NetNumen™ U31 R22 Unified Network Management System Operation Guide (Common Operations) Product Version: V12.15.10 ZTE CORPORATION No. 55, Hi-tech Road South, ShenZhen, P.R.China Postcode: 518057 Tel: +86-755-26771900 Fax: +86-755-26770801 URL: http://support.zte.com.cn E-mail: support@zte.com.cn LEGAL INFORMATION Copyright © 2014 ZTE CORPORATION. The contents of this document are protected by copyright laws and international treaties. Any reproduction or distribution of this document or any portion of this document, in any form by any means, without the prior written consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by contractual confidentiality obligations. All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE CORPORATION or of their respective owners. This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose, title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the use of or reliance on the information contained herein. ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications covering the subject matter of this document. Except as expressly provided in any written license between ZTE CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter herein. ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice. Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information. The ultimate right to interpret this product resides in ZTE CORPORATION. Revision History Revision No. Revision Data Revision Reason R5.0 2014-12-30 Updated the following contents in this manual after the NetNumen™ U31 R22 (V12.15.10) was issued: l Chapters including “Alarm Management”, “Performance Management”, “Report Management”, and “Log Management”. R4.1 2014-06-30 l Some configuration interfaces and menu items. l Added the “Exporting All Data”, Managing the CTN Ethernet Service Access Information Report”, “Managing the Bandwidth Resource Statistics Report”, and “Query in the toolbar” after the NetNumen™ U31 R22 (V12.14.10P02) was issued. l Updated some configuration interfaces and menu items after the NetNumen™ U31 R22 (V12.14.10P02) was issued. R4.0 2013-12-20 l Updated some configuration interfaces and menu items after the NetNumen™ U31 R22 (V12.14.10) was issued. SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Revision No. Revision Data Revision Reason R3.2 2013-07-30 l Added “Filtering the Resource Type”, “ Configuration Example”, “Setting CTN Performance Threshold in Batches”, and “CTN Device Optical Module Information Statistics Table” sections after the NetNumen™ U31 R22 (V12.13.10P02) was issued. l Updated some configuration interfaces and menu items after the NetNumen™ U31 R22 (V12.13.10P02) was issued. R3.1 2013-03-25 l Updated the “Alarm Management”, “Performance Management”, “Report Management”, and “NE Data Management” chapters after the NetNumen™ U31 R22 (V12.13.10P01) was issued. l Updated some configuration interfaces and menu items after the NetNumen™ U31 R22 (V12.13.10P01) was issued. R3.0 2012-12-30 l Added "Setting Password Protection Questions", "Virtual NE Operations", "Virtual Link Operations", "FEC Mode Configuration Report", and "Statistical Report for CTN Links Becoming Ring", and "Information Report of CTN Circle Link" sections after the NetNumen™ U31 R22 (V12.13.10) was issued. l Updated some configuration interfaces and menu items after the NetNumen™ U31 R22 (V12.13.10) was issued. R2.0 2012-11-02 l Added the "Report Management" and "NE Data Synchronization" sections after the NetNumen™ U31 R22 (V12.12.20P01) was issued. l Updated some configuration interfaces and menu items after the NetNumen™ U31 R22 (V12.12.20P01) was issued. R1.2 2012-06-30 l Added the "Querying Archiving Historical Performance" and “Northbound Alarm Filtering Rules" sections after the NetNumen™ U31 R22 (V12.12.20) was issued. l Deleted the “Report Management”, “Virtual NE Management”, “Virtual Link Management”, “Notification Description”, and “Measure Object Management” chapters after the NetNumen™ U31 R22 (V12.12.20) was issued. l Updated some configuration interfaces and menu items after the NetNumen™ U31 R22 (V12.12.20) was issued. Serial Number: SJ-20141211100735-007 Publishing Date: 2014-12-30 (R5.0) Table of Contents About This Manual ......................................................................................... I Chapter 1 Quick Start................................................................................. 1-1 1.1 Basic Operation Flow ......................................................................................... 1-1 1.2 System Startup and Exit ..................................................................................... 1-3 1.2.1 Starting the U31 R22 Server ..................................................................... 1-3 1.2.2 Logging In to the U31 R22 Client............................................................... 1-4 1.3 Portal Operations ............................................................................................... 1-6 1.3.1 Logging In to the Client Portal ................................................................... 1-6 1.3.2 Locking the Portal .................................................................................... 1-7 1.3.3 Logging Out of the Portal .......................................................................... 1-8 1.3.4 Exiting the Portal ...................................................................................... 1-8 1.3.5 Starting the Client..................................................................................... 1-9 1.4 System Setting................................................................................................... 1-9 1.4.1 Setting System Parameters....................................................................... 1-9 1.4.2 Setting the Information of Login User........................................................1-11 1.5 User Interface Management.............................................................................. 1-12 1.5.1 Closing the Current Window.................................................................... 1-12 1.5.2 Closing All Views.................................................................................... 1-12 1.5.3 Closing Other Windows .......................................................................... 1-12 1.5.4 Showing or Hiding the Toolbar................................................................. 1-13 1.5.5 Showing or Hiding the Status Bar ............................................................ 1-13 1.5.6 Showing and Hiding the Message Area ................................................... 1-13 1.5.7 Configuring the Toolbar........................................................................... 1-14 1.6 Other Functions ............................................................................................... 1-15 1.6.1 Locking the Screen................................................................................. 1-15 1.6.2 Logging Out of the System...................................................................... 1-16 1.6.3 Setting the Password of the Current Login User ....................................... 1-16 1.6.4 Viewing the System Time........................................................................ 1-17 1.6.5 Copying, Clearing, and Configuring Messages ........................................ 1-17 Chapter 2 Topology Management ............................................................ 2-1 2.1 Topology Management Functions ........................................................................ 2-1 2.2 Topology Management Window........................................................................... 2-2 2.3 Custom User Interface........................................................................................ 2-7 I SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 2.3.1 Customizing Icons by NE Type.................................................................. 2-7 2.3.2 Customizing Link Appearance ................................................................... 2-8 2.3.3 Customizing Status Icons.......................................................................... 2-8 2.3.4 Customizing Status Colors ........................................................................ 2-9 2.3.5 Customizing Status Order ....................................................................... 2-10 2.3.6 Customizing Tooltips................................................................................2-11 2.3.7 Customizing Alarm Prompting Type ......................................................... 2-12 2.3.8 Customizing Other Elements................................................................... 2-12 2.4 Functions on Topology Menu............................................................................. 2-13 2.4.1 Opening the Topology Management Window............................................ 2-13 2.4.2 Refreshing Topology Data....................................................................... 2-14 2.4.3 Exporting GUI Display Style .................................................................... 2-14 2.4.4 Importing GUI Display Style .................................................................... 2-15 2.4.5 Configuring Alarm Display Method........................................................... 2-15 2.5 Common Topology Management Operations...................................................... 2-19 2.5.1 Setting Node Rules ................................................................................ 2-19 2.5.2 Setting Members of a Node..................................................................... 2-20 2.5.3 Moving a Node....................................................................................... 2-20 2.5.4 Showing Statistics of a Node................................................................... 2-21 2.5.5 Switching to the Fault Management Window ............................................ 2-21 2.5.6 Switching to the Performance Management Window ................................ 2-21 2.5.7 Viewing the Alarm Count of a Node ......................................................... 2-22 2.6 Operations on NE Tree ..................................................................................... 2-22 2.6.1 Introduction to NE Tree........................................................................... 2-22 2.6.2 Implementing the Filtering....................................................................... 2-23 2.6.3 Searching the NE or Group ..................................................................... 2-23 2.6.4 Filtering the Resource Type .................................................................... 2-24 2.7 Operations on Topology Graph.......................................................................... 2-24 2.7.1 Topology Layer Operations ..................................................................... 2-24 2.7.2 Functions of Toolbar buttons ................................................................... 2-27 2.7.3 Display Filter Settings ............................................................................. 2-30 2.7.4 Configuring a Map .................................................................................. 2-32 2.8 Virtual NE Operations ....................................................................................... 2-33 2.8.1 Creating a Virtual NE .............................................................................. 2-33 2.8.2 Modifying the Attributes of a Virtual NE .................................................... 2-34 2.8.3 Deleting a Virtual NE .............................................................................. 2-34 2.8.4 Viewing a Virtual NE Attributes ............................................................... 2-35 II SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 2.9 Virtual Link Operations ..................................................................................... 2-35 2.9.1 Creating a Virtual Link ............................................................................ 2-35 2.9.2 Modifying the Attributes of a Virtual Link .................................................. 2-36 2.9.3 Deleting a Virtual Link............................................................................. 2-37 2.9.4 Viewing a Virtual Link Attributes ............................................................. 2-37 2.10 Group Management Operations ...................................................................... 2-38 2.10.1 Creating a Common Group ................................................................... 2-38 2.10.2 Creating a Type Group.......................................................................... 2-39 2.10.3 Creating a Location Group .................................................................... 2-40 2.10.4 Setting Members .................................................................................. 2-41 2.10.5 Deleting a Group .................................................................................. 2-42 2.10.6 Viewing Attributes of a Group ................................................................ 2-43 Chapter 3 Alarm Management................................................................... 3-1 3.1 Overview ........................................................................................................... 3-1 3.1.1 Fault Management Terms ......................................................................... 3-1 3.1.2 Main Interface of Fault Management View ................................................. 3-2 3.1.3 Alarm Classification .................................................................................. 3-5 3.1.4 Alarm Severity and Troubleshooting ......................................................... 3-6 3.1.5 Alarm Handling Flow and Suggestion ........................................................ 3-6 3.2 Preference Settings ............................................................................................ 3-7 3.2.1 Setting the Name of the Alarm Level.......................................................... 3-7 3.2.2 Setting the Default Sorting Mode of the Alarm Table ................................... 3-7 3.2.3 Setting Alarm Colors and Sounds .............................................................. 3-8 3.2.4 Setting the Alarm Flash and Sound ........................................................... 3-9 3.2.5 Setting the Alarm Prompt ........................................................................ 3-10 3.2.6 Setting Intermittent Alarms ...................................................................... 3-12 3.2.7 Redefining Alarm Codes ......................................................................... 3-16 3.2.8 Setting Tandem Mode for External Alarms ............................................... 3-16 3.2.9 Redefining Alarm levels .......................................................................... 3-17 3.2.10 Configuring NE Alarm Mask .................................................................. 3-18 3.2.11 Setting Board Alarm Mask..................................................................... 3-18 3.2.12 Configuring Alarm Preload .................................................................... 3-19 3.2.13 Setting Alarm Severities........................................................................ 3-20 3.2.14 Configuring Specified Alarm Monitoring ................................................. 3-21 3.2.15 Configuring ADMC Alarms ................................................................... 3-22 3.2.16 Setting NE Alarm Parameters................................................................ 3-23 3.2.17 Setting External Alarm Monitoring.......................................................... 3-24 III SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 3.2.18 Setting the Alarm Audibility and Visibility ................................................ 3-25 3.2.19 Configuring Free AU Alarm Detection .................................................... 3-26 3.2.20 Configuration Example.......................................................................... 3-26 3.3 Synchronizing NE Alarms ................................................................................. 3-28 3.3.1 Synchronizing Active NE Alarms ............................................................. 3-28 3.3.2 Recollecting Historical NE Alarms ........................................................... 3-29 3.4 Alarm Query .................................................................................................... 3-30 3.4.1 Alarm Query .......................................................................................... 3-30 3.4.2 Querying Notifications............................................................................. 3-35 3.4.3 Custom Query........................................................................................ 3-36 3.5 Alarm Information Query .................................................................................. 3-42 3.5.1 Viewing Alarm Details............................................................................. 3-42 3.5.2 Querying Historical Alarms ..................................................................... 3-43 3.5.3 Viewing Related History Alarms of an Active Alarm................................... 3-44 3.5.4 Querying Alarm-Related Rules ................................................................ 3-45 3.5.5 Viewing and Supplementing Alarm Handling Suggestions ......................... 3-45 3.5.6 Locating the Source NE of an Alarm ........................................................ 3-46 3.5.7 Locating the Source Board of an Alarm.................................................... 3-46 3.5.8 Querying the Associated Services of an Alarm ........................................ 3-46 3.6 Handling Alarm ............................................................................................... 3-46 3.6.1 Automatically Acknowledging History Alarms .......................................... 3-47 3.6.2 Acknowledging an Alarm ........................................................................ 3-47 3.6.3 Unacknowledging an Alarm..................................................................... 3-48 3.6.4 Clearing an Alarm .................................................................................. 3-48 3.6.5 Specifying Alarms to Be Monitored .......................................................... 3-49 3.6.6 Adding Comments to an Alarm................................................................ 3-49 3.6.7 Creating a Rule for an Active Alarm ......................................................... 3-49 3.6.8 Printing Alarm Information....................................................................... 3-50 3.6.9 Exporting Alarm Information.................................................................... 3-50 3.7 Alarm Forwarding............................................................................................. 3-51 3.7.1 Setting Alarm Forwarding Templates ....................................................... 3-51 3.7.2 Forwarding an Alarm .............................................................................. 3-51 3.8 Alarm Rule Management .................................................................................. 3-52 3.8.1 Introduction to Alarm Rules ..................................................................... 3-52 3.8.2 Introduction to Alarm Rule Operations ..................................................... 3-55 3.8.3 Creating an Alarm Rule .......................................................................... 3-56 3.9 Fault Handling Settings..................................................................................... 3-58 IV SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 3.9.1 Finding Alarm Handling Suggestions ....................................................... 3-58 3.9.2 Supplementing Alarm Handling Suggestions ............................................ 3-59 3.9.3 Exporting Handling Suggestions to a File ................................................. 3-60 3.9.4 Importing Handling Suggestions .............................................................. 3-60 3.10 Alarm Statistics .............................................................................................. 3-61 3.10.1 Overview of Fault Statistics ................................................................... 3-61 3.10.2 Basic Statistics ..................................................................................... 3-62 3.10.3 Busy Time Statistics ............................................................................. 3-62 3.10.4 Customizing Statistics........................................................................... 3-63 3.10.5 Querying Historical Alarms by Specified Alarm Code .............................. 3-64 3.10.6 Managing Timed Statistical Task............................................................ 3-65 3.10.7 Managing Timed Export Tasks............................................................... 3-66 3.11 Alarm and Notification Monitoring .................................................................... 3-67 3.11.1 Alarm Monitoring Policies ...................................................................... 3-67 3.11.2 Alarm Monitoring Methods..................................................................... 3-68 3.11.3 Alarm Monitoring via U31 R22 ............................................................... 3-68 3.11.4 Alarm Monitoring via Short Message and E-mail ..................................... 3-68 3.11.5 Monitoring Real-Time Alarms ................................................................ 3-69 3.11.6 Monitoring Real-time Notifications.......................................................... 3-69 3.11.7 Monitoring the Alarm Statistics by NE .................................................... 3-69 3.11.8 Monitoring the Alarm Statistics by NE Type ............................................ 3-70 3.12 Alarm Task Management ................................................................................ 3-70 3.12.1 Creating a Scheduled Statistic Task....................................................... 3-70 3.12.2 Creating a Scheduled Export Task ......................................................... 3-72 3.12.3 Creating a Suppressing Plan Task ......................................................... 3-75 Chapter 4 Performance Management ....................................................... 4-1 4.1 Performance Management Overview ................................................................... 4-1 4.1.1 Term Overview ......................................................................................... 4-2 4.1.2 Performance Monitoring Scheme .............................................................. 4-3 4.1.3 Performance Management Window ........................................................... 4-4 4.2 Performance Settings ......................................................................................... 4-6 4.2.1 Setting Performance Module Parameters................................................... 4-6 4.2.2 Configuring the Performance Mask............................................................ 4-7 4.2.3 Setting Performance Thresholds .............................................................. 4-8 4.2.4 Configuring Analog Performance Thresholds ............................................. 4-9 4.2.5 Setting Default Thresholds for Optical Modules ........................................ 4-10 4.2.6 Setting the CTN Performance Threshold in Batches ................................. 4-10 V SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 4.2.7 Configuring Zero Performance Suppression ............................................. 4-12 4.2.8 Clearing the Performance Counter .......................................................... 4-12 4.2.9 Setting Performance Rendering .............................................................. 4-14 4.3 Introduction to Measurement Task Management................................................. 4-15 4.3.1 Creating a Measurement Task................................................................. 4-16 4.3.2 Modifying a Measurement Task ............................................................... 4-18 4.3.3 Deleting a Measurement Task ................................................................. 4-19 4.3.4 Activating a Measurement Task............................................................... 4-20 4.3.5 Suspending a Measurement Task............................................................ 4-21 4.3.6 Viewing a Measurement Task.................................................................. 4-21 4.3.7 Checking the Consistency Status of a Measurement Task......................... 4-22 4.3.8 Synchronizing a Measurement Task ........................................................ 4-23 4.3.9 Refreshing Measurement Tasks .............................................................. 4-23 4.3.10 Importing a Measurement Task ............................................................. 4-24 4.3.11 Exporting a Measurement Task ............................................................. 4-25 4.3.12 Re-collecting Performance Data ............................................................ 4-26 4.4 Template Task Management ............................................................................. 4-26 4.4.1 Introduction to Query Template and Template Task................................... 4-26 4.4.2 Opening the Template Task Management Tab .......................................... 4-28 4.4.3 Query Template Operations .................................................................... 4-29 4.4.4 Template Task Operations....................................................................... 4-38 4.4.5 Common Template Management............................................................. 4-44 4.5 Performance Data Query .................................................................................. 4-50 4.5.1 Performance Query ................................................................................ 4-50 4.5.2 Operations on the Query Result .............................................................. 4-62 4.5.3 Performance Data Integrity Report .......................................................... 4-64 4.5.4 Overview of Performance Data Integrity Report ........................................ 4-67 4.6 Real-Time Traffic Management ......................................................................... 4-69 4.6.1 Setting the Display Style ......................................................................... 4-69 4.6.2 Monitoring Real-Time Traffic ................................................................... 4-70 4.6.3 Real-Time Traffic Task Management........................................................ 4-71 4.7 Counter and Index Management ....................................................................... 4-74 4.7.1 Introduction to Counter and Index Management ....................................... 4-74 4.7.2 Counter Management ............................................................................. 4-75 4.7.3 Index Management................................................................................. 4-77 4.7.4 Index Group Management ...................................................................... 4-84 4.8 Threshold Tasks Management .......................................................................... 4-85 VI SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 4.8.1 Creating a Threshold Task ...................................................................... 4-85 4.8.2 Querying Threshold Tasks ...................................................................... 4-87 4.8.3 Modifying a Threshold Task..................................................................... 4-88 4.8.4 Deleting a Threshold Task....................................................................... 4-88 4.8.5 Suspending a Threshold Task ................................................................. 4-89 4.8.6 Activating a Threshold Task .................................................................... 4-89 Chapter 5 Report Management ................................................................. 5-1 5.1 Public Report ..................................................................................................... 5-1 5.1.1 Managing Statistical Reports on NEs ......................................................... 5-1 5.1.2 Managing Statistical Reports on Slots........................................................ 5-2 5.1.3 Managing the Statistical Reports on Boards ............................................... 5-3 5.1.4 Managing Statistical Reports on Ports ....................................................... 5-5 5.1.5 Managing the Link Statistics Report .......................................................... 5-7 5.1.6 Managing the Protection Group Information Report .................................... 5-9 5.1.7 Managing the CTN/SDH Device Port Status Statistics Report ..................... 5-9 5.1.8 Managing the CTN/SDH Port Status Statistics Report............................... 5-10 5.2 CTN Resource Analysis Report..........................................................................5-11 5.2.1 Managing the CTN Link Looping Statistics Report ....................................5-11 5.2.2 Managing the CTN Loop Information Report ............................................5-11 5.2.3 Managing the Logic Resource Statistics Report ....................................... 5-12 5.3 CTN Statistics Report ....................................................................................... 5-13 5.3.1 Managing the CTN NE Service Count Report .......................................... 5-13 5.3.2 Managing the CTN SFP Statistics Report ................................................ 5-14 5.3.3 Managing the NE Rate Statistics Report ................................................. 5-15 5.3.4 Managing the L3 Interface Information Report ......................................... 5-15 5.3.5 Managing the CTN NE Version Statistics Report ..................................... 5-16 5.3.6 Managing the CTN Ethernet Service Access Information Report ............... 5-17 5.4 OTN Report ..................................................................................................... 5-17 5.4.1 Managing the Shelf Information Report ................................................... 5-17 5.4.2 Managing the Information Report of the Board Components ..................... 5-19 5.4.3 Managing the Adjustable Power Margin Report ....................................... 5-19 5.4.4 Managing Port State Report ................................................................... 5-20 5.4.5 Managing the Fixed Attenuator Report .................................................... 5-20 5.4.6 Managing the Wavelength Allocation Report ........................................... 5-21 5.4.7 Managing the Dispersion Compensation Report ...................................... 5-22 5.4.8 Managing the Optical Module Information Report .................................... 5-22 5.4.9 Managing the Configuration Report of GCC Byte Use Mode ..................... 5-23 VII SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 5.4.10 Managing the FEC Mode Configuration Report ...................................... 5-23 5.4.11 Managing the Customer Information Report .......................................... 5-24 5.4.12 Managing the Configuration Report of the Service Mapping Mode .......... 5-24 5.4.13 Managing the Customer Service Running State Report .......................... 5-25 5.4.14 Managing the OPM Optical Channel Performance Report ...................... 5-26 5.4.15 Managing the Bandwidth Resource Statistics Report .............................. 5-27 5.4.16 Managing Frequency Statistics of Tunnels Between Two NEs ................. 5-27 5.5 MSTP Proprietary Report.................................................................................. 5-28 5.5.1 Managing the MSTP Cross-Connect Service Report................................. 5-28 5.5.2 Managing the SFP Statistics Report of MSTP Equipment.......................... 5-28 5.6 End-to-End Report Management ....................................................................... 5-29 5.6.1 Managing the Service Data Report ......................................................... 5-29 5.6.2 Managing the Service Statistics Report ................................................... 5-31 5.6.3 Managing the MSTP Fiber Usage Statistic Information Report .................. 5-32 5.6.4 Managing the Isolated Cross Connection Data Report ............................. 5-33 5.6.5 Managing the Protection Subnet Report................................................... 5-34 Chapter 6 Security Management............................................................... 6-1 6.1 Overview ........................................................................................................... 6-1 6.1.1 Overview of Security Management ............................................................ 6-1 6.1.2 Basic Concepts in Security Management ................................................... 6-3 6.1.3 Relation Model ......................................................................................... 6-4 6.1.4 Security Management Solution.................................................................. 6-5 6.2 Setting User Account Rule .................................................................................. 6-8 6.3 Role Management ............................................................................................ 6-10 6.3.1 Creating a Role .......................................................................................6-11 6.3.2 Modifying a Role .................................................................................... 6-13 6.3.3 Duplicating a Role .................................................................................. 6-14 6.3.4 Deleting a Role ...................................................................................... 6-14 6.3.5 Viewing Users Assigned with a Role........................................................ 6-15 6.3.6 Locking a Role ....................................................................................... 6-15 6.4 Role Set Management ...................................................................................... 6-16 6.4.1 Creating a Role Set ................................................................................ 6-16 6.4.2 Modifying a Role Set .............................................................................. 6-17 6.4.3 Duplicating a Role Set ............................................................................ 6-18 6.4.4 Deleting a Role Set ................................................................................ 6-19 6.4.5 Viewing Users Assigned with a Role Set .................................................. 6-19 6.4.6 Locking a Role Set ................................................................................. 6-20 VIII SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 6.5 Operation Set Management .............................................................................. 6-20 6.5.1 Creating an Operation Set ...................................................................... 6-21 6.5.2 Viewing the Information of an Operation Set............................................. 6-22 6.5.3 Modifying an Operation Set..................................................................... 6-22 6.5.4 Duplicating an Operation Set................................................................... 6-23 6.5.5 Deleting an Operation Set....................................................................... 6-24 6.5.6 Viewing All Permitted Operations of an Operation Set............................... 6-24 6.5.7 Exporting Customized Operation Sets ..................................................... 6-25 6.5.8 Importing an Operation Set ..................................................................... 6-25 6.6 Department Management ................................................................................. 6-26 6.6.1 Creating a Department ........................................................................... 6-26 6.6.2 Modifying a Department.......................................................................... 6-27 6.6.3 Deleting a Department............................................................................ 6-28 6.7 User Management............................................................................................ 6-28 6.7.1 Creating a User...................................................................................... 6-28 6.7.2 Modifying a User .................................................................................... 6-32 6.7.3 Duplicating a User .................................................................................. 6-33 6.7.4 Deleting a User ...................................................................................... 6-33 6.7.5 Viewing Rights ...................................................................................... 6-34 6.7.6 Comparing Rights .................................................................................. 6-34 6.7.7 Exporting Rights .................................................................................... 6-35 6.8 Other Functions ............................................................................................... 6-35 6.8.1 Viewing User Lockup Records................................................................. 6-35 6.8.2 Modifying the Passwords of Common Users in Batches............................ 6-36 6.8.3 Managing Login Users............................................................................ 6-36 6.8.4 Setting User Blacklist.............................................................................. 6-36 6.8.5 Cleaning up Accounts............................................................................. 6-37 6.8.6 Setting User Login Mode ........................................................................ 6-37 6.8.7 Setting specified Time for Auto-Logout..................................................... 6-38 Chapter 7 Log Management ...................................................................... 7-1 7.1 Overview of Log Management............................................................................. 7-1 7.2 Introduction to Log Management View ................................................................. 7-2 7.3 Managing Logs by Type...................................................................................... 7-2 7.3.1 Viewing Log Records................................................................................ 7-2 7.3.2 Querying Operation Logs .......................................................................... 7-3 7.3.3 Querying Security Logs ............................................................................ 7-4 7.3.4 Querying System Logs ............................................................................. 7-5 IX SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 7.3.5 Refreshing Logs ....................................................................................... 7-6 7.3.6 Querying Log Information ......................................................................... 7-7 7.4 Customizing Log Query ...................................................................................... 7-7 7.4.1 Customizing a Log Query Condition........................................................... 7-7 7.4.2 Importing Query Conditions..................................................................... 7-10 7.4.3 Editing Query Conditions ........................................................................ 7-10 7.4.4 Exporting a Query Condition ....................................................................7-11 7.4.5 Saving a Customized Condition as Another Condition................................7-11 7.4.6 Deleting a Customized Log Query Condition ............................................ 7-12 7.4.7 Renaming a Customized Log Query Condition ......................................... 7-12 7.5 Maintaining Logs .............................................................................................. 7-13 7.5.1 Automatically Exporting Logs to a File ..................................................... 7-13 7.5.2 Manually Exporting Logs to a File ............................................................ 7-15 7.5.3 Printing Logs.......................................................................................... 7-15 Chapter 8 NE Data Management ............................................................... 8-1 8.1 Synchronizing Data of the NE ............................................................................. 8-1 8.1.1 Uploading the Data................................................................................... 8-1 8.1.2 Comparing the Data ................................................................................. 8-1 8.1.3 Downloading the Data .............................................................................. 8-2 8.1.4 Setting Automatic Uploading Comparison ................................................. 8-3 8.2 NE Data Backup and Recovery ........................................................................... 8-4 8.2.1 Backing Up NE Data................................................................................. 8-4 8.2.2 Restoring NE Data ................................................................................... 8-4 8.3 Managing NCP Data........................................................................................... 8-6 8.3.1 Clearing NCP Database............................................................................ 8-6 8.3.2 Backing up and Restoring NCP Data ......................................................... 8-7 Chapter 9 NMS DataBackup and Restoration.......................................... 9-1 9.1 Comparison for Backing Up and Restoring the U31 Data ..................................... 9-1 9.2 System Backup .................................................................................................. 9-5 9.2.1 EMS Data Backup with the U31 ................................................................ 9-6 9.2.2 Backing Up the Data with the dbtool Tool ................................................ 9-12 9.2.3 Backing Up the Data with the Offline Tool ................................................ 9-14 9.3 System Restoration .......................................................................................... 9-15 9.3.1 EMS Data Restoration with the U31 ........................................................ 9-16 9.3.2 Restoring the Data with the dbtool Tool ................................................... 9-18 9.3.3 Restoring the Data with the Offline Tool ................................................... 9-20 Chapter 10 System Monitoring................................................................ 10-1 X SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 10.1 System Monitoring.......................................................................................... 10-1 10.2 System Monitor View-Introduction ................................................................... 10-1 10.3 Application Server Monitor .............................................................................. 10-2 10.3.1 Viewing the Basic Information of Application Server................................ 10-2 10.3.2 Configuring Server Performance Monitoring .......................................... 10-2 10.3.3 Starting Server Performance Monitor .................................................... 10-3 10.3.4 Suspending Server Performance Monitor ............................................... 10-3 10.3.5 Viewing Monitoring Information of the Application Server ........................ 10-4 10.4 Database Server Monitor ................................................................................ 10-4 10.4.1 Viewing the Basic Information of Database Server.................................. 10-4 10.4.2 Configuring Database Resource Monitor................................................ 10-4 10.4.3 Starting Database Resource Monitor ..................................................... 10-5 10.4.4 Suspending Database Resource Monitor ............................................... 10-5 10.4.5 Viewing Database Resource Information................................................ 10-6 Chapter 11 Task Management ................................................................. 11-1 11.1 Task Management ...........................................................................................11-1 11.2 Introduction to Task Management View .............................................................11-3 11.3 Backing up and Deleting Log Data ....................................................................11-3 11.4 Backing up and Deleting Performance Data ......................................................11-4 11.5 Backing up and Deleting Alarm Data.................................................................11-5 11.6 Viewing the Backup Logs of Basic Data ...........................................................11-6 11.7 Viewing the Backup Logs of the Whole Database Structure ................................11-6 11.8 Viewing the File Backup Logs ..........................................................................11-6 11.9 File Clearing Tasks ..........................................................................................11-7 11.9.1 Modifying Monitor Attributes ...................................................................11-7 11.9.2 Executing Monitoring Tasks Immediately .................................................11-7 11.10 Modifying the Task Starting Time ....................................................................11-8 Chapter 12 Troubleshooting.................................................................... 12-1 12.1 Troubleshooting Flow...................................................................................... 12-1 12.2 Methods for Collecting Failure Information ....................................................... 12-3 12.3 Common Troubleshooting Methods ................................................................. 12-3 12.4 Common Troubleshooting Tools ...................................................................... 12-4 12.5 Troubleshooting Precautions and Requirements............................................... 12-5 12.6 Contacting Technical Support .......................................................................... 12-6 12.7 Troubleshooting of Server Failures .................................................................. 12-6 12.7.1 An Indicator of the Server Lights Red..................................................... 12-6 12.7.2 An Indicator of the Server Lights Yellow ................................................. 12-7 XI SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 12.7.3 The Indicator of a Hard Disk Lights Red ................................................. 12-8 12.7.4 Startup Failure of the Server ................................................................. 12-8 12.7.5 Remote Login Failure to the Server ....................................................... 12-9 12.8 Troubleshooting of Ethernet Switch Failures....................................................12-10 12.8.1 Indicators of the Switch Port Connected to the Server Are Off ................12-10 12.8.2 Indicators of the Switch Port Connected to the Server Light Solid Yellow ................................................................................................. 12-11 12.9 Troubleshooting of Software Failures ..............................................................12-13 12.9.1 Failure of Removing the Server Program ..............................................12-13 12.9.2 Insufficient Disk Space During Server Installation ..................................12-14 12.9.3 FTP Server Start Error .........................................................................12-16 12.10 Failure of Querying Performance Data ..........................................................12-17 Figures............................................................................................................. I Tables ............................................................................................................ III Glossary .......................................................................................................VII XII SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential About This Manual Purpose This manual is applicable to the NetNumen™ U31 R22 Unified Network Management System (hereinafter referred to as U31 R22). The U31 R22 is a network-level Network Management System (NMS) based on the distributed, multi-process and modular design. It can exercise unified management over the CTN, SDH, WDM/OTN, Router, BAS and Switch series of optical transmission equipment from ZTE. Intended Audience This manual is intended for: l l l Planning engineers Monitoring personnel Maintenance engineers What Is in This Manual This manual contains the following chapters. 1, Quick Start 2, Topology Management 3, Alarm Management 4, Performance Management 5, Report Management 6, Security Management 7, Log Management 8, NE Data Management 9, NMS Data Backup and Restoration 10, System Monitoring Describes the operation flow and basic operations of the U31 R22. Describes common operations in the Topology Management module. Describes common operations in the Alarm Management module. Describes common operations in the Performance Management module. Describes common operations in the Report Management module. Describes common operations in the Security Management module. Describes common operations in the Log Management module. Describes how to manage NE data. Describes how to back up and restore U31 R22 data. Describes how to monitor the U31 R22 server and database. I SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential 11, Task Management Describes how to manage tasks on the U31 R22. 12, Troubleshooting Describes how to troubleshoot the U31 R22. Conventions This manual uses the following conventions. Italics Variables in commands. It may also refer to other related manuals and documents. Bold Menus, menu options, function names, input fields, option button names, check boxes, drop-down lists, dialog box names, window names, parameters, and commands. Constant Text that you type, program codes, filenames, directory names, and function names. width Danger: indicates an imminently hazardous situation. Failure to comply can result in death or serious injury, equipment damage, or site breakdown. Warning: indicates a potentially hazardous situation. Failure to comply can result in serious injury, equipment damage, or interruption of major services. Caution: indicates a potentially hazardous situation. Failure to comply can result in moderate injury, equipment damage, or interruption of minor services. Note: provides additional information about a certain topic. II SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 1 Quick Start Table of Contents Basic Operation Flow .................................................................................................1-1 System Startup and Exit .............................................................................................1-3 Portal Operations .......................................................................................................1-6 System Setting ...........................................................................................................1-9 User Interface Management .....................................................................................1-12 Other Functions........................................................................................................1-15 1.1 Basic Operation Flow Figure 1-1 shows the basic operation flow of the U31 R22 system. 1-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Figure 1-1 Operation Flow of the U31 R22 1. Start the U31 R22 server program. Starting the U31 R22 server program is the premise of using the U31 R22 network management system. Caution! Do not start/shut down the U31 R22 server program frequently. 2. Log in to the U31 R22 client portal. 3. Log in to the U31 R22 client. The user interfaces of the U31 R22 system are integrated in the U31 R22 client. After logging in to the client, you can perform the relevant management operations. 1-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 1 Quick Start 4. Perform management operations. l Customization of GUI elements To customize the parameters such as system parameters, login user information, performance module parameters, alarm sound and color, and holiday information. l U31 R22 management The user can create and manage the information of the U31 R22. l Topology management The user can query and present the network topology and the service topology in the Topology Management window. l Security management The user can manage the department, user, role, role set, operation set, and user account rule in the security management view. l Alarm management The user can perform the functions of alarm monitor, alarm query, alarm statistics, and alarm configuration in the alarm management view. l Performance management The user can query and collect the performance data in the performance management view. l Routine maintenance The user can perform the functions of log management, security management, and system maintenance in the view. l Log management The user can perform the functions of viewing, querying, and exporting logs in the log management view. 1.2 System Startup and Exit 1.2.1 Starting the U31 R22 Server This procedure describes how to start the U31 R22 server on Windows. Prerequisite You have installed the U31 R22 server software successfully. Steps 1. On the desktop of the Windows operating system, select Start > All Programs > NetNumen(TM) U31 Unified Management System > U31console. The Console window is displayed. 1-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) When Successful. is displayed in the Operation result column, it indicates that the U31 R22 server is successfully started, see Figure 1-2. Figure 1-2 Operation Result Display l l l Note: The displayed processes vary with the server size that is selected during the server software installation. For details, refer to the displayed information in the Console window. The U31 R22 console automatically starts all processes, and no manual operation is required. The EMS console startup file console.exe is located in the ums-server directory under the path where the EMS is installed. – End of Steps – 1.2.2 Logging In to the U31 R22 Client This procedure describes how to log in to the U31 R22 client through start menu on Windows. 1-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 1 Quick Start Prerequisite Ensure that the U31 R22 server is running properly. Steps 1. On the desktop of the Windows operating system, select Start > Programs > NetNumen Unified Management System > NetNumen Client. The Login dialog box is displayed. 2. Enter User Name, Password, and Server Address in the Login window. Caution! In the U31 R22, the default user name is admin, and the password is null. Be sure to modify the password of the admin user after successful login for the first time to ensure the account security. Note: In the Login window, click on the right side of the server address to display the Config Bureau dialog box. In the Config Bureau dialog box, you can configure bureau name and the corresponding server address. The configuration information will be displayed in the drop-down list of the Server Address to facilitate the user to select. 3. Click OK. – End of Steps – 1-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 1.3 Portal Operations 1.3.1 Logging In to the Client Portal The U31 R22 provides a client portal as a unified login interface. After starting the client portal, you can start the client or other specific management modules by clicking corresponding links. The started client or other management modules can communicate with the server and load data from the server directly. Prerequisite The U31 R22 server is operating properly. Steps 1. On the desktop of the Windows operating system, click Start, point to Programs > NetNumen U31 Unified Network Management System, and click U31 Client Portal. The Login dialog box is displayed. 2. Enter the User Name, Password, and Server Address. Caution! For the U31 R22, the default user is admin, and the password is null. The user should modify the password after login. 3. Click OK. – End of Steps – Result After successful login, the Portal dialog box is displayed, see Figure 1-3. 1-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 1 Quick Start Figure 1-3 Portal The buttons in Portal dialog box are described as follows: Button Description Screen lock Log out Exit About Start the U31 client Start alarm management module Start performance management module Start system maintenance module 1.3.2 Locking the Portal This procedure describes how to lock the client portal through shortcut menus. 1-7 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Prerequisite You have logged in to the U31 R22 client. Steps 1. In the Portal dialog box, click displayed. on the toolbar. The Confirm message box is 2. Click OK. – End of Steps – 1.3.3 Logging Out of the Portal This procedure describes how to log out of the client portal through shortcut menus. Prerequisite You have logged in to the U31 R22 client portal. Steps on the toolbar. A Confirm message box is displayed. 1. In the Portal dialog box, click Perform one of the following operations as required. To... Do... Save the user name and server IP address for Click the Save option button. this login Delete the user name and server IP address Click the Delete option button. for this login 2. Click OK. – End of Steps – 1.3.4 Exiting the Portal This procedure describes how to exit the client portal through shortcut menus. Prerequisite You have logged in to the U31 R22 client portal. Steps 1. In the Portal dialog box, click on the toolbar. A Confirm message box is displayed. 2. Click OK. – End of Steps – 1-8 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 1 Quick Start 1.3.5 Starting the Client The portal provides shortcut for the user to access the main window of the system. Through the portal, the user can access the main window without entering a password. Prerequisite You have logged in to the U31 R22 client portal. Steps 1. Perform any of the following operations as required. To... Do... Open the U31 Client window In the Clients area in the NetNumen U31 Portal window, click U31 Client Open the Fault Management In the Clients area in the NetNumen U31 Portal window, click window Fault Management. Open the Performance In the Clients area in the NetNumen U31 Portal window, click Management window Performance Management. Open the System In the Clients area in the NetNumen U31 Portal window, click Maintenance window System Maintenance. – End of Steps – 1.4 System Setting 1.4.1 Setting System Parameters You can customize system parameters. The system settings include: l l l l l Time of automatic screen lock Number of prompt messages and error messages Number of query results displayed on one page Setting of exiting the window Number of seconds before hiding tooltips Steps 1. From the client main menu, select System > Preferences. The Preferences dialog box is displayed. 2. In the Preferences navigation tree, expand the System node. parameters, refer to Table 1-1. To set system 1-9 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Table 1-1 System Parameter Setting To... Do... Set automatic screen lock Select Screen Lock from the system navigation tree, and then time set parameters in the right pane. l Enabled: select whether to enable the automatic screen lock function. l Idle time (minute(s)): waiting time before the automatic screen lock, in range of 1 to 6000. l Lock type: Lock Screen or Lock Operation (click OK to unlock the screen). Lock Operation, or press shortcut key <Ctrl+U> to unlock the operation.) Set the number of messages Select Message Area from the system navigation tree, and then displayed in the message set parameters from the right pane. area l Set Prompt Message Count: maximum number of prompt messages, in range of 1 to 5000. l Set Error Message Count: maximum number of error messages, in range of 1 to 5000. Set the number of displayed Select Query Settings from the system navigation tree, and then query results set parameters from the right pane. Query results count in one page: maximum number of query results displayed in one page, in range of 50 to 500. This setting does not take effects on the current active alarms, but takes effects on the history data. Set the window record when Select Window from the system navigation tree, and then set exiting the client terminal parameters from the right pane. Keep the position and the size of the main window the same as in the last logout: If you select Enabled, the position and size of the main window in previous logout will be kept when the client terminal is enabled. Customize the toolbar Select Toolbar Customization from the system navigation tree. To set parameters, refer to 1.5.7 Configuring the Toolbar. Set the prompting time of Select Tooltip Duration from the system navigation tree, and hiding the tool then set Number of seconds before hiding tooltip. The value range is in 1 to 1000. 1-10 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 1 Quick Start To... Do... Configure holiday Select Holiday Setting from the system navigation tree, and then information set parameters from the right pane. l Add a holiday: Click Create, and then set holiday name, begin date, end data, and year in the Create Holiday dialog box. l Modify a holiday: Select the holiday to be modified, and then click Modify. Modify begin date, end date, and year in the Modify Holiday dialog box. l Delete a holiday: Select the holiday to be deleted, and then click Delete. Select the year in the Delete Holiday dialog box. 3. Click OK. – End of Steps – 1.4.2 Setting the Information of Login User This procedure describes how to configure the email address, the telephone number of the user, and password protection. Steps 1. From the client main menu, select System > Preference. The Preference dialog box is displayed. 2. In the Preference navigation tree, select Security > Login User , and then set the login user parameters on the right pane. Parameter Description Email Address You must enter the full E-mail address. For example, test@zte.com.cn Phone Number l Enter a fixed or mobile phone number. l It supports numbers and half-angle connector "-". l More than one number should be separated by commas. 3. Select Security > Password Protection Question Setting, and then set the parameters. 4. Click OK. – End of Steps – 1-11 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 1.5 User Interface Management 1.5.1 Closing the Current Window By default, different activated application views are displayed on the client window in an embedded way. Context You can perform any of the following operations to close the current window. Steps l From the client main menu, select Window > Close Current Window. l At the upper-right corner of the main window, click the l At the upper-right corner of the main window, click the button, and select Close Current Window. button. button on the right of the – End of Steps – 1.5.2 Closing All Views By default, different activated application views are embedded in the client window. Context You can perform any of the following operations to close all Windows. Steps l From the client main menu, select Window > Close All Windows. l At the upper-right corner of the main window, click the button, and select Close All Windows. button on the right of the – End of Steps – 1.5.3 Closing Other Windows When there are several windows open, you can close all the other windows except the current window. Prerequisite You have opened several application views in the client window. Context You can perform any of the following operations to close other windows. 1-12 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 1 Quick Start Steps l From the client main menu, select Window > Close Other Windows. l At the upper-right corner of the main window, click the button, and select Close Other Windows. button on the right of the – End of Steps – 1.5.4 Showing or Hiding the Toolbar The user may show or hide the toolbar of the client window. For the first startup of the system, the toolbar of the main view is visible by default. After the first time, the display status of toolbar on the main view for each login is consistent with the status before the operator last exits the system. Prerequisite Before you begin, make sure that you have logged in to U31 R22 client. Steps 1. When the toolbar is in showing status, select Window > Tool Bar to hide the toolbar. 2. When the toolbar is in hiding status, select Window > Tool Bar to display the toolbar. – End of Steps – 1.5.5 Showing or Hiding the Status Bar The user may show or hide the status bar of the client window. For the first startup of the system, the status bar of the main interface is visible by default. Then, the display status of status bar on the main interface for each login is consistent with the status before the operator last exits the system. Prerequisite You have logged in to the U31 R22 client. Steps 1. When the status bar is in showing status, select Window > Status Bar to hide the status bar. 2. When the status bar is in hiding status, select Window > Status Bar to display the status bar. – End of Steps – 1.5.6 Showing and Hiding the Message Area The Show Message dialog box is not visible on the client window by default when you start the client for the first time. You can select to show the message area or not. When 1-13 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) you start the client again, whether the message area is displayed depends on the state of the message area before the client was closed last time. Prerequisite Before you begin, make sure that you have logged in to the U31 R22 client. Steps 1. When the message area is in showing status, select Window > Message Area to hide the message area. 2. When the toolbar is in hiding status, select Window > Message Area to display the message area. – End of Steps – 1.5.7 Configuring the Toolbar The toolbar in the U31 R22 client only display the buttons of some common functional modules by default, such as viewing topology, system monitoring, task management, and alarm monitoring. You can set the toolbar as required so that the buttons of the functional modules are displayed or hidden. Prerequisite The toolbar is displayed. Steps 1. Right-click the blank of the toolbar on the client terminal, and then select Toolbar Customization. The Toolbar Customization dialog box is displayed, see Figure 1-4. 1-14 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 1 Quick Start Figure 1-4 Toolbar Customization Dialog Box 2. Perform the corresponding operation as required. To... Display the button Do... i. In the Hide the toolbar buttons area, select the button to be displayed. ii. Click i. In the Show the toolbar buttons area, select the button to be hidden. ii. Click of a functional module Hide the button to move the button to the Show the toolbar buttons area. of a functional module to move the button to the Hide the toolbar buttons area. – End of Steps – 1.6 Other Functions 1.6.1 Locking the Screen You can lock the screen operation when you want to leave for a short time without exiting the client window. After the screen is locked, only you (that is, the current login user) or the system administrator can unlock the screen. l If the screen is unlocked by the current user, the client window appears with the same view displayed before the screen locking operation. l If the screen is unlocked by the administrator, the client window is displayed with the Topology Management window displayed by default. 1-15 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. Perform one of the following operations to open the Select Lock Type dialog box. l From the main menu, select System > Lock Screen. l On the toolbar, click the shortcut button . 2. Select a locking type. Table 1-2 Parameter Description of Select Lock Type Dialog Box Parameter Description Lock Screen The GUI will not be visible. Unlock method: enter the correct user name and password in the Unlock dialog box, and click OK. Lock Operation The GUI will be visible but operations are disabled. Unlock method: press <Ctrl+U>. The Unlock dialog box is displayed. Enter the correct user name and password, and click OK. 3. Click OK. The Confirm message box is displayed. 4. Click OK. – End of Steps – 1.6.2 Logging Out of the System Logout is unavailable if you log in from the portal. It is only available in the main window of the U31 R22 client. If you execute the operation of logout, you will exit from the client and the Login dialog box is displayed. Steps 1. Open the Confirm message box by performing one of the following operations: l From the main menu, select System > Logout. l On the toolbar, click . To... Do... Save the login user name and server IP address Click the Save option button. Delete the login user name and server IP Click the Delete option button. address 2. Click OK. – End of Steps – 1.6.3 Setting the Password of the Current Login User This procedure describes how to set a new login password. 1-16 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 1 Quick Start Steps 1. From the main menu, select System > User Password Setting. The User Password Setting dialog box is displayed. 2. Set the new password. Parameter Description Old Password Enter the current password. If the current password is null, you do not need to enter. New Enter the new password. The new password must be different from the last Password five passwords. Confirm Enter the new password again to confirm. User Password must be consistent Password with Confirm Password. 3. Click OK. The Confirm message box is displayed. 4. Click OK. – End of Steps – 1.6.4 Viewing the System Time The time of the client and the server may be different. You can check the current time of the server in the client window. Steps 1. From the client main menu, select System > Query System Time. The Query System Time message box is displayed. 2. View the server time and client time. – End of Steps – 1.6.5 Copying, Clearing, and Configuring Messages This procedure describes how to copy, clear, and configure the messages in the message area. Steps 1. You can perform any of the following operations to open the Show Message dialog box. l From the client main menu, select Window > Message Area. l Double-click at the bottom-left corner of the U31 R22 client window. 