1000base Full Enable
Qos Classification Mode:
802.1p
Vlan Accept Frame Type:
all
Vlan Pvid:
1
Vlan Priority:
0
Autolink Shutdown Status:
Disabled
Rate control value:
0
[Ethernet Port 36]
Status: Disabled
Auto Negotiation: Enabled
Speed without AutoNegotiation: 100 Mbit/s
Flow Control Status (tx): Asymmetric
AutoNegAdvertise rate ability:
10base Half Enable
10base Full Enable
100base Half Enable
100base Full Enable
1000base Full Enable
Qos Classification Mode:
DRAFT

802.1p
...................................................................................................................................................................................................................................
6-12 3DB 75003 CAAA
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions

DRAFT
...................................................................................................................................................................................................................................

Vlan Accept Frame Type:


all
Vlan Pvid:
1
Vlan Priority:
0
Autolink Shutdown Status:
Disabled
Rate control value:
0
Eth Vlan Bridge Type:
802.1Q
Static Vlan Xconn:
––––––––––––––––––––––––––
[Vlan Xconn: 1]
vlan name: Default VLAN_1, VID:1, untagPort:15, egressPort:31
RESTORATION CRITERIA:
––––––––––––––––––––––––––
Radio Protection: Revertive
Mux/DeMux Protection: Revertive
HSB–Tx Protection: Revertive
RADIO CONFIGURATION:
––––––––––––––––––––––––––
[Channel 1]
ATPC Status: Disabled
RTPC Tx Power: 10.0 dBm
Tx Frequency: 14500000 kHz
Tx Range: [14500000; 14724000] kHz
Rx Frequency: 14920000 kHz
Rx Range: [14920000; 14920000] kHz
Shifter Central Frequency: 14612000 kHz
Shifter Amplitude: 420000 kHz
[Channel 0]
ATPC Status: Disabled
RTPC Tx Power: 17.0 dBm
Tx Frequency: 14500000 kHz
Tx Range: [14500000; 14724000] kHz
Rx Frequency: 14920000 kHz
Rx Range: [14920000; 14920000] kHz
Shifter Central Frequency: 14612000 kHz
Shifter Amplitude: 420000 kHz
LINK IDENTIFIER:
––––––––––––––––––––––––––
Expected Mode: Disabled
Expected Value: 0
Sent Value: 0
ETHERNET CONFIGURATION:
––––––––––––––––––––––––––
Local IP Address:
130.1.1.107
Status: Enabled
IP Address:
DRAFT

172.25.20.107
...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-13
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions
DRAFT
...................................................................................................................................................................................................................................

IP Mask:
255.255.255.0
MAC Address:
00:11:3f:c0:ee:66
Routing Protocol: OSPF
OSPF Area:0
[Network Time Protocol]:
Status: Enabled
Main Server: 151.98.99.242
Spare Server: 151.98.99.244
OSPF AREAS:
––––––––––––––––––––––––––
[Ospf Area 0]
IP Address: 0.0.0.0
Stub Area: OFF
[Ospf Area 1]
IP Address: 130.0.0.0
Stub Area: OFF
[Ospf Area 2]
IP Address: 0.0.0.2
Stub Area: OFF
TMN INTERFACES:
––––––––––––––––––––––––––
[TMN–RF]
Status: Enabled
RF Remote Address: 130.1.1.108
Routing IP Protocol: OSPF
OSPF Area:2
[TMN–V11]
Status: Enabled
Remote Address: 130.1.1.108
Mode: Codirectional
Routing IP Protocol: OSPF
OSPF Area:2
[TMN–G703]
Status: Enabled
Remote Address: 130.1.1.101
Mode: Codirectional
Routing IP Protocol: OSPF
OSPF Area:0
STATIC ROUTES:
––––––––––––––––––––––––––
[Input Point 1]
User Label:CPI#1a
Polarity: Active Closed
[Input Point 2]
User Label:CPI#2a
Polarity: Active Open
[Input Point 3]
User Label:CPI#3a
Polarity: Active Open
[Input Point 4]
DRAFT

User Label:CPI#4a
...................................................................................................................................................................................................................................
6-14 3DB 75003 CAAA
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions

DRAFT
...................................................................................................................................................................................................................................

Polarity: Active Open


[Input Point 5]
User Label:CPI#5a
Polarity: Active Open
[Input Point 6]
User Label:CPI_6_prova
Polarity: Active Open
[Output Point 1]
User Label:fuori1
Polarity: Active Closed
Working Mode: Manual
External State: Off
[Output Point 2]
User Label:CPO#2222
Polarity: Active Closed
Working Mode: Manual
External State: Off
[Output Point 3]
User Label:CPOtre
Polarity: Active Open
Working Mode: Automatic
Associated Event: Line side LOS Alarm
[Output Point 4]
User Label:CPO#4444
Polarity: Active Closed
Working Mode: Manual
External State: Off
[Output Point 5]
User Label:FAIL IDU
Polarity: Active Closed
[Output Point 6]
User Label:FAIL ODU CH#1
Polarity: Active Closed
[Output Point 7]
User Label:FAIL ODU CH#0
Polarity: Active Closed
The content above describe a sample configuration report in text format.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-15
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions
DRAFT
...................................................................................................................................................................................................................................

Get Configuration File


Just like the "Configuration Info" function, the "Get Configuration File" function allows
the user to download the full E system report. Instead of being in "human-readable" text
format, the configuration file is described in QCML format, and can be used by the
Provisioning Tool. Selecting it from the main menu (by click), this function will show the
user a "Save File" screen (Figure 6-5, “Alarms & Settings "Get Configuration File"
request” (p. 6-16)below) that gives the user the capability to browse its system in order to
select the path where to save the full report file.
ote: With some browsers (e.g. Mozilla), it is necessary to specify a text-reading
application (e.g. WORD PAD) to open and read correctly the file.

Figure 6-5 Alarms & Settings "Get Configuration File" request

This file is an XML standard-based set of configuration information that the Provisioning
Tool can preview in a human-readable HTML layout and allow the user to modify such
configuration using a set of wizard/simplified steps.
DRAFT

...................................................................................................................................................................................................................................
6-16 3DB 75003 CAAA
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions

DRAFT
...................................................................................................................................................................................................................................

Active Alarms
Alarms monitoring is represented by a simple colored table that will shows an updated list
of active alarms. Older alarms, anyway, won't be removed but in order to be more
comprehensible, activated alarms table will be updated by recreating the whole table each
time, so showing only all active alarms in any moment.

Figure 6-6 Alarms & Settings "Active Alarms: Static Page"

This table can be presented into two ways: the first one shown when user chooses "Active
Alarms" function is a simple page that will show to user alarms active at the moment of
its selection.
To give user a better control on this status table, a "Refresh" button is provided. This
button will redo the request to E and updates shown HTML page anytime is pressed.
The "Enable Automatic Refresh" button allows the user to forget about doing a refresh by
providing an automatic refresh process (Figure 6-7, “Alarms & Settings "Active Alarms:
Automatic Page"” (p. 6-17)).

Figure 6-7 Alarms & Settings "Active Alarms: Automatic Page"

WAR I G: For auto–refreshed pages, a longer time-out is foreseen. This is set to 90


refresh cycles of 10 seconds each, for a total of 15 minutes. After this time-out, the
connection expiration page is shown.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-17
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions
DRAFT
...................................................................................................................................................................................................................................

Power Measurement
This page (Figure 6-8, “Alarms & Settings "Power Measurement" request” (p. 6-18))
allows user to read power measurement result.
” Refresh Interval” filed allows the operator to set the time duration of the measurement
for automatic refreshing. The choice is among 5,10,30 sec. Otherwise operator can click
“refresh” button directly to refresh the result of power measurement.

Figure 6-8 Alarms & Settings "Power Measurement" request


DRAFT

...................................................................................................................................................................................................................................
6-18 3DB 75003 CAAA
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions

DRAFT
...................................................................................................................................................................................................................................

Modem Speed
According to Table 6-1, “Operations allowed in the Alarms & Settings Main Menu
screen, according to the AWY type and Login profile” (p. 6-6) , this page (Figure 6-9,
“Alarms & Settings "Modem Speed" request” (p. 6-19)) allows:
• all users, to read the current F–Interface speed value
• authorized “set & read” users, to modify it, through a simple combo box.
ote: see also “Changing the ECT-equipment connection speed” (p. 17-13)

Figure 6-9 Alarms & Settings "Modem Speed" request

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-19
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions
DRAFT
...................................................................................................................................................................................................................................

Licence Info
According to Table 6-1, “Operations allowed in the Alarms & Settings Main Menu
screen, according to the AWY type and Login profile” (p. 6-6), and as shown in Figure
6-10, “Alarms & Settings "Licence Info" request” (p. 6-20), there are two cases:
1. Case of AWY V2.1.3 & V2.1.4
This screen allows an operator loggin–in the E with the Administrator profile, to
read and manage dynamically the license information, as described in “Licence
information” (p. 4-4)
ote: in case of login profile different from Administrator, the “Set Licence key” field
and “Apply” button are not available, so that only the read operation is possible.
2. Case of AWY V2.0.6 and V2.1.2
This page allows the user just to read the license information.
( **Comment: EXT FIGURE CHA GED **)

Figure 6-10 Alarms & Settings "Licence Info" request


DRAFT

...................................................................................................................................................................................................................................
6-20 3DB 75003 CAAA
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions

DRAFT
...................................................................................................................................................................................................................................

NAT option
According to Table 6-1, “Operations allowed in the Alarms & Settings Main Menu
screen, according to the AWY type and Login profile” (p. 6-6) :
• this page ( Figure 6-11, “Alarms & Settings " AT option" request” (p. 6-21) ) allows
authorized “set & read” users, to set the AT Option, described in “Description of
AT router” (p. 6-22).
• the unauthorized users cannot see this screen.

Figure 6-11 Alarms & Settings "NAT option" request

ote: This setting is independent from that of the Provisioning tool:

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-21
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions
DRAFT
...................................................................................................................................................................................................................................

Figure 6-12 NAT router

Description of AT router
1. AT router
In the following the scenario, when the AT router is used in the network, is
analyzed, providing a list of warnings and the relevant countermeasures. The scenario
is represented by a remote manager that wants to access the radio network; in
between one or more AT router could be present. WTD suggests not using this
device because of the consequences that are hereunder described.
2. What is the AT router
The etwork Address Translation allows a single device, such as a router, to act as
agent between the Internet ( or "public network" ) and a local ( or "private" ) network.
This means that only a single unique IP address is required to represent an entire
group of computers to anything outside their network. The shortage of IP addresses is
the main reason to use AT.
The AT function cannot by itself support all applications transparently and often
must coexist with application level gateways (ALGs) for this reason. People looking
to deploy AT based solutions need to determine their application requirements first
and assess the AT extensions (i.e., ALGs) necessary to provide application
transparency for their environment. AT devices are application unaware in that the
translations are limited to IP/TCP/UDP/ICMP headers and ICMP error messages only.
AT devices do not change the payload of the packets, as payloads tend to be
application specific. AT devices (without the inclusion of ALGs) do not examine or
modify transport payload. For this reason, AT devices are transparent to applications
in many cases.
3. What are the AT router limitations
As stated in the RFC 2663 - IP etwork Address Translator ( AT) Terminology and
Considerations
there are three main areas where AT devices often cause difficulties:
a. when an application payload includes an IP address,
b. the FTP application unless to operate dedicated setting and
c. when end-to-end security is needed (ex. IPSec transport mode or the TCP MD5
Signature Option)
About point a , S MP is one such application with address content in payload. AT
routers would not translate IP addresses within S MP payloads. It is not uncommon
for an S MP specific ALG to reside on a AT router to perform S MP MIB
translations proprietary to the private network, but for sure it is expensive and AT
device depending.
DRAFT

...................................................................................................................................................................................................................................
6-22 3DB 75003 CAAA
Issue 1 September 2009
ALARMS & SETTINGS Alarms & Settings functions

DRAFT
...................................................................................................................................................................................................................................

4. How the WTD equipments S MP based are impacted


a. About the Manager IP Address Access Control Security
This feature allows the control of the IP manager forbidding the access for any
manager that is not registered. For the 9400AWY family, the " Start Supervision"
operation/sequence is completed successful only if IP packets coming from the
manager have the same IP source address than the one contained in the
Registration table (retrieved by the S MP message); this means, in case of AT
usage, no way to access the equipment.
b. Disabling the Manager IP Access Control
Obviously the case of AT presence has been overcame with some modification,
considering it as exceptional case.
For example for both products can be enabled the " o registration" or " AT
presence" option that skips the previous check.
In this case some drawbacks can be observed, compared to the standard behavior.

9400AWY case
No registration Standard Access Control
E Reset OK OK
Loopback commands OK OK
Shifter management OK OK

c. About the FTP application


One of the most popular internet applications "FTP" could not work in presence of
the AT, unless specific implementations are provided.
Generally the TCP checksum and the TCP sequence and acknowledge numbers
must be updated to reflect the change in length of FTP control data portion:
detailed explanation can be found on the RFC 2663.
Consequently some applications can be impacted as:
- Software Download
- Backup and Restore

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 6-23
Issue 1 September 2009
DRAFT DRAFT
DRAFT
7 ACCEPTANCE TOOL
7

Overview
Purpose
This chapter describes in detail the functions of the Main Menu’s “Acceptance Tool”,
used during the radio link line-up and commissioning.

Contents

Acceptance Tool scope 7-2


Acceptance Tool start-up 7-4
Acceptance Tool in E–interactive modality (online) 7-4
Acceptance Tool in not E–interactive modality (offline) 7-18

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 7-1
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool scope
DRAFT
...................................................................................................................................................................................................................................

Acceptance Tool scope


Radio link line–up, commissioning, and acceptance
The radio link line–up, commissioning, and acceptance phases are summarized as
follows:
1. Phase 1: Turn up and E data definition

On each E: preliminary operations, turn up, and E data definition:


a. Station A, roughly point the antenna towards station B (if not done in the
Hardware Installation procedure)
b. Commission station A (phase 1)
c. Commission station B (phase 1)
Then, fine antenna alignment, and preliminary checks on the link – Stations A &
B:
d. Station B, fine align the antenna towards station A, and preliminary checks
e. Station A, fine align the antenna towards station B, and preliminary checks
2. Phase 2 for Station A: Site acceptance tests, by the Acceptance Tool
Station A, perform all the commissioning checks and tests.
Report the results in the Local Station tab panels of the TRS (Acceptance Tool)

3. Phase 2 for Station B: Site acceptance tests, by the Acceptance Tool


Station B, perform all the commissioning checks and tests.
Report the results in the Remote Station tab panels of the TRS (Acceptance Tool)
DRAFT

...................................................................................................................................................................................................................................
7-2 3DB 75003 CAAA
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool scope

DRAFT
...................................................................................................................................................................................................................................

4. Phase 3: Final acceptance of the link, by the Acceptance Tool


Print and save the final TRS report
5. Phase 4: Final operations
Create the E operator profiles, and save the E data.
ote. the radio link line–up, commissioning, and acceptance phases are described in
detail in the specific “ E User Manual” , more precisely:
• section SW I STALLATIO A D COMMISSIO I G
– chapter Line–Up and Commissioning

Acceptance tool use in the commissioning procedure


The Acceptance Tool is used in the phases 2 (Site acceptance tests), and 3 (Final
acceptance of the link) of the “Radio link line–up, commissioning, and acceptance”
(p. 7-2), to create the TRS document (Test Report Sheets & Site Acceptance report), and
allows to:
• retrieve automatically most of the system information from the equipment (local and
remote stations),
• introduce manually the remaining system information (not retrieved automatically),
test results and comments through dedicated screens on the PC:
– indoor system installation & cabling visual inspection,
– outdoor system installation & cabling visual inspection,
– test results,
– module identification (P/ & S/ IDU(s), P/ & S/ Flash card, P/ & S/ 1+1
coupler, P/ & S/ of antenna(s), P/ & S/ ODU(s), P/ & S/ of Plug–in card
(s), E SWP stand–by ),
• create a file containing all data (extension “.atml”), that can be open at a second time
and modified as needed,
• generate a final TRS document in Adobe Acrobat “.pdf” format, following
pre–defined output templates.
ote: the TRS document can be customized with the Customer’s own logo, as
described in “Customizing TRS template” (p. 7-9)
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 7-3
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool start-up
DRAFT
...................................................................................................................................................................................................................................

Acceptance Tool start-up


This function is run clicking the following button of Figure 4-5, “TCO Suite Main Menu
screen” (p. 4-13)

ote: Besides from the Local Copy of the TCO Suite, the “Acceptance Tool” can
be run also directly from the TCO SUITE Rel.1.8 CD-ROM, without performing the
copy procedures of the Chapter 14, “Appendix A: PREPARATIO OF THE CRAFT
TERMI AL BASED O SWP TCO SUITE Rel.1.8”
This function can be run in two ways:
• “Acceptance Tool in E–interactive modality (online)” (p. 7-4)
• or “Acceptance Tool in not E–interactive modality (offline)” (p. 7-18)

Acceptance Tool in NE–interactive modality (online)


Bench set–up and start–up of the NE–interactive Acceptance Tool
With reference to Figure 7-1, “Bench set–up and start–up of E–interactive Acceptance
Tool” (p. 7-5), to use this function:
• you must know the “Ethernet Configuration IP address” of the Local station, and the
“Local IP address” of the Remote station. Refer to “ E’s “local IP address” and
“Ethernet Configuration IP address”” (p. 3-9) for details.
• for each of the two Es that must be logged–in, you must have an User ame and
Password set. The allowed Login profile can be only Administrator or CraftPerson.
Refer to “Security by operator profile” (p. 3-17) for details.
WAR I G: this function must not be launched if the PC– E connection is done through
the F interface, and must not be launched if the PC– E connection is trough the IP
network.
As shown in Figure 7-1, “Bench set–up and start–up of E–interactive Acceptance Tool”
(p. 7-5):
• set–up the bench,
• through the ping function, check that both Es are reachable by the PC (using the
addresses stated above),
• start the Acceptance Tool from the Main Menu screen (see “Acceptance Tool start-up”
(p. 7-4)),
• fill the “Local” and “Remote” fields, then click “OK”.
DRAFT

...................................................................................................................................................................................................................................
7-4 3DB 75003 CAAA
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)

DRAFT
...................................................................................................................................................................................................................................

Figure 7-1 Bench set–up and start–up of NE–interactive Acceptance Tool

If both Es are reachable by the PC, the E login screen opens, where user is asked to
provide his/her User ame and Password (for details, see “Security by operator profile”
(p. 3-17))

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 7-5
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)
DRAFT
...................................................................................................................................................................................................................................

Figure 7-2 Authentication request for NE login

ote: two E login screens must be filled, one for each of the two Es.
DRAFT

...................................................................................................................................................................................................................................
7-6 3DB 75003 CAAA
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)

DRAFT
...................................................................................................................................................................................................................................

Main functions of the NE–interactive Acceptance Tool


If the double E login of Figure 7-2, “Authentication request for E login” (p. 7-6) is
successful, the following screen opens:

Figure 7-3 Main functions of the NE–interactive Acceptance Tool

The following functions are available:


• “Modify Report” (p. 7-8)
• “Create Blank Report” (p. 7-9)
• “Create Report” (p. 7-10)

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 7-7
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)
DRAFT
...................................................................................................................................................................................................................................

Modify Report
Clicking the button Modify Report in the screen of:
• Figure 7-3, “Main functions of the E–interactive Acceptance Tool” (p. 7-7)
• or Figure 7-13, “Functions available in Acceptance Tool in not E–interactive
modality (offline)” (p. 7-19)
allows to open an “.atml” file saved previously (see Figure 7-5, “Functions available in
the last step of the E-interactive Acceptance Tool” (p. 7-12)). If you click this button, a
suitable screen will ask you to browse and open the file. After having opened the file the
following screen opens:

Clicking the button ext> in this screen, the first step of the Acceptance Tool’s “Create
Report” function opens (see Figure 7-6, “Step 1 of the Acceptance Tool: Indoor
installation visual inspection check” (p. 7-13)). ow, you can navigate the report steps to
introduce the changes you like.
DRAFT

...................................................................................................................................................................................................................................
7-8 3DB 75003 CAAA
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)

DRAFT
...................................................................................................................................................................................................................................

Create Blank Report


Clicking the button Create Blank Report in the screen of:
• Figure 7-3, “Main functions of the E–interactive Acceptance Tool” (p. 7-7)
• or Figure 7-13, “Functions available in Acceptance Tool in not E–interactive
modality (offline)” (p. 7-19)
allows to create a blank “.pdf” file. A blank report can be useful for Customers who prefer
to fill the information on the printed papers by hand.
If you click this button:
• at first, you are asked to choose a template (see following OTE) :

Figure 7-4 Choose report template

• then, a suitable screen will ask you to give a name to the file, and to specify where to
save it.
OTE: Customizing TRS template: the User can create a customized template folder
under <TCOR1.x installation folder>/Template directory, in this way:
1. Copy the folder “Alcatel–Lucent default template” and paste it (in the same
“Template” directory, giving it the name you like (e.g. “MyTemplate”)
2. Open your own new template folder (i.e. following example above: “MyTemplate”);
you will find the file “logo.jpeg”: delete it
3. Create your own logo, that can be any .png, .gif, .jpeg, .jpg format, and put it in your
own new template folder with the name “logo.xxx” (xxx according to format)
4. From now, your own template can be selected in the screen of Figure 7-4, “Choose
report template” (p. 7-9). Your own logo is automatically converted into size 110*30,
and generated in the TRS report.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 7-9
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)
DRAFT
...................................................................................................................................................................................................................................

Create Report
Clicking the button Create Report in the screen of Figure 7-3, “Main functions of the
E–interactive Acceptance Tool” (p. 7-7), causes the following operations:

At the end, clicking ext starts the creation of the report.


WAR I G:
• At this phase of the commissioning procedure, it is assumed that all E data (of both
stations A and B) have been completely defined, and have not to be modified in the
following.
• With the Create Report action performed above, all E configuration data (of both
stations A and B) are retrieved from them, and stored in the Report temporary file
(that can be printed and saved at any time, by the buttons Generate Report and
Save of Figure 7-5, “Functions available in the last step of the E-interactive
Acceptance Tool” (p. 7-12))
• In the following, only commissioning tests are performed, just reporting OK or OK
for their result, or adding manually some information, and storing the results and the
additional information in the Report temporary file.
SUGGESTIO :
• After the Create Report action, print the Report (by the button Generate Report) to
acknowledge the configuration data that have been retrieved from both Es.
CO CLUSIO S:
• In the following, if you change any of such configuration data, you must restart the
E–interactive Acceptance Tool from the beginning, by a new Create Report
action, to have the modified data stored in the report file.
DRAFT

...................................................................................................................................................................................................................................
7-10 3DB 75003 CAAA
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)

DRAFT
...................................................................................................................................................................................................................................

The report structure is intuitive for the Operators performing the commissioning phase
according to the chapter Line–Up and Commissioning of the specific “ E User
Manual”.
Some usage notes are added:
1. The report is organized in steps. you can move forward and backward in such steps,
by means of the <Prev and Next> buttons:

2. Each step has two tabbed panels, one for the Local station, the other for the Remote
one.
The result of each test must be reported as a simple choice between OK or OK (OK
is the default):

3. At any time, you can suspend the report writing, and restart it at a second time,
without loosing the job made before the suspension, in the following way:
• clicking repeatedly on Next> button, reach the last step (Figure 7-5, “Functions
available in the last step of the E-interactive Acceptance Tool” (p. 7-12)) , and
click the button Save , to save the report in an “.atml” file (containing data
reported so far).
• when you want to resume the job, start the “Acceptance Tool in not
E–interactive modality (offline)” (p. 7-18) , and, in screen of Figure 7-13,
“Functions available in Acceptance Tool in not E–interactive modality (offline)”
(p. 7-19), click the button Modify Report to reload the “.atml” file previously
saved.
4. In the last step (Figure 7-5, “Functions available in the last step of the E-interactive
Acceptance Tool” (p. 7-12)) , you can click:
• Save , to save the report in an “.atml” file. If you click this button, a suitable
screen will ask you to give a name to the file, and to specify where to save it.
ote. this Save execution is always strongly suggested.
• Generate Report , to save the report in a “.pdf” file. If you click this button:
– at first, you are asked to choose a template (see Figure 7-4, “Choose report
DRAFT

template” (p. 7-9))


...................................................................................................................................................................................................................................
3DB 75003 CAAA 7-11
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)
DRAFT
...................................................................................................................................................................................................................................

– then, a suitable screen will ask you to give a name to the file, and to specify
where to save it.

Figure 7-5 Functions available in the last step of the NE-interactive Acceptance
Tool
DRAFT

...................................................................................................................................................................................................................................
7-12 3DB 75003 CAAA
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)

DRAFT
...................................................................................................................................................................................................................................

Steps of the Acceptance Tool’s “Create Report”


An example of the steps of this procedure is given in the following (example referred to
AWY V2.1.3)
ote: following figures are relevant to the “1+1” configurations; in the “1+0”
configurations, the screens do not show the information associated to the channel 0, as
well as to the protections.
The steps of this procedure, must be filled according to the instructions given in the
acceptance test phase of the commissioning procedure, described in the chapter Line–Up
and Commissioning of the specific “ E User Manual”.
The last step 7 of this procedure, by means of scrollable and read–only tab panels (two
examples in Figure 7-12, “Step 7 of the Acceptance Tool: summary read–only tab panels
and interactive buttons” (p. 7-16)), shows the results of tests, as well as the data
automatically retrieved from the local and remote Es.

Figure 7-6 Step 1 of the Acceptance Tool: Indoor installation visual inspection
check

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 7-13
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)
DRAFT
...................................................................................................................................................................................................................................

Figure 7-7 Step 2 of the Acceptance Tool: Outdoor installation visual inspection
check, and Antenna

Figure 7-8 Step 3 of the Acceptance Tool: Channel protection switch, Loopback
tests, Point to point BER loop tests, and Rx level tests
DRAFT

...................................................................................................................................................................................................................................
7-14 3DB 75003 CAAA
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)

DRAFT
...................................................................................................................................................................................................................................

Figure 7-9 Step 4 of the Acceptance Tool: Housekeeping input & output alarm
acquisition, and Hop stability test

Figure 7-10 Step 5 of the Acceptance Tool: Equipment identification, and NE


software release

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 7-15
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)
DRAFT
...................................................................................................................................................................................................................................

Figure 7-11 Step 6 of the Acceptance Tool: Acceptance

Figure 7-12 Step 7 of the Acceptance Tool: summary read–only tab panels and
interactive buttons
DRAFT

...................................................................................................................................................................................................................................
7-16 3DB 75003 CAAA
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in NE–interactive modality (online)

DRAFT
...................................................................................................................................................................................................................................

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 7-17
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in not NE–interactive modality (offline)
DRAFT
...................................................................................................................................................................................................................................

Acceptance Tool in not NE–interactive modality (offline)


• Start the Acceptance Tool from the Main Menu screen (see “Acceptance Tool
start-up” (p. 7-4))
• Select “Do not connect to E (offline)” , then click OK:

• after clicking the OK button, the following prompt screen appears, where you must
choose the 9400AWY system type, and then click OK:
( **Comment: EXT FIGURE CHA GED **)

• After Version Selection and OK, the following screen opens:


DRAFT

...................................................................................................................................................................................................................................
7-18 3DB 75003 CAAA
Issue 1 September 2009
ACCEPTANCE TOOL Acceptance Tool in not NE–interactive modality (offline)

DRAFT
...................................................................................................................................................................................................................................

Figure 7-13 Functions available in Acceptance Tool in not NE–interactive modality


(offline)

The following functions are available:


• “Modify Report” (p. 7-8)
• “Create Blank Report” (p. 7-9).

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 7-19
Issue 1 September 2009
DRAFT DRAFT
DRAFT
8 8 ETO (NETWORK ELEMENT
N
OVERVIEW)

Overview
Purpose
This chapter describes in detail the functions of EtO.

Main actions with NEtO


perform the preliminary operations before to start-up one EtO session (set-up of the CT- E
physical connection and check of the E reachability from the CT)
start-up one EtO session
start the supervision of one E, and choose (if necessary) the PC- E connection (F or Ethernet
or MS connection)

• start the WebEML application on the supervised E (by SHOW button)


• start the Alarm Monitor application on the supervised E (by ALARM MO ITOR button)
• close the EtO session (by EXIT button)

Contents

General on EtO 8-2


Summary of actions for the use of EtO 8-4
Details on EtO screen 8-12
E list management 8-19
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 8-1
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) General on NEtO
DRAFT
...................................................................................................................................................................................................................................

General on NEtO
NEtO functions
EtO ( etwork Element Overview) is the starting point for the following functions:
• starting of Supervision of a 9400AWY E (status and alarms summary)
• starting of WebEML on a supervised 9400AWY E (Craft Terminal functions)
• starting of AM (Alarm Monitoring) on a supervised 9400AWY E
• Creation/Save/Retrieve/Modify of one (or more) list of favorite Es
that are described in detail in the following.
EtO application allows user to execute its functions through mnemonics keyboard
shortcuts, as described in detail in the following.

NEtO sessions and constraints


1. EtO session
EtO works as a single-session instance dedicated to one E only.
It means that if you have one EtO instance open for one E (and you want to leave
it open), you must launch another EtO instance to access another E.
WAR I G: even if allowed by SW, opening more than one EtO session (from the
same PC) on the same E is a ”forbidden” operation, and must be absolutely
avoided.
2. Max number of contemporaneous EtO sessions
The number of EtO sessions, that can be run at the same time (from the same PC),
depends on the PC performance (processor type, RAM size, operating system type,
etc.) and the possible contemporaneous run of RAM-eating and processor-stressing
programs).
As a general rule, the following figures can be considered reasonable:
• max 5 EtO sessions used for E supervision only (i.e. without logging in the E
for the WebEML and AM functions)
• or max 2 EtO sessions used for E management by WebEML and AM
At any rate, the attempt to launch one more EtO session, in addition to those already
running, which would override the available computer resources, is solved
automatically simply ignoring it, without any error message. Then, you must at first
close one of the running EtO sessions, to open another one.
DRAFT

...................................................................................................................................................................................................................................
8-2 3DB 75003 CAAA
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) General on NEtO

DRAFT
...................................................................................................................................................................................................................................

Constraints for NE access by NEtO


The following limitations (relevant to the E access, not to the EtO session) must be
taken into account:
1. the contemporaneous presence on one E of various managers (LCT, RCT and an
OS) is possible, from different Craft Terminals (WebEML, or 1320CT) or OS. The
access disable flag avoids access conflict between the OS and both RCT and LCT on
some operations, like configuration modification and remote control with access
filtering.
2. at most fifteen OS/LCT/RCT access instances can be active at a time over one E :
• one local LCT access instance only (on E's F-interface or Ethernet interface)
• plus fourteen remote RCT/OS instances at most (on E's Management Ethernet
interface, and on Radio interface and MS interface).
otes:
- Among this max. number of remote Managing Systems that can be declared and
registered into the E, only five Trusted Managers at maximum can be registered
into the E;
- Four CTs can be registered among the fifteen MS/CT that are admitted at
maximum on the same E.
The coexistence of OS, LCT and RCT access instances in the whole network is
guaranteed, since the conflict in accessing the E is solved locally by the E itself.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 8-3
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Summary of actions for the use of NEtO
DRAFT
...................................................................................................................................................................................................................................

Summary of actions for the use of NEtO


When to use
Every time you must start and use any EtO function, and when you must close it.

Related Information
This task does not have any related information.

Before you begin


Read carefully:
• “ EtO functions” (p. 8-2)
• “ EtO sessions and constraints” (p. 8-2)
• “Constraints for E access by EtO” (p. 8-3)

Preliminary operations
...................................................................................................................................................................................................

1 Make cable and network connections (if not yet done)


According to the chosen CT- E access type, make, or verify, the relevant physical
connection (local or remote) between the CT and the E, as depicted in:
• Figure 3-1, “Physical interfaces for the 9400AWY E management” (p. 3-3)
• Figure 3-2, “Access to E through E’s F interface (RS232 serial interface) on IDU
MAI unit” (p. 3-4)
• Figure 3-3, “Access to E through E's Ethernet interface on IDU MAI unit”
(p. 3-5)
• Figure 3-4, “Access to E through E’s radio Interface and MS rings and chains”
(p. 3-6)
...................................................................................................................................................................................................

2 Power on the PC and wait for its start-up (if not yet done)
...................................................................................................................................................................................................

3 Only in case of CT- E connection through the F interface, take into account the
following warnings:
1. WAR I G 1: for the use of the F interface, the LLMA (Lower Layer MA ager)
installation and configuration must have already be performed, as described in
Chapter 16, “Appendix C: LLMA I STALLATIO , CO FIGURATIO A D
USE”
2. WAR I G 2: to use the LLMA , check/set the suitable PC desktop Properties
System standby and System hibernates, that must be both set to ever, as shown in
Figure 16-9, “PC desktop Properties settings for LLMA ” (p. 16-21)
3. WAR I G 3: to use the F interface, you must at first start manually the LLMA . To
DRAFT

do that, perform operations described in “LLMA start-up with WebEML” (p. 16-22)
...................................................................................................................................................................................................................................
8-4 3DB 75003 CAAA
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Summary of actions for the use of NEtO

DRAFT
...................................................................................................................................................................................................................................

...................................................................................................................................................................................................

4 Only in case of CT- E connection via public switched telephone network (by modem
through the F interface) :
After having performed operations of previous Step 3 , set up the connection on the
public switched telephone network, as described in “Setting up the connection” (p. 17-10)
...................................................................................................................................................................................................

5 Perform the “Checks the operator must do before accessing a E” (p. 4-14)
E...................................................................................................................................................................................................
N D O F S T E P S

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 8-5
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Summary of actions for the use of NEtO
DRAFT
...................................................................................................................................................................................................................................

Operations with NEtO


...................................................................................................................................................................................................

1 Start up one EtO session


Take always into account following warnings:
1. WAR I G 1: EtO can be run only if the Local copy of WebEML (Jusm/CT) has
already been performed, as described in the Step 7 of the “Operations sequence for
the preparation of the Craft Terminal” (p. 14-2)
2. WAR I G 2: if not yet done, read carefully “ EtO sessions and constraints”
(p. 8-2)
3. WAR I G 3: if the PC– E physical connection is made on the serial interface, be
sure to have started LLMA (see “LLMA start-up with WebEML” (p. 16-22))
The start-up of one EtO session can be done in two ways:
• Figure 8-1, “Starting EtO clicking the shortcut to the Local Copy of WebEML”
(p. 8-6) that has been created during the Figure 14-4, “Local copy of WebEML
(JUSM/CT)” (p. 14-8)
• or Figure 8-2, “Starting EtO clicking the button “Operational & Maintenance
WebEML” of TCO Suite Main Menu screen” (p. 8-6) (see Figure 4-5, “TCO Suite
Main Menu screen” (p. 4-13))
( **Comment: EXT FIGURE CHA GED **)

Figure 8-1 Starting NEtO clicking the shortcut to the Local Copy of WebEML

Figure 8-2 Starting NEtO clicking the button “Operational & Maintenance WebEML”
of TCO Suite Main Menu screen

In both cases, the EtO initial screen opens, allowing operations depicted in Figure 8-3,
“ EtO initial screen” (p. 8-7).
DRAFT

...................................................................................................................................................................................................................................
8-6 3DB 75003 CAAA
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Summary of actions for the use of NEtO

DRAFT
...................................................................................................................................................................................................................................

Figure 8-3 NEtO initial screen

Legend:
A: see “ E list management” (p. 8-19)
B: see “ EtO screen minimize and restore” (p. 8-14)
C: see next Step 2
D: see next Step 3
E: see “Command Buttons” (p. 8-17)
...................................................................................................................................................................................................

2 Insert the “ E read–write Community String” (if necessary)


ote: this operation is meaningful only:
• for AWY V2.1.3 and V2.1.4 Es
• and only if the E Administrator has defined a “community string” (different from
the default value) for the specific E you want to login (details in “Security by
community string” (p. 3-19)). To proceed, you must know this string, and you must
write it before to start the “Supervision” of such E.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 8-7
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Summary of actions for the use of NEtO
DRAFT
...................................................................................................................................................................................................................................

To make this operation


1. click the button CS (Community String) on the Figure 8-3, “ EtO initial screen”
(p. 8-7).
The following screen opens:

2. As shown in following figure:


• insert the Community String (1)
• then click OK (2)
ote: the button Use Default resets the “community string” at the default value, at
EtO side only.

3. ow, you can start the “Supervision” of such E (next Step 3)


DRAFT

...................................................................................................................................................................................................................................
8-8 3DB 75003 CAAA
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Summary of actions for the use of NEtO

DRAFT
...................................................................................................................................................................................................................................

WAR I G: in the case you want, in the following, access another E in the same EtO
session, you must be aware that this “community string” setting remains active at EtO
side until you reset it by the button Use Default, or change it clicking again on button CS,
or when you close the EtO session.
...................................................................................................................................................................................................

3 Start the "Supervision" of one E


WAR I G: in case of AWY V2.1.3 or V2.1.4 E, for which the E Administrator has
defined a “community string” (different from the default value) for the specific E on
which you want to start the supervision, be sure to have performed the operation
described in previous Step 2.
From the open (Figure 8-3, “ EtO initial screen” (p. 8-7)), operate as depicted in Figure
8-4, “Start Supervision for one E in EtO initial screen” (p. 8-9) (for details refer to
“Supervision Function” (p. 8-12)).

Figure 8-4 Start Supervision for one NE in NEtO initial screen

Legend:
A: depending on E reachability:
• next Step 4 or Step 5
• or error message.
DRAFT

B: see “Command Buttons” (p. 8-17)


...................................................................................................................................................................................................................................
3DB 75003 CAAA 8-9
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Summary of actions for the use of NEtO
DRAFT
...................................................................................................................................................................................................................................

WAR I G: if the “local IP address” and “Ethernet Configuration IP address” are


different, you must specify the “local IP address” : for details, refer to “ E’s “local IP
address” and “Ethernet Configuration IP address”” (p. 3-9)
...................................................................................................................................................................................................

4 Choice (if necessary) of the network adapter for PC- E connection


If more than one network adapter is found in the PC, the following screen appears (an
example), where user must select the one to use and then click OK.

In the case of PC- E connection by F interface, and provided that LLMA has been
manually started [see point Step 3], you must select the Virtual Network Card that has
been associated to the PC serial interface
ote: You can know this association by means of the Lower Layers Settings screen
(see “Lower Layer settings” (p. 16-15))
If the connection is correctly established, the EtO screen changes as in Figure 8-5,
“Operations possible for a supervised E” (p. 8-11).
...................................................................................................................................................................................................

5 Operations possible for a supervised E


For a supervised E, operations depicted in Figure 8-5, “Operations possible for a
supervised E” (p. 8-11) are possible:
DRAFT

...................................................................................................................................................................................................................................
8-10 3DB 75003 CAAA
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Summary of actions for the use of NEtO

DRAFT
...................................................................................................................................................................................................................................

Figure 8-5 Operations possible for a supervised NE

Legend:
[A] : get information regarding the E Supervision and Alarm Synthesis states. Details in
“Supervision and Alarm Synthesis round-shaped icons” (p. 8-13)
[B] : get/change data regarding the E Information and/or the E Description; or move
to the supervision of another E (closing the current E supervision). Details in “ E
Configuration” (p. 8-15)
[C] : start WebEML and/or Alarm Monitor, or exit from EtO. Details in “Command
Buttons” (p. 8-17)
END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 8-11
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Details on NEtO screen
DRAFT
...................................................................................................................................................................................................................................

Details on NEtO screen


Details are given for:
• “Supervision Function” (p. 8-12)
• “Supervision and Alarm Synthesis round-shaped icons” (p. 8-13)
• “ EtO screen minimize and restore” (p. 8-14)
• “ EtO icon in the tray bar” (p. 8-14)
• “ E Configuration” (p. 8-15)
• “Command Buttons” (p. 8-17)
• “How to close the EtO session” (p. 8-18)

Supervision Function
The supervision function allows operator registering himself/herself as a new manager
inside E MIB and performing cyclic (periodic) monitoring on connection. To start
supervision, operator must specify E IP address in the "IP Address" field, and then
simply press "OK" button (see Figure 8-4, “Start Supervision for one E in EtO initial
screen” (p. 8-9)).
If supervision succeeds, screen is updated with information retrieved from E and
supervision icon changes its color from gray to green, stating E is correctly supervised,
as described in “Supervision and Alarm Synthesis round-shaped icons” (p. 8-13).
When a supervision error, a link down or other problems arise during supervision, icon
will become red. Alarm Synthesis area will be updated as well.
To end an ongoing supervision, simply click on "Exit" button (this will also close EtO)
or change E IP address and click "OK" button to start supervision procedure on a
different E (this will stop previous supervision).
DRAFT

...................................................................................................................................................................................................................................
8-12 3DB 75003 CAAA
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Details on NEtO screen

DRAFT
...................................................................................................................................................................................................................................

Supervision and Alarm Synthesis round-shaped icons


Information on supervision status and active alarms are shown in this area (Figure 8-6,
“Supervision and Alarm Synthesis round-shaped icons” (p. 8-13)).

Figure 8-6 Supervision and Alarm Synthesis round-shaped icons

Round-shaped icons change their colors according to current EtO functions and
situation:
• as far as the Supervision icon is concerned:
– gray color means that supervision is not active (to be started)
– green color means that supervision function is ongoing
– red color means that E link does not work
• the Alarm Synthesis area is enabled only if the supervision is active (Supervision
icon green).
It contains the possible alarm severities, accompanied by the number of alarms
affecting the specific type. Alarms and supervision state colors for icons are the same
and default for all Alcatel-Lucent devices) :
– green color means that no alarms are present
– red color is always assigned to the icon of Critical alarms (if any)
– orange color is always assigned to the icon of Major alarms (if any)
– yellow color is always assigned to the icon of Minor alarms (if any)
– cyan color is always assigned to the icon of Warning alarms (if any)
– white color is always assigned to the icon of Indeterminate alarms (if any)
More details on the active alarms can be obtained in the Alarm Monitoring screen,
that can be opened by the suitable command button (see “Command Buttons”
(p. 8-17)).
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 8-13
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Details on NEtO screen
DRAFT
...................................................................................................................................................................................................................................

NEtO screen minimize and restore


EtO screen can be minimized using the shrink glass button in the Menu Bar.
Figure 8-7, “ EtO screen: reduced screen” (p. 8-14) shows the reduced EtO view,
allowing the user to save screen space while continuously checking supervision and
alarms status.
The magnifying glass button allows showing normal EtO screen.

Figure 8-7 NEtO screen: reduced screen

NEtO icon in the tray bar


Alarm severity icon shown in Figure 8-7, “ EtO screen: reduced screen” (p. 8-14) will
appear in operating system "tray bar" (see Figure 8-8, “Alarm severity icon in system
tray-bar” (p. 8-14)), close to system clock and other system software icons.

Figure 8-8 Alarm severity icon in system tray-bar

This icon will also have a specific tooltip, visible when mouse cursor is moved over it,
that will show: name of application, E IP address, and highest severity alarms number.
Tray-bar icon is not interactive and does not present any menu or executable command if
clicked either with left or right mouse button.
DRAFT

...................................................................................................................................................................................................................................
8-14 3DB 75003 CAAA
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Details on NEtO screen

DRAFT
...................................................................................................................................................................................................................................

NE Configuration
The panel is made by these areas:
• E Info section, containing information related to E addressing:

Figure 8-9 NEtO NE Configuration View: NE Information

• E Description section, with information about E characteristics :

Figure 8-10 NEtO NE Configuration View: NE Description

1. etwork Element Information


This area (Figure 8-9, “ EtO E Configuration View: E Information” (p. 8-15)) is
related to wanted E identification
"IP Address" parameter displays the actual E IP address used by EtO functions.
S MP port is the default standard number 161, so not shown.
This box shows only IP address information, while status information is provided by
the second area of EtO window. "OK" button will start supervision on specified E,
if reachable.
Keyboard shortcut "Alt + o" behaves as clicking on "OK" button with mouse.
Whenever a stop supervision is needed, user can both click on "Exit" button (see
Figure 8-11, “ EtO E Configuration View: Command Buttons” (p. 8-17)), so
stopping supervision and closing EtO, or by simply changing E "IP Address",
writing a new one, and then clicking on "OK". This step will stop existing supervision
starting supervision on the newly specified E.
WAR I G: whenever you have written a “community string” (in Step 2 of
“Operations with EtO” (p. 8-6)), you must be aware that this setting remains active
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 8-15
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Details on NEtO screen
DRAFT
...................................................................................................................................................................................................................................

at EtO side until you reset it by the button “Use Default”, or change it clicking again
on button CS, or when you close the EtO session.
Whether IP address is correctly written, other than clicking on "OK" button,
supervision process will start on specified E by pressing "enter" (carriage return)
key on keyboard.
2. etwork Element Description
This area (.Figure 8-10, “ EtO E Configuration View: E Description” (p. 8-15))
contains some parameters displaying general information about supervised E).
a. The read–only field “Type” ULS means always 9400AWY E. The read–only
field “Version” shows the Flash Card’s SW COMMIT VERSIO presently
running on the E: see “SW instances” (p. 4-5)
b. The parameters “Site ame” and “Site Location” can be read and modified (and
applied to E using the “Apply” button). Please note that changing these labels
values will also automatically update EtO window title content: window title
will always contain “Site ame” of supervised E.
WAR I G: ”Site ame” and ”Site Location” name cannot contain special
characters, such as <, >, &, ” and ’
Keyboard shortcut "Alt + a" behaves the same as clicking on "Apply" button with
mouse.
DRAFT

...................................................................................................................................................................................................................................
8-16 3DB 75003 CAAA
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Details on NEtO screen

DRAFT
...................................................................................................................................................................................................................................

Command Buttons
Figure 8-11, “ EtO E Configuration View: Command Buttons” (p. 8-17) shows the
command buttons available on EtO screen:

Figure 8-11 NEtO NE Configuration View: Command Buttons

• "Show" and "Alarm Monitor" buttons are enabled only when a E is supervised:
– the "Show" button starts the WebEML application on the supervised E.
WAR I G: the “Show” button is greyed (i.e. not selectable) in the case the
WebEML application has already been started.
otice that, besides from this EtO screen, the WebEML application can be
launched also through the function “ avigate from AM to USM” (p. 10-19).
Keyboard shortcut "Alt + S" behaves as clicking on "Show" button with mouse.
For details on WebEML, refer to Chapter 9, “9400AWY WEBEML”
– the "Alarm Monitor" button starts AM application on the supervised E.
WAR I G: the “Alarm Monitor” button is greyed (i.e. not selectable) in the case
the AM application has already been started on the specific E.
otice that, besides from this EtO screen, the AM application can be launched
also by the WebEML application:
• through the command Diagnosis → Alarms → NE Alarms
• or through the function “ avigate from USM to AM” (p. 10-21).
Keyboard shortcut "Alt + m" behaves as clicking on "Alarm Monitor" button with
mouse.
For details on AM, refer to Chapter 10, “ALARMS MO ITOR A D EVE T
LOG BROWSER”
• "Exit" button is always enabled.
The "Exit" button only ends the E supervision (if active), and closes the EtO
application.
WAR I G: the “Exit” button does not close other related applications. Therefore, to
close one EtO session, operate as described in “How to close the EtO session”
(p. 8-18)
Keyboard shortcut "Alt + E" behaves as clicking on "Exit" button with mouse.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 8-17
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) Details on NEtO screen
DRAFT
...................................................................................................................................................................................................................................

How to close the NEtO session


1. If open, close the E JUSM window (Figure 9-1, “9400AWY Main view organization
(example)” (p. 9-4)) clicking
2. if open, close the Alarms Monitor window (Figure 10-2, “Alarms Monitor – Severity
alarm synthesis and Current Alarms” (p. 10-6)) clicking
3. only when both buttons "Show" and "Alarm Monitor" have become black (i.e.
selectable), you can click on "Exit" button. This ends the E supervision (if active),
and closes the EtO windows and application.
ote: if you try to "Exit" the EtO application while the E JUSM window and/or
the Alarms Monitor window is/are still open, the EtO screen goes to a permanent
hung state, even if, after, you will close them (in this case, you must close EtO by
Task Manager, or restarting the PC).
DRAFT

...................................................................................................................................................................................................................................
8-18 3DB 75003 CAAA
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) NE list management

DRAFT
...................................................................................................................................................................................................................................

NE list management

EtO can manage and organize one (or more) list(s) of available Es by showing user a
table containing such data. Using both ( ew) and (Open) icons, user will be able to
open Es table modal window (see Figure 8-12, “ EtO List Management” (p. 8-19)).

Figure 8-12 NEtO List Management

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 8-19
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) NE list management
DRAFT
...................................................................................................................................................................................................................................

While "Open" icon allows opening a previously saved file containing a list of Es,
" ew" icon allows creating a new list, specifying file name containing its data only when
those data will be saved. Window allows user managing its Es data by:
• "Get Current" button is used to read information from main EtO view. This
operation always adds a new line in E list table with all information related to
currently supervised E. This happens even though a E with corresponding IP
address is still present in the list;
• " ew" button, adding a new E from scratch. This allows user to fill the "IP Address"
field only with its needed E.
• "Remove" button, removing a selected E;
• "Set Current" button, filling main EtO view IP address with datum from selected
E. User must previously select a valid line in Es table and then click on "Set
Current" button so filling EtO main window data. This operation will automatically
close the E list window but does not start supervision on set E;
• "Save" button, saving table list in a specified file.
All data are saved in a custom XML format called " EtO" and this structured file will
contain all data shown in Figure 8-12, “ EtO List Management” (p. 8-19) related to all
Es added to the list. This XML-based file is further customized so helping user easily
identifying this kind of files within a huge set of files: instead of using the common .xml
file extension, a specific . EtO file extension is used, both in file names and in filtering
files while opening/saving.
User can have its own Es lists repository, containing all . EtO files that it produced
with Es information inside. Closing this window is as simple as clicking on "Close"
button. User can see data related to Es as shown in Figure 8-12, “ EtO List
Management” (p. 8-19)
As for EtO main window, even E list window allows using keyboard and hotkeys to
perform operations. Through:
• Keyboard shortcut "Alt + g" behaves as clicking on "Get Current" button with mouse;
• Keyboard shortcut "Alt + s" behaves as clicking on "Set Current" button with mouse;
• Keyboard shortcut "Alt + n" behaves as clicking on " ew" button with mouse;
• Keyboard shortcut "Alt + r" behaves as clicking on "Remove" button with mouse;
• Keyboard shortcut "Alt + v" behaves as clicking on "Save" button with mouse;
• Keyboard shortcut "Alt + c" behaves as clicking on "Close" button with mouse.
ote: Since EtO list files are XML-based, they contain simple text characters with
specific tags to identify information. This allows user/operator to possibly modify
files by itself, whenever needed. Anyway, list files not strictly fulfilling XML EtO
grammars and structure cannot be considered correct and used by EtO list
management. Such manual modification is strongly discouraged.
Suggested usage sequence for EtO interface and E list is:
1. Fill EtO main view "IP Address" field with E IP address;
2. Start supervision by clicking "Ok" button;
DRAFT

...................................................................................................................................................................................................................................
8-20 3DB 75003 CAAA
Issue 1 September 2009
NETO (NETWORK ELEMENT OVERVIEW) NE list management

DRAFT
...................................................................................................................................................................................................................................

3. Open the Es table (any method, through " ew" or "Open" button) ;
4. Click on "Get Current";
5. Save the list and close the list window.
This will produce a clean and up-to-date Es table list. E table lists won't never be
updated if user will modify, say, E site name, site location or even IP address. Such data
are used for references purposes but user must take care to keep them updated.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 8-21
Issue 1 September 2009
DRAFT DRAFT
DRAFT
9 9400AWY WEBEML

Overview
Purpose
This chapter describes in detail the organization and the functions of the WebEML (Craft
Terminal).

Comparison with the 1320CT of the:


• 9400AWY R.2.0 V2.0.6 CD-ROM,
• and of the 9400AWY R.2.1 V2.1.2 CD-ROM
The WebEML functions are embedded in EtO, and replace the equivalent functionalities
embedded in 1320CT.
The Quick Configuration icon is no longer present in the Main tool bar
The Quick Configuration command is no longer present in the Configuration menu.
Therefore, the Quick Configuration procedure must be launched by the Provisioning tool,
described in Chapter 5, “PROVISIO I G TOOL”

Contents

How to open the 9400AWY E WebEML main view 9-2


9400AWY main view organization 9-3
View Area 9-5
Main tool bar 9-9
Severity alarm synthesis, and Domain alarm synthesis 9-11
Management state control panel 9-12
Access state (allow or inhibit E Craft Terminal access) 9-13
Introduction to the CT menu commands 9-14
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-1
Issue 1 September 2009
9400AWY WEBEML How to open the 9400AWY NE WebEML main view
DRAFT
...................................................................................................................................................................................................................................