2. Perform the operations of copying, clearing, and configuring as needed. 1-17 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To... Do... Result Copy In the Show Message dialog box, select the The selected message is copied Selected message to be copied, and then click to the clipboard. . Message Copy All Click All the messages in the Show in the Show Message dialog box. messages Message dialog box are copied to the clipboard. Clear All Messages Set Message Count Click the button in the Show Message Message dialog box are cleared. dialog box. Click All the messages in the Show Set maximum number messages . Enter the maximum number messages in the Set Message Count dialog successfully. box, and then click OK. – End of Steps – 1-18 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Table of Contents Topology Management Functions ...............................................................................2-1 Topology Management Window..................................................................................2-2 Custom User Interface ...............................................................................................2-7 Functions on Topology Menu....................................................................................2-13 Common Topology Management Operations............................................................2-19 Operations on NE Tree.............................................................................................2-22 Operations on Topology Graph.................................................................................2-24 Virtual NE Operations...............................................................................................2-33 Virtual Link Operations .............................................................................................2-35 Group Management Operations ...............................................................................2-38 2.1 Topology Management Functions Overview The U31 R22 provides a series of topology management functions, including: l l Viewing and editing network resource locations, network architectures, links and connections, and service distribution in different service systems. Displaying topological relationships between service subnetworks along with access management. Function Description l Topology Display The U31 R22 system displays network resources by combining the NE tree and the topology graph. Users can manage network resources in different views. l Topology Operations The U31 R22 provides the following topology operations: à Searching topology nodes à Switching between different views à Backing up and printing the topology graph à Moving topology graph à Changing the displaying structure of topology graph à Displaying full-screen view 2-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l à Setting the network layout à Operations on groups à Operations on links à Operations on NEs à Expanding and collapsing the topology graph à Customizing elements on Graphic User Interface (GUI) à Viewing the rack diagram Monitoring Function The topology view provides a dynamic network topology graph, displaying the operation status of managed networks in real time. It monitors configuration changes and fault alarms. The topology graph also displays records of adding and deleting NEs and the configuration information of NEs, while informing users of these changes. By using regular synchronization, you cannot only view dynamic status of configuration changes in network devices, but also set the updating cycle of configuration information. Fault Monitoring: The topology graph can display fault generated in lower-level network element management systems in the format of visual and audio alarms. The system also distinguishes between different alarm severity levels by using different icon colors of faulty NEs. Acknowledged, unacknowledged, handled and removed faults are also displayed in different ways. 2.2 Topology Management Window Topology Management Window The Topology Management window is shown in Figure 2-1. 2-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Figure 2-1 Topology Management Window 1. NE tree 2. Topology graph toolbar l l l 3. Pane of filter, legend and display overview 4. Topology Graph 5. Prompt message area 6. Alarm and performance pane Note: To display the pane of filter, legend and display overview in the Topology Management window, you can click the button. To display the alarm and performance pane at the bottom of the Topology button. Management window, you can click the In the alarm and performance pane, NE alarm information is displayed, and you can query or handle alarms. Topology Menu The commands on the Topology menu are shown in Figure 2-2. 2-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Figure 2-2 Topology Menu Topology Graph and NE Tree l l l The NE tree lists all nodes in the network, while the topology graph shows all nodes on the current layer. The topology graph shows the network structure of devices managed by the system. The graph reflects parent-child relations between devices in a hierarchical way and displays connection relations between devices with lines. The system keeps the synchronization between the NE tree and the topology map. Moreover, the NE tree provides the navigation function for the topology graph. Topology Graph Toolbar On the top of the topology map is the topology toolbar, see Figure 2-3. You can use the buttons on the toolbar to perform basic operations on the topology graph. Figure 2-3 Topology Graph Toolbar The functions on the toolbar are described in Table 2-1. Table 2-1 Description of Topology Toolbar Buttons Button Function Configure Toolbar: used to configure topology buttons displayed on the toolbar. Select: By clicking this button and then clicking an NE or link on the topology map, and the NE or link node is selected. Pan: used to move the area displayed on the topology graph. Magnifying glass: used to zoom in the region where the cursor is located 2-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Button Function Regional Zoom: If you select a region and click this button, only the selected area in the current window is displayed. Zoom Out: used to zoom out the map. Zoom In: used to zoom in the map. Zoom Reset: used to display the map in accordance with the default scale of the system. Fit to Content: used to show the entire graph in the current window area of the topology view. Zoom Back: used to cancel the last zooming action. Lock Position: After being locked, the NE cannot be moved. Save Position: saves the position information on the topology graph. Icon Arrangement: used to arrange the nodes selected on the topology graph. Goto: locates a specified node on the graph. Back to: displays the map layer of the previous operation. This button changes in accordance with map layer change. Forward to: displays the map layer of the previous operation. This button changes in accordance with map layer change. Filtering: filters the topology graph or topology list based on the specified filtering conditions. Customized Displays: select the contents to be displayed in the topology graph. Export Current Graph: exports the information of all nodes on the current layer to a local file. Search(Ctrl+F): used to search nodes by name, type, description or location. Full Screen: displays the NE tree, Filter, Legend, and Display areas on the full screen. When the topology information is displayed in a graph, the button appears. View Table: shows the information of all nodes on the current layer in a list. 2-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Button Function When the pane of filter, legend, or display overview is displayed, the button appears. Hide Legend: used to hide the pane of filter, legend, and display overview. Pane of "Filter", "Legend", and "Display" overview On the right of the topology map is the pane of "Filter", "Legend", and "Display" overview. l l l You can set filtering conditions in the filter to only show the contents meeting the conditions on the view. The legend explains the icons of all NE types, alarm colors and status icons. In the display overview, you can set whether to show node name, link name and the message window in the Topology Management window and determine the contents displayed in the message window. Note: If the pane of Filter, Legend and Display Overview are not displayed in the Topology Management window, click the button to show the pane on the right. Alarm and Performance Pane The alarm and performance pane lists the alarm and performance messages of the selected NE. NE Icons NE icons refer to the icon of devices on the topology graph, see Figure 2-4. Figure 2-4 NE Icons The icon color indicates the following information: l l Blue: NE does not raise any alarm. Other colors: the highest-level alarm existing on the NE. Alarm colors represent alarm severity levels. For details, see Figure 2-5. 2-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Figure 2-5 Alarm Color Illustration Point the cursor to an NE icon and a message box appears to show the statistic information of related alarms. 2.3 Custom User Interface The GUI elements can be customized as required. 2.3.1 Customizing Icons by NE Type You can customize images corresponding to different NE types on the topology map and the NE Tree. Prerequisite The new image file meets system requirements and is stored on the client. Steps 1. From the client main menu, select Topology > Display Style Management > Customize GUI Elements. The Customize GUI Elements dialog box is displayed. 2. From the left list, select Customize Type Icon. The type icons are displayed in the right pane. 3. In the right list, click the is displayed. button after the icon to be replaced. The Open dialog box 4. Select a file from the Open dialog box. Note: The icon image file must meet the following requirements: l The selected image file must not exceed 50 KB. l The icon of an NE tree node must not be more than 25×25 pixels. l The icon of a topology node must not be more than 50×50 pixels. 5. Click Open to return to the Customize GUI Elements dialog box. 2-7 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 6. Click the OK button. – End of Steps – 2.3.2 Customizing Link Appearance This procedure describes how to set link linearity and width. Context You can customize the linearity and line width displayed on the topology map for links. Steps 1. From the client main menu, select Topology > Display Style Management > Customize GUI Elements. The Customize GUI Elements dialog box is displayed. 2. From the left list, select Customize Link Appearance. 3. In the right pane, click the link attribution box to be modified, and select a link style and link width as required from the drop-down list. 4. Click OK. – End of Steps – 2.3.3 Customizing Status Icons You can customize the icon of each status. Prerequisite The new image file meets system requirements and is stored on the local computer. Steps 1. From the client main menu, select Topology > Display Style Management > Customize GUI Elements. The Customize GUI Elements dialog box is displayed. 2. From the left list, select Customize Status Icon. 3. In the right list, click the is displayed. button after the icon to be replaced. The Open dialog box 4. Select a file from the Open dialog box. Note: The icon image file must meet the following requirements: The selected image file must not exceed 50 K. The icon of an NE tree node must not be more than 25*25 pixels. The icon of a topology node must not be more than 50*50 pixels. 2-8 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management 5. Click the Open button to return to the Customize GUI Elements dialog box. 6. Click the OK button. – End of Steps – 2.3.4 Customizing Status Colors You can customize colors corresponding to each status. Context l l RGB: indicates the parameters of red, green, and blue. HSB: indicates the parameters of hue, saturation, and brightness. Steps 1. From the client main menu, select Topology > Display Style Management > Customize GUI Elements. The Customize GUI Elements dialog box is displayed. 2. From the left list, select Customize Status Color. The status colors are displayed in the right pane. button in the Status Color field. The Chooser Status Color dialog box 3. Click the is displayed. Note: The Swatches tab is displayed by default. 4. Select the color as required, and click Preview button to view the setting. The last chosen color is displayed in the first box under the Recent section. Note: The HSB and the RGB of the selected color can be adjusted on the other two tabs. HSB and RGB settings are interrelated. Adjusting one of them will change the other. 5. Click the HSB tab. To set HSB, perform one of the following operations: l l l Click the option button before H, S, and B, and drag the color slider. Enter a value. Click the spin box to set a value. 2-9 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Note: The parameters set here affect those on the RGB tab. 6. Click the RGB tab. To set RGB, perform one of the following operations: l l l Drag the slider after each color. Enter a value. Click the spin box to set a value. 7. Click the OK button to finish setting and close the Customize GUI Elements dialog box. The color is changed by now. 8. Click OK. – End of Steps – 2.3.5 Customizing Status Order You can select the status icons to be displayed on the user interface and the order in which they are displayed. The higher-order icons are displayed to the left. Three icons can be displayed on the topology graph, while one icon can be displayed on the NE tree. To replace the status icons, refer to "Customizing Status Icons" in this chapter. Steps 1. From the client main menu, select Topology > Display Style Management > Customize GUI Elements. The Customize GUI Elements dialog box is displayed. 2. From the left list, select Customize Status Order. The Customize Status Order page is displayed in the right pane. 3. From the Displayed Status Icon box, select icons that do not need to be displayed. 4. Click Button to move the icon to the Undisplayed Status Icon list. Function Add all icons to Displayed Status Icon list. Add selected icons to Displayed Status Icon list. Move all icons to Undisplayed Status Icon list. Move selected icons to Undisplayed Status Icon list. Move selection to the icon above the selected one. 2-10 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Button Function Move selection to the icon below the selected one. 5. Click OK. Note: Click the Default button to restore default settings. – End of Steps – 2.3.6 Customizing Tooltips On the topology graph, a tip is displayed when you point to a node. You can customize node tips, or hint messages in the Topology Management window. The node tip includes: the node name, status, alarms, description, IP address , mode, performance information, and bearer network topology. For a description of the tooltip items, refer to Table 2-2. Table 2-2 Tooltip Item Descriptions Item Description Name Name of the node, for example, NE1. Type Type of the node, for example, ZXCTN 6300 or Link. IP Address IP address, for example, 192.168.200.1. Status Offline, online, or disconnected. Alarm Displays the unidentified active alarms and the number of total active alarms. If the node has no alarm, the item is not displayed. Description Description information. If the node has no description information, the item is not displayed. Performance Related performance information. BN TOPO ID of the device. Steps 1. From the client main menu, select Topology > Display Style Management > Customize GUI Elements. The Customize GUI Elements dialog box is displayed. 2. From the left list, select Customize Tooltips. The Customize Tooltips page is displayed in the right pane. 3. Select an NE type from the Type list. 2-11 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 4. On the Basic Information , NE PM Monitoring, and BN TOPO tab, select the tip message to be displayed. 5. Click the OK button to finish setting. – End of Steps – 2.3.7 Customizing Alarm Prompting Type You can customize the alarm prompting type of the nodes on the topology graph. The prompting type includes: l Show Alarm Bubble l Show alarm border l Alarm flashing Steps 1. From the client main menu, select Topology > Display Style Management > Customize GUI Elements. The Customize GUI Elements dialog box is displayed. 2. From the left list, select Customize Alarm. The Customize Alarm page is displayed in the right pane. 3. Select the check box before each prompting type according to the description and your needs. 4. Click OK to finish setting. – End of Steps – 2.3.8 Customizing Other Elements You can customize NE tree, status column, and topology diagram displayed in the Topology Management window. Steps 1. From the client main menu, select Topology > Display Style Management > Customize GUI Elements. The Customize GUI Elements dialog box is displayed. 2. From the left list, select Other. The other configurations are displayed in the right pane. l In the NE Tree Configuration area, select the Show Status Icon check box to show status icon. l In the Status Bar Configuration area, select the object to be displayed on the status bar. l In the Topology Graph Configuration area: à Select The Parent Node of a Layer is Visible. à Set Label Color. à Set Background Color. 2-12 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management à Set Node Border Color à Set Label Font Size. à Set Max Number of Character per Row in the Node Label. à Set Max Number of Rows in the Node Label. à Set Arrow of a Unidirectional Link is Visible. à Set Arrows of a Bidirectional Link are Visible. à Set Minimum Number of Links to be Combined. à Set Distance Between Two Links. Note: Minimum Number of Links to be Combined indicates that the links can be combined into one and be expanded when the number of the links between two NEs is more than or equal to the value. 3. Click Set to save the settings. – End of Steps – 2.4 Functions on Topology Menu This chapter provides instructions on topology management operations by using the commands on the Topology menu. 2.4.1 Opening the Topology Management Window This procedure describes how to open the topology management window. Context Log in to the U31 R22 client, and the system opens the Topology Management window by default. If you open another view later, perform the following steps to switch to Topology Management window again. Steps 1. Perform one of the following optional operations to open the Topology Management window. l From the client main menu, select Topology > View Topology. l l button on the toolbar. Click the Select Topology Management from the drop-down menu on top right. 2-13 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) – End of Steps – 2.4.2 Refreshing Topology Data When more than one user is operating on the topology graph at the same time, refreshing is necessary. If one user modifies the topology graph on his or her client and has uploaded modification to the server, you can refresh the topology to get latest data from the server. Steps 1. From the client main menu, select Topology > Refresh Data to refresh topology data. – End of Steps – Result In the message area, double-click . The Show Message dialog box is displayed, indicating the refreshed results, see Figure 2-6. Figure 2-6 Show Message Dialog Box 2.4.3 Exporting GUI Display Style You can export the GUI display style to a ZIP file. The exported file includes all the configuration data in Customize GUI Elements dialog box and your selections of legend display, overview map, NE location and lock status, and the map configuration. To export GUI display style, perform the following steps: Steps 1. From the client main menu, select Topology > Display Style Management > Export GUI Display Style. The Save dialog box is displayed. 2-14 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management 2. Set file path and name in Save in box and File name text box respectively. 3. Click the Save button to export all display settings to a ZIP file. – End of Steps – 2.4.4 Importing GUI Display Style The user may export the current display style into a ZIP file, which can later be imported to another client with the same topology data to realize consistency in display style between clients. Steps 1. From the client main menu, select Topology > Display Style Management > Import GUI Display Style. The Open dialog box is displayed. 2. Select a zip file from the Look in box. 3. Click the Open button to import the file, and the display style of the current client changes accordingly. – End of Steps – 2.4.5 Configuring Alarm Display Method 2.4.5.1 Showing and Setting the NE Monitoring Table You can view the monitoring information and acknowledgment status of NEs in the monitoring table at the bottom of Topology Management window. You can also set the monitoring mode in the table. Steps 1. From the client main menu, select Topology > Set Alarm Display Style > Show NE Alarms Table. The monitoring table is displayed at the bottom of the client. Note: Select an NE in the topology graph or on the NE Tree, and the alarm information of the NE is displayed on the Active Alarms. 2. Select filter conditions from the Severity, ACK State and Visibility drop-down menu to set the monitoring information you want to see. 3. You can use the buttons on the monitoring pane to handle the monitoring information. For the operation descriptions, refer to Table 2-3. 2-15 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Table 2-3 Toolbar on Monitoring Pane Function Exporting Button Operation i. monitoring informa- Click the button, and select Export All Columns or Export Visible Columns. The Save dialog box is displayed. ii. Set file path, name, and type. tion iii. Click the Save button, and a message box is displayed prompting success. Printing monitoring i. Click the button. The Print Setup dialog box is displayed. ii. Set printing parameters. informaiii. Click the Print button. tion At most 5000 records can be printed at a time. Pin table Used to stop refreshing the NE monitoring table. The current page will remain unchanged. Customize i. display columns Click the button. The Customize Display Columns dialog box is displayed. ii. select the check boxes corresponding to the columns you want to show on the table. iii. Click right or left arrow to add or remove the columns, and click up or down arrow to adjust the sequence of columns displayed on the table. iv. Double-click an item in the "Undisplayed Column" to display the column. Double-click an item in the "Displayed Column" to move that filed to "Undisplayed Column" list. v. Click OK button to finish setting. 4. To view the details of an alarm in the NE monitoring table, double-click corresponding row to open the Details dialog box. 5. In the detailed monitoring dialog box, click the Handling Measure tab to view or edit the handling measures. 6. Click the Close button to close the dialog box. Note: If you have edited the handling measures, click the Save button before closing the dialog box. 7. (Optional) In the dialog box showing the details of an alarm, perform the following operations as required. 2-16 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Table 2-4 View Details of Alarm Information To... Do... View previous message Click this button to show the details of the previous alarm message in the dialog box. View next message Click this button to show the details of the next alarm message in the dialog box. Acknowledge an alarm Click this button to acknowledge the current alarm. Cancel acknowledgment Cancel acknowledgement of an acknowledged alarm, whose status turns to "Unacknowledged" accordingly. Add comments i. Click the button. The Comment dialog box is displayed. ii. Type the comments or description in the text box, and click the OK button. Clear contents To clear the contents of this monitoring record, click the button and click OK button in the displayed Confirm message box. Forward message to related personnel via i. Click the button. The Forwarding Setup dialog box is displayed. ii. Select the forwarding mode: E-mail, phone number, or/and SMS. SMS, E-mail, or phone iii. Click the OK button. Export the current message i. Click the button. The Save dialog box is displayed. ii. Set file name, path, and type. iii. Click the Save button. You will be prompted of successful export. Copy the details of the message i. Click the Copy button. ii. Open the window to paste the information. – End of Steps – 2.4.5.2 Showing Primary Monitor Alarm Table You can query primary monitor alarms based on their severity in accordance with query conditions that are preset. Steps 1. From the client main menu, select Topology > Set Alarm Display Style > Display Important Alarms Table. The important alarm table is displayed at the bottom of the Topology Management window. 2. Set query conditions to query the monitor information of primary alarms. a. In the Topology Management area, click box is displayed. . The Set Monitor Condition dialog b. Select an NE from the Location tab in the Set Monitor Condition dialog box. 2-17 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) You can select NEs by performing one of the following operations: l l c. NE type: Select an NE type from the NE type list. If this is not configured, all NE types are queried by default. NE tree: Expand the NE tree, and select the NE you want to query. Click the Alarm Code tab and select an alarm code. d. Click to move selected alarm code(s) to the selected box on the right. e. Click the Time tab to set alarm generating time. f. Click the Others tab to set other parameters. l Alarm Type: Select the check box to select the alarm types to be queried. l Data Type: Select the check box to select the data types to be queried. l Severity: Select the check box to select the perceived severity to be queried. l ACK State: Select the check box to select alarms to be queried in corresponding acknowledgement status. l NE IP: If you want to query the alarm of a specified NE, enter the NE IP. l Click the Advanced button, and set advanced parameters in the displayed Advanced dialog box. Parameter Description (Un)ACK user ID: Sets the ID of the user that acknowledges or Exact Match unacknowledges the alarm. Comment(Fuzzy Sets a string for fuzzy match. Match) Alarm ID(Exact Match) Sets the ID of an alarm to be queried. Visibility Queries visible or invisible alarms. Correlation Sets alarm query correlation. Maintenance State Sets alarm debugging status. Note: The alarm levels and confirmation status can also be set by selecting options from the Severity and ACK State drop-down menus. g. Click OK. – End of Steps – Result The queried result is displayed in the Important Alarms Table area at the bottom of the Topology Management window. 2-18 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management 2.5 Common Topology Management Operations This chapter describes common topology management operations that you can perform by using the commands from the shortcut menu of a node on either the NE tree or the topology graph of the Topology Management window. 2.5.1 Setting Node Rules Set rules for a node (except actual microwave NE nodes) in the topology graph or on the NE tree, including location, device type, and IP address. The topological objects created afterwards will be set under the node that can best match its rules. Steps 1. In the Topology Management window, right-click an NE, and select Topology Management > Set Rule from the shortcut menu. The Set Rules dialog box is displayed. Select a rule from the following list: IP Address Rule, Device Type Rule, and Location Rule. 2. Select rules form the Rule Type list. 3. Configure the rules as required. Parameter Description IP Address Rule Enter the IP address in the text box. The semicolon ";" is used to separate multiple IP addresses. The following three formats of strings can be used: l A singe IP address, for example, 1.2.3.4 l An IP address ranges from a smaller address to a larger one connected with "-", for example, 10.10.1.5–10.10.2.6 l IP address with "*" used at head or end to substitute for multiple characters Not Equals: The IP address is not matched. Location Rule Enter the location in the text box. The semicolon ";" is used to separate multiple locations. l The asterisk "*" can replace any characters, and the question mask "?" only replaces one character. l The asterisk "*” is represented by "\*" , and the question mask "?" is represented by "\?". Not Equals: The input location is not matched. Ignore Case: no case-sensitive Device Type Rule l Select the known device type, and then click l Enter the device type manually: . 2-19 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Description à The asterisk "*" can replace any characters, and the question mask "?" only replaces one character. à The asterisk "*” is represented by "\*" , and the question mask "?" is represented by "\?". Not Equals: The input location is not matched. Ignore Case: no case-sensitive 4. Click Save. Note: The objects created before the rule is enabled are not affected by the rule. – End of Steps – 2.5.2 Setting Members of a Node This procedure describes how to set members for a group or an NE. Steps 1. In the Topology Management window, right-click a node, and select Topology Management > Set Member from the shortcut menu. The Set Member dialog box is displayed. 2. In the Set Member dialog box, select an NE from the Available Items list, and click the Add button to add the NE to the Selected Items list. 3. (Optional) Repeat step 2 to add multiple NEs. 4. Click OK. – End of Steps – 2.5.3 Moving a Node You can move a node to another place (except actual microwave NE nodes) on the NE Tree. Steps 1. In the Topology Management window, right-click a node, and select Topology Management > Move Node from the shortcut menu. The Move Node dialog box is displayed. 2-20 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management 2. Select a new parent node on the NE tree. 3. Click the OK button. The node is moved to the specified place on the NE Tree. – End of Steps – 2.5.4 Showing Statistics of a Node You can view the statistics of a node on the NE tree, including the number of its child NEs, and that of related groups and links. Steps 1. You can use any of the following methods to display the Statistical Information dialog box. l In the Topology Management window, right-click a node, and select Topology Management > Show Statistical Information from the shortcut menu. The Statistical Information dialog box is displayed. l In the Topology Management window, right-click a node in the NE Tree list. Select Topology Management > Show Statistical Information. The Statistical Information dialog box is displayed. l From the main menu, select Topology > Show Topology Statistics. The Statistical Information dialog box is displayed. 2. View the number of NEs, connected NEs, disconnected NE, and offline NEs 3. (Optional) Click Export to export the statistical information. The formats of exported files include txt, htm, pdf, xls, csv, prn, xlsx, and xml. – End of Steps – 2.5.5 Switching to the Fault Management Window You can select an NE and switch to the Fault Management window to troubleshoot the fault alarms of the NE. Steps 1. In the Topology Management window, right-click an NE, and select Fault Management from the shortcut menu. The system displays the corresponding alarm window of the NE. – End of Steps – 2.5.6 Switching to the Performance Management Window You can select an NE and switch to the Performance Management window to manage performance data of that NE. 2-21 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. In the Topology Management window, right-click an NE, and select Performance Management from the shortcut menu. The system displays the corresponding performance management window of the NE. – End of Steps – 2.5.7 Viewing the Alarm Count of a Node You can quickly view the number of current alarms and total alarms of an NE on the topology graph. To view alarm details, see 《 U31 R22 Unified Network Management System Performance Management Operation Guide 》 Steps 1. In the NE tree or topology graph, suspend the mouse on the NE for seconds. The alarm information will be displayed automatically. – End of Steps – 2.6 Operations on NE Tree 2.6.1 Introduction to NE Tree The NE Tree is to the left of the topology graph, see Figure 2-7. Figure 2-7 NE Tree On the NE tree, you can query the corresponding nodes in one of the following ways. For the differences between the three ways, refer to Table 2-5. The detailed operation of each way is described in the following chapters. 2-22 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Table 2-5 Differences Between the Three Ways Query Way Query Result Filter Only the NEs or groups whose names include "filtering condition" are displayed on the NE tree. Find NEs or groups whose names include "search condition" are highlighted on the NE tree or in the topology view. You can click Find Next to locate other NEs or groups meet the "search condition". Filter by Resource Only the NEs meet the resource type displayed on the NE tree. Type In addition, you can perform the operations the same as the above through the right-click menu on the node of the NE tree. 2.6.2 Implementing the Filtering This procedure describes how to set the filtering condition, and then implement the filtering. Prerequisite You have learned of the related information of the NE node that you want to search. Steps 1. Enter a keyword in the text box under the NE Tree tab, such as the name, see Figure 2-8. Figure 2-8 Entering a Keyword 2. Click the button to filter NEs. The NE nodes that satisfy the query condition are displayed in the NE tree. – End of Steps – 2.6.3 Searching the NE or Group This procedure describes how to search an NE or group in the NE tree as required. Steps 1. On the right of the NE tree text box, click dialog box is displayed. , and then click . The Find 2-23 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2. Enter the querying condition, for example, the name of the NE or group. 3. Click Find Next to locate another NE or group. – End of Steps – 2.6.4 Filtering the Resource Type This procedure describes how to filter the NEs that meet the querying condition in the NE tree and topology view. Steps 1. On the right of the NE tree text box, click , and then click . The Filter by Resource Type dialog box is displayed. 2. In the Resource Type tree, select the NE type to be filtered. 3. Click OK. Only NEs that meet the querying condition are displayed in the NE tree and topology view. – End of Steps – 2.7 Operations on Topology Graph This chapter describes how to perform operations unique to topology graph. 2.7.1 Topology Layer Operations The topology graph is divided into layers. Select a node on the NE tree, and the topology graph shows all nodes on the current layer under the same node, see Figure 2-9. 2-24 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Figure 2-9 Current Layer Operations on the topology layer are described in the next few topics. 2.7.1.1 Going to the Upper Layer This procedure describes how to view the topology graph of the upper layer. Prerequisite The current layer is under a parent-node layer. Steps 1. On the topology graph, right-click the blank, and select To Upper Layer from the shortcut menu. – End of Steps – 2.7.1.2 Expanding and Collapsing a Node On the current layer, you can expand a node to show its child nodes at the same time and collapse it to hide the child nodes. Collapsing is the opposite operation of expanding. 2-25 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Prerequisite The current node has at least one child node. Steps 1. Expand a node: Right-click a node to be expanded on topology graph, and select Topology Management > Show Node's Sublayer from the shortcut menu. 2. Collapse a node: Right-click a node to be collapsed on topology graph, and select Topology Management > Hide Node's Sublayer from the shortcut menu. – End of Steps – 2.7.1.3 Expanding and Collapsing All Nodes on the Current Layer One-layer expanding is the opposite operation of complete collapsing. You can perform the operations through right-click menus. Prerequisite The current layer has at least one child-node layer. Context On the current map layer, you can expand all parent nodes and collapse all expanded nodes. l l Expanding all nodes: to expand all parent nodes on the current layer and display all their child nodes in one layer. Collapsing all nodes: to collapse all the expanded nodes. Steps 1. Expanding all nodes: Right-click the blank of the topology graph, and select Show Sublayer from the shortcut menu. All sub-layers are then shown on the current layer. 2. Collapsing all nodes: Right-click the blank of the topology graph, and select Hide Sublayer from the shortcut menu. All expanded sub-nodes are then hidden, with all their parent nodes being displayed. – End of Steps – 2.7.1.4 Going to Lower Layer This procedure describes how to go to the lower layer of the current node. Prerequisite The current node has sub-nodes. 2-26 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Steps 1. On the topology view, right-click a parent node, and select Topology Management > To Lower Layer from the shortcut menu. The topology information of the lower layer is displayed in the topology view. – End of Steps – 2.7.2 Functions of Toolbar buttons On the top of the topology graph is the topology toolbar, as shown in Figure 2-10. You can use the buttons on the toolbar to perform basic operations on the topology graph. Figure 2-10 Topology Graph Toolbar For the description about buttons, refer to 2.2 Topology Management Window. The common functions that use buttons are described below. Moving the Topology Graph You can move the topology graph in the current view to display the information out of the current view. 1. Click the button on the toolbar. 2. Drag the cursor to move the topology graph. Locking and Unlocking the Topology Graph NEs can be moved on the topology graph if the topology graph is not locked. After being locked, NEs cannot be moved. 1. To lock NEs on the topology graph, click 2. To unlock NEs on the topology graph, click to lock NEs on the topology graph. . Setting Network Layout You can select a network layout type of NEs on the topology graph. button on the toolbar. The Network Layout dialog box is displayed. 1. Click the 2. Select a layout type from the Layout Strategy list. Note: For a layout type, refer to the layout example in the Sample pane. The layout types include: 2-27 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l Hierarchical Layout l Tree Layout l Radial Tree Layout l Spring Embedded Layout l Uniform Length Edges Layout 3. Click OK. Switching to the Graph of Another Node You can switch the graph to another node that you have viewed during this login. 1. Click the button. The list of nodes you have viewed is displayed, see Figure 2-11. Figure 2-11 Viewed Nodes 2. Select the node on the list as required. Searching a Topology Node You can search a node by name, type, position, IP address, or description. 1. Click the button. The Search dialog box is displayed. 2. Click an optional button after Search Mode. l Or: searches the node(s) that meet(s) one of the conditions you select. l And: searches the node(s) that meet(s) all conditions you select. 3. Select one or multiple conditions, and configure the condition value in the corresponding condition area. 4. Select the Case Sensitive check box. 5. Click the Search button. l l Note: A table is displayed below the topology graph to show the search result. If no matching nodes are found, the Confirm message box is displayed, informing you about the result. Displaying the Topology Map on Full Screen If the topology graph is displayed on non-full screen, you have to drag the graph to view the part that is not displayed. Full-screen view displays all information, thus unnecessary to move the graph. 2-28 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Click the button. Note: You can click the button to exit full-screen display. Exporting the Topology Graph This procedure describes how to save the current topology graph as a screen snapshot to a local path. 1. Click the button. The Save dialog box is displayed. 2. Select a file path in Save in box. 3. Set the file name and type. l File Name: Enter the file name. The name of a group or an NE is recommended. l Files of Type: The options include jpg and png. 4. Click the Save button. A message box is displayed. 5. Click OK. Showing the Topology Information in Table This procedure describes how to switch the topology display mode between a topology table and a topology graph. 1. Click the button. The topology information is listed in a table. 2. Click the button to return to the topology graph. Printing Topology Information You can only print the NE list when they are displayed in table, instead of being presented in topology graph. 1. 2. 3. 4. 5. Click the button. The Print Setting dialog box is displayed. On the General tab, set Printer, Print Range and Copies. On the Page Setting tab, set Paper Size, Orientation, and Margins. On the Advanced tab, set advanced parameters. Click the Preview All button. The Print Preview dialog box is displayed, in which you can preview printing result. 6. Click the button in the Print Preview dialog box to print the NE list. Customizing Content Display on the Topology Graph You can select the contents you want to display on the topology graph. For example, the notification message is displayed only when you select the Enable Message Notification check box. 1. Click the button. 2-29 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l If the topology information is listed in the table, the Customize Display Columns dialog box is displayed. l If the topology information is displayed on the topology graph, the Configure Display Content dialog box is displayed. 2. Select the contents you want to display. 3. Click OK. Displaying or Hiding the Pane of Filter, Legend, and Display Overview This procedure describes how to hide or show the pane of filter, legend, and display overview on the right of the Topology Management window. In the Topology window, click pane. l l in the toolbar. The Legend tab is displayed in the right Click Filter below the Legend tab. The Filter dialog box is displayed. Click Configuration Display Content below the Legend tab. The Configure Display Content dialog box is displayed. You can customize the contents to be displayed in the Topology Management window. 2.7.3 Display Filter Settings 2.7.3.1 Setting Topology Nodes on Filter Tree This procedure describes how to set filtering conditions on the topological filter tree to get the desired topology view. Prerequisite The legend page is displayed in the topology management view. Steps 1. In the right pane of the Topology Management window, click the Filter link. The Filter dialog box is displayed. The Filter dialog box has two sub-pages, of which the Filter Tree is displayed by default. Note: If the pane of Filter, Legend and Display Overview is not displayed in the Topology Management window, click the button to show the pane on the right. 2. Expand the resource tree to view detailed nodes. 2-30 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management 3. Select the check box before the nodes you want to display. The checked nodes are displayed on the topology graph. 4. Click OK. The selected NEs are displayed on the topology graph. – End of Steps – 2.7.3.2 Setting Topology Nodes by Using Condition Filter If the topology graph is complex or that the user only needs necessary information, using the condition filter can remove some information. Set filtering conditions on the Condition Filter page to get required topological view. Prerequisite The legend page is displayed in the topology management view. Steps 1. In the right pane of the Topology Management window, click the Filter link. The Filter dialog box is displayed. Note: If the pane of Filter, Legend and Display Overview is not displayed in the Topology Management window, click the button to show the pane on the right. 2. Click the Condition Filter optional button in the Filter dialog box. 3. Select a filtering method. l Or: The NEs or Groups meeting one of the conditions will be displayed after filtering. l And: Only the NEs or Groups meeting both conditions will be displayed after filtering. 4. Enter the filter condition in the NE(Group) Name and IP address text boxes. 5. Enter the link name in the Link Name text box. 2-31 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Note: You can also use the following wild cards: "?" represents one character, while "*" represents two characters. Use ";" to separate more than one IP addresses. You can enter three types of IP address: l l l A single IP address, for example, 1.2.3.4. An IP address range from a smaller address to a larger one connected with "-", for example, 10.197.0.0-10.197.255.255. IP address with "*" used at head or end to substitute for multiple characters, for example, *.10.10.10 and 10.197.10.*. 6. Click the OK button to display the nodes that meet the filter conditions on the topology graph. – End of Steps – 2.7.4 Configuring a Map You can import a map to the current topology graph to manage NEs on the map. Context l l The system provides a default map as the background of the topology graph. The imported map file should be less than 1 MB, and in .gif or .jpg format. Steps 1. Right-click the blank of the topology graph, and select Configure Map from the shortcut menu. The Configure Map dialog box is displayed. 2. Click the Import... button in the File Setting group box to select a map file. To... Do... Import a specific map i. Click the Import... button. ii. Select a map file in the displayed dialog box. iii. Click Open. Import a default map Click Default. 3. Set the horizontal and vertical coordinates in the Map Range group box. 2-32 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Note: You can only set the range for the imported map. Parameter Description Value Range Horizontal coordinate Horizontal coordinate of the [-180, 180] map range Vertical coordinate Vertical coordinate of the map [-90, 90] range 4. Click OK to save the settings. The imported map will be displayed as the background of the topology graph. – End of Steps – 2.8 Virtual NE Operations Virtual NE refers to an NE that is not physically connected to the U31 R22 system. The topology view can display a global network through virtual NEs. You can create, delete, modify, and display the topology attributes of a virtual NE. 2.8.1 Creating a Virtual NE You can create a virtual NE of a certain type as required on the topology graph. The parameters include father node, NE node, location description, and IP address. Steps 1. Right-click any blank area in the Topology Management window, and select Create Object > Virtual NE from the shortcut menu. The Create Virtual NE dialog box is displayed. 2. Set the parameters in the Create Virtual NE dialog box. Parameter Description Parent Node By default, it is the parent node you selected from the shortcut menu. You can select another parent node by clicking Select. Name Name of the virtual NE. Location Location information of the virtual NE. Description IP Address IP address of the Virtual NE. Description Optional parameter. 2-33 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Description Successively l Create To select the check box: After a virtual NE is created, the Create Virtual NE dialog box is automatically displayed, and you can continue to create a more virtual NE. l To clear the check box: After a virtual NE is created, the Create Virtual NE dialog box is not displayed. 3. Click OK. The virtual NE is created successfully, and displayed in the NE tree and topology view. – End of Steps – 2.8.2 Modifying the Attributes of a Virtual NE This procedure describes how to modify the attributes of a virtual NE, such as the name, location description, and IP address as needed. Prerequisite The virtual NE is created. Steps 1. In the NE tree or on the topology graph, right-click the virtual NE to be modified, and select Topology Management > Modify Virtual NE from the shortcut menu. The Modify Virtual NE dialog box is displayed. 2. Modify the corresponding attributes. 3. Click OK. – End of Steps – 2.8.3 Deleting a Virtual NE This procedure describes how to delete a virtual NE. Prerequisite The virtual NE is created. Steps 1. In the NE tree or on the topology graph, right-click a virtual NE, and select Topology Management > Delete Virtual NE from the shortcut menu. The Confirm message box is displayed. 2. Click Yes. – End of Steps – 2-34 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management 2.8.4 Viewing a Virtual NE Attributes This procedure describes how to view the attributes of a virtual NE, including the parent node, name, location description, and IP address. Prerequisite The virtual NE is created. Steps 1. In the NE tree or on the topology graph, right-click a virtual NE, and select Topology Management > View Virtual NE from the shortcut menu. The View Virtual NE dialog box is displayed. Note: To view the virtual NE attributes, you can also display the topology information in table. – End of Steps – 2.9 Virtual Link Operations Virtual link refers to a virtual topology connection between NEs. You can create, delete, modify, and display the topology attributes of a virtual link. 2.9.1 Creating a Virtual Link This procedure describes how to create a virtual link. You need to set the link name, link direction, source and target nodes, and description of a new virtual link. Steps 1. Use any of the following methods to display the Create Virtual Link dialog box. l Right-click the blank area in the Topology Management window, and then select Create Object > Virtual Link from the shortcut menu. The Create Virtual Link dialog box is displayed. l Use the mouse pointer to select a rectangle covering two NEs in the topology. Right-click either of the two NEs. Select Create Object > Virtual Link. l Select an NE from the NE Tree or in the topology. Press Ctrl or Shift without releasing the key, and select anther NE. Release the key and then right-click either of the two NEs. Select Create Object > Virtual Link. 2-35 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Note: You can also open the Create Virtual Link dialog box in one of the following ways. l l Press the left mouse button and draw a rectangle on the topology graph to select two NEs. Then right-click either NE, and select Create Virtual Link from the shortcut menu. On the NE tree or the topology graph, click to select one NE, and press Ctrl (or Shift) while clicking to select another NE. Next, right-click either NE, and select Create Virtual Link from the shortcut menu. 2. Set the parameters referring to the following table. Parameter Description Name The name of the virtual link, used for search. Link The options are: Send, Receive, Both, and None. Direction Source Starting NE of the virtual link. Click Source. Select a Node from the Select Node Node dialog box. Source Port The starting port of the link. Target Ending NE of the virtual link. Click Target. Select a Node from the Select Node Node dialog box. Target Port The ending port of the link. Description Description of the link. Succes- l To select the check box: After a virtual link is created, the Create Virtual sively Cre- Link dialog box is automatically displayed, and you can continue to create a ate more virtual link. l To clear the check box: After a virtual NE is created, the Create Virtual Link dialog box is not displayed. 3. Click OK. – End of Steps – 2.9.2 Modifying the Attributes of a Virtual Link This procedure describes how to modify the attributes of a virtual link. The link name and link direction can be modified. Prerequisite The virtual link is created. 2-36 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Steps 1. In the NE tree or on the topology graph, right-click the virtual link to be modified, and select Topology Management > Modify Virtual Link from the shortcut menu. The Modify Virtual Link dialog box is displayed. 2. Modify the corresponding attributes. 3. Click OK. – End of Steps – 2.9.3 Deleting a Virtual Link This procedure describes how to delete a virtual link if the virtual link is not required. Prerequisite The virtual link is created. Steps 1. In the NE tree or on the topology graph, right-click a virtual NE, and select Topology Management > Delete Virtual Link from the shortcut menu. The Confirm message box is displayed. 2. Click Yes. – End of Steps – 2.9.4 Viewing a Virtual Link Attributes This procedure describes how to view the attributes of a virtual NE, including the link name, link direction, source and target nodes, and description. Prerequisite The virtual link is created. Steps 1. On the NE tree or the topology graph, right-click a virtual NE, and select Topology Management > View Virtual Link from the shortcut menu. The View Virtual Link dialog box is displayed. Note: To view the virtual link attributes, you can also display the topology information in table. – End of Steps – 2-37 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2.10 Group Management Operations The U31 R22 system groups the managed NEs to facilitate resource management. The NEs can be divided in accordance with type and location. 2.10.1 Creating a Common Group In the Topology Management window, NEs can be divided into logical groups. This grouping process does not depend on the actual physical connections between the NEs. Prerequisite You have the user permissions of "Maintenance Role" or above. Steps 1. Right-click a blank area in the Topology Management window, and select Create Object > Common Group. The Create Common Group dialog box is displayed. 2. Set the attributes of the common group referring to the following table. Parameter Description Parent Node Click Select and select a node (other group or NE) where you want to create a group. Name Enter the group ID. Common groups under one parent node cannot have the same name. Description Enter the supplementary information. Rule Type No Rule No rule is required. IP Address Enter the IP address manually. Rule If Not Equals is selected, the entered IP rule is excluded. Location Enter the location manually. Rule l If Not Equals is selected, the entered location is excluded. l If Ignore Case is selected, the entered location is not case sensitive. Device Type Select Select Device Type or Input Device Type. Rule l If Not Equals is selected, the entered device type is excluded. l If Ignore Case is selected, the entered device type is not case sensitive. 2-38 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Note: If the Successively Create check box is selected, after a common group is created, the Create Common Group dialog box is displayed automatically to create another common group. 3. Click OK. – End of Steps – Result In the left NE Tree in the Topology Management window, the new group is displayed under the selected parent node. 2.10.2 Creating a Type Group Creation of type groups is based on equipment type. You can either create a single group, or create multiple groups in batches. Prerequisite You have the user permissions of "Maintenance Role" or above. Context The type groups cannot have the same name under the same parent node. Steps 1. Right-click a blank area in the Topology Management window, and select Create Object > Type Group from the menu. The Create Type Group dialog box is displayed. 2. Click the Select... button. The Select Node dialog box is displayed. 3. Select the parent node of the new group, and then click OK. Note: The parent node here can be other groups or NEs. 4. Perform the following operation as required. 2-39 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To... Create a batch of Do... i. Click the Create a Batch of Groups tab. ii. Select all the device types to be grouped. groups iii. Click OK to create the groups in batches. Groups of all selected device types are created and all groups are located under the selected parent node. Create a single i. Click the Create a single group tab ii. Enter the group name and group description. group iii. Select a rule type. The writing specifications vary with rule types, and you should enter the rule based on a message. The rules for the type groups include No Rule, IP Address Rule, Location Rule, and Device Type Rule. All writing specifications are given in the bottom of the dialog box. iv. Click OK. The new single group is displayed under the selected parent node. – End of Steps – 2.10.3 Creating a Location Group This procedure describes how to create a location group. The parent node, group name, description, and rule type of a location group needs to be set. Prerequisite You have the user permissions of "Maintenance Role" or above. Steps 1. Right-click a blank area in the Topology Management window, and select Create Object > Location Group from the menu. The Create Location Group dialog box is displayed. 2. Click Select.... The Select Node dialog box is displayed. 3. Select the parent node of the new group, and then click OK. 2-40 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management Note: The parent node here can be other groups or NEs. 4. Enter the group name and group description. 5. Enter the self-defined rules in Rule Type. l l l Note: The writing specifications vary with rule types, and you should enter the rule based on the message. The rules for the location groups include No Rule/IP Address Rule/Location Rule/Device Type Rule. All writing specifications are given in the bottom of the dialog box. If Successively Create is selected, the Create Location Group dialog box is automatically displayed after a location group is created, and you can continue to create a more location group. 6. Click OK. The new location group is displayed under the selected parent node. – End of Steps – 2.10.4 Setting Members You can allocate members for an NE or a group as sub-nodes of the NE or group. Prerequisite You have the user permissions of "Maintenance Role" or above. Steps 1. In the Topology Management window, select an NE or a group in the object tree in the left pane. 2. Right-click an NE or a group, and select Topology Management > Set Member from the shortcut menu. The Set Member dialog box is displayed. 3. Perform the following operation as required. 2-41 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To... Do... Add a member Only an NE but not a group can be added as a member. i. Select an NE from the Available Items pane, and click to move the selected NE to the Selected Items pane. ii. Click OK. The added member is displayed in the group. i. Select an NE from the Selected Items pane, and click Delete a member to move the selected NE to the Available Items pane. ii. Click OK. The member is not listed in the group. – End of Steps – 2.10.5 Deleting a Group You can delete groups as required. This procedure describes how to delete a type group, and other groups can also be deleted in the similar way. Prerequisite The group is created. Context This section takes deleting a type group as an example. Other groups can also be deleted in the similar way. Steps 1. In the NE tree or on the topology graph, right-click a group, and select Topology Management > Delete Type Group from the shortcut menu. The Confirm message box is displayed. Note: The shortcut menus vary with the types of objects. 2. Click OK to delete the selected group. – End of Steps – 2-42 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 2 Topology Management 2.10.6 Viewing Attributes of a Group This procedure describes how to view the topology attributes of a type group, including the parent node and group name. Other groups can also be viewed in the similar way. Prerequisite The group is created. Context This section takes viewing a type group as an example. Other groups can also be viewed in the similar way. Steps 1. In the NE tree or on the topology graph, right-click a group, and select Topology Management > View Type Group. The View Group dialog box is displayed. Note: The shortcut menus vary with the types of objects. To view the group attributes, you can also display the topology information in table. For this operation, see "Showing the Topology Information in Table" in the chapter "Operations on Topology Graph". – End of Steps – 2-43 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) This page intentionally left blank. 2-44 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Table of Contents Overview ....................................................................................................................3-1 Preference Settings....................................................................................................3-7 Synchronizing NE Alarms.........................................................................................3-28 Alarm Query .............................................................................................................3-30 Alarm Information Query .........................................................................................3-42 Handling Alarm ........................................................................................................3-46 Alarm Forwarding .....................................................................................................3-51 Alarm Rule Management..........................................................................................3-52 Fault Handling Settings ............................................................................................3-58 Alarm Statistics ........................................................................................................3-61 Alarm and Notification Monitoring .............................................................................3-67 Alarm Task Management..........................................................................................3-70 3.1 Overview Alarm information is displayed if a fault or prompt message occurs during system operation. The fault management module monitors the operational status of the U31 R22 system in a centralized manner, and collects real-time alarms and notifications of boards, databases, and the server. If a fault occurs, the module immediately displays the accurate fault information to help the administrator locate and troubleshoot the fault for stable operation of the system. 3.1.1 Fault Management Terms The fault management module provides a maintenance tool for monitoring the operational status of the U31 R22 system and collecting real-time alarms and notifications of boards, databases, and the server. If a fault occurs, the module immediately displays the accurate fault information to help the administrator locate and troubleshoot the fault for stable operation of the system. In addition, the module also provides accurate, timely, and necessary alarm data for operators, network management departments, and vendors. Alarm An alarm is a prompt message indicating faults that occur during the system operation and have negative effects on the system service and reliability. 3-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) This kind of faults may impact the proper system operation. Therefore, once it occurs, the user must immediately find out the cause and troubleshoot it. Notification Notification is reported when a fault or event that cannot be recovered occurs in the network, such as the restart of a board and the fake power failure of a board. Such faults or events are generally caused by some occasional factors, such as the sudden change of the environment. Therefore, no special handling is required for notifications. However, if a notification is displayed frequently, it is required to find out the cause and troubleshoot it. Active alarm An active alarm indicates the occurrence of a fault that has not been removed yet. History Alarm A history alarm indicates the occurrence of a fault that has already been removed. Visible and Invisible Alarms After the alarm filtering rule becomes effective, some alarms become invisible alarms (such as the queried alarms after alarm filtering), and other alarms are visible alarms. Alarm Clearing A notification that an alarm has been cleared is reported after the corresponding fault is successfully removed. Alarm Shielding The alarms are not reported to the NMS server in accordance with customized conditions. Alarm Code An alarm code is a unique sequence number used to identify an alarm for fault management. 3.1.2 Main Interface of Fault Management View On the menu bar of U31 R22 main interface, select Fault > Alarm Monitoring. The Fault Management view is displayed. 3-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Figure 3-1 Fault Management View User Interface 1. Main menu 2. Toolbar 3. Management tree, NE tree, and statistic tree 4. Status bar 5. Alarm information pane Main Menu Main menu provides menus for configuring system attributes, including topology management, fault management, performance management, and help. Toolbar Toolbar provides buttons for carrying out common sub-functions of each module. Fault management module contains the following buttons: Module Button Description Alarm Alarm Monitoring Query Active Alarms Query History Alarms Management tree, NE tree, and Statistic tree The Management tree, NE tree and Statistic tree are shown in Figure 3-2, Figure 3-3, and Figure 3-4 respectively. 3-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Figure 3-2 Management Tree Management tree organizes all the fault management functions in the form of a tree. The nodes under the tree root indicate corresponding functions. The user can perform alarm query operations and related settings easily by using Management tree. Figure 3-3 NE Tree NE Tree organizes NEs in the form of a tree. The nodes under the tree root indicate different functional units of the NEs. Adjacent nodes under the tree are in parallel or hierarchical relationship. NE tree demonstrates the real physical relationships among the functional units of each managed NE. 3-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Figure 3-4 Statistic Tree Statistic tree organizes statistic methods in the form of a tree. Alarm Information Pane Alarm Information Pane is the main area of fault management, which displays the information of various alarms and notifications as requested by the user. Status Bar The status bar shows the information of the current login user and the server. 3.1.3 Alarm Classification By Alarm Types l l l l l l l l l l l Communication alarm Equipment alarm Integrity alarm Security violation Processing error alarm Environmental alarm Operational alarm Time domain alarm Quality of service alarm NMC alarm Physical violation By Data Types l l l l l Common alarm Status event Common event Network Management alarm Network Management event 3-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l l l Threshold alarm Pre–warning alarm Switch event By Alarm Severity Level l l l l Critical Major Minor Warning By Acknowledged Status l l Acknowledged Unacknowledged 3.1.4 Alarm Severity and Troubleshooting Alarm messages fall into four levels according their severities: critical, major, minor and warning. When an alarm occurs, solve the problem in accordance with this manual. If the problem persists, inform the local ZTE office. 3.1.5 Alarm Handling Flow and Suggestion Description Alarm messages are prompt messages when the system encounters problems or faults. Alarms exist and will only disappear when all corresponding problems or faults have been removed. If you do not handle the fault in time, serious consequences might occur. Therefore, you must clear the faults in time. Flow General flow of removing alarms is described as follows. 1. Identify the alarm code, severity level, description, and components involved. 2. Analyze the causes of alarms and the effects on the system. 3. Perform appropriate handling measures to troubleshoot the alarms based on the information gathered in steps 1 and 2. 4. Check the result of the handling operation. 3-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management 3.2 Preference Settings 3.2.1 Setting the Name of the Alarm Level Names of alarm levels are configured in NetNumen U31 Unified Network Management System-Configuration Center. The default names of alarm severity levels are Critical, Major, Warning, and Minor. You can change them as required. Steps 1. On the U31 R22 server, select Start > Program > NetNumen U31 Unified Network Management System > U31 Config Center. The NetNumen U31 Unified Network Management System-Configuration Center window is displayed. 2. In the left navigation tree, select Common Configuration > Common Property. 3. On the server tab on the right, select Server > Global Configuration > Alarm. 4. Select Fault Management: The severity name of major alarm, and then enter the name in Value of config. 5. Repeat step 4 to set the name of another alarm severity level. 6. Click the Save button, and then click the OK button in the displayed dialog box. – End of Steps – 3.2.2 Setting the Default Sorting Mode of the Alarm Table The default sorting mode of the current alarm table is configured in NetNumen U31 Unified Network Management System-Configuration Center. The U31 R22 supports two sorting modes, including time of alarm occurrence and the default system policy. Steps 1. On the U31 R22 server, select Start > Program > NetNumen(TM) U31 Unified Network Management System > U31 Config Center. The NetNumen U31 Unified Network Management System-Configuration Center window is displayed. 2. In the left navigation tree, select Common Configuration > Common Property. 3. On the server tab on the right, select Server > Global Configuration > Alarm. 4. Select To select the default sort mode for the alarm tables, and then select the sort mode in Value of config. l 1: sort by the time of alarm occurrence. l 0: sort by the default system policy. 5. Click the Save button, and then click the OK button in the displayed dialog box. – End of Steps – 3-7 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3.2.3 Setting Alarm Colors and Sounds If alarms are generated, the alarms of different levels can be prompted through different colors and sounds. A user can set the different colors and sounds for the alarms of different levels as required. Prerequisite Sound files required already exist. The .aif, .au, .mid, and .wav formats are supported. Context You can set alarm colors and sounds through the following operation. To set whether flashing and sound are required when the alarm occurs, refer to "Setting the Alarm Flash and Sound". To set the range in which the alarm prompt takes effect, refer to "Setting the Alarm Prompt". Steps 1. From the main menu, select System > Preference. The Preference dialog box is displayed. 2. In the Preference navigation tree on the left, select Fault > Alarm Sound and Color. The Sound Setting and Color Setting tabs are displayed on the right. 