How to open the 9400AWY NE WebEML main view


The 9400AWY main view screen (example in Figure 9-1, “9400AWY Main view
organization (example)” (p. 9-4)) can be opened for a E supervised by EtO in one of
the following ways:
• clicking the Show button in its EtO screen (see “Command Buttons” (p. 8-17))
• or, with its AM (Alarm Monitor) screen already open, through the avigate from AM
to USM function (see “ avigate from AM to USM” (p. 10-19)).
The login screen opens, where user is asked to provide his/her User ame and Password
(for details, see point 1) :

After having filled the fields "User ame" and "Password", followed by the "Apply"
button clicking, if login successful:
• loading of JUSM is performed, with all data regarding the E configuration and those
related to the security customization (security customization is described in “Security
by operator profile” (p. 9-15)) :

• and the 9400AWY main view screen appears (example in Figure 9-1, “9400AWY
Main view organization (example)” (p. 9-4)).
DRAFT

...................................................................................................................................................................................................................................
9-2 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML 9400AWY main view organization

DRAFT
...................................................................................................................................................................................................................................

9400AWY main view organization


The 9400AWY main view (Figure 9-1, “9400AWY Main view organization (example)”
(p. 9-4) is an example for 9400AWY R.2.1 in "1+1" configuration) is opened as described
in “How to open the 9400AWY E WebEML main view” (p. 9-2), and contains the
following fields, which provide the operator with the information needed to manage the
E:

Area Meaning
View title according to screen
View area see “View Area” (p. 9-5)
Main tool bar see “Main tool bar” (p. 9-9)
Severity alarm synthesis, and Domain alarm see “Severity alarm synthesis, and Domain
synthesis alarm synthesis” (p. 9-11)
see “Management state control panel”
Management state control panel
(p. 9-12)
see “Introduction to the CT menu commands”
Menu bar
(p. 9-14)

The Menu bar , Main Tool bar and the View area contained in the same E view permit
to perform all configuration and supervision operations and the display of the specific
selected item.
( **Comment: EXT FIGURE CHA GED **)

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-3
Issue 1 September 2009
9400AWY WEBEML 9400AWY main view organization
DRAFT
...................................................................................................................................................................................................................................

Figure 9-1 9400AWY Main view organization (example)


DRAFT

...................................................................................................................................................................................................................................
9-4 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML View Area

DRAFT
...................................................................................................................................................................................................................................

View Area
( **Comment: EXT FIGURE CHA GED **)

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-5
Issue 1 September 2009
9400AWY WEBEML View Area
DRAFT
...................................................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
9-6 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML View Area

DRAFT
...................................................................................................................................................................................................................................

The View Area manages all domains from which the user can start. It is organized into
tabbed panel, e.g. many windows placed one upon another. Each window is selectable
(placing it on top of the others) with a tab shown on the top.
Each panel represents a set of functions. The area consist of the following sets:
• Equipment
• External Points
• Line Interface
• Performance
ote for AWY V2.1.4: in AWY V2.1.4 environment, this panel is not present; in
AWY V2.1.4 environment, the Performance Monitoring tool is run by the specific
shortcut icon in the “Main tool bar” (p. 9-9).
• Radio
• Protection Schemes (in 1+1 configuration only)
• Loopback
Each tab panel is labeled with the set name (e.g. Equipment, Line Interface, etc.).
Each tab-panel (e.g. functionalities area) consists of four areas:
• Resource-Tree Area: displays all the available resources of the Radio E.
• Resource-List Area: it may be represented by: Tabular View (e.g., Line Interface
Domain) or Graphical View (e.g., Equipment Domain).
– Tabular View: displays a tabular representation of the selected resource. As
default, no tabular element is shown.
– Graphical View: displays a graphical representation of the selected resource. As
default, no tabular element is shown.
• Resource-Detail Area: displays detailed information of a selected item in the
Resource List area. As a default, no entry view is displayed as a consequence of the
default behavior of the Resource List area.

Resource Tree Area and Selection Criteria


The "Resource Area" displays all the available resources in a tree structure like the
protocol stack hierarchy.
Each tree node consists of two symbols. The first symbol indicates the state of the
structure e.g., if the symbol is "+" the tree can be expanded to a lower level. The tree
structure can be collapsed if the symbol is "-". Finally, if there is no symbol, the node
represents a leaf. The second symbol is the graphical representation of the resource.
The user must select the resource by clicking with the mouse to carry out an action that
depends on the type of click.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-7
Issue 1 September 2009
9400AWY WEBEML View Area
DRAFT
...................................................................................................................................................................................................................................

Each resource listed above may be selected by using the mouse by a single or double left
click:
• Single left click
By a single left click the resource is highlighted. This selection causes the activation
of the resource list area, e.g., every time the user selects a resource in the resource tree
area the corresponding Tabular or Graphical representation is displayed in the
"Resource list area" .
• Double left click
Using this type of selection on the items of the resource tree, the user can expand the
tree structure and activate the "Resource list area" displaying the same information
described above. When the tree node is expanded a double click will collapse the tree
node showing the same information in the "Resource list area".

Resource Detail Area


This area displays the detailed information of the selected object in the Resource list area.
It also provides the types of operations available.
DRAFT

...................................................................................................................................................................................................................................
9-8 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Main tool bar

DRAFT
...................................................................................................................................................................................................................................

Main tool bar


Besides navigation buttons, it contains some shortcut icons for specific views (they are
accessible also through the Menu Bar).
( **Comment: EXT FIGURE CHA GED **)

Figure 9-2 Main tool bar

The buttons previous screen and next screen are enabled according to the context.
Shortcuts available are:
• for AWY V2.0.6, V2.1.2, V2.1.3, and V2.1.4:
– Summary Block Diagram view: shortcut to menu command:
Diagnosis ⇒ Summary Block Diagram View
– Current Configuration view: shortcut to menu command:
Diagnosis ⇒ Current Configuration view
• for AWY V2.1.3, and V2.1.4 only, and only with Enhanced Data plug–in configured:
– VLAN configuration: shortcut to menu command:
Configuration ⇒ Network configuration ⇒ VLAN configuration
– Ethernet Port PM configuration: shortcut to menu command:
Diagnosis ⇒ Ethernet Port Counters Monitoring
• for AWY V2.1.4 only:
– Performance Monitoring: shortcut to the Performance Monitoring Tool.
ote: the Performance Monitoring Tool for AWY V2.1.4 is different from that
available for the previous versions.
In AWY V2.1.4 environment, this shortcut replaces the entry Performance in the
“Views menu” (p. 9-22).
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-9
Issue 1 September 2009
9400AWY WEBEML Main tool bar
DRAFT
...................................................................................................................................................................................................................................

For usage description, make reference to the help on-line and / or to the specific
AWY V2.1.4 User Manual.
DRAFT

...................................................................................................................................................................................................................................
9-10 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Severity alarm synthesis, and Domain alarm synthesis

DRAFT
...................................................................................................................................................................................................................................

Severity alarm synthesis, and Domain alarm synthesis

These areas contain the list of alarms listed by severity, and accompanied by the number
of alarms affecting the specific type:

Synthesis of alarms that needs immediate


CRI Critical alarm
troubleshooting (typical: E isolation)
Synthesis of alarms that needs immediate
MAJ Major (Urgent) alarm
troubleshooting
Minor ( ot urgent) Synthesis of alarms for which a deferred intervention
MI
alarm can be decided
Synthesis of alarms due to failure of other E in the
W G Warning alarm
network
Synthesis of alarms not associated with the previous
I D Indeterminate alarm
severities. ot operative.
External Point
Synthesis of the relevant station alarm incoming as input
EXT (Housekeeping housekeeping signals
alarm)
EQP Equipment alarm Synthesis of alarms of the Equipment domain
TRS Transmission alarm Synthesis of alarms of the Transmission domain

For detailed information and related maintenance procedures, refer to the specific " E
User Manual" , more precisely:
• section MAI TE A CE A D UPGRADE
– chapter Second Level Maintenance
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-11
Issue 1 September 2009
9400AWY WEBEML Management state control panel
DRAFT
...................................................................................................................................................................................................................................

Management state control panel

• GREE LED: Indicates that the Craft


LAC (Local Access Terminal has the OS permission to
Control) manage the E (granted).
• CYA LED: Indicates that the Craft
( ote)
Terminal has not the OS permission to
manage the E (denied).

• GREE LED: Identifies the " Enable "


operational state of the connection
between E and Craft Terminal ( SDH
E reachable / service link up ).
unreachable • RED LED: Identified the " Disable "
operational state of the connection
between E and Craft Terminal ( service
link down ).

• GREE LED: E is under supervision.


Supervision state • BROW LED: E is not under
supervision. Used in the OS.

• GREE LED: Indicates that the E is not


Operation System managed by the 1353 M/SH.
( ote) • RED LED: Indicates that the E is
managed by the 1353 M/SH.

• GREE LED: TP protocol enabled and


both TP servers ( Main and Spare ) are
unreachable.
etwork Time
Protocol • BROW LED: TP protocol disabled.
• CYA LED: TP protocol enabled and at
least one TP servers ( Main or Spare )
are reachable.

• GREE LED: ormal operating


condition.
Abnormal Condition • CYA LED: Detection of an AB ORMAL
operative condition. E.g. protection switch
forcing.

ote: The E can be managed by the OS or by the Craft Terminal.


To control the competition of the OS and the CT, a Local Access Control (LAC) is
available, as described in “Access state (allow or inhibit E Craft Terminal access)”
(p. 9-13)
DRAFT

...................................................................................................................................................................................................................................
9-12 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Access state (allow or inhibit NE Craft Terminal access)

DRAFT
...................................................................................................................................................................................................................................

Access state (allow or inhibit NE Craft Terminal access)


The E can be managed by the OS or by the Craft Terminal. To control the competition
of the OS and the CT, a Local Access Control (LAC) is available:
• if the LAC is "access denied", it means that the OS manages the E, and the CT is not
allowed to modify the E configuration (it can only "read" ). In the view, the icon
with a key symbol has a circular shape.
• if the LAC is "granted", it means that the CT is allowed to manage the E. In the
view, the icon with a key symbol has a rectangular shape.
• if the LAC is "requested", it means that the CT has requested a permission from the
OS and is waiting for a reply.
However, the OS does continue to provide a certain number of services. These services
include:
• Alarm reception and processing,
• Performance processing,
• Switching back to the OS access state.
The access state of an E can be modified in two ways:
• “Switching from the OS to the Craft Terminal access state” (p. 9-13)
• “Switching from the Craft Terminal access state back to the OS access state” (p. 9-13)
Switching from the OS to the Craft Terminal access state
By WebEML, perform Supervision ⇒ Access State ⇒ Requested ( see “Supervision
menu” (p. 9-31) ).
From the confirmation dialogue box that opens, you can confirm or cancel the ”Craft
access” operation using the Yes or o push-button. The request is sent up to the OS which
accepts or refuses it.
If the OS doesn’t answer in a predefined time, it is assumed that the E is in the Craft
access state and can be managed by a Craft Terminal.
Switching from the Craft Terminal access state back to the OS access state
By WebEML, perform Supervision ⇒ Access State ⇒ OS ( see “Supervision menu”
(p. 9-31) ).
From the confirmation dialogue box that opens, you can confirm or cancel the ”OS
access” operation.
The E is now managed by the OS.
ote: The key symbol icon on the management states of the E view ( see
“Management state control panel” (p. 9-12) ) indicates whether the E is managed by
a craft terminal or by the OS.
ote: Local Craft Terminal access is denied on recovery phase after a loss of
communication of the E. When the communication with the E is lost, the OS
automatically recovers the communication and forces the state existing before the loss
DRAFT

of communication (therefore, Craft Terminal access can be denied or granted).


...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-13
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands
DRAFT
...................................................................................................................................................................................................................................

Introduction to the CT menu commands


Summary of matters described

Subject
“Security by operator profile” (p. 9-15)
“Menu organization” (p. 9-19)
“Command button policy” (p. 9-20)
“Help menu” (p. 9-21)
“Views menu” (p. 9-22)
“Configuration menu” (p. 9-28)
“Diagnosis menu” (p. 9-29)
“Supervision menu” (p. 9-31)
“SW download menu” (p. 9-32)
DRAFT

...................................................................................................................................................................................................................................
9-14 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands

DRAFT
...................................................................................................................................................................................................................................

Security by operator profile


Refer to “Security by operator profile” (p. 3-17) for an introduction.
The commands present in the menu bar can be enabled (with black text) or disabled (with
greyed text), as depicted in following example:

In fact, the operations allowed by the Craft Terminal depend on the combination of the
following security parameters:
• the type of command to be forwarded,
• the login profile associated to the User ame and Password employed: Administrator,
or Constructor, or Operator, or CraftPerson, or Viewer (see “Security by operator
profile” (p. 3-17)),
• the CT physical access characterization: LCT (Local Craft Terminal) or RCT (Remote
Craft Terminal). The LCT or RCT characterization for the CT is depicted in “Types of
physical access from the PC to the E” (p. 3-2) .
In few words: only the CT connected locally to the E’s F–interface or to the E’s
Ethernet management interface has the functionalities of LCT, for that E only, but
not for other Es that can be reached through it.
• and the current LAC status, granted or denied: see “Access state (allow or inhibit E
Craft Terminal access)” (p. 9-13).
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-15
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands
DRAFT
...................................................................................................................................................................................................................................

ote: In few words, all commands are enabled only when:


• the physical access is by LCT,
• the login profile associated to the used User ame and Password is
Administrator,
• the current LAC status is granted.
To know the security parameters defined above, perform following operations:
1. In the menu bar, perform Help ⇒ Tutorial (see “Help menu” (p. 9-21))
In the help screen that opens, click NE Management , then scroll the help page until
you find "ME U CO FIGURATIO ", then click on Profile Management :

2. then, click on Appendix: Craft Terminal Access Control :


DRAFT

...................................................................................................................................................................................................................................
9-16 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands

DRAFT
...................................................................................................................................................................................................................................

3. The relevant description screen opens as in following example, where the security
parameters are described by 5 tables, one for each of the login profiles (Administrator,
Constructor, Operator, CraftPerson, and Viewer):

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-17
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands
DRAFT
...................................................................................................................................................................................................................................

4. The profile management is performed through the CT commands Supervision ⇒


Profiles management (see “Supervision menu” (p. 9-31))
DRAFT

...................................................................................................................................................................................................................................
9-18 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands

DRAFT
...................................................................................................................................................................................................................................

Menu organization
The menu bar allows to perform configuration and supervision functions on the etwork
Element.
This paragraph lists all menu options and then provides more details on the respective
contained entries.
For each of them the relevant operative function are briefly introduced and it is referred
the paragraphs where they are detailed or the introduction to the options of each menu
inserted in next paragraphs of this chapter.
In the menu bar, a number of permanent menu items are always displayed. Starting from
the left, the menus are:

• Permanent Menus
– Views (first column). See “Views menu” (p. 9-22)
To navigate among the views and to set the TM parameters.
– Configuration (second column). See “Configuration menu” (p. 9-28)
To set the general configuration of the E and to show or modify some
parameters (performance monitoring, Overhead parameters).
– Diagnosis (third column). See “Diagnosis menu” (p. 9-29)
To get information on the E (alarms, performance monitoring, remote
inventory).
– Supervision (fourth column). See “Supervision menu” (p. 9-31)
To set the supervision states of the E, to restart the E, to manage its MIB, and
to show information regarding the equipped Flash Card.
– SW Download (fifth column). See “SW download menu” (p. 9-32)
To manage the E software (download, MIB management).
– Help (last column). See “Help menu” (p. 9-21)
To activate the help on line.
The menu bar also comprises other menus, presented only when a specific option is
selected.
• Other Menus
– Equipment
This menu is present only when the Equipment menu (selected in the View menu
or in the Equipment tab panel) is active. It allows to go back to the supporting
equipment of the displayed object.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-19
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands
DRAFT
...................................................................................................................................................................................................................................

Command button policy


In all command windows, the possible buttons for commands are the following:

- Apply this button activates the "modify", but it does not close the window.
- Cancel this button closes the window without modifying the parameters
displayed in the window.
- OK this button activates the modify and closes the window
- Close this button closes the window
- Help this button provides the help management for the functions of the
supporting window.

Critical configuration choices generate a warning message for user confirmation before to
be activated.
DRAFT

...................................................................................................................................................................................................................................
9-20 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands

DRAFT
...................................................................................................................................................................................................................................

Help menu
This menu presents the following entries:

• On Help: this menu entry will show the complete online help available
• On Context: selecting this entry will present a context help with respect to selected
window area
• Glossary: this command will show a list of acronyms and abbreviations that can be
useful to explain used terms
• Tutorial: the "Tutorial" menu entry shows a user guide for the JUSM application.
This one, and all the entries above, is shown ad HTML pages in the default Internet
browser.
• About: selecting "About" item, a window will be displayed with the release
information of JUSM application and its components, as in following example:

An example showing the use of the "Tutorial" menu is given in points 1 to 3 of “Security
by operator profile” (p. 9-15)
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-21
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands
DRAFT
...................................................................................................................................................................................................................................

Views menu
The menu on the left side of the screen, allows to navigate among the views, to set some
parameters, and to perform tests, by means of the following entries:

- Previous: Goes back to the previous screen of the application.


- Open Object: ot active.
- Open in New Window: ot active.
- Duplicate View in ot active.
NewWindow:
- Equipment: Opens the Equipment view. See following point 1
- External Points: Displays and sets the input/output environmental alarm.
See following point 2
- Line Interface: Opens the Line Interface view to configure all the
tributary ports. See following point 3
- Performance: Allows to manage the Performance monitoring. See
following point 4
- Radio: Allows to manage all the functions relevant to the radio
channels. See following point 5
- Protection Schemes: Allows to manage the Protection schemes in 1+1
configuration. See following point 6
- Loopback: Allows to manage the loopbacks available with the
equipment. See following point 7
DRAFT

...................................................................................................................................................................................................................................
9-22 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands

DRAFT
...................................................................................................................................................................................................................................

ote: it is possible to enter directly any menu Equipment, External Points, Line Interface,
Performance, Radio, Protection Schemes, or Loopback, clicking the view area on the
relevant tab panel.
1. Equipment view
The Equipment view deals with the management of the E as a whole, as well as for
its physical components (subrack, boards…). Its first screen (example) is as in Figure
9-1, “9400AWY Main view organization (example)” (p. 9-4).
For usage description, please refer to the Help on-line (see “Help menu” (p. 9-21))
To get SWP–specific hardware or software related information you may not find in
the help online, you can make also reference to the specific “ E User Manual” , more
precisely:
• section E MA AGEME T BY SOFTWARE APPLICATIO S
– chapter Equipment
ote for AWY V2.0.6 and V2.1.2: the navigation in this view is exactly as that
present in the 1320CT, described in the relevant “ E User Manual”.
2. External Points
The External Point view (see Figure 9-3, “Views menu: example of “External Points”
view” (p. 9-25)) allows to manage the input and output external points
(housekeeping).
For usage description, please refer to the Help on-line (see “Help menu” (p. 9-21)).
To get SWP–specific hardware or software related information you may not find in
the help online, you can make also reference to the specific “ E User Manual” , more
precisely:
• section E MA AGEME T BY SOFTWARE APPLICATIO S
– chapter External Points
ote for AWY V2.0.6 and V2.1.2: the navigation in this view is exactly as that
present in the 1320CT, described in the relevant “ E User Manual”.
3. Line Interface
The Line Interface view (see Figure 9-4, “Views menu: example of “Line Interface”
view” (p. 9-25)) deals with the management of the aggregate frame and tributary ports
(line side).
The Line Interface menu allows the user to manage the resources of the line
interfaces: PDH tributary, MS channel and Ethernet port, if has been configured.
For usage description, please refer to the Help on-line ( see “Help menu” (p. 9-21))
To get SWP–specific hardware or software related information you may not find in
the help online, you can make also reference to the specific “ E User Manual” , more
precisely:
• section E MA AGEME T BY SOFTWARE APPLICATIO S
– chapter Line Interface
ote for AWY V2.0.6 and V2.1.2: the navigation in this view is exactly as that
present in the 1320CT, described in the relevant “ E User Manual”.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-23
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands
DRAFT
...................................................................................................................................................................................................................................

4. Performance
ote for AWY V2.1.4: in AWY V2.1.4 environment, this choice is not present; in
AWY V2.1.4 environment, the Performance Monitoring tool is run by the specific
shortcut icon in the “Main tool bar” (p. 9-9).
For AWY V2.0.6, V2.1.2, and V2.1.3, the Performance view (see Figure 9-5, “Views
menu: example of “Performance” view” (p. 9-26)) allows to manage the functions to
provide the Performance Monitoring functions.
For usage description, please refer to the Help on-line ( see “Help menu” (p. 9-21))
To get SWP–specific hardware or software related information you may not find in
the help online, you can make also reference to the specific “ E User Manual” , more
precisely:
• section E MA AGEME T BY SOFTWARE APPLICATIO S
– chapter Performance Monitoring
ote for AWY V2.0.6 and V2.1.2: the navigation in this view is exactly as that
present in the 1320CT, described in the relevant “ E User Manual”.
5. Radio
The Radio domain view (see Figure 9-6, “Views menu: example of “Radio” view”
(p. 9-26)) allows the user to manage the resources of the radio transmission
channel(s).
For usage description, please refer to the Help on-line ( see “Help menu” (p. 9-21))
To get SWP–specific hardware or software related information you may not find in
the help online, you can make also reference to the specific “ E User Manual” , more
precisely:
section E MA AGEME T BY SOFTWARE APPLICATIO S

– chapter Radio
ote for AWY V2.0.6 and V2.1.2: the navigation in this view is exactly as that
present in the 1320CT, described in the relevant “ E User Manual”.
6. Protection Schemes
The Protection Schemes view (see Figure 9-7, “Views menu: example of “Protection
Schemes” view” (p. 9-26)) is present in 1+1 configurations only, and allows user to
operate on switches and parameters associated to the protection schemes employed in
the system.
For usage description, please refer to the Help on-line ( see “Help menu” (p. 9-21))
To get SWP–specific hardware or software related information you may not find in
the help online, you can make also reference to the specific “ E User Manual” , more
precisely:
• section E MA AGEME T BY SOFTWARE APPLICATIO S
– chapter Protection Schemes
ote for AWY V2.0.6 and V2.1.2: the navigation in this view is exactly as that
present in the 1320CT, described in the relevant “ E User Manual”.
7. Loopback
The Loopback view (see Figure 9-8, “Views menu: example of “Loopback” view”
(p. 9-27)) allows user to perform the test operations by loopbacks.
For usage description, please refer to the Help on-line ( see “Help menu” (p. 9-21))
DRAFT

...................................................................................................................................................................................................................................
9-24 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands

DRAFT
...................................................................................................................................................................................................................................

To get SWP–specific hardware or software related information you may not find in
the help online, you can make also reference to the specific “ E User Manual” , more
precisely:
• section E MA AGEME T BY SOFTWARE APPLICATIO S
– chapter Loopbacks
ote for AWY V2.0.6 and V2.1.2: the navigation in this view is exactly as that
present in the 1320CT, described in the relevant “ E User Manual”.

Figure 9-3 Views menu: example of “External Points” view

Figure 9-4 Views menu: example of “Line Interface” view

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-25
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands
DRAFT
...................................................................................................................................................................................................................................

Figure 9-5 Views menu: example of “Performance” view

Figure 9-6 Views menu: example of “Radio” view

Figure 9-7 Views menu: example of “Protection Schemes” view


DRAFT

...................................................................................................................................................................................................................................
9-26 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands

DRAFT
...................................................................................................................................................................................................................................

Figure 9-8 Views menu: example of “Loopback” view

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-27
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands
DRAFT
...................................................................................................................................................................................................................................

Configuration menu
This menu allows to set the general configuration of the E and to show or modify some
parameters, by means of the following entries and sub-entries:

- NE Time: Displays and sets the E local time (*)


- Network Allows to manage the E network configuration (*)
configuration: ote: the submenu Vlan Configuration is available only
in the following conditions:
• AWY V2.1.3 and V2.1.4 only
• with Enhanced Data plug–in configured
- Alarm Severities: Manages the Alarm Severity Assignment Profile (*)
- System setting: Allows the system configuration, providing the setting of
all the parameters for the E setup (*)
- Profiles management: Allows the CT user profile management.
See “Management of “security by operator profiles””
(p. 13-2)
- Log Switch: Inhibits/allows the event and alarm store in the Log
See “Log switch” (p. 10-2)

(*) For usage description, please refer to the Help on-line (see “Help menu” (p. 9-21))
To get SWP–specific hardware or software related information you may not find in the
help online, you can make also reference to the specific “ E User Manual” , more
precisely:
• section E MA AGEME T BY SOFTWARE APPLICATIO S
– chapter Configuration
ote for AWY V2.0.6 and V2.1.2: the navigation in this view is exactly as that
present in the 1320CT, described in the relevant “ E User Manual”.
DRAFT

...................................................................................................................................................................................................................................
9-28 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands

DRAFT
...................................................................................................................................................................................................................................

Diagnosis menu
This menu allows to get diagnostic information regarding the E, by means of the
following entries and sub-entries:

- Alarms ⇒ NE Alarms: Starts the Alarm Monitor (AM) application


See “Alarms Monitor” (p. 10-3)
- Log Browsing ⇒ Event Log: Manages the events stored in the E
See “Event Log Browser (ELB)” (p. 10-24)
- Log Browsing ⇒ Software ote: the use of the Software Trace Log option is
Trace Log reserved to the Alcatel–Lucent technicians for SW
debugging purposes (*)
- Remote inventory: Displays the equipment Remote inventory information
(*)
- Abnormal condition list: Displays the manual operations active in the E (*)
- Summary Block Diagram Displays a global logical view (strictly related to the
View: physical implementation) highlighting a synthesis of
all the alarms and statuses present in the system
(ODU+IDU) (*)
- Current configuration Displays the current configuration of the E (*)
View:
- Ethernet Port Counters Sets and reads the Performance Monitoring on Ethernet
Monitoring: Ports (*)
ote: the menu Ethernet Port Counters Monitoring
is available only in the following conditions:
• AWY V2.1.3 and V2.1.4 only
• with Enhanced Data plug–in configured
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-29
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands
DRAFT
...................................................................................................................................................................................................................................

(*) For usage description, please refer to the Help on-line (see “Help menu” (p. 9-21))
To get SWP–specific hardware or software related information you may not find in the
help online, you can make also reference to the specific “ E User Manual” , more
precisely:
• section E MA AGEME T BY SOFTWARE APPLICATIO S
– chapter Diagnosis
ote for AWY V2.0.6 and V2.1.2: the navigation in this view is exactly as that
present in the 1320CT, described in the relevant “ E User Manual”.
DRAFT

...................................................................................................................................................................................................................................
9-30 3DB 75003 CAAA
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands

DRAFT
...................................................................................................................................................................................................................................

Supervision menu
This menu allows to set the supervision states of the E, to restart the E, to manage its
MIB, and to show information regarding the equipped Flash Card, by means of the
following entries and sub-entries:

- Access State: Manages the supervision access to the E, via CT or OS.


See “Access state (allow or inhibit E Craft Terminal access)”
(p. 9-13)
- Restart NE: See System restart
- MIB Management: Allows to perform backup and restore operations of the E’s MIB.
See Chapter 11, “MIB MA AGEME T”
- SW key: Displays the type of Flash Card equipped in the system and the
licence information.
See “Licence information” (p. 4-4)

For additional usage description, please refer to the Help on-line (see “Help menu”
(p. 9-21))
To get SWP–specific hardware or software related information you may not find in the
help online, you can make also reference to the specific “ E User Manual” , more
precisely:
• section E MA AGEME T BY SOFTWARE APPLICATIO S
– chapter Supervision
ote for AWY V2.0.6 and V2.1.2: the navigation in this view is exactly as that
present in the 1320CT, described in the relevant “ E User Manual”.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 9-31
Issue 1 September 2009
9400AWY WEBEML Introduction to the CT menu commands
DRAFT
...................................................................................................................................................................................................................................

SW download menu
This menu allows to manage the E software instances (committed and stand-by) present
in the E's Flash Card memory banks, by means of the following entries:

- Server Access Manages the configuration of the FTP server to be used for
Configuration: the software download to the E's Flash Card
- Init SW download: Manages the software download to the E's Flash Card
- SW status: Shows and manages the status of the software packages
installed in the E's Flash Card

For usage description, please refer :


• to the Help on-line (see “Help menu” (p. 9-21))
• and/or to Chapter 12, “ E SWP UPGRADE”
DRAFT

...................................................................................................................................................................................................................................
9-32 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
10 10
ALARMS MONITOR AND
EVENT LOG BROWSER

Overview
Purpose
This chapter describes in detail the functions of Alarms Monitor and Event Log Browser
embedded in EtO application.

Comparison with the 1320CT of the:


• 9400AWY R.2.0 V2.0.6 CD-ROM,
• and of the 9400AWY R.2.1 V2.1.2 CD-ROM
The Alarms Monitor (AM) and Event Log Browser (ELB) functions are embedded in
EtO, and replaces the functionalities of both the AM and ELB applications embedded in
1320CT.

Contents

Log switch 10-2


Alarms Monitor 10-3
Event Log Browser (ELB) 10-24

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-1
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Log switch
DRAFT
...................................................................................................................................................................................................................................

Log switch
By default, the recording of:
• events in the Event Log is enabled; their browsing is obtained by the ELB
application, described in “Event Log Browser (ELB)” (p. 10-24)
• the alarm events in the Alarm Log of AM is enabled; their browsing is obtained by
the AM application, described in “Alarms Monitor” (p. 10-3)
The Log Switch screen (Figure 10-1, “Log Switch screen” (p. 10-2)) can be opened in the
E WebEML application, through the command Configuration ⇒ Log Switch.
By this screen, it is possible to verify, and inhibit (Lock) or allow (Unlock), the store of
the events and alarms respectively in the Event Log and Alarm Log (for the specific
E).

Figure 10-1 Log Switch screen


DRAFT

...................................................................................................................................................................................................................................
10-2 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor

DRAFT
...................................................................................................................................................................................................................................

Alarms Monitor
When to use
Every time you must start and use any Alarms Monitor function, and when you must
close it.

Alarms Monitor functions and related information


Alarms Monitor (AM) is the application from which the operator can have a global view
of the current alarm and also the alarm log for one or more 9400AWY Es, within the
limits (i.e. the max number of EtO instances) specified in point 2 of “ EtO sessions and
constraints” (p. 8-2).
AM application requires a supervision manager ( EtO instance) opened for each
etwork Element monitored.
The user can:
• view the alarms currently present on one or more etwork Element(s) in real time
• view the historical alarms data (raise/clear log)
• view the alarms (both current and historical) filtered by one or more properties.
• navigate from an alarm in AM to the specific interface in JUSM, and vice-versa from
an alarm selected in JUSM to the specific row in AM, to facilitate troubleshooting
• print and export data to external file.
The following matters are described in the following
• “Alarms Monitor start-up for one single E” (p. 10-4)
• “Alarms Monitor Overview” (p. 10-5)
• “Multiple E Alarms Monitor” (p. 10-10)
• “Filters menu” (p. 10-12)
• “File Menu” (p. 10-17)
• “Printing the alarms and logs” (p. 10-17)
• “Exporting the alarms and logs” (p. 10-18)
• “ avigate from AM to USM” (p. 10-19)
• “ avigate from USM to AM” (p. 10-21)
• “Shortcut icons” (p. 10-22)

Before you begin


Read “Alarms Monitor functions and related information” (p. 10-3)
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-3
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor
DRAFT
...................................................................................................................................................................................................................................

Alarms Monitor start-up for one single NE

The AM application can be launched for a supervised 9400AWY NE in the


following ways:
clicking the Alarms Monitor button in its
EtO screen (see “Command Buttons”
(p. 8-17) )
or by its WebEML application: • through the command: Diagnosis ⇒
Alarms ⇒ NE Alarms
• or through the command “ avigate from
USM to AM” (p. 10-21)
These ways are mutually exclusive (one AM instance only can be active at a time over one E
for one PC).
The AM screen opens (see Figure 10-2, “Alarms Monitor – Severity alarm synthesis and Current
Alarms” (p. 10-6)).
DRAFT

...................................................................................................................................................................................................................................
10-4 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor

DRAFT
...................................................................................................................................................................................................................................

Alarms Monitor Overview


After its launch, the AM screen opens: see Figure 10-2, “Alarms Monitor – Severity
alarm synthesis and Current Alarms” (p. 10-6) , and also the “Shortcut icons” (p. 10-22) ,
that, for simplicity, are not shown in following figures.
After its launch, the AM screen opens (see Figure 10-2, “Alarms Monitor – Severity
alarm synthesis and Current Alarms” (p. 10-6)):
...................................................................................................................................................................................................

1 At the top right, the field Synthesis shows the number of active alarms for any severity,
with the same meaning of Figure 8-6, “Supervision and Alarm Synthesis round-shaped
icons” (p. 8-13)
...................................................................................................................................................................................................

2 On the left side of the application, below each E, two global lists of alarms are
displayed:
• CURRE T_ALARM shows all the equipment alarms currently present,
• ALARM_LOG shows all the equipment alarms currently present and the history of
the alarms (i.e. cleared alarms).
ote: when an alarm is no longer active, it disappears from the CURRE T_ALARM
list, and is displayed in the ALARM_LOG list as a cleared alarm.
Each global list has some default filters (some filters for the CURRE T_ALARM list,
and other filters for the ALARM_LOG list), as follows:
• CRI contains all the alarms having a CRITICAL severity
• MAJ contains all the alarms having a MAJOR severity
• MI contains all the alarms having a MI OR severity
• WRG contains all the alarms having a WAR I G severity
• I D contains all the alarms having an I DETERMI ATE severity
• CLR contains all the alarms which are in the CLEARED state, that is, which are no
longer active (this filter is available within the list ALARM_LOG only).
For each list and for each filter, the number of active alarms is shown inside brackets.
These two lists can be filtered using customized filters provided by means of the menu
Filters ⇒ Add a Filter .. (see “Filters menu” (p. 10-12) ).
Single clicking on a filter or on a global list on the left part of the screen shows up on the
right side the relevant tab panel with all the alarms [see point Step 3 below]
...................................................................................................................................................................................................

3 On the right, the view of the alarms is displayed:


• a Tab in the internal window for each filter that the user want to see. By default
Current alarms and Alarm Log tabs are always visible
• for each view, the alarms are shown in a Table.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-5
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor
DRAFT
...................................................................................................................................................................................................................................

ote: when the application is opened for the first time, only two tabbed panes are
displayed; demonstrate respectively the global active alarms (see Figure 10-2,
“Alarms Monitor – Severity alarm synthesis and Current Alarms” (p. 10-6) ) and the
alarm log (see Figure 10-3, “Alarms Monitor – Alarm Log” (p. 10-6) ).

Figure 10-2 Alarms Monitor – Severity alarm synthesis and Current Alarms

ote: The indications in the Severity alarm synthesis field is as described in


“Supervision and Alarm Synthesis round-shaped icons” (p. 8-13)

Figure 10-3 Alarms Monitor – Alarm Log


DRAFT

...................................................................................................................................................................................................................................
10-6 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor

DRAFT
...................................................................................................................................................................................................................................

WAR I G:
• The Alarm Log Table is updated only if the corresponding Log Switch is unlocked
(see “Log switch” (p. 10-2)).
• The Alarm Log Table:
– on the E MIB, has a limited size (about 700 rows, depending on the space
available in the Flash Card). When the maximum size is reached, the first element
is cleared and the new one is overwritten on it;
– on the AM application, can display a number of rows much higher (anyway
limited to max 5000, to avoid system overload), because they are stored in the PC
environment.
From the category tree in the left, the operator can also view the alarms or logs with
specific severity. E.g. Figure 10-4, “Alarms Monitor – Shows only the major alarms”
(p. 10-7) shows only the major alarms.

Figure 10-4 Alarms Monitor – Shows only the major alarms

For each alarm row, these fields are shown:


• Time & Date: date and time of the alarm raise or clear.
The format of date and time is yyyy/mm/dd hh:mm:ss
• Probable cause: name of the probable cause of the alarm
• Alarm Type: alarm class:
– TRS = Transmission Alarm - alarm not created inside the equipment, but
generated by a connected equipment or due to transmission/propagation problems
– EQUIPMENT = alarm inside the equipment
• Friendly Name: object of the equipment where the alarm occurred.
• Severity: alarm severity:
– Critical: RED
– Mayor: ORA GE
– Minor: YELLOW
– Warning: CYA
– Indeterminate: GREY
– Cleared: GREE
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-7
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor
DRAFT
...................................................................................................................................................................................................................................

• Additional Text (if any)


• Specific problem: for some alarms, additional information is provided about the
involved resource (for instance, when a threshold alarm is raised, it states the specific
threshold exceeded).
Clicking into the column header, it is possible to sort the data by the values of the column
itself.
Selection of one or more row of a table is allowed.
Right-clicking on an alarm row opens the menu shown below. The various options are
described in the following.

Following figure shows an example where many tables are opened at the same time.

To make one table be displayed, click its header. It goes in the front, and becomes the
active table.
To close one table, click the cross symbol of its header. To open it again, click it in the
category tree on the left.
DRAFT

...................................................................................................................................................................................................................................
10-8 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor

DRAFT
...................................................................................................................................................................................................................................

E...................................................................................................................................................................................................
N D O F S T E P S

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-9
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor
DRAFT
...................................................................................................................................................................................................................................

Multiple NE Alarms Monitor


While AM is active for a E, to start AM contemporaneously on another E, open
another EtO instance for it, and perform the same operation described in “Alarms
Monitor start-up for one single E” (p. 10-4)
Take into account that only one AM instance can be running, whichever the number of
Es monitored.
When AM is active for more than one E, the AM screen shows all the monitored Es,
as depicted in following Figure 10-5, “Example of multiple E Alarms Monitor (2 Es)”
(p. 10-11) :
• on the left, a tree with the list of E and subtree with the filters active for each E is
displayed.
• on the right, the view of the alarms is displayed:
– an internal window for each E that the user can see
– a Tab in the internal window for each filter that the user want to see. By default
Current alarms and Alarm Log tabs are always visible
– for each view, the alarms are shown in a Table.
Refer to descriptions on previous pages “Alarms Monitor Overview” (p. 10-5) to
“ avigate from USM to AM” (p. 10-21) , for detailed information regarding the
monitoring of one E.
ote: see also “Shortcut icons” (p. 10-22).
DRAFT

...................................................................................................................................................................................................................................
10-10 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor

DRAFT
...................................................................................................................................................................................................................................

Figure 10-5 Example of multiple NE Alarms Monitor (2 NEs)

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-11
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor
DRAFT
...................................................................................................................................................................................................................................

Filters menu
The Menu Filters provides the following menus, described in the following:

ote: see also “Shortcut icons” (p. 10-22).


1. Add a Filter
This menu allows to create customized logs adding some new specific filters. The
windows which opens is shown in following “Figure: Alarms Monitor – Add a filter”
(p. 10-12):
Figure: Alarms Monitor – Add a filter
DRAFT

...................................................................................................................................................................................................................................
10-12 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor

DRAFT
...................................................................................................................................................................................................................................

A filter can be created selecting one of the following fields (or more). To save the
created filter click on the Done push-button. (Clicking on the Cancel push-button
clears the filter configuration). The created filter appears on the left side of the
application.
• Filter Name field
Enter the filter name in the Filter ame field.
• Scope field
Select CURRENT to create a filter showing the current alarms only, or select LOG
to create a filter for current and cleared alarms.
The filter can be applied to all the Es by selecting All or it can be applied to one
or more Es by selecting one or more Es using the mouse.
• Alarm Type field
Select Alarm Type to create a filter for the selected type of alarm:
- TRS = Transmission Alarm
- EQUIPMENT = Equipment alarm
• Perceived severity field
Select Perceived severity and then one or more severity levels and/or Cleared state
to filter the alarm having the selected severity levels.
• Event Time field
Select Event Time and then enter the starting date (From) and the ending date (To)
to filter the alarms created during that specific time frame only.
• Probable Cause field
Select Probable Cause and then choose a specific alarm (one or more) to filter
these particular alarms only.
2. Delete Filters ...
When this menu is selected, the window shown below (“Figure: Alarms Monitor –
Delete Filters…” (p. 10-13)) opens (example):
Figure: Alarms Monitor – Delete Filters…

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-13
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor
DRAFT
...................................................................................................................................................................................................................................

• By means of this menu, the filters previously created can be canceled. To do that,
select one specific E (or more Es) in the Scope column, select a specific filter
(or more filters) in the Filters column and then click on the Done push-button.
• ote: default filters cannot be canceled
• Clicking on the Cancel push-button all the selections are cleared.
3. Delete Selected Filter
Default filters cannot be deleted. Selecting a customized filter and selecting Filters
⇒ Delete Selected Filter, the filter is deleted, after having confirmed the
following question:

4. Edit Selected Filter


Default filters cannot be edited. Selecting a customized filter and selecting Filters ⇒
Edit Selected Filter, the same screen of “Figure: Alarms Monitor – Add a filter”
(p. 10-12) opens, where you can make your changes, then click Done push-button to
confirm them.
5. Save Filters As ...
When this menu is selected, the following window “Figure: Alarms Monitor – Save
Filters As…” (p. 10-14) opens (example):
Figure: Alarms Monitor – Save Filters As…
DRAFT

...................................................................................................................................................................................................................................
10-14 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor

DRAFT
...................................................................................................................................................................................................................................

A default filter, or a filter previously created by means of the "Add a filter" menu,

can be saved to be used for some other Craft Terminals. To do that, select in the
Scope and Filters columns a specific filter to be saved, enter the filter name in
the Name field, select the Folder where to save the file relevant to filter and then
click on the Done push-button.
• Clicking on the Cancel push-button all the selections are cleared.
6. Load Filters From ...
When this menu is selected, the window shown below “Figure: Alarms Monitor –
Load Filters From …” (p. 10-15) opens (example):
Figure: Alarms Monitor – Load Filters From …

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-15
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor
DRAFT
...................................................................................................................................................................................................................................

• A filter previously saved on another Craft Terminal can be loaded on your Craft
Terminal by this menu. To do that, click on Browse to navigate and then choose
the filter file to be loaded. The Scope and the Loaded Filters columns will show
respectively the E list and the filters list made available by the selected file.
• Entering some characters in the Filters Prefix field and then clicking on the
Done push-button, the inserted characters are attached before the names of the
Loaded Filters. For instance entering <Vim>, the names of the filters change from
APT to VimAPT.
DRAFT

...................................................................................................................................................................................................................................
10-16 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor

DRAFT
...................................................................................................................................................................................................................................

File Menu
The "File" menu allows to Save or Load the AM History:

1. Save History for selected NE


This menu allows to save a file with one of the two global lists of each E. Select the
global list of a specific E, open the Save History menu for the selected E, and
enter filename and relevant directory in the opening window.
2. Load History for selected NE
By means of this menu it is possible to display the global list of a certain E
previously saved.

Printing the alarms and logs


As shown below, in AM screen (with mouse's right button), select "Print current view" to
launch the print, then specify the printer.
ote: see also “Shortcut icons” (p. 10-22).

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-17
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor
DRAFT
...................................................................................................................................................................................................................................

Exporting the alarms and logs


As shown in Figure 10-6, “Exporting the alarms and logs” (p. 10-18), in AM screen (with
mouse's right button), at first "Select All" to select all shown alarms, then "Export
Alarms" (in CSV, HTML, XML, or PDF format), and specify where to save the file; at
last "Select one" to deselect all alarms previously selected.
ote: The CSV method defines a model to memorize the data of a table using comma
character. The fields of a single row are separated by one symbol "," and the rows of a
table are separated by the EWLI E character.
ote: see also “Shortcut icons” (p. 10-22).

Figure 10-6 Exporting the alarms and logs


DRAFT

...................................................................................................................................................................................................................................
10-18 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor

DRAFT
...................................................................................................................................................................................................................................

Navigate from AM to USM


The AM program gives to the user the possibility to navigate from AM to JUSM (and
vice-versa).
When a user selects an alarm in AM screen, he/she can request to show the object, on
which the alarm was raised, in JUSM, as in example of Figure 10-7, “ avigate from AM
to USM” (p. 10-20)
ote: see also “Shortcut icons” (p. 10-22).
ote: If not active, JUSM is automatically started (the login prompt is displayed, with
User ame and Password to be entered).

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-19
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor
DRAFT
...................................................................................................................................................................................................................................

Figure 10-7 Navigate from AM to USM


DRAFT

...................................................................................................................................................................................................................................
10-20 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor

DRAFT
...................................................................................................................................................................................................................................

Navigate from USM to AM


This operation is complementary to the " avigate from AM to USM" described before.
When a user selects an alarm in JUSM screen, he/she can request to show the same alarm
in the AM screen, as in example of Figure 10-8, “ avigate from USM to AM” (p. 10-21)
ote: If not active, AM is automatically started.

Figure 10-8 Navigate from USM to AM

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-21
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor
DRAFT
...................................................................................................................................................................................................................................

Shortcut icons
The following shortcut icons, for simplicity not shown in previous figures, are available:

Legend:
• A and B: these functions are particularly useful during the “Multiple E Alarms
Monitor” (p. 10-10): A arranges windows vertically, while B arranges windows
boxed, as in following examples:
DRAFT

• C maximizes Windows
...................................................................................................................................................................................................................................
10-22 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Alarms Monitor

DRAFT
...................................................................................................................................................................................................................................

• D exits from the AM application


• E expands all tree nodes
• F collapses all tree nodes
• G removes the selected E from the AM application
• H, I, and J are related to the filter management (“Filters menu” (p. 10-12)); H adds a
new filter, I deletes the selected filter, and J edits the selected filter.
• K and L are related to the management of the rows in the active table; K selects all
rows, while J deselects all rows.
• M allows to “ avigate from AM to USM” (p. 10-19).
• , O, P and Q are related to “Exporting the alarms and logs” (p. 10-18) functions;
their export format is clearly shown by the icon.
• R acts as the Print Current View available on all screens.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-23
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Event Log Browser (ELB)
DRAFT
...................................................................................................................................................................................................................................

Event Log Browser (ELB)


ELB scope
An event is meant to be:
• a configuration change
• a change of the value of an attribute
• an automatic switchover
• a manual operation carried out by the operator.
ELB is a tool that shows the list of events generated on E at a specific moment. The
main functionalities offered are:
• list of events and main information (time, type, etc.)
• print them
• export a summary view of events lists to an HTML file, or to a CSV (Comma
Separated View) file.

ELB start-up
The ELB application can be launched on a logged-in 9400AWY E through the
WebEML command: Diagnosis ⇒ Log Browsing ⇒ Event Log
If the E does not respond at the get request or responds with an ACCESS DE IED
message, the application communicates the problem to the user and does not refresh the
tables containing alarms and event. A special indicator shows to the user that the
application is "offline" until a new user request for tables refresh succeeds.
After refresh completion, the Event Log Table screen opens.

WAR I G: The Event Log Table is updated only if the corresponding “Log switch”
(p. 10-2) is unlocked.

Event Log Table screen


See Figure 10-9, “Event Log Table screen” (p. 10-25): at first command execution, or by
the user command Refresh, the application retrieves the data about the events presents on
E in that moment.
DRAFT

...................................................................................................................................................................................................................................
10-24 3DB 75003 CAAA
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Event Log Browser (ELB)

DRAFT
...................................................................................................................................................................................................................................

Figure 10-9 Event Log Table screen

1. Row contents
The events are shown as rows in a table. For each event, the following field are
shown:
• Time: date and time of occurrence of the event. The format is week
day/month/day hh:mm:ss. Reference Time (CEST) year.
• Notification ID: a unique identifier for the event.
• Explanation: a statement built with the event log data to explain what the event
represents.
2. Sorting rows
Clicking on column's headers, events can be ordered by the fields values.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 10-25
Issue 1 September 2009
ALARMS MONITOR AND EVENT LOG BROWSER Event Log Browser (ELB)
DRAFT
...................................................................................................................................................................................................................................

3. Selecting rows
Clicking on rows, the events (one ore more) can be selected. This selection can be
used in the Figure 10-10, “Export events screen” (p. 10-26).
Clicking the Clear Selection push-button in the Figure 10-9, “Event Log Table
screen” (p. 10-25), all rows are deselected.
4. Printing events
Clicking the Printer symbol in the Figure 10-9, “Event Log Table screen” (p. 10-25),
all events are printed, independently from the selection you may have done (point 3
above).
5. Export events to an external file
The application allows to export the content of the events table in the following ways:
• In an HTML table
• In CSV formatted text
The CSV method defines a model to memorize the data of a table using comma
character. The fields of a single row are separated by one symbol "," and the rows
of a table are separated by the EWLI E character.
• as PDF document
• in XML format
In all cases, you can choose to export "All entries" or the "Selection" you may have
done (point 3 above).

Figure 10-10 Export events screen

After having made the selection, and clicked OK push-button, a "save" screen is opened,
asking where save must be done.
DRAFT

...................................................................................................................................................................................................................................
10-26 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
11 MIB MANAGEMENT
11

Overview
Purpose
This chapter describes how to perform the E MIB back-up and restore operations,
introduced in the “Procedures for the management of the E software” (p. 4-6)

Comparison with the 1320CT of the:


• 9400AWY R.2.0 V2.0.6 CD-ROM,
• and of the 9400AWY R.2.1 V2.1.2 CD-ROM
with the SWP TCO SUITE Rel.1.8, the E MIB back-up and restore operations (functions
of EtO) are much simpler

Contents

Craft Terminal commands for the management of MIB back-up files 11-2
Default repository folders of MIB back-up files 11-3
How to perform the MIB back-up 11-4
How to perform the MIB restore 11-7
How to remove a MIB back-up file from the repository folder 11-10 DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 11-1
Issue 1 September 2009
MIB MANAGEMENT Craft Terminal commands for the management of MIB
DRAFT
back-up files
...................................................................................................................................................................................................................................

Craft Terminal commands for the management of MIB back-up


files
Commands available

Their use is as follows:


• Backup used in “How to perform the MIB back-up” (p. 11-4)
• Restore and Activate used in “How to perform the MIB restore” (p. 11-7)
• Remove file used in “How to remove a MIB back-up file from the repository folder”
(p. 11-10)
DRAFT

...................................................................................................................................................................................................................................
11-2 3DB 75003 CAAA
Issue 1 September 2009
MIB MANAGEMENT Default repository folders of MIB back-up files

DRAFT
...................................................................................................................................................................................................................................

Default repository folders of MIB back-up files


There is one default repository folder of MIB back-up files for all Es having the same
SWP-release.
The folder name is "backup", and is under the path where you have performed the Local
copy of WebEML (Jusm/CT): see Step 1 and Step 7 of “Operations sequence for the
preparation of the Craft Terminal” (p. 14-2).
This folder is automatically selected when you perform any of the commands listed in
“Craft Terminal commands for the management of MIB back-up files” (p. 11-2)
The example below shows two MIB back-up files present in the "backup" folder for
9400AWY V2.1.2.
( **Comment: EXT FIGURE CHA GED **)

Figure 11-1 Default repository folders of MIB back-up files

WAR I G: the file name contains always the version as prefix (”V020102_” in the
example above, corresponding to version V2.1.2).
This prefix is inserted automatically by the SW, when the MIB back–up file is created
(see “How to perform the MIB back-up” (p. 11-4)), and is used automatically by the SW,
when the MIB restore must be performed (see “How to perform the MIB restore”
(p. 11-7)).
Therefore, this prefix must never be changed.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 11-3
Issue 1 September 2009
MIB MANAGEMENT How to perform the MIB back-up
DRAFT
...................................................................................................................................................................................................................................

How to perform the MIB back-up


When to use
Every time you make any change in the E configuration data.

Related Information
This task does not have any related information.

Before you begin


Read carefully:
• E data backup
• “Default repository folders of MIB back-up files” (p. 11-3)

MIB back-up procedure steps


...................................................................................................................................................................................................

1 Perform the command Supervision ⇒ MIB Management ⇒ Backup.


The Backup screen opens. Proceed as in Figure 11-2, “Start of the MIB back-up
(example)” (p. 11-5)
( **Comment: EXT FIGURE CHA GED **)
DRAFT

...................................................................................................................................................................................................................................
11-4 3DB 75003 CAAA
Issue 1 September 2009
MIB MANAGEMENT How to perform the MIB back-up

DRAFT
...................................................................................................................................................................................................................................

Figure 11-2 Start of the MIB back-up (example)

...................................................................................................................................................................................................

2 The Backup process starts. Wait until the message Figure 11-3, “MIB backup completed”
(p. 11-5) appears.
( **Comment: EXT FIGURE EW **)

Figure 11-3 MIB backup completed DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 11-5
Issue 1 September 2009
MIB MANAGEMENT How to perform the MIB back-up
DRAFT
...................................................................................................................................................................................................................................

...................................................................................................................................................................................................

3 ow, by the command Supervision ⇒ MIB Management ⇒ Backup, you can Figure
11-4, “Check of the creation of the required MIB backup file (example)” (p. 11-6).
( **Comment: EXT FIGURE EW **)

Figure 11-4 Check of the creation of the required MIB backup file (example)

END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
11-6 3DB 75003 CAAA
Issue 1 September 2009
MIB MANAGEMENT How to perform the MIB restore

DRAFT
...................................................................................................................................................................................................................................

How to perform the MIB restore


When to use
Every time you must restore the E configuration data.

Related Information
This task does not have any related information.