3. Set alarm sounds. a. On the Sound Setting tab, click Choose... to select different sound files for alarms of different alarm levels. b. Click Play to play the selected sound file. Note: To set the alarm sound to mute, select Mute after the corresponding alarm level. c. In the Sound Model area, select Sound According to the Highest Severity of Unacknowledged Alarms or Sound When Alarm Messages Are Received. d. (Optional) To set the sound when the alarm is cleared, select Sound When Alarms Are Restored. e. (Optional) To recover the default alarm sound setting, click Restore Default Sound. 4. Set alarm colors. a. Click the Color Setting tab. b. Click the drop-down lists next to the different alarm levels, and then select the different alarm colors. 3-8 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management 5. Click OK. 6. (Optional) To recover the default alarm colors, click Restore Default Color. – End of Steps – 3.2.4 Setting the Alarm Flash and Sound The number of acknowledged alarms of each level and the number of unacknowledged alarms are displayed in different colors in the alarm panel at the top right of the network management client terminal, see Figure 3-5. A user can set whether the alarm panel flashes or makes a sound when an alarm is generated. Figure 3-5 Alarm Panel Prerequisite The user has the operation authority of alarm management. Steps 1. From the main menu, select Fault > Alarm Panel. The Alarm Panel dialog box is displayed, see Figure 3-6. Figure 3-6 Alarm Panel Dialog Box 2. Click Flash to set whether the alarm panel flashes when an alarm is generated. l : It indicates that the alarm panel flashes when an alarm is generated. l : It indicates that the alarm panel does not flash when an alarm is generated. 3. Click Sound to set whether the alarm panel makes a sound when an alarm is generated. l : It indicates that the alarm panel makes a sound when an alarm is generated. 3-9 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l : It indicates that the alarm panel does not make a sound when an alarm is generated. 4. Click to close the Alarm Panel dialog box. – End of Steps – 3.2.5 Setting the Alarm Prompt A user can set alarm prompts for important alarms through the following operations. When these alarms are generated or the states are changed, the system will give a prompt through the displayed dialog box or sound. Prerequisite You have the operation permission of alarm management. Steps 1. From the main menu, select Fault > Setting > Alarm Prompting Setting. The Alarm Prompting Setting window is displayed. BN-xTN EMS Alarm Prompt Default Rule is displayed in the Alarm Prompting Setting window. 2. (Optional) Check the EMS alarm prompting default rule. a. Double-click BN-xTN EMS Alarm Prompt Default Rule. The Alarm Prompting Setting dialog box is displayed. b. Click the Alarm Code tab in Condition, and check the prompting rule of the EMS default alarm code. c. Click OK. 3. Click . The Alarm Prompting Setting dialog box is displayed. 4. Click the Basic tab. To set alarm prompting parameters, refer to Table 3-1. Table 3-1 Descriptions for Parameters in the Basic Tab Parameter Description Name Enter the name of the alarm prompt. Description Enter the description information of the alarm prompting information. Rule status Select the state after the alarm prompt is created. l l Activated: This alarm prompt takes effect immediately. Suspended: This alarm prompt does not take effect immediately until this alarm is activated manually. 3-10 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Parameter Description Notify Method Select the mode of the alarm prompt. l Notify by Dialog: If the alarm is generated or the state is changed, the dialog box pops up for prompt. l Notify by Sound: If the alarm is generated or the state is changed, the sound is played for prompt. After selecting this option, the user must set in the Sound Setup. Note: After Notify by Sound is selected, if the alarm meeting the condition is generated, only the specified sound is played for prompt. The system will not play the sound. 5. Click the Condition tab. Set the alarm information such as locations and alarm types. a. Click the Location tab, and then select NEs on which alarms are generated. When alarms are generated on the specified NEs, the system will give prompts. l From the NE Type list, select an NE type. l Perform one of the following operations as required. To... Do... Display alarm prompts for Click the All NEs option button. all NEs Display alarm prompts for specified NEs Click the Specific NEs option button. Select the NEs to be set, and then click or to move the selected NEs to the right list. Prompts will be displayed only for alarms generated on the NEs selected. b. Click the Alarm Code tab, and then select the alarms. If the alarm selected is generated on the NE selected, the system gives a prompt. l All Codes: When All Codes is generated, if any alarm is generated on the NE, the system gives a prompt. l Specific Codes: After selecting Specific Codes, select the alarms, and then to move the selected alarm codes into the area selected. Only the click selected alarm is generated on the NE, the system gives a prompt. c. Click the Others tab, and then select the alarm type, data type, alarm level, acknowledge status, NE IP, and additional text. 6. Click OK. – End of Steps – 3-11 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3.2.6 Setting Intermittent Alarms This procedure describes how to set intermittent alarms. The purpose of setting intermittent alarms is to reduce frequent alarm reporting within a short period and reduce pressures on the U31 R22. Prerequisite You have the operation permission of alarm management. Context If the number of times that the same alarm occurs reaches a threshold in a specified time, these alarms are called intermittent alarms. Intermittent alarms are integrated to a root alarm which has the highest alarm level among all correlated alarms. Only this root alarm is displayed on the U31 R22. You can view all the correlated alarms through this root alarm. Steps 1. In the operation window of the U31 R22, select Fault > Setting > Intermittent Alarm Setting. The Intermittent Alarm Setting window is displayed, see Figure 3-7. Figure 3-7 Intermittent Alarm Setting Window 2. Click the button on the toolbar. The Intermittent Alarm Setting dialog box is displayed, see Figure 3-8. 3-12 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Figure 3-8 Intermittent Alarm Setting Dialog Box 3. Set intermittent alarms. For a description of the parameters, refer to Table 3-2. Table 3-2 Parameter Descriptions for Intermittent Alarm Setting Parameter Description Name Customized intermittent alarm name. Description Description about the intermittent alarm. State Options: Activated and Suspended. The intermittent alarm takes effect only if the Activated option is selected. Condition Set the conditions for determining intermittent alarms. By default, if the number of times that the same alarm occurs within one minute exceeds 5, these alarms are called intermittent alarms. Discard the correlated If this check box is selected, the correlated alarms are discarded. alarms cleared during the If intermittent alarms are integrated to a root alarm, other intermittence correlated alarms are displayed on the U31 R22. You can delete these correlated alarms from the NMS database as required. 4. (Optional) Set the alarms to be processed. 3-13 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) a. Click the Set alarms to be processed button. The Set alarms to be processed dialog box is displayed. b. On the Location tab, select the NE type to be queried. By default, all NE types are selected. c. On the Alarm Code tab, select the alarm code to be queried. By default, all alarm codes are selected. d. On the Others tab, set Raised Time, Alarm Type, Severity, NE IP, and Remark(Fuzzy Match) of the intermittent alarms. e. Click OK to return to the Intermittent Alarm Setting dialog box. 5. Click OK. 6. (Optional) View correlated alarms through the root alarm displayed on the U31 R22. a. In the operation window of the U31 R22, select Fault > Alarm Monitoring. The Alarm Monitoring window is displayed, see Figure 3-9. In the Root Alarm Indicator column, the alarms marked with + and Root Alarm are root alarms. Figure 3-9 Alarm Monitoring Window b. Select a root alarm, and click the + icon. Relationship Tree dialog box is displayed. The Roort-Correlated Alarm The correlated alarms of this root alarm are displayed in the dialog box. c. Select the Display All Alarms check box to view all the deleted correlated alarms. – End of Steps – 3-14 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Related Tasks l Refreshing Intermittent Alarms On the toolbar of the Intermittent Alarm Setting window, click the l button. Modifying Intermittent Alarms In the Intermittent Alarm Setting window, use either of the following methods to modify intermittent alarms: l à Select an intermittent alarm configuration item, and click the toolbar. button on the à Right-click an intermittent alarm configuration item, and select Modify from the shortcut menu. Suspending Intermittent Alarms Note: Intermittent alarms can be suspended only if the status of intermittent alarms is set to Activated. In the Intermittent Alarm Setting window, use either of the following methods to suspend intermittent alarms: l button on the à Select an intermittent alarm configuration item, and click the toolbar. à Right-click an intermittent alarm configuration item, and select Suspend from the shortcut menu. Activating Intermittent Alarms Note: Intermittent alarms can be activated only if the status of intermittent alarms is set to Suspended. In the Intermittent Alarm Setting window, use either of the following methods to activate intermittent alarms: button on the à Select an intermittent alarm configuration item, and click the toolbar. à Right-click an intermittent alarm configuration item, and select Activate from the shortcut menu. 3-15 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l Deleting Intermittent Alarms Note: Intermittent alarms can be deleted only if the status of intermittent alarms is set to Suspended. In the Intermittent Alarm Setting window, use either of the following methods to delete intermittent alarms: à Select an intermittent alarm configuration item, and click the toolbar. button on the à Right-click an intermittent alarm configuration item, and select Delete from the shortcut menu. 3.2.7 Redefining Alarm Codes This procedure describes how to redefine alarm code names for easy identification or query. Steps 1. From the main menu, select Fault > Setting > Alarm Code Description Setting. The Alarm Code Description Setting window is displayed. 2. From the Code Group list, select a resource type, and click OK. The alarm codes of the selected resource type are displayed in the list. 3. Perform one of the following operations to open the User Defined Alarm Code Setup dialog box. l Double-click the alarm you want to redefine. l l Click the alarm to be redefined, and click the button. Right-click the alarm code to be redefined, and select Modify from the shortcut menu. 4. Enter the new code name. 5. Click Apply to finish modification. – End of Steps – 3.2.8 Setting Tandem Mode for External Alarms This procedure describes how to set alarm tandem mode for outputting the board alarm signals of this NE to another NE. 3-16 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Context l l Tandem: The alarm signal output port of the NE is cascaded to that of another NE to output the alarm signals of the NE. If the cascading mode is used, cascading cables should be installed. Non tandem: The signal ports between NEs are not cascaded. Steps 1. In the Topology Management window, right-click an NE, and select NE Management from the shortcut menu. The NE Management window is displayed. 2. In the NE Operation navigation tree, select Alarm Configuration > External Alarm Tandem Configuration. The External Alarm Tandem Configuration area is displayed. 3. In the Tandem Mode column, select a board tandem mode as required. 4. Click the Apply button, and click OK in a displayed message box. – End of Steps – 3.2.9 Redefining Alarm levels The default alarm level of each alarm is set when the system is initialized. Users can adjust alarm levels as required to monitor important alarm events. After alarm levels are redefined, the new alarm levels do not work on existing alarms. They only apply to new alarms generated after modification. Prerequisite The user has the operation authority of alarm management. Steps 1. From the main menu, select Fault > Setting > Severity Regarding Setting. The Severity Regarding Setting window is displayed. 2. In the Code Group list, select a group. The alarms belonging to this group will be automatically listed in the Severity Regarding Setting window. 3. (Optional) Add resources for an alarm code. a. Right-click an alarm code. Select New. In the displayed dialog box, select the resources (NE or NE types) that you want to add. b. Click OK. The Severity Regarding Setting window is displayed. You can view the newly added resources under the alarm code. 4. Click the alarm entry whose alarm level is to be redefined. In the Custom Severity list box, select the target alarm level. After the target alarm level is selected, the red exclamation mark is displayed in Modify Flag, see Figure 3-10. 3-17 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Figure 3-10 Severity Regarding Setting Window 5. Click on the toolbar to save the modification. – End of Steps – 3.2.10 Configuring NE Alarm Mask You can mask particular alarms on the NE to focus on important alarm events. The masked alarms are not monitored any more. Steps 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management window is displayed. 2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration > Alarm Mask Configuration. The Alarm Mask Configuration area is displayed. 3. On the Mask By Resource tab, expand all alarms contained by the boards configured in the NE to set the Mask Status for alarms. l Select Mask Status: The alarm is masked. l Clear Mask Status: The alarm is not masked. 4. Click Apply. A message box is displayed. 5. Click OK. The alarms whose Mask Status is selected will not be detected. The blocked alarms will not be displayed in the current alarm window and not be counted in the alarm board. – End of Steps – 3.2.11 Setting Board Alarm Mask The masked board alarms are not reported to the main control board of the NE or to the NMS. Steps 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management window is displayed. 2. In the Customized Resource tree in the left pane, select a board. 3-18 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management 3. In the navigation tree in the left pane, select Board Operation > Alarm Configuration > Alarm Mask Configuration. The Alarm Mask Configuration area is displayed. 4. On the Mask By Resource tab, expand all alarms contained by the board to set the Mask Status for alarms. l Select Mask Status: The alarm is masked. l Clear Mask Status: The alarm is not masked. 5. Click Apply. A message box is displayed. 6. Click OK. The alarms whose Mask Status is selected will not be reported to the main control board of the NE or to the NMS. The blocked alarms will not be displayed in the current alarm window and not be counted in the alarm board. – End of Steps – 3.2.12 Configuring Alarm Preload Alarm preload allows you to mask unconcerned alarms. Preload, Reverse Preload, and Non Preload modes. It includes Auto Recover Context Alarm preload is only applicable to the LOS alarm. For three modes of alarm preload, refer to table below. Table 3-3 Descriptions for Three Modes of Alarm Preload Preload Mode Reporting Mode Description Reverse The alarm status of the alarm source is You can set unused ports to Reverse Preload the opposite of the actual alarm. Preload. When these ports are used again, you can set them to Auto Recover Preload or Non Preload. Non Preload The alarm state of the alarm source is - consistent with the actual alarm state. Auto Recover The alarm state of the port without Preload service loaded is not reported to the l "loss of input signal" alarm is not EMS. After service is loaded on the port, the alarm state will be reported to the system. When there is an LOS alarm, the generated. l After the LOS alarm is removed, the port recovers to normal state and alarm preload can be cleared. For example, when no service is loaded on the port of a service board, the "loss of input signal" alarm is generated for the port. 1. The alarm of the port is set to reverse preload mode, and the alarm is removed. 2. Service is loaded to the port, and the port generates an alarm. The alarms of the port on the EMS and NE are inconsistent. 3-19 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3. The alarm of the port is set to non preload mode, and the alarm is removed. The alarms on the EMS and NE are consistent. Steps 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management window is displayed. 2. Perform one of the following operations to open the Alarm Preload Configuration window. l In the NE Operation navigation tree in the left pane, select Alarm Configuration > Alarm Preload Configuration. l In the Topology Management window, double-click an NE, right-click a board in the Rack Chart window, and select Alarm Preload Configuration from the shortcut menu. l In the Customized Resource navigation tree in the NE Management window, select a board, and select Alarm Configuration > Alarm Preload Configuration from the Board Operation navigation tree. 3. Select a board from the Select Board list. 4. Set the Alarm Preload mode for the port: Auto Recover Preload, Reverse Preload, or None Preload. You can set alarm preload in batches, that is, you can select multiple ports, and then right-click and select an alarm preload mode from the shortcut menu, see Figure 3-11. Figure 3-11 Setting Alarm Preload in Batches 5. Click Apply. A message box is displayed. 6. Click OK. – End of Steps – 3.2.13 Setting Alarm Severities You can modify the severities of NE alarms as required, so as to focus on some important alarm events. Steps 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management window is displayed. 3-20 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management 2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration > Alarm Severity Configuration. The Alarm Severity Configuration area is displayed. The right pane displays the alarm events supported by the NE. 3. Perform one of the following operations to set the alarm severity: l Select an alarm, and then click Alarm Severity to set its alarm severity to critical, major, minor, or warning. l Click Import to import an existed template. l Select one or multiple alarms, and then right-click and select an alarm severity from the shortcut menu. 4. Perform the following operations as required. To... Apply the current alarm severity to Do... i. multiple NEs Click the Apply to... button. The Resource Selector dialog box is displayed. ii. Select NEs from the Resource area. iii. Click Add. The selected NEs are added to the Selected Result area. iv. Click OK. Export the modified alarm severities to i. a template Click the Export drop-down arrow, and select Save As Template from the submenu. The Save As Template dialog box is displayed. ii. Enter Template Name and Template Remark. iii. Click OK. 5. Click Apply. A message box is displayed. 6. Click OK. – End of Steps – 3.2.14 Configuring Specified Alarm Monitoring If you must pay special attention to an alarm, you can configure the specified alarm monitoring attribute. If this alarm is cleared, the specified alarm monitoring attribute will be automatically cancelled. Prerequisite You have the operation right for alarm management. 3-21 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. In the operation window of the U31 R22, select Alarm > Alarm Monitoring. The Alarm Monitoring window is displayed. 2. Right-click the desired alarm, to which you must pay special attention. Select Specified Alarms Monitoring from the shortcut menu. The Specified Alarms Monitoring window is displayed, see Figure 3-12. In the U31, you can press Shift + Ctrl to concurrently select multiple alarms. In the Specified Alarms Monitoring window, you can pay special attention to these alarms. Figure 3-12 Specified Alarms Monitoring Window The U31 provides the following operations: l Click the button, select Export All Columns or Export Visible Columns, and export the current alarms to a specified folder for saving purposes. l Click the l Click the button to update the current alarms in real-time and capture the latest alarm information. l Click the button. The Customize Display Columns dialog box is displayed. You can customize the columns to be displayed as required. button to print the current alarms in paper. – End of Steps – 3.2.15 Configuring ADMC Alarms After an event is generated on the device, it is displayed as a historical rather than an active alarm, such as MAC drifting and OSPF protocol event. If you must pay more attention to certain events during the maintenance, you can convert it into an Auto Detected Manually Cleared (ADMC) alarm. An ADMC alarm refers to an alarm that is automatically detected but manually cleared. 3-22 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management When an event is converted into an ADMC alarm, it is displayed as an active alarm for ease of query. The U31 allows you to configure automatic recovery rules for an ADMC alarm. After an ADMC alarm is received for some time, you can configure it to be automatically or manually cleared in the U31. Prerequisite You have the operation right for alarm management. Steps 1. Select Fault > Setting > BN-xCTN Event Transforms to ADMC Alarm from the menu bar. The BN-xCTN Event Transforms to ADMC Alarm dialog box is displayed, see Figure 3-13. The left Selectable Event pane allows you to query them as historical alarms. The right ADMC Transformed Event pane allows you to query them as active alarms. Figure 3-13 BN-xTN Event Transforms to ADMC Alarm Dialog Box 2. In the left Selectable event navigation tree, select the desired event, and then click the button to convert it into an ADMC alarm. 3. Click the OK button. The procedure for configuring ADMC alarms is complete. – End of Steps – 3.2.16 Setting NE Alarm Parameters Setting Alarm Raise Ack Time and Alarm Clear Ack Time can prevent the jitter caused by alarm generation and clearance, for example, destroying the stability of the system, and reducing the system performance. 3-23 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Context l l Alarm Raise Ack Time: Indicates the time after which a generated alarm is regarded as generated. Alarm Clear Ack Time: Indicates the time after which a cleared alarm is regarded as cleared. Steps 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management dialog box is displayed. 2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration > Alarm Parameter Configuration. The Alarm Parameter Configuration area is displayed. 3. Set whether the UAS is used for alarm filtering from the UAS filtering type list. 4. Select a time value from the Alarm Raise Ack Time list. 5. Select a time value from the Alarm Clear Ack Time list. 6. Click Apply. A message box is displayed. 7. Click OK. – End of Steps – 3.2.17 Setting External Alarm Monitoring The U31 R22 can monitor external alarms of the NE in real time, that is, the environmental alarms such as temperature/humidity of equipment room, door opening/closing, fire alarm, ventilation, or cooling system. To realize this function, you need to set the correspondence between the alarm monitoring line number and external alarms on the NE, as well as the alarm mode. Prerequisite You have installed and configured the sensors used for reporting the environmental alarms, such as temperature/humidity of equipment room, door opening/closing, fire alarm, ventilation, or cooling system on the NE. Context Parameters may vary with different types of NEs. Steps 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management window is displayed. 3-24 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management 2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration > External Alarm Configuration. The External Alarm Configuration area is displayed. The right pane will display all the external alarms that can be configured. Note: The quantity of the external alarms supported by the NMS is determined by the product model. Refer to the corresponding product manuals for details. 3. In the External Alarm Channel ID column, select an external alarm signal. 4. In the Alarm Detection Mode column, select an alarm detection mode. Alarm Detection Mode Description On (High Voltage Alarm) Reports an alarm when receiving external alarm signals (high voltage) Off (Low Voltage Alarm) Reports an alarm when receiving no external alarm signals (low voltage) 5. Select an external alarm name in the External Alarm list. 6. Click Apply. A message box is displayed. 7. Click OK. – End of Steps – 3.2.18 Setting the Alarm Audibility and Visibility You can set the alarm sound switch to remind maintenance personnel to handle the alarm. Steps 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management window is displayed. 2. In the navigation tree in the left pane, select NE Operation > Alarm Configuration > Alarm Audibility and Visibility Configuration. The Alarm Audibility and Visibility Configuration area is displayed. 3. Select the Audible Alarm check box. 4. Click Apply. A message box is displayed. 5. Click OK. – End of Steps – 3-25 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3.2.19 Configuring Free AU Alarm Detection For the network configured with protecting path, you can check whether the protecting path works properly in advance by setting the free AU detecting alarm. By default, the system does not monitor the alarm of the free AU channel. Context l l This function is applicable to the SDH series NEs, such as ZXMP S150, ZXMP S200, ZXMP S325, ZXMP S330, ZXMP S380, ZXMP S385, ZXMP S390 and ZXONE 5800. This function is applicable to the SDH series cards, such as OL64, OL64FEC, OL16, OL4, OL1, EL1, OL4/1, OL256, OPS1, LP1, OEL1, S4A, S16A, and S64A. Steps 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management window is displayed. 2. In the left navigation tree, select NE Operation > Alarm Configuration > Free AU Alarm Detect Configuration. The Free AU Alarm Detect Configuration area is displayed. 3. Select a board to set in the Select Board drop-down list. The right pane will display all ports that can be set in the selected board. 4. Select Detect in the Free AU Alarm Detect Configure list. 5. Click Apply. – End of Steps – 3.2.20 Configuration Example This section describes how to configure the alarm input and output, including external alarm input, alarm cascading output, and alarm audible function by taking an example. Configuration Requirement As shown in Figure 3-14, ZXCTN equipment (NE1) receives the alarm information from the external equipment through the alarm input interface on the main control board, and then displays the information on the network management window. NE1 is connected to NE2 in cascading mode. Local alarms generated on NE1 are output to NE2 through the alarm output interface on the main control board so that the NE1 alarms can be viewed on NE2. 3-26 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Figure 3-14 Configuration Example (Alarm Setting) Configuration Plan l Configure the external alarm input interface on NE1. NE1 receives power supply alarms of the external equipment through the first channel of external alarm input of RSCCU3[0–1–13]. The power supply alarms are input through high-level signals. l l Configure the alarm cascading output function on NE1, and the alarm cascading input function on NE2. Configure the alarm audible function on NE1 so that NE1 can output ring alarms to the cabinet through the LAMP interface. For the configurations of the NE boards, refer to Table 3-4. Table 3-4 Board Configuration Plan Table (Alarm Setting) NE Slot Board NE1 5 RSCCU2 NE2 13 RSCCU3 Configuration Procedure 1. Configure the external alarm input interface. In External Alarm Configuration of NE1, set external alarm attributes. For details, refer to Table 3-5. Table 3-5 External Alarm Parameters (Alarm Setting) Parameter NE1 Equipment RSCCU3[0–1–13] External Alarm Channel Channel 1 alarm ID Alarm Detection Mode On alarm (high voltage level) External Alarm Power problem 3-27 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2. Configure the alarm cascading. In the External Alarm Tandem Configuration window, set the cascading mode between NE1 and NE2. For details, refer to Table 3-6. Table 3-6 External Alarm Tandem Parameters (Alarm Setting) Parameter NE1 NE2 Equipment RSCCU2[0–1–5] RSCCU2[0–1–13] Tandem Mode Tandem Tandem 3. Configure the alarm audible function. In Alarm Audibility and Visibility Configuration of NE1, select Audible Alarm. 3.3 Synchronizing NE Alarms This operation synchronizes the alarm information on the U31 R22 with that on NEs. After alarm synchronization, the U31 R22 displays updated NE alarms promptly, which helps you to obtain the equipment operation status. 3.3.1 Synchronizing Active NE Alarms This procedure describes how to synchronize alarm information on an NE to the U31 R22. Prerequisite The NE whose active alarms will be synchronized is connected properly to the U31 R22. Context You can perform the following operation to directly synchronize the active alarms of a specified NE: 1. In the Topology Management window, right-click an NE, and select Fault Management > Synchronize Active Alarms from the shortcut menu. 2. Click OK in a displayed message box, indicating the system successfully sends a synchronization command. 3-28 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Steps 1. Use any of the following methods to display the Synchronize Active Alarms dialog box. l From the main menu, select Fault > Synchronize Active Alarms. The Synchronize Active Alarms dialog box is displayed. l In the Topology Management window, right-click an NE, select Active Alarm l in the displayed Active Alarm dialog box. from the shortcut menu, and click In the Topology Management window, right-click an NE, select Fault l Management > Active Alarms from the shortcut menu, and click in the displayed Active Alarms dialog box. In the NE Alarm Table window on the bottom of the Topology Management view, click . 2. In the NE Type list, select one or multiple NE types. or to add the NE(s) to the 3. In the NE area, select one or multiple NEs, and click Selected area. : to add the selected NE node to the Selected area. l l : to add the selected NE node and its sub-node to the Selected area. 4. Click OK. A message box is displayed. 5. Click OK. After the synchronization is successful, you can double-click in the lower-left corner to view the alarm synchronization success information in the displayed Show Message dialog box. – End of Steps – 3.3.2 Recollecting Historical NE Alarms This procedure describes how to recollect historical alarm information on an NE to the U31 R22. Prerequisite The NE whose historical alarms will be recollected is connected properly to the U31 R22. Steps 1. In the Topology Management window, select Fault > Recollect History Alarms. The Recollect History Alarms dialog box is displayed. 2. In the Raised Time area, select the period of historical alarms. 3. In the NE area, select one or multiple NEs, and click Selected area. to add the NE(s) to the 4. Click OK. A message box is displayed. 3-29 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 5. Click OK. After the recollection is successful, you can double-click in the lower-left corner to view the alarm recollection success information in the displayed Show Message dialog box. – End of Steps – 3.4 Alarm Query 3.4.1 Alarm Query Alarms can be queried on the EMS in the following ways: l l l l l l Query Query Query Query Query Query in in in in in in the the the the the the topology view. toolbar. main menu. service view. rack diagram. resource view. It is the most convenient and rapid way to query alarms in the topology view. 3.4.1.1 Querying an Alarm in the Topology View Alarms can be queried in two modes: direct query or right—click menu query. Steps l l l From the topology view, select one or multiple NEs. The current alarms of the NE(s) are displayed on the bottom of the view in real time. (Only applicable for bearer and transmission NEs) In the topology view, right-click one or multiple NEs, and then select Active Alarm or History Alarm from the shortcut menu to view related alarms. In the topology view, right-click one or multiple NEs, select Fault Management from the shortcut menu to perform the related operation. The right-click menu of Fault Management is shown in Figure 3-15. 3-30 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Figure 3-15 Right-Click Menu of Fault Management – End of Steps – 3.4.1.2 Querying Alarms by Clicking Buttons on the Toolbar This procedure describes how to query NE alarms by clicking buttons on the toolbar. Steps 1. Perform the following operations as required to query alarms. l Click the button. The Alarm Monitoring tab is displayed. l Click the button. The Query Active Alarms dialog box is displayed. l Click the button. The Query History Alarms dialog box is displayed. – End of Steps – 3.4.1.3 Querying the Alarm in the Main Menu The user can query the alarm in the main menu in either of the following ways: l l Query the alarm by selecting Fault > Alarm Monitoring. Query the alarm by selecting Fault > Query Active Alarms and Fault > Query History Alarms. Steps l Method 1: query the alarm by selecting Fault > Alarm Monitoring. 1. From the main menu, select Fault > Alarm Monitoring. The Alarm Monitoring window is displayed. 2. In the Management Tree navigation tree, double-click the node under Active Alarms, History Alarms, and Notifications to query the related alarms. In addition, the user can double-click the node under Custom Query to query the related alarms according to the template customized. The alarm query navigation tree is shown in Figure 3-16. 3-31 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Figure 3-16 Alarm Query Navigation Tree l Method 2: query the alarm by selecting Fault > Query Active Alarms and Fault > Query History Alarms. To... Do... Query current a. From the main menu, select Fault > Query Active Alarms. The Query alarms Active Alarms dialog box is displayed. b. On the Location tab, select the NE type to be queried. By default, all NEs are selected. (optional) c. Click the Alarm Code tab, and then select the alarm code to be queried. By default, all alarm codes are selected. (optional) d. Click the Time tab, and then select the time when the alarm is generated and acknowledged/unacknowledged time. (optional) 3-32 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management To... Do... e. Click the Others tab, and then set Alarm Type, Data Type, Severity, ACK State, and NE IP. (optional) f. Click OK. The corresponding alarms are displayed in the Query Active Alarms window. Query historical a. In the main menu, select Fault > Query History Alarms. The Query alarms History Alarms dialog box is displayed. b. On the Location tab, select the NE type to be queried. By default, all NEs are selected. (optional) c. Click the Alarm Code tab, and then select the alarm code to be queried. By default, all alarm codes are selected. (optional) d. Click the Time tab, and then set the time when the history was generated, alarm recovery time, acknowledged/unacknowledged time, and duration. e. Click the Others tab, and then set Alarm Type, Data Type, Severity, ACK State, and NE IP. (optional) f. Click OK. The corresponding alarms are displayed in the Query History Alarms window. – End of Steps – 3.4.1.4 Querying the Alarms of a Service This procedure describes how to select a service and view the active and history alarms of the service. Steps 1. From the main menu, select Service > Service View. The Service View window is displayed. 2. Perform the following operations as required. To... Query the active alarms of the Do... i. service In the topology view, click a link. The services carried on the link are displayed in the lower list. ii. Right-click the service to be queried, and select Active Alarm from the shortcut menu. Query the history alarms of the i. service In the topology view, click a link. The services carried on the link are displayed in the lower list. ii. Right-click the service to be queried, and select Query > History Alarm from the shortcut menu. 3-33 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To... Do... Query the active alarms of the i. service and its server layer In the topology view, click a link. The services carried on the link are displayed in the lower list. ii. Right-click the service to be queried, and select Query > Active Alarm (Inc Server Layer) from the shortcut menu. Query the history alarms of the i. service and its server layer In the topology view, click a link. The services carried on the link are displayed in the lower list. ii. Right-click the service to be queried, and select Query > History Alarm (Inc Server Layer) from the shortcut menu. – End of Steps – 3.4.1.5 Querying Alarms in the Rack Diagram You can view the active alarms and historical alarms of a board by selecting the board in the rack diagram. Steps 1. In the Topology Management window, double-click an NE whose alarms need to be queried. The Rack Chart window is displayed. 2. Perform the following operations as required. To... Do... Query the active alarms of a board Right-click a board, and select Active Alarm from the shortcut menu to view the active alarms of the board in the Active Alarm dialog box. Query the historical alarms of a board Right-click a board, and select History Alarm from the shortcut menu to view the historical alarms of the board in the History Alarm dialog box. – End of Steps – 3.4.1.6 Querying the Alarm in the Resource View The user can query the active alarm and history alarm through the shortcut menu in the Resource view. Steps 1. Open the BN NE Resource View window in one of the following ways. l On the toolbar, click the displayed. button. The BN NE Resource View window is 3-34 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management l l In the Topology Management view, select Configuration > BN-IP NE Configuration > BN NE Resource View. The BN NE Resource View window is displayed. In the Topology Management view, right-click one NE, and then select BN NE Resource View. The BN NE Resource View window is displayed. 2. Query alarms in one of the following ways. l (Only applicable for bearer transmission NEs) In the topology view, right-click one or multiple NEs, and then select Active Alarm or History Alarm from the shortcut menu to view related alarms. l In the topology view, right-click one or multiple NEs, select Fault Management from the shortcut menu to perform the related operation. The right-click menu of Fault Management is shown in Figure 3-15. – End of Steps – 3.4.2 Querying Notifications This procedure describes how to query notifications. Context You can query current notifications of a specified NE in the Topology Management window. To... Do... View current In the Topology Management window, right-click the NE or the NE node, and notifications then select Fault Management > Notifications Steps 1. Query notifications in one of the following ways. To... Do... Query notifications through the main menu i. From the main menu, select Fault > Query Notifications. The Query Notifications window is displayed. ii. Set parameters on the Location tab, Notification Code tab, and Others tab. iii. Click OK. The query results will be listed in the Query Notifications window. 3-35 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Query notifications through alarms In the Management navigation tree in the left pane of the Fault Management window, select Alarm Query > Notifications > Notifications Within One Day (or you can select Notifications Within Three Days). The query results will be listed on the right pane. Query notifications through NEs In the NE Tree in the left pane of the Fault Management window, right-click the NE node to be queried, and select Notifications from the shortcut menu. The query results will be listed on the right pane. – End of Steps – 3.4.3 Custom Query 3.4.3.1 Customizing the Alarm Query Template Users can customize the corresponding alarm query template according to the network scale and service type to determine the service range affected by the alarm and take appropriate measures timely. For example, the template can be customized according to network layers and rings in the following modes: l l Important site: customize an alarm query template to query all alarms on NEs. Device in the core and convergence layers: customize an alarm query template. Prerequisite The user has the operation authority of alarm management. Context Figure 3-17 illustrates the default alarm query templates provided by the U31 R22. 3-36 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Figure 3-17 Default Alarm Query Templates The common customized alarm (active alarm and historical alarm) query templates include: l l l l l Ethernet port alarm query in the entire network SDH optical port alarm query in the entire network NE link disconnection alarm query in the entire network LCT login event query EMS server CPU/memory/database utilization threshold crossed alarm query This procedure describes how to create a current alarm query template. You can create a historical alarm query template in a similar way. Steps 1. In the operation window of the U31 R22, select Fault > Alarm Monitoring. The Alarm Monitoring window is displayed. 2. In Management Tree on the left, right-click Alarm Query > Custom Query > My Query, and then select New Active Alarm Query from the shortcut menu. The Query Active Alarms dialog box is displayed. 3-37 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Note: When customizing the historical alarm query template, select New History Alarm Query from the shortcut menu. The Query History Alarms dialog box is displayed. 3. In the Location tab, select the NE type to be queried. To... Do... Query all NEs in the whole network Click the All NEs option button. Query the specified NE i. Click the Specific NEs option button. ii. Select the specified NE in the list on the left, and then click or to add the NE or NE group to the specified area. 4. Click the Alarm Code tab, and then select Specific Codes. 5. In the Resource Type navigation tree, select BN-xTN > CTN. 6. Select the resource type in the CTN node according to the template type to be customized. 7. Click to add the alarm code to the specified area, see Figure 3-18. 3-38 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Figure 3-18 Query Active Alarms Dialog Box Note: In the Click to enter the keyword to filter text box, enter the alarm code key word to query. For the settings of common alarm query templates, refer to Table 3-7. Table 3-7 Common Alarm Query Template Settings Alarm Query Template NE Type Alarm Code Ethernet port alarm All NE types Ethernet ETPI query in the entire l (4203) Ethernet Physical (ETPI) Ethernet Port Link Down (37) l network Ethernet Physical (ETPI) Ethernet Port Half Duplex Link (617) l Ethernet Physical (ETPI) LOS (8) l Ethernet Physical (ETPI) Ethernet Port Oscillation (3573) 3-39 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Alarm Query Template NE Type Alarm Code SDH optical port alarm All NE types SDH Port (4092) query in the entire l SDH Port Missing Laser Module (137) l SDH Port Unauthenticated Laser Module network (101) l SDH Port LOS (8) l SDH Port Transmit Failure (TF) (67) l SDH Port Laser Module Fault (138) l SDH Port Input Optical Power(dBm) l SDH Port Output Optical Power(dBm) threshold crossed (50) threshold crossed (241) l SDH Port Optical module rate mismatch with port (621) l SDH Port Laser Bias Current(mA) threshold crossed (239) l SDH Port Laser Temperature(℃) threshold crossed (240) NE disconnection alarm All NE types OMC Alarm (6) query in the entire The link between the server and the NE is broken (1014) network BN EMS Alarm l (4237) LCT login event query U31 server All NE types Network BN EMS Alarm NE Communication Failure (79) Board (4033) OMC Alarm (6) l Link to Gateway NE is Broken (12063) l Board LCT Login (3438) l Board LCT Logout (18260) l CPU usage of application server overload CPU/memory/database (1002) l usage off-limit alarm query Ram usage of application server overload (1003) l Database space usage too large (1008) l Hard disk usage of database server overload (1001) l The capacity of the PM database has exceeded the threshold (1027) 8. (Optional) When the historical alarm query template is created, click the Time tab, and then set the time range. 9. Click the OK button. The Query Active Alarms dialog box is displayed. 10. On the toolbar, click . The New Query dialog box is displayed. 11. In the Query Name text box, enter the template name, and then click OK to save the template, see Figure 3-19. 3-40 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Figure 3-19 Entering a User-Defined Alarm Template Name In Management Tree on the left, select Alarm Query > Custom Query > My Query. The customized alarm query template name is displayed, see Figure 3-20. Double-click it to check the query result. Figure 3-20 User-Defined Alarm Query Template Name – End of Steps – 3.4.3.2 Exporting and Importing Query Conditions This procedure describes how to export and import query conditions. You can export predefined or customized query conditions of active alarms, history alarms, and notifications. The query conditions can be exported as an .XML file to the local computer. You can also import an .XML file from a local path to carry out the saved query. Steps 1. Perform the following operations as required. To... Export query Do... i. conditions In the Management tree in the Fault Management window, expand the Alarm Query node. ii. Right-click a query condition node, and select Export condition from the shortcut menu. The Save dialog box is displayed. iii. Select a file path in the Save in box, and set a file name and file type. 3-41 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To... Do... iv. Click the Save button. The query condition is saved in .xml file to the specified local path. Import query i. conditions In the Management tree in the Fault Management window, expand the Custom Query node under the Alarm Query node. ii. Right-click My Query or Department’s Query, and select Import Condition from the shortcut menu. The Open dialog box is displayed. The file to be imported must be an .xml file previously exported from one query condition. iii. Select a file path, and set a file name and file type, and click the Open button. – End of Steps – 3.4.3.3 Copying and Pasting a Query Condition By copying and pasting query conditions, you can create query tasks conveniently. Steps 1. In the Management tree in the Fault Management window, right-click a query condition, and select Copy from the shortcut menu. 2. In the Management tree, right-click the Custom Query node, and select Paste from shortcut menu. – End of Steps – 3.5 Alarm Information Query You can query the related information of an alarm by selecting the corresponding operation item from the right-click menu, including: l l l l l l l Viewing alarm details Viewing the related history alarms of an active alarm Querying alarm-related rules Viewing and supplementing alarm handling suggestions Locating the source NE of an alarm Locating the source board of an alarm Querying the associated services of an alarm 3.5.1 Viewing Alarm Details By viewing alarm details and handling suggestions, you can locate the fault and troubleshoot it in time. 3-42 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Steps 1. In the Fault Management window, right-click an active alarm in a displayed alarm list, and select Detail from the shortcut menu. The Detail dialog box is displayed. 2. View alarm details and handling suggestions. Note: The two fields NE and Location combine to describe the NE with specific board location that reports the alarm. Related Service(s) describes the NE with the specific board that is affected by the alarm. If the alarm does not affect other NEs, the Related Service(s) is null. – End of Steps – 3.5.2 Querying Historical Alarms This procedure describes how to query historical alarms archived in the NMS so that similar alarms can be easily located, analyzed, and cleared. Steps 1. From the main menu, select Fault > Query Archived History Alarms. The Query Archived History Alarms window is displayed. 2. From the left navigation tree on the Location tab, select the NEs whose historical alarms you want to query, and click or to add these NEs to the right list. 3. (Optional) To remove an NE whose historical alarms you do not want to query, select the NE from the right list and then click or . 4. Click the Alarm Code tab. Select the desired alarm codes from the left list, and then click to add these alarm codes to the right list. 5. (Optional) To remove a selected alarm code, select it from the right list and then click . 6. Click the Time tab. Set the parameters. For a description of the parameters, refer to Table 3-8. Table 3-8 Time Parameter Descriptions Parameter Description Raised Time Period during which alarms corresponding to the specified alarm codes are already generated. 3-43 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Description Cleared Time Required. This parameter indicates the time when these alarms are cleared. (Un)ACK Time Time when these alarms are handled. Duration Length of time that these alarms persist. 7. Click the Others tab. In the Alarm Type area, set the alarm types that you want to query. For a description of the parameters, refer to Table 3-9. Table 3-9 Parameter Descriptions for the Others Tab Parameter Description Alarm Type Select the types of the NE alarms that you want to query. Options include Equipment Alarm and Communications Alarm. Data Type Select the data types of the alarms that you want to query. Options include Common Alarm and Switch Event. Original Severity Select the severity levels of the alarms that you want to query. Options include Critical, Major, Minor and Warning. ACK State Select acknowledged or unacknowledged alarms. NE IP and Remark(Fuzzy Set them as required. Match) – End of Steps – 3.5.3 Viewing Related History Alarms of an Active Alarm By using the Related History Alarms shortcut menu item, you can view the history alarms related to the active alarm. These history alarms can provide reference for handling the active alarm. Steps 1. In the Fault Management window, right-click an active alarm in a displayed alarm list, and select Related History Alarms from the shortcut menu. The Related History Alarms tab is displayed in the Fault Management window, listing all history alarms related to the selected active alarm. 3-44 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Note: If the selected active alarm has no relative history alarms, the Confirm message box is displayed, prompting that no matching record is found. – End of Steps – 3.5.4 Querying Alarm-Related Rules You can use this function to check the rules related to an alarm. If the alarm meets one of the related rules, the system might process the alarm using the rule. Context Note that the influence of related rules is not certain on the selected alarm. Steps 1. In the Fault Management window, right-click an alarm in a displayed history alarm list. 2. Select Related Rules from the shortcut menu. The Related Rules dialog box is displayed. 3. Double-click a rule in the rule list. A dialog box is displayed, displaying the detailed parameters of this rule. – End of Steps – 3.5.5 Viewing and Supplementing Alarm Handling Suggestions To locate and troubleshoot a fault, you can refer to suggested suggestions or supplement handling suggestions. Steps 1. In the Fault Management window, right-click an active alarm in a displayed alarm list, and select Handling Suggestions from the shortcut menu. 2. View suggested suggestions on the Handling Suggestions tab in a displayed dialog box. 3. Enter advice in the User-defined Suggestions text box. 4. Click Save. – End of Steps – 3-45 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3.5.6 Locating the Source NE of an Alarm Locating source NE enables the user to access the topology map view the NE where the selected alarm is generated. Steps l In the Fault Management window, right-click an active alarm in a displayed alarm list, and select Locate Alarm to NE from the shortcut menu. The Topology Management window is displayed. The icon of the NE to which an alarm occurs is selected on the topology graph. – End of Steps – 3.5.7 Locating the Source Board of an Alarm You can view the alarm information of the boards to which the alarm occurs on the rack diagram. Steps 1. In the Fault Management window, right-click an alarm in a displayed alarm list, and select Open Rack Chart from the shortcut menu. The Rack Chart window is displayed. 2. Right-click the board on the rack, and select Active Alarm. The Active Alarm dialog box is displayed. The active alarm information of the board is listed in this dialog box. – End of Steps – 3.5.8 Querying the Associated Services of an Alarm The services that are relevant to an alarm are displayed in the alarm query result list. Steps 1. In the Fault Management window, open any active alarm or history alarm list. 2. In the Relates Service(s) column, click the service that is associated with the alarm to view the service. – End of Steps – 3.6 Handling Alarm The U31 R22 provides a series of alarm management functions. By using the alarm management functions, you cannot only view, synchronize, manage and process alarms, but also print and export the alarm messages. In the alarm list, you can perform various operations by right-clicking an active alarm and select items from the shortcut menu. 3-46 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management 3.6.1 Automatically Acknowledging History Alarms The function of automatically acknowledging history alarms is used for automatically acknowledging the history alarms before the days that are set by the user so as to avoid manual acknowledgment and improve maintenance efficiency. This procedure describes how to set the days for automatically acknowledging the history alarm. Steps 1. From the main menu, select Maintenance > Task Management > Show Timing Task. The Task Management window is displayed. 2. From the Task Management navigation tree, select Common Task > Alarm Background Task > Automatically Acknowledge History Alarms Setting. The Automatically Acknowledge History Alarms Setting window is displayed. , and enter a time in the Automatically acknowledge history alarms 3. Click before: text box. 4. Click . – End of Steps – 3.6.2 Acknowledging an Alarm The system allows a user to acknowledge receiving an alarm before further processing. After the acknowledgement, the alarm status turns from Unacknowledged to Acknowledged. The user can acknowledge only an unacknowledged alarm. This procedure indicates that the maintenance staff are aware of the selected alarm and will begin troubleshooting. To acknowledge an alarm, perform the following steps: Steps 1. In the Fault Management window, open a list of active alarms, and right-click an unacknowledged alarm record. 2. Select Acknowledge from the shortcut menu. The Alarm Acknowledge dialog box is displayed. 3. Enter comments in the Comment text box, and click OK. – End of Steps – Result The status of the selected alarm turns from Unacknowledged to Acknowledged. Meanwhile, the client will record detailed information of this acknowledgment, including time, user, and the acknowledged alarm. 3-47 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3.6.3 Unacknowledging an Alarm After the acknowledgement, you can also unacknowledge the alarm, thus turning its status from Acknowledged to Unacknowledged. Alarms must be acknowledged before being unacknowledged. Steps 1. In the Fault Management window, open a list of active alarms by double-clicking a node under Alarm Query in the Management tree, and right-click an acknowledged alarm record. 2. Select Unacknowledge from the shortcut menu. The Alarm Unacknowledge dialog box is displayed. 3. Enter comments in the Comment text box, and click OK. – End of Steps – Result The ACK state (Acknowledging status) of the selected alarm turns from Acknowledged to Unacknowledged. 3.6.4 Clearing an Alarm Clearing an alarm refers to removing an active alarm alarms from the alarm database. After an alarm is cleared, it is moved to the list of history alarms, from which it can be queried. Steps 1. In the Fault Management window, right-click an active alarm in a displayed alarm list, and select Clear from the shortcut menu. The Confirm message box is displayed. 2. Click OK to clear the alarm. Note: If an alarm clearing rule has been set, the system will automatically clear the received alarms meeting the set conditions, and move them to the history alarm list directly. – End of Steps – Result The cleared alarm is moved from the active alarm list to the history alarm list. To check the details of this alarm, query it from the history alarms. 3-48 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management 3.6.5 Specifying Alarms to Be Monitored This procedure describes how to specify the current alarms to be monitored. If a specified alarm is cleared, it automatically stops to be monitored. Steps 1. In the Fault Management window, select the current alarm to be monitored. 2. Right-click the alarm and select Specified Alarms Monitoring from the shortcut menu. The Specified Alarms Monitoring window is displayed. Note: You can specify multiple current alarms to be monitored. – End of Steps – 3.6.6 Adding Comments to an Alarm You can add additional information to an alarm by adding comments. Steps 1. In the Fault Management window, right-click an alarm in a displayed alarm list, and select Comment from the shortcut menu. The Comment dialog box is displayed. 2. Enter the comment in the text box and click OK button. – End of Steps – Result Add comments to the alarm successfully. 3.6.7 Creating a Rule for an Active Alarm With this function, the user can create an alarm rule with an existing alarm message in the alarm list as the template. When you create a rule, the system will initialize parameters in the created rule in accordance with corresponding attribute values of the selected alarm message. Steps 1. In the Fault Management window, right-click an active alarm in a displayed alarm list, and select Create a Rule from the shortcut menu. 3-49 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2. Select a rule from the sub-menu, for example, Alarm Acknowledging Rule. The Alarm Acknowledging Rule dialog box is displayed. 3. Set parameters on the Basic and Condition tabs. 4. Click OK to complete the creation of the new rule. – End of Steps – 3.6.8 Printing Alarm Information You can print the alarm information in the alarm list opened by the user. The user can select the printing range, copies, paper size, orientation and margins to achieve desired printing results. Prerequisite The printer is correctly connected and configured. Steps 1. In the Fault Management window, open a list of history or active alarms. 2. Click the button. The Print Setting dialog box is displayed. 3. Set parameters on the General, Page Setup, and Advanced tabs. 4. Click the Print button. Tip: To preview the printing effect, click the Preview All button. – End of Steps – 3.6.9 Exporting Alarm Information This function enables the user to export all alarm data on the current list and save them to an external file. The external file can be in the format of xml, txt, prn, html, pdf, xls, xlsx, or csv. Steps 1. In the Fault Management window, open a list of history or active alarms 2. Click the button, and select Export All Columns or Export Visible Columns. The Save dialog box is displayed. 3. Select a file path from the Save in list, and set a file name and file type. 3-50 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management 4. Click the Save button. A message box is displayed, indicating that the file is exported successfully. 5. Click OK. – End of Steps – 3.7 Alarm Forwarding 3.7.1 Setting Alarm Forwarding Templates By setting the alarm forwarding templates, the user can predefine the forwarding template of messages sent to handsets and E-mail boxes, making forwarding settings easier. Steps 1. From the main menu, select Fault > Setting > Alarm Forwarding Template Setting. The Alarm Forwarding Template Setting dialog box is displayed. 2. Set forwarding parameters in the SMS Template, Mail Subject, and Mail Contents text boxes. 3. Click OK. – End of Steps – 3.7.2 Forwarding an Alarm Forwarding an alarm refers to sending the alarm message to other management personnel through E-mails or mobile phone short messages for them to handle in time. Prerequisite l l The OMC server is connected to the SMS center and the mail server. The mobile phone number and the E-mail address to be forwarded to are available. Steps 1. In the Fault Management window, right-click an alarm in a displayed alarm list, and select Forward from the shortcut menu. The Forward Alarm dialog box is displayed. 2. Enter the information of the specified person in the E-mail and Phone text boxes. 3. On the Forward by email tab, enter the email subject and content. 4. On the Forward by SMS tab, enter the short message content. 5. Click OK. – End of Steps – 3-51 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3.8 Alarm Rule Management The alarm rule management function manages user-customized rules, and the alarm operations are performed according to these rules. You can add, delete, modify, fresh, activate, or suspend a rule through the alarm rule management function. 3.8.1 Introduction to Alarm Rules From the main menu, you can select Fault > Setting > Rule Setting. The Rule Setting tab is displayed. Delivery to Database It specifies whether to store the rule-meeting alarms in the database. Upload via Northbound Interface It specifies whether to report the rule-meeting alarms to upper-level NMS via northbound interfaces. Alarm Rule Functions The names, valid ranges and functions of alarm rules are illustrated in Table 3-10. Table 3-10 Alarm Management Rule Rule Name Valid Range Delivering to Uploading via Database Northbound Function Interface Alarm Ac- l knowledgement Rule Alarm l l Clearance Rule l Global Yes Yes Rules meeting the rule are automatically validity acknowledged. When a rule-meeting Forward alarm is reported, it will be acknowledged validity automatically. Global Yes Yes Rules meeting the rule are automatically validity cleared. When a rule-meeting alarm is Forward reported, it will be cleared automatically. validity Alarm Filter l Rule User Not stored when Not reported validity, if restrained. when filtered. When a rule-meeting alarm is restrained. reported, it will be filtered automatically. specific l Rules meeting the rule are automatically user is The two filter types are: selected. Display filter: the filtered alarms are not Otherwise, displayed. global Alarm suppression: The filtered alarms are validity. neither displayed nor stored in database. Backward validity for 3-52 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Rule Name Valid Range Delivering to Uploading via Database Northbound Function Interface "display" filter l Forward validity when restrained Alarm Delay l Rule l Alarm l Merging Rule l Global Yes Yes Used to handle intermittent alarms. If validity the rule-meeting alarms are reported and Forward eliminated in the specified delay time, the validity alarms are directly sent to history library. Global Yes Yes Used to display only one record for alarms validity from the same source caused by the same Forward fault. validity Alarm l Duration Rule l Global Yes Yes Used to count the duration time of validity rule-meeting alarms. If the duration Forward reaches to the threshold value, a validity designated operation will be executed, such as generating a new alarm or setting a higher level for the alarm. Alarm Count l Rule l Alarm l Forwarding Rule l Global Yes Yes Used to count the occurrences of alarms. validity If the number of occurrences exceeds the Forward threshold value within a set period, a new validity alarm is generated. Global Yes Yes Used to forward alarms to designated validity personnel when an alarm is reported or if Forward it meets a condition. validity Alarm Mask l Rule Global No No validity l Used to send masking conditions to the NE agent, which afterwards will not report Forward alarms that meet these conditions. This validity rule is applicable only to NE agent and devices managed by NE agent. NAF Alarm l Filtering Rule Global No No validity l Used to filter alarms meeting specified rules. The filtered alarms are not reported Forward to the upper-level northbound network validity management. 3-53 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Rule Name Valid Range Delivering to Uploading via Database Northbound Function Interface Notification l Filter Rule l Global No No Used to filter notifications meeting certain validity rules. The filtered notifications are neither Forward displayed nor stored to database. This rule validity is only applicable to the newly reported notifications. Repeated l Notification Filtering Rule l Global No No Used to filter the repeated notifications validity (the same location position and notification Forward code) within a specified time from validity the last notification (including filtered notifications). The filtered notifications are directly discarded, which means that the notifications are neither displayed on the client nor stored to the database. The number of the reported notification times can be queried. This rule is only applicable to the newly reported notifications. Multiple rules can be created, and the conditions of these rules must be different. Repeated l History Alarm Filtering Rule l Global No No Used to filter the repeated historical validity notifications (the same location position Forward and notification code) within a specified time validity from the last historical notification (including filtered notifications). The filtered historical notifications are directly discarded, which means that the notifications are neither displayed on the client nor stored to the database. The number of the reported historical notification times can be queried. This rule is only applicable to the newly reported historical notifications. Multiple rules can be created, and the conditions of these rules must be different. Alarm l Restrain Rule - NE Global Yes Yes validity l Set for restraining the report of an alarm depending on another. If alarm A depends Forward on B, only alarm B is reported under this validity rule. This rule enables the alarms of different NEs to restrain each other. 3-54 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Rule Name Valid Range Delivering to Uploading via Database Northbound Function Interface l Alarm Restrain Rule-NE Type l Global Yes Yes Set for restraining the report of an alarm validity depending on another. If alarm A depends Forward on B, only alarm B is reported under this validity rule. This rule enables the alarms of the same NE of the same NE type to restrain each other. Note: There might be slight differences in specific rules among products or versions of the same product. 3.8.2 Introduction to Alarm Rule Operations The alarm rule management operations include: Creating an Alarm Rule The user can create fault operation and maintenance rules for different alarms. Modifying an Alarm Rule The user can modify the information of the created alarm rules as required, including rule description, alarm selection conditions, and other information. In the Rule Setting dialog box, right-click the rule to be modified and select Modify on shortcut menu to modify the rule. Suspending an Alarm Rule The user can suspend activated alarm rules. When an alarm rule is suspended, it does not take effect. In the Rule Setting dialog box, right-click the rule to be suspended and select Disable on shortcut menu to suspend the rule. Enabling an Alarm Rule The user can enable disabled alarm rules. In the Rule Setting dialog box, right-click the rule to be enabled and select Enable on shortcut menu to enable the rule. 3-55 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Deleting an Alarm Rule This operation enables the user to delete alarm rules that are no longer useful. Suspended rules can be deleted. In the Rule Setting dialog box, right-click the rule to be deleted and select Delete from the shortcut menu to delete the rule. Refreshing an Alarm Rule When multiple users log into the same server simultaneously, if one user modifies alarm rules, other users may not be able to see the changes immediately due to network delay. They need to obtain the latest data from the server to see the modified alarm rules. In the Rule Setting dialog box, click the button to refresh alarm information. 3.8.3 Creating an Alarm Rule This procedure describes how to create an alarm rule. Steps 1. From the main menu, select Fault > Setting > Rule Setting. The Rule Setting tab is displayed. 2. On the toolbar, click the button. The New dialog box is displayed. 3. Select an alarm rule. 4. Click OK. The dialog box of the corresponding alarm rule is displayed. 