Before you begin


Read carefully:
• E data restore
• “Default repository folders of MIB back-up files” (p. 11-3)
• WAR I G: you must be aware that this restore operation will delete the current
MIB in the E's Flash Card, that will be replaced by the MIB you are going to
restore.

MIB restore procedure steps


...................................................................................................................................................................................................

1 Perform the command Supervision ⇒ MIB Management ⇒ Restore.


The Restore screen opens. Proceed as in Figure 11-5, “Start of the MIB restore
(example)” (p. 11-8).
( **Comment: EXT FIGURE CHA GED **)

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 11-7
Issue 1 September 2009
MIB MANAGEMENT How to perform the MIB restore
DRAFT
...................................................................................................................................................................................................................................

Figure 11-5 Start of the MIB restore (example)

...................................................................................................................................................................................................

2 At this point, the restored file is present in a Flash Card's temporary area, but has not
been activated in the actual MIB memory.
The Figure 11-6, “Question box after the MIB restore” (p. 11-9) raises.
DRAFT

...................................................................................................................................................................................................................................
11-8 3DB 75003 CAAA
Issue 1 September 2009
MIB MANAGEMENT How to perform the MIB restore

DRAFT
...................................................................................................................................................................................................................................

Figure 11-6 Question box after the MIB restore

...................................................................................................................................................................................................

3 How to answer the Figure 11-6, “Question box after the MIB restore” (p. 11-9)
If you answer:
• Yes, the activation of the restored MIB is started.
This implies an automatic system restart (see point 8 of “Procedures for the
management of the E software” (p. 4-6)), and the CT- E communication is lost.
Therefore, wait the time necessary for the restart completion, after which you can
perform again the EtO start-up and the E login.
• No, no action is made, but the restored file is still present in a Flash Card's temporary
area.
When you decide to activate it, perform the command:
Supervision ⇒ MIB Management ⇒ Activate
which operates as answering Yes in the Figure 11-6, “Question box after the MIB
restore” (p. 11-9).
END O F S T E P S
...................................................................................................................................................................................................

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 11-9
Issue 1 September 2009
MIB MANAGEMENT How to remove a MIB back-up file from the repository
DRAFT
folder
...................................................................................................................................................................................................................................

How to remove a MIB back-up file from the repository folder


When to use
Every time you must delete a MIB back-up file from the repository folder.

Related Information
This task does not have any related information.

Before you begin


• Read carefully “Default repository folders of MIB back-up files” (p. 11-3)
• WAR I G: you must be aware that this remove operation will delete the selected
MIB back-up file from the repository folder.
Be sure that this file would have no possible future use.

MIB back-up file remove procedure steps


...................................................................................................................................................................................................

1 Perform the command Supervision ⇒ MIB Management ⇒ Remove file


The Remove file screen opens. Proceed as in Figure 11-7, “Remotion of a MIB back-up
file from the repository folder (example)” (p. 11-11).
( **Comment: EXT FIGURE CHA GED **)
DRAFT

...................................................................................................................................................................................................................................
11-10 3DB 75003 CAAA
Issue 1 September 2009
MIB MANAGEMENT How to remove a MIB back-up file from the repository

DRAFT
folder
...................................................................................................................................................................................................................................

Figure 11-7 Remotion of a MIB back-up file from the repository folder (example)

...................................................................................................................................................................................................

2 You can check the remove operation as shown in Figure 11-8, “MIB back-up file removed
from the repository folder (example)” (p. 11-12).
( **Comment: EXT FIGURE EW **)
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 11-11
Issue 1 September 2009
MIB MANAGEMENT How to remove a MIB back-up file from the repository
DRAFT
folder
...................................................................................................................................................................................................................................

Figure 11-8 MIB back-up file removed from the repository folder (example)

END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
11-12 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
12 NE SWP UPGRADE
12

Overview
Purpose
This chapter describes how to upgrade to a new SWP any 9400AWY Rel.2.x E,
presently running with a previous SWP.

Contents

E SWP upgrade: introduction, restrictions, and upgrade cases 12-2


Only for upgrade to 9400AWY V2.0.6 or V2.1.2: how to perform, by WebEML, 12-4
the SWP download to the E, and its activation
CT start–up, and check for the availability of the SWP to be downloaded 12-5
E login and initial operations (stations A and B) 12-7
SW download to the E (station A) 12-9
Activation of the new Software Package on the E (station A) 12-16
Additional operation for upgrade from older versions (station A) 12-19
Operations on station B, and on the radio link (stations A and B) 12-21
otes about E SW downgrade 12-22

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 12-1
Issue 1 September 2009
NE SWP UPGRADE NE SWP upgrade: introduction, restrictions, and upgrade
DRAFT
cases
...................................................................................................................................................................................................................................

NE SWP upgrade: introduction, restrictions, and upgrade


cases
Introduction
As a preface to this chapter, if necessary, refer to “Equipment SW management by SWP
TCO SUITE Rel.1.8” (p. 4-2), and in particular to point 7 of “Procedures for the
management of the E software” (p. 4-6).
The procedures in this chapter apply:
• only for the upgrade to 9400AWY versions V2.0.6, or V2.1.2, or V2.1.3, or V2.1.4.
• and in both these cases (for explanations, if necessary, refer to “ otes on SWP
CD–ROM identification, and Product Release ote” (p. 2-6)):
– upgrade to a SWP with new Version Level (with respect to that presently running,
e.g. from 9400AWY SWP V2.1.2 to 9400AWY SWP V2.1.3)
– upgrade to a new SWP patch version (with respect to that presently running, e.g.
from 9400AWY SWP V2.1.2 to 9400AWY SWP V2.1.2 patch version).
Restriction for Windows Vista
With Windows Vista, the SWP download for E upgrade cannot use LLMA (therefore
the E’s F interface must not be used for the SWP download).
Case of upgrade to 9400AWY V2.0.6
The upgrade of any 9400AWY Rel.2.0:
• presently running with a SWP version < V2.0.6
• to the SWP version ⇒ V2.0.6
can be done in two ways:
• using the 1320CT–based Craft Terminal; in this case, make fully reference to the
instructions given in the specific “9400AWY R.2.0 V2.0.6 User Manual”, more
precisely:
– section MAI TE A CE A D UPGRADE
– chapter SWP download toward E
• or, using the TCO SUITE–based Craft Terminal; in this case, use the instructions
given in “Only for upgrade to 9400AWY V2.0.6 or V2.1.2: how to perform, by
WebEML, the SWP download to the E, and its activation” (p. 12-4)
Case of upgrade to 9400AWY V2.1.2
The upgrade of any 9400AWY Rel.2.1:
• presently running with a SWP version < V2.1.2
• to the SWP version ⇒ V2.1.2
can be done in two ways:
• using the 1320CT–based Craft Terminal; in this case, make fully reference to the
instructions given in the specific “9400AWY R.2.1 V2.1.2 User Manual”, more
precisely:
DRAFT

– section MAI TE A CE A D UPGRADE


...................................................................................................................................................................................................................................
12-2 3DB 75003 CAAA
Issue 1 September 2009
NE SWP UPGRADE NE SWP upgrade: introduction, restrictions, and upgrade

DRAFT
cases
...................................................................................................................................................................................................................................

– chapter CT & E upgrade to V2.1.2 from previous version V2.1.x


• or, using the TCO SUITE–based Craft Terminal; in this case, use the instructions
given in “Only for upgrade to 9400AWY V2.0.6 or V2.1.2: how to perform, by
WebEML, the SWP download to the E, and its activation” (p. 12-4)
Case of upgrade to 9400AWY V2.1.3
The upgrade of any 9400AWY Rel.2.1:
• presently running with a SWP version < V2.1.3
• to the SWP version ⇒ V2.1.3
please, make fully reference to the instructions given in the specific “9400AWY R.2.1
V2.1.3 User Manual”, more precisely:
• section MAI TE A CE A D UPGRADE
– chapter E upgrade to V2.1.3 from previous version V2.1.x
Case of upgrade to 9400AWY V2.1.4
The upgrade of any 9400AWY Rel.2.1:
• presently running with a SWP version < V2.1.4
• to the SWP version ⇒ V2.1.4
please, make fully reference to the instructions given in the specific “9400AWY R.2.1
V2.1.4 User Manual”, more precisely:
• section MAI TE A CE A D UPGRADE
– chapter E upgrade to V2.1.4 from previous version V2.1.x

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 12-3
Issue 1 September 2009
NE SWP UPGRADE Only for upgrade to 9400AWY V2.0.6 or V2.1.2: how to
DRAFT
perform, by WebEML, the SWP download to the NE, and
...................................................................................................................................................................................................................................
its activation

Only for upgrade to 9400AWY V2.0.6 or V2.1.2: how to


perform, by WebEML, the SWP download to the NE, and its
activation
Introduction
ote: Do not use following instructions for the upgrade to 9400AWY V2.1.3 or
V2.1.4! The instructions for the upgrade to 9400AWY V2.1.3 or V2.1.4 are given in
the User Manual cited respectively in “Case of upgrade to 9400AWY V2.1.3”
(p. 12-3) or “Case of upgrade to 9400AWY V2.1.4” (p. 12-3).

Comparison with the 1320CT of the:


• 9400AWY R.2.0 V2.0.6 CD-ROM,
• and of the 9400AWY R.2.1 V2.1.2 CD-ROM
with the SWP TCO SUITE Rel.1.8, the preparation of the SWP to be downloaded to the E
is performed by the command SW Download ⇒ Init SW Download (with the
1320CT–based Craft Terminal, it is performed by the etwork Element Synthesis screen)

WAR I G:
• You must be aware that these operations must be done on both stations A and B of
the radio link.
• The suggested sequence of phases is:
Table 12-1 Procedure to upgrade the SWP in both stations of a radio link
Phase Operation Station
A B
1 “CT start–up, and check for the availability - -
of the SWP to be downloaded” (p. 12-5)
2 “ E login and initial operations (stations A X X
and B)” (p. 12-7)
3 “SW download to the E (station A)” X
(p. 12-9)
4 “Activation of the new Software Package on X
the E (station A)” (p. 12-16)
5 “Additional operation for upgrade from older X
versions (station A)” (p. 12-19)
6 “Operations on station B, and on the radio X X
link (stations A and B)” (p. 12-21)
DRAFT

...................................................................................................................................................................................................................................
12-4 3DB 75003 CAAA
Issue 1 September 2009
NE SWP UPGRADE CT start–up, and check for the availability of the SWP to

DRAFT
be downloaded
...................................................................................................................................................................................................................................

CT start–up, and check for the availability of the SWP to be


downloaded
When to use
This is a sub-procedure of the Table 12-1, “Procedure to upgrade the SWP in both stations
of a radio link” (p. 12-4)

Related Information
This task does not have any related information.

Before you begin


Read “ E SWP upgrade: introduction, restrictions, and upgrade cases” (p. 12-2)

Sequence of steps
...................................................................................................................................................................................................

1 Power on the PC and wait for its start–up


...................................................................................................................................................................................................

2 Verify that the SWP to be downloaded is available in the PC.


The E–specific SW components to be downloaded are not present in the SWP TCO
SUITE Rel.1.8 CD–ROM. Such components should have been copied in the PC during
the 1320CT installation (refer to the User Manuals cited in “Case of upgrade to
9400AWY V2.0.6” (p. 12-2), and “Case of upgrade to 9400AWY V2.1.2” (p. 12-2) for
details).
The directory where the E software package is installed is:
Alcatel / JUSMw V.x.x.x / ect / swdw / <equipment name> / <version> / <descriptor file>
Parameters:
• the 9400AWY equipment name is “R94AWY”
• JUSMw “V.x.x.x” depends on the 9400AWY CD–ROM
• the version is “2.0.6” or “2.1.2”, according to what you have to do
• the descriptor file name for 9400AWY is always “R94A.DSC”
This descriptor file “R94A.DSC” is that you must select in Figure 12-4, “Selection of
the descriptor file R94A.DSC (example for V2.1.2 download)” (p. 12-13)
ote: the descriptor file “R94A.DSC” can also be selected directly:
• from the 9400AWY R.2.0 V2.0.6 CD-ROM,
• or from the 9400AWY R.2.1 V2.1.2 CD-ROM
In this case, after inserting the CD–ROM in the PC, in Figure 12-4, “Selection of the
descriptor file R94A.DSC (example for V2.1.2 download)” (p. 12-13), choose the
following path from the CD–ROM root:
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 12-5
Issue 1 September 2009
NE SWP UPGRADE CT start–up, and check for the availability of the SWP to
DRAFT
be downloaded
...................................................................................................................................................................................................................................

ect / swdw / <equipment name> / <version> / <descriptor file>


END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
12-6 3DB 75003 CAAA
Issue 1 September 2009
NE SWP UPGRADE NE login and initial operations (stations A and B)

DRAFT
...................................................................................................................................................................................................................................

NE login and initial operations (stations A and B)


When to use
This is a sub-procedure of the Table 12-1, “Procedure to upgrade the SWP in both stations
of a radio link” (p. 12-4)

Related Information
This task does not have any related information.

Before you begin


Read “ E SWP upgrade: introduction, restrictions, and upgrade cases” (p. 12-2)

Sequence of steps
Perform following operations by WebEML (for details refer to Chapter 9, “9400AWY
WEBEML”
...................................................................................................................................................................................................

1 Login the 9400AWY station A E, using the “Administrator” or “CraftPerson”


User ame & Password
WAR I G: as specified in “Restriction for Windows Vista” (p. 12-2), with Windows
Vista, the SWP download for E upgrade cannot use LLMA (therefore the E’s F
interface must not be used for the SWP download)
...................................................................................................................................................................................................

2 Wait for the main Equipment view to appear


...................................................................................................................................................................................................

3 Verify that the version to be downloaded is greater (or equal, only in case a new SWP
patch version) than those present in both the E MIB current Standby and Committed
banks (check by SW Download ⇒ SW Status, and verify both banks)
WAR I G: you must be aware that the SWP download, performed in the following, will
overwrite the current Standby version. In the case you want to maintain such a version,
and overwriting the other (i.e. that presently Committed), activate the current Standby
version as described in “Activation of the new Software Package on the E (station A)”
(p. 12-16)
...................................................................................................................................................................................................

4 Perform the E data backup, as described in point 3 of “Procedures for the management
of the E software” (p. 4-6)
...................................................................................................................................................................................................

5 Check that no hardware or radio transmission problems are present. Otherwise, solve
them before starting upgrade
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 12-7
Issue 1 September 2009
NE SWP UPGRADE NE login and initial operations (stations A and B)
DRAFT
...................................................................................................................................................................................................................................

...................................................................................................................................................................................................

6 Close all Performance Monitoring, analog measurement and BER measurement


processes, if any
...................................................................................................................................................................................................

7 Do not use functions stated above, or any other action not strictly necessary for the
upgrade, until you have completed the SW upgrade of both stations, i.e. not before the
operations described in “Operations on station B, and on the radio link (stations A and B)”
(p. 12-21)
...................................................................................................................................................................................................

8 Before to start the software download, it is recommended to disable the ATPC operation
(if it has been enabled) and to set in RTPC mode the max. Tx power
...................................................................................................................................................................................................

9 By another EtO session, perform on the 9400AWY station B E the same operations
done for station A
END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
12-8 3DB 75003 CAAA
Issue 1 September 2009
NE SWP UPGRADE SW download to the NE (station A)

DRAFT
...................................................................................................................................................................................................................................

SW download to the NE (station A)


When to use
This is a sub-procedure of the Table 12-1, “Procedure to upgrade the SWP in both stations
of a radio link” (p. 12-4)

Related Information
This task does not have any related information.

Before you begin


Read “ E SWP upgrade: introduction, restrictions, and upgrade cases” (p. 12-2)

Sequence of steps
...................................................................................................................................................................................................

1 Server Access Configuration Setup


Execute the following sub-steps:
1. By WebEML, perform SW Download ⇒ Server Access Configuration
2. The Figure 12-1, “FTP login default screen” (p. 12-10) opens:
3. Click the button Use System Default
In this way, as shown in Figure 12-2, “FTP login automatically set screen” (p. 12-10),
the systems sets automatically the various fields, that depend on how the login to the
E has been done:
• by Ethernet interface: IP address of the PC to download the software in LA
mode is set
• by F interface: IP address of the LLMA to download in interface F mode is set
(remind: never with Windows Vista)
ote: the UserId and Password present in this screen are relevant to the ftp login, are
set automatically with the Use System Default button and have no relationship with
those necessary for the E login.
4. Press OK to confirm values and close the window.
Warning: there is the possibility that the ftp server cannot be launched due to a conflict
with other ftp server already launched before by other applications. In this case, you will
face software download problem. Please check the PC configuration before downloading.
( **Comment: EXT FIGURE CHA GED **)
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 12-9
Issue 1 September 2009
NE SWP UPGRADE SW download to the NE (station A)
DRAFT
...................................................................................................................................................................................................................................

Figure 12-1 FTP login default screen

( **Comment: EXT FIGURE CHA GED **)

Figure 12-2 FTP login automatically set screen

...................................................................................................................................................................................................

2 SW Download
DRAFT

...................................................................................................................................................................................................................................
12-10 3DB 75003 CAAA
Issue 1 September 2009
NE SWP UPGRADE SW download to the NE (station A)

DRAFT
...................................................................................................................................................................................................................................

Execute the following sub-steps:


1. By WebEML, perform SW Download ⇒ Init SW Download
2. The Figure 12-3, “Empty “Init SW download” screen” (p. 12-12) opens (example
where no Software Packages are available)
3. Click the button Add
The screen of Figure 12-4, “Selection of the descriptor file R94A.DSC (example for
V2.1.2 download)” (p. 12-13) opens. With reference to the check done in “CT
start–up, and check for the availability of the SWP to be downloaded” (p. 12-5),
explore the path where the descriptor file R94A.DSC (associated to the version to be
downloaded) is present, then click button Open
4. ow, in Figure 12-5, “Init download start” (p. 12-13) select a specific SWP to
download on the E, then press Init download to start it.
5. Confirm the start of software download (Figure 12-6, “Init download confirmation
request (example for V2.1.2 download)” (p. 12-14))
6. The software downloading in progress is shown by a specific window (Figure 12-7,
“Download in progress” (p. 12-14))
Description of the software downloading process:
If, in the (Figure 12-5, “Init download start” (p. 12-13)) screen you have:
• unselected the Forced check box (default choice):
- at first, the download process compares the versions of the SW components to be
downloaded with those of the corresponding SW components present in the E’s
flash card Standby bank,
- then, only the SW components (if any) whose version is higher than that of the
corresponding SW components in the Standby bank are downloaded to it.
• selected the Forced check box, all SW components are downloaded to the
Standby bank in any case, also overwriting those whose versions are equal.
The software download from the Craft Terminal to the E’s flash card is performed
without traffic interruption on the user ports, and lasts:
• some tens of seconds, if no download is executed (this time is anyway necessary
for the comparison phase, to decide which SW components must be downloaded)
• about 30 minutes, if performed locally through the F interface
about 15 minutes, if the local Ethernet interface is used

about 1.5 hour, if the download is performed toward a remote E, through the

MS network or the radio interface
WAR I G: in this last case (download toward a remote E), verify that the
download bar does move, even slowly. If it does not move, it means that the download
does not work properly (there are no messages to the operator). In this case, abort the
software download window by the suitable Abort button, and begin again the software
download procedure.
7. When the download is over, the window Figure 12-8, “Download completed”
(p. 12-14) is shown; click OK to close it.
ote: this message appears even if no download is actually executed.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 12-11
Issue 1 September 2009
NE SWP UPGRADE SW download to the NE (station A)
DRAFT
...................................................................................................................................................................................................................................

8. After the software download completion, by WebEML perform SW Download ⇒


SW Status, select the Standby bank, and verify (see example for V2.1.2 in Figure
12-9, “Check of downloaded SW version” (p. 12-15)):
• that the downloaded SW is present as Stand by version, and that is the version
you wanted
• and that its Operational Status is Enabled (this means that the download took
place without errors)
WAR I G: if the Operational Status is Disabled, repeat the download
ote: clicking on the Software Unit Status button, it is possible to see its
components and their version

Figure 12-3 Empty “Init SW download” screen


DRAFT

...................................................................................................................................................................................................................................
12-12 3DB 75003 CAAA
Issue 1 September 2009
NE SWP UPGRADE SW download to the NE (station A)

DRAFT
...................................................................................................................................................................................................................................

Figure 12-4 Selection of the descriptor file R94A.DSC (example for V2.1.2
download)

Figure 12-5 Init download start

ote: normally, the Forced check box must not be used.


You must tick it only in the case you want to download a certain version to a E
whose flash card is already loaded with the same version (i.e. for corrective
maintenance purposes)
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 12-13
Issue 1 September 2009
NE SWP UPGRADE SW download to the NE (station A)
DRAFT
...................................................................................................................................................................................................................................

Figure 12-6 Init download confirmation request (example for V2.1.2 download)

Figure 12-7 Download in progress

Figure 12-8 Download completed


DRAFT

...................................................................................................................................................................................................................................
12-14 3DB 75003 CAAA
Issue 1 September 2009
NE SWP UPGRADE SW download to the NE (station A)

DRAFT
...................................................................................................................................................................................................................................

Figure 12-9 Check of downloaded SW version

END O F S T E P S
...................................................................................................................................................................................................

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 12-15
Issue 1 September 2009
NE SWP UPGRADE Activation of the new Software Package on the NE
DRAFT
(station A)
...................................................................................................................................................................................................................................

Activation of the new Software Package on the NE (station A)


When to use
This is a sub-procedure of the Table 12-1, “Procedure to upgrade the SWP in both stations
of a radio link” (p. 12-4)

Related Information
This task does not have any related information.

Before you begin


Read “ E SWP upgrade: introduction, restrictions, and upgrade cases” (p. 12-2)

Sequence of steps
After the software download (previously explained in “SW download to the E (station
A)” (p. 12-9)), two software packages are present in the E: one “Committed” and the
other “Stand by”. The Activation of the new Software Package on the E means to make
the “Stand by” SWP become the “Committed” one (and vice versa).
...................................................................................................................................................................................................

1 Activation of the Standby SW bank


1. By WebEML, perform SW Download ⇒ SW Status
2. Figure 12-10, “Activation of the Standby SW bank” (p. 12-17) (example for V2.1.2
activation): select the Standby SW bank (1), set Activation or Forced Activation (2) in
the “Software Management Action” field, then click Apply Action (3)
ote: difference between Activation and Forced Activation:
selecting Activation, the system performs an automatic restart, after the swap,

only if the contents of the “Committed” and the “Stand by” banks are different
• selecting Forced Activation, the system performs anyway an automatic restart,
after the swap.
3. Confirm the selected action (see Figure 12-11, “Confirm selected action request”
(p. 12-17))
4. The message of Figure 12-12, “Successful SW management action” (p. 12-18)
appears (click OK to close)…
5. …and the E restarts with the new software package.
ote: the JUSM becomes unavailable (the message of Figure 12-13, “ E restart after
successful SW management action” (p. 12-18)appears; click OK to close)
Effects of the “Activation of the Standby SW bank” process:
• the previous “Stand by” bank becomes the “Committed” one, and vice versa
• the SW components of the new “Committed” bank (after the swap) are loaded in the
Equipment Controller and in all peripherals (IDU and ODU)
• the equipment data base structure is converted to the structure of the new SWP (only
DRAFT

for upgrade; for downgrade, refer to “ otes about E SW downgrade” (p. 12-22)).
...................................................................................................................................................................................................................................
12-16 3DB 75003 CAAA
Issue 1 September 2009
NE SWP UPGRADE Activation of the new Software Package on the NE

DRAFT
(station A)
...................................................................................................................................................................................................................................

Figure 12-10 Activation of the Standby SW bank

Figure 12-11 Confirm selected action request

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 12-17
Issue 1 September 2009
NE SWP UPGRADE Activation of the new Software Package on the NE
DRAFT
(station A)
...................................................................................................................................................................................................................................

Figure 12-12 Successful SW management action

Figure 12-13 NE restart after successful SW management action

...................................................................................................................................................................................................

2 Logoff and Re–Login


1. Logoff the E
2. Login the E and verify, by SW Download ⇒ SW Status, that the SW banks have
changed their Current Status.
WAR I G: once you have downloaded and made active the new SWP in E
environment, do not make the mistake of trying to switch the previous version back to
COMMITTED status, unless you explicitly want to perform the E SW downgrade,
described in “ otes about E SW downgrade” (p. 12-22)
END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
12-18 3DB 75003 CAAA
Issue 1 September 2009
NE SWP UPGRADE Additional operation for upgrade from older versions

DRAFT
(station A)
...................................................................................................................................................................................................................................

Additional operation for upgrade from older versions (station


A)
When to use
This is a sub-procedure of the Table 12-1, “Procedure to upgrade the SWP in both stations
of a radio link” (p. 12-4).
This additional operation is mandatory in the following cases:
• upgrade to the SWP version ⇒ V2.1.2 or V2.1.3, of any 9400AWY Rel. 2.1
previously running with version 2.1.0
• upgrade to the SWP version ⇒ V2.0.6, of any 9400AWY Rel. 2.0 previously running
with any version V2.0.0, or V2.0.1, or V2.0.2, or V2.0.3, or V2.0.4
Why is this operation required?
Starting from AWY V2.0.5, and AWY V2.1.1, some new SW components have been
added (with respect to versions < V2.0.5 and to version V2.1.0) in the SWP: for this
reason, if the active bank is respectively < V2.0.5, or < V2.1.1, the download of SWP in
the flash card must be executed in two steps:
• with the first step (normal download procedure) only the new version of the SW
components known by previous SWP version are downloaded on flash card
• the new SW components are known O LY by SWP > V2.0.4, or SWP > V2.1.0, so
after the activation of the SWP V2.0.6, or V2.1.2, or V2.1.3, it is necessary to
download it again (in FORCED MODE), to transfer the new SW component image
onto flash card.

Related Information
This task does not have any related information.

Before you begin


Read “ E SWP upgrade: introduction, restrictions, and upgrade cases” (p. 12-2)

Sequence of steps
...................................................................................................................................................................................................

1 After having performed for the first time:


1. the “SW download to the E (station A)” (p. 12-9)
2. and the “Activation of the new Software Package on the E (station A)” (p. 12-16)…
...................................................................................................................................................................................................

2 …perform for the second time:


1. the “SW download to the E (station A)” (p. 12-9), but, in Figure 12-5, “Init
download start” (p. 12-13), setting Forced before clicking on Init download
2. and the “Activation of the new Software Package on the E (station A)” (p. 12-16)
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 12-19
Issue 1 September 2009
NE SWP UPGRADE Additional operation for upgrade from older versions
DRAFT
(station A)
...................................................................................................................................................................................................................................

ote: obviously, at the end of this procedure, you will have both SW banks with the
same SWP, and the previous SWP has been lost.
END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
12-20 3DB 75003 CAAA
Issue 1 September 2009
NE SWP UPGRADE Operations on station B, and on the radio link (stations A

DRAFT
and B)
...................................................................................................................................................................................................................................

Operations on station B, and on the radio link (stations A and


B)
When to use
This is a sub-procedure of the Table 12-1, “Procedure to upgrade the SWP in both stations
of a radio link” (p. 12-4)

Related Information
This task does not have any related information.

Before you begin


Read “ E SWP upgrade: introduction, restrictions, and upgrade cases” (p. 12-2)

Sequence of steps
...................................................................................................................................................................................................

1 Operations on station B
Perform on station B all operations you have performed on station A:
1. “SW download to the E (station A)” (p. 12-9), in this case for station B
2. “Activation of the new Software Package on the E (station A)” (p. 12-16), in this
case for station B
3. and, if necessary, “Additional operation for upgrade from older versions (station A)”
(p. 12-19), in this case for station B
...................................................................................................................................................................................................

2 Functional checks on the radio link (stations A and B)


Perform functional checks on the radio link (e.g. Alarm Monitor, Performance
Monitoring, analog measurement, BER measurement, operations on protection schemes,
loopbacks, etc.).
...................................................................................................................................................................................................

3 E data backup (stations A and B)


Perform the E data backup for both stations, as described in point 3 of “Procedures for
the management of the E software” (p. 4-6).
END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 12-21
Issue 1 September 2009
NE SWP UPGRADE Notes about NE SW downgrade
DRAFT
...................................................................................................................................................................................................................................

Notes about NE SW downgrade


If, in the Flash Card, the version of the SWP in the “Stand by” bank (e.g. V2.1.1) is lower
than that present in the “Committed” bank (e.g. V2.1.2), the activation of the “Stand by”
bank corresponds to the E SW downgrade (i.e., following the example above, from
V2.1.2 to V2.1.1).
This operation is greatly discouraged for backward data base structure incompatibility.
In fact, when the lower version SWP is activated, the data base is scratched, and you must
redefine all E data from the beginning.
Additional notes:
• the downgraded E must be managed by the proper SW management tool (e.g. to
manage a 9400AWY V2.1.1, you must use the 1320CT–based Craft Terminal installed
from the SWP 9400AWY V2.1.1 CD–ROM)
• the data base, scratched by the downgrade operation (e.g. from V2.1.2 to V2.1.1),
remains scratched even if you perform the upgrade (e.g. from V2.1.1 to V2.1.2)
therefore, also in this case, you must redefine all E data from the beginning.
DRAFT

...................................................................................................................................................................................................................................
12-22 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
13 13
MANAGEMENT OF THE
SECURITY FEATURES

Overview
Purpose
This chapter describes how to manage the security features of 9400AWY (by operator
profile, by community string, and by access lists).

Contents

Management of “security by operator profiles” 13-2


Management of “security by community string” 13-5
Management of “security by access lists” 13-7

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 13-1
Issue 1 September 2009
MANAGEMENT OF THE SECURITY FEATURES Management of “security by operator profiles”
DRAFT
...................................................................................................................................................................................................................................

Management of “security by operator profiles”


1. Description of the “security by operator profile” feature: refer to “Security by
operator profile” (p. 3-17)
2. Username and Password format
An user is identified by a username and password with the following characteristics:
• Username length: the length must not be more than 20 characters.
Password length: the length must not be less than six (6) characters under any

circumstances and must not be less than eight (8) characters for administrator user
profile. Moreover the password length must not be more than 20 characters.
• Password composition: the password must be composed of full ASCII characters
set (UPPER/lower case, numeric and special characters).
Each user is associated to a predefined profile.
3. User number: twenty–five (25) users at most can be created.
4. User predefined profiles
The predefined profiles are described in point 2 of “Security by operator profile”
(p. 3-17).
The list of supported features for each user profile is shown by the suitable tables
available in the help on–line (see 3 of “Security by operator profile” (p. 9-15))
5. E scratch behavior
At installation time ( E scratch), a default Administrator user is defined: see point 1
of “Security by operator profile” (p. 3-17)
6. Restart E behavior: all the security information sets (username/password/profile
for each user) are stored permanently in the E database (MIB data base). After the
E reset, these information sets are not lost and are recreated as before the E reset.
7. Change Password procedure: with this procedure, available for all Operator
Profiles, any user, after the successful log–in by WebEML (Craft Terminal), can
change his/her password:
a. As shown in Figure 13-1, “Profile Management options” (p. 13-3), perform:
Configuration → Profiles Management → Change Password
b. The screen of Figure 13-2, “Changing Password screen” (p. 13-3) appears; fill it
with old and new passwords, taking into account the password characteristics
previously described. The new password will be active at next login (after having
logged out).
8. Users Management procedure: this procedure is available to users with the
Administrator profile only, by WebEML (Craft Terminal):
a. As shown in Figure 13-1, “Profile Management options” (p. 13-3), perform:
Configuration → Profiles Management → Users Management
b. The screen of Figure 13-3, “Users Management screen” (p. 13-4) appears. Click
on Help
c. The screen of Figure 13-4, “Users Management help screen” (p. 13-4) appears.
Click inside to explore matters and carry out the desired action.
DRAFT

...................................................................................................................................................................................................................................
13-2 3DB 75003 CAAA
Issue 1 September 2009
MANAGEMENT OF THE SECURITY FEATURES Management of “security by operator profiles”

DRAFT
...................................................................................................................................................................................................................................

Figure 13-1 Profile Management options

Figure 13-2 Changing Password screen

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 13-3
Issue 1 September 2009
MANAGEMENT OF THE SECURITY FEATURES Management of “security by operator profiles”
DRAFT
...................................................................................................................................................................................................................................

Figure 13-3 Users Management screen

Figure 13-4 Users Management help screen


DRAFT

...................................................................................................................................................................................................................................
13-4 3DB 75003 CAAA
Issue 1 September 2009
MANAGEMENT OF THE SECURITY FEATURES Management of “security by community string”

DRAFT
...................................................................................................................................................................................................................................

Management of “security by community string”


Community string
ote: this feature is not manageable on AWY V2.0.6 and V2.1.2 Es
1. Description of the “security by community string” feature: refer to “Security by
community string” (p. 3-19)
2. Management of the “security by community string”
This kind of management is available:
• only to users with the Administrator profile,
• and only after having logged in successfully the E by the Main Menu’s “Alarms
& Settings” function.
Procedures for the management of the “security by community string”
a. on the Main Menu’s “Alarms & Settings” screen (Figure 6-1, “Alarms & Settings
Main Menu screen” (p. 6-4)), click Community String. The screen of Figure 13-5,
“Alarms & Settings “Community String” request” (p. 13-6) opens:
The values displayed in this screen. are the defaults (present in the Flash Card as
delivered from Alcatel–Lucent factory) :
- the “Read Community” string (default = “public”) must not be changed
- the “Write Community” string (default = “private”) can be changed to activate
the “security by community string”
b. How to change the “Write Community” string
To change the “Write Community” string:
– enter the new string in the field taking into account the following format:
- number of characters: 6 at minimum, 10 at maximum
- admitted characters are only letters “a” to “z”, “A” to “Z”, and digits “0” to “9”
- then, click Apply
After the successful “Write Community” string change, the consequences are the
following:
– at E side, the change takes effect at once (no E restart is performed)
– at user side, any EtO session opened on the E (supervision, WebEML, and
Alarms Monitoring) is lost.
The operator, independently of her/his profile, to supervision again the E:
• first at all, has to close the EtO window (by “Exit” button)
• then, starts again the EtO session (Step 1) of “Operations with EtO” (p. 8-6))
• then, inserts the new “Community String” (that the E Administrator must have
communicated to the users) as specified in Step 2 of “Operations with EtO”
(p. 8-6)
• then, proceeds from Step 3 of “Operations with EtO” (p. 8-6)
c. How to reset the “Read Community” and “Write Community” strings
To reset the “Read Community” and “Write Community” strings at their default
values:
– in the screen of Figure 13-5, “Alarms & Settings “Community String” request”
(p. 13-6) , click Default
– then, click Apply
The consequences of this operation are as in point b above.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 13-5
Issue 1 September 2009
MANAGEMENT OF THE SECURITY FEATURES Management of “security by community string”
DRAFT
...................................................................................................................................................................................................................................

But, in this case, the operator who has lost the CT– E communication, to
supervision again the E, must not perform the Step 2 of “Operations with EtO”
(p. 8-6)( i.e. must not insert any “Community String”).
3. Restart E behavior
Both the “Read Community” and “Write Community” strings are stored permanently
in the E database (MIB data base), and they are kept at E restart.

Figure 13-5 Alarms & Settings “Community String” request


DRAFT

...................................................................................................................................................................................................................................
13-6 3DB 75003 CAAA
Issue 1 September 2009
MANAGEMENT OF THE SECURITY FEATURES Management of “security by access lists”

DRAFT
...................................................................................................................................................................................................................................

Management of “security by access lists”


ote: this feature is not manageable on AWY V2.0.6 and V2.1.2 Es
1. Description of the “security by access lists” feature refer to “Security by access
lists” (p. 3-20)
2. Management of the Access List tables
The Access List tables have the default status shown in Figure 13-6, “Access list
configuration default screen” (p. 13-8), which is one of the steps of the Full
Configuration Procedure of the Provisioning Tool, described in Chapter 5,
“PROVISIO I G TOOL”. In case the Provisioning Tool is run:
• in not E–interactive mode (offline), all operators can obviously write the tables
• in E–interactive mode (online), only a user with the Administrator profile can
write the tables, and, at the end of the configuration, can apply it to the E.
To avoid conflicts, only one Administrator at a time (the first who logs in the E
by the online Provisioning Tool) can fill the Access List tables; the others are
excluded till the completion of the job.
To insert and remove the IP Addresses and IP Masks of the enabled Managers’ PCs in
each Access List table, refer to the on–line help, clicking the relevant button.
Additional information:
• Each row of each Access List table enables one or more Managers
I.e., if the first row is the following: IP: 151.99.98.1 – Mask: 255.255.255.255, it
means that only one Manager is defined.
Otherwise, if it is: IP: 151.99.98.1 – Mask: 255.255.255.0, then 256 Managers are
enabled.
That is, the number of rows does not necessarily indicate the number of Managers,
because, for each row, many Managers can be defined.
• When an Access List table is modified ( with respect to the default status) :
- the IP address of the Administrator’s PC (from which the Access List table has
been modified) is automatically inserted in the table with IP Mask
255.255.255.255;
the default row with both IP Address and IP Mask = 0.0.0.0 is automatically
removed.
• When all IP Addresses and IP Masks of the previously enabled Managers’ PCs are
removed from an Access List table, this is automatically reset at the default
condition (only one row, with both IP Address and IP Mask = 0.0.0.0)
ote: the content of the Access List tables is not shown to operators logging in the
E with a profile different from “Administrator”.
3. Activation of the changes made on the Access List tables
In the case of changes regarding:
• the ”S MP” and “http” Access List tables, no E restart is required: changes
apply at once, as soon as, at the end of the configuration procedure by the on–line
Provisioning Tool, the new configuration file is applied to the E;
• the ”ftp” and “telnet” Access List tables, it is necessary:
– at first, to confirm the changes applying the new configuration file to the E;
– then, to perform the E restart.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 13-7
Issue 1 September 2009
MANAGEMENT OF THE SECURITY FEATURES Management of “security by access lists”
DRAFT
...................................................................................................................................................................................................................................

4. Restart E behavior
The Access List tables are stored permanently in the E database, and they are kept at
E restart.
5. Access List Backup from a E
Once the Access List tables have been defined in a E (if at least one of them has a
content different from the default), it is possible, only for an user with the
Administrator profile, exporting them all on a suitable back–up file, clicking the
button Access List Backup on the Main Menu’s “Alarms & Settings” screen ( Figure
6-1, “Alarms & Settings Main Menu screen” (p. 6-4)), which opens the screen of
Figure 13-7, “Alarms & Settings “Access List Backup” request” (p. 13-9)
6. Access List Restore to a E
A back–up file obtained as described in point 5 above, can be restored (only by an
user with the Administrator profile) in the same E, or another AWY V2.1.3 or
V2.1.4 E, clicking the button Access List Restore on the Main Menu’s “Alarms &
Settings” screen ( Figure 6-1, “Alarms & Settings Main Menu screen” (p. 6-4)), which
opens the screen of Figure 13-8, “Alarms & Settings “Access List Restore” request”
(p. 13-9)
After the successful restore operation, perform the E restart.

Figure 13-6 Access list configuration default screen


DRAFT

...................................................................................................................................................................................................................................
13-8 3DB 75003 CAAA
Issue 1 September 2009
MANAGEMENT OF THE SECURITY FEATURES Management of “security by access lists”

DRAFT
...................................................................................................................................................................................................................................

Figure 13-7 Alarms & Settings “Access List Backup” request

Figure 13-8 Alarms & Settings “Access List Restore” request

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 13-9
Issue 1 September 2009
DRAFT DRAFT
DRAFT
Part II: APPENDICES

Overview
Purpose
This part describes the less frequently used functions of the SWP TCO SUITE Rel.1.8,
and provides additional information.

Contents

Chapter 14, Appendix A: PREPARATIO OF THE CRAFT TERMI AL 14-1


BASED O SWP TCO SUITE Rel.1.8
Chapter 15, Appendix B: JRE I STALLATIO A D SWP TCO SUITE 15-1
Rel.1.8 START UP
Chapter 16, Appendix C: LLMA I STALLATIO , CO FIGURATIO A D 16-1
USE
Chapter 17, Appendix D: CT- E CO ECTIO VIA PUBLIC SWITCHED 17-1
TELEPHO E ETWORK
Chapter 18, Appendix E: SWP TCO SUITE Rel.1.8 DEI STALLATIO 18-1
Chapter 19, EDITORIAL I FORMATIO 19-1

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA II-1
Issue 1 September 2009
DRAFT DRAFT
DRAFT
14 14
Appendix A: PREPARATION
OF THE CRAFT TERMINAL
BASED ON SWP TCO SUITE
Rel.1.8
Overview
Purpose
This Appendix describes the Advanced Settings screen, and details all phases necessary to
copy and/or install the SWP components from the SWP TCO SUITE Rel.1.8 CD-ROM,
in the PC environment.

Contents

Operations sequence for the preparation of the Craft Terminal 14-2


Functions of the other buttons of the Advanced Settings screen 14-10
ote about TCO SUITE previous versions 14-10

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 14-1
Issue 1 September 2009
Appendix A: PREPARATION OF THE CRAFT TERMINAL Operations sequence for the preparation of the Craft
DRAFT
BASED ON SWP TCO SUITE Rel.1.8 Terminal
...................................................................................................................................................................................................................................

Operations sequence for the preparation of the Craft Terminal


When to use
The first time you must prepare your PC as Craft Terminal based on SWP TCO SUITE
Rel.1.8.

Related Information
This task does not have any related information.

Before you begin


Verify that:
• your PC meets the “PC requirements to run and install the SWP TCO SUITE Rel.1.8”
(p. 1-4)
• you have the SWP TCO SUITE Rel.1.8 CD-ROM available.
DRAFT

...................................................................................................................................................................................................................................
14-2 3DB 75003 CAAA
Issue 1 September 2009
Appendix A: PREPARATION OF THE CRAFT TERMINAL Operations sequence for the preparation of the Craft

DRAFT
BASED ON SWP TCO SUITE Rel.1.8 Terminal
...................................................................................................................................................................................................................................

Sequence of steps
...................................................................................................................................................................................................

1 In your system disk, create a folder where to put all files (e.g. "TCO_SUITE_18" in
Figure 14-1, “Creation of folder for repository of SWP TCO SUITE Rel.1.8 files”
(p. 14-3)).
WAR I G: the name of this folder must contain neither blank spaces, nor characters
which may confuse the filing system, like:
\?:*“<>|.
WAR I G: the absolute path where the folder is put, must not contain blank spaces (e.g.
you cannot put it in the “My Documents” folder, which has a blank space).
( **Comment: EXT FIGURE CHA GED **)

Figure 14-1 Creation of folder for repository of SWP TCO SUITE Rel.1.8 files

...................................................................................................................................................................................................

2 Insert the SWP TCO SUITE Rel.1.8 CD-ROM in your PC


...................................................................................................................................................................................................

3 If never done previously, the start-up of the SWP TCO SUITE Rel.1.8 is performed
automatically (it installs, if necessary, the JRE required version), and the Main Menu
screen opens (Figure 4-5, “TCO Suite Main Menu screen” (p. 4-13))
ote: in case of problems, or for details, refer to Chapter 15, “Appendix B: JRE
I STALLATIO A D SWP TCO SUITE Rel.1.8 START UP” (in particular, take
into account that the installation of the JRE requires the PC Administrator privileges)
...................................................................................................................................................................................................

4 Click on Advanced Settings button


DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 14-3
Issue 1 September 2009
Appendix A: PREPARATION OF THE CRAFT TERMINAL Operations sequence for the preparation of the Craft
DRAFT
BASED ON SWP TCO SUITE Rel.1.8 Terminal
...................................................................................................................................................................................................................................

...................................................................................................................................................................................................

5 The Figure 14-2, “SWP TCO SUITE Rel.1.8 Advanced Settings screen” (p. 14-4)
(AS.html page of CD-ROM version) opens

Figure 14-2 SWP TCO SUITE Rel.1.8 Advanced Settings screen

...................................................................................................................................................................................................

6 Starting from the Advanced Settings screen, perform the operations depicted in Figure
14-3, “Local copy of TCO Suite” (p. 14-6).
ote 1: in the operation (2), choose the folder created in previous Step 1 of this procedure
ote 2: this operation does not require the PC Administrator privileges
WAR I G: in case the automatic creation of the shortcut fails (it could happen with PC
set to some languages), you can create it manually (”Start.exe” file in TcoSuite.xx folder,
under the root created in previous Step 1 of this procedure). Some more explanations for
this warning: the link on desktop is created by TCO Applets when the local copy has
been completed. The directory used by the link is user.home + "\Desktop" where
DRAFT

...................................................................................................................................................................................................................................
14-4 3DB 75003 CAAA
Issue 1 September 2009
Appendix A: PREPARATION OF THE CRAFT TERMINAL Operations sequence for the preparation of the Craft

DRAFT
BASED ON SWP TCO SUITE Rel.1.8 Terminal
...................................................................................................................................................................................................................................

user.home is a system property of Java. Unfortunately, "Desktop" is not a common default


name, in different Microsoft OS language; e.g. for desktop folder representation: in
Chinese OS, the desktop folder is in Chinese characters; in Spanish OS, the desktop
folder will be in Spanish name. In TCO installation, the link on desktop can be
automatically created on Windows OS English version. In other OS languages, the link
must be created manually.
( **Comment: EXT FIGURE CHA GED **)

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 14-5
Issue 1 September 2009
Appendix A: PREPARATION OF THE CRAFT TERMINAL Operations sequence for the preparation of the Craft
DRAFT
BASED ON SWP TCO SUITE Rel.1.8 Terminal
...................................................................................................................................................................................................................................

Figure 14-3 Local copy of TCO Suite

...................................................................................................................................................................................................

7 Starting from the Advanced Settings screen, perform the operations depicted in Figure
14-4, “Local copy of WebEML (JUSM/CT)” (p. 14-8)
DRAFT

...................................................................................................................................................................................................................................
14-6 3DB 75003 CAAA
Issue 1 September 2009
Appendix A: PREPARATION OF THE CRAFT TERMINAL Operations sequence for the preparation of the Craft

DRAFT
BASED ON SWP TCO SUITE Rel.1.8 Terminal
...................................................................................................................................................................................................................................

ote 1: in the operation (2), choose the folder created in previous Step 1 of this procedure
ote 2: the folder depicted is that created in previous Step 6 of this procedure
ote 3: this operation does not require the PC Administrator privileges
WAR I G: in case the automatic creation of the shortcut fails (it could happen with PC
set to some languages), you can create it manually (” EtO.exe” file in EtO folder,
under the root created in previous Step 1 of this procedure). Some more explanations for
this warning: the link on desktop is created by TCO Applets when the local copy has
been completed. The directory used by the link is user.home + "\Desktop" where
user.home is a system property of Java. Unfortunately, "Desktop" is not a common default
name, in different Microsoft OS language; e.g. for desktop folder representation: in
Chinese OS, the desktop folder is in Chinese characters; in Spanish OS, the desktop
folder will be in Spanish name. In TCO installation, the link on desktop can be
automatically created on Windows OS English version. In other OS languages, the link
must be created manually.
( **Comment: EXT FIGURE CHA GED **)

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 14-7
Issue 1 September 2009
Appendix A: PREPARATION OF THE CRAFT TERMINAL Operations sequence for the preparation of the Craft
DRAFT
BASED ON SWP TCO SUITE Rel.1.8 Terminal
...................................................................................................................................................................................................................................

Figure 14-4 Local copy of WebEML (JUSM/CT)

...................................................................................................................................................................................................

8 Starting from the Advanced Settings screen, perform (if necessary) the LLMAN
installation and configuration
DRAFT

...................................................................................................................................................................................................................................
14-8 3DB 75003 CAAA
Issue 1 September 2009
Appendix A: PREPARATION OF THE CRAFT TERMINAL Operations sequence for the preparation of the Craft

DRAFT
BASED ON SWP TCO SUITE Rel.1.8 Terminal
...................................................................................................................................................................................................................................

This operation is necessary if you want to access any 9400AWY through its
serial-F-interface (see Figure 3-2, “Access to E through E’s F interface (RS232 serial
interface) on IDU MAI unit” (p. 3-4)).
For the execution of the procedure, refer to the Chapter 16, “Appendix C: LLMA
I STALLATIO , CO FIGURATIO A D USE”
ote: this operation requires the PC Administrator privileges
WAR I G 1: the version of LLMA contained in the SWP TCO SUITE Rel.1.8
CD–ROM is higher than that of LLMA contained in the:
• 9400AWY R.2.0 V2.0.6 CD–ROM
• 9400AWY R.2.1 V2.1.2 CD–ROM
• SWP TCO SUITE Rel.1.6 CD–ROM
Therefore, if, in the past, you have used any of such CD–ROMs to install LLMA
during the:
• 1320CT–based Craft Terminal preparation,
• or SWP TCO SUITE Rel.1.6–based Craft Terminal,
you must install this new version of LLMA .
ote: the new version of LLMA is fully compatible with all 1320CT–based
applications.
WAR I G 2: the version of LLMA contained in the SWP TCO SUITE Rel.1.8
CD–ROM is equal to that of LLMA contained in the SWP TCO SUITE Rel.1.7
CD-ROM.
Therefore, if, in the past, you have used the SWP TCO SUITE Rel.1.7 CD-ROM to
install LLMA , you have nothing to do.
...................................................................................................................................................................................................

9 At this point, if you have not performed the LLMA installation and configuration, the
Preparation of the Craft Terminal based on SWP TCO SUITE Rel.1.8 is completed.
You do no longer need to use the SWP TCO SUITE Rel.1.8 CD-ROM, that can be
extracted from the PC.
END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 14-9
Issue 1 September 2009
Appendix A: PREPARATION OF THE CRAFT TERMINAL Functions of the other buttons of the Advanced Settings
DRAFT
BASED ON SWP TCO SUITE Rel.1.8 screen
...................................................................................................................................................................................................................................

Functions of the other buttons of the Advanced Settings


screen
In Figure 14-2, “SWP TCO SUITE Rel.1.8 Advanced Settings screen” (p. 14-4)
• the button Java JRE Package Installation starts the “Manual installation of Java
JRE Package” (p. 15-3)
• the button Back goes back to the Figure 4-5, “TCO Suite Main Menu screen”
(p. 4-13).

Note about TCO SUITE previous versions


In case you had installed in the past a previous version of the TCO SUITE for 9400AWY
(i.e. version < SWP TCO SUITE Rel.1.8), take into account that different TCO SUITE
versions are independent from each other. evertheless, because the new version does not
exclude any feature of the old ones, and to avoid possible confusion on your PC desktop,
we suggest to de–install the old versions.
DRAFT

...................................................................................................................................................................................................................................
14-10 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
15 15
Appendix B: JRE
INSTALLATION AND SWP
TCO SUITE Rel.1.8 START
UP
Overview
Purpose
This Appendix describes how to install the required version of JRE, the standard behavior
of the SWP TCO SUITE Rel.1.8 start-up, as well as some special conditions that may
occur during it, and the countermeasures to take.

Contents

eed for JRE installation 15-1


Standard behavior of SWP TCO SUITE Rel.1.8 start-up 15-2
Manual installation of Java JRE Package 15-3
Special conditions of SWP TCO SUITE Rel.1.8 start-up 15-5

Need for JRE installation


Since the SWP TCO SUITE Rel.1.8 works using Java™ software, it is mandatory to have
a Java Runtime Environment (JRE) installed on the system.
Allowed JREs are Sun only, with version number higher or equal than that necessary for
SWP TCO SUITE Rel.1.8 (the necessary version is included in the SWP TCO SUITE
Rel.1.8 CD-ROM).
The check of the JRE availability in the system, and of its version, is performed any time
the SWP TCO SUITE Rel.1.8 CD-ROM is inserted in the PC.
JRE can be installed:
• automatically, at first insertion in the PC of the SWP TCO SUITE Rel.1.8 CD-ROM ,
as described in “Standard behavior of SWP TCO SUITE Rel.1.8 start-up” (p. 15-2)
• or manually, as described in “Manual installation of Java JRE Package” (p. 15-3)
WAR I G: in both cases (automatic or manual installation) the PC Administrator
privileges are necessary.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 15-1
Issue 1 September 2009
Appendix B: JRE INSTALLATION AND SWP TCO SUITE Standard behavior of SWP TCO SUITE Rel.1.8 start-up
DRAFT
Rel.1.8 START UP
...................................................................................................................................................................................................................................

Standard behavior of SWP TCO SUITE Rel.1.8 start-up


The Suite auto-runs itself (if this feature is enabled on user's PC) as soon as the SWP
TCO SUITE Rel.1.8 CD-ROM is read by PC.
If auto-run does not start, to launch the Suite, user must run (double-click with mouse) the
Start.exe file, available on SWP TCO SUITE Rel.1.8 CD-ROM root.
The first operation performed by auto-run procedure is the check for JRE.
The policy adopted with the application running inside the browser, where normally the
customer runs also other applications that could require different JREs, is as follows:
• if the JRE plugged into the browser is newer than or equal to the required version, the
tool start-up will continue, and the screen of Figure 4-5, “TCO Suite Main Menu
screen” (p. 4-13) opens;
• if the JRE plugged into the browser is older than the required version, user is asked to
install it (automatically from the SWP TCO SUITE Rel.1.8 CD-ROM) as shown in
Figure 15-1, “Java installation request” (p. 15-2). The user can accept and the tool
start-up will continue, otherwise the installation exits and the tool start-up is aborted.