5. Set rule parameters. Rule parameters vary with different alarm rules. For the parameters descriptions of all alarm rules, refer to Table 3-11. Table 3-11 Alarm Rule Parameter Descriptions Rule Description Alarm Filtering The parameters on the Basic and Condition tabs need to be set. Rule Both the alarm masking rule and alarm filtering rule restrain alarms. The Alarm differences between them are as follows: Acknowledging l The alarm masking rule discards the alarm when the NE reports an alarm, and the alarm filtering rule discards the alarm after the U31 R22 Rule receives an alarm. Alarm Clearing Rule l The masked alarm does not occupy network bandwidth, and the alarm filtered from the U31 R22 still occupies network bandwidth. Alarm Delaying Rule Alarm Masking Rule 3-56 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Rule Description NAF Alarm Filtering Rule Notification The parameters on the Basic and Condition tabs need to be set. Filtering Rule The notification filtering rule is only applicable to a newly reported Repeated notification. Notification Filtering Rule Repeated History The parameters on the Basic and Condition tabs need to be set. Alarm Filtering The historical alarm filtering rule is only applicable to a newly reported Rule notification. Alarm Merging The parameters on the Basic, Condition, and Action tabs need to be set. Rule l Only the earliest alarm that satisfies the requirement of the alarm merging rule is displayed on the Rule Setting tab. You can click "+" before the alarm to display the merged alarms. If the alarm is recovered, the alarm merging rule will re-select another alarm to be displayed. l To view other alarms filtered by the rule, you can select Others > Advanced > Invisible in the Query Active Alarms dialog box. Alarm Persisting The parameters on the Basic, Condition, and Action tabs need to be set. Rule Suppose the persisting state of a new alarm is unacknowledged. After the alarm changes to active state, the system will remove the alarm. Alarm Counting The parameters on the Basic, Condition, and Action tabs need to be set. Rule l After the alarm counting rule is created, the U31 R22 system will enable alarm occurrence frequency sampling to count the times of alarm occurrence after the alarm meeting the rule occurs. l If the number of times of alarm occurrence in a specified duration exceeds the threshold, the system will automatically create an alarm that specifies alarm severity and details. l If the system detects the counting alarm created in the previous counting duration, it will modify the times of alarm occurrence in the details of the counting alarm instead of creating a new alarm. l If the system has created a new counting alarm and then detects that the number of times of alarm occurrence in the previous counting duration does not exceed the threshold, the system will remove the existing alarm. Alarm Forwarding The parameters on the Basic, Condition, and Action tabs need to be set. Rule 3-57 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Rule Description Alarm Restraining The parameters on the Basic, Root Alarm, and Correlated Alarm tabs Rule by NE need to be set. l On the Root Alarm tab, set the location and alarm code. l On the Correlated Alarm tab, set the location and alarm code. The correlated primary and secondary alarms must have different alarm description. The primary alarm of a rule cannot be a secondary alarm of other rules. Alarm Restraining The parameters on the Basic and Condition tabs need to be set. Rule by NE Type On the Condition tab, set the NE type, root alarm code, and correlated alarm code. l l On the Basic tab, set the alarm name, description, rule status, and other parameters as required. On the Location sub-tab, set the NE location of the alarm. On the Alarm Code sub-tab, set the alarm code. On the Others sub-tab, set the time of alarm occurrence, alarm type, alarm severity, maintenance state, NE IP address, and remark. l On the Action tab, set the rule-related action parameters. 6. Click OK. – End of Steps – 3.9 Fault Handling Settings With the experience of long-term network operation, users can summarize suggestions for handling common faults. The suggestions can be set as alarm handling suggestions as a reference for future operation. The U31 R22 network management system provides the following functions for alarm handling suggestions: import, export, view and supplement. 3.9.1 Finding Alarm Handling Suggestions This procedure enables the user to find fault alarm handling suggestions. Steps 1. From the main menu, select Fault > Setting > Handling Suggestion Setting. The Handling Suggestion Setting tab is displayed. 2. Enter the keyword(s) in the Click to enter the keyword to filter text box, and click the button. The Resource Type navigation tree displays all matched alarms. Select the desired alarm. The right pane displays alarm causes and handling suggestions. 3-58 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management 3. (Optional) For some important alarms, click the prompt link in the lower-left corner to view more handling suggestions about the alarm. – End of Steps – 3.9.2 Supplementing Alarm Handling Suggestions This procedure describes how to add a supplement to the default handling suggestions provided by the system. Steps 1. From the menu, select Fault > Setting > Handling Suggestion Setting. Handling Suggestion Setting tab is displayed. The 2. Select an alarm from the Resource Type tree, and enter supplement suggestions in the User-defined Suggestions box, see Figure 3-21 Figure 3-21 Viewing the User-Defined Suggestion 3-59 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Caution! The supplementary information cannot exceed 2000 characters; otherwise, it will be directly discarded by the system form the 2000 character. 3. Click the Save button. – End of Steps – 3.9.3 Exporting Handling Suggestions to a File You can export the handling suggestions to a local path of in xml, txt, prn, html, pdf, xls, xlsx, or csv format. Steps 1. From the main menu, select Fault > Setting > Handling Suggestion Setting. The Handling Suggestion Setting tab is displayed. 2. Select an alarm or a type of alarms from the Resource Type tree. 3. Click the Export button. The Save dialog box is displayed. 4. Select a file path and set the file name and type. 5. Click the Save button. – End of Steps – 3.9.4 Importing Handling Suggestions This procedure describes how to import a local file of handling suggestions to the U31 R22 for view. Prerequisite The file to be imported exists on the local computer. Steps 1. From the main menu, select Fault > Setting > Handling Suggestion Setting. The Handling Suggestion Setting tab is displayed. 2. Click the Import button. The Confirm message box is displayed. 3-60 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management l l l Note: You can only import files in .xls or csv format. Importing a file will only modify the advice description that the system has handled. The Handling Suggestion cannot exceed 2000 characters; otherwise, it will be directly discarded by the system for the 2000 character. 3. Click OK. The Open dialog box is displayed. 4. Select a file to be imported and click the Open button to import the selected file. – End of Steps – 3.10 Alarm Statistics The U31 R22 system can perform statistics on history alarm data and display the statistic results in table, bar chart, and pie chart. 3.10.1 Overview of Fault Statistics In the left pane of the Fault Management window is the Statistic tree, see Figure 3-22. Figure 3-22 Statistic Tree The Statistic includes the following three types of nodes. l l l Predefined statistic methods, including By NE, By NE Type, By Alarm Code, By Time, By Group, and By ACK User. For example, if you double-click the Top10 node under By Alarm Code, the top 10 frequently occurring alarm codes and their frequency are displayed in the right pane. Custom Statistic: You can perform basic statistics or busy time statistics as required. For specific description of parameter settings, refer to 3.10.4 Customizing Statistics. Default Statistic Setting: allows users to set common statistic query conditions as the default conditions. Double-click this node. The Default Statistic Setting dialog box is displayed. The default statistic condition is modifiable. The statistic result will be displayed after modification. 3-61 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3.10.2 Basic Statistics This procedure describes how to operate the basic statistics. Basic statistics refers to the simple statistics on average duration or occurrence of history alarms for the specified object. Context l l When summarizing statistic results, you can set the statistic conditions. In this way, only the alarms meeting the specified conditions are summarized. Also, you can set the maximum number of records to be displayed. For example, only the first 50 records are displayed. The name of a new statistic template cannot repeat an existing one. Steps 1. Perform one of the following operations to open the History Alarm Basic Statistics dialog box. l From the main menu, select Fault > History Alarm Basic Statistics. l From the main menu, select Statistics > History Alarm Statistics > History Alarm Basic Statistics. 2. On the Basic tab, set Statistic Type, Statistic Row and View Setting. 3. Click the Condition tab, and set parameters on the Location, Alarm Code, and Others sub-tabs. 4. Click OK. The statistic results are displayed in the right pane. – End of Steps – 3.10.3 Busy Time Statistics This procedure describes how to operate the busy time statistics. Busy time refers to the time period when the traffic is comparatively busy in certain service. The alarms generated at these moments might be of special concern. Through busy time statistics, you can perform statistics of only history alarms generated during busy time. In the same way as basic statistics, you can perform statistics by average alarm duration or alarm occurrences. Context l l l When summarizing statistic results, you can set the statistic conditions. In this way, only the alarms meeting the specified conditions are summarized. Also, you can set the maximum number of records to be displayed. For example, you can set the condition to display only the first 50 records. The name of new statistic template cannot repeat an existing one. Because the statistic granularity is accurate to hour, effective time segment can only be set to hours. 3-62 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Steps 1. Perform one of the following operations to open the History Alarm Busy-Time Statistics dialog box. l From the main menu, select Fault > History Alarm Busy-Time Statistics. l From the main menu, select Statistics > History Alarm Statistics > History Alarm Busy-Time Statistics. 2. On the Basic tab, set Statistic Type, Effective Time and View Setting. 3. Click the Condition tab, and set parameters Location, Alarm Code, and Others on the sub-tabs. 4. Click OK. The statistic results are displayed in the right pane. – End of Steps – 3.10.4 Customizing Statistics This procedure describes how to operate the custom statistics. The custom statistics function provides a user-defined method for history alarm statistics. You can set the template as required. Prerequisite l l You have the authority to manage alarms. The Fault Management window is displayed. Context l l You can use the defined statistic template to perform statistics on and analyze history alarms. Two types of statistic templates are available: basic statistic template and busy-time statistic template. This procedure uses a basic statistic template as an example, and the operation for a busy-time statistic template is similar. Steps 1. On the Statistic tab in the Fault Management window, right-click the Custom Statistic node, and select New History Alarm Basic Statistic... from the shortcut menu. The New History Alarm Basic Statistic dialog box is displayed. 2. Set the template name and click OK. The History Alarm Basic Statistics dialog box is displayed. 3-63 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l l Note: For the parameter settings in the History Alarm Basic Statistics dialog box, refer to 3.10.2 Basic Statistics. After you set the statistic conditions, the custom statistic template is added under the Custom Statistics node. 3. Right-click the new basic statistic template, and select Execute from the shortcut menu to view the statistic result. Note: You can also display the statistic result in bar chart or pie chart. l If the statistic result needs to be displayed in bar chart, click l If the statistic result needs to be displayed in pie chart, click on the toolbar. on the toolbar. – End of Steps – 3.10.5 Querying Historical Alarms by Specified Alarm Code This procedure describes how to query the number of alarms based on specified historical alarm codes and alarm generation time. Steps 1. From the main menu, select Fault > History Alarm Important Alarm-Code Statistics. The History Alarm Important Alarm-Code Statistics dialog box is displayed. 2. From the left navigation tree on the Location tab, select the NEs whose historical alarms you want to query. To... Query alarms on all NEs Query alarms on specified NEs Do... Click the All NEs option button. Click the Specific NEs option button. Expand the NE navigation tree, and select the NEs whose alarms you want to query. Click or to add these NEs to the right list. (Optional) To remove a selected NE, select this NE from the right list, and then click or . 3-64 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management 3. Click the Alarm Code tab. On this tab, expand the alarm code list. Select the desired alarm codes, and then click to add these alarm codes to the right list. 4. Click the Time tab. On this tab, perform one of the following operations as required. To... Do... Query the alarms generated within a Click the Range option button. Set the start time and the specified period end time. Query the alarms generated within Click the Latest option button. Set the number of days specified days or weeks or weeks. 5. Perform the following operations as required. To... Do... Output the query result to the History Click OK. Alarm Important Alarm-Code Statistics window on the NMS Save the query conditions into a template Click the Save As button. In the displayed Save As dialog box, set Template Name and then click OK. – End of Steps – 3.10.6 Managing Timed Statistical Task This procedure describes how to manage the timed statistical task. By using the timed statistic task function, you can specify a task which can periodically perform statistics based on one template and export the statistic result to a specified path. Context You can select a predefined or custom statistic template to set a timed statistic task. Timed statistic task includes four plans: l l l l By day: The task is executed at 5:00 am each day by default. By week: The task is executed at 5:00 am on Mondays by default. By week: The task is executed at 5:00 am on the first day of each month by default. Custom: The task is executed on the time you set. Steps 1. Perform one of the following operations to open the Timing Statistic Task Management tab. l From the main menu, select Fault > Timing Statistic Task Management. l From the main menu, select Statistics > History Alarm Statistics > Timing Statistic Task Management. 3-65 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2. On the toolbar of the Timing Statistic Task Management tab, click the The Timing Statistic Task dialog box is displayed. button. 3. Set a task name, template name, task time, task status, and task execution plan. Note: To view the details of the selected template, click the button. 4. (Optional) Click the Advanced Settings(F) button, and set parameters in the displayed Advanced Settings dialog box. Note: Advanced settings enable the statistic result to be saved in a specified server and to be sent to a specified E-mail as an attachment. 5. Click OK to return to the Timing Statistic Task dialog box. 6. Click OK to finish creating the timed statistic task. The generated result files are displayed in the Timing Statistic Task Execute Result list. – End of Steps – 3.10.7 Managing Timed Export Tasks By using timing export task, you can periodically filter alarms in accordance with the specified time and condition you set and save the filtered alarms to files. Steps 1. From the main menu, select Fault > Timing Export Task Management. The Timing Export Alarm Task Management tab is displayed. 2. On the toolbar of the Timing Export Alarm Task Management tab, click the button. The Timing Export Task dialog box is displayed. 3. On the Basic tab, set a task name, an export type, a task time, a task status, a file type, and a task execution plan. 4. (Optional) Click the Advanced Settings(F) button, and set parameters in the displayed Advanced Settings dialog box. 3-66 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Note: Advanced settings enable the export result to be saved in a specified server. 5. Click the Condition tab. 6. Set query parameters on the Location, Alarm Code, Time, and Others tabs. 7. Click OK to finish creating the timing export task. The generated result files are displayed in the Timing Export Task Execute Result list. – End of Steps – 3.11 Alarm and Notification Monitoring If a fault or problem of a site device is detected, the monitoring tool generates an alarm. The user can clear the fault or problem when detecting the alarm information. 3.11.1 Alarm Monitoring Policies Alarm Monitoring Principles The principles of the alarm monitoring are as follows. l l Critical and major alarms should be handled immediately, otherwise severe consequences may be incurred. Therefore, such alarms should be sent to the operator's cell phone with audio indications. For minor alarms and warnings, the system sends background alarms and SMS alarms to related staff to inform system faults and hidden risks. Related staff can then monitor system performance, analyze reasons and handle these alarms. Recommended Alarm Monitoring Policies Recommended alarm monitoring policies are as follows. l Severity Priority Policy The system forwards alarms on the highest severity level first when alarms of various severity levels occur at the same time. l Time Priority Policy To minimize the influence of faults on services, immediately handling is required once some alarms are reported. To ensure the timely notification of alarms to related personnel, an audio indication or a short message should be used to inform the alarm. l Multi-Receiver Policy 3-67 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) In the alarm server, set multiple receiver on the server. This can ensure the alarm can be handled in time. l Multi-Way Policy If only one way is used to send alarm information, immediate troubleshooting is unavailable when this way fails to work. Therefore, it is recommended to adopt multiple ways at the same time to avoid this case. 3.11.2 Alarm Monitoring Methods Alarm Monitoring Methods You can use any of the following three methods to monitor alarms in a network. l l l Monitoring alarms via U31 R22 Monitoring alarms via short message Monitoring alarms via E-mail Comparison of Different Monitoring Methods The tree methods can all monitor fault alarms. However, only monitoring via U31 R22 provides the function of checking system performance. The other two only provide alarm information. 3.11.3 Alarm Monitoring via U31 R22 Objective The fault management module monitors the whole U31 R22 system. When a part of the system encounters a fault, the alarm service process sends an alarm message to the server. Function Through U31 R22 alarm monitoring, the users can view performance statistics and alarm information, so that they can analyze corresponding reasons. Query Methods To query alarm monitoring of the U31 R22, log in to the U31 R22 and query alarms on the Fault Management window. 3.11.4 Alarm Monitoring via Short Message and E-mail Description Set the cell phone numbers and E-mail addresses of monitoring personnel in the alarm forwarding template, and the alarm information will be sent to the monitoring 3-68 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management personnel, which can include the maintenance personnel of ZTE local office or the telecommunications operator. Function To send alarm information to maintenance personnel when they are not on site so that they can monitor the system faults. 3.11.5 Monitoring Real-Time Alarms Real-time alarm monitoring performs real-time monitoring on active and history alarms. Real-time monitoring on active alarms obtains alarm messages of devices and the network in time, while monitoring on history alarms reflects alarm handling and fault recovery of the system. Steps 1. From the main menu, select Fault > Alarm Monitoring. The Alarm Monitoring tab is displayed. The system views the NEs to which the alarms occur, acknowledgement status, alarm code, and raised time. – End of Steps – 3.11.6 Monitoring Real-time Notifications System notifications inform the user of the real-time operation status of the network. Monitoring real-time notification reflects problems of different devices to be handled. Steps 1. From the main menu, select Fault > Notification Monitoring. The Notification Monitoring tab is displayed. The system views the NEs to which the notifications occur, notification code, raised time, and NE type. – End of Steps – 3.11.7 Monitoring the Alarm Statistics by NE This function lists the alarms of elements connected to the U31 R22 system based on severity level. Steps 1. From the main menu, select Fault > Alarm Monitoring by NE. The Alarm Monitoring by NE tab is displayed. 3-69 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) The Alarm Monitor by NE tab lists the counts of critical alarms, major alarms, minor alarms and warnings of each NE as well as the total count of alarms. – End of Steps – 3.11.8 Monitoring the Alarm Statistics by NE Type The U31 R22 system can count the active alarms of all severity levels by NE type in the managed network. Steps 1. From the main menu, select Fault > Alarm Monitoring by NE Type. The Alarm Monitoring by NE Type tab is displayed. The Monitor Alarms by NE Type tab lists the counts of critical alarms, major alarms, minor alarms and warnings of each NE type as well as the total count of alarms. – End of Steps – 3.12 Alarm Task Management For a description of common alarm tasks, refer to Table 3-12. Table 3-12 Common Alarm Tasks Task Description 9.2.1.5 Backing Up and Deleting Alarm Data This task allows users to manually back up or delete historical alarms and events. 9.3.1.3 Restoring Alarm Data This task allows users to manually restore historical alarms and events. 11.5 Backing up and Deleting Alarm Data This task can automatically back up or delete the alarm data regularly. 3.12.1 Creating a Scheduled Statistic Task This task collects alarm statistics in accordance with the rule of statistic templates. 3.12.2 Creating a Scheduled Export Task This task filters alarms periodically in accordance with the user-defined conditions, and saves the results as files. 3.12.3 Creating a Suppressing Plan Task This task suppresses the alarms generated during tasks such as project cutover and switchover. 3.12.1 Creating a Scheduled Statistic Task This procedure describes how to create a scheduled statistic task. This task periodically collects alarm statistics in accordance with rules defined in a statistic template, and saves the results as files to the U31 R22 server or uploads the files to the FTP server. 3-70 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Prerequisite You have the user permission of "Supervisor Role" or above. Steps 1. From the main menu, select Fault > Timing Statistic Task Management. The Timing Statistic Task Management tab is displayed. Note: You can suspend, activate, modify, delete, and refresh the created task displayed on the tab. 2. Click . The Timing Statistic Task dialog box is displayed. 3. Set scheduled statistic task parameters. For the parameter descriptions, refer to Table 3-13. Table 3-13 Parameter Descriptions for a Scheduled Statistic Task Parameter Description Task Name Enter a customized name for the scheduled statistic task. Template Name Select a task template for alarm statistics. You can click View for specific rule descriptions. Predefined Start Time Set the time when the alarm statistics starts. Predefined End Time Set the time when the alarm statistics ends. Task Status Status of the historical alarms in the statistic period: Activated or Suspended. File Type Format of the generated file: CSV, XML, XLS (the template of this format can be customized), or TXT. Task Execution Plan Cycle of the task: By Day, By Week, By Month, or Custom (you need to set the period manually). Note: By default, the statistic results are saved in the following directory: \ppus\uca.ppu \uca-fm.pmu\statistic\. 3-71 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 4. (Optional) You can forward the results through an email or save them as a file on the FTP server. a. Click Advanced Settings. The Advanced Settings dialog box is displayed. b. Forward the results as an email or save the results on the FTP server. For the advanced settings, refer to Table 3-14. Table 3-14 Advanced Settings Parameter Setting Email Forward i. Click Enable to change the Email Forward tab into the editable status. ii. Set the parameters of Email Address, Email Subject, and Email Content. The results will be forwarded to the preset email address. FTP Push Click Enable to change the FTP Push tab into the editable status. i. Set Protocol Type, IP Address, Port, and Sub Folder. ii. Enter the user name and the password. You can also select Anonymous to permit anonymous login. iii. Click Test Connection to test the FTP server connection. iv. Click Select to specify a subdirectory to save the statistic results. The statistic results will be uploaded to the FTP server and saved in the specified subdirectory. c. Click OK to return to the Timing Statistic Task dialog box. 5. Click OK. – End of Steps – 3.12.2 Creating a Scheduled Export Task This procedure describes how to create a scheduled export task. A scheduled export task filters the equipment and the service alarms in accordance with the preset conditions, and saves the results as files into the U31 R22 server or uploads the files to the FTP server. Prerequisite You have the user permission of "Supervisor Role" or above. 3-72 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Steps 1. From the main menu, select Fault > Timing Export Task Management. The Timing Export Task Management tab is displayed. Note: You can suspend, activate, modify, delete, and refresh the created task displayed on the tab. 2. Create a scheduled export task. To... Do... Create a scheduled export task Click . The Timing Export Task dialog box is displayed. Click . The Northbound Timing Export Task dialog box is for equipment alarms Create a scheduled export task for northbound alarms Create a scheduled export task for service alarms displayed. Click . The Service Alarm Timing Export Task dialog box is displayed. 3. Click the Basic tab, and set the parameters. For the parameter descriptions, refer to Table 3-15. Table 3-15 Parameter Descriptions for a Scheduled Export Task Parameter Description Task Name Enter a customized name for the scheduled export task. Output Type Select the alarm type to be filtered: Active Alarms or History Alarms. Start Time Set the time when the alarm statistics starts. End Time Set the time when the alarm statistics ends. Task Status Status of the historical alarms in the statistic period: Activated or Suspended. File Type The parameter is available only in the Timing Export Task and Service Alarm Timing Export Task dialog boxes. Format of the generated file: CSV, XML, XLS (the template of this format can be customized), or TXT. 3-73 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Description Task Execution Plan The parameter is available only in the Timing Export Task and Service Alarm Timing Export Task dialog boxes. Cycle of the task: By Day, By Week, By Month, By Period (only available to Active Alarms), or Custom (you need to set the period manually). Period Setting The parameter is available only in the Northbound Timing Export Task dialog box. Task execution period. 4. Click the Condition tab, and set the parameters on the Location or Service sub-tab. To... Do... Create a scheduled export task for equipment alarms or On the Location sub-tab, select an NE. When an alarm is generated on the selected NE, the system displays an alarm message. northbound alarms l All NEs: Click the All NEs option button. When an alarm is generated on any NE, the system displays an alarm message. l Specific NEs: Click the Specific NEs option button, select an NE from the list, and click or . An alarm message is displayed only when an alarm is generated on the specified NE. Create a scheduled export task for service alarms On the Service sub-tab, click the Add button, and select the required service in the displayed Select Service dialog box. 5. On the Alarm Code sub-tab, select an alarm code. When the alarm of the selected code is generated on the NEs, the system gives an alarm prompt. l All Codes: Click the All Codes option button. When any alarm is generated on the NEs, the system gives an alarm prompt. l Specific Codes: Click the Specific Codes option button. Select an alarm from the list, and click . An alarm prompt is given only when the alarm of the specified code is generated on the NEs. 6. On the Time sub-tab, set the raised time and acknowledged time/unacknowledged time of the alarm. 7. On the Others sub-tab, set the alarm type, data type, acknowledged state, NE IP, and remark. 8. (Optional) Set the FTP server in the Timing Export Task and Service Alarm Timing Export Task dialog boxes. a. On the Basic tab, click Advanced Settings. The Advanced Settings dialog box is displayed. b. Save the exported file on the FTP server as described in Table 3-16. 3-74 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 3 Alarm Management Table 3-16 FTP Server Parameter Setting Parameter Setting Enable Select it to enable the FTP server to receive the files. Protocol Type Select the protocol type of the FTP server: FTP or SFTP. IP Address Enter the IP address of the FTP server. Port Enter the port number of the FTP server. User Name Enter the user name to log in to the FTP server. Password Enter the password to log in to the FTP server. Anonymous Select Anonymous to permit anonymous login. Test Connection Click Test Connection to test the connection to the FTP server. Sub Folder Click Select to specify a subdirectory to save the statistic results on the FTP server. c. Click OK to return to the Timing Export Task dialog box. 9. Click OK. – End of Steps – 3.12.3 Creating a Suppressing Plan Task This procedure describes how to create a suppressing plan task. A suppressing plan task suppresses the alarms generated during tasks such as cutover and switchover. Prerequisite You have the user permission of "Supervisor Role" or above. Steps 1. From the main menu, select Fault > Suppress Plan Task Management. Suppress Plan Task Management tab is displayed. The 3-75 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Note: You can suspend, activate, modify, delete, and refresh the created task displayed on the tab. 2. Click . The Suppress Plan Task dialog box is displayed. 3. On the Basic tab, set the parameters. For the parameter descriptions, refer to Table 3-17. Table 3-17 Parameter Descriptions for a Suppressing Plan Task Parameter Description Task Name Enter a customized name for the suppressing plan task. Task Type Select the engineering task type: Rearrange Test, Resect and Joint, or Others. Task Status The status of the created task: Activated or Suspended. Do not send the suppressed alarms to the Click the check box and the suppressed alarms upper system will not be sent to the upper system. Task Period Select the effective period of the suppressing plan task. l Effective Temporarily: The task is temporarily effective in the period. l Effective Everyday: The task is effective in the period per day. Detail Enter the specific information of the suppressing plan task, such as the alarm type to be suppressed and the information of the engineering task. 4. Click the NE tab to set the NEs to be suppressed. l All NEs: Click the All NEs option button. When an alarm is generated on any NE, the system suppresses the alarm. l Specific NEs: Click the Specific NEs option button. Select an NE from the list, and click or specified NE. . The system only suppresses the alarm generated on the 5. Click OK. – End of Steps – 3-76 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Table of Contents Performance Management Overview..........................................................................4-1 Performance Settings.................................................................................................4-6 Introduction to Measurement Task Management ......................................................4-15 Template Task Management.....................................................................................4-26 Performance Data Query..........................................................................................4-50 Real-Time Traffic Management.................................................................................4-69 Counter and Index Management ..............................................................................4-74 Threshold Tasks Management..................................................................................4-85 4.1 Performance Management Overview The U31 R22 system provides a diversity of performance management functions for monitoring the operation status of microwave transmission equipment to ensure the efficiency, stability, and security of the managed network. It collects performance data from the network, analyzes the collected data, and then provides the network administrator with sufficient and complete information for the operation and maintenance of the network. The network administrator can make appropriate operation policies based on the network status to guarantee high-efficiency operation of the network. The performance management functions of the U31 R22 can be grouped into the following four types: l Customization of Data Collection Tasks By customizing a data collection task, you can enable the system to collect specific performance data. l Performance Data Collection The system collects performance data and stores the collected data in its database in accordance with predefined performance tasks. l Performance Data Query The system supports the query of performance data that has been collected and stored in the database. It displays the query result on the client interface. l Performance Threshold Management The system supports the setting of upper and lower thresholds for key performance indexes. Once the value of an index is higher than the upper threshold or lower than 4-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) the lower threshold, the fault management module of the system can raise a threshold crossing alarm. 4.1.1 Term Overview The following explains the basic concepts for your better understanding of performance management operations described in this manual. l Measure Object Measure object can be a physical entity, a logic entity, or the combination of physical entities and logic entities that need to be measured. l Measurement Type Measurement type is a basic element of measurement that supports the measurement of different indexes of a measure object. Different measure objects involve different measurement types. You can select a measurement type for a measurement according to the indexes you want to measure. l Counter Counter is a specific measurement index involved in a measurement type. Each measurement type has a number of measurement indexes. l Collection Granularity Collection granularity refers to the cycle of collecting data from boards in network devices. The collection granularity can be set to 5 minutes, 15 minutes, or 1 hour. Note: The U31 R22 only supports the collection granularity of 15 minutes. l Calculation Index Calculation index is used to evaluate equipment performance. It is the arithmetic result of related measurement items. The system already presets some calculation indexes for generic applications. l QoS Quality of Service (QoS) is a network security mechanism and technology used to solve network delay and congestion problems. It prevents important services from being delayed or discarded when the network is overloaded or congested, and therefore guarantees high-efficiency operation of the network. l Measurement Task Measurement task refers to a user-defined performance measurement task. After you schedule and activate a measurement task, the system will automatically collect the values of required performance parameters in accordance with the preset cycle. You 4-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management can know the network status by observing the performance statistics provided by the system. l Threshold Task Threshold task, also called QoS task, reflects the service quality of network devices. A threshold task is used to monitor the values of specific performance indexes. When the calculated value of an index exceeds the upper threshold or lower than the preset lower threshold preset in the task, a threshold crossing alarm is raised. When the calculated value during a later measurement period is within the threshold range, the threshold crossing alarm is cleared. 4.1.2 Performance Monitoring Scheme The performance monitoring scheme of the ZXCTN is shown in Figure 4-1. Figure 4-1 Performance Monitoring Scheme 4-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 4.1.3 Performance Management Window The Performance Management window is shown in Figure 4-2. Figure 4-2 Performance Management View 1. Main menu 2. Main toolbar 3. Navigation tree 4. Performance data display area 5. Performance management toolbar Performance Menu To use performance management functions, select corresponding commands on the Performance menu, see Figure 4-3. 4-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Figure 4-3 Performance Menu Performance Management Buttons on Main Toolbar The main toolbar in the client window provides some shortcut buttons related to performance management functions. You can click them to open corresponding management tabs quickly. Table 4-1 describes the functions of the performance-related buttons on the main toolbar. Table 4-1 Performance Management Buttons on the Main Toolbar Button Function Performance Data Query Real-time Data Query Navigation Pane The navigation pane in the client window varies with the active management view displayed in the window. In the performance management view, the navigation pane provides different topological trees to facilitate performance management operations. On the top of the navigation pane are three tabs: Model Management, NE Tree, and Template Management. The following introduces the three tabs of the navigation pane in the performance management view. l l On the Model Management tab, the Resource Type tree lists all the performance measurement types and counters of all managed NEs in the system. On the NE Tree tab, a navigation tree lists all managed NEs in the system. 4-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l On the Template Management tab, the Template Management tree lists all available templates that can be used for performance data query. Performance Management Toolbar The performance management toolbar varies with the active tab displayed in the performance management view. It provides a number of shortcut buttons for quick operations. Table 4-2 only introduces two common buttons on the toolbar. Table 4-2 Common Buttons on the Performance Management Toolbar Button Function Select columns for displaying corresponding parameters in the performance display pane. Search for specific tasks or performance data in accordance with the entered keyword. 4.2 Performance Settings 4.2.1 Setting Performance Module Parameters This procedure describes how to set the performance module parameters of the login user or all users. Parameters for the login user can be valid after logging in to the EMS again. Steps 1. From the main menu, select System > Preferences. The Preferences dialog box is displayed. 2. In the Preferences navigation tree, select Performance > Performance Management Preferences. The performance module parameter setting interface is displayed on the right. 3. To set parameters, refer to Table 4-3. Table 4-3 Performance Module Parameter Setting Parameter Description Default display status in The meaning of each item is described below. Measurement task management l All current tasks: all measurement tasks are displayed. l Current tasks-Activated: measurement tasks activated are displayed. l Current tasks-Suspended: measurement tasks suspended are displayed. 4-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Parameter Description l Current tasks-Deletion error: measurement tasks whose consistency statuses are "Deletion error" are displayed. l Current tasks-Inconsistent: measurement tasks whose consistency statuses are "Inconsistent" are displayed. l History tasks: history measurement tasks are displayed. l All tasks: all current and history measurement tasks are displayed. Default display status in The meaning of each item is described below. Threshold task management l Activated tasks: Activated threshold tasks are displayed. l Suspended tasks: Suspended threshold tasks are displayed. l Date format in Files generated by All tasks: All threshold tasks are displayed. Time display format in the performance query result. template tasks Show index in Counter and index The meaning of each item is described below. management l All indexes: All performance indexes are displayed. l Frequently used indexes: Indexes Frequently used are displayed. 4. Click OK. – End of Steps – 4.2.2 Configuring the Performance Mask This procedure describes how to set unconcerned performance items from being reported to the U31 R22. A masked performance item will not be reported to the U31 R22, but the performance value is still counted. Context The default status of each performance item is unmasked. 4-7 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Note: The board does not report any masked performance item to the NMS and this will affect normal supervision of network operation. Therefore, performance mask in network operation should be avoided or this operation should be canceled in time once the operation goal is achieved. Steps 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management window is displayed. 2. In the navigation tree in the left pane, select NE Operation > Performance Configuration > Performance Mask Configuration. The Performance Mask Configuration area is displayed. 3. On the By Resource tab in the right pane, expand all performance items contained by the cards configured in the NE to set the Mask Status. l Select Mask Status: This performance item is masked. l Clear Mask Status: This performance item is not masked. 4. Click Apply. A message box is displayed. 5. Click OK. – End of Steps – 4.2.3 Setting Performance Thresholds By setting performance thresholds, you can modify the digital performance thresholds of the CTN NEs. Context Digital performance threshold is classified into 15-minute performance threshold and 24-hour performance threshold by the performance measurement period. l 15-minute digital performance threshold has two performance threshold settings. à Uni-threshold: In a period of 15 minutes, when a performance value exceeds the maximum threshold, the system will automatically raise the performance threshold crossing alarm. When each 15-minute period arrives, the alarm is displayed, and all the performance values will be cleared and will be counted from zero again. à Bi-threshold: In a period of 15 minutes, when a performance value exceeds the maximum threshold, the system will automatically raise the performance threshold crossing alarm. When each 15-minute period arrives, the alarm is displayed, and all the performance values will be cleared and will be counted 4-8 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management from zero again. When in another 15-minute period, the performance count is lower than the minimum threshold from the start to the end, the system will raise the performance threshold crossing alarm after 15 minutes. l Digital 24-hour performance threshold: The 24-hour threshold is a uni-threshold. In a period of 24 hours, when a performance value exceeds the maximum threshold, the system will automatically raise the performance threshold crossing alarm. When the period ends, the alarm is displayed, and all the performance values will be cleared and will be counted from zero again. Steps 1. In the Topology Management window, right-click an NE, and then select NE Management from the shortcut menu. The NE Management window is displayed. 2. In the left navigation tree, select NE Operation > Performance Configuration > Digital Performance Threshold Configuration. The Digital Performance Threshold Configuration area is displayed. 3. From the Performance Granularity list in the right pane, select 15 minutes or 24 hours. 4. Expand the performance items, and double-click the parameters of Low, Pre-warning Low, Pre-warning High, and High. 5. (Optional) Click to expand all performance items. 6. (Optional) Click Default to set the threshold parameters to the default values. 7. (Optional) Click Applyto to apply the threshold configuration of this NE to other NEs. 8. Click Apply. A message box is displayed. 9. Click OK. – End of Steps – 4.2.4 Configuring Analog Performance Thresholds This procedure describes how to set analog performance thresholds, including the low, pre-warning low, pre-warning high, and high thresholds. The setting is applicable for CTN and SDH NEs. Steps 1. In the Topology Management window, right-click an NE, and select NE Management from the shortcut menu. The NE Management window is displayed. 2. In the navigation tree on the left, select NE Operation > Performance Configuration > Analog Performance Threshold Configuration. The Analog Performance Threshold Configuration area is displayed. 3. From the Select Board list, select the board to be configured. 4-9 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 4. Expand the performance items and set Low, Pre-warning Low, Pre-warning High, and High for each item. l l Note: You can click Default to set all performance items to their default values. (Optional) For a CTN NE, you can click Current Board Value to set all performance items to their current board values. 5. Click Apply. A message box is displayed. 6. Click OK. – End of Steps – 4.2.5 Setting Default Thresholds for Optical Modules This procedure describes how to set default thresholds for optical modules. The default thresholds can also be applied to other NEs. You can import a configuration file to modify the default threshold parameters. Steps 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management window is displayed. 2. In the navigation tree on the left, select NE Operation > Maintenance Management > Optical Default Threshold Configuration. The Optical Default Threshold Configuration area is displayed. 3. Perform the corresponding operations as required. To... Do... Apply the default Click the Apply button. settings Apply the settings to Click the Apply to... button. other NEs Import a prepared Click the Import button. configuration file – End of Steps – 4.2.6 Setting the CTN Performance Threshold in Batches This procedure describes how to set the digital and analog performance thresholds of multiple NEs at the same time. 4-10 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Prerequisite Devices whose thresholds require to be set are online. Steps 1. From the main menu, select Maintenance > BN NE Maintenance > CTN Performance Threshold Batch Configuration. The CTN Performance Threshold Batch Configuration window is displayed. 2. To set digital performance thresholds, perform the following operations. a. In the Digital tab, select the performance items to be set from the Selectable item navigation tree. b. Click c. to move the performance items to the table on the right. Select Performance Granularity. d. In the table, set Low, Pre-warning Low, Pre-warning High, and High of each performance. e. Click Select NE..., and then select NEs in the Resource Selector dialog box. f. Click Apply. 3. To set analog performance thresholds, perform the following operations. a. In the Analog tab, select the performance items to be set from the Selectable item navigation tree. b. Click c. to move the performance items to the table on the right. In the table, set Low, Pre-warning Low, Pre-warning High, and High of each performance. d. Click Select NE..., and then select NEs in the Resource Selector dialog box. e. Click Apply. 4. (Optional) Import the template performance data as required. To... Do... Import the default Click Import, and then select Import Default Template. performance threshold data Import the data through Click Import, and then select Import from File. Select the file in the file the displayed dialog box. 5. (Optional) Export the performance data as a template: Click Export..., and then select the storage path in the displayed dialog box. Click Export. – End of Steps – 4-11 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 4.2.7 Configuring Zero Performance Suppression You may choose to suppress all the current zero performance data or to suppress all the history zero performance data. After setting the suppression conditions, all the zero performance data meeting the requirements can be prevented from being sent to the NMS. Steps 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management dialog box is displayed. 2. In the navigation tree in the left pane, select NE Operation > Performance Configuration > Zero Performance Suppression Configuration. The Zero Performance Suppression Configuration area is displayed. 3. Select a board from the Select Card list. l l l l Note: For the SNMP devices in earlier versions, the zero performance suppression function can be configured on boards. Thus, you can select a board in this step. For the QX interface and nectconf interface devices, the zero performance suppression function can be configured on NEs. You cannot select a board in this step. If you do not set zero performance suppression, the NMS performance will be affected. WDM NEs only support History 15-minute zero performance suppression. 4. Set the Suppression Status. l Select Suppression Status: The zero performance of selected card is suppressed. l Clear Suppression Status: The zero performance of selected card is not suppressed. 5. Click Apply. A message box is displayed. 6. Click OK. – End of Steps – 4.2.8 Clearing the Performance Counter The NCP board clears the records of local performance counter in accordance with the clearing command from Manager, and the performance statistics will be relaunched. Context There are two clearance modes: Clearance. Digital Counter Clearance and Analog Counter 4-12 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management l l Digital Counter Clearance: Clear the current values of all performance items and start to collect data from zero. Analog Counter Clearance: Set all performance values (maximum value, minimum value and current value) to the current values. Steps l Clear the performance counter in the NE Management window. 1. In the Topology Management window, right-click an NE and select NE Management from the shortcut menu. The NE Management window is displayed. 2. In the navigation tree in the left pane, select NE Operation > Performance Configuration > Performance Counter Clear. The Performance Counter Clear area is displayed. 3. Select 15 minutes performance or 24 hours performance from the Performance Granularity list. 4. Select the performance item from the Unselected Items list. to move the selected performance item to the Selected Items list. 5. Click Note: Click All Clear to move all performance items from the Unselected Items list to the Selected Items list. 6. Click Apply. A message box is displayed. 7. Click OK. l Clear the performance counter in the Current Performance Data Query window. 1. Open the Current Performance Data Query window. 2. Right-click one or multiple performance entries, and select Performance Counter Clear from the shortcut menu. 3. Click the button on the toolbar to refresh the current performance. In the Current Performance Data Query window, all digital performances are recollected from 0. All analog performances (maximum, minimum, and current values) are displayed in the current values. – End of Steps – 4-13 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 4.2.9 Setting Performance Rendering Performance rendering is described as follows: The system performs the corresponding logic calculation on the selected indexes or counters, and then filters according to the logic operation results. If the results are true, the query results are displayed and the indexes or counters are rendered with different colors to remind the user. Context When a user requires to focus on parameter values of one or multiple performance items, the user can set the threshold values, corresponding background colors, and font colors for these performance items with the performance rendering function. When the performance parameter value meets the threshold, the performance data is displayed in the preset background rendering color and font rendering color to remind the user that the parameter value of the performance item reaches the threshold. Steps 1. From the main menu, select Performance > History Performance Data Query. The History Performance Data Query dialog box is displayed. 2. On the Index/Counter Selection tab, set index/counter selection parameters. For the parameter descriptions, refer to Table 4-4. Table 4-4 Descriptions for Parameters on the Index/Counter Selection Tab Parameter Description NE type Selects the NE type to be set in the drop-down list. MO type It is unnecessary to set this parameter. MO type Uses the default value checkpoint. Available Expands each node, and then selects the performance items to be indices/counters rendered. Selected Displays the performance items selected from Available indices/counters indices/counters, for example, CPU utilization. 3. Click the Logic button. The Logical Filtering/Rendering dialog box is displayed. 4. Select And or Or from Filter type. l And operation: The system displays the query result only when the result of logic operation set for each index or counter in the list is true. l Or operation: The system displays the query result as long as the result of logic operation set for one index or counter in the list is true. 5. Set Index/Counter as required, and then set Filter Operator and Filter Value to define the filtering conditions, see Figure 4-4. 4-14 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Figure 4-4 Logical Filtering /Rendering Dialog Box 6. Click Rendering. The Threshold Rendering dialog box is displayed, see Figure 4-5. Set the threshold value and rendering color for each threshold. Figure 4-5 Threshold Rendering Dialog Box 7. Click OK to complete the configuration of filtering and rendering for each counter and index. 8. Click OK. – End of Steps – 4.3 Introduction to Measurement Task Management You can create a performance check template in a measurement task. The performance object and NE that need to be detected and the check time must be defined in the template. The system will automatically collect the specified performance data in accordance with the template and generate a network performance statistics result. In this way, you can learn of the operational status of the network. To open the Measurement Task Management tab, select Performance > Measurement Task Management from the main menu. The Measurement Task Management tab is displayed in the performance management view. 4-15 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Some buttons on the performance management toolbar of the Measurement Task Management tab are unavailable. To activate those buttons, click a specific measurement task in the measurement task list. Table 4-5 describes the functions of the buttons on the performance management toolbar. Table 4-5 Description of Toolbar Buttons on the Measurement Task Management Tab Button Function Note Create a measurement task. - Modify a measurement task. Select a suspended task to activate this button. Delete a measurement task. Select a suspended task to activate this button. Activate a suspended measurement Select a suspended task to activate task. this button. Suspend an active measurement Select an active measurement task task. in coherence status to activate this button. View the information of a Select a measurement task to activate measurement task. this button. View the coherence status of a Select a measurement task to activate measurement task. this button. Synchronize a measurement task Select a measurement task to activate from the server to related network this button. elements. Refresh the measurement task list. - Import a measurement task. - Export a measurement task. Select a measurement task to activate this button. Check the integrity of a measurement - task. 4.3.1 Creating a Measurement Task This procedure describes how to collect performance data of the NEs in accordance with the NE measurement task customized by the user. The NEs transmit the collected performance data to the NMS in files. 4-16 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Prerequisite The Measurement Task Management tab is displayed. Context One device type can only have one measurement task. Steps 1. On the Measurement Task Management tab, perform one of the following operations to open the Create Measurement Task dialog box. l l l On the performance management toolbar, click . On the NE Tree tab, right-click a managed element, and then select Create Measurement Task from the shortcut menu. In the measurement task list, right-click an existing task, and then select Create Measurement Task from the shortcut menu. 2. On the Measurement Task tab, click the Measurement Task tab to configure the parameters. Parameter Description Setting Instruction NE Type Measure the NE type of the task It is the NE type of the device MO Type It is the type of the object to be Measure object type is also the manage measured object type It is the performance object of the It is composed of PO Type measure task Task Type There are two types of task types: Normal: You can select the performance l Normal object l ALL-PO ALL-PO: Create the task of all performance objects belong to the measure object type, and you do not need to select the performance object. 3. Click the Location tab, and then set the parameters. Parameter Description Wildcard Level By selecting a wildcard level, you can select MO(s) in batch quickly. It varies with the previously selected NE type and MO type. You can select the NE location and the measure object in accordance with the needs of the selected wildcard level. NE Location Select the NE(s) you want to measure on the NE tree. Selected MO Location Select the MO(s) you want to measure on the MO tree. Selected 4-17 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 4. Click the General tab, and then set the general information of the measurement task. Parame- Description Setting Instruction The default creator of the measurement - ter Creator task is the current login user of the client. Task Name of the measurement task. name Clearly describe the measurement task. The name cannot be the same as any existing measurement task name. Start time Set the start time of the period during Be sure that the start time is later than which the measurement task will take the current system time of the client. effect. End time Set the end time of the period during Be sure that the end time is later than which the measurement task will take the start time. effect. Status Granularity Select the status of the measurement If Suspend is selected, the task from the drop-down box: Active or measurement task will not take Suspend. effect after successful creation. The collection granularity determines Select the data collection cycle: 15 the cycle of data collection from minutes. corresponding boards. Effective Set the exact implementation date of the Set the data in accordance with weeks Date measurement task, weekly or monthly. or months. You can click the date to Every day is selected by default. delete it. Effective Set the time periods when the The time section can be one day or a Time measurement task shall be performed period in one day. during a day. 5. Click OK. l The created measurement task is displayed in the measurement task list on the Measurement Task Management tab. l If the measurement task is active, the NE(s) collects required performance data and transfers the collected data in the format of file to the U31 R22 in accordance with the requirements of the measurement task. – End of Steps – 4.3.2 Modifying a Measurement Task This procedure describes how to modify a measurement task, including performance object, wildcard level, NE position, measurement object position, task name, task start time, end time, collection granularity, valid data, and valid period. 4-18 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Prerequisite l l The Measurement Task Management tab is displayed. The target measurement task to be modified is suspended and its consistency status is normal. Context l l l You can only modify the time information when the current time is earlier than the time that the measurement task starts. An active measurement task can be suspended only when its consistency status is normal. Only a suspended task can be modified. The origin of the measurement task to be modified is client. That means the measurement task is manually created by a user on a client. Steps 1. On the Measurement Task Management tab, perform one of the following operations to open the Modify Measurement Task dialog box. l l Select the measurement task from the measurement task list, and then click on the toolbar. Right-click the measurement task in the measurement task list, and then select Modify Measurement Task from the shortcut menu. 2. On the Measurement Task tab, modify the selection of PO(s) as needed. 3. Click OK. – End of Steps – 4.3.3 Deleting a Measurement Task This procedure describes how to delete a suspended measurement task. One or multiple measurement tasks can be deleted at one time. Prerequisite l l The Measurement Task Management tab is displayed. The measurement task to be deleted is suspended and its consistency status is normal. Note: An active measurement task can be suspended only when its consistency status is normal. And only a suspended task can be modified. 4-19 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. On the Measurement Task Management tab, perform one of the following operations to open the Delete Measurement Task dialog box. l Select the measurement task from the measurement task list, and then click on the toolbar. Right-click the measurement task in the measurement task list, and then select Delete Measurement Task from the shortcut menu. l Note: To delete multiple measurement tasks at a time, press and hold Ctrl, and then click the measurement tasks individually. After selecting all those measurement tasks, click on the toolbar. 2. Click Yes. The system deletes the performance measurement task. – End of Steps – 4.3.4 Activating a Measurement Task When a measurement task is suspended, if the system needs to collect NE performance data in accordance with the task rules, the measurement task must be activated. Prerequisite l l l You have the authority of measurement task management. The Measurement Task Management tab is displayed. The measurement task you want to activate is suspended. Context After the task is activated, the U31 R22 queries the performance data of the scheduled time on the NEs and stores the data in the database. In addition, the system checks the consistency status of each NE measurement task involved in the measurement task. If the consistency status of an NE measurement task is abnormal, the system deems that the activation of the measurement task fails. Multiple measurement tasks of the same type can be activated or suspended at a time. Steps l l Right-click the measurement task in the measurement task list, and then select Activate Measurement Task from the shortcut menu. Select the measurement task from the measurement task list, and then click on the toolbar. 4-20 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Note: If multiple measurement tasks are activated at the same time, task origin of the multiple measurement tasks must be consistent. – End of Steps – 4.3.5 Suspending a Measurement Task A suspended measurement task indicates that data collection stops. The system does not collect performance data for a target NE in a scheduled collection time of the task. Prerequisite l l l The Measurement Task Management tab is displayed. The measurement task you want to suspend is active. The consistency status of the measurement task is normal. Context Only an active measurement task with normal consistency status can be suspended. You can suspend the measurement tasks only from the client. You can suspend multiple active measurement tasks of the same type at a time when the origins of these tasks are the same. Steps l Right-click the measurement task in the measurement task list, and then select Suspend Measurement Task from the shortcut menu. l Select the measurement task from the measurement task list, and then click the toolbar. on Note: If multiple measurement tasks are suspended at the same time, task origin of the multiple measurement tasks must be consistent. – End of Steps – 4.3.6 Viewing a Measurement Task This procedure describes how to view the information of a measurement task. 4-21 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Prerequisite l l The Measurement Task Management tab is displayed. The measurement task to be viewed exists on the Measurement Task Management tab. Steps 1. On the Measurement Task Management tab, perform one of the following to open the View Measurement Task dialog box. l Double-click the measurement task in the measurement task list. l Right-click the measurement task in the measurement task list, and then select View Measurement Task from the shortcut menu. on l Select the measurement task in the measurement task list, and then click the toolbar. 2. In the View Measurement Task dialog box, the measurement task, location selection, and basis information are displayed. – End of Steps – 4.3.7 Checking the Consistency Status of a Measurement Task This procedure describes how to check the consistency status of a measurement task. Task consistency status is used to check whether a measurement task on the client and the NE are consistent. If the task exists on the client but not on the NE, the task consistency status is abnormal. Prerequisite The Measurement Task Management tab is displayed. Steps 1. To open the View Consistency Status dialog box, perform one of the following operations: l l l Select the measurement task from the measurement task list, and then click on the toolbar. Right-click the measurement task in the measurement task list, and select View Consistency Status from the shortcut menu.. Click the Consistency Status column in the measurement task management list. 2. View the measurement task status of NEs. Button Function View the details of an NE measurement task. Synchronize an NE measurement task to corresponding NE. 4-22 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Button Function Synchronize all NE measurement tasks to corresponding NEs. Delete an NE measurement task. Delete all NE measurement tasks in the inconsistent status. View the NE measurement tasks in the previous page. View the NE measurement tasks in the next page. 3. Double-click a row in the list of the Consistency Status dialog box. The Detail dialog box is displayed, indicating the details of the task. – End of Steps – 4.3.8 Synchronizing a Measurement Task If the parameters in the performance check task of an NE are inconsistent with those in the measurement task template, the parameters in the template must be synchronized to the NE task to ensure that both the parameters are consistent. Prerequisite The Measurement Task Management tab is displayed. Steps l To synchronize the measurement task, perform one of the following operations: à Right-click the measurement task, and then select Synchronize Measurement Task from the shortcut menu. à Select the measurement task, and then click on the toolbar. The system starts synchronizing the measurement task from the server to corresponding NE(s). And after the completion of synchronization, a message indicating the synchronization result is displayed on the status bar of the client window. – End of Steps – 4.3.9 Refreshing Measurement Tasks Multiple users can manage a network via different clients connected to the U31 R22 server. If another user performs some operations related to measurement tasks, for example, create a new measurement task, you may not immediately view the changes of measurement tasks on your client due to the response time between the server and 4-23 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) different clients. In this case, you can refresh the measurement task list to synchronize the latest information of measurement tasks from the server to your client. Prerequisite The Measurement Task Management tab is displayed Steps l To refresh the measurement task, perform one of the following operations: à Right-click any measurement task in the measurement task list, and then select Refresh Measurement Task from the shortcut menu. à Click on the toolbar. The local client synchronizes the latest measurement task information from the server and then refreshes the measurement task list. – End of Steps – 4.3.10 Importing a Measurement Task The measurement tasks (*.xml or *.zip files) that are defined in advance can be imported. Prerequisite l l The Measurement Task Management tab is displayed. The measurement task file to be imported is prepared. Context Make sure that the name of each measurement task defined in the *.xml or *.zip file is different from those of existing measurement tasks in the system. A measurement task with the same name as an existing task in the system cannot be imported. Steps 1. On the Measurement Task Management tab, click the toolbar. drop-down button on the 2. Select Import the File or Import the File and Use it as Template from the list. The Import Measurement Task dialog box is displayed. 3. Perform one of the following operations as required. 4-24 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management To... Do... Import the file Select the file to be imported, and click the Open button. Import the file and i. use it as template Select the file to be imported, and click the Open button. The Import Measurement Task dialog box is displayed. ii. View the parameters of the measurement task in the file, and modify the parameters that can be modified as required. If the file includes multiple measurement tasks, the system displays the Import Measurement Task dialog box for each measurement task. You can modify the parameters of each measurement task as required. The file is successfully imported only when all the measurement tasks are modified. iii. Click OK. A message box is displayed. iv. Click OK. – End of Steps – 4.3.11 Exporting a Measurement Task This procedure describes how to export a measurement task. The exported measurement task is a ZIP file. Prerequisite l l The Measurement Task Management tab is open. There is at least one measurement task to be exported. Steps 1. On the Measurement Task Management tab, perform one of the following operations to open the Export Measure Task dialog box. l Right-click the measurement task, and then select Export Measurement Task from the shortcut menu. on the toolbar. l Select the measurement task, and then click Note: To export multiple measurement tasks, press and hold Ctrl and then click those tasks on the toolbar. individually. After selecting all those measurement tasks, click 2. In the Export Measure Task dialog box, set the path for saving the file, the file name, and file type. 4-25 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3. Click Save. The selected measurement task is exported to the specified directory. – End of Steps – 4.3.12 Re-collecting Performance Data If the performance data collected in accordance with a measurement task is incomplete, you can re-collect the performance data on the client. Prerequisite l l The Measurement Task Management tab is displayed. The measurement task used for re-collecting performance data is available in the system. Steps 1. On the Measurement Task Management tab, right-click the measurement task, and then select Add Data Recollection from the shortcut menu. The Add Data Recollection dialog box is displayed. 2. On the Measurement Task tab, modify the selection of POs as needed. 3. On the Location tab, set the start time, end time, and NE location. 4. Click OK to issue the re-collection command to corresponding NE(s). The system starts re-collecting the performance data according to the settings. – End of Steps – 4.4 Template Task Management 4.4.1 Introduction to Query Template and Template Task This procedure describes how to open the Template Task window through the performance and statistic menu item in the main men. Query Template A query template can be used for performance data query. By setting and saving query conditions in a query template, you can conveniently query performance data based on the preset query conditions. Template Task Either query template or common template can be used to schedule a performance data query task, that is, a template task. The system can automatically start performance data query in accordance with the settings in the template task and save the query result on the server. 4-26 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management You can check the execution result of a template task to get the performance data you want. By using the template task, it is unnecessary to set query conditions one by one because the query template or common template in the template task already specifies the query conditions, including the query granularity, NE location, and the MO location. To open the Template Task tab in the client window, do one of the following: l l Select Performance > Template Task on the menu bar. Select Query&Statistics > Performance Stat > Template Task on the menu bar. The following describes the template task pane and the task result pane on the Template Task tab page. l Template Task Pane All template tasks in the system are listed in the template task pane. Table 4-6 describes the functions of buttons on the toolbar on the top of the template task pane. Table 4-6 Description of Toolbar Buttons for Template Tasks Button Function Create a new template task based on a query template. Create a new template task based on a common template. Modify an existing template task. View the information of a template task. Delete a template task. Query performance data in accordance with the selected template task. Activate a template task. Suspend a template task. Complete a template task. Refresh template tasks. Select the filtering range. l Task Result Pane The task result pane shows the execution result of template tasks. You can export or run a template task again by clicking corresponding buttons on the toolbar on the top of the task result pane. 4-27 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Table 4-7 describes the functions of some buttons on the toolbar. Table 4-7 Description of Toolbar Buttons for Task Results Button Function Export task results. Redo a template task. 4.4.2 Opening the Template Task Management Tab This procedure describes how to open the Template Task Management tab through the main menu. Steps 1. Perform one of the following operations to open the Template Task Management tab. l From the main menu, select Performance > Template Task Management l From the main menu, select Statistics > Performance Statistics > Template Task Management. For the descriptions of function buttons on the toolbar, refer to Table 4-8. Table 4-8 Function Button Descriptions Button Description Creates a new template task based on a query template. Creates a new template task based on a common template. Modifies an existing template task. Views the information of a template task. Deletes a template task. Queries performance data in accordance with the selected template task. Activates a template task. Suspends a template task. Stops a template task. Cancels waiting for a template task. Refreshes template tasks. 4-28 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Button Description Selects a filtering range. After the template task is executed, the task execution result is displayed in the task result list. For the descriptions of function buttons on the toolbar of the list, refer to Table 4-9. Table 4-9 Function Button Descriptions Button Description Exports task results. Redoes a template task. – End of Steps – 4.4.3 Query Template Operations A query template can be used for performance data query. By setting and saving query conditions in a query template, you can easily query performance data based on the preset query conditions. The parameters set in a query template include query indexes, query objects, and query time. A query template can be exported or imported between different U31 R22 systems. 4.4.3.1 Customizing a Performance Query Template To query different types of performance values more conveniently, you can set common performance query templates according to the actual service in the network. Context Performance templates include common templates, current performance query templates, and history performance data query templates. l l The common template does not include query object/location selection information. It applies to the following two scenarios: selecting the NE in the topology, and then querying according to the template. Or, when querying according to the template, selecting the target NE. When the current performance query template and history performance data query template are created, the query object/location selection information is included. They apply to the query on the specified NE according to the template. The two templates cannot be selected when the NE is selected in the topology view and then query is performed according to the template. 4-29 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l Current performance query templates and history performance data query templates can be saved as common templates. Common performance (current performance and history performance) query templates defined by the user include: l l l l l l l l l l l l l l Board temperature current performance query Board voltage current performance query CPU current performance query RAM current performance query All NE optical power current performance query Convergence layer and above NE optical power history performance query Convergence core layer master link traffic and bandwidth utilization current performance query Convergence core layer standby link traffic and bandwidth utilization history performance (15 minutes) query Convergence core layer standby link traffic and bandwidth utilization history performance (24 hours) query Access layer master link traffic and bandwidth utilization current performance query Access layer master link traffic and bandwidth utilization history performance (15 minutes) query Access layer master link traffic and bandwidth utilization history performance (24 hours) query Access layer equipment access interface traffic history performance (24 hours) query Core layer equipment access interface traffic history performance (24 hours) query Steps 1. From the main menu, select Performance > Template Management. The Template Management tab is displayed. 2. In the Template Management navigation tree, select Current Performance Data Query Template. Note: When customizing the history performance query template, select History Performance Data Query Template in the Template Management navigation tree. 3. Click . The Add Template dialog box is displayed. 4. Enter the template name, and then select Operation mode. l Confirm before execution: When the index or counter reaches the query time, the prompt information is displayed. The user should confirm whether to perform the performance query. 4-30 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management l Direct execution: When the index or counter reaches the query time, the system automatically performs the performance query. 5. Enter the template name, and then click the OK button. Performance Data Query dialog box is displayed. The Add Current 6. Click the Counter Selection tab, see Figure 4-6. To set related parameters, refer to Table 4-10. Table 4-10 Descriptions for Parameters in the Counter Selection Tab Parameter Description NE type Selects the NE type to be set in the drop-down list. Common template It is unnecessary to set this parameter. NO type Uses the default value "checkpoint". Granularity The granularity that the system collects the data. The options include "15 minutes" and "24 hours". Counters Expands each node, and selects the performance items to which the performance query template focuses. Selected counters The performance items selected from Counters are displayed in the area, for example, CPU utilization. 4-31 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Figure 4-6 Index/Counter Selection Tab 7. Click the Location Selection tab. To set related parameters, refer to Table 4-11. Table 4-11 Descriptions for Parameters in the Location Selection Tab Parameter Description Wildcard level Sets the range of the measurement object. NE location(s) Sets the NE location where the measurement object is located. When Wildcard level is set to All, it is unnecessary to set this parameter. MO location(s) Sets the specified object. When Wildcard level is set to All or NE, it is unnecessary to set this parameter. To set common performance query templates, refer to Table 4-12. 4-32 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Table 4-12 Common Performance Query Template Settings Performance NE Type Selected Counter Wildcard Query Level Template Board All CTN ValueofDe- l MaxValueofDetectingPointTemperature (℃) Board (main temperature NEs control board) tecting- l MinValueofDetectingPointTemperature (℃) current PointTem- l ValueofDetectingPointTemperature (℃) performance perature query (℃) Module l MaxValueofModuleTemperature (℃) Board (main Tempera- l MinValueofModuleTemperature (℃) control board) ture (℃) l ModuleTemperature (℃) Inputvoltage (V) Board voltage All CTN Inputvolt- current NEs age (V) CPU current All CTN CPUutiliza- l MaxCPUutilizationratio Board (main performance NEs tionratio l MinCPUutilizationratio control board) l CPUutilizationratio Board (power board) performance query query RAM current All CTN RAMutiliza- l RAMutilizationratio Board (main performance NEs tionratio l MaxRAMutilizationratio control board) l MinRAMutilizationratio query All NE optical All CTN Optical l MaxValueofOutputOpticalPower(dBm) Interface power current NEs Power l MinValueofOutputOpticalPower(dBm) (line optical performance l InputOpticalPower(dBm) interface) query l MaxValueofReceivingOpticalPower(dBm) l MinValueofReceivingOpticalPower(dBm) l OutputOpticalPower(dBm) Convergence Conver- Optical l MaxValueofOutputOpticalPower(dBm) Interface layer and gence layer Power l MinValueofOutputOpticalPower(dBm) (line optical above NE and above l InputOpticalPower(dBm) interface) optical power NEs l MaxValueofReceivingOpticalPower(dBm) history l MinValueofReceivingOpticalPower(dBm) performance l OutputOpticalPower(dBm) query 4-33 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Performance NE Type Selected Counter Wildcard Query Level Template Conver- Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces core layer gence core ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (interfaces master link layer NEs l EthernetPhysical(ETPI)ReceiveCRCerror- of both ends frames of the link EthernetPhysical(ETPI)SendCRCerrorframes between Convergence traffic and bandwidth l utilization l current EthernetPhysical(ETPI)Receiveerrorframesra- convergence tio layer performance l EthernetPhysical(ETPI)Senderrorframesratio equipment query l EthernetPhysical(ETPI)Nearenddropratio and core EthernetPhysical(ETPI)Sendbandwidthusager- layer) l ate l EthernetPhysical(ETPI)Receivebandwidthusagerate Convergence Conver- Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces core layer gence core ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (interfaces standby link layer NEs l EthernetPhysical(ETPI)ReceiveCRCerror- of both ends frames of the link traffic and bandwidth l EthernetPhysical(ETPI)SendCRCerrorframes between utilization l EthernetPhysical(ETPI)Receiveerrorframesra- convergence tio layer and history performance l EthernetPhysical(ETPI)Senderrorframesratio standby core (15 minutes) l EthernetPhysical(ETPI)Nearenddropratio layer) query l EthernetPhysical(ETPI)Sendbandwidthusagerate Convergence core layer standby link l EthernetPhysical(ETPI)Receivebandwidthusagerate traffic and bandwidth utilization history performance (24 hours) query 4-34 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Performance NE Type Selected Counter Wildcard Query Level Template Access layer Access Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces master link layer NEs ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (interfaces l EthernetPhysical(ETPI)ReceiveCRCerror- of both ends frames of the link EthernetPhysical(ETPI)SendCRCerrorframes between traffic and bandwidth utilization l current l EthernetPhysical(ETPI)Receiveerrorframesra- access layer tio equipment l EthernetPhysical(ETPI)Senderrorframesratio and master l EthernetPhysical(ETPI)Nearenddropratio convergence EthernetPhysical(ETPI)Sendbandwidthusager- layer) performance query l ate l EthernetPhysical(ETPI)Receivebandwidthusagerate Access layer Access Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces master link layer NEs ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (interfaces l EthernetPhysical(ETPI)ReceiveCRCerror- of both ends frames of the link traffic and bandwidth utilization l EthernetPhysical(ETPI)SendCRCerrorframes between history l EthernetPhysical(ETPI)Receiveerrorframesra- access layer tio equipment performance (15 minutes) l EthernetPhysical(ETPI)Senderrorframesratio and standby query l EthernetPhysical(ETPI)Nearenddropratio convergence l EthernetPhysical(ETPI)Sendbandwidthusager- layer) Access layer ate master link l traffic and EthernetPhysical(ETPI)Receivebandwidthusagerate bandwidth utilization history performance (24 hours) query Access layer Access Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces equipment layer NEs ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (access layer l EthernetPhysical(ETPI)ReceiveCRCerror- equipment access interface frames service traffic history l EthernetPhysical(ETPI)SendCRCerrorframes access performance l EthernetPhysical(ETPI)Receiveerrorframesra- interfaces) (24 hours) query tio l EthernetPhysical(ETPI)Senderrorframesratio l EthernetPhysical(ETPI)Nearenddropratio 4-35 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Performance NE Type Selected Counter Wildcard Query Level Template Core layer Core layer Ethernet l EthernetPhysical(ETPI)Sendoversizeframes Interfaces equipment NEs ETPI l EthernetPhysical(ETPI)Receiveoversizeframes (core layer l EthernetPhysical(ETPI)ReceiveCRCerror- equipment frames service EthernetPhysical(ETPI)SendCRCerrorframes access EthernetPhysical(ETPI)Receiveerrorframesra- interfaces) access interface traffic history l performance l (24 hours) tio query l EthernetPhysical(ETPI)Senderrorframesratio l EthernetPhysical(ETPI)Nearenddropratio 8. (Optional) Click Save as Common Template to save this template to a common template. (optional) 9. Click OK. After the template is created, the created performance query template is displayed in the Template Management window. Right-click this template, and then select Query by Template from the shortcut menu. The Current Performance Query dialog box is displayed, and the query result is displayed. – End of Steps – 4.4.3.2 Modifying the Attributes of a Query Template The attributes that can be modified in a current performance data query template include a template name and an operation mode. The attributes that can be modified in a history performance data query template include a template name, an operation mode, and access mode. Prerequisite The performance query template is created and performance data exist in the performance database. Context You can only modify one template at a time. Steps 1. From the main menu of the client window, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. In the left pane, click the Template Management tab. 3. Expand the template node to display the template list. 4-36 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management 4. Right-click the query template you want to modify, and then select Modify Attribute from the shortcut menu. The Modify Attribute dialog box is displayed. 5. Modify the template name and/or the operation mode as needed, and click OK. The Confirm message box is displayed. 6. Click OK to save the modification. – End of Steps – 4.4.3.3 Importing a Query Template This procedure describes how import a query template from an *.xml file. Prerequisite The *.xml file containing the query template information is available on the local client. Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. In the left pane, click the Template Management tab. 3. In the Template Management tree, right-click the query template that you want to import, and then select Import from the shortcut menu. The Import Template dialog box is displayed. 4. Select the file to be imported, and then click Open. 5. Enter the template name, select the operation mode, and then click OK. Note: The import template name cannot be empty, and should not be the same as other self-defined template names. When a query template is imported, the indices and counters under it will also be imported. – End of Steps – 4.4.3.4 Exporting a Query Template This procedure describes how export an existing query template to an *.xml file on the local client. Prerequisite The query template that you want to export is available in the system. 4-37 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. In the left pane, click the Template Management tab. 3. In the Template Management tree, right-click the query template that you want to export, and then select Export from the shortcut menu. The Export Template dialog box is displayed. 4. Select the path for saving the template, enter the file name, and then click Save. A message box is displayed. 5. Click OK. The query template is exported to a *.xml file in the specified path. – End of Steps – 4.4.3.5 Deleting a Query Template This procedure describes how to delete an unnecessary query template. Prerequisite The performance measurement task is created. Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. In the left pane, click the Template Management tab, and then expand the Template Management node to show all query templates in the system. 3. Right-click the query template you want to delete, and then click Delete from the shortcut menu. The Confirm message box is displayed. 4. Click OK. The query template is deleted. – End of Steps – 4.4.4 Template Task Operations 4.4.4.1 Creating a Query Template Task This procedure describes how to create a performance query task based on a query template. Prerequisite The query template that you want to use for the template task is available in the system. 4-38 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. Click on the toolbar. The Add Query Template Task dialog box is displayed. 3. Set the task name, template name, start & end time, task status, file type, and task execution plan. Note: The File Type refers to the file type generated after the task is completed. 4. Click OK. – End of Steps – Result l l l l The newly-created query template task is displayed on the Template Task Management tab. After the query template task is run every time, the system generates a query result file on the server, and the execution result file information, including file name and task execution time, is displayed in the file column on the bottom of the window. To copy the result file from the server to the local client, select the result file, and then click on the toolbar. The Save dialog box is displayed. Select the path for saving the result file on the local client, enter the file name, and then click the Save button. A result file is generated when the task is performed every time. Time stamps are used to distinguish query result files. Click on the toolbar to perform the template task again. 4.4.4.2 Creating a Common Template Task This procedure describes how to create a template task based on a common template. Prerequisite l l You have the authority of template task management. The common template you want to use for the template task is available in the system. Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. Click on the toolbar. The Add Common Template Task dialog box is displayed. 4-39 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3. Set the task name, template name, start & end time, task status, file type, and task execution plan. Note: You can select multiple common templates for a template task. 4. Click the Location Information tab. 5. Set the location group, wildcard level, NE location, and MO location, and then click Save. Note: When multiple common templates are used in this template task, you need to set the location information for all templates listed in the left pane. 6. Click the Time Information tab. 7. Set the query granularity, effective data, and effective time. 8. Click OK to complete the creation of a common template task. l The newly-created common template task is displayed on the Template Task tab. l The system generates a query result file and saves the file on the server every time after the common template task is run. For details, refer to 4.4.4.1 Creating a Query Template Task. – End of Steps – 4.4.4.3 Modifying a Template Task This procedure describes how to modify the name and execution policies of a suspended template task. Prerequisite The template task you want to modify is suspended. Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. In the template task pane on the Template Management tab, select a template task to be modified. 4-40 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management 3. Perform one of the following operations to open the Modify Query Template dialog box. l Click on the toolbar. l Right-click the template task you want to modify, and then select Modify Template from the shortcut menu. 4. In the Modify Query Template dialog box, modify the information of the template task, including the task name, template name, execution period, file type, and execution schedule. 5. Click OK to save the modification. – End of Steps – 4.4.4.4 Viewing a Template Task This procedure describes how to view the information of a template task. Prerequisite You have created a template task. Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. Select a template from the left Template Management tree to display all the template tasks under this template. 3. Perform one of the following operations to open the View Query Template dialog box: l Double-click the template task. l l on the toolbar. Select the template task, and then click Right-click the template task, and then select View Template from the shortcut menu. 4. After viewing the information of the template task, click OK to close the View Template Task box. – End of Steps – 4.4.4.5 Deleting a Template Task This procedure describes how to delete an unnecessary template task. Prerequisite The template task you want to delete is suspended. Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 4-41 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2. In the template task pane on the Template Management tab, select a template task to be deleted. 3. To delete the template task, perform one of the following operations. l l Click on the toolbar. Right-click the template task, and then click Delete Template from the shortcut menu. Note: To delete multiple template tasks at a time, press and hold Ctrl and then click the tasks one by one. After selecting all those tasks, click on the toolbar. 4. In the Confirm message box, click OK. – End of Steps – 4.4.4.6 Activating a Template Task If the data performance of the NE is collected according to the rule of the suspended template, this task should be activated. Prerequisite The template task you want to activate is suspended. Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. To activate the template task, perform one of the following operations. l l Click on the toolbar. Right-click the template task, and then select Activate Template Task from the shortcut menu. – End of Steps – Result The status of the template task changes from into . 4.4.4.7 Suspending a Template Task When a template task is suspended status, the system stops data collection. When the collection period of the task expires, the system does not collect the performance data of the target NEs. 4-42 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Prerequisite The template task is created and in activating status. Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. To suspend the template task, perform one of the following operations. l l Click on the toolbar. Right-click the template task, and then click Suspend Template from the shortcut menu. – End of Steps – Result The status of the template task changes from into . 4.4.4.8 Completing a Template Task You can forcibly complete a template task before the preset end time of the task. Prerequisite l l The template is created. The template task is activated or suspended. Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. Perform one of the following operations to open the Finish Template dialog box. l l Click on the toolbar. Right-click the template task, and then click Finish Template from the shortcut menu. 3. In the Confirm message box, click OK. – End of Steps – 4.4.4.9 Refreshing Template Tasks You can get the latest information of template tasks by refreshing the task list on your client. Prerequisite You have the authority of template task management. 4-43 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. From the main menu, select Performance > Template Task Management. The Template Task Management tab is displayed. 2. Perform one of the following operations to refresh the template task. l l Click on the toolbar. Right-click the template task, and then click Refresh from the shortcut menu. – End of Steps – 4.4.5 Common Template Management The U31 R22 provides common templates that predefine NE types, measure object (MO) types, and performance objects (POs). You can use a common template to query performance data according to the predefined query conditions after selecting the NE location and MO location. The system also allows you to customize common templates in accordance with the actual requirements for performance data query. 4.4.5.1 Introduction to Common Template Management To open the Common Template tab in the client window, perform either of the following operations: l l Select Performance > Query Template Management from the main menu. Select Statistics > Performance Statistics > Query Template Management from the main menu. The Template Management tab is displayed, see Figure 4-7. Figure 4-7 Template Management Tab 4-44 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Table 4-13 describes the functions of the buttons on the toolbar of the Common Template tab. Table 4-13 Functions of Buttons on the Toolbar of Common Template Tab Button Function Create a common template. Modify a common template. View the information of a common template. Delete common template(s). Use a common template to query performance data. Refresh the common template list. Export all templates or a selected common template a file. Import common template(s) from a file. Select an NE type to show all the common templates of this NE type. For the function of searching. Customize the columns to be displayed. Select the filtering range. 4.4.5.2 Creating a Common Template This procedure describes how to create a common template for later performance data query. Steps 1. From the main menu, select Performance > Query Template Management. The Template Management tab is displayed. 2. On the toolbar, click . The Add Common Template dialog box is displayed. 3. Configure the parameters. Parameter Description Name Enter the template name Description Enter additional information of the template Access type Classified into three modes: share, private, and public. 4-45 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Description Query type l Common query: Select available indices/counters to set access type and statistic information including location group, query granularity, and effective time. l Current query: Select available indices/counters to query corresponding performance parameters. Available in- Set the NE type, MO type, and performance counter indexes for the template. dices/coun- The selected counters are displayed in the Selected indices/counters area. ters 4. (Optional) For the Common query type, set the logic condition. a. Click Logic. The Logic Filtering/Rendering dialog box is displayed. b. Configure the filter type. In the Logic Filtering/Rendering dialog box, you can set the filtering and rendering rules based on logical operation for each index or counter as needed. The system will filter and render the query result in accordance with the rules, including And or Or. l l c. If And is selected, the system displays the query result only when the result of logic operation set for each index or counter in the list is true. If Or is selected, the system displays the query result as long as the result of logic operation set for one index or counter in the list is true. Select an index or a counter as needed, and define the filter conditions by setting filter operation methods and filter values. d. In the Rendering column, click the index/counter you need. The Threshold Rendering dialog box is displayed. e. Set threshold values and rendering colors for each threshold. f. Click OK to close the Threshold Rendering dialog box. g. Click OK to close the Logic Filtering/Rendering dialog box. 5. (Optional) For the Common query type, set the TopN condition. a. Click TopN. The TOPN Filtering/Rendering dialog box is displayed. b. Set filtering conditions. Use an index or counter "Top Max N" as an example, and assume N = 1. l l No group: The system queries all the records, and then returns the maximum record (if there are several records in the first place, the system only returns the first record. No group is generally used for analyzing the maximum or minimum values of all performance data. Group by time: The system queries all the records, and displays the record of the maximum values in the query result of each hour. It is generally used for analyzing the best or worst object at specific time point during a period. 4-46 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management l c. Group by location: To group in accordance with the performance object, the system queries all the records, and then returns the maximum record of each record. This type is generally used for analyzing the performance of each object at the best time or worst time during a period. Select an index or a counter as needed, and define the filter conditions by setting filter operation methods and filter values. d. In the Rendering column, click the index/counter you need. The Threshold Rendering dialog box is displayed. e. Set threshold values and rendering colors for each threshold. f. Click OK to close the Threshold Rendering dialog box. g. Click OK to close the TOPN Filtering/Rendering dialog box. 6. click OK to complete creating the common template. – End of Steps – Related Tasks l Viewing a Common Template Right-click the template, and then click View Template from the shortcut menu, or on the toolbar, click l . Refreshing Common Templates Right-click any common template, and then click Refresh from the shortcut menu, or on the toolbar, click l . Deleting a Common Template Right-click the template, and then click Delete Template from the shortcut menu, or on the toolbar, click . 4.4.5.3 Modifying a Common Template This procedure describes how to modify a common template. You can modify user-defined common templates but not modify system-defined common templates. Steps 1. From the main menu, select Performance > Template Management. The Template Management tab is displayed. 2. Select a common template, and perform one of the following operations to open the Modify Common Template dialog box. l Right-click the template, and then click Modify Template from the shortcut menu. l On the toolbar, click . 3. Modify the settings of the template as needed. 4-47 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 4. Click OK. – End of Steps – 4.4.5.4 Viewing a Common Template This procedure describes how to view a common template. Steps 1. From the main menu, select Performance > Template Management. The Template Management tab is displayed. 2. Select a common template, and perform one of the following operations to open the View Common Template dialog box. l Right-click the template, and then click View Template from the shortcut menu. l On the toolbar, click . 3. View the parameter settings of the template. – End of Steps – 4.4.5.5 Deleting a Common Template This procedure describes how to delete an unnecessary common template. You can delete user-defined common templates but not delete system-defined common templates. Steps 1. From the main menu, select Performance > Template Management. The Template Management tab is displayed. 2. Select a common template, and perform one of the following operations to open the Delete Template dialog box. l Right-click the template, and then click Delete Template from the shortcut menu. l On the toolbar, click . 3. Click OK. – End of Steps – 4.4.5.6 Refreshing Common Templates This procedure describes how to obtain the latest information of common templates on the server. Steps 1. From the main menu, select Performance > Template Management. The Template Management tab is displayed. 2. Perform one of the following operations to refresh common templates. 4-48 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management l l Right-click any common template in the template list, and then click Refresh from the shortcut menu. On the toolbar, click . – End of Steps – 4.4.5.7 Exporting a Common Template to a File This procedure describes how to export a common template to an *.xml file on the local client. The system supports two export modes: exporting the selected template(s) or exporting all templates. Steps 1. From the main menu, select Performance > Query Template Management. The Template Management tab is displayed. 2. Perform the following operations as required. To... Do... Export the selected template Right-click a common template to be exported, and select Export Selected Template(s) from the shortcut menu. The Export Template dialog box is displayed. Export all templates Right-click any common template, and select Export All Templates from the shortcut menu. The Export Template dialog box is displayed. Note: You can also perform the following operation to open the Export Template dialog box: Select a common template to be exported, and click the drop-down button on the toolbar to select Export Selected Template(s) or Export All Templates from the list. 3. Set the path for saving the common template and the file name. 4. Click Save. A message box is displayed. 5. Click OK. The common template is exported to an *.xml file under the specified path. – End of Steps – 4.4.5.8 Importing a Common Template from a File This procedure describes how to import a common template to an *.xml file on the local client. 4-49 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Prerequisite The file containing the information of the common template you want to import is available on the local client. Steps 1. From the main menu, select Performance > Query Template Management. The Template Management tab is displayed. 2. Perform one of the following operations to open the Import Template dialog box. l l On the toolbar, click . Right-click any common template, and select Import Template from the shortcut menu. 3. Find the file to be imported, and click Open. The Import Common Template dialog box is displayed. Note: The template number and name cannot be duplicated with the number and the name of the common template in the system. 4. Select the template you want to import, and click OK. The imported common template is displayed in the Common Template list. – End of Steps – 4.5 Performance Data Query 4.5.1 Performance Query Performances can be queried on the EMS in the following ways: l l l l l Query Query Query Query Query in in in in in the the the the the topology view. main menu. service view. rack diagram. resource view. 4.5.1.1 Querying Performances in the Topology View This procedure describes how to query the current and history performances of an NE through a shortcut menu in the Topology Management window. 4-50 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Prerequisite l l l You have the operation authority of performance management. The performance measurement task is created, and the performance data exists in the performance database. The link is created on the NE whose performance requires to be queried. Steps l Query the current performance of the NE. In the Topology Management window, select one or multiple NEs, and then select Performance Management > Current Performance Data Query. The Add Current Performance Data Query dialog box is displayed. The performances queried are displayed in the Current Performance Data Query window. By default, the current performance data of 15 minute granularity is queried. l Query the history performance of the NE. 1. In the Topology Management window, select one or multiple NEs or links, and then select Performance Management > History Performance Data Query. The History Performance Data Query dialog box is displayed. 2. On the Index/Counter Selection tab. Set the related parameters. description of the parameters, refer to Table 4-14. For a Table 4-14 Parameter Descriptions for Counter Selection Parameter Description Common template Selects the system common template or user-defined common template. In addition, the template may not be selected. MO type Uses the default value "checkpoint". Available When Common template is not selected, the user can expand each indices/counters node and select the performance items to be queried. Selected The performance items selected from Counters are displayed in the indices/counters area. 3. On the Object Selection tab. Set the related parameters. For a description of the parameters, refer to Table 4-15. Table 4-15 Parameter Descriptions for Object Selection Parameter Description Location group Selects the location group, for example, Query raw data. Wildcard level Selects the wildcard level, for example, Board. 4-51 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Description NE location(s) From the EMS Server navigation tree, select the NE to be queried. If Wildcard level is set to All or NE, this parameter does not need to be set. MO location(s) Select the corresponding measurement object. For example, if Wildcard level is set to Board, select the corresponding board from the MO navigation tree. If Wildcard level is set to All or NE, this parameter does not need to be set. 4. On the Time Selection tab. Set the related parameters. For a description of the parameters, refer to Table 4-16. Table 4-16 Parameter Descriptions for Time Selection Parameter Description Query granularity The period that the system performs the performance data query. Time settings The time period when the system queries the performance data. Effective date The system only queries the performance data on the effective date. Effective time The system only queries the performance data in the effective time period. 5. Click OK. The performances queried are displayed in the History Performance Data Query window. – End of Steps – 4.5.1.2 Querying Performances in the Main Menu A user can query the NE performance in the main menu in five ways. For the ways of querying performances in the main menu, refer to Table 4-17. Table 4-17 Ways of Querying Performances in the Main Menu Menu Description Performance > Realtime Monitors the realtime performance of boards, ports, tunnels, PWs, Traffic Management > CIPs, and L3 VPNs. Realtime Traffic Monitoring Performance > Current Queries the current performance of the NE. Performance Data Query 4-52 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Menu Description Performance > History Queries the historical performance of the NE. Performance Data Query Performance > l Straight-through Queries the performance values on the equipment in a period directly (that is, history performance values on the equipment Performance Data Query side). l The difference between the straight-through performance and history performance data is that the straight-through performance is saved on the equipment side but the history performance data is saved on the EMS. l The straight-through performances can be queried only through the menu. Performance > Query Queries the performances through the common template or Template Management user-defined template. Performance > Archive Displays archived data in various forms based on the specified query Query conditions. Prerequisite l l The user has the operation authority of performance management. The performance measurement task is created, and the performance data exists in the performance database. Steps l Monitor real-time performance. 1. In the operation window of the U31 R22, select Performance > Realtime Traffic Management > Realtime Traffic Monitoring. The Realtime Traffic Monitoring window is displayed. 2. Set NE, Mo Type, and Mo DN as required. 3. In the Start Settings area, click the Immediately or Delay option button. 4. Set the sample period. 5. In the Stop Settings area, click the Set Sample times or Set Stop time option button. 6. Click Start. l Query the current performance. 1. In the operation window of the U31 R22, select Performance > Current Performance Data Query. The Add Current Performance Data Query dialog box is displayed. 4-53 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2. Set the query parameters in the Counter Selection and Location Selection tabs. The way to set parameters in the main menu is the same as that in the topology view. 3. On the Counter Selection tab, set the related parameters. For a description of the parameters, refer to Table 4-18. Table 4-18 Parameter Descriptions for Counter Selection Parameter Common template Description Selects the system common template or user-defined common template. Or, the template may not be selected. MO type Uses the default checkpoint. Counters If Common template is not selected, you can expand each node in the Counters navigation tree and select the performance items to be queried. Selected counters The performance items selected from the Counters navigation tree are displayed in the area. 4. On the Location Selection tab. Set the related parameters. For a description of the parameters, refer to Table 4-19. Table 4-19 Parameter Descriptions for Location Selection Parameter Description Wildcard level Selects the wildcard level, for example, Board. NE location(s) From the EMS Server navigation tree, select the NE to be queried. If Wildcard level is set to All or NE, this parameter does not need to be set. MO location(s) Select the corresponding measurement object. For example, if Wildcard level is set to Board, select the corresponding board from the MO navigation tree. If Wildcard level is set to All or NE, this parameter does not need to be set. 5. Click OK. The performance queried is displayed in the Current Performance Data Query window. 4-54 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Note: After the query conditions are set, you can click Save as Query Template and Save as Common Template to save the conditions into a query template and a common template respectively. l Query the history performance. 1. In the main menu, select Performance > History Performance Data Query. The History Performance Data Query dialog box is displayed. Note: In addition, the user can click Data Query dialog box. on the toolbar to open the History Performance 2. In the Index/Counter Selection, Object Selection, and Time Selection tabs, set query parameters. The way to set parameters in the main menu is the same as that in the topology view. 3. Click OK. The performance queried is displayed in the History Performance Data Query window. Note: After the query conditions are set, you can click Save as Query Template and Save as Common Template to save the conditions into a query template and a common template respectively. l Query the equipment straight-through performance. 1. In the main menu, select Performance > Straight-through Performance Data Query. The Add Straight-through Performance Data Query dialog box is displayed. 2. Click the Counter Selection tab, see Figure 4-8. To set query parameters, refer to Table 4-20. Table 4-20 Descriptions for Parameters in the Counter Selection Tab Parameter Description NE type Selects the NE type to be queried in the drop-down list. 4-55 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Description MO type Uses the default value "checkpoint". Granularity The granularity that the system collects the data. The options include "15 minutes" and "24 hours". Time settings Sets the time period that the straight-through performance is queried. Counters Expands each node and selects the performance items to be queried. Selected counters The performance items selected from Counters are displayed in the area, for example, CPU utilization. Figure 4-8 Counter Selection Tab 3. Click the Location Selection tab. To set related parameters, refer to Table 4-21. 4-56 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Table 4-21 Descriptions for Parameters in the Location Selection Tab Parameter Description Wildcard level Sets the range of the measurement object. NE location(s) Sets the NE location where the measurement object is located. When the user selects All or NE from Wildcard level, it is not necessary to set this parameter. MO location(s) Select the corresponding measurement object. When the user selects All or NE from Wildcard level, it is not necessary to set this parameter. 4. Click OK. The straight-through performances queried are displayed in the Straight-through Performance Data Query window. l Query the performance based on the template. 1. In the main menu, select Performance > Query Template Management. The Template Management window is displayed. 2. Select the template type in the template management navigation tree on the left. All templates of this type are displayed on the right of the window, see Figure 4-9. Figure 4-9 Template Management Window 3. Right-click a template, and then select Query by Template from the shortcut menu, or click on the toolbar. The Add Current Performance Data Query dialog box is displayed. Note: In the Add Current Performance Data Query dialog box, parameters in the Counter Selection tab are preset in the template. These parameters can be modified by the user before the query. Parameters in the Location Selection need to be set here. 4. Click the Location Selection tab, and then set the related parameters. 4-57 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 5. Click OK. The performances queried according to the template are displayed in the Current Performance Data Query window. l Query archived data. 1. In the main menu, select Performance > Archive Query. The Archive Query dialog box is displayed. 2. On the Index/Counter Selection tab, set the parameters. For a description of the parameters, refer to Table 4-22. Table 4-22 Parameter Descriptions for Querying Archived Data Parameter Description NE type Select the desired NE types from the drop-down list. MO type Use the default value (checkpoint). Available indices/counters Expand the nodes and select the performance items that you want to query. Selected indices/counters Displays the selected indices or counters, for example, the number of ETC frames lost. 3. Click the Object Selection tab. Set the parameters. For a description of the parameters, refer to Table 4-23. Table 4-23 Object Selection Parameter Descriptions Parameter Description Location group Select Query raw data, Group by all NEs, or Group by NE. Wildcard level Select All, NE, or Ethernet Port. NE location(s) selected Expand the nodes to select the desired NE locations. MO location(s) selected Displays the selected NE locations. 4. Click the Time Selection tab. Set the parameters. For a description of the parameters, refer to Table 4-24. Table 4-24 Time Selection Parameter Descriptions Parameter Description Query Granularity Select fifteen minutes or one day. Time settings Set the query period as required. You can directly select a day, a week, a month or a holiday. You can also customize a period. Effective date Select the effective dates. 4-58 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Parameter Description Effective time Set a start time and an end time to specify a effective period, and then you can add this period. You can also delete an existing period. 5. Click OK. Note: After the query conditions are set, you can click Save as Query Template and Save as Common Template to save the conditions into a query template and a common template respectively. – End of Steps – 4.5.1.3 Querying Performances in the Service View This procedure describes how to query the current performance and history performance of the service in the service view through a shortcut menu. Prerequisite l l l You have the operation authority of performance management. The performance measurement task is created, and the performance data exists in the performance database. The link is established for the NE of which the current performance needs to be queried. Steps 1. From the main menu, select Service > Service View. The Service View window is displayed. 2. Perform the following operations as required. 4-59 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To... Do... Query the current In the service list, right-click the service to be queried, and then select Query performance of the > Current Performance. The current performance corresponding to the service service is displayed in the window. Query the history i. performance of the In the service list, right-click the service to be queried, and then select Query > History Performance from the shortcut menu. The History service Performance Data Query dialog box is displayed. ii. Set parameters on the Index/Counter Selection, Object Selection, and Time Selection tabs, and then click OK. The history performance corresponding to the service is displayed in the window. Query the current In the service list, right-click the service to be queried, and then select Query performance including > Current Performance (Inc Server Layer). The current performances the service layer corresponding to the service and its server layer service are displayed in the window. Query the history i. performance including In the service list, right-click the service to be queried, and then select Query > History Performance (Inc Server Layer) from the shortcut the service layer menu. The History Performance Data Query dialog box is displayed. ii. Set parameters on the Index/Counter Selection, Object Selection, and Time Selection tabs, and then click OK. The history performances corresponding to the service and its server layer service are displayed in the window. – End of Steps – 4.5.1.4 Querying Performances in the Rack View This procedure describes how to query the current performance and history performance of a board in the rack diagram through a shortcut menu. Prerequisite l l l You have the operation authority of performance management. The performance measurement task is created, and the performance data exists in the performance database. The link is established for the NE of which the current performance needs to be queried. Steps 1. In the Topology Management window, double-click the NE to be queried. The Rack Chart window is displayed. 2. Perform the following operations as required. 4-60 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management To... Do... Query the current i. performance of the Right-click the board, and select Current Performance from the shortcut menu. The Current Performance Data Query window is NE displayed. Query the history ii. View the current performance of the board. i. Right-click the board, and select History Performance from the performance of the shortcut menu. The History Performance Data Query dialog box is NE displayed. ii. Set parameters on the Index/Counter Selection, Object Selection, and Time Selection tabs, and click OK. The Query-checkpoint window is displayed. iii. View the history performance of the board. – End of Steps – 4.5.1.5 Querying the Performance in the Resource View This procedure describes how to view the current performance and historical performance of an NE and the historical performance of a link in the resource view. Prerequisite l l l You have the operation authority of performance management. The performance measurement task is created, and the performance data exists in the performance database. The link is created on the NE whose performance requires to be queried. Steps 1. Open the BN NE Resource View window in either of the following ways. l l l On the toolbar, click the icon. The BN NE Resource View window is displayed. In the Topology Management view, select Configuration > BN-IP NE Configuration > BN NE Resource View. The BN NE Resource View window is displayed. In the Topology Management view, right-click one NE, and then select BN NE Resource View. The BN NE Resource View window is displayed. 2. Perform the following operations as required. 4-61 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To... Do... Query the current performance Right-click one NE, and then select the shortcut menu of the NE Performance Management > Current Performance Data Query. Query the history performance i. of the NE or the link Right-click one NE or one link, and then select the shortcut menu Performance Management > History Performance Data Query. The History Performance Data Query dialog box is displayed. ii. Set the Index/Counter Selection, Object Selection and Time Selection, and click OK. The performances queried are displayed in the History Performance Data Query window. – End of Steps – 4.5.2 Operations on the Query Result 4.5.2.1 Viewing the Query Result in a Chart or Table The query result of performance data is displayed in table mode by default in the Performance Management window. You can switch the display mode of performance data between table and chart. Prerequisite l l You have the authority of performance management. The performance data query result window is displayed. Context l l There are three types of chart display: bar chart, line chart, and pie chart. Chart display is available only to history performance data. Steps l Perform the following operations to display the query result in chart mode. 1. In the Query-checkpoint window, click displayed. on the toolbar. The Chart window is 2. Set the chart type, chart attribute, chart style, query object, index or counter. 3. Click the Apply button. The performance data is displayed in the chart. l To display the query result in table mode, click Table. The performance data is displayed in the list. – End of Steps – 4-62 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management 4.5.2.2 Exporting the Query Result This procedure describes how to export the query result of performance data to a specified file. Prerequisite The performance data query result window is displayed. Context The formats of exported files include txt, htm, pdf, xls, csv, prn, xlsx, and xml. A maximum of 10,000 data records can be exported to one file. If the query result has more than 100,000 data records, the data records will be exported in two or more files. Steps 1. In the Query-checkpoint window, click displayed. on the toolbar. The Save dialog box is 2. Set the path for saving the file, file name, and file type. Note: For the history performance data, you can set report title, measurement type, query time, editor, and creating time in the Save dialog box. 3. Click Save. – End of Steps – 4.5.2.3 Exporting All the Query Results This procedure describes how to export all historical data query results to a specified file. Prerequisite The performance data query result window is displayed. At least one group of performance data is queried. Context The exported files is in txt, htm, pdf, xls, csv, prn, xlsx, or xml format. Steps 1. In the Query-checkpoint window, click is displayed. on the toolbar. The Export All dialog box 4-63 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2. Set the export scope, file type for saving, and file directory. 3. Click OK. – End of Steps – 4.5.2.4 Printing the Query Result This procedure describes how to print the query result of performance data. Prerequisite l l The performance data query result window is displayed. The connection between the printer and the system is normal. Context l l Only the history performance data can be printed. The system can print 5,000 data records at most. If the query result has more than 5,000 data records, the extra data records cannot be printed. Steps 1. In the Query-checkpoint window, click box is displayed. on the toolbar. The Print Setup dialog 2. Set print parameters on the General, Page Setup, and Advance tabs as required. 3. Click Preview All to view the printing result. 4. Click the Print button. – End of Steps – 4.5.3 Performance Data Integrity Report 4.5.3.1 Overview of Performance Data Integrity Report The integrity of collected performance data is the base that ensures the accurate query, statistics, analysis and report of performance data. The U31 R22 system collects performance data according to the conditions set in measurement tasks and stores the collected performance data in its database when the managed NEs and the U31 R22 server are running properly and the communication between them is normal. When the connection between an NE and the server is interrupted, U31 R22 cannot collect the performance data of the NE, which impairs the integrity of performance data. U31 R22 provides the function of performance data integrity report. By using this function, you can check the integrity of performance data of each measurement type stored in the database and find the period(s) during the required performance data is absent. 4-64 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management If some performance data is found absent in the database, you can initiate a re-collection process to collect the performance data and store the collected data in the database. 4.5.3.2 Checking the Integrity of Performance Data This procedure describes how to check the integrity of collected performance data. Prerequisite l l You have the authority of performance management. The system has collected performance data in accordance with the measurement tasks in the system and stored the collected data in the database. Steps 1. From the main menu, select Performance > Data Integrity Query. The Add Data Integrity Query dialog box is displayed. 2. Click the Object Selection tab. 3. Select the NE type, MO type and PO you want to check. Note: Multiple POs can be selected in the PO area. 4. Click the Location Selection tab, and then select the NE(s). 5. Click the Time Selection tab, and then select Query Data Source and Time settings. 6. Click OK. – End of Steps – Result The Data Integrity Query tab is displayed to show the integrity of the selected PO. The Integrity Status column shows the data integrity of each NE. l l Have Data means that the performance data at each collection point (every 15 minutes by default) during the query period is available. No Data means that no performance data at each collection point is queried. Suppose the query period is a day. If the system succeeds to query the performance data at collection points during a period (00:00:00 to 12:00:00), but fails to query performance data at collection points during the other period (12:00:00 to 00:00:00), the integrity query result will be displayed on two rows, with the Integrity Status as Have Data and No Data respectively. 4-65 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l You can perform the operations on the data integrity result by using the toolbar buttons on the Data Integrity Query tab. 4.5.3.3 Saving the Integrity Report This procedure describes how to export and save the integrity report of performance data to the local device. Prerequisite l l You have entered the Data Integrity Query tab. You have checked the integrity of performance data and the integrity report is displayed in the client window. Context The integrity report of performance data can be saved as a *xml, *.txt, *.htm, *.pdf, *.csv, *prn, *xlsx, or *.xls file. Steps 1. On the Data Integrity Query tab, click displayed. on the toolbar. The Save dialog box is 2. Select the path for saving the query result and enter the file name. 3. Select the File Type, and then click Save. – End of Steps – 4.5.3.4 Locating the Source Board of Performance This procedure describes how to locate the source board of a current or historical performance entry. Prerequisite l l You have the authority of performance management. The performance data query result window is displayed. Steps 1. In the Current Performance Data Query or History Performance Data Query window, right-click a performance entry, and select Open Rack Chart from the shortcut menu. The Rack Chart window is displayed. The board on which this performance occurs is selected in the rack chart. – End of Steps – 4-66 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management 4.5.3.5 Locating the Source NE of Performance This procedure describes how to locate the source NE of a current or historical performance entry. Prerequisite l l You have the authority of performance management. The performance data query result window is displayed. Steps 1. In the Current Performance Data Query or History Performance Data Query window, right-click a performance entry, and select Locate Alarm to NE from the shortcut menu. The Topology Management window is displayed. The icon of the NE on which this performance occurs is selected on the topology graph. – End of Steps – 4.5.3.6 Clearing Performance Counter This procedure describes how to clear the current performance. In that case, digital performance is recollected from 0 and analog performance is set to the current values, which is convenient for recollecting the current performance. Prerequisite l l You have the authority of performance management. The performance data query result window is displayed. Context Only the current performance counter can be cleared. Steps 1. In the Current Performance Data Query window, right-click one or multiple performance entries, and select Clear Performance Counter from the shortcut menu. 2. On the toolbar, click the button to refresh the current performance of the system. – End of Steps – 4.5.4 Overview of Performance Data Integrity Report The integrity of collected performance data is the base that ensures the accurate query, statistics, analysis and report of performance data. The U31 R22 system collects performance data according to the conditions set in measurement tasks and stores the collected performance data in its database when the 4-67 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) managed NEs and the U31 R22 server are running properly and the communication between them is normal. When the connection between an NE and the server is interrupted, U31 R22 cannot collect the performance data of the NE, which impairs the integrity of performance data. U31 R22 provides the function of performance data integrity report. By using this function, you can check the integrity of performance data of each measurement type stored in the database and find the period(s) during the required performance data is absent. If some performance data is found absent in the database, you can initiate a re-collection process to collect the performance data and store the collected data in the database. 4.5.4.1 Checking the Integrity of Performance Data This procedure describes how to check the integrity of collected performance data. Prerequisite l l You have the authority of performance management. The system has collected performance data in accordance with the measurement tasks in the system and stored the collected data in the database. Steps 1. From the main menu, select Performance > Data Integrity Query. The Add Data Integrity Query dialog box is displayed. 2. Click the Object Selection tab. 3. Select the NE type, MO type and PO you want to check. Note: Multiple POs can be selected in the PO area. 4. Click the Location Selection tab, and then select the NE(s). 5. Click the Time Selection tab, and then select Query Data Source and Time settings. 6. Click OK. – End of Steps – Result The Data Integrity Query tab is displayed to show the integrity of the selected PO. The Integrity Status column shows the data integrity of each NE. l Have Data means that the performance data at each collection point (every 15 minutes by default) during the query period is available. 4-68 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management l No Data means that no performance data at each collection point is queried. Suppose the query period is a day. If the system succeeds to query the performance data at collection points during a period (00:00:00 to 12:00:00), but fails to query performance data at collection points during the other period (12:00:00 to 00:00:00), the integrity query result will be displayed on two rows, with the Integrity Status as Have Data and No Data respectively. l You can perform the operations on the data integrity result by using the toolbar buttons on the Data Integrity Query tab. 4.5.4.2 Saving the Integrity Report This procedure describes how to export and save the integrity report of performance data to the local device. Prerequisite l l You have entered the Data Integrity Query tab. You have checked the integrity of performance data and the integrity report is displayed in the client window. Context The integrity report of performance data can be saved as a *xml, *.txt, *.htm, *.pdf, *.csv, *prn, *xlsx, or *.xls file. Steps 1. On the Data Integrity Query tab, click displayed. on the toolbar. The Save dialog box is 2. Select the path for saving the query result and enter the file name. 3. Select the File Type, and then click Save. – End of Steps – 4.6 Real-Time Traffic Management 4.6.1 Setting the Display Style This procedure describes how to set the display style of data packets and bytes in real-time traffic monitoring. The display style is activated after the monitoring data panel is enabled next time. Steps 1. From the main menu, select Performance > Realtime Traffic Management > Display Style Setup. The Display Style Setup dialog box is displayed. 4-69 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2. Select the display style of data packets from the Package/Frame list, for example, packets. 3. Select the display style of bytes from the Byte list, for example, Mbps. 4. Select the unit from the Times/Num list, for example, times. 5. Click OK. A message box is displayed. – End of Steps – 4.6.2 Monitoring Real-Time Traffic This procedure describes how to monitor the real-time traffic of boards, ports, tunnels, PWs, and L3 VPN. Prerequisite l l You have the permissions to perform the operation. The monitored NEs are online. Steps 1. From the main menu, select Performance > Realtime Traffic Management > Realtime Management Monitoring. The Realtime Management Monitoring dialog box is displayed. 2. Set parameters of real-time traffic monitoring parameters. descriptions, refer to Table 4-25. For the parameter Table 4-25 Parameter Descriptions for Real-Time Traffic Monitoring Parameter Description Task Name Enter a task name. NE i. Click ii. Select an NE from the Resource list. . The Resource Selector dialog box is displayed. iii. Click OK to return to the Real Time Monitor dialog box. MO Type Select a monitored object from the drop-down list, for example, Port. MO DN i. Click ii. Select a resource from the Resource list. . The Resource Selector dialog box is displayed. iii. Click OK to return to the Real Time Monitor dialog box. When the MO type is L3VPN, you can select multiple MO DNs. Start Settings Select Immediately or Delay. Sample Period(s) Select a sampling period from the list, or select Other to set a self-defined sampling period. Range of a self-defined sampling period: 20 to 900. 4-70 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Parameter Description Stop Settings Select Manual, Set Sample times, or Set Stop time. 3. Click Start. – End of Steps – 4.6.3 Real-Time Traffic Task Management 4.6.3.1 Querying Real-Time Traffic Tasks This procedure describes how to set query conditions for querying current tasks, historical tasks, and detailed performance data collected by the tasks. Steps 1. From the main menu, select Performance > Realtime Traffic Management > Realtime Traffic Task. The Realtime Traffic Task window is displayed. This procedure uses querying current tasks as an example. 2. In the left navigation tree, select the NE on which the real-time traffic tasks are to be queried. 3. On the Current Task tab, set the task start mode, task state, monitoring object type, and start & end time in the Query Condition area. 4. Click Query. The current traffic monitoring tasks of the selected NE are displayed in the list. 5. Query the performance data. a. Select a task from the current task list. b. Click Show Monitor Data. The PM Realtime Monitor dialog box is displayed. You can view the performance data in graphics or tables. – End of Steps – 4.6.3.2 Creating Real-Time Traffic Tasks This procedure describes how to create real-time traffic tasks. Steps 1. From the main menu, select Performance > Realtime Traffic Management > Realtime Traffic Task from the menu. The Realtime Traffic Task window is displayed. 2. Click Create. The Create Monitor Task dialog box is displayed. 3. Set parameters. For the parameter descriptions, refer to Table 4-26. 4-71 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Table 4-26 Parameter Descriptions for Real-Time Monitoring Tasks Parameter Setting Description Task Name Enter a task name. Range: 1 to 30 characters. Task Type Select a task type, for example, Single The two task types are described as me task. follows: l A single NE task can monitor ports, tunnels, PWs, or L3 VPNs of an NE. l An E2E task can monitor the traffic of tunnels or PWs between NEs. NE i. Click . The Resource Selec- l task, you need to configure this tor dialog box is displayed. ii. Select an NE from the Resource list. If the Task Type is Single me parameter. l If the Task Type is E2E task, you do not need to configure this iii. Click Ok to return to the Create parameter. Monitor Task dialog box. Mo Type Select a monitored object from the – drop-down list, for example, Port. Mo DN i. Click . The Resource Selec- tor dialog box is displayed. ii. If the Mo type is L3VPN, you can select multiple Mo DNs. Select a resource from the Resource list. iii. Click Ok to return to the Create Monitor Task dialog box. Start Settings Select Immediately or Delay. – Sample Select a sampling period from the list, Range of a self-defined sampling Period(s) or select Other to set a self-defined period: 20 to 900. sampling period. Stop Settings Select Manual, Set Sample times, or – Set Stop time. 4. Click OK. A message box is displayed. 5. Click OK. – End of Steps – 4.6.3.3 Modifying a Real-Time Traffic Task This procedure describes how to modify the name of a real-time traffic task. 4-72 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Steps 1. From the main menu, select Performance > Realtime Traffic Management > Realtime Traffic Task from the menu. The Realtime Traffic Task window is displayed. 2. In the left navigation tree, select the NE on which the real-time traffic task is to be modified. 3. Click Query. The current traffic monitoring tasks of the selected NE are displayed in the list. 4. Select the task to be modified, and then click Modify. The Modify PM Realtime Monitor Task dialog box is displayed. 5. Modify the task name. 6. Click OK. A message box is displayed. 7. Click OK. – End of Steps – 4.6.3.4 Stopping a Real-Time Traffic Task Manually This procedure describes how to manually stop a real-time traffic monitoring task. Steps 1. From the main menu, select Performance > Realtime Traffic Management > Realtime Traffic Task. The Realtime Traffic Task window is displayed. 2. In the left navigation tree, select the NE on which the real-time traffic task is to be stopped. 3. Click Query. The current traffic monitoring tasks of the selected NE are displayed in the list. 4. Select the task to be stopped, and then click Stop & End Monitoring. The Confirm message box is displayed. 5. Click Yes. A message box is displayed. 6. Click OK. The stopped task is displayed on the History Task tab. – End of Steps – 4.6.3.5 Deleting a Real-Time Traffic Task This procedure describes how to delete a stopped real-time traffic monitoring task. Prerequisite The real-time traffic monitoring task is stopped. 4-73 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. From the main menu, select Performance > Realtime Traffic Management > Realtime Traffic Task from the menu. The Realtime Traffic Task window is displayed. 2. Click the History Task tab. 3. In the left navigation tree, select the NE on which the real-time traffic task is to be deleted. 4. Click Query. The historical traffic monitoring tasks of the selected NE are displayed in the list. 5. Select the task to be deleted, and then click Delete. The Confirm message box is displayed. 6. Click Yes. A message box is displayed. 7. Click OK. – End of Steps – 4.7 Counter and Index Management 4.7.1 Introduction to Counter and Index Management The management objects of a performance threshold task (also called threshold task) are counters and/or indexes. You can define a threshold task for monitoring specific index(es). To define an index, you need to specify its name, formula and type. Performance indexes can be classified into the following four types in accordance with their importance and usage. l Key Performance Index (KPI) A KPI is an index that indicates a key performance of a network. The purpose of a threshold task is to monitor one or more KPIs. When the system detects that the value of a KPI exceeds the threshold range specified in the task, a threshold crossing alarm is raised. Threshold crossing alarms are classified into four levels by severity: critical, major, minor and warning. All KPI threshold crossing alarms have the same alarm code. l Performance Index (PI) A PI is a common index that indicates a network performance. A PI is for a single object measured. l Statistical Performance Index (SPI) An SPI is the count of a measure object based on a specific statistic rule. AN SPI is for a type of measured objects. A statistic rule is a logic expression, for example, call completion ratio ≥ 95%. l User-defined Performance Index 4-74 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management You can also define and manage performance index in accordance with the actual requirements in the system. If a customized index is not used any longer, you can modify or delete the formula of the index. l l Note: The default indexes provided by the system cannot be modified or deleted. The value of each counter in a KPI formula comes from basic measured data. KPIs can be used in the following scenarios: l Creation of Threshold Task Only KPIs are used in threshold tasks. If a KPI is used in a threshold task, the system determines whether to raise a threshold crossing alarm after comparing the KPI value with the preset thresholds in accordance with the threshold task. The threshold crossing alarms that are triggered by different KPIs have the same alarm code but different details. l Query of KPI Value On request of querying the value of a KPI, the system calculates the value in accordance with the KPI formula and displays the calculation result on the client interface. The system can also query corresponding counters from the database to calculate the history value of a KPI. It displays the calculation result of the history KPI value, which reflects the variation of the KPI during a period. l Generation of KPI Report The system provides several report templates based on KPI formulas for generating KPI reports. You can know the operation status of the network by checking the value variation of KPIs in busy hours from the KPI reports generated based on these templates, which reflect the operation status of the network. 4.7.2 Counter Management 4.7.2.1 Viewing the Counter Types of a Measurement Object The counter is located under the performance counter sub-note of each measurement object. This procedure describes how to view the counter types of a measurement object. Prerequisite l l You have the authority of counter management. You have completed the configuration of the NE that you want to query. 4-75 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. From the main menu, select Performance > Counter and Index Management. The Counter and Index Management tab is displayed. 2. Expand the Resource Type tree in the Model Management pane to find the measure object you want to view. 3. Expand the measure object node and then click Counter to show the counter types of the measure object on the Counter and Index Management tab. – End of Steps – 4.7.2.2 Viewing the Counters of a Type This procedure describes how to view the counters involved in a specific counter type. Prerequisite l l You have the authority of counter management. You have completed the data configuration of the NE you want to view. Steps 1. From the main menu, select Performance > Counter and Index Management. The Counter and Index Management tab is displayed. 2. Expand the Resource Type tree in the Model Management pane to find the measure object you want to view. 3. Expand the measure object node, and then perform one of the following operations to show all counters of a counter type on the Counter and Index Management tab. l l Click before the Counter node under the measure object, and then click the counter type you want to view. Click the Counter node, and then double-click the counter type displayed on the Counter And Index Management tab. Note: To show all counters of the measure object, right-click the measure object node or the Counter node, and then click Show Counter from the shortcut menu. – End of Steps – 4-76 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management 4.7.3 Index Management 4.7.3.1 Creating an Index Besides the predefined indexes provided by the system, the U31 R22 supports user-defined indexes, which can also be used in threshold tasks. Steps 1. From the main menu, select Performance > Counter and Index Management. The Counter and Index Management tab is displayed. 2. Expand the Resource Type tree in the Model Management pane to find the object you want to measure. 3. Click before the measure object node, and then select the index node (This procedure uses key performance as an example). on the toolbar. The New Index dialog box is displayed. 4. Click Note: To open the New Index dialog box, you can also right-click the Key PI node, and then click New Index from the shortcut menu. 5. Click the Basic Information tab, and set the parameters. Parameter Description Name Enter a character string consisting of 1 to 300 characters as the index name, which must be different from the name of any existing index in the system. Description Keep this text box blank if no other information is needed. NE type Select the NE type. MO type Select the MO type. Display format Select the format of the index value from the Display Format drop-down list box in accordance with the type of the index you want to create: "Integer", "Float", "Percent" or "Boolean (1/0)". The following introduces the constraint relationship between index type and value format. l For KPI, the value format can be "Integer", "Float", "Percent" or "Boolean (1/0)". l For PI, the value type can be "Integer", "Float", or "Percent". l For SPI, the value type can only be "Boolean (1/0)". 4-77 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Description Format The index value type has a constraint relationship with the index type selected in step 3: l For KPI, the value format can be "Integer", "Float", "Percent" or "Boolean (1/0)". l For PI, the value type can be "Integer", "Float", or "Percent". l For SPI, the value type can only be "Boolean (1/0)". Special string (blank) Select special string. Index value Enter the exception value of the index, which is the calculation result when the denominator of the index formula is zero. 6. Click the Index Formula tab, and then edit the formula in accordance with the counter and operators. A formula can be displayed in name style or ID style. You can view counter names and IDs. For example, packet loss ratio = Loss packets / Total packets, where the number of packets lost and the total number of packets are counters. Note: The following describes the meanings of four special keys on the on-screen keyboard: l l l l C followed with a number indicates a counter. Gr indicates the collection granularity. P followed with a number indicates a performance index. NO indicates the number of measure objects. In the Editor formula area, the formula is displayed in two styles: name style and ID style. 7. Click the Preset Threshold tab, and set the parameters. Parameter Description Up The larger the value the more serious the alarm level Down The smaller the value the more serious the alarm level Up and Down The "Up and Down" direction means that the index follows the alarm threshold rules in both "Up" and "Down" directions. For example, the environment temperature and the rotate speed of fans must be within a proper range, which cannot be too high or too low. 4-78 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Parameter Description Critical Critical alarms are generated when the performance indices exceed Major the critical value. When the performance indices are lower than the critical value, alarms are removed. Minor Warning When the direction is "Up", set the thresholds based on the following constraints: l Warning alarm threshold < Minor alarm threshold - Delta l Minor alarm threshold < Major alarm threshold - Delta l Major alarm threshold < Critical alarm threshold - Delta When the direction is "Down", set the thresholds based on the following constraints: l Warning alarm threshold > Minor alarm threshold + Delta l Minor alarm threshold > Major alarm threshold + Delta l Major alarm threshold > Critical alarm threshold + Delta The unit of alarm thresholds is related to the unit of the measurement items. Delta A performance threshold consists of a threshold value and a delta (that is, a hysteresis value). The purpose of a delta is to avoid frequent switching between alarm generation and disappearance. A performance threshold with a delta actually provides two thresholds: a higher threshold and a lower threshold. For example, suppose the threshold for critical alarm is 30% and corresponding delta is 2%. Then the higher threshold for critical alarm of the performance index is 32%; while the lower threshold is 28%. If the delta of a threshold is 0, we can consider that the higher threshold and the lower threshold are equal. 8. Click OK to finish the configuration. Note: The system judges the validity of the index formula. If the index formula is invalid, a message will pop up to prompt the error. If the index formula is valid, the system prompts the successful creation of the index and allocates a unique ID to the index. The new index is displayed in corresponding index list – End of Steps – 4.7.3.2 Modifying an Index This procedure describes how to modify an index. 4-79 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Prerequisite l l You have the authority of index management. The index you want to modify is a user-defined index. Context l l l The default performance indexes provided by the system cannot be modified. Only one index can be modified at a time. The MO type, NE type and index value format of user-defined indexes cannot be modified. Steps 1. From the main menu, select Performance > Counter And Index Management. The Counter And Index Management tab is displayed. 2. Perform one of the following operations to open the Modify Index dialog box: l Right-click the index to be modified, and then click Modify Index from the shortcut menu. on the toolbar. l Click the index to be modified, and then click 3. In the Modify Index dialog box, modify the information as needed. Note: For the description of the parameters in the dialog box, refer to 4.7.3.1 Creating an Index. 4. Click OK in the Modify Index dialog box to confirm the modification. A message box indicating modification success is displayed. 5. Click OK to complete the modification. – End of Steps – 4.7.3.3 Viewing an Index This procedure describes how to view the details of an index. Prerequisite l l You have the authority of index management. The index you want to view is a user-defined index Steps 1. From the main menu, select Performance > Counter and Index Management. The Counter And Index Management tab is displayed. 4-80 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management 2. Expand the Resource Type tree in the Model Management pane to find the measure object. 3. In the text box, enter key words to find the target index. 4. After finding the target index you want to view, perform one of the following operations to open the View Index box. l Right-click the target index and then click View Index from the shortcut menu. l l Select the target index, and then click Right-click the target index. on the toolbar. – End of Steps – 4.7.3.4 Deleting an Index This procedure describes how to manually delete the performance indexes which are no longer used. Prerequisite l l You have the authority of index management. The index you want to delete is a user-defined index. Context You can forcibly delete multiple indexes at the same time. Steps 1. From the main menu, select Performance > Counter and Index Management. The Counter and Index Management tab is displayed. 2. In the index list, find the user-defined index you want to delete, and then perform one of the following operations: l Right-click one or multiple target indexes (or press the Ctrl key), and then select Delete index from the shortcut menu. l Select one or multiple target indexes, and then click on the toolbar. 3. In the Confirm message box, click OK. – End of Steps – 4.7.3.5 Moving an Index In the U31 R22 system, you can create different index groups for the effective management of user-defined indexes. Only user-defined indexes can be moved from an index group to another index group. Prerequisite l You have the authority of index management. 4-81 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l The index you want to move is a user-defined index. Steps 1. From the main menu, select Performance > Counter and Index Management. The Counter and Index Management tab is displayed. 2. In the index list, perform one of the following operations to open the Move Index dialog box. l Right-click one or multiple indexes, and then click Move Index from the shortcut menu. on the toolbar. l Click one or multiple indexes, and then click 3. In the Move Index dialog box, select the group to which you want to move the index, and then click OK. A message box is displayed, indicating that the index is successfully moved. 4. Click OK. – End of Steps – 4.7.3.6 Exporting Indexes to a File This procedure describes how to export specific indexes in the system to an *.xml file. All indexes or selected indexes can be exported. Prerequisite l l You have the authority of index management. The index you want to export is a user-defined index. Steps 1. From the main menu, select Performance > Counter and Index Management. The Counter and Index Management tab is displayed. 2. Perform the following operations as required. To... Export all indexes Do... On the toolbar, click the drop-down button, and select Export Indexes of All Rows. The Save dialog box is displayed. Export the selected i. From the index list, select one or multiple indexes to be exported. ii. On the toolbar, click the indexes drop-down button, and select Export Indexes of Selected Rows. The Save dialog box is displayed. 3. In the Save dialog box, set the path for saving the index file and file name. 4. Click the Save button. A message box is displayed, indicating that the indexes are successfully exported. 4-82 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management 5. Click OK. – End of Steps – 4.7.3.7 Importing Indexes from a File This procedure describes how to import predefined indexes from an *.xml file to the system. Prerequisite l l You have the authority of index management. The .xml file containing the information of the indexes you want to import is available on the local client. Steps 1. From the main menu, select Performance > Counter and Index Management. The Counter and Index Management tab is displayed. 2. Perform one of the following operations to open the Import Index dialog box: l Right-click any index, and select Index Export from the shortcut menu. l Click on the toolbar. 3. In the Import Index dialog box, select the index file (*.xml). 4. click the Open button to select the index(es) to be imported in the Index Export dialog box. 5. Click the Import button. A message box is displayed, indicating that the indexes are imported successfully. Note: If Overwrite is selected in the Index ID conflict options area, a newly imported index will forcibly overwrite an existing index with the same name. If the name of an index to be imported is same as that of an existing index in the system, the index will fail to be exported by default. If Append is selected, a new index will be assigned a new ID. The name of a new index cannot be the same as any existing index name, but the content of the new index can be the same as that of an existing one. t – End of Steps – 4.7.3.8 Refreshing Indexes Multiple users can manage indexes in the U31 R22 system via different clients connected to the server. If another user performs some operations related to indexes, for example, create a new index or modify an index, you may not immediately view the changes of 4-83 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) indexes on your client due to the response time between the server and different clients. In this case, you can refresh the indexes to synchronize the latest index information from the server to your client. Steps 1. From the main menu, click Performance > Counter and Index Management. The Counter and Index Management tab is displayed. 2. Perform one of the following operations to refresh the indexes in the system: l Right-click any node in the Resource Type tree, and then click Refresh from the shortcut menu. on the toolbar. l Click – End of Steps – 4.7.4 Index Group Management 4.7.4.1 Creating an Index Group To effectively manage indexes of different types, you can create a new index group by the type of index, for example, PI, KPI or SPI. Specific user-defined indexes can be moved into the group based on a certain rule. Steps 1. From the main menu, select Performance > Counter and Index Management. The Counter and Index Management tab is displayed. 2. On the left Model Management tab, expand the Resource Type > BN-xTN > CTN navigation tree. 3. Expand the performance index of the target index type, and right-click the corresponding performance index node, for example, right-click Key PI, and then click New Group from the shortcut menu. The New Group dialog box is displayed. 4. Enter the group name in the Group Name text box, and click OK. The created group is displayed under the Key PI node. – End of Steps – 4.7.4.2 Modifying an Index Group This procedure describes how to modify an index group. Steps 1. From the main menu, select Performance > Counter and Index Management. The Counter and Index Management tab is displayed. 2. On the left Model Management tab, expand the Resource Type > BN-xTN > CTN navigation tree. 4-84 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management 3. Expand the performance index of the target index type, and click the corresponding performance index node. This procedure uses Key PI as an example. 4. Right-click the index group in the index list, and then select Modify Group from the shortcut menu. The Modify Group dialog box is displayed. 5. Enter a new name in the Group Name text box. 6. Click OK. – End of Steps – 4.7.4.3 Deleting an Index Group This procedure describes how to delete an index group. Steps 1. From the main menu, Select Performance > Counter and Index Management. The Counter and Index Management tab is displayed. 2. On the left Model Management tab, expand the Resource Type > BN-xTN > CTN navigation tree. 3. Expand the performance index of the target NE type, and the click the corresponding performance index node. 4. Right-click the index group in the index list, and then select Delete Group. The Confirm message box is displayed. 5. Click OK. – End of Steps – 4.8 Threshold Tasks Management 4.8.1 Creating a Threshold Task This procedure describes how to create a threshold task. A threshold task monitors the measurement data within a preset duration. When an index is higher or lower than the preset threshold, an alarm is generated. Steps 1. From the main menu, select Performance > Threshold Task Management. The Threshold Task Management tab is displayed. 2. Click on the toolbar. The Add Threshold Task dialog box is displayed. 3. On the Threshold Task tab, set the NE type, MO type, and Threshold index by performing the following steps: a. Select an NE type from the NE type list, for example, ZXCTN 6120. 4-85 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Note: You can select multiple NE types. b. Select an MO type from the MO type list, for example, checkpoint. c. Click Add Index. The Select Indices/Counters dialog box is displayed. You can filter the index or counter in the following way: enter the querying condition in the text box, and then click . d. Select indexes and counters, and then click OK to return to the Threshold Task tab. e. Select an index, and then click Modify Threshold. The Modify Threshold dialog box is displayed. f. Set the alarm direction and alarm thresholds. g. Click OK to return to the Threshold Task tab. 4. Click the Location tab. The Location tab is displayed. 5. Set Monitor level, Wildcard level, NE location, and MO location by performing the following steps: a. Select a monitoring level from the Monitor level list, for example, "checkpoint" MO layer. b. Select a wildcard level from the Wildcard level list, for example, NE. c. Select the NE location in the NE location area. Note: If the wildcard level is All, you do not need to set the NE location. d. Select the MO location in the MO location area. Note: If the wildcard level is All or NE, you do not need to set the MO location. 6. Click the General tab. The General tab is displayed. For parameter descriptions, refer to Table 4-27. 4-86 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management Table 4-27 Descriptions for Parameters on the General Page Parameter Description Task status l Activated: The task is activated after it is created. The threshold task will automatically trigger a threshold alarm in the configured effective time. l Suspended: The task is suspended after it is created. The threshold task will not automatically trigger a threshold alarm in the configured effective time. Granularity Indicates the frequency that the threshold task is performed. 7. Set parameters of the threshold task by performing the following steps: a. In the Task name text box, enter a task name. b. Set the Start time and End time. c. Select the status from the Task status list, for example, Activated. d. Select the granularity from the Granularity list, for example, 15 minute(s). e. In the Effective date area, select the week or month, and then select a date, for example, Monday. f. In the Effective time area, select the start time and end time, and then click Add to add the duration to the list below. 8. Click OK. The creation of a threshold task is completed. – End of Steps – 4.8.2 Querying Threshold Tasks This procedure describes how to query the status and other information of threshold tasks on the U31 R22, such as MO Type and Index Names. Steps 1. From the main menu, select Performance > Threshold Task Management. The Threshold Task Management tab is displayed. 2. In the left navigation tree, select the NE on which threshold tasks are created. 3. In the upper-right corner, select the task status from the Display Status list, for example, Activated tasks. All activated threshold tasks on the NE are displayed in the list. – End of Steps – 4-87 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 4.8.3 Modifying a Threshold Task This procedure describes how to modify a threshold task. The modifiable parameters include Threshold index, Monitor level, Wildcard level, NE location, MO location, Task name, End time, Granularity, Effective date, and Effective time. Prerequisite The status of the threshold task is suspended. Steps 1. From the main menu, select Performance > Threshold Task Management. The Threshold Task Management tab is displayed. 2. In the left navigation tree, select the NE on which threshold tasks are created. 3. In the upper-right corner, select Suspended tasks from the Display Status list. 4. Right-click the threshold task to be modified and select Modify Threshold Task from the shortcut menu. The Modify Threshold Task dialog box is displayed. 5. Modify the parameters as needed. Note: The dimmed parameters cannot be modified. – End of Steps – 4.8.4 Deleting a Threshold Task This procedure describes how to delete a threshold task. Prerequisite The status of the threshold task is suspended. Steps 1. From the main menu, select Performance > Threshold Task Management. The Threshold Task Management tab is displayed. 2. In the left navigation tree, select the NE on which threshold tasks are created. 3. In the upper-right corner, select Suspended tasks from the Display Status list. 4. Right-click the threshold task to be deleted and select Delete Threshold Task from the shortcut menu. The Delete Threshold Task dialog box is displayed. 4-88 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 4 Performance Management 5. Click OK. – End of Steps – 4.8.5 Suspending a Threshold Task This procedure describes how to change the status of a threshold task from Activated to Suspended. Steps 1. From the main menu, select Performance > Threshold Task Management. The Threshold Task Management tab is displayed. 2. In the left navigation tree, select the NE on which threshold tasks are created. 3. In the upper-right corner, select Activated tasks from the Display Status list. 4. Right-click the threshold task to be suspended, and select Suspend Threshold Task from the shortcut menu. – End of Steps – 4.8.6 Activating a Threshold Task This procedure describes how to change the status of a threshold task from Suspended to Activated. Steps 1. From the main menu, select Performance > Threshold Task Management. The Threshold Task Management tab is displayed. 2. In the left navigation tree, select the NE on which threshold tasks are created. 3. In the upper-right corner, select Suspended tasks from the Display Status list. 4. Right-click the threshold task to be activated, and select Activate Threshold Task from the shortcut menu. – End of Steps – 4-89 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) This page intentionally left blank. 4-90 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management Table of Contents Public Report .............................................................................................................5-1 CTN Resource Analysis Report ................................................................................5-11 CTN Statistics Report ...............................................................................................5-13 OTN Report..............................................................................................................5-17 MSTP Proprietary Report .........................................................................................5-28 End-to-End Report Management ..............................................................................5-29 5.1 Public Report 5.1.1 Managing Statistical Reports on NEs By querying statistical reports on one or multiple NEs, you can learn the statistics on these NEs, for example, the configurations, quantities, number of devices at the corresponding network layer, percentages, and rates. You can also customize query conditions. Context This function is applicable to the SDH, CTN, WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > Managed Elements Statistics Report from the main menu. The Managed Elements’ Statistics Report dialog box is displayed. 2. In the left Device Resource navigation tree, select the desired NEs. 3. Click Query to check the configuration information about the selected NEs. 4. Perform the following operations as required. To... Do... Save the NE configuration Click Export. information locally Print the NE configuration Click Print. information 5. Click the Statistics tab. Select an option from the Statistic Condition list. For a description of the parameters, refer to Table 5-1. 5-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Table 5-1 Statistical Condition Parameter Descriptions Parameter Description According to the device Queries the rate level, quantity and percentage of each selected type NE, and the total number of selected NEs. According to the network Queries the number of selected NEs at each network level. level According to the Queries the device type, number, and percentage of each selected configured highest service NE and the total number of selected NEs based on the highest, rate configured service rate. Define Customizes the statistical conditions (such as IP Address) and the items (such as Number) to be displayed in a result. 6. Click Query. 7. (Optional) Customize query conditions. a. On the Statistic tab, select Define. The Define Statistic Conditions dialog box is displayed. b. Click New. Set Define Name. From the left list, select the desired query conditions. Click Right. The selected conditions are moved to the right list. Note: To delete a selected condition from the right list, select it and then click Left. c. Click Apply. Click Close. From the Statistic Condition list, select the newly added condition. 8. Perform the following operations as required. To... Do... Save the NE statistics locally Click the Export button. Print the NE statistics Click the Print button. – End of Steps – 5.1.2 Managing Statistical Reports on Slots By querying the statistical reports on slots, you can know the board information on and slot usage of one or multiple NEs. 5-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management Context This function is applicable to the CTN, WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > Slot Statistics Report from the main menu. The NE Slot Information Report dialog box is displayed. 2. In the left Device Resource navigation tree, select the NEs whose slot information you want to query. 3. Click Query. The configurations of the selected NEs are displayed. 4. Perform the following operations as required. To... Do... Save the slot information locally Click Export. Print the slot information Click Print. 5. Click the Statistics tab. From the Statistic Condition list, select the default condition—Slot Utilization Statistic. 6. Click Query to view the rack type, shelf type, number of used slots, number of available slots, total number of slots, and usage of a used slot of each selected NE. 7. Perform the following operations as required. To... Do... Save the slot statistics on the selected NEs locally Click the Export button. Print the slot statistics on the selected NEs Click the Print button. – End of Steps – 5.1.3 Managing the Statistical Reports on Boards By querying the statistical reports on boards, you can learn the board configuration of one or more NEs, including the device type, board label, board silkscreen name, software version, hardware version, port number, occupied number, PCB version, application version, FPGA version, Boot version, IPMC version, IPMI version, serial number, and part number. Context This function is applicable to the SDH, CTN, WDM and OTN NEs. 5-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > Managed Boards Statistics Report from the main menu. The Managed Boards Statistics Report dialog box is displayed. 2. In the left Device Resource navigation tree, select the required NEs. 3. (Optional) Click Synchronize Board Hardware Information to synchronize the board hardware information. Note: You can also query the PCB version, application version, FPGA version, Boot version, serial number, and component number. On the U31 R22 client, select Configuration > Export Engineering Device Info > Export Transmission Engineering Device Info from the main menu to perform the operations. 4. Click Query to view the board configuration report. For a description of the parameters, refer to Table 5-2. Table 5-2 Parameter Descriptions for the Statistical Report on a Board Parameter Description Port Number The number of the ports provided by the board. Occupied Number The number of the ports on which services are configured. IPMC Version Hardware version of the IPMC sub-card. IPMI Version IPMC version of the IPMC sub-card. 5. Perform the following operations as required. To... Do... Save the board information Click Export. locally Print the board information Click Print. 6. Click the Statistics tab. Set the parameters and then click Query. For a description of the parameters, refer to Table 5-3. Table 5-3 Statistical Condition Parameter Descriptions Parameter Description Software/Hardware Version Queries the device type, device version, software version, Statistic hardware version, and board quantity of the selected NEs. 5-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management Parameter Description Board Type Statistic Queries the board types and quantities of the selected NEs. Utilized Rate Statistic Queries the usage of each board of the selected NEs. Board Version Basiced on Queries software version and quantity of each type of board of Board Types the selected NEs. Board Version Basiced on Queries software version and quantity of each type of device of Device the selected NEs. Define Customizes the statistical conditions, for example, NE Name and Board Label. 7. (Optional) Customize statistical conditions. a. From the Statistic Condition list, select Define. The Define Statistic Conditions dialog box is displayed. b. Click New. The New Statistic Condition dialog box is displayed. c. Set Define Name. From the left list, select the desired conditions and then click Right to add the conditions to the right list. Note: To remove a selected condition, select it from the right list and then click Left. d. Click Apply, and then click Close. From the Statistic Condition list, select the newly added condition set. Click Query. 8. Perform the following operations as required. To... Do... Save the board statistics on the selected NEs Click the Export button. locally Print the board statistics on the selected NEs Click the Print button. – End of Steps – 5.1.4 Managing Statistical Reports on Ports This procedure describes how to query the statistical reports on ports. The information includes the number of ports, the rate of each port, and the service on each port. Context This operation is applicable to the SDH, CTN, WDM and OTN NEs. 5-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. From the main menu, select Statistics > Bearer NE Report > Ports Statistics Report. The Ports Statistics Report dialog box is displayed. 2. From the left Device Resource list, select the NEs whose port information you want to query. 3. Click Query. The port configuration information about the selected NEs is displayed. 4. Perform the following operations as required. To... Do... Save the port information locally Click Export. Print the port information Click Print. 5. Click the Statistics tab. From the left Device Resource list, select the NEs whose port information you want to query. From the Statistic Condition list on the right, select a query condition. For a description of the parameters, refer to Table 5-4. Table 5-4 Query Condition Parameter Descriptions Parameter Description Client Port Statistic Queries the used ports and the relevant services, and the unused ports and the services that can be carried. Service Type Statistics Queries the information about the usage of ports that carry specified services. Layer Rate Statistic Queries port information by layer. Define Customizes query conditions such as NE Name, Board Name, Port, Layer Rate, Configured Service Type and Comment. 6. (Optional) Customize query conditions. a. Select Define from the Statistic Condition list. The Define Statistic Conditions dialog box is displayed. b. Click New, and the New Statistic Condition dialog box is displayed. c. Enter a name in Define Name. From the left list, select the statistical conditions that you want to add, and then click Right. The selected conditions are added to the right list. 5-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management Note: To remove a selected condition, select it from the right Statistic Condition list and then click Left. d. Click Apply. On the Define Statistic Conditions dialog box, click Close. The Ports Statistics Report dialog box is displayed. From the Statistic Condition list, select the newly added name. 7. Click Query. 8. Perform the following operations as required. To... Do... Save the port statistics locally Click Export. Print the port statistics Click Print. – End of Steps – 5.1.5 Managing the Link Statistics Report You can learn about the link layer, link rate, and number of links by querying the link statistics report. Context This function applies to the SDH, CTN, and WDM/OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > Links Statistics Report from the main menu. The Links Statistics Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. Select an option from the Statistic Condition list. 3. Click Query. The statistical results are displayed in the Query Result list . For a description of the link statistics report, refer to Table 5-5. 5-7 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Table 5-5 Parameter Descriptions for Link Statistics Report Parameter Description Link Level Determines a link level in accordance with the device levels of the NEs on both ends of the link. If the device levels of the NEs at both ends of the link are consistent, Link Level is the device level, such as Core Layer, Convergence Layer, Access Layer, Core-Convergence Layer, or Convergence-Access Layer. If the device levels of the NEs at both ends of the link are inconsistent Link Level is Other. Link Rate Determined by the physical interfaces between the two ends of a link. 4. Click the Statistics tab. Set the parameters. For a description of the parameters, refer to Table 5-6. Table 5-6 Statistical Condition Parameter Descriptions Parameter Description According to the link rate Queries the rate and quantity of each link of the selected NE by link level. Define Customizes the statistical conditions such as Connection Name and Source NE. 5. (Optional) Customize statistical conditions. a. From the Statistic Condition list, select Define. The Define Statistic Conditions dialog box is displayed. b. Click New. The New Statistic Condition dialog box is displayed. c. Set Define Name. From the left list, select the desired conditions and then click Right to add the conditions to the right list. Note: To remove a selected condition, select it from the right list and then click Left. d. Click Apply, and then click Close. From the Statistic Condition list, select the newly added condition set. Click Query. 6. Perform the following operations as required. 5-8 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management To... Do... Export the statistical results Click the Export button. Print the statistical results Click the Print button. – End of Steps – 5.1.6 Managing the Protection Group Information Report By querying the protection group information report of NEs, you can learn the protection group information of one or more NEs. Context This function is applicable to the SDH, CTN, WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > Protection Group Information Report from the main menu. The Protection Group Information Report dialog box is displayed. 2. In the left Device Resource navigation tree, select the required NEs. 3. Click Query to view the protection group information of the NEs. 4. Perform the following operations as required. To... Do... Save the protection group information of the NEs Click the Export button. to a local hard disk Print the protection group of the NEs Click the Print button. – End of Steps – 5.1.7 Managing the CTN/SDH Device Port Status Statistics Report Through the statistical report of the CTN/SDH device port status, you can learn about the port type, total quantity of the ports, quantity of occupied and idle ports, and utilization. Context This function applies to the SDH/CTN NEs. Steps 1. In the Topology Management window, select Statistics > Bear NE Report > CTN/SDH Port Status Statistics Report from the main menu. The CTN/SDH Port Status Statistics Report dialog box is displayed. 5-9 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2. Select an NE from the Device Resource navigation tree. 3. Click Query. The statistical results are displayed in the Query Result list. For a description of the Port Status parameter on the CTN/SDH port status detailed report, refer to Table 5-7. Table 5-7 CTN/SDH Port Status Parameter Description Parameter Description Port Status Indicates the service occupancy status of the device port. The status includes Opened, free, and unknown. 4. Perform the following operations as required. To... Do... Save the statistical results of port state Click the Export button. Print the statistical results of port state Click the Print button. – End of Steps – 5.1.8 Managing the CTN/SDH Port Status Statistics Report By querying the CTN/SDH port status statistics report, you can learn the port status of one or more NEs. Context This function is applicable to the SDH and CTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > CTN/SDH Port Status Statistic Report from the main menu. The CTN/SDH Port Status Statistic Report dialog box is displayed. 2. In the left Device Resource navigation tree, select the required NEs. 3. Click Query. The NE port status statistics are displayed in the Query Result list. 4. Perform the following operations as required. To... Do... Save the NE port status to a local hard disk Click the Export button. Print the NE port status Click the Print button. – End of Steps – 5-10 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management 5.2 CTN Resource Analysis Report 5.2.1 Managing the CTN Link Looping Statistics Report Through the CTN link looping statistics report, you can learn about the number and rate of the rings formed by the links, and number of the super-large rings. Context l l This function applies to the CTN NEs. The report function requires the support of License. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > CTN Resource Analysis > Links Become Ring Statistics Report from the main menu. The Links Become Ring Statistics Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query. The statistical results are displayed in the Query Result list. 4. Perform the following operations as required. To... Do... Save the statistical results Click the Export button. Print the statistical results Click the Print button. – End of Steps – 5.2.2 Managing the CTN Loop Information Report Through the CTN loop information report, you can learn about the rate, number of the members, members’ names, and the accessing personnel in the CTN circle link. Context l l This function applies to the CTN NEs. The report function requires the support of License. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > CTN Resource Analysis > Ring Link Information Report from the main menu. The Ring Link Information Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query. The statistical results are displayed in the Query Result list. 4. Perform the following operations as required. 5-11 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To... Do... Save the query results Click the Export button. Print the query results Click the Print button. – End of Steps – 5.2.3 Managing the Logic Resource Statistics Report This procedure describes how to manage the logic resource statistics report, such as creating and modifying a statistics template, setting statistics parameters, and exporting statistics information. Through this report, you can check the actual flow, configuration flow, PW quantity on the tunnel, service performance, and resource rationality analysis. Context The report function requires the support of License. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > CTN Resource Analysis > LogicResource Statistics Report from the main menu. The Logic Resource Statistics Report dialog box is displayed. 2. From the Device Resource navigation tree in the top left pane, select an NE whose information is to be collected. 3. From the All Templates navigation tree in the left pane, select a template. 4. In the Setup area in the right pane, set Flow Units, Collection granularity, and set parameters in the Utility Color Setting (%) and Actual Traffic Duration areas. Note: If you need to set a color mark for the alarm level of the resource utilization ratio, click the Warning or Severe button. The Color Setting dialog box is displayed. Select a color for the Warning or Severe level of the resource utilization. 5. Click Obtain Resources. The information meeting with the requirements is displayed in the right pane of Logic Resource Statistics Report dialog box. 6. Click Execute Statistics. After the analysis progress is completed, The maximum flow, minimum flow, and minimum utilization ratio in the period during which this service is operating are displayed in the list. 5-12 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management 7. Perform the following operations as required. To... Create a statistics Do... i. template Click New. The Statistical Analysis Template - Custom Template dialog box is displayed. ii. Set Template Name, and select a resource type and statistic item(s). iii. Click OK to return to the Logic Resource Statistics Report dialog box. The new template is displayed under the All Template navigation tree in the left pane. Modify statistics i. resource From the All Template navigation tree in the left pane, select a template to be modified. ii. Click Modify. The Statistical Analysis Template - Configure Traffic dialog box is displayed. iii. Modify the resource type and statistics items of the template as required. iv. Click OK. Export the logic i. resource statistics Click Export. The Logic Resource Statistics Report - Template Name: Configure Traffic dialog box is displayed. report ii. icon. The Save dialog box is displayed. Click the iii. Set the export path. iv. Click Save to return to the Logic Resource Statistics Report Template Name: Configure Traffic dialog box. v. Click Export File. – End of Steps – 5.3 CTN Statistics Report 5.3.1 Managing the CTN NE Service Count Report Through the NE service count report, you can learn about the number of services that are configured on various NEs, including the number of tunnels, PWs, protection groups, TDM services, Ethernet services, MEGs, static routes, and BFDs. Context This function applies to all CTN NEs. 5-13 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > CTN Report > Ne Service Count Report. The Ne Service Count Report dialog box is displayed. 2. From the Device Resource navigation tree, select the NE whose services are to be collected. 3. Click Query. The statistics results are displayed in the Query Result list. 4. Perform the following operations as required. To... Do... Save the statistics results Click the Export button. Print the statistics results Click the Print button. – End of Steps – 5.3.2 Managing the CTN SFP Statistics Report Through the CTN SFP statistics report, you can query the optical module information of NEs, including the detail information about the device type, port, manufacturing date, serial No., and sending and receiving bands. Context This function is applicable to all CTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > CTN Report > CTN SFP Statistic Report from the main menu. The CTN SFP Statistic Report dialog box is displayed. 2. In the left Device Resource navigation tree, select the required NEs. 3. (Optional) If the device hardware information is not synchronized to the network management, the optical module information cannot be queried. To perform the synchronization, perform the following operations: a. Click Synchronization Board Hardware Information. The Synchronization Board Hardware Information dialog box is displayed. b. In the Customized Resource navigation tree, select the NE to be synchronized. c. Click Start Synchronize. d. After the synchronization is completed, click OK. 4. Click Query. The SFP statistics of the NEs are displayed in the Query Result list. 5. Perform the following operations as required. 5-14 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management To... Do... Save the SFP statistics of the NEs Click the Export button. Print the SFP statistics information of the NEs Click the Print button. – End of Steps – 5.3.3 Managing the NE Rate Statistics Report Through the CTN NE rate statistics report, you can learn about the NE type, rate, quantity, and proportions of the various types in the network. Context This function applies to the CTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > CTN Report > NE Rate Statistics Report from the main menu. The NE Rate Statistics Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query. The statistical results are displayed in the Query Result list. 4. Perform the following operations as required. To... Do... Save the statistical results Click the Export button. Print the statistical results Click the Print button. – End of Steps – 5.3.4 Managing the L3 Interface Information Report Through the CTN L3 interface information report, you can learn about the L3 interface information of NEs, including the port type, seal type, SVLAN, CVLAN, IP address, MAC address, and domain. Context This function applies to all CTN NEs. 5-15 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > CTN Report > L3 Interface Information Report. The L3 Interface Information Report dialog box is displayed. 2. From the Device Resource navigation tree, select the NE to be queried. 3. Click Query. The statistics results are displayed in the Query Result list. 4. Perform the following operations as required. To... Do... Save the statistics results Click the Export button. Print the statistics results Click the Print button. – End of Steps – 5.3.5 Managing the CTN NE Version Statistics Report Through the CTN NE version statistics report, you can learn about the version information of NEs, including the device type, software version, and interface version. Context This function applies to all CTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > CTN Report > Equipment Version Statistics Report. The Equipment Version Statistics Report dialog box is displayed. 2. From the Device Resource navigation tree, select the NE to be queried. 3. Click Query. The statistics results are displayed in the Query Result list. 4. Perform the following operations as required. To... Do... Save the statistics results Click the Export button. Print the statistics results Click the Print button. – End of Steps – 5-16 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management 5.3.6 Managing the CTN Ethernet Service Access Information Report Through the CTN Ethernet service access information report, you can learn about the service point, external VLAN, internal VLAN, service ID, and service description of Ethernet service access. Context This function applies to all CTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > CTN Report > Ethernet Service Access Information Report. The Ethernet Service Access Information Report dialog box is displayed. 2. From the Device Resource navigation tree, select the NE to be queried. 3. Click Query. The statistics results are displayed in the Query Result list. 4. Perform the following operations as required. To... Do... Save the statistics results Click the Export button. Print the statistics results Click the Print button. – End of Steps – 5.4 OTN Report 5.4.1 Managing the Shelf Information Report Through the shelf information report, you can query the shelf label, shelf type, and the affiliated shelf of one or multiple NEs. Context This function is applicable to the WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > Shelf Configuration Report from the main menu. The Shelf Configuration Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query. The shelf information is displayed in the Query Result list. 5-17 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Figure 5-1 Shelf Information 4. Click the Statistics tab. From the Statistic Condition list, select According to the shelf type. The information about the type, quantity and percentage of each shelf on the selected NE are displayed, see the following figure. Figure 5-2 Self Statistics by Type 5. Perform the following operations as required. To... Do... Save the shelf information report to a local hard Click the Export button. disk Print the shelf information report Click the Print button. – End of Steps – 5-18 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management 5.4.2 Managing the Information Report of the Board Components Through the information report of the OTN board components, users can query the information of the OTN board components: including PN, SN, manufacturer, and manufacturer OUI. Context This function is applicable to the WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > WDM Board Component Information Report from the main menu. The WDM Board Component Information Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query to view the board component information in the Query Result list. 4. Perform the following operations as required. To... Do... Save the information report of the board Click the Export button. components to the local hard disk Print the information report of the board Click the Print button. components – End of Steps – 5.4.3 Managing the Adjustable Power Margin Report Through Adjustable Power Margin Report, users can query the adjustable power margin in the entire network. Context This function is applicable to the WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > Adjustable Power Margin Report from the main menu. The Adjustable Power Margin Report dialog box is displayed. 2. Select the OMS check box below Basic Attribute on the left. The Setting area is displayed. 3. Click Setting. The Select Service dialog box is displayed. 4. Select one or multiple resources from the Select Service dialog box, and click Add. 5-19 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) The selected resource is added to the Selected Result area. 5. Click OK to return to the Adjustable Power Margin Report dialog box 6. Click Query to view the adjustable power margin in the Query Result list. 7. Perform the following operations as required. To... Do... Save the adjustable power margin report to a Click the Export button. local hard disk Print the adjustable power margin report Click the Print button. – End of Steps – 5.4.4 Managing Port State Report Through OTN port state report, users can query the related information about the port of a single or multiple NEs, such as Is Alarm, Is Alarm Mask, and Is Loop Back. Context This function is applicable to the WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > Port State Data Report from the main menu. The Port State Data Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query to view the port state in the Query Result list. 4. Perform the following operations as required. To... Do... Save the port state report to a local hard disk Click the Export button. Print the port state report Click the Print button. – End of Steps – 5.4.5 Managing the Fixed Attenuator Report Through the fixed attenuator report, users can query relative information of the fixed attenuator in a single NE or multiple NEs. Context This function is applicable to the WDM and OTN NEs. 5-20 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > Fix Attenuator Report from the main menu. The Fix Attenuator Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query to view the fixed attenuator information in the Query Result list. 4. Perform the following operations as required. To... Do... Save the fixed attenuator report to a local hard Click the Export button. disk Print the fixed attenuator report Click the Print button. – End of Steps – 5.4.6 Managing the Wavelength Allocation Report Through the wavelength allocation report, users can query the wavelength allocation information of one or multiple NEs, such as frequency, port allocation, and attenuation. Context This function is applicable to the WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > Wave Assign Report from the main menu. The Wave Assign Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query to view the wave allocation information in the Query Result list. 4. Perform the following operations as required. To... Do... Save the wavelength allocation report to a Click the Export button. local hard disk Print the wavelength allocation report Click the Print button. – End of Steps – 5-21 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 5.4.7 Managing the Dispersion Compensation Report Through the dispersion compensation report, you can learn about the dispersion compensation information of WDM NEs, such as the port, leveling mode, step, tracking mode, LOF treatment, and destination dispersion. Context This function applies to all WDM/OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > Dispersive Compensation Report from the main menu. The Dispersive Compensation Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query to view the dispersive compensation information in the Query Result list. 4. Perform the following operations as required. To... Do... Save the statistical results Click the Export button. Print the statistical results Click the Print button. – End of Steps – 5.4.8 Managing the Optical Module Information Report Through the optical module information report, you can learn about the optical module information of NEs, such as the port, module type, interface type, rate, transmission distance, service type, fiber type, and lightwave frequency. Context This function applies to all WDM/OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > Optical Module Info Report from the main menu. The Optical Module Info Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query to view the optical module information in the Query Result list. 4. Perform the following operations as required. 5-22 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management To... Do... Save the statistical results Click the Export button. Print the statistical results Click the Print button. – End of Steps – 5.4.9 Managing the Configuration Report of GCC Byte Use Mode By configuring the report in the GCC byte use mode, users can query the information such as GCC byte and use mode configuration. Context This function is applicable to the WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > GCC Byte Use Mode Configuration Report from the main menu. The GCC Byte Use Mode Configuration Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query to view the GCC byte use mode configuration in the Query Result list. 4. Perform the following operations as required. To... Do... Save the configuration report of GCC byte use Click the Export button. mode to a local hard disk Print the configuration report of GCC byte use Click the Print button. mode – End of Steps – 5.4.10 Managing the FEC Mode Configuration Report Through the FEC mode configuration report, you can learn about the NE, board, and port information for configuring the FEC mode. Context This function applies to the SDH, CTN, and WDM/OTN NEs. 5-23 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > FEC Mode Configuration Report from the main menu. The FEC Mode Configuration Report dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query to view the FEC mode configuration in the Query Result list. 4. Perform the following operations as required. To... Do... Save the query results Click the Export button. Print the query results Click the Print button. – End of Steps – 5.4.11 Managing the Customer Information Report Through the customer information report, you can query customer’s information, such as user name, credit level, and contact information. Context This function is applicable to the SDH, CTN, WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > Customer Information Report from the main menu. The Customer Information Report dialog box is displayed. 2. Click Query to view the customer information in the Query Result list. 3. Perform the following operations as required. To... Do... Save the customer information report to the local Click the Export button. hard disk Print the customer information report Click the Print button. – End of Steps – 5.4.12 Managing the Configuration Report of the Service Mapping Mode Through the configuration report of the service mapping mode, users and mapping information of the port of a single or multiple NEs. 5-24 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management Context This function is applicable to the WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > Service Mapping Mode Configuration Report(X) from the main menu. The Service Mapping Mode Configuration Report(X) dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query to view the service mapping mode configuration in the Query Result list. 4. Perform the following operations as required. To... Do... Save the configuration report of the service Click the Export button. mapping mode to the local hard disk Print the configuration report of the service Click the Print button. mapping mode – End of Steps – 5.4.13 Managing the Customer Service Running State Report Through the customer service running state report, you can query the normal running time, and unavailable time of the services that have been applied. Prerequisite The U31 R22 system has the customer who has the corresponding service. Context This function is applicable to the WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > BN xTN Configuration Report > OTN Report > Customer Service Running State Report from the main menu. The Customer Service Running State Report dialog box is displayed. 2. Set the customer information. a. Click Setting. The Resource Selector dialog box is displayed. b. Select a customer from the Resource Selector dialog box, and click Add. The selected customer is added to the Selected Result area. The user can add multiple customers by repeating this operation. c. Click OK to return to the Customer Service Running State Report dialog box 5-25 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3. Set the Start Time and End Time for the customer service. 4. Click Query. The service information of the customer is displayed in Query Result list. 5. Perform the following operations as required. To... Do... Save the report of the customer service running Click the Export button. status to a local hard disk Print the report of the customer service running Click the Print button. status – End of Steps – 5.4.14 Managing the OPM Optical Channel Performance Report Through the OPM optical channel performance report, you can query the relative information of the OPM optical channel performance, such as power value, Signal to Noise Ratio (SNR), and wavelength offset. Context This function is applicable to the WDM and OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > OPM Optical Channel Performance Report(Y) from the main menu. The OPM Optical Channel Performance Report(Y) dialog box is displayed. 2. Select an NE from the Device Resource navigation tree. 3. Click Query to view the OPM optical channel performance information in the Query Result list. 4. Perform the following operations as required. To... Do... Save the OPM optical channel performance Click the Export button. report to a local hard disk Print the OPM optical channel performance report Click the Print button. – End of Steps – 5-26 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management 5.4.15 Managing the Bandwidth Resource Statistics Report Through the bandwidth resource statistics report, you can learn about the bandwidth resource information of OMSs, such as the total bandwidth and frequency, used bandwidth, available bandwidth, and occupancy rate. Context This function applies to all WDM/OTN NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > OTN Report > Bandwidth Resource Statistics from the main menu. The Bandwidth Resource Statistics dialog box is displayed. 2. Select an OMS from the OMS Resource navigation tree. 3. Click Refresh to view the service bandwidth information. 4. Perform the following operations as required. To... Do... Save the statistical results Click the Export button. Print the statistical results Click the Print button. – End of Steps – 5.4.16 Managing Frequency Statistics of Tunnels Between Two NEs This procedure describes how to query frequency statistics (including the frequencies and their usage) of tunnels between two NEs. Steps 1. From the main menu, select Statistics > Bearer NE Report > OTN Report > Two Channel Static Report. The Two Channel Static Report dialog box is displayed. 2. From the Direction list, select Unidirection or Bidirection. 3. In the Begin area, click Browse. The Resource Selector dialog box is displayed. Select a source NE and then click OK. 4. In the End area, click Browse. The Resource Selector dialog box is displayed. Select a destination NE and then click OK. 5. (Optional) If there are other NEs between the two NEs, click Browse in the Middle Nes area. Select the NEs between the two NEs and then click OK. 6. Click Query. 7. Perform the following operations as required. 5-27 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To... Do... Save the report locally Click Export. Print the report Click Print. – End of Steps – 5.5 MSTP Proprietary Report 5.5.1 Managing the MSTP Cross-Connect Service Report By querying the MSTP cross-connect service report, you can learn the cross-connect service information of one or more NEs. Context This function is applicable to the SDH NEs. Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > MSTP Report > MSTP Cross Connection Report from the main menu. The MSTP Cross Connection Report dialog box is displayed. 2. From the left Device Resource navigation tree, select the required NEs. 3. Click Query to view the cross-connect service information of the NEs. 4. Perform the following operations as required. To... Do... Save the cross-connect service information of the Click the Export button. NEs to a local hard disk Print the cross connect information of the NEs Click the Print button. – End of Steps – 5.5.2 Managing the SFP Statistics Report of MSTP Equipment This procedure describes how to query the SFP statistics report of MSTP equipment to learn the SFP statistics of one or multiple NEs. Context This function is applicable to the SDH NEs. 5-28 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management Steps 1. In the Topology Management window, select Statistics > Bearer NE Report > MSTP Report > MSTP SFP Statistics Report from the main menu. The MSTP SFP Statistics Report dialog box is displayed. 2. From the left Device Resource navigation tree, select the required NEs. 3. (Optional) If the device hardware information is not synchronized to the network management, the SFP information cannot be queried. To perform the synchronization, perform the following operations: a. Click Synchronize Board Hardware Information. The Synchronize Board Hardware Information dialog box is displayed. b. Click Start Synchronize. c. After synchronization, click Close. 4. (Optional) Click Synchronize Board Hardware Information to synchronize the board hardware information. 5. Click Query to view the SFP statistics of NEs. 6. Perform the following operations as required. To... Do... Save the SFP statistics of NEs to a local hard disk Click the Export button. Print the SFP statistics of NEs Click the Print button. – End of Steps – 5.6 End-to-End Report Management 5.6.1 Managing the Service Data Report This procedure describes how to export the statistics information of end-to-end services through the service data report. You can know properties of each service, such as State, Customer, and Create Time. Steps 1. In the Topology Management window, select Statistics > E2E Report Management from the main menu. The E2E Report Management dialog box is displayed. 