Figure 15-1 Java installation request

WAR I G: the PC Administrator privileges are necessary to install JRE.


If user gives authorization to install JRE from CD-ROM, the installation message
appears:

Figure 15-2 JRE installation in progress

After, the default browser (configured as for user preferences) opens the SWP TCO
SUITE Rel.1.8 Start.html page (Figure 4-5, “TCO Suite Main Menu screen” (p. 4-13))
DRAFT

...................................................................................................................................................................................................................................
15-2 3DB 75003 CAAA
Issue 1 September 2009
Appendix B: JRE INSTALLATION AND SWP TCO SUITE Manual installation of Java JRE Package

DRAFT
Rel.1.8 START UP
...................................................................................................................................................................................................................................

Manual installation of Java JRE Package


The Manual installation of Java JRE Package is done clicking the relevant button of the
Advanced Settings screen (see Figure 14-2, “SWP TCO SUITE Rel.1.8 Advanced
Settings screen” (p. 14-4)):

WAR I G: the PC Administrator privileges are necessary to install JRE.


This button connects to the installation file for the Java Runtime Environment contained
in the SWP TCO SUITE Rel.1.6 CD-ROM. The behavior of this button depends on
browser and Windows version. Examples:
• Mozilla Firefox on Windows XP asks the user where to place the .exe file; after
saving, you must execute it, to install the application.

• Internet Explorer on Windows XP asks the user to "Run" or "Save" the .exe file:
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 15-3
Issue 1 September 2009
Appendix B: JRE INSTALLATION AND SWP TCO SUITE Manual installation of Java JRE Package
DRAFT
Rel.1.8 START UP
...................................................................................................................................................................................................................................

If user chooses:
– Run, the following "Security Warning" appears, where you should click "Run".
Consequently, JRE installation from the CD-ROM starts with the message of
Figure 15-2, “JRE installation in progress” (p. 15-2) , and ends with a suitable
confirmation message.

– Save, user is asked where to place the .exe file; after saving, you must execute it,
to install the application.
In any case, for most browsers the default behavior can be changed but this strictly
depends on browser configuration and user choices.
DRAFT

...................................................................................................................................................................................................................................
15-4 3DB 75003 CAAA
Issue 1 September 2009
Appendix B: JRE INSTALLATION AND SWP TCO SUITE Special conditions of SWP TCO SUITE Rel.1.8 start-up

DRAFT
Rel.1.8 START UP
...................................................................................................................................................................................................................................

Special conditions of SWP TCO SUITE Rel.1.8 start-up


Depending on selected browser, on browser configuration and preferences and on user's
choices some security questions could be made to the user, like:

To proceed, you must answer YES.


In case of specific user's browser configuration, the browser could ask some questions
about "secure" or "blocked" content (Figure 15-3, “Security Questions: Secure Content”
(p. 15-6) below) and before operating on TCO Suite pages user must click on this
information box (usually shown in a pale yellow background on top of the browser
HTML page and allow the browser to manage this information (Figure 15-4, “Secure
Questions: Allow Secure Content” (p. 15-6)).
As stated before, the layout and graphical representation for this question (if asked) could
be different from browser to browser and, with respect to the same browser, language and
information could vary too.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 15-5
Issue 1 September 2009
Appendix B: JRE INSTALLATION AND SWP TCO SUITE Special conditions of SWP TCO SUITE Rel.1.8 start-up
DRAFT
Rel.1.8 START UP
...................................................................................................................................................................................................................................

Figure 15-3 Security Questions: Secure Content

Figure 15-4 Secure Questions: Allow Secure Content

Usually, the user has to click with the mouse on such yellow bar and a pop-up menu will
appear to ask user if he/she allows running this special content (Figure 15-4, “Secure
Questions: Allow Secure Content” (p. 15-6)). In some cases another confirmation is
requested to the user, as shown in Figure 15-5, “Execution confirmation (Security
Warning)” (p. 15-7)).
DRAFT

...................................................................................................................................................................................................................................
15-6 3DB 75003 CAAA
Issue 1 September 2009
Appendix B: JRE INSTALLATION AND SWP TCO SUITE Special conditions of SWP TCO SUITE Rel.1.8 start-up

DRAFT
Rel.1.8 START UP
...................................................................................................................................................................................................................................

Figure 15-5 Execution confirmation (Security Warning)

Generally speaking, as soon as the browser is allowed to execute Java applets inside the
HTML page, a specific dialog will appear when browser recognizes that Java applets are
inside the page.
As usual, both language and graphical layout could vary with respect to browser,
operating system version, operating system and browser languages and so on. Following
Figure 15-6, “Security Warning (English browser on Italian System)” (p. 15-8) shows an
example of this warnings: as wrote before, things can differ with respect to language or
graphics and so on. DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 15-7
Issue 1 September 2009
Appendix B: JRE INSTALLATION AND SWP TCO SUITE Special conditions of SWP TCO SUITE Rel.1.8 start-up
DRAFT
Rel.1.8 START UP
...................................................................................................................................................................................................................................

Figure 15-6 Security Warning (English browser on Italian System)

This request is necessarily shown because TCO Suite applets needs specific parameters
and permissions in order to perform requested operations (reading and writing of files, for
example). Applets used are authenticated and a certificate is used to sign applets in order
to tell user (and browser) that someone (Alcatel-Lucent, in this case) guarantees about the
safety in loading those applets inside a browser.
Another difference that user could perceive is related to a missing JRE but, even in this
case, the graphical layout will differ from system and browser.
If user opens the Start.html page even without a JRE installed shown page would differ
from browser and system versions. Following Figure 15-7, “Internet Explorer browser: no
JRE installed” (p. 15-9) shows Internet Explorer browser with no JRE installed. On top of
browser a yellow alert bar can be seen: in this case the browser detected a special content
for which it has no plug-in so the browser asks the user to automatically install needed
plug-in by searching it on the Internet.
DRAFT

...................................................................................................................................................................................................................................
15-8 3DB 75003 CAAA
Issue 1 September 2009
Appendix B: JRE INSTALLATION AND SWP TCO SUITE Special conditions of SWP TCO SUITE Rel.1.8 start-up

DRAFT
Rel.1.8 START UP
...................................................................................................................................................................................................................................

Figure 15-7 Internet Explorer browser: no JRE installed

If user allows to search for related plug-in, a specific operation could be started
(following Figure 15-8, “Firefox plug-in search” (p. 15-9) ).

Figure 15-8 Firefox plug-in search

And if the user agrees, the browser could automatically install the correct plug-in (see
following Figure 15-9, “Firefox plug-in installation” (p. 15-10) ).
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 15-9
Issue 1 September 2009
Appendix B: JRE INSTALLATION AND SWP TCO SUITE Special conditions of SWP TCO SUITE Rel.1.8 start-up
DRAFT
Rel.1.8 START UP
...................................................................................................................................................................................................................................

Since this operations is specifically related to Mozilla Firefox browser, some details could
be different with respect to used version. Anyway, since this operation is automatically
managed by the browser no control can be made through TCO Suite. Using this
procedure will usually install the latest JRE version available as Mozilla Firefox plug-in
that is usually newer than the JRE version available within the TCO Suite.

Figure 15-9 Firefox plug-in installation

As stated before, graphical layout, language, information, alert boxes and everything
shown by a browser would differ from each browser and operating system version or
release.
Then, when Java applets and the Start.html page finally goes for a complete execution,
the user will see the content shown in Figure 4-5, “TCO Suite Main Menu screen”
(p. 4-13)
DRAFT

...................................................................................................................................................................................................................................
15-10 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
16 16
Appendix C: LLMAN
INSTALLATION,
CONFIGURATION AND USE

Overview
Purpose
This Appendix explains the operations to be done on the PC to allow the E management
through the E's F serial port.

Contents

Foreword 16-2
Important warnings 16-2
Procedure for the LLMA installation, configuration and use 16-3
Installation of LLMA from the SWP TCO SUITE Rel.1.8 CD-ROM 16-5
Installation and configuration of a Virtual etwork adapter for LLMA 16-11
Lower Layer settings 16-15
Check/set the " etwork Connections" order 16-18
How to start and use the LLMA application 16-20

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-1
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Foreword
DRAFT
USE
...................................................................................................................................................................................................................................

Foreword
This procedure is necessary only when you need to use the E's F serial port to manage
the E itself or any other E accessible from it, by the WebEML functions.
ote: Performing this procedure is not necessary if you want to use the WebEML
functions, accessing the local E through its Ethernet interface only.
ote: These installation operations require the PC Administrator privileges

Important warnings
• Important warning for Windows Vista
• Warning about the " etwork Connections" order
• Warning about the PC settings
DRAFT

...................................................................................................................................................................................................................................
16-2 3DB 75003 CAAA
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Procedure for the LLMAN installation, configuration and

DRAFT
USE use
...................................................................................................................................................................................................................................

Procedure for the LLMAN installation, configuration and use


When to use
The first time you must set your PC, already prepared as Craft Terminal based on SWP
TCO SUITE Rel.1.8, to use the E's F serial port to manage the E itself or any other
E accessible from it, by the WebEML functions.

Related Information
This task does not have any related information.

Before you begin


Verify that:
• your PC has already prepared as Craft Terminal based on SWP TCO SUITE Rel.1.8,
as described in Chapter 14, “Appendix A: PREPARATIO OF THE CRAFT
TERMI AL BASED O SWP TCO SUITE Rel.1.8”
• you have the SWP TCO SUITE Rel.1.8 CD-ROM available.

Sequence of steps
ote: choose how to start this procedure:
• if you are performing this procedure following Step 8 of “Operations sequence for
the preparation of the Craft Terminal” (p. 14-2), you have the Figure 14-2, “SWP
TCO SUITE Rel.1.8 Advanced Settings screen” (p. 14-4) screen still open; in this
case continue from Step 6 of this procedure.
• otherwise, begin from Step 1 of this procedure.
...................................................................................................................................................................................................

1 Verify that your PC meets the requirements described in “PC requirements to run and
install the SWP TCO SUITE Rel.1.8” (p. 1-4)
...................................................................................................................................................................................................

2 Insert the SWP TCO SUITE Rel.1.8 CD-ROM in your PC


...................................................................................................................................................................................................

3 If never done previously, the start-up of the SWP TCO SUITE Rel.1.8 is performed
automatically (it installs, if necessary, the JRE required version), and the Figure 4-5,
“TCO Suite Main Menu screen” (p. 4-13) opens
ote: in case of problems, or for details, refer to Chapter 15, “Appendix B: JRE
I STALLATIO A D SWP TCO SUITE Rel.1.8 START UP” (in particular, take
into account that the installation of the JRE requires the PC Administrator privileges)
...................................................................................................................................................................................................

4 Click on Advanced Settings button


DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-3
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Procedure for the LLMAN installation, configuration and
DRAFT
USE use
...................................................................................................................................................................................................................................

...................................................................................................................................................................................................

5 The Figure 14-2, “SWP TCO SUITE Rel.1.8 Advanced Settings screen” (p. 14-4) opens
...................................................................................................................................................................................................

6 Install LLMAN (Alcatel-Lucent Lower Layers Manager), as described in “Installation of


LLMA from the SWP TCO SUITE Rel.1.8 CD-ROM” (p. 16-5)
...................................................................................................................................................................................................

7 Perform the “Installation and configuration of a Virtual etwork adapter for LLMA ”
(p. 16-11)
...................................................................................................................................................................................................

8 Perform the “Lower Layer settings” (p. 16-15)


...................................................................................................................................................................................................

9 “Check/set the " etwork Connections" order” (p. 16-18)


Only after having executed all operations stated above, you can use the LLMA
application, as described in “How to start and use the LLMA application” (p. 16-20)
END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
16-4 3DB 75003 CAAA
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Installation of LLMAN from the SWP TCO SUITE Rel.1.8

DRAFT
USE CD-ROM
...................................................................................................................................................................................................................................

Installation of LLMAN from the SWP TCO SUITE Rel.1.8


CD-ROM
When to use
This is a sub-procedure of the “Procedure for the LLMA installation, configuration and
use” (p. 16-3)

Related Information
This task does not have any related information.

Before you begin


Verify you have the PC Administrator privileges, necessary to perform these installation
operations.

Sequence of steps
...................................................................................................................................................................................................

1 In the Figure 14-2, “SWP TCO SUITE Rel.1.8 Advanced Settings screen” (p. 14-4)) click
on button Serial–F–Interface Driver Installation
This function performs the installation for the "Alcatel Lower Layers Manager" together
with the drivers needed for the "Alcatel Virtual etwork Card for Lower Layers" and the
help documentation (a splash screen will appear as soon as the button applet is clicked
and the installation begins).

...................................................................................................................................................................................................

2 User is asked to select installation and application language:


DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-5
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Installation of LLMAN from the SWP TCO SUITE Rel.1.8
DRAFT
USE CD-ROM
...................................................................................................................................................................................................................................

...................................................................................................................................................................................................

3 In subsequent screen, click on " ext" button

...................................................................................................................................................................................................

4 If a previous version of LLMA is not found, the installation of LLMA is performed:


see next Step 5
If a previous version of LLMA is found, the following screen appears:
DRAFT

...................................................................................................................................................................................................................................
16-6 3DB 75003 CAAA
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Installation of LLMAN from the SWP TCO SUITE Rel.1.8

DRAFT
USE CD-ROM
...................................................................................................................................................................................................................................

Leave the choice "upgrade" selected, then click on " ext" button.
This causes:
• at first, the Figure 16-1, “Remotion of previous version of LLMA ” (p. 16-8)
• and, secondly, after having clicked "OK" button, the installation of the new version of
LLMA : see next Step 5
ote: the new version of LLMA is fully compatible with all 1320CT–based
applications.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-7
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Installation of LLMAN from the SWP TCO SUITE Rel.1.8
DRAFT
USE CD-ROM
...................................................................................................................................................................................................................................

Figure 16-1 Remotion of previous version of LLMAN

...................................................................................................................................................................................................

5 After the installation completion, the Figure 16-2, “Alcatel Lucent Lower Layers
Manager installation completion” (p. 16-9) screen appears.
In this screen deselect the choice "Configure Lower Layer" (this operation can be done
only after the installation and configuration of the Virtual etwork Card, as described in
“Lower Layer settings” (p. 16-15)), then click on "Finish" button.
ote: if you leave selected the choice “Display the network component setup help”, the
Figure 16-4, “Start page of “Lower Layers IP Manager Setup Help”” (p. 16-13) opens.
Please note that, for the correct configuration process, you are strongly suggested to open
this help, and to perform all operations in the stated sequence.
You have now completed the Installation of LLMA from the SWP TCO SUITE Rel.1.8
CD-ROM.
You do no longer need to use the SWP TCO SUITE Rel.1.8 CD-ROM, that can be
extracted from the PC.
ow, please read “Functions and helps available after the LLMA installation”
(p. 16-10)
DRAFT

...................................................................................................................................................................................................................................
16-8 3DB 75003 CAAA
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Installation of LLMAN from the SWP TCO SUITE Rel.1.8

DRAFT
USE CD-ROM
...................................................................................................................................................................................................................................

Figure 16-2 Alcatel Lucent Lower Layers Manager installation completion

E...................................................................................................................................................................................................
N D O F S T E P S

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-9
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Installation of LLMAN from the SWP TCO SUITE Rel.1.8
DRAFT
USE CD-ROM
...................................................................................................................................................................................................................................

Functions and helps available after the LLMAN installation


The Figure 16-3, “Available LLMA functions and helps (Windows XP example)”
(p. 16-10) shows the LLMA functions available after the “Installation of LLMA from
the SWP TCO SUITE Rel.1.8 CD-ROM” (p. 16-5).
The Help files contain all necessary information to install and configure a Virtual
etwork Card, so that, in the following, only reference to them is given, without
repeating their contents.
IMPORTA T WAR I G FOR WI DOWS VISTA
• The help files listed above have the “.hlp” extension…
• …in native mode, Windows Vista does no longer support such files…
• …to view “.hlp” files on Windows Vista, you need to install the application
WinHlp32.exe…
• …to download it, connect to www.microsoft.com/downloads , and look for it.
ow, you must proceed with the “Installation and configuration of a Virtual etwork
adapter for LLMA ” (p. 16-11).

Figure 16-3 Available LLMAN functions and helps (Windows XP example)

Legend:

A see “Installation and configuration of a Virtual etwork adapter for LLMA ”


(p. 16-11)
B see “Lower Layer settings” (p. 16-15)
C see “How to start and use the LLMA application” (p. 16-20)
DRAFT

...................................................................................................................................................................................................................................
16-10 3DB 75003 CAAA
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Installation and configuration of a Virtual Network

DRAFT
USE adapter for LLMAN
...................................................................................................................................................................................................................................

Installation and configuration of a Virtual Network adapter for


LLMAN
When to use
This is a sub-procedure of the “Procedure for the LLMA installation, configuration and
use” (p. 16-3).

Related Information
This task does not have any related information.

Before you begin


Verify you have the PC Administrator privileges, necessary to perform these installation
operations.

Sequence of steps
...................................................................................................................................................................................................

1 Foreword
After the “Installation of LLMA from the SWP TCO SUITE Rel.1.8 CD-ROM”
(p. 16-5) previously executed, it is necessary, for E connection using TCP/IP through
serial port, to configure a Virtual etwork Card.
In fact, Alcatel–Lucent Lower Layers Manager, in order to manage IP packets over its
point to point links (either Serial port or Modem), uses a virtual (i.e. software) network
adapter.
This virtual network adapter, depending on the operating system as described in next
paragraph Step 2, can be:
• the Microsoft Loopback adapter; in this case, also the Logical Link Control
Protocol for Alcatel–Lucent Lower Layers must be installed
• or the Alcatel–Lucent Virtual etwork Card for Lower Layers.
...................................................................................................................................................................................................

2 Operations sequence, according to Windows platform


Proceed as follows:
1. Do Start → Programs → Alcatel–Lucent → Lower Layers → Lower Layers IP
Manager Setup Help (see Figure 16-3, “Available LLMA functions and helps
(Windows XP example)” (p. 16-10)), and then display the first document:Figure 16-4,
“Start page of “Lower Layers IP Manager Setup Help”” (p. 16-13) opens
According to the Windows platform of your PC, choose the proper help, and strictly
follow it, to install and configure the Virtual etwork Card.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-11
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Installation and configuration of a Virtual Network
DRAFT
USE adapter for LLMAN
...................................................................................................................................................................................................................................

If you have installed and configured:


• the Microsoft Loopback adapter, you must proceed with next sub-step 2
• the Alcatel–Lucent Virtual etwork Card for Lower Layers, you must proceed
with the “Lower Layer settings” (p. 16-15)
2. If, in previous step 1, you have installed and configured the Microsoft Loopback
adapter, now you must install and configure the Logical Link Control Protocol for
Alcatel–Lucent Lower Layers.
To do that, perform Start → Programs → Alcatel–Lucent → Lower Layers →
Lower Layers LLC Protocol Setup Help (see Figure 16-3, “Available LLMA
functions and helps (Windows XP example)” (p. 16-10)), and then display the first
document: Figure 16-5, “Start page of “Lower Layers LLC Protocol Setup Help””
(p. 16-14) opens.
According to the Windows platform of your PC, choose the proper help, and strictly
follow it, to install and configure the Lower Layers LLC Protocol.
Then you must proceed with the “Lower Layer settings” (p. 16-15)
DRAFT

...................................................................................................................................................................................................................................
16-12 3DB 75003 CAAA
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Installation and configuration of a Virtual Network

DRAFT
USE adapter for LLMAN
...................................................................................................................................................................................................................................

Figure 16-4 Start page of “Lower Layers IP Manager Setup Help”

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-13
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Installation and configuration of a Virtual Network
DRAFT
USE adapter for LLMAN
...................................................................................................................................................................................................................................

Figure 16-5 Start page of “Lower Layers LLC Protocol Setup Help”

END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
16-14 3DB 75003 CAAA
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Lower Layer settings

DRAFT
USE
...................................................................................................................................................................................................................................

Lower Layer settings


When to use
This is a sub-procedure of the “Procedure for the LLMA installation, configuration and
use” (p. 16-3).

Related Information
This task does not have any related information.

Before you begin


Verify you have the PC Administrator privileges, necessary to perform these installation
operations. Just reading information, does not require them.

Sequence of steps
...................................................................................................................................................................................................

1 Foreword
Having followed the instructions given in the previous sub-procedures of this Appendix,
you have installed and configured the virtual network adapter proper for the Windows
platform of your PC.
ow you must associate such a virtual network adapter to the PC's RS232 serial port
(COMx) that will be used for the PC- E physical connection.
To do that, perform following steps:
...................................................................................................................................................................................................

2 Perform Start ⇒ Programs ⇒ Alcatel–Lucent ⇒ Lower Layers ⇒ Lower Layers


Settings (see Figure 16-3, “Available LLMA functions and helps (Windows XP
example)” (p. 16-10)): the Figure 16-6, “Lower Layers Settings screen” (p. 16-16) opens.
...................................................................................................................................................................................................

3 To fill properly the fields of this Lower Layers Settings screen, click its Help button,
which opens the associated help (Figure 16-7, “Start page of “Lower Layers Settings
Help”” (p. 16-17)), and proceed as specified.
ote. This help can be also obtained performing Start ⇒ Programs ⇒ Alcatel–Lucent
⇒ Lower Layers ⇒ Lower Layers Settings Help (see Figure 16-3, “Available LLMA
functions and helps (Windows XP example)” (p. 16-10))
...................................................................................................................................................................................................

4 ow, you must proceed with “Check/set the " etwork Connections" order” (p. 16-18)
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-15
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Lower Layer settings
DRAFT
USE
...................................................................................................................................................................................................................................

Figure 16-6 Lower Layers Settings screen


DRAFT

...................................................................................................................................................................................................................................
16-16 3DB 75003 CAAA
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Lower Layer settings

DRAFT
USE
...................................................................................................................................................................................................................................

Figure 16-7 Start page of “Lower Layers Settings Help”

END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-17
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Check/set the "Network Connections" order
DRAFT
USE
...................................................................................................................................................................................................................................

Check/set the "Network Connections" order


When to use
This is a sub-procedure of the “Procedure for the LLMA installation, configuration and
use” (p. 16-3).

Related Information
This task does not have any related information.

Before you begin


Verify you have the PC Administrator privileges, necessary to perform these installation
operations. Just reading information, does not require them.

Sequence of steps
For the SWP to operate correctly, it is necessary that the Virtual etwork Card (that you
have associated to the PC’s RS232 serial port during the “Lower Layer settings”
(p. 16-15) procedure) is always the first one in the " etwork Connections" list.
To perform this check, operate as follows:
...................................................................................................................................................................................................

1 Start → Control Panel → Network Connections


The Figure 16-8, “Check for the " etwork Connections" order” (p. 16-19) opens.
...................................................................................................................................................................................................

2 In the field "LAN or High Speed Internet", select the Device ame "Alcatel Virtual
Network Card for Lower Layers"
...................................................................................................................................................................................................

3 From "Advanced" menu, select "Advanced Settings"


...................................................................................................................................................................................................

4 In the relevant screen (Figure 16-8, “Check for the " etwork Connections" order”
(p. 16-19)) verify that it is the first in the list. If necessary, move its position, using
suitable arrows.
Warning about the " etwork Connections" order: whenever, after the completion of
this installation and configuration procedure, you must install a new network card, always
verify that this Virtual etwork Card is always the first one in the “ etwork
Connections” list.
...................................................................................................................................................................................................

5 End of procedure: you have completed the installation, configuration and check of the
Virtual etwork Card for Lower Layers.
The LLMA application is now available. To use it, refer to “How to start and use the
DRAFT

LLMA application” (p. 16-20)


...................................................................................................................................................................................................................................
16-18 3DB 75003 CAAA
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND Check/set the "Network Connections" order

DRAFT
USE
...................................................................................................................................................................................................................................

Figure 16-8 Check for the "Network Connections" order

END O F S T E P S
...................................................................................................................................................................................................

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-19
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND How to start and use the LLMAN application
DRAFT
USE
...................................................................................................................................................................................................................................

How to start and use the LLMAN application


When to use
When you must access a E by its F-interface.

Related Information
This task does not have any related information.

Before you begin


LLMA can be started only if you have successfully executed all operations described in
previous paragraphs of this Appendix.
LLMA must be started before the start of the WebEML (which, in turn, opens the EtO
screen), or before the start of the 1320CT (which, in turn, opens the ES screen).
Warning about the PC settings: after the LLMA start–up, during system hibernate or
standby, the LLMA could not working correctly after reentering the system. So, when
using LLMA , it is mandatory that the PC desktop Properties System standby and
System hibernates are both set to ever, as shown in Figure 16-9, “PC desktop
Properties settings for LLMA ” (p. 16-21)
DRAFT

...................................................................................................................................................................................................................................
16-20 3DB 75003 CAAA
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND How to start and use the LLMAN application

DRAFT
USE
...................................................................................................................................................................................................................................

Figure 16-9 PC desktop Properties settings for LLMAN

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-21
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND How to start and use the LLMAN application
DRAFT
USE
...................................................................................................................................................................................................................................

LLMAN start-up with 1320CT


...................................................................................................................................................................................................

1 In this case, if necessary, LLMA is started automatically. It can also be started manually,
as described in “LLMA start-up with WebEML” (p. 16-22) below.
E...................................................................................................................................................................................................
N D O F S T E P S

LLMAN start-up with WebEML


In this case LLMA must be always started manually. To do that, perform following
operations:
...................................................................................................................................................................................................

1 From WI DOWS screen, start LLMA performing Start ⇒ Programs ⇒


Alcatel–Lucent ⇒ Lower Layers ⇒ Lower Layers Manager (see Figure 16-3,
“Available LLMA functions and helps (Windows XP example)” (p. 16-10))
...................................................................................................................................................................................................

2 LLMA starts, and its animated symbol appears in operating system “tray bar”

This animated icon indicates the communication status:


• if the physical link between the computer and the equipment is missing, the red icon
appears;
• during the attempts to establish the communication between the computer and the
connected equipment, the yellow icon appears;
• while the communication between the computer and the connected equipment is
established, the Alcatel–Lucent icon appears.
In this case, double–click on the icon, to open the LLMA screen: see next Step 3
...................................................................................................................................................................................................

3 Main fields and command buttons of the Figure 16-10, “LLMA screen” (p. 16-23)
DRAFT

...................................................................................................................................................................................................................................
16-22 3DB 75003 CAAA
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND How to start and use the LLMAN application

DRAFT
USE
...................................................................................................................................................................................................................................

Figure 16-10 LLMAN screen

...................................................................................................................................................................................................

4 Click on "Close" button to close the screen, leaving LLMA program running.
ow you can start EtO (or 1320CT) using the E's F interface.
E...................................................................................................................................................................................................
N D O F S T E P S
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 16-23
Issue 1 September 2009
Appendix C: LLMAN INSTALLATION, CONFIGURATION AND How to start and use the LLMAN application
DRAFT
USE
...................................................................................................................................................................................................................................

Full information regarding the use of the LLMAN application


Clicking on the Help button of Figure 16-10, “LLMA screen” (p. 16-23), the relevant
full help is opened; explore it to find information not given in this Appendix.
ote: this help can be also obtained performing Start ⇒ Programs ⇒
Alcatel–Lucent ⇒ Lower Layers ⇒ Lower Layers Manager Help (see Figure
16-3, “Available LLMA functions and helps (Windows XP example)” (p. 16-10))
DRAFT

...................................................................................................................................................................................................................................
16-24 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
17 17
Appendix D: CT-NE
CONNECTION VIA PUBLIC
SWITCHED TELEPHONE
NETWORK
Overview
Purpose
This Appendix explains the operations necessary to allow the remote connection to the
E's F–Interface, from a local PC configured as CT, through a switched telephone line of
the standard Public Telephone etwork.

Contents

Introduction 17-2
Certified equipment 17-2
Connection cables 17-3
Modem setting 17-5
PC laptop "Dell Latitude" setting 17-9
Setting up the connection 17-10
Changing the ECT-equipment connection speed 17-13

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 17-1
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Introduction
DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

Introduction
This kind of remote control is shown in Figure 17-1, “ECT-Equipment connection via
Public Switched Telephone etwork” (p. 17-2), and is possible for a single equipment as
well as for a whole subnetwork.

Figure 17-1 ECT-Equipment connection via Public Switched Telephone Network

Certified equipment
The connection has been successfully tested:
1. with the following types of modems:
a. Modem Sportster Flash (US Robotics)
b. Modem TD-32 AC (Westermo Teleindustri AB)
c. 3Com 56K Faxmodem
2. with the following types of PC:
a. with external modem:
characteristics as in “PC requirements to run and install the SWP TCO SUITE
Rel.1.8” (p. 1-4)
b. with internal modem:
PC laptop Dell Latitude:

- Processor equipped: PE TIUM III


- Operating system: Microsoft Windows 2000 v. 5.00.2195 service pack
DRAFT

2
...................................................................................................................................................................................................................................
17-2 3DB 75003 CAAA
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Certified equipment

DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

- RAM equipped: 128 Mbytes


- Hard disk equipped: 10 Gbytes
- Internal Modem: 3COM 56K v.90 Mini PCI MODEM

3. and with the following local/remote combinations:

Local Modem Remote Modem


Sportster Flash
Sportster Flash TD 32 AC
3Com 56K Faxmodem
TD 32 AC
TD 32 AC Sportster Flash
3Com 56K Faxmodem
TD 32 AC
PC laptop Dell Latitude as in point 2 b
Sportster Flash
above
3Com 56K Faxmodem

Testing the connection with different types of modems is fully on Customer's charge.

Connection cables
In the following figures, the cables for the connections are described:

Figure 17-2 ECT-Local external Modem cable

PC/ECT (DTE) Local Modem (DCE)


Cannon 9 pins female Cannon 25 pins male

DCD 1 8 DCD
TD 2 3 TD
RD 3 2 RD
DTR 4 4 RTS
DSR 6 5 CTS
RTS 7 6 DSR
CTS 8 20 DTR
GND 5 7 GND
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 17-3
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Connection cables
DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

Figure 17-3 F Interface-Remote Modem cable

Remote Modem (DCE) F Interface (DCE)


Cannon 25 pins male Cannon 9 pins male

TD 2 3 TD
RD 3 2 RD
RTS 4 7 RTS
CTS 5 8 CTS
DSR 6 6 DSR
CTS 20 4 DTR
GND 7 5 GND
DRAFT

...................................................................................................................................................................................................................................
17-4 3DB 75003 CAAA
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Modem setting

DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

Modem setting
When to use
To set the local and remote modems (see Figure 17-1, “ECT-Equipment connection via
Public Switched Telephone etwork” (p. 17-2))

Related Information
This task does not have any related information.

Before you begin


o checks are required.

Setting of Sportster Flash Modem & 3Com 56K Faxmodem


...................................................................................................................................................................................................

1 This modem requires only a SW setting via serial port.


There is a little difference between local and remote modems setting (refer to Figure 17-1,
“ECT-Equipment connection via Public Switched Telephone etwork” (p. 17-2) for the
distinction between "local" and "remote"), relevant to the auto-answer option that must be
set in the remote modem and not set in the local modem.
E...................................................................................................................................................................................................
N D O F S T E P S

Local modem setting


To set the local modem, proceed as follows:
...................................................................................................................................................................................................

1 Only for external modem: connect the local modem to the PC/ECT with the cable of
Figure 17-2, “ECT-Local external Modem cable” (p. 17-3).
...................................................................................................................................................................................................

2 Only for external modem: Power and switch on the local modem.
...................................................................................................................................................................................................

3 On the PC, activate program HyperTerminal and configure the PC-Modem serial line with
the following parameters:

* Bits per second: 38400


* Data Bits: 8
* Parity: one
* Stop Bit: 1
* Flow control: one
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 17-5
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Modem setting
DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

...................................................................................................................................................................................................

4 Execute and store the modem set-up, writing the following commands in the
HyperTerminal program window:

AT&F1<Return> (Best PC default configuration recall)


ATT<Return> (Tone Dialling instead than Pulse Dialling)
ATX3<Return> (Second Signal disabling, avoids problems with PABX)
AT&W0<Return> (Configuration store in VRAM 0)

...................................................................................................................................................................................................

5 ow, setting has been completed. External Modem can be switched off and disconnected,
if necessary.
ote: For confirmation, the modem configuration can be checked writing the
command "ATI4<Return>" in the HyperTerminal program window.
Information displayed should be as follows:

ATI4
U.S. Robotics Sportster Flash 56000 Settings...

B0 E1 F1 L2 M1 Q0 V1 X3 Y0
BAUD=38400 PARITY=N WORDLEN=8
DIAL=TONE OFF LINE CID=0

&A3 &B1 &C1 &D2 &H1 &I0 &K1


&M4 &N0 &P0 &R2 &S0 &T5 &U0 &Y1

S00=000 S01=000 S02=043 S03=013 S04=010 S05=008 S06=004


S07=060 S08=002 S09=006 S10=014 S11=072 S12=050 S13=000
S15=000 S16=000 S18=000 S19=000 S21=010 S22=017 S23=019
S25=005 S27=001 S28=008 S29=020 S30=000 S31=128 S32=002
S33=000 S34=000 S35=000 S36=014 S38=000 S39=012 S40=000
S41=004 S42=000

LAST DIALED #:

E...................................................................................................................................................................................................
N D O F S T E P S

Remote modem setting


To set the remote modem, proceed as follows:
...................................................................................................................................................................................................

1 carry out same Step 1, Step 2, Step 3 as for local modem setting
DRAFT

...................................................................................................................................................................................................................................
17-6 3DB 75003 CAAA
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Modem setting

DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

...................................................................................................................................................................................................

2 execute and store the modem set-up, writing in the HyperTerminal program window the
same commands described in Step 4 for the local modem setting, and adding the
following command:
ATS=1<Return> (Auto-answering setting)
...................................................................................................................................................................................................

3 now, setting has been completed. Modem can be switched off and disconnected, if
necessary.
ote: For confirmation, the modem configuration can be checked writing the
command "ATI4<Return>" in the HyperTerminal program window.
Information displayed should be equal to that displayed for the local modem, with only
the difference for field S00:

S00=001 S01=000 S02=043 S03=013 S04=010 S05=008 S06=004

E...................................................................................................................................................................................................
N D O F S T E P S

TD-32 AC Modem setting


This modem requires an initial HW set-up via dip-switches and a SW setting via serial
port.
To set the modem, both local and remote, proceed as follows:
...................................................................................................................................................................................................

1 The initial HW set-up via dip-switches is indicated in Figure 17-4, “TD-32 AC modem
dip-switch setting” (p. 17-7) here below:

Figure 17-4 TD-32 AC modem dip-switch setting

ON ON ON

1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4
SW3 SW2 SW1

ON ON

1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
SW5 SW4
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 17-7
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Modem setting
DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

...................................................................................................................................................................................................

2 Connect the local modem to the PC/ECT with the cable of Figure 17-2, “ECT-Local
external Modem cable” (p. 17-3).
...................................................................................................................................................................................................

3 Power on the local modem (there is no an O /OFF switch).


...................................................................................................................................................................................................

4 On the PC, activate program HyperTerminal and configure the PC-Modem serial line with
the following parameters:

* Bits per second: 38400


* Data Bits: 8
* Parity: one
* Stop Bit: 1
* Flow control: one

...................................................................................................................................................................................................

5 Execute and store the modem set-up, writing the following commands in the
HyperTerminal program window:

AT&F1<Return> (Best PC default configuration recall)


AT&K0<Return> (DTE/DCE flow control disabling)
ATA<Return> (Automatic Answer enabling --> Only on Remote modem and wait
the message " O CARRIER")
AT&W0<Return> (Configuration store in VRAM 0)
AT&Y0<Return> (Configuration Set to load at switch-on: VRAM 0)

...................................................................................................................................................................................................

6 ow, setting has been completed. Modem can be switched off and disconnected, if
necessary.
ote: For confirmation, the modem configuration can be checked writing the
command "AT\S<Return>" in the HyperTerminal program window.
Information displayed should be as follows:
DRAFT

...................................................................................................................................................................................................................................
17-8 3DB 75003 CAAA
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Modem setting

DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

END O F S T E P S
...................................................................................................................................................................................................

PC laptop "Dell Latitude" setting


The following setting must be done:
Control Panel -> Alcatel Lower Layer -> Serial port -> COM3 and Serial port selected

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 17-9
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Setting up the connection
DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

Setting up the connection


When to use
To set up the connection between the CT and the remote E, to login it (see Figure 17-1,
“ECT-Equipment connection via Public Switched Telephone etwork” (p. 17-2))

Related Information
This task does not have any related information.

Before you begin


Verify that LLMA is available in your CT (see Chapter 16, “Appendix C: LLMA
I STALLATIO , CO FIGURATIO A D USE”)

Sequence of steps
In order to activate the connection and operate the ECT in remote way, proceed as
specified here below. Refer to Figure 17-1, “ECT-Equipment connection via Public
Switched Telephone etwork” (p. 17-2) for the distinction between "local" and "remote"
modems.
ote: leaving the remote modem permanently switched on and permanently connected to
F–interface and telephone line, operations set up by following Step 1 to Step 4, it is
possible to access the equipment in any moment.
...................................................................................................................................................................................................

1 Connect the remote modem to equipment's F interface with the cable of Figure 17-3, “F
Interface-Remote Modem cable” (p. 17-4).
...................................................................................................................................................................................................

2 Connect the remote modem to the telephone line (as far as Sportster Flash model is
concerned, the connector to be used is the nearest to that used for the connection with
equipment's F interface and signed with the 'wall' symbol).
...................................................................................................................................................................................................

3 Power and switch on the remote modem.


...................................................................................................................................................................................................

4 Be sure remote equipment is switched on and correctly working.


...................................................................................................................................................................................................

5 Connect the local modem to the PC/ECT (with the cable of Figure 17-2, “ECT-Local
external Modem cable” (p. 17-3)) on the serial port assigned for the connection with F
interface (usually COM1).
DRAFT

...................................................................................................................................................................................................................................
17-10 3DB 75003 CAAA
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Setting up the connection

DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

...................................................................................................................................................................................................

6 Connect the local modem to the telephone line (as far as Sportster Flash model is
concerned, the connector to be used is the nearest to that used for the connection with
equipment's F interface).
...................................................................................................................................................................................................

7 Power and switch on the local modem.


...................................................................................................................................................................................................

8 On the PC, activate program HyperTerminal and configure the PC-Local Modem serial
line with the following parameters:

* Bits per second: 38400


* Data Bits: 8
* Parity: one
* Stop Bit: 1
* Flow control: one

...................................................................................................................................................................................................

9 For PC laptop Dell Latitude only, type the following command inside HyperTerminal
program:
'AT&C0&D0&R1'
ote: this command must be typed every time the Hyper terminal session is opened
(this command is not stored in the modem V RAM).
...................................................................................................................................................................................................

10 Execute the telephone call from the PC writing the following command in the
HyperTerminal program window:
ATDnnn<Return>
where "nnn" is the telephone network number associated to the remote telephone line
(that which the remote modem is connected to).
...................................................................................................................................................................................................

11 Wait the message indicating the successful connection between local and remote modems.
ote: The message text depends on the modem type, as follows:

"CO ECT 14400/ARQ/V32/LAPM/ (Sportster Flash)


V42BIS"
"CO ECT 38400" (TD 32 AC)

...................................................................................................................................................................................................

12 Close HyperTerminal program.


DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 17-11
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Setting up the connection
DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

...................................................................................................................................................................................................

13 Activate the ECT applicative SW as usual.


...................................................................................................................................................................................................

14 At the end of the job, after having logged out from the ECT applicative SW, close the
connection between local and remote modems, switching off the local modem or
physically disconnecting the cable connecting it to the PC.
END O F S T E P S
...................................................................................................................................................................................................
DRAFT

...................................................................................................................................................................................................................................
17-12 3DB 75003 CAAA
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Changing the ECT-equipment connection speed

DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

Changing the ECT-equipment connection speed


When to use
This procedure is meant to use modems with speed different from that documented in
previous paragraphs, giving the possibility to configure the CT connection through
modem (speed values: 9600, 19200, 38400, 56000) with automatic management of
modem set-up and phone call at CT start-up.
To make change operative, the following operations are necessary:
• at equipment side, the configuration must be set-up as explained in the “Configuration
at E side” (p. 17-13) below,
• at PC side, the configuration must be set-up as explained in the “Configuration at PC
side” (p. 17-13),
• as far as the modem is concerned, please refer to the constructor documentation.

Related Information
This task does not have any related information.

Before you begin


Verify that the CT- E connection can be executed with the default modem speed.

Configuration at NE side
...................................................................................................................................................................................................

1 Login the E through the Alarms & Settings function (see Chapter 6, “ALARMS &
SETTI GS”) using a login profile allowing the Modem Speed change (see Table 6-1,
“Operations allowed in the Alarms & Settings Main Menu screen, according to the AWY
type and Login profile” (p. 6-6)),
...................................................................................................................................................................................................

2 enter the Modem Speed screen and set the required speed (see “Modem Speed”
(p. 6-19)).
E...................................................................................................................................................................................................
N D O F S T E P S

Configuration at PC side
To configure the modem with the relevant speed, enter the menu Settings -> Control
Panel of the Operating System and open the Alcatel Lower Layers utility. The menu of
Figure 17-5, “Alcatel Lower Layers utility” (p. 17-14) opens.
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 17-13
Issue 1 September 2009
Appendix D: CT-NE CONNECTION VIA PUBLIC SWITCHED Changing the ECT-equipment connection speed
DRAFT
TELEPHONE NETWORK
...................................................................................................................................................................................................................................

Figure 17-5 Alcatel Lower Layers utility

In the Sub-network Type field select Modem.


In the Modem field select the suitable Modem type.
In the Modem speed field select the suitable speed (9600, 19200 or 38400) and click on
OK.
In the Phone Number field enter the phone number, which will be automatically called
at the ECT start-up.
DRAFT

...................................................................................................................................................................................................................................
17-14 3DB 75003 CAAA
Issue 1 September 2009
DRAFT
18 18
Appendix E: SWP TCO
SUITE Rel.1.8
DEINSTALLATION

Overview
Purpose
This Appendix describes how to de-install from the PC the SWP TCO SUITE Rel.1.8
components.

Contents

Deinstallation of "Local copy of TCO Suite" and of "Local copy of WebEML" 18-2
Deinstallation of Alcatel Lower Layers Manager & Tiny Tools 18-2
Deinstallation of JRE 18-3

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 18-1
Issue 1 September 2009
Appendix E: SWP TCO SUITE Rel.1.8 DEINSTALLATION Deinstallation of "Local copy of TCO Suite" and of "Local
DRAFT
copy of WebEML"
...................................................................................................................................................................................................................................

Deinstallation of "Local copy of TCO Suite" and of "Local copy


of WebEML"
When to use
When you want to remove such applications from your PC.

Related Information
This task does not have any related information.

Before you begin


ote: this operation does not require the PC Administrator privileges

Sequence of steps
...................................................................................................................................................................................................

1 Delete from the desktop the shortcuts created in Step 6 and Step 7 of the procedure
“Operations sequence for the preparation of the Craft Terminal” (p. 14-2).
...................................................................................................................................................................................................

2 Restart the PC
...................................................................................................................................................................................................

3 Delete the folder created in Step 1 of the procedure “Operations sequence for the
preparation of the Craft Terminal” (p. 14-2).
END O F S T E P S
...................................................................................................................................................................................................

Deinstallation of Alcatel Lower Layers Manager & Tiny Tools


ote: this operation requires the PC Administrator privileges
These components have been installed as described in Chapter 16, “Appendix C:
LLMA I STALLATIO , CO FIGURATIO A D USE”
Before de-installing them, be sure that they are not used by other still existing
applications (e.g. other Alcatel-Lucent 1320CT-based or EtO-based applications).
From Control Panel select Add/Remove Programs and de-install the related components.
DRAFT

...................................................................................................................................................................................................................................
18-2 3DB 75003 CAAA
Issue 1 September 2009
Appendix E: SWP TCO SUITE Rel.1.8 DEINSTALLATION Deinstallation of JRE

DRAFT
...................................................................................................................................................................................................................................

Deinstallation of JRE
ote: this operation requires the PC Administrator privileges
The JRE (version required for SWP TCO SUITE Rel.1.8) has been installed as described
in Chapter 15, “Appendix B: JRE I STALLATIO A D SWP TCO SUITE Rel.1.8
START UP”
Before de-installing it, be sure that it is not used by other still existing applications.
From Control Panel select Add/Remove Programs and de-install the related component.

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 18-3
Issue 1 September 2009
DRAFT DRAFT
DRAFT
19 EDITORIAL INFORMATION
19

Overview
Purpose
This chapter is for internal Alcatel-Lucent internal purpose only.

Contents

Chapter scope, handbook identification, and archive method 19-1


Description of changes with respect to the previous Issue 19-2
Document history 19-5

Chapter scope, handbook identification, and archive method


Chapter scope
This chapter is for internal Alcatel-Lucent internal purpose only.
It is visible only in the draft editions.
It is not visible in the final released edition (pdf and html).
Its file is maintained in the source file folder archived in PDM, as last chapter of the
book.

Handbook identification
SWP TCO SUITE Rel.1.8 User Manual
3DB 75003 CAAA Issue.01
ECR: O E
ECO: O E
Main used editing tools:
• OneDoc EPIC 1.1.0
• CorelDraw 12
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 19-1
Issue 1 September 2009
EDITORIAL INFORMATION Chapter scope, handbook identification, and archive
DRAFT
method
...................................................................................................................................................................................................................................

Archive method
The following files are archived in PDM:
• the final released PDF file without this chapter, for delivery to Customers, or for its
insertion in the SWP TCO SUITE Rel.1.8 CD-ROM.
• one zipped folder containing the final released PDF and HTML versions of the
manual, for its insertion in the SWP TCO SUITE Rel.1.8 CD-ROM, including:
– a welcome page, for the links to the PDF and HTML versions of the manual
– the final released PDF file without this chapter
– the final released HTML version without this chapter
• one zipped folder containing:
– the final draft PDF file with this chapter, and with revision bars (see “How
changes are denoted” (p. 19-2))
– the source files.

Source reuse
ote: This information is for Technical Writers only:
Before to use this source for a new Issue, remove the lines ( **Comment: EXT
FIGURE CHA GED OR EW **)(see “How changes are denoted” (p. 19-2))

Main reference documentation


1. TCO R.1.8 SRS 3DB75100AAAADSZZA Ed.01 14-05-09.
2. 9400AWY R.2.1.4 SRS 3DB16200AAAADSZZA Ed.01 21-04-09.
3. AWY R2.1.4 & TCO R1.8 DR1 R&D (ppt presentation) 27-05-08.

Description of changes with respect to the previous Issue


Identification of the previous Issue, used for the implementation of this manual
• SWP TCO SUITE Rel.1.7 User Manual
• 3DB 75003 BAAA Issue 02 archived in PDM and released.

How changes are denoted


Changes are denoted in the pdf draft versions only:
• changes in text and tables are denoted by revision bars, and changed text is underlined
• changes in figures are denoted by a comment line, before the figure, like this:
( **Comment: EXT FIGURE CHA GED OR EW **)
The final version (not draft) has neither revision bars nor comment lines.
DRAFT

...................................................................................................................................................................................................................................
19-2 3DB 75003 CAAA
Issue 1 September 2009
EDITORIAL INFORMATION Description of changes with respect to the previous Issue

DRAFT
...................................................................................................................................................................................................................................

First draft version of June 24, 2009


Reference SWP version
Pre release SWP TCO SUITE Rel.1.8.3
List of changes with respect to the Issue 2 of the “SWP TCO SUITE Rel.1.7 User
Manual”
Main changes on text and tables:
• everywhere TCO 1.7 replaced by TCO 1.8
• “What's new” (p. xvii)
• “ otes on present edition” (p. xx)
• “Language options of the SWP TCO SUITE Rel.1.8” (p. 2-5)
• where necessary, added info for AWY V2.1.4,
in particular:
– Table 1-1, “9400AWY Es and associated User Manuals” (p. 1-3)
– “CD-ROMs distributed to Customers” (p. 2-2)
– “Security policy” (p. 3-16)
– “Licence information” (p. 4-4)
– “Procedures for the management of the E software” (p. 4-6)
– “Checks the operator must do before accessing a E” (p. 4-14)
– “Operational & Maintenance 1320CT” (p. 4-26)
– “Configuration file conversion feature” (p. 5-7)
– Table 6-1, “Operations allowed in the Alarms & Settings Main Menu screen,
according to the AWY type and Login profile” (p. 6-6)
– “Licence Info” (p. 6-20)
– “Operations with EtO” (p. 8-6)
– “Configuration menu” (p. 9-28)
– “Diagnosis menu” (p. 9-29)
– “ E SWP upgrade: introduction, restrictions, and upgrade cases” (p. 12-2)
– Introduction of “Only for upgrade to 9400AWY V2.0.6 or V2.1.2: how to
perform, by WebEML, the SWP download to the E, and its activation” (p. 12-4)
– point 6 of “Management of “security by access lists”” (p. 13-7)
• “Constraints for E access by EtO” (p. 8-3)
• “Main tool bar” (p. 9-9)
• point 4 of “Views menu” (p. 9-22)
• for more clearness, in Chapter 11, “MIB MA AGEME T”, the description topics
have been converted to procedure topics.
• Chapter 14, “Appendix A: PREPARATIO OF THE CRAFT TERMI AL BASED
O SWP TCO SUITE Rel.1.8”
DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 19-3
Issue 1 September 2009
EDITORIAL INFORMATION Description of changes with respect to the previous Issue
DRAFT
...................................................................................................................................................................................................................................

Figures modified:( ote: only numbered figures are listed)


• Figure 4-1, “Flash Card content” (p. 4-3)
• Figure 5-2, ““ ot E–interactive Provisioning Tool”: choice of E version” (p. 5-3)
• Figure 6-1, “Alarms & Settings Main Menu screen” (p. 6-4)
• Figure 6-10, “Alarms & Settings "Licence Info" request” (p. 6-20)
• Figure 8-1, “Starting EtO clicking the shortcut to the Local Copy of WebEML”
(p. 8-6)
• Figure 9-1, “9400AWY Main view organization (example)” (p. 9-4)
• Figure 9-2, “Main tool bar” (p. 9-9)
• Figure 11-1, “Default repository folders of MIB back-up files” (p. 11-3)
• Figure 11-2, “Start of the MIB back-up (example)” (p. 11-5)
• Figure 11-3, “MIB backup completed” (p. 11-5)
• Figure 11-4, “Check of the creation of the required MIB backup file (example)”
(p. 11-6)
• Figure 11-5, “Start of the MIB restore (example)” (p. 11-8)
• Figure 11-7, “Remotion of a MIB back-up file from the repository folder (example)”
(p. 11-11)
• Figure 11-8, “MIB back-up file removed from the repository folder (example)”
(p. 11-12)
• Figure 14-1, “Creation of folder for repository of SWP TCO SUITE Rel.1.8 files”
(p. 14-3)
• Figure 14-3, “Local copy of TCO Suite” (p. 14-6)
• Figure 14-4, “Local copy of WebEML (JUSM/CT)” (p. 14-8)

Second draft edition of September 15, 2009


Reference SWP version
Pre release SWP TCO SUITE Rel.1.8.3
List of changes with respect to the first draft version of June 24, 2009
• in point 2 Windows Versions of “PC requirements to run and install the SWP TCO
SUITE Rel.1.8” (p. 1-4), added the warning only Windows versions in English
language are supported
• in “View Area” (p. 9-5) updated figure (two cases), and added a note for the
Performance panel
• corrected Figure 9-2, “Main tool bar” (p. 9-9)
• added a Warning in the Step 1 of the procedure “SW download to the E (station A)”
(p. 12-9)
• updated Figure 12-1, “FTP login default screen” (p. 12-10) and Figure 12-2, “FTP
login automatically set screen” (p. 12-10)
• in the procedure “Operations sequence for the preparation of the Craft Terminal”
(p. 14-2) the warning in Step 6 and Step 7 has been improved with Some more
DRAFT

explanations for this warning.


...................................................................................................................................................................................................................................
19-4 3DB 75003 CAAA
Issue 1 September 2009
EDITORIAL INFORMATION Description of changes with respect to the previous Issue

DRAFT
...................................................................................................................................................................................................................................

Third draft edition of October 1, 2009


Reference SWP version
Pre release SWP TCO SUITE Rel.1.8.3
List of changes with respect to the second draft version of September 15, 2009
• in “What's new” (p. xvii), eliminated new feature “possibility of supporting
transmission synchronization of 9500MPR through 9400AWY, via E1”
• the WAR I G-SUGGESTIO -CO CLUSIO S regarding Create Report function,
previously put after theFigure 7-2, “Authentication request for E login” (p. 7-6),
shifted to “Create Report” (p. 7-10)

Document history

Issue DATE CHANGE APPRAISAL AUTHORITY ORIGINATOR


(yymmdd) NOTE
(ECO)
01 091001 C.Wenyu, T.Pinaud E.Corradini

DRAFT

...................................................................................................................................................................................................................................
3DB 75003 CAAA 19-5
Issue 1 September 2009
DRAFT DRAFT

Das könnte Ihnen auch gefallen