2. From the navigation tree in the Report area in the left pane, select E2E Report Management > Service Data Report. 3. (Optional) In the Filter Condition area in the left pane, set filtering conditions as required. 4. Set Display mode. 5-29 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l l Rate first: displays the filtered results with the service rate as the index. NE first: displays the filtered results with the service NE as the index. 5. Click Filter in All. The protection subnets that meet filtering conditions are displayed in the list in the right pane. For a description of the service data report, refer to Table 5-8. Table 5-8 Parameter Descriptions for the Service Data Report Parameter Description Consistent Stat Identifies the matching degree between end-to-end services and single-point configuration data. Options: Consistent, Inconsistent, Exception, and Extend. Normally, the end-to-end service that is just discovered automatically has the highest matching degree, whose Consistent State is Consistent. If you modify the service through single-point operations, the consistent state of the end-to-end service might change. SNC Type Categories of services based on the service topology. Normally, single end-A or end-Z services are simple services. Fixed State Whether the service is configured on the NMS. If the service is configured in the hardware of the device rather than on the NMS, this services is triggered automatically after the device is powered on, such as transparent transmission services. If the service is configured on the NMS, Fixed State is Unfix. 6. Export the service data report as required. For the corresponding procedures, refer to Table 5-9. Table 5-9 Operations for Exporting the Service Data Report To... Do... Export the report as a i. Select File from the Export list. The Save dialog box is displayed. ii. Set Save in, File Name, and Files of Type. file iii. Click Save. Print the report i. Select Print from the Export list. The Print Setup dialog box is displayed. ii. Set parameters on the General, Page Setup, and Advanced tabs. iii. Click Print. – End of Steps – 5-30 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management 5.6.2 Managing the Service Statistics Report This procedure describes how to export the statistics information of customer-related end-to-end services through the service statistics report. You can know properties of each service, such as Total Number, State, and Customer Name. Steps 1. In the Topology Management window, select Statistics > E2E Report Management from the main menu. The E2E Report Management dialog box is displayed. 2. From the navigation tree in the Report area in the left pane, select E2E Report Management > Service Statistics Report. 3. (Optional) In the Filter Condition area in the left pane, set filtering conditions as required. 4. Click Filter in All. The services that meet filtering conditions are displayed in the list in the right pane. Note: The corresponding value is displayed in State only if Configuration State, Service State, or Usage State is set. For a description of the service statistics report, refer to Table 5-10. Table 5-10 Parameter Descriptions for Service Statistics Report Parameter Description Configure/Service/Usage Service state. State l Configure State: Whether the configuration data of the NMS is delivered to the device successfully. If all the configuration data of an end-to-end service is delivered to the device successfully, Configure State is Active. If the configuration data of an end-to-end service is not delivered to the device successfully, Configure State is Deactive. If only some configuration data is delivered to the device successfully, Configure State is Partially Active. l Layer Rate Service State: Whether the service is operating. Rate of the network layer where a service is located. Layer Rate includes SMT-1 Regenerator Section, GE, E1/VC12, L2L3 Bridge, Line Type Ethernet Rate, LAN Type Ethernet Rate(Work Server-Layer Service Number), TREE Type Ethernet Rate(Work Server-Layer Service Number), and Multi-Segment PW. Total Number Total number of each service. 5-31 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 5. Export the report as required. For the corresponding procedures, refer to Table 5-11. Table 5-11 Operations for Exporting the Service Statistics Report To ... Do... Export the report as a i. Select File from the Export list. The Save dialog box is displayed. ii. Set Save in, File Name, and Files of Type. file iii. Click Save. Print the report i. Select Print from the Export list. The Print Setup dialog box is displayed. ii. Set parameters on the General, Page Setup, and Advanced tabs. iii. Click Print. – End of Steps – 5.6.3 Managing the MSTP Fiber Usage Statistic Information Report This procedure describes how to export the statistic information of MSTP fiber connection usage rate through the report. You can know the usage rate of the optical connections in the network. Prerequisite You have the user permission of "Supervisor Role" or above. Steps 1. In the Topology Management window, select Statistics > E2E Report Management from the main menu. The E2E Report Management dialog box is displayed. 2. From the navigation tree in the Report area in the left pane, select E2E Report Management > MSTP Fiber Usage Statistic Report. 3. (Optional) In the Filter Condition area, set filtering conditions as required. 4. Click Filter in All. The services that meet filtering conditions are displayed in the list in the right pane. 5. Export the MSTP fiber usage statistics report as required. For the corresponding procedures, refer to Table 5-12. Table 5-12 Operations for Exporting the MSTP Fiber Usage Statistics Report To... Do... Export the report as a i. Select File from the Export list. The Save dialog box is displayed. ii. Set Save in, File Name, and Files of Type. file iii. Click Save. 5-32 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management To... Do... Print the report i. Select Print from the Export list. The Print Setup dialog box is displayed. ii. Set parameters on the General, Page Setup, and Advanced tabs. iii. Click Print. – End of Steps – 5.6.4 Managing the Isolated Cross Connection Data Report This procedure describes how to export the statistic information of isolated cross connections through the report. You can clean the corresponding isolated cross connections in the network. Steps 1. In the Topology Management window, select Statistics > E2E Report Management from the main menu. The E2E Report Management dialog box is displayed. 2. From the navigation tree in the Report area in the left pane, select E2E Report Management > Isolated Cross Connection Data Report. 3. In the Filter Condition area, set filtering conditions as required. 4. Click Filter in All. The services that meet filtering conditions are displayed in the list in the right pane. 5. Export the isolated cross connection data report as required. For the corresponding procedures, refer to Table 5-13. Table 5-13 Operations for Exporting the Isolated Cross Connection Data Report To... Do... Export the report as a i. Select File from the Export list. The Save dialog box is displayed. ii. Set Save in, File Name, and Files of Type. file iii. Click Save. Print the report i. Select Print from the Export list. The Print Setup dialog box is displayed. ii. Set parameters on the General, Page Setup, and Advanced tabs. iii. Click Print. – End of Steps – 5-33 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 5.6.5 Managing the Protection Subnet Report This procedure describes how to export the statistics information of protection subnets through the report. The statistics information includes type, rate, status, and service information. Steps 1. In the Topology Management window, select Statistics > E2E Report Management from the main menu. The E2E Report Management dialog box is displayed. 2. From the navigation tree in the Report area in the left pane, select E2E Report Management > Protection Subnet Report. 3. (Optional) In the Filter Condition area, set filtering conditions as required. 4. Click Filter in All. The services that meet filtering conditions are displayed in the list in the right pane. For a description of the protection subnet report, refer to Table 5-14. Table 5-14 Parameter Descriptions for Protection Subnet Report Parameter Description Open Type Distinguishes TNP networking mode. l Open: The working path and the protection path have the same source but different destinations. l Close: The working path and the protection path have the same source and destination. Consistent State Identifies the matching degree between end-to-end services and single-point configuration data. Options: Consistent, Inconsistent, and Defect. Normally, the end-to-end service that is just discovered automatically has the highest matching degree, whose Consistent State is Consistent. If you modify the service through single-point operations, the consistent state of the end-to-end service might change. Return Mode Whether service signals are switched from the protection path to the working path after the working path recovers. If so, Return Mode is Revertive. Otherwise, Return Mode is Non-Revertive. WTR (minutes) If the working path recovers, service signals are not switched from the protection path to the working path immediately. After a period of time (WTR (minutes), service signals are switched to the working path for transmission. Delay Time (100ms) If the working path is faulty, service signals are not switched from the working path to the protection path immediately. If the working path is still faulty after a period of time (Delay Time (100ms) ), service signals are switched to the protection path for transmission. 5-34 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 5 Report Management 5. Export the protection subnet report as required. For the corresponding procedures, refer to Table 5-15. Table 5-15 Operations for Exporting the Protection Subnet Report To... Do... Export the report as a i. Select File from the Export list. The Save dialog box is displayed. ii. Set Save in, File Name, and Files of Type. file iii. Click Save. Print the report i. Select Print from the Export list. The Print Setup dialog box is displayed. ii. Set parameters on the General, Page Setup, and Advanced tabs. iii. Click Print. – End of Steps – 5-35 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) This page intentionally left blank. 5-36 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management Table of Contents Overview ....................................................................................................................6-1 Setting User Account Rule .........................................................................................6-8 Role Management ....................................................................................................6-10 Role Set Management..............................................................................................6-16 Operation Set Management......................................................................................6-20 Department Management.........................................................................................6-26 User Management....................................................................................................6-28 Other Functions........................................................................................................6-35 6.1 Overview 6.1.1 Overview of Security Management U31 R22 provides security management functions to ensure proper and reliable operation of the U31 R22. By using the security management functions, the system administrator can create security policies, maintain user accounts and manage roles, role sets and departments. In addition, the administrator can assign different authorities to different users so that these users are limited to access and manage certain network resources. The security management functions of the U31 R22 can be classified into two parts: l l Security policy customization: Security policies are applicable to all users of the system, such as the user account management rule and the security event rule. Integrated management of roles, role sets, operation sets, departments and users: The integrated management functions support the system administrator to specify operation and management policies for individual users. Select Security from the main menu. The submenus are displayed, see Figure 6-1. 6-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Figure 6-1 Security Menu To open the Security Management view, perform one of the following operations. Figure 6-2 shows the security management view. l Click Security > Role Management on main menu. l l Click Click button. button. 6-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management Figure 6-2 Security Management View 1. Menu Bar 2. Toolbar 3. Navigation Pane 4. Security Management Pane 6.1.2 Basic Concepts in Security Management To better understand the security management model, it is necessary to first introduce some basic concepts, including role, role set, operation set, department, and user. l Role A role specifies the management permission for a user group, including the operation permission and manageable resources. à The operation permission defines what specific functional modules of the U31 R22 that the user group can use. For example, if a role has the operation permission of the log management module, the users with the role can perform log management operations, such as querying and maintaining logs. à The manageable resources defines the subnetworks and/or network elements that the role can manage. 6-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Note: Operation permission and manageable resources define two aspects of the role’s authority. The definition of the two aspects is independent of each other. But role’s authorities are defined by the two aspects together. For example, if a role has the operation permission of log management, and its manageable resources are base stations, the actual authority of the role is to manage the logs of base stations. l Role Set A role set is a combination of roles. The management permission of a role set involves the authorities of all roles in the role set. After specifying a role set, you can easily assign authorities to a system administrator or subnetwork administrator by giving the management permissions of all roles in the role set to the administrator at a time. l Operation Set An operation set is a combination of operations assigned to a role. An operation set is assigned to a role, which has the permission of all operations specified in the operation set. l Department Departments are specified in the U31 R22 to simulate the actual administrative departments. In this way, the system administrator can easily organize and manage users in the U31 R22. A newly-created user must belong to a department. Note: By default, a newly-created user belongs to the root department of the system unless specially required. l User A user is an operator who is authorized to log in to the system and perform operations in the system. While creating a user, the system administrator assigns the management permission to the user by specifying a role or role set and allocates the user to a department in accordance with the actual situation. 6.1.3 Relation Model The relations among user, role, role set, department, operation permission, and manageable resources are illustrated in Figure 6-3. 6-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management Figure 6-3 Relation Model of Security Management The following explains the relation model of security management. l l l l A user is administered by a department. The management permission of a user depends on the role set assigned to the user. A role set includes one role or a series of roles. Accordingly, the management permission of a role set is the collection of management permissions of all roles in the role set. The management authority of a role depends on the operation permission and manageable resources specified for the role. 6.1.4 Security Management Solution After fully understanding the relation model of security management, you can work out a security management solution in accordance with the network scale, administrative division, and permission allocation. Suppose a telecommunication operator in a province plans to use the U31 R22 system to manage all digital microwave transmission devices over the province. Several branch offices are distributed in the province. Each office only manages the devices in the area 6-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) administrated by it. Table 6-1 provides a security management solution for the operator, which specifies the departments, role sets, roles, operation sets, users, and their relations. 6-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management Table 6-1 Security Management Example Department Role Role Operation Set Role Description User System Administrator The default user in the system Admin Set None None administrator with the highest authorities and independent of all departments. Provincial None Office Province System The MW (microwave) equipment MWAd- administrator administrator administrator who has the authority min to manage all microwave devices in the province. None Province on-duty Monitor personnel Branch Office None 1 Ordinary operator who can monitor MWW- all MW devices in the province. atch Branch System The MW equipment administrator MWAd- Administrator administrator who has the authority to manage min1 all microwave devices in the area administered by the branch office 1. None Branch on-duty Monitor personnel Ordinary operator who can perform MWW- routine monitoring operations atch1 on all MW devices in the area administrated by branch office 1. Branch Office None 2 Branch System The MW equipment administrator MWAd- Administrator administrator who has the authority to manage min2 all microwave devices in the area administered by the branch office 2. None Branch on-duty Monitor personnel Ordinary operator who can perform MWW- routine monitoring operations atch2 on all MW devices in the area administrated by branch office 2. Branch Office None N Branch System The MW equipment administrator MWAd- Administrator administrator who has the authority to manage minN all microwave devices in the area administered by the branch office N. None Branch on-duty Monitor personnel Ordinary operator who can perform MWW- routine monitoring operations atchN on all MW devices in the area administrated by branch office N. 6-7 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 6.2 Setting User Account Rule The user account rule specifies the password policy, account lockout policy and the account checkup policy of users. Prerequisite You have the authority to perform this operation. Steps 1. On the menu bar of the client window, select Security > Set User Account Rule. The Set User Account Rule dialog box is displayed, see Figure 6-4. Figure 6-4 Set User Account Rule Dialog Box 2. Set parameters to customize user account rule. 6-8 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management The following table describes the parameters in the Customize User Account Rule dialog box. Rule Parameter Description Password Enable Weak Password Check Select this check box to check for Policy weak password. Minimum Length Minimum password length (value range: 0-20). Maximum Length Maximum password length (value range: 0-20). Can not be last used password Value range: 1-100 within Can not be last used Value range: 1-100 Notify password expiry before *** Value range: 1-90 days Same positions of new and old Value range: 1- 20 passwords must be different with at least In case of login failure, lock the Value range: 1 -10 account for Character sets of the old and the new Value range: 1- 20 password should differ at least User must modify overdue Select and the user must modify password when login overdue password before logging in the system. If the check box is not selected, the user can login without modifying overdue password. Account Lock - Set locking rule for the account. The Rule locked account must be unlocked by system administrator admin. There are three options: l Never Lock: Never Lock l Lock Permanently: Lock permanently l Lock Temporarily: Lock temporarily Lock at unsuccessful attempts of Lock the account at specified times *** times of entering wrong password (value range: 2-20). 6-9 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Rule Parameter Description The locking type: Lock Permanently or Lock Temporarily Unlock after *** hours Unlock after specified hours (value range: 1-72). The locking type: Lock Temporarily Lock account with IP Select to Lock the account with IP. The user admin not lock Select and Admin account is not locked. Account Can not be last used user accounts Select and the user account must Checking deleted in *** days not repeat any deleted account in specified previous days (value range: 1-100). Notify account expiry before *** Select and the system will notify days account expiry in specified days (value range: 1-90). Note: To restore default setting, click Default button. 3. Click OK button to finish setting. – End of Steps – 6.3 Role Management By using the role management functions, you can perform the following operations: l Specifying the operation permission and manageable resources of a role. l Setting the IP address range that can be used by a role. l Locking or unlocking a role. If a role is locked, the user as the role cannot use the operation permission of the role. After an authorized user logs in to the NMS, the user only can perform the operations within the role authority range, view the authorized NEs and perform the corresponding operations on these NEs. The unauthorized NEs are not visible. The role management is the basis of role set management and user management. Roles are members of a role set. A user must be assigned with a role or a role set before logging in to the system. Therefore, proper definition and assignment of roles is the foundation for security management. The U31 R22 supports the following role management functions: 6-10 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management l l l l l l Creating a Role: set the name, description, locking status, operation permission and operation set to create a new role. Modifying a Role: modify the description, locking status, operation permission and operation set of an existing role. Duplicating a Role: duplicate an existing role and create a new role based on the information of the duplicated role. Deleting a Role: delete a useless role. View assigned users: view users assigned with a role. Locking a Role: lock a role to disable the operation permission specified by the role. You can modify a locked role. Note: AdministratorRole, MaintenanceRole, SupervisorRole, and OperatorRole are four predefined roles. Users cannot modify or delete them. In addition, users cannot duplicate AdministratorRole. 6.3.1 Creating a Role This procedure describes how to create a role in accordance with the security management plan. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. Right-lick Role in the navigation tree, and select Create Role from the shortcut menu. 3. On the right pane, set parameters of creating a role. For the parameter descriptions, refer to Table 6-2. Table 6-2 Parameter Descriptions for Creating a Role Parameter Description Value Range Default Value Role Name Enter the role name in this 1-50 character(s) "new role" + Number box. This parameter is (Sequence number mandatory. of the newly created role, e.g. "new role2") Role Enter the description of the 1-100 character(s) Description role. This parameter is - optional. 6-11 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Description Value Range Default Value Lock the Role Select this check box to Check box Not selected Define manageable Select from the resource Not selected resources for the role. tree. lock the role. Once the role is locked, the user assigned with the role is deprived of corresponding operation permission. If a user is only assigned with the locked role, the system does not permit the login of this user. Resource Tree The node has four types of status: l Red cross on the icon: No right. l Blue icon: having defined right. l Red arrow on the icon: sharing the authority of parent icon. l No red arrow: not sharing authority of parent icon. Operation Set Define the operation Default operation set: Name authority of the role. l No authority Administrator Right (Unavailable) l System Maintenance Right l Operation Right l View Right l No Right Customized operation set 4. Enter the role name and description that are easy to identify. The Role Name must be unique. 5. Set operation set for the node on Resource Tree in Access Rights pane. l To follow the authority of the parent node, right-click the node, and select Follow Up Right from the shortcut menu. To synchronize the authority of the node with the sub-nodes, right-click the node, and select Synchronize All Lower Right from the shortcut menu. 6-12 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management l To view the operation permission of different modules in an operation set, double-click the operation set. For example, double-click Operation Right in the operation set. The Operation Set Configuration dialog box is displayed. 6. Click OK to finish the creation of a new role. – End of Steps – 6.3.2 Modifying a Role An existing role can be modified as needed, including its description, lockup status, and permission. Note that the role name is unmodifiable. Users can also view attributes of a role in modifying operations. Context Note: If the operation permission of a role is changed, the system will force login users with that role to log out. The operation permission of the users changes correspondingly after they re-log in to the system. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. To turn the attributes of a role into modifiable status, perform one of the following options. l Right-click a role node in the Role Management pane, and select Modify Role from the shortcut menu. l Select a role node in the Role Management pane, and click Modify button at the bottom-right corner. Note: Users cannot modify predefined roles. 3. Modify the attributes of the role in modifiable status. 4. Click OK to save modifications. – End of Steps – 6-13 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 6.3.3 Duplicating a Role By duplicating an existing role, you can quickly create a new role similar to an existing role. The duplicated role has the attributes of the existing role, thus making creation of new roles easier. Prerequisite The role to be duplicated has already been created. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. In the Role Management pane, right-click the role to be duplicated under Role, and select Duplicate Role from the shortcut menu. Note: The user cannot duplicate this role due to the special authority of AdministratorRole. 3. Set parameters in Basic Information and Access Rights. Note: For the parameter descriptions, refer to 6.3.1 Creating a Role. 4. Click OK to complete duplication. – End of Steps – 6.3.4 Deleting a Role This procedure describes how to delete a useless role. Prerequisite The role to be deleted is created. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 6-14 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management 2. Right-click the role to be deleted in the navigation tree, and select Delete Role from the shortcut menu. The Delete Role dialog box is displayed. Note: The user cannot delete the role which is predefined in the system. 3. Click Yes to delete the role. l l Note: If a user assigned with the deleted role has logged in to the system, the user will be forced to log out and required to log in to the system again. If a user is assigned with the deleted role only, the user will be deleted and forced to log out. – End of Steps – 6.3.5 Viewing Users Assigned with a Role This procedure describes how to view users assigned with a certain role. Prerequisite The role to be viewed is created. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. In the navigation tree, right-click a role and select View Assigned Users from the shortcut menu. The Assigned Users dialog box is displayed. 3. View information of users assigned with that role. 4. Click OK. – End of Steps – 6.3.6 Locking a Role When a role is locked, the user assigned with that role cannot perform the authority specified in the operation set of the role. 6-15 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Prerequisite The role to be locked is available and unlocked. Context You cannot lock the default roles of the U31 R22 system: system administrator, system maintainer, system operator, and system supervisor. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. In the navigation tree on the left pane, click the role to be locked. The attributes of the role is displayed in the right pane. 3. Click Modify to make the attributes modifiable. 4. Select Lock the Role check box. 5. Click OK. The designated role is locked. Note: If the designated user is locked, the user will be prompted with the Confirm message box. The user should click Yes button to exit login. After logging in to the system again, the user will be assigned with No Right permission, that is, the user cannot perform any operation. – End of Steps – 6.4 Role Set Management A role set combines the operation authorities of several roles. If you need to assign a user with the collected authorities of several roles, you can define a role set to make the definition easier. A user assigned with a role set has the authorities of all roles in it. 6.4.1 Creating a Role Set This procedure describes how to create a new role set with some roles in it. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. In the navigation tree on the left pane, right-click the Role Set node, and select Create Role Set from the shortcut menu. 6-16 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management 3. In the right pane, set parameters in Basic Information and Role Set Assignment for the new role set. For the parameter descriptions, refer to Table 6-3. Table 6-3 Parameter Descriptions for Creating a Role Set Parameters Description Value Range Default Value Role Set Name Enter the role set name 1-50 character(s) "new roleset" + number in this box. This parameter is (Sequence number mandatory. of the newly created role set, e.g. "new roleset1") Role Set Enter the description of 1-100 character(s) Description the role set. This parameter is - optional. Lock the Role Set Select this check box to Check Box Not Selected Roles can be selected Read out from the Read out from the in the system. Select System System Roles assigned to the Selected from No role selected role set. Available Roles lock the role set. If a user is only assigned with the locked role set, the system does not permit the login of this user again. Available Roles the roles needed and click button, to add roles to the Assigned Roles box. Assigned Roles 4. Click OK. A new role set is created. – End of Steps – 6.4.2 Modifying a Role Set An existing role set can be modified as needed, including its description, locking status, and roles. Note that the role set name is unmodifiable. Before modification, the user can also view the attributes of the role set. Prerequisite The role set to be modified is available in the system. 6-17 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. In the left navigation tree, right-click the role set to be modified, and select Modify Role Set from the shortcut menu. 3. Set parameters in the right pane. Note: For specific operation and description of parameters, refer to 6.4.1 Creating a Role Set. If a role set is modified, the system will force login users with this role set to log out. When logging in to the system again, these users have updated operation authorities. 4. Click OK to save modification. – End of Steps – 6.4.3 Duplicating a Role Set The system provides role set duplication function for the convenience of creating a role set with similar rights. The duplicated role set has the properties of an existing role set, thus making the creation of new role sets easier. Prerequisite The role set to be duplicated has been created. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. In the left navigation tree, right-click the role set to be duplicated, and select Duplicate Role Set from the shortcut menu. 3. Set parameters in Basic Information and Role Set Assignment in the right pane. Note: For specific operation and description of parameters, refer to 6.4.1 Creating a Role Set. 6-18 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management 4. Click OK. – End of Steps – 6.4.4 Deleting a Role Set This procedure describes how to delete useless role sets. Prerequisite The role set to be deleted is created. Context l l If a user assigned with the deleted role set has logged in to the system, the user will be forced to log out and required to re-log in to the system. If a user is assigned with the deleted role set only, the user will be deleted and forced to log out. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. In the left navigation tree, right-click the role set to be deleted, and select Delete Role Set from the shortcut menu. – End of Steps – 6.4.5 Viewing Users Assigned with a Role Set This procedure describes how to view users assigned with a certain role set. Prerequisite The role set has been added. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. In the left navigation tree, right-click the role set to be viewed, and select View Assigned Users from the shortcut menu. The Assigned Users dialog box is displayed. 3. View the users to which the role set is assigned. – End of Steps – 6-19 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 6.4.6 Locking a Role Set When a role set is locked, users assigned with the role set cannot perform the operations of the operation set specified in that role set. Prerequisite You have created the role set to be locked. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. In the left navigation tree, right-click the role set to be locked, and select Modify Role Set from the shortcut menu. 3. In the modifiable status, select the Lock the Role Set check box. 4. Click OK to lock the role set. Note: If login users assigned with that role set will be prompted with a Confirm message box. Click OK button to exit the client, and the login dialog box is displayed again. After logging in again, the user assigned with the locked role set cannot perform the operations specified in that role set. – End of Steps – 6.5 Operation Set Management An operation set is a collection of operation permissions assigned to a role. You can assign one operation set to a role. The role assigned with an operation set is permitted to perform all operations specified in this operation set. The U31 R22 supports the following functions for operation set management. l l l l l l View an Operation Set: view the information of an operation set, including its name, description, and operation assignment. Create an Operation Set: set the name, description and permitted operations to create an operation set. Modify an Operation Set: modify the description and operation assignment of an operation set. Duplicate an Operation Set: create a similar new operation set by duplicating an existing operation set and modifying some properties. Delete an Operation Set: delete a useless operation set from the list. View All Permitted Operations: view all permitted operations of an operation set. 6-20 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management l l Export an Operation Set: export the information of all operation sets to an Excel (*.xls) file. Import an Operation Set: import an operation set from an Excel (*.xls) file to create an operation set. Note: Administrator Right, System Maintenance Right, Operation Right, View Right, and No Right are predefined operation sets in the system. Users cannot modify or delete them. 6.5.1 Creating an Operation Set This procedure describes how to create a new operation set and assign operation permissions to it. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. Select a role in the left navigation tree. 3. Right-click an operation set in the operation set pane, and select Create an Operation Set from the shortcut menu. The Create an Operation Set dialog box is displayed. 4. Set parameters for creating an operation set. For the parameter descriptions, refer to Table 6-4. Table 6-4 Parameter Descriptions for Creating an Operation Set Parameters Description Operation Set Name Enter the name of the operation set. Operation Set Description Enter the description of the operation set. Operation Tree Assign operation permission by selecting specific nodes on the operation tree. l Select a parent node, and all its child nodes will be selected. l Select a child node, and its parent node will be selected at the same time. l Enter keywords in input search text text box, and click button to display the tree nodes with the typed keywords. 5. Click OK. – End of Steps – 6-21 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 6.5.2 Viewing the Information of an Operation Set This procedure describes how to view the description and operation assignment of an operation set. Prerequisite The operation set to be viewed is available in the system. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. Select a role in the left navigation tree. 3. In the right pane, right-click the operation set to be viewed, and select Browse Operation Set from the shortcut menu. The Browse the Operation Set dialog box is displayed. 4. View the operation set information. – End of Steps – 6.5.3 Modifying an Operation Set You can only modify customized operation set, including its description and assignment. Note that the name cannot be modified. Prerequisite The operation set to be modified is available in the system. Context You have no right to modify the following default operation sets: l l l l l Administrator Right System Maintenance Right Operation Right View Right No Right Note: When an operation set is modified, users assigned with that operation set will be required to log in again. If an operation set is deleted, the role(s) assigned with the operation set will be assigned with No Right permission, that is, they cannot perform any operation. 6-22 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. Select a role in the left navigation tree. 3. In the right pane, right-click the operation set to be modified, and select Modify Operation Set from the shortcut menu. The Modify Operation Set dialog box is displayed. 4. Set parameters, including Operation Set Description and new assignment of operation permissions. Note: For specific description of parameters, refer to 6.5.1 Creating an Operation Set. 5. Click OK. – End of Steps – 6.5.4 Duplicating an Operation Set By duplicating an existing operation set, you can quickly create a new operation set similar to the existing one by modifying some information of the existing one. Prerequisite The operation set to be duplicated is available in the system. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. Select a role in the left navigation tree. 3. In the right pane, right-click the operation set to be duplicated, and select Duplicate the Operation Set from the shortcut menu. The Duplicate the Operation Set dialog box is displayed. 4. Set parameters, including General Information and Operation Set Configuration Information (selecting the operation nodes in the tree). Note: For specific description of parameters, refer to 6.5.1 Creating an Operation Set. 6-23 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 5. Click OK. The duplicated operation set is displayed in the operation list. – End of Steps – 6.5.5 Deleting an Operation Set This procedure describes how to delete a useless operation set. Prerequisite The operation set to be deleted is available in the system. Context When an operation set is deleted, roles assigned with that operation set will have No Right operation permission. When an operation set is deleted, users assigned with relevant role(s) will be required to re-log in. You have no right to modify the following default operation sets: l l l l l Administrator Right System Maintenance Right Operation Right View Right No Right Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. Select a role in the left navigation tree. 3. In the operation set list, right-click the operation set to be deleted, and select Delete Operation Set from the shortcut menu. The Confirm message box is displayed. 4. Click Yes. – End of Steps – 6.5.6 Viewing All Permitted Operations of an Operation Set This procedure describes how to view all permitted operations of an operation set. Prerequisite The operation set to be viewed is available in the system. 6-24 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. Select a role in the left navigation tree. 3. In the right pane, right-click the operation set to be viewed, and select View All Operations from the shortcut menu. The View All Operations dialog box is displayed. 4. View permitted operations by clicking tree nodes. – End of Steps – 6.5.7 Exporting Customized Operation Sets This procedure describes how to export customized operation sets. You can only export the operation sets to an Excel (*.xls) file. Prerequisite The operation set to be exported is available in the system. Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. In the right pane, right-click the operation set to be exported, and select Export All Customized Operation Sets from the shortcut menu. The Save dialog box is displayed. 3. Set the path for saving the customized operation sets and file name. 4. Click Save. – End of Steps – 6.5.8 Importing an Operation Set This procedure describes how to import an operation set. You can only import operations sets from a *.xls file. Be sure that the content format of the file to be imported is the same as the format of the *.xls file generated when you export all operation sets. Prerequisite The file to be imported is available. 6-25 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. From the main menu, select Security > Role Management. The Role Management window is displayed. 2. Select a role in the left navigation tree. 3. Right-click the operation list, and select Import Operation Sets from the shortcut menu. The Open dialog box is displayed. 4. Select the file to be imported. 5. Click OK. The imported operation sets are displayed in the operation list in the right pane. – End of Steps – 6.6 Department Management The concept of department is used in the U31 R22 system to manage users in accordance with their actual administrative divisions. In practical applications, you can create departments in accordance with the functions of actual network management departments so as to manage departments where users belong. 6.6.1 Creating a Department The system provides a root department by default. All newly-created departments are subordinates of the root department. Steps 1. From the main menu, select Security > User Management. The User Management window is displayed. 2. Right-click the Root Department node in the navigation tree, and select New Sub-department from shortcut menu. 3. Set parameters on the Basic Information tab. For the parameter descriptions, refer to Table 6-5. Table 6-5 Parameter Descriptions for Creating a Department Parameter Description Value Range Default Value Department Name Enter the name of the 1-50 character(s) "New Department" + new department. (Mandatory) Number (Sequence number of newly created department) Department Enter the description 1-100 character(s) Description of new department. (Optional) None 6-26 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management Parameter Description Value Range Default Value Superior Department Select the superior Select from the tree Current department department for the new department. Note: For the description of the user that belongs to the department, refer to 6.7.1 Creating a User. 4. Click OK. A new department is created. – End of Steps – 6.6.2 Modifying a Department This procedure describes how to modify the properties of an existing department, including the department name, description and superior department. You can also view the properties of the department in modification process. Prerequisite The department to be modified is created. Context You can modify the name of the default Root Department provided by the system as required. Steps 1. From the main menu, select Security > User Management. The User Management window is displayed. 2. Right-click the department to be modified on the department tree, and select Modify from the shortcut menu. 3. In the right pane, modify Basic Information, including Department Description and its root department. Note: For specific description of parameters, refer to 6.6.1 Creating a Department. 6-27 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 4. Click OK. – End of Steps – 6.6.3 Deleting a Department This procedure describes how to delete a department. If the department to be deleted is assigned to a user or it has sub-departments, it cannot be deleted. Therefore, make sure that the department is not assigned and its sub-departments have been deleted before deleting a department. Prerequisite The department to be deleted is created. Steps 1. From the main menu, select Security > User Management. The User Management window is displayed. 2. Right-click the department to be modified in the department tree, and select Delete from the shortcut menu. The Confirm message box is displayed. 3. Click Yes. – End of Steps – 6.7 User Management User management is the most important part of security management. By using user management functions, the system administrator can create users, query the information of users, modify users, assign rights to users, set the working period for users, query the login logs of users, delete users, and lock users. In actual operation, you can use the name and password of a created user to log in to the U31 R22 system and perform network management operations that are consistent with the operation authorities assigned to the user. You can only view the authorized NEs and perform the corresponding operations on these NEs. The unauthorized NEs are not visible. 6.7.1 Creating a User When setting user name and password for a new user, the system administrator can also set the validity period (days) of the account and password, the roles or role sets assigned to the user, the department that the user belongs to and the maximum login number of a same user account. 6-28 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management Steps 1. From the main menu, select Security > User Management. The User Management window is displayed. 2. Right-click a department node in the Root Department navigation tree, and select New User from the shortcut menu. 3. Click Basic Information tab to set parameter. For the parameter descriptions, refer to Table 6-6. Table 6-6 Parameter Descriptions of the Basic Tab Parameter Description Value Range Default Value User Name Enter the login user 1-50 character(s), "New User" + Number name of the new user. Mandatory (Example: New User1) Full Name Enter more detailed 1-100 character(s) None Set the login 1-100 character(s), None password. The the password password length must length must meet meet the requirement the minimum limit specified by security specified in "user policy settings (user account rule" of account rule). security policy. Enter the same 1-100 character(s) None Select the check box None Select the check box None user information. User Password Confirm Password password again to confirm the password set in User Password. User Must Modify Select the check box Password Before to require the user to Next Login modify the password before logging in to the system the next time. User Can Not Change Password Select the check box to forbid the user to modify the password. 6-29 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Description Value Range Default Value Set User Maximum Enter the validity days 1-500 None Password Age (days) of user password. If 1-499 None the password exists beyond that period, the user must modify the password. Set User Minimum Enter the validity days Password Age (days) of user password. If the password exists within that period, the user must not modify the password. Disable Disable a user name Select the check box None Minimum Password The minimum 0-20 None Length password length set 6-20 None 0-100 None Select the check box None 1-500 None 1-500 None by the user. Maximum Password The maximum Length password length set by the user. Cannot Be Last Used The password cannot Password(s) be the same as the recent passwords within the specific times. Temporary User Specifies whether the user to be the temporary user. Auto Disable Limit In Enter a number of Case Of Idle Account days. If the user (days) account is idle for that number of days, the account will be disabled automatically. Set Account Validity The user account will (days) be valid only for the number of days you set here. 6-30 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management Parameter Description Value Range Default Value User Status Display information None Not Selected 0-20 3 of the user account, including its creator, creating time, and the password activation time. Lock at Password If the entered Error passwords are wrong within the specific times, the user will be locked. 4. Click the Right tab to assign role(s) or role set(s) to the user. 5. Click the Log View Range tab to select the logs that the user can view. 6. Click the User Department tab to select the department which the user belongs to. l l Note: You can assign a user to only one department. The default department for a new user is "Root Department". 7. Click the Advanced Information tab to set additional information of the user. For the parameter descriptions, refer to Table 6-7. Table 6-7 Parameter Descriptions of the Advanced Information Tab Parameter Description Value Range Default Value User Descriptions Enter the detailed information 1 to 100 characters. None Phone number of the new 1-50 numbers or hyphens None user "-", optional E-mail address of the new A legal E-mail address of user 1-100 characters, optional Maximum number of 1-255 10 Password Password of the user to be created. Phone Number Email Concurrent Logins None concurrent login users that use the same user account. Login Type Login type 6-31 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Description Value Range Default Value User Working Time IP Range Set or view the allowable Click Set Or View button working hours of the user by to set allowable working days in a week. hours. The allowable IP range from 0.0.0.1-255.255.255.255 None - None None which the user can log in. GUI MAC Binding The allowable MAC address Setting of the client equipment from which the user can log in. 8. Click OK. A new user is created. – End of Steps – 6.7.2 Modifying a User This procedure describes how to modify the properties of a created user. All the properties of a user except the user name can be modified. You can also use this operation to view the user properties. Prerequisite The user to be modified has been created. Context l l For the default "admin" user created by the system, the system administrator can modify such information as the password by using this function. However, some of the properties cannot be modified for the "admin" user. For example, the working time must be valid in all time, and the user cannot be disabled. If the authorizations of the login user are modified, the user will be forced to log out. After re-logging in to the system, the user's authorities are updated. Steps 1. From the main menu, select Security > User Management. The User Management window is displayed. 2. Right-click the user to be modified in the left navigation tree, and select Modify from the shortcut menu. 3. Modify the user properties in the right pane. 6-32 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management Note: For specific description of parameters, refer to 6.7.1 Creating a User. 4. Click OK. – End of Steps – 6.7.3 Duplicating a User The system provides user duplication function for the convenience of creating similar users. This function uses the existing user as a template, based on which new users can be created, thus making the creation of new users easier. Prerequisite The user to be duplicated has been created. Steps 1. From the main menu, select Security > User Management. The User Management window is displayed. 2. Right-click a user to be duplicated in the left tree, and select Duplicate from the shortcut menu. 3. Modify the user properties in the right pane. Note: For description of parameters, refer to 6.7.1 Creating a User. 4. Click OK. A new user will be created based on duplication. – End of Steps – 6.7.4 Deleting a User The system administrator can delete useless users. Prerequisite The user to be deleted is available. 6-33 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Context l l The system administrator ("admin" ) cannot be deleted. If the login user is deleted, the user will be forced to log out. Using the deleted user to log in later, you will be prompted that the user does not exist. Steps 1. From the main menu, select Security > User Management. The User Management window is displayed. 2. Right-click the user to be deleted on the department tree, and select Delete from the shortcut menu. The Confirm message box is displayed. 3. Click Yes. – End of Steps – 6.7.5 Viewing Rights This procedure describes how to view a user’s operation rights for specified resources of the NMS. Steps 1. From the main menu, select Security > User Management. The User Management window is displayed. 2. In the Root Department navigation tree, right-click the user whose rights are to queried, and select View Rights from the shortcut menu. The View Rights dialog box is displayed. 3. Select a resource from the Resource Tree navigation tree. The user’s operation rights for the resource are displayed in the Rights of User admin area. – End of Steps – 6.7.6 Comparing Rights This procedure describes how to compare two users’ operation rights for the resources managed by the NMS. Steps 1. From the main menu, select Security > User Management. The User Management window is displayed. 2. In the Root Department navigation tree, right-click a user, and select Compare Rights from the shortcut menu. The Compare Rights dialog box is displayed. 3. Select another user for comparison, and click OK. The Compare Rights dialog box is displayed. 6-34 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management 4. Select a resource from the Resource Tree navigation tree. The two users’ operation rights for this resource are displayed in the Rights of User areas. – End of Steps – 6.7.7 Exporting Rights This procedure describes how to export a user’s operation rights for all the resources to the local computer. Steps 1. From the main menu, select Security > User Management. The User Management window is displayed. 2. In the Root Department navigation tree, right-click the user whose operation rights you want to export, and select Export Rights from the shortcut menu. The Save dialog box is displayed. 3. Set a name for the file, and click Save. A message box is displayed. 4. Click OK. – End of Steps – 6.8 Other Functions 6.8.1 Viewing User Lockup Records The user account rules define conditions for locking users, that is, the number of times incorrect passwords are entered. If a user input the wrong password for up to the specified times, the account will be locked. The system administrator can view user lockup records and unlock users. Steps 1. From the main menu, select Security > User Lock Details. The User Lock Details dialog box is displayed. 2. To unlock the user, click Unlock. The user is thus unlocked and can re-log in to the system. 3. Click Refresh to obtain the latest information of locked user accounts. 4. Click Close. – End of Steps – 6-35 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 6.8.2 Modifying the Passwords of Common Users in Batches This function can only modify the ordinary user’s password, and is limited by weak password and password modification security restriction. However, if a user belongs to the role of system administrator, then its password will not be changed. Steps 1. From the main menu, select Security > Batch Modify Common Users' Passwords. The Batch Modify Common Users' Passwords dialog box is displayed. 2. Set a new password, and select the users that require password modification. 3. Click OK. – End of Steps – 6.8.3 Managing Login Users This function allows you to view the information of login users, including the IP address, login time, and login type. You can also send a message to them or force them to log out. Steps 1. From the main menu, select Security > Login User Management. The Login User Management dialog box is displayed. 2. Select a login user, and perform the following operations as required. To... Do... Force the login user to exit the Click Force To Logout to force a user to log out. After that, system the user can log into the system immediately. Send message to the login user Click Send Message to send the message to the login user. Refresh the login user list Click Refresh button to request information of login users again from the server. – End of Steps – 6.8.4 Setting User Blacklist Only system administrator is authorized to set the blacklist. The users in the blacklist cannot log in to the system. Steps 1. From the menu bar, select Security > User Blacklist. The User Blacklist dialog box is displayed. 2. From the All users list, select the user(s) to be added to the black list. 3. Click to add the user(s) to the blacklist. 6-36 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 6 Security Management 4. Click OK. A message box is displayed. 5. Click OK. Note: Select users in the blacklist (in the right box) and click the blacklist. button to remove them from – End of Steps – 6.8.5 Cleaning up Accounts This procedure describes how to disable or delete the accounts of the U31 R22 system through the account cleanup function. Steps 1. In the operation window of the U31 R22, select Security > Clean Up Accounts. The Clean Up Accounts dialog box is displayed. 2. On the Disabled Accounts or Accounts to Be Deleted tab, select the accounts to be disabled or deleted. Note: If you select Disable accounts that are idle in the last 60 day(s) in the Account Cleanup Conditions area, this step is not required. a. Select the accounts to be disabled or deleted from the Matching Accounts area. b. Click to add the users to the area on the right. 3. Click OK. A message box is displayed. 4. Click OK. – End of Steps – 6.8.6 Setting User Login Mode The U31 R22 NMS supports multiple-user and single-user login modes. By default, multiple-user login mode is used. This procedure describes how to set user mode to single-user login mode. 6-37 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Prerequisite At least one client is successfully connected to the server. Context If multiple users are logging in to the system at the same time, you can set a single user login mode through the client and the system will force to disconnect other users. Steps 1. In the operation window of the U31 R22, select Security > Set User Login Mode. The Set User Login Mode dialog box is displayed. 2. Select the Single user login mode check box. 3. Click OK. The Confirm message box is displayed. 4. Click OK. – End of Steps – 6.8.7 Setting specified Time for Auto-Logout This procedure describes how to set specified auto-logout time. If no operation is performed within the specified time, the client will be automatically logged out of to prevent unprofessional personnel from using the client. Steps 1. From the main menu, select Security > Set Logout Idle Time. The Set Logout Idle Time dialog box is displayed. 2. In the Automatically log out after text box, enter a number. 3. From the All Users list, select the users that you want to set auto-logout time for. 4. Click to add these users to the right Selected Users list. 5. Click OK. A message box is displayed. Click OK. – End of Steps – 6-38 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 7 Log Management Table of Contents Overview of Log Management....................................................................................7-1 Introduction to Log Management View........................................................................7-2 Managing Logs by Type .............................................................................................7-2 Customizing Log Query ..............................................................................................7-7 Maintaining Logs ......................................................................................................7-13 7.1 Overview of Log Management Log management provides effective tools for the system administrator to track the operation status of the system, locate system faults, and trace the operations of users. Common users can also use log management function to review previous operations and oversee the working status of the system. Log management enables you to record and manage logs. By using log management operations, you can query and back up logs, and view the details of logs. You can also get the needed logs by setting filter conditions. Logs are classified into three types by content: operation logs, security logs and system logs. l Operation Log Operation logs record operation information, including log ID, operation level, user name, operation name, host address, command function, operation details, operation result, cause of operation failure, connection mode, operating object, starting time, ending time and the information of related logs. l Security Log Security logs record the login information of users, including log ID, user name, host address, log name, operation time, access mode and details. l System Log System logs record the completion state of scheduled tasks on the server, including log ID, operation level, source, log name, details, host address, starting time and ending time of tasks. Only users with relevant rights can perform log management operations. 7-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 7.2 Introduction to Log Management View Do one of the following to open the Log Management view: l On the menu bar of the client window, click Security > Log Management. l button. On the Common toolbar of the client window, click The window with Log Management view includes five main parts, see Figure 7-1. Figure 7-1 Log Management View 1. Main Menu Bar 2. Common Toolbar 3. Log Management Toolbar 4. Log Management Pane 5. Log Navigation Tree 7.3 Managing Logs by Type 7.3.1 Viewing Log Records The system supports the query of logs of current date or all logs by their types. Steps 1. Perform one of the following to open the Log Management window. l From the main menu, select Security > Log Management. l On the toolbar, click the button. 7-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 7 Log Management 2. In the Log Management tree in the left pane, double-click any node, or right-click any node, and select Run from the short menu. The corresponding log information is displayed in the right pane of Log Management. – End of Steps – Related Tasks Refreshing logs: click . The latest operation logs are displayed. 7.3.2 Querying Operation Logs This procedure describes how to filter operation logs by user, period, or operation information. Steps 1. From the main menu, select Security > Query Operation Log. The Set Operation Log Query Conditions dialog box is displayed. Setting Query Conditions on the Basic Tab 2. In the User Information area, set the following query conditions as required. To... Do... Query the operation logs of a specified user . The Select User dialog Click box is displayed. Select the user whose operation logs you want to query. Query the logs of operations performed on a specified host . The Select Host Click Address dialog box is displayed. Select the IP address of the host whose operation logs you want to query. Click OK. 3. In the Operation Start Time area, perform one of the following operations. To... Do... Query the operation logs within a specified period Click the Range option button. Set the start time and the end time. Query the operation logs within specified days Click the Latest option button. Set the number or weeks of days or weeks. 4. In the Operation Information area, perform the following operations as required. 7-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To... Do... Query the logs of specified operations performed Select the Operation: User initiated check box. Click Select. From the Operation Tree list, select the desired operation types. Click OK. Query the logs of operations performed on specified resources Select the Operation Resource check box. Click Select. In the displayed Select Operation Resource dialog box, select the desired resources. Click OK. Query operation logs by resource address Click Select next to Resource Address. The Select Resource Address dialog box is displayed. Select the IP addresses. Click OK. Query operation logs by operation result From the Operation Result list, select a condition. Query operation logs by failure cause Enter specified fields for a fuzzy query. Setting Query Conditions on the Advanced Tab 5. In the Other Information area, set the parameters. a. Select a connection mode from the Connection Mode list. b. Select All, 1-Very Important, 2-Important, 3-Notice or 4-Normal from the Rank list. c. In the Detail text box, enter specified fields for a fuzzy query. 6. After setting the conditions, click OK. – End of Steps – 7.3.3 Querying Security Logs This procedure describes how to query security logs of a specified user or host of the NMS. Steps 1. From the main menu, select Security > Query Security Log. The Set Security Log Query Conditions dialog box is displayed. Setting Query Conditions on the Basic Tab 2. In the Source Information area, set the following query conditions as required. 7-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 7 Log Management To... Do... Query security logs by user name Click . The Select User dialog box is displayed. Select the user whose security logs you want to query. Query security logs by host address Click . The Select Host Address dialog box is displayed. Select the IP address of the host the security logs of which you want to query. Click OK. 3. In the Operation Start Time area, perform one of the following operations as required. To... Do... Query the security logs within a specified period Click the Range option button. Set the start time and the end time. Query the security logs within specified days or Click the Latest option button. Set the number weeks of days or weeks. 4. In the Log Name Information area, click . In the displayed Select a log name dialog box, select a log name and then click OK. Setting Query Conditions on the Advanced Tab 5. In the Other Information area, set the parameters. a. Select a connection mode from the Connection Mode list. b. In the Detail text box, enter specified fields for a fuzzy query. 6. After setting the conditions, click OK. – End of Steps – 7.3.4 Querying System Logs This procedure describes how to query system logs including logs of operations that users perform on the NMS or NEs, and logs that are automatically generated. Steps 1. From the main menu, select Security > Query System Log. The Set System Log Query Conditions dialog box is displayed. Setting Query Conditions on the Basic Tab 2. In the Source Information area, set the following query conditions as required. 7-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To... Do... Query system logs by source Click . The Select Log Source dialog box is displayed. Select a desired source. Query system logs by log name Click . The Select Log Name dialog box is displayed. Select a desired log name. Click OK. 3. In the Operation Start Time area, select either of the following query conditions as required. To... Do... Query the system logs within a specified period Click the Range option button. Set the start time and the end time. Query the system logs within specified days or Click the Latest option button. Set the number weeks of days or weeks. 4. In the According to Names area, click . In the displayed Select Host Address dialog box, select the desired host IP address. Click OK. Setting Query Conditions on the Advanced Tab 5. In the Other Information area, set the parameters. a. Select a rank from the Rank list. b. In the Detail text box, enter specified fields for a fuzzy query. 6. After setting the conditions, click OK. – End of Steps – 7.3.5 Refreshing Logs This procedure describes how to refresh log information. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 2. In the Log Management tree in the left pane, double-click All Operation Log to display all logs on the current tab. 3. Click . The latest operation logs are displayed. – End of Steps – 7-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 7 Log Management 7.3.6 Querying Log Information This procedure describes how to query all the operation logs. For how to query all system logs and security logs, refer to this procedure. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 2. In the Log Management tree in the left pane, double-click All Operation Log to display all logs. 3. Enter a keyword in the Enter the keyword to filter text box. The relevant results are displayed on the current tab. Note: You can also search for specific logs one by one as follows: click on the toolbar, enter a keyword in the displayed Find dialog box, and click Find Next. – End of Steps – 7.4 Customizing Log Query 7.4.1 Customizing a Log Query Condition You can customize a log query condition of one type according to the preset conditions, such as user name, host address, time range, and log name. Context This procedure uses operation log query as an example, and the security log query conditions and system log query conditions can be set in the similar way. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 2. In the Log Management tree in the left pane, right-click Custom Query, and then select New Operation Log Query from the shortcut menu. The Set Operation Log Query Conditions dialog box is displayed. 7-7 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Note: The parameters in Set Operation Log Query Conditions dialog box are a little different when you select New Security Log Query or New System Log Query in step 2. 3. Set query parameters on the Basic tab. For the parameter descriptions, refer to Table 7-1. Table 7-1 Description of Parameters on the Basic Tab Applicable Log Parameters Description User Name Enter or select a user name for querying related Type Operation Log Security Log Operation Log logs. Host Address Enter or select an IP address for querying related Security Log logs. System Log Operation Log From Select operation starting time. To Select operation ending time. Operation: User Select to query specific types of user initiated initiated operations. Operation Select to query operation resource. Security Log System Log Security Log System Log Operation Log Operation Log Resource Operation Log Resource Address Fuzzy match by address. Operation Log Operation Result Select an operation result as a query condition from corresponding drop-down list box. The following options are available: Operation Log Failure Reason l All l Successful Operation l Failed Operation l Unfinished Operation Enter a character string in corresponding box. The system will search for logs whose failure reason fuzzily match the character string. Security Log Log Name Click corresponding Select button and then select System Log a log name as a query condition in the displayed Select Log Name dialog box. 7-8 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 7 Log Management 4. Click the Advanced tab to set advanced parameters. For the parameter descriptions, refer to Table 7-2. Table 7-2 Description of Advanced Query Parameters Applicable Log Parameters Description Type Operation Log Connection Select the connection mode of the client. The following Security Log Mode options are available: Operation Log Rank l All l GUI l TELNET l SSH l North Access l ERT Select different levels of importance for querying logs. The following options are available: System Log Rank l All l 1–VERY IMPORTANT l 2–IMPORTANT l 3–NOTICE l 4–NORMAL Select different levels of importance for querying logs. The following options are available: Operation Log Detail l All Rank l 1–EMERGENCY l 2–Allert l 3–ERROR l 4–WARNING l 5–NOTICE l 6–INFORMATION Fuzzy match the character string you type in the text box. Security Log System Log 5. Click OK to run the operation log query condition. The queried results are displayed on the relevant tab in Log Management. 6. Close the results tab. The Confirm message box is displayed. 7. Click Yes. The New Query dialog box is displayed. 8. Enter a name in the Query Name text box, and click OK to save the customized query condition. The new query condition is listed under Custom Query in the navigation tree. 9. Click OK. 7-9 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) The user-defined query condition is successfully created and displayed in the log navigation tree. – End of Steps – 7.4.2 Importing Query Conditions You can import query conditions directly from a *.xml file that already specifies the query conditions. After the successful import, a new customized log query condition is displayed. Prerequisite The *.xml file for the importing query conditions is available on the local client. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 2. In the Log Management tree in the left pane, right-click Custom Query and then select Import Query Conditions from the shortcut menu. The Import a Query Condition dialog box is displayed. 3. Select the file to be imported, and then click Open to import the query condition. The imported query condition is displayed under the Custom Query node in the left pane. Note: The imported file must be *.xml format. 4. Right-click the imported query condition, and select Run to show the query results. – End of Steps – 7.4.3 Editing Query Conditions You can change the query conditions set in a customized log query condition as needed. Prerequisite The log query condition to be modified is created. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 2. Right-click a query condition to be modified under Custom Query, and select Edit from the shortcut menu. The Set System Log Query Conditions dialog box is displayed. 7-10 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 7 Log Management 3. Set query parameters on the Basic tab, and click OK to perform the edited query. The results are displayed in the right pane. 4. Close the tab in the Log Management window. displayed. The Confirm message box is 5. Click Yes to save the edited query condition. – End of Steps – 7.4.4 Exporting a Query Condition This procedure describes how to export the query conditions of a customized log query condition to a *.xml file and save the file on the local client. Prerequisite The log query condition to be exported is created. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 2. Right-click a query condition to be exported under Custom Query, and select Export Query Conditions from the shortcut menu. The Export a Query Condition dialog box is displayed. 3. Set a path for saving the file and a file name, and click Save. Note: The query condition can only be exported as a *.xml file. – End of Steps – 7.4.5 Saving a Customized Condition as Another Condition This procedure describes how to save an existing log query condition as another condition. Prerequisite The log query condition to be saved as another one is created. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 7-11 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2. In the Log Management tree in the left pane, right-click the log query condition and then select Save As from the shortcut menu. The Save Query As dialog box is displayed. 3. Enter the new name, and click OK. A new log query condition is displayed under Custom Query in the Log Management tree, containing the same query conditions as the original one. – End of Steps – 7.4.6 Deleting a Customized Log Query Condition This procedure describes how to delete a customized log query condition. Prerequisite The log query condition to be deleted is created. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 2. In the Log Management tree in the left pane, right-click a query condition to be deleted under Custom Query, and select Delete from the shortcut menu. The Confirm message box is displayed. 3. Click OK. The deleted log query condition is removed from the Log Management tree. – End of Steps – 7.4.7 Renaming a Customized Log Query Condition This procedure describes how to rename a customized log query condition. Prerequisite The log query condition to be renamed is created. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 2. In the Log Management tree in the left pane, right-click Custom Query and then select Rename from the shortcut menu. The Rename Query dialog box is displayed. 3. Enter the new name, and click OK. The name of selected customized log query condition changes accordingly. – End of Steps – 7-12 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 7 Log Management 7.5 Maintaining Logs 7.5.1 Automatically Exporting Logs to a File This procedure describes how to export logs to a file in the remote or local server by using the Log Output Config node in the navigation tree. Context The U31 R22 provides two file transfer modes: l l File Transfer Config is used for scheduled export. If you set parameters in the transfer mode of File Transfer Config, the system will carry out the query based on the query condition you specify at planned time. The query result will be exported to a designated file on the server. Syslog Config is used for real-time export. If you set parameters in the transfer mode Syslog Config, the system will carry out the query immediately. The query result will be exported to a designated file on the server. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 2. In the Log Management tree in the left pane, double-click Log Output Config. The Log Output Config tab is displayed in the right pane. 3. Select a transmission mode. 4. Click the Modify button. 5. Set the file transfer configuration parameters. For the parameter descriptions, refer to Table 7-3. Table 7-3 Parameter Descriptions for File Transfer Mode Configuration Transmis- Parameter Description Log Type Select the log type(s) you want to export from the check boxes, sion Mode File Transfer Config including: l Operation Log l Security Log l System Log Click the Edit Query Condition button after each log type to set the query condition. For this setting, refer to 7.4.1 Customizing a Log Query Condition. File Type Choose the exporting file type from the drop-down box. The Choose options include: l TXT l Xml 7-13 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Transmis- Parameter Description sion Mode l EXCEL l CSV Output to Select the check box to set the remote server information, Remote Server including: l File Transfer Protocol: designate the file transfer protocol (FTP or SFTP) l Host Server: Address of the remote host server l Port: Remote server port l User Name: Login user name l User Password: Login password l Remote Service Path: Designates the path of the remote server. Click the Please Choose button to choose the path the path of the remote server. Output to Local Select the check box to export logs to local server. Click Please Server Choose to select a path. Planning Type How often you want to export logs, including the following options: Syslog l Every Hour l Every Day Execute Time Set the executing time for exporting plan. Log Type Select the types of logs you want to export. The check box Config options include: Syslog Server l Operation Log l Security Log l System Log IP Address of Syslog Server Address Syslog Server Syslog Server Port Port Character Select a character set from the drop-down box for the output file. The options include: l ASCII l GB2312 l GBK l ISO-8859-1 l Unicode l UTF-8 6. Click OK. 7-14 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 7 Log Management 7. (Optional) To cancel auto-export of log information, click Clear Configurations. – End of Steps – 7.5.2 Manually Exporting Logs to a File The procedure describes how to export the queried logs from the system to a *.txt, *.htm, *.pdf, *.xml, *.prn, *.xls, *.xlsx or *.csv file and save the file on the local client. Context This procedure uses all operation logs as an example, and the other logs are exported in the same way. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 2. In the Log Management tree in the left pane, double-click All Operation Log, or right-click All Operation Log and select Run from the shortcut menu. The operation logs are displayed in the right pane. 3. On the toolbar, click the button. The Save dialog box is displayed. 4. Set the path for saving the file, file name, and file type. 5. Click Save. The queried logs based on the current query condition are exported into the specified file. – End of Steps – 7.5.3 Printing Logs This procedure describes how to print out Today’s Operation Log on a paper. Prerequisite The connection between the client and the printer is normal. Context This procedure uses all security logs as an example, and the other logs are printed in the same way. Steps 1. From the main menu, select Security > Log Management. The Log Management window is displayed. 2. In the Log Management tree in the left pane, double-click any node, such as All Security Log. The logs based on the current condition are displayed in the right pane. 7-15 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3. On the Log Management toolbar, click . The Print Setting dialog box is displayed. 4. Set parameters on the General tab. For the parameter descriptions, refer to Table 7-4. Table 7-4 Parameter Descriptions on the General Tab Parameter Description Name Select a connected printer. Print Range Select the printing range of pages. The options include: l All: print all pages. l Pages (to): set the specific range of pages. Copies Enter the number of copies. 5. Click the Page Setup tab, and set parameters on the Page Setup tab. For the parameter descriptions, refer to Table 7-4. Table 7-5 Parameter Descriptions on the Page Setup Tab Parameter Description Paper Size Select the printing paper size. The A4 value is recommended. Orientation Select the orientation. The options include: Margins l Portrait: vertical l Landscape: horizontal Set the position of text body on paper (Unit: mm). 6. Click the Advanced tab, and set parameters on Advanced tab. There are three printing styles: Recommended Setup, Typical Setup, and Simple Setup. Logs are printed in columns. You can select one of the following display modes as required: l l l Hide Column Name Show Column Name in First Page Show Column Name in Every Page The columns on the page are sorted first if you select the Vertical Pages Priority check box. You can select one of the three printing styles: Recommended Setup, Typical Setup, and Simple Setup. Or you can select in accordance with needs. 7-16 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 7 Log Management l l Select the way column names are showed in the printed table: Hide Column Name, Show Column Name in First Page or Show Column Name in Every Page. Select the information you want to display on printed page in the box on the right. 7. Click Preview All to preview the printed page in the displayed Print Preview dialog box. 8. Click . The system starts to print out the log information. – End of Steps – 7-17 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) This page intentionally left blank. 7-18 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 8 NE Data Management Table of Contents Synchronizing Data of the NE.....................................................................................8-1 NE Data Backup and Recovery ..................................................................................8-4 Managing NCP Data ..................................................................................................8-6 8.1 Synchronizing Data of the NE 8.1.1 Uploading the Data This procedure describes how to upload the actual configuration data of the NE to the NMS database so as to cover the data in the NMS database. Prerequisite l l You have the user permissions of "Operator Role" or above. The NE status is "online" and the link status normal. Steps 1. In the Topology Management window, right-click an NE, and select Data Synchronization from the shortcut menu. The Data Synchronization dialog box is displayed. 2. On the Upload tab, and select the data item from the Upload Data Item area. 3. Click Upload. The Confirm message box is displayed. 4. Click Yes. The Upload Progress scroll bar displays the uploading process, and the Result area displays the detailed uploading information. – End of Steps – 8.1.2 Comparing the Data This procedure describes how to compare the configuration data of the NE with the data in the NMS so as to apply the comparison result to the NE maintenance. Prerequisite l You have the user permissions of "Operator Role" or above. 8-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l The NE status is "online" and the link status normal. Steps 1. In the Topology Management window, right-click an NE, and select Data Synchronization from the shortcut menu. The Data Synchronization dialog box is displayed. 2. Click the Compare tab. 3. Select the NE from the Please select NE(s) list. 4. Select the data item from the Compare Data Item area. 5. (Optional) Select the Show Inconsistent Data Only check box to display the inconsistent data items in the comparison result. Otherwise, all the compared data items will be displayed. 6. Click Compare. The Compare Progress scroll bar displays the data comparison process, and the Result area displays the detailed comparison information. – End of Steps – 8.1.3 Downloading the Data This procedure describes how to download the data in the NMS database to the actual NE so as to cover the data in the NE. Prerequisite l l You have the user permissions of "Operator Role" or above. The NE status is "online" and the link status normal. Context Caution! Downloading the data may interrupt the service. Steps 1. In the Topology Management window, right-click an NE, and select Data Synchronization from the shortcut menu. The Data Synchronization dialog box is displayed. 2. Click the Download tab. 3. Select the NE from the Please select NE(s) list. 8-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 8 NE Data Management 4. (Optional) Select the NCP board from the Select NE list. 5. Select the data item from the Download Data Item area. 6. Click Download. The Confirm message box is displayed. 7. Click Yes. The Download Progress scroll bar displays the downloading process, and the Result area displays the detailed downloading information. – End of Steps – 8.1.4 Setting Automatic Uploading Comparison The automatic uploading comparison function supports the timely uploading comparison of the entire network. This function is used to compare the consistency of the NMS and device data when the NMS is being upgraded from T3 or E300 to U31. Steps 1. In the operation window of the U31 R22, select Maintenance > BN NE Maintenance > consistency management > Auto Uploading Compare Configuration. The Auto Uploading Compare Configuration window is displayed. 2. Set a policy for the automatic uploading comparison. a. Enter a period for executing the task in the Execute Policy text box. b. Set a start time for the task. c. Click the Active option button. 3. Click Apply. A message box is displayed. 4. Click OK. l l Note: This function is used only for NMS upgrade from T3 or E300 to U31. By default, this function is disabled on U31 to prevent onsite data conflict. After the system completes a comparison task, a message box is displayed, indicating that the task is completed. You can download the comparison result and view it on the local computer. – End of Steps – 8-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 8.2 NE Data Backup and Recovery 8.2.1 Backing Up NE Data This procedure describes how to back up the configuration data of specific NE(s) to the local computer for restoration of historical data in future. Prerequisite You have the user permissions of "Maintenance Role" or above. Context The function is applicable to WDM NEs. Steps 1. In the Topology Management window, right-click the NE whose data is to be backed up, and select Backup and Restore > Backup NE from the shortcut menu. The Backup NE dialog box is displayed. 2. (Optional) To re-select an NE to be backed up, perform the following operations. a. Click the Select NE button. The Resource Selector dialog box is displayed. b. Select the NE to be backed up, and click OK to return to the Backup NE dialog box. 3. In the File Name text box, enter the name of the backup file. 4. In the File Directory text box, enter the storage path of the backup file. 5. (Optional) In the Description text box, enter the description of the backup file. 6. Click Backup. The NE data starts to be backed up. The Progress Info shows the detailed backup process. The Progress bar shows the percentage of completion. After the backup is completed, a Message box is displayed. 7. Click OK. – End of Steps – 8.2.2 Restoring NE Data This procedure describes how to restore the backup configuration data to the database or equipment. Prerequisite l l You have the user permissions of "Maintenance Role" or above. The backup file is available. 8-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 8 NE Data Management Context The function is applicable to WDM NEs. Steps 1. In the Topology Management window, right-click the NE whose data is to be backed up, and select Backup and Restore > Restore NE from the shortcut menu. The Restore NE dialog box is displayed. 2. (Optional) If the selected NE is not the NE whose data is to be restored, click Select NE. The Resource Selector dialog box is displayed. Select the NE to be restored. 3. Click Select File. The Query Backup Information dialog box is displayed. 4. Perform one of the following operations as required. If... Then... In the Select Directory area, The table displays the detailed information of the backup file in Default Directory is selected. the default storage directory. In the Select Directory area, i. Other Directory is selected. In the File Directory entry box, enter the path of the backup file. ii. Click Query. The table displays the detailed information of the backup file in the storage directory. Note: To filter the backup files in the table, select the Only display files with same device type. 5. Click OK to return to the Restore NE dialog box. The Select File, File Directory, Backup IP, and Data Type entry boxes display the data information to be restored. Note: If the backup IP does not need to be restored, you can clear the Restore backup IP check box. 6. Select Restore mode. 8-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l l Note: Restore to database: The backup data is restored to the U31 R22 database. The equipment data is not affected. Restore to device: The backup data is restored to the equipment. The equipment data is overwritten. 7. Click Restore. The NE data starts to be restored. The Progress Info shows the detailed restoration process. The Progress bar shows the percentage of completion. After the restoration is completed, the Message box is displayed. 8. Click OK. – End of Steps – 8.3 Managing NCP Data 8.3.1 Clearing NCP Database This procedure describes how to clear the data saved in the main control board of the NE. After the clearing operation, the main control board has no basic database. You need to download the database. At this moment, the main control board only keeps the IP addresses of the original NEs, and the NMS can still monitor the NEs. Prerequisite l l The NEs are online. You have the user permissions of "Maintenance Role" or above. Context The function is applicable to WDM NEs. Note: After the NCP database is cleared, resetting the board will interrupt the services. Be cautious to use it. Steps 1. In the Topology Management window, right-click an NE, and select NE Management from the shortcut menu. The NE Management window is displayed. 8-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 8 NE Data Management 2. In the NE Operation navigation tree, select NE Operation > NE Data Management > Clear NCP Database. The Confirm message box is displayed. 3. Click OK to clear the NCP database. – End of Steps – 8.3.2 Backing up and Restoring NCP Data This procedure describes how to back up and restore the NCP data of the WDM NEs, including manual backup, auto backup, data recovery, and backup data check. Prerequisite l l The NEs are online and properly communicate with the NMS. You have the user permissions of "Maintenance Role" or above. Context The function is applicable to WDM NEs. Steps 1. From the Topology Management window, select the NE. 2. Right-click the NE, and then select NE Management from the shortcut menu. The NE Management window is displayed. 3. In the NE Operation navigation tree, select NE Operation > Maintenance Management > Backup and Restorement of NCP. The Backup and Restorement of NCP dialog box is displayed. Note: You can also use the following method to display the Backup and Restorement of NCP dialog box. In the Topology Management window, right-click an NE to be restored, and select Backup And Restore > Backup and Restorement of NCP from the shortcut menu. The follow-up operation will be described in the sub-chapter. – End of Steps – 8.3.2.1 Manually Backing up NCP Data This procedure describes how to manually back up the NCP data, and upload the NCP backup data file to the FTP server. 8-7 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. In the Backup and Restorement of NCP dialog box, click the Manual Backup tab. 2. Set NCP backup parameters. For the a description of the parameters, refer to Table 8-1. Table 8-1 Parameter Descriptions for NCP Backup Configuration Parameter Description File Name Name of the NCP backup data file. The format is "NE ID"_"date". Up FTP Whether to upload the NCP backup data file to the FTP server. FTP Protocol Type Type of the FTP protocol FTP IP Ensure that the FTP IP address is valid. FTP Port FTP server port. The value ranges from 1 to 65535. FTP User Name User name to log in to the FTP server. FTP Password Password to log in to the FTP server. FTP Path Path for saving the files in the FTP server. 3. (Optional) To upload the backup data to the FTP server, select the FTP IP\FTP Port\FTP Path keep same as up FTP check box. 4. (Optional) To back up the wason data, select the wason check box. 5. Click Backup. – End of Steps – 8.3.2.2 Automatically Backing up NCP This procedure describes how to automatically back up the NCP data file. The user can back up the NCP data in the specified time. Steps 1. In the Backup and Restorement of NCP dialog box, click the Auto Backup tab. 2. Set NCP backup parameters. For the a description of the parameters, refer to Table 8-2. Table 8-2 Parameter Descriptions for NCP Backup Configuration Parameter Description File Name Name of the NCP backup data file. The format is "NE ID"_"date". Up FTP Whether to upload the NCP backup data file to the FTP server. FTP Protocol Type Type of the FTP protocol FTP IP Ensure that the FTP IP address is valid. 8-8 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 8 NE Data Management Parameter Description FTP Port FTP server port. The value ranges from 1 to 65535. FTP User Name User name to log in to the FTP server. FTP Password Password to log in to the FTP server. FTP Path Path for saving the files in the FTP server. Backup Period (days) Automatic backup period. The value ranges from 1 to 9999. Backup Time Automatic backup time. The value ranges from 00:00:00 to 23:59:59. 3. (Optional) To upload the backup data to the FTP server, select the FTP IP\FTP Port\FTP Path keep same as up FTP check box. 4. (Optional) To back up the wason data, select the wason check box. 5. Click Apply. – End of Steps – 8.3.2.3 Restoring Data This procedure describes how to restore the NCP backup data. The user can select the local backup file or the backup file in FTP. Steps 1. In the Backup and Restorement of NCP dialog box, click the Data Restore tab. 2. Set NCP restoration parameters. For the a description of the parameters, refer to Table 8-3. Table 8-3 Parameter Descriptions for NCP Restoration Configuration Parameter Description Restore From FTP Restore the NCP data from the FTP server. Up FTP Whether to upload the NCP backup data file to the FTP server. FTP Protocol Type Type of the FTP protocol FTP IP Ensure that the FTP IP address is valid. FTP Port FTP server port. The value ranges from 1 to 65535. FTP User Name User name to log in to the FTP server. FTP Password Password to log in to the FTP server. FTP Path Path for saving the files in the FTP server. File Name Name of the NCP backup data file. The format is "NE ID"_"date". Select File Select the file from NCP. It is valid when Restore From FTP is not selected. 8-9 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3. (Optional) To upload the backup data to the FTP server, select the FTP IP\FTP Port\FTP Path keep same as up FTP check box. 4. (Optional) To restore the wason data, select the wason check box. 5. Click Restore. – End of Steps – 8.3.2.4 Viewing Backup Files This procedure describes how to view, print or save the related information of the NCP backup files on the NCP board. Steps 1. In the Backup and Restorement of NCP dialog box, click the View Backup File tab. 2. (Optional) To query the Wason data, select the wason check box. 3. Click Query to query the related information. – End of Steps – 8-10 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 9 NMS DataBackup and Restoration The U31 R22 provides multiple ways of backup and restoration. For details, refer to Table 9-1. Table 9-1 Description of the Backup and Restoration Modes Backup and Description Restoration Mode EMS backup and l restoration l Applies to various scenarios of the bearer network. During the backup and restoration, you must ensure that the objects to be backed up and restored belong to the same version, same scale, and same product component. l Supports auto backup. dbtool backup l Applies to various scenarios of the bearer network. and restoration l Supports cross-version data restoration. The data of the old version can be restored to the new version. l Dose not support auto backup. Note: The backup data of various backup modes are completely different, and cannot be used alternately. Meaning that you cannot user the backup data of the EMS platform as the restoration data of the dbtool. Table of Contents Comparison for Backing Up and Restoring the U31 Data ..........................................9-1 System Backup ..........................................................................................................9-5 System Restoration ..................................................................................................9-15 9.1 Comparison for Backing Up and Restoring the U31 Data You can use the following three modes to back up and restore the data: 9-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l l l U31 EMS dbtool tool Offline tool U31 EMS Mode For the backup and restoration items supported by the U31 EMS, refer to Table 9-2. Table 9-2 Backup and Restoration Items of the U31 System Backup and Restoration Description Item Whole database structure Structures of all the databases used by the EMS (including the structures of all the database objects in the database). Basic data All the basic data of the EMS. This item only backs up data records, but does not back up the historical data such as table structures, historical alarms, notifications, logs, or original performance data. These historical data is backed up by using another backup function. File Version files, operation files, and configuration files of the EMS. Log data Historical data such as operation logs, security logs, and system logs. Alarm data Historical data such as historical alarms and notifications. Performance data Historical data such as original performance data. • The restoration of the whole database structure and files needs the help of the offline tool. The U31 EMS supports the following two backup modes: l Automatic backup The EMS system performs the automatic backup every day by default and manages the backup files in accordance with the directory monitoring conditions set by the directory monitoring. During the automatic backup, the backup files are saved to the EMS server by default or the FTP server that is manually specified. l Manual backup The backup can be executed at any time. Generally, the backup is executed before or after the operations such as software upgrade, system patch loading, and system parameter modification, and user network data modification. During the manual backup, the backup files are saved to the NMS server by default or downloaded to the client computer. dbtool Tool Mode For the backup and restoration items supported by the dbtool tool, refer to Table 9-3. 9-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 9 NMS DataBackup and Restoration Table 9-3 Backup and Restoration Items of the dbtool Tool Backup and Restoration Description Item Basic data All the basic data of the EMS. This item only backs up data records, but not the historical data such as table structures, historical alarms, notifications, logs, or original performance data. There is a separate backup function for these historical data. Offline Tool For the backup and restoration items supported by the offline tool, refer to Table 9-4. Table 9-4 Backup and Restoration Items of the Offline Tool Backup and Restoration Description Item Whole database structure Structures of all the databases used by the EMS (including the structures of all the database objects in the database). The backup for the whole database structure only backs up the table structure of the database. No data record is backed up. Therefore, this item must be used together with the basic data, files, log data, alarm data, and performance data. Basic data All the basic data of the EMS. This item only backs up data records, but not the historical data such as table structures, historical alarms, notifications, logs, or original performance data. There is a separate backup function for these historical data. File Version files, operation files, and configuration files of the EMS. Comparison for the Backup and Restoration Modes For the comparisons of the application scenarios, features, and operation methods of the three backup and restoration methods, refer to Table 9-5. Table 9-5 Application Scenarios for the Backup and Restoration Method Application Scenario Feature Operation Method U31 Supports the backup and l l EMS restoration between the same EMS versions, the The data backup is completed. l same databases, the same the U31 l The backup and restoration speeds are installation components, fast, and the generated and the EMSs of the same files are large. scales. l l EMS Data Backup with EMS Data Restoration with the U31 The data item of During the backup, the whole database ensure that the structure cannot be EMS server and the 9-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Method Application Scenario l Feature Operation Method database are operating restored. The help of properly. the offline tool is needed. During the restoration, ensure that the EMS server is shut down, and the database is operating properly. l dbtool Supports the backup Tool and restoration between restoration are not different EMS versions and completed. Only basic different databases. data can be backed up l During the backup, ensure that the The data backup and or restored. l database is operating The backup and restoration speeds are properly. It is fast, and the generated unnecessary to start file is small. the EMS server. l During the restoration, ensure that the EMS server is closed, and the database is operating properly. Offline Tool Supports the backup and l The data backup restoration between the and restoration is same EMS versions, the not completed. Only same scales, and the same the whole database installation components. structure, basic data, To restore the database and files are backed up structure, the data versions or restored. must be the same. l l The backup and During the backup, restoration speeds are ensure that the EMS slow, and the generated server is shut down files are large. and the database is operating properly. l During the restoration, ensure that the EMS server is closed, and the database is operating properly. 9-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 9 NMS DataBackup and Restoration Note: After you have used the offline tool to restore the whole database structure, you must restore the basic data to ensure normal start of the EMS. Note: The backup data is saved on the file server (FTP/SFTP) of the U31 server by default. On the EMS client, you can select Maintenance > Remote Backup Path Configuration to modify the default remote storage path for the backup files. 9.2 System Backup Backup Period l l Periodical backup: The U31 R22 executes the backup and clears the backup files automatically. For details, refer to 11.1 Task Management. Manual backup: After and before the operations of upgrading software, uploading system patches, modifying system parameters, and modifying user’s network data, you can manually backup the data. Backup Contents l l l l l l Database structure backup: Backs up all the database structures used by the NMS (including all the structures of the database objects). Basic data backup: Backs up all the basic data for NMS. Only backups the data records, rather than table structure, history alarms, notifications, logs, original performance data. Because these historical data have their own backup functions. File backup: Backups up the version files, runtime files, and configuration files for the NMS. Log data backup: Backups operation logs, security logs, and system logs. Alarm data backup: Backups history alarms and notifications. Performance data backup: Backup original performance data. Backup Position The backup data is save in the file server (FTP/SFTP) of the U31 R22 server. You can modify the default system backup position to be the third-party FTP server in NetNumen Config Center. 9-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 9.2.1 EMS Data Backup with the U31 9.2.1.1 Backing Up the Whole DB Structure This procedure describes how to back up the whole database structure. This operation is generally required before upgrading the system. Steps 1. From the main menu, select Maintenance > System Backup and Restore. The System Backup and Restore window is displayed. 2. In the Backup and Restore navigation tree, select Backup > Backup Whole DB Structure. The parameter settings are displayed in the right pane. 3. (Optional) To modify the path for saving the backup file on the server, click the Browse button on the right of Backup File Save Path at Server. . 4. (Optional) To modify the path for saving the downloaded backup file on the client, select the Backup File Download Path at Client check box, and click the Browse button on the right of Backup File Download Path at Client. Note: Select the Backup File Download Path at Client check box to save the backup file on both the server and client. 5. Click Execute to execute whole database structure backup. The Executed Result box displays the backup process. – End of Steps – 9.2.1.2 Backing Up Basic Data This procedure describes how to back up the basic data, which includes transmission network configuration database, NE configuration database, end-to-end database, common platform database, common alarm database, and common performance database. Logs and history alarms do not include historical alarms, notifications, logs, and original performance. Prerequisite You have the right to perform this operation. Steps 1. In the client main menu, select Maintenance > System Backup and Restore. The System Backup and Restore window is displayed. 9-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 9 NMS DataBackup and Restoration 2. In the Backup and Restore navigation tree, select Backup > Backup Basic Data. The parameter settings are displayed in the right pane. 3. (Optional) To modify the path for saving the backup file on the server, click Browse on the right of Backup File Save Path at Server. 4. (Optional) To modify the path for saving the downloaded backup file on the client, select the Backup File Download Path at Client check box, and click Browse on the right of Backup File Download Path at Client. Note: Select the Backup File Download Path at Client check box to save the backup file on both the server and the client. 5. Click Execute to back up the basic data. The Executed Result box displays the backup process. – End of Steps – 9.2.1.3 Backing Up Files This procedure describes how to back up files. Context There are three types of files: version files, configuration files, and runtime files. l l l Version files: files generated on the server except runtime files. For example, par and jar files of the fault management module, third-party files such as lib, *.exe, *.bat and *.sql. Configuration files: files related to configuration generated on the server. including *.property, *.deploy, *.ini and *.lcs files. You should set parameters of these files when installing and maintaining the system. Running files: files generated on the server during the runtime, including those only written on the disk, or cache files, such as .xml files of system performance data and .xml files with command line dynamically loaded. These files are helpful for locating and troubleshooting system faults, but not directly helpful for common users. Note: The backup runtime files do not include log files. 9-7 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. From the main menu, select Maintenance > System Backup and Restore. The System Backup and Restore window is displayed. 2. In the Backup and Restore navigation tree, select Backup > Backup File. The parameter settings are displayed in the right pane. 3. Select data types under Backup content. 4. (Optional) To modify the path for saving the backup file on the server, click the Browse button on the right of Backup File Save Path at Server. 5. (Optional) To modify the path for saving the downloaded backup file on the client, select the Backup File Download Path at Client check box, and click the Browse button on the right of Backup File Download Path at Client. Note: Select the Backup File Download Path at Client check box to save the backup file on both the server and the client. 6. Click Execute button to execute whole database backup. The Executed Result box displays the backup process. – End of Steps – 9.2.1.4 Backing Up and Deleting Log Data This procedure describes how to back up and delete three types of logs: operation logs, system logs, and security logs. Steps 1. From the main menu, select Maintenance > System Backup and Restore. The System Backup and Restore window is displayed. 2. In the Backup and Restore navigation tree, select Backup > Backup and Deletion Log Data. The parameter settings are displayed in the right pane. 3. Set deletion and backup parameters as required. For parameter descriptions, refer to Table 9-6. 9-8 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 9 NMS DataBackup and Restoration Table 9-6 Description of Parameters for Backup and Deletion Parameter Value Range Description Backup and Deletion Back up only, back up Options: Operation and delete, delete only l Back up only: The system will only back up the log data generated during the specified time range. l Back up and delete: The system will back up the log data and then delete the data within the specified time range. l Delete only: The system will only delete the log data generated during specified time range. Backup and Deletion operation log, system Operation Content log, and security log Backup Filter Type All, latest T day(s), T Specify the time range within which the data is backed up. If day(s) ago, latest T you select Latest T Day(s), the log data within the latest T month(s), T month(s) ago days will be backed up. T can be set in the T Time text box. T day(s) ago, latest T Specify the time range within which the data is deleted. If you Delete Filter Type day(s) Select the contents to be backed up and/or deleted. select Latest T Day(s), the performance data within the latest T days will be deleted. T can be set in the T Time text box. Note: The time specified in the filtering type uses the reference clock in the time zone where the server is located. 4. (Optional) To modify the path for saving the backup file on the server, Click the Browse button on the right of Backup File Save Path at Server. 5. (Optional) To modify the path for saving the downloaded backup file on the client, select the Backup File Download Path at Client check box, and click the Browse button on the right of Backup File Download Path at Client. Note: Select the Backup File Download Path at Client check box to save the backup file on both the server and the client. 6. Click Execute to back up and/or delete log data. The Executed Result box displays the backup and/or deleting process. – End of Steps – 9-9 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 9.2.1.5 Backing Up and Deleting Alarm Data This procedure describes how to back up and delete alarm and notification data, including history alarms and notifications. This task is executed only once. Steps 1. From the main menu, select Maintenance > System Backup and Restore. The System Backup and Restore window is displayed. 2. In the Backup and Restore navigation tree, select Backup > Backup and Deletion Alarm Data. The parameter settings are displayed in the right pane. 3. Set deletion and backup parameters as required. For the parameter descriptions, refer to Table 9-7. Table 9-7 Description of Parameters for Backup and Deletion Parameter Value Range Description Backup and Back up only, back Options: Deletion up and delete, l Operation delete only Back up only: The system will only back up the log data generated during the specified time range. l Back up and delete: The system will back up the log data and then delete the data within the specified time range. l Delete only: The system will only delete the log data generated during specified time range. Backup and History alarms and Deletion notifications Select the contents to be backed up and/or deleted. Operation Content Backup Filter All, latest T day(s), Specify the time range within which the data is backed up. If you select Type T day(s) ago, latest Latest T Day(s), the alarm data within the latest T days will be backed T month(s), T up. T can be set in the T Time text box. month(s) ago Deletion Filter T day(s) ago, latest Specify the time range within which the data is deleted. If you select Type T day(s) Latest T Day(s), the alarm data within the latest T days will be deleted. T can be set in the T Time text box. Note: The time specified in the filtering type uses the reference clock in the time zone where the server is located. 9-10 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 9 NMS DataBackup and Restoration 4. (Optional) To modify the path for saving the backup file on the server, click the Browse button on the right of Backup File Save Path at Server. 5. (Optional) To modify the path for saving the downloaded backup file on the client, select the Backup File Download Path at Client check box, and click the Browse button on the right of Backup File Download Path at Client. Note: Select the Backup File Download Path at Client check box to save the backup file on both the server and the client. 6. Click Execute to back up and/or delete alarm data. The Executed Result box displays the backup and/or deleting process. – End of Steps – 9.2.1.6 Backing Up and Deleting Performance Data This procedure describes how to back up and delete performance data, including the original table, hour table and day table This task is executed only once. Steps 1. From the main menu, select Maintenance > System Backup and Restore. The System Backup and Restore window is displayed. 2. In the Backup and Restore navigation tree, select Backup > Backup and Deletion PM Data. The parameter settings are displayed in the right pane. 3. Set deletion and backup parameters as required. For the parameter descriptions, refer to Table 9-8. Table 9-8 Description of Parameters for Backup and Deletion Parameter Value Range Description Backup and Back up only, back Options: Deletion up and deletion, l Operation deletion only Back up only: The system will only back up the log data generated during the specified time range. l Back up and delete: The system will back up the log data and then delete the data within the specified time range. l Delete only: The system will only delete the log data generated during specified time range. NE Type NE types managed Select the target NE types. by the system 9-11 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Parameter Value Range Description Data Type Origin table, hour Select the type of the performance database tables to be backed up table, day table and/or deleted. Performance Select all, deselect Select the performance statistical table for NE types. Type a keyword in Management all the Enter filter text text box to find specific table(s). Object Table Backup Filter All, latest T day(s), Specify the time range within which the data is backed up. If you select Type T day(s) ago, latest Latest T Day(s), that means backing up the performance data within the T month(s), T latest T days. T can be set in the T Time text box. month(s) ago Deletion Filter T day(s) ago Type Specify the time range within which the data is deleted. If you select Latest T Day(s), that means deleting the performance data generated in the latest T days. T can be set in the T Time text box. Note: The time specified in the filtering type uses the reference clock in the time zone where the server is located. 4. (Optional) To modify the path for saving the backup file on the server, click the Browse button on the right of Server path where store the backup file. Note: If Backup File Download Path at Client is selected, it indicates that the backed up file is saved on both the server and the client 5. Click Execute to back up and/or delete performance data. The Executed Result box displays the backup and/or deleting process. – End of Steps – 9.2.2 Backing Up the Data with the dbtool Tool On the engineering site, if the EMS server version is being updated, you can use the dbtool tool to back up the basic data. 9-12 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 9 NMS DataBackup and Restoration Context The execution file of the dbtool tool is dbtool.bat. The path is \ums-server\utils\db tool under the U31 EMS installation path. Prerequisite l l The database operates normally. No IP-type device exists in the U31 EMS because the data of the IP-type device cannot be backed up. Steps 1. On the U31 server computer, enable the dbtool tool in accordance with the operation system type. l Windows: /ums-server/utils/dbtool/dbtool.bat l Linux: /ums-server/utils/dbtool/dbtool.sh l Solaris: /ums-server/utils/dbtool/dbtool.sh 2. For a description of the related parameters, refer to Table 9-9. Table 9-9 dbtool Window Parameter Description Parameter Description Language The language displayed in the dbtool window. DBMS Type Select the DBMS type in accordance with the operation system type: l Windows: SQL Server. l Linux and Solaris: Oracle. DBMS IP IP address of the U31 server. DBMS Port Use the default value, such as 1433. DBA Administrator name set when the EMS database is installed, such as sa. Password Administrator password set when the EMS database is installed. 3. After the parameters are set, click Login. The main window of the database tool is displayed. 4. In the dbtool navigation tree, select Backup EMS. The Backup EMS tab is displayed. 5. (Optional) Set a backup name in the Basic Data area. 6. Select a backup option in the Option area. 9-13 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Note: Only Basic Data is selected here. The options for alarm, log, and perform are only used to for internal fault location. They are not released to the outside. 7. Click Backup. The system starts to back up the basic data. 8. After the backup, a message box is displayed. Click OK. – End of Steps – Related Tasks Restoring the Data with the dbtool Tool 9.2.3 Backing Up the Data with the Offline Tool This procedure describes how to use the offline tool to back up the whole database structure, basic data, and files. Prerequisite l l The U31 server has exited. The database status is normal. Steps 1. On the U31 server computer, enable the offline restoration tool in accordance with the operation system type. l Windows: /ums-server/utils/usf-backup/run.bat l Linux: /ums-server/utils/usf-backup/run.sh l Solaris: /ums-server/utils/usf-backup/run.sh 2. Perform the following operations as needed. To... Do... Back up the whole In the left Restore and Backup navigation tree, select Restore and Backup database structure > Backup Whole DB Structure . The Backup Whole DB Structure dialog box is displayed. Back up the basic In the left Restore and Backup navigation tree, select Restore and Backup > data Backup Basic Data. The Backup Basic Data dialog box is displayed. Back up files In the left Restore and Backup navigation tree, select Restore and Backup > Backup File. The Backup File dialog box is displayed. 3. Click Browse on the right of the Select the backup file list, and select a storage path for the backup files. 9-14 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 9 NMS DataBackup and Restoration 4. Click Execute. – End of Steps – 9.3 System Restoration The U31 R22 provides a database restoration function. Figure 9-1 shows the database restoration flow. Figure 9-1 Database Restoration Flow of the U31 R22 9-15 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 9.3.1 EMS Data Restoration with the U31 9.3.1.1 Restoring Basic Data This procedure describes how to restore the backup basic data to the database. To restore the basic data, the U31 R22 server needs to be stopped. The restoration is conducted via the client restoration tool. During the restoration, the U31 R22 client will be unusable. Prerequisite l l You have the user rights of "Administrator Role". The basic data backup file is available. Steps 1. From the Topology Management window, select Maintenance > System Backup and Restore. The System Backup and Restore window is displayed. 2. Select Backup and Restore > Restore > Restoring Basic Data from the left navigation tree. The Basic Data Restore dialog box is displayed. 3. Click Start. The Basic Data Restore dialog box is displayed. 4. Select the backup file as required. If... Then... You have backed up the i. Select the Local Backup File. ii. Click Browse. The Open dialog box is displayed. basic data in the current EMS database, and the backed up data is in current computer. iii. Select the basic data file. iv. Click Open. You have backed up the basic data file in the local database, i. Select the FTP Backup File. ii. The Open dialog box is displayed. and the backed up data file is on the U31 R22 server or a iii. (Optional) The basic data backup directory /backu p/sysbak/basicdb on the U31 R22 server is dis- third-party FTP server. played by default. If the basic data file to be restored is in the FTP server of the third-party, enter FTP://user name:password@IP address:port number in the Look In area. Press Enter for confirmation. For example, FTP://abc:123@10.8.8.1:36 iv. Select the basic data file. v. Click Open. 5. (Optional) Select Back up the current data before the restoration? If you choose to back up the current data first, the system will automatically roll back in case the restoration fails. 9-16 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 9 NMS DataBackup and Restoration Note: It is recommended to select this option so that the NMS can be restored to the status before the restoration in case the restoration fails. It is recommended to choose this option before restoring the basic data file so as to ensure that the EMS can restore to the status before in case the restoration fails. 6. Click Execute. – End of Steps – 9.3.1.2 Restoring Log Data This procedure describes how to restore the backup log data to the database. Prerequisite The log backup file is available. Steps 1. In the Backup and Restore navigation tree, select Restore > Restore Log Data. The parameter settings are displayed in the right pane. 2. Click the Browse button. The Open dialog box is displayed. 3. Select the backup file, and click the Open button to return to the System Backup and Restore window. 4. Click Execute to execute data backup. The log data is successfully restored. – End of Steps – 9.3.1.3 Restoring Alarm Data This procedure describes how to restore the backup alarm data to the database as required. Prerequisite The alarm backup file is available. Steps 1. From the main menu, select Maintenance > System Backup and Restore. The System Backup and Restore window is displayed. 9-17 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 2. In the Backup and Restore navigation tree, select Restore > Restore Alarm Data. The parameter settings are displayed in the right pane. 3. Click the Browse button. The Open dialog box is displayed. 4. Select the backup file, and click the Open button to return to the System Backup and Restore window. 5. Click Execute to execute data backup. – End of Steps – 9.3.1.4 Restoring Performance Data This procedure describes how to restore the backup performance data to the database as required. Prerequisite The performance backup file is available. Steps 1. From the main menu, select Maintenance > System Backup and Restore. The System Backup and Restore window is displayed. 2. In the Backup and Restore navigation tree, select Restore > Restore PM Data. The parameter settings are displayed in the right pane. 3. Click the Browse button. The Open dialog box is displayed. 4. Select the backup file, and click the Open button to return to the System Backup and Restore window. 5. Click Execute to execute data backup. – End of Steps – 9.3.2 Restoring the Data with the dbtool Tool To restore the data between different EMS versions, different databases, different scales, or different installation components, you can use dbtool to restore the basic data, log alarms, or performance data. Note: To avoid the fault caused by the failed restoration, back up the current EMS data before the data restoration. 9-18 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 9 NMS DataBackup and Restoration Prerequisite l l l The U31 server has exited. The database status is normal. The data is backed up in advance. Context The execution file of the dbtool tool is dbtool.bat. The path is \ums-server\utils\db tool under the U31 EMS installation path. Steps 1. On the U31 server computer, enable the dbtool tool in accordance with the operation system type. l Windows: /ums-server/utils/dbtool/dbtool.bat l Linux: /ums-server/utils/dbtool/dbtool.sh l Solaris: /ums-server/utils/dbtool/dbtool.sh 2. For a description of the related parameters, refer to Table 9-10. Table 9-10 Dbtool Window Parameter Descriptions Parameter Description Language The language displayed in the dbtool window. DBMS Type Select the DBMS type in accordance with the operation system type: l Windows: SQL Server. l Linux and Solaris: Oracle. DBMS IP IP address of the U31 server. DBMS Port Use the default value, such as 1433. DBA Administrator name set when the EMS database is installed, such as sa. Password Administrator password set when the EMS database is installed. 3. After the parameters are set, click Login. The main window of the database tool is displayed. 4. In the dbtool navigation tree, select Restore EMS. The Restore EMS tab is displayed. 9-19 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 5. Set the restoration file. a. Click Browse behind Directory. The Open dialog box is displayed. b. Select the .zip file under the backup file. c. Click Open to return to the Restore EMS tab. 6. Select one or multiple data items from the Option area. 7. Click Restore. The Warning dialog box is displayed. 8. Click Yes. – End of Steps – Related Tasks Backing Up the Data with the dbtool Tool 9.3.3 Restoring the Data with the Offline Tool This procedure describes how to use the offline tool to restore the whole database structure, basic data, and files. 9-20 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 9 NMS DataBackup and Restoration Note: Under normal circumstances, only the basic data restored in the engineering application can meet the requirements. Prerequisite l l The U31 server has exited. The data is backed up. Context Note: After a file is restored, you must run the \ums-server\utils\operationmodel\ope rationmodel.bat file to initialize the service model. Steps 1. On the U31 server computer, enable the offline restoration tool in accordance with the operation system type. l Windows: /ums-server/utils/usf-backup/run.bat l Linux: /ums-server/utils/usf-backup/run.sh l Solaris: /ums-server/utils/usf-backup/run.sh 2. Perform the following operations as needed. To ... Do ... Restore the whole database i. structure In the left navigation tree, select Restore and Backup > Restore Whole DB Structure . The Restore Whole DB Structure dialog box is displayed. ii. Click Browse on the right of the Select the Backup File, and then select the backup data. iii. (Optional) Click Advanced Configuration. Configure a storage path for the data files as needed. Restore the basic data i. In the left Restore and Backup navigation tree, select Restore and Backup > Restore Basic Data. The Restore Basic Data window is displayed. ii. Click Browse on the right of the Select the Backup File, and then select the backup data. 9-21 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) To ... Do ... Restore files i. In the left Restore and Backup navigation tree, select Restore and Backup > Restore File. The Restore File window is displayed. ii. Click the Browse button on the right of the Select the Backup File text box to select the files to be backed up. iii. Click the Browse button on the right of the Select the Backup File text box to select the files to be restored. iv. Click the Browse button on the right of the File Restoration Path text box to select the restoration path. v. Select a file type from the File Type list. Options include Configuration File, Running File, and Version File. 3. Click Execute. The restoration result is displayed in the Execution Result area. – End of Steps – Related Tasks Backing Up the Data with the Offline Tool 9-22 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 10 System Monitoring Table of Contents System Monitoring....................................................................................................10-1 System Monitor View-Introduction ............................................................................10-1 Application Server Monitor .......................................................................................10-2 Database Server Monitor..........................................................................................10-4 10.1 System Monitoring Functions The system monitoring module provided by U31 R22 is a unified maintenance and management platform used to monitor the servers and the database. It can automatically identify the application server and the database server in the system and display their information on the client interface. The system monitoring module provides the following functions: l l View and monitor the performance of the application server and the database server, including the information and utilization of memory, CPU and hard disks. View and monitor the resources in the database, such as used space, table space, data table and process information. Opening the System Monitor View On the main menu of the U31 R22 client, select Maintenance > System Monitor. The System Monitor view is displayed. 10.2 System Monitor View-Introduction The system monitoring module provides a unified platform for system maintenance and management. By using system monitoring module, users can add devices to be managed, and monitor and maintain successfully the added application server and database server. On the main menu of the U31 R22 client, select Maintenance > System Monitoring. The System Monitoring window is displayed, see Figure 10-1. 10-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Figure 10-1 System Monitoring Window 1. Navigation Tree 2. System Monitoring View 10.3 Application Server Monitor 10.3.1 Viewing the Basic Information of Application Server This procedure describes how to view the basic information of application server. Steps 1. In the System Monitor navigation tree, click the basic information is displayed in the right pane. icon of the application server. The – End of Steps – 10.3.2 Configuring Server Performance Monitoring This procedure describes how to set the monitoring thresholds for CPU, memory, and hard disk. When the practical values exceed the monitoring thresholds, alarm messages are sent. Steps 1. In the System Monitor navigation tree, click the icon of the application server. The basic information is displayed in the right pane, divided into three boxes: Server Performance Monitor, Server Performance View, and Server Information. 10-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 10 System Monitoring 2. Click the Configure button under Monitor Server Performance . The Configure Performance Monitoring dialog box is displayed. 3. Select the monitoring object, such as CPU, memory monitoring, and hard disc monitoring. 4. (Optional) If CPU, RAM Monitoring is selected, you need to set CPU, memory monitoring threshold, and monitoring period. 5. (Optional) If HD Monitoring is selected, you need to set the hard disc monitoring threshold, and monitoring period. 6. Click OK. – End of Steps – 10.3.3 Starting Server Performance Monitor When a server performance monitor stops, you can restart the server performance monitor, so that the monitoring thresholds take effect again. Steps 1. In the System Monitor navigation tree, click the icon of the application server. The basic information is displayed in the right pane, divided into three boxes: Server Performance Monitor, Server Performance View, and Server Information. 2. Click the Run button in the Server Performance Monitor box to start the performance monitor. – End of Steps – 10.3.4 Suspending Server Performance Monitor This procedure describes how to stop a server performance monitor that has been activated previously. Steps icon of the application server. 1. In the System Monitor navigation tree, click the The basic information is displayed in the right pane, divided into three boxes: Server Performance Monitor, Server Performance View, and Server Information. 2. Click the Suspend button in the Server Performance Monitor box to stop the performance monitor. – End of Steps – 10-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 10.3.5 Viewing Monitoring Information of the Application Server The system can monitor the performance of the application server in real time. You can set the periods for monitoring the utilization of CPU, memory and hard disk of the server and check the current utilization of them. Steps icon of the application server. 1. In the System Monitor navigation tree, click the The basic information is displayed in the right pane, divided into three boxes: Server Performance Monitor, Server Performance View, and Server Information. 2. Click the View button under Server Performance View. The View Application Server Performance dialog box is displayed. 3. View the monitoring information of the application server. – End of Steps – 10.4 Database Server Monitor 10.4.1 Viewing the Basic Information of Database Server This procedure describes how to view the basic information of database server, including device name, device type, database type, database port, database version, and host IP address. Steps icon of database server. The 1. In the System Monitor navigation tree, click the basic information is displayed in the right pane. – End of Steps – 10.4.2 Configuring Database Resource Monitor This procedure describes how to configure the Database Resource Monitor to monitor the database server. You can set the thresholds for both hard disk space and table space and set the monitoring period. When the size of the used hard disk or table space exceeds the threshold, the system generates an alarm. Steps icon of the database server. 1. In the System Monitor navigation tree, click the The basic information is displayed in the right pane, divided into three boxes: Database Resource Monitor, Query Database Resource, and Basic Information of Database Server. 10-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 10 System Monitoring 2. Click the Configure button under Database Resource Monitor. The Configure Database Monitor dialog box is displayed. 3. Select monitoring object(s) from the Monitor Selection area. l Select the Total Database Usage Monitoring check box and set a threshold in the Usage Threshold (GB) text box. l Select the Table Space Usage Monitoring check box and set a monitoring type and threshold in the Table Space Usage Monitoring area. 4. Set the monitoring period in the Period Description area. 5. Click OK. – End of Steps – 10.4.3 Starting Database Resource Monitor When a database resource monitor stops, you can restart the monitor, so that the monitoring thresholds take effect again. Steps icon of the database server. 1. In the System Monitor navigation tree, click the The basic information is displayed in the right pane, divided into three boxes: Database Resource Monitor, Query Database Resource, and Basic Information of Database Server. 2. Click the Run button in the right of the Database Resource Monitor box to start the database resource monitor. – End of Steps – 10.4.4 Suspending Database Resource Monitor This procedure describes how to stop the database resource monitor when it is running. Steps 1. In the System Monitor navigation tree, click the icon of the database server. The basic information is displayed in the right pane, divided into three boxes: Database Resource Monitor, Query Database Resource, and Basic Information of Database Server. 2. Click the Suspend button in the right of the Database Resource Monitor box to stop the database resource monitor. – End of Steps – 10-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 10.4.5 Viewing Database Resource Information This procedure describes how to view the current information of table space, data tables, and processes of the database, and how to refresh information. Steps 1. In the System Monitor navigation tree, click the icon of the database server. The basic information is displayed in the right pane, divided into three boxes: Database Resource Monitor, Query Database Resource, and Basic Information of Database Server. 2. Click the View button under Query Database Resource. Resources dialog box is displayed. The View Database 3. Click the three tabs Database Information, Table Information, and Process Information to view corresponding information. 4. Click the Synchronize button to refresh database information. After the synchronization is completed, the system enters the data into the table again. 5. (Optional) To export data to the local computer, click Export Data. – End of Steps – 10-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 11 Task Management Table of Contents Task Management ....................................................................................................11-1 Introduction to Task Management View ....................................................................11-3 Backing up and Deleting Log Data ...........................................................................11-3 Backing up and Deleting Performance Data .............................................................11-4 Backing up and Deleting Alarm Data ........................................................................11-5 Viewing the Backup Logs of Basic Data ...................................................................11-6 Viewing the Backup Logs of the Whole Database Structure......................................11-6 Viewing the File Backup Logs ..................................................................................11-6 File Clearing Tasks ...................................................................................................11-7 Modifying the Task Starting Time ..............................................................................11-8 11.1 Task Management Functions The task management module is used to manage all scheduled tasks, which are listed on the task navigation tree. The system predefines five types of scheduled tasks, including Historical Data Archiving, Configuration Data Backup, File and Database Backup, File Clean-up, and Alarm Background Task. The predefined four types of tasks, with preset parameters, will be carried out automatically at scheduled time. For the four types of tasks, you can perform the following operations, which are described in Table 11-1. Table 11-1 Task Type - Operations Reference Task Type Available Operation Historical Data Archiving l Refresh a task l Modify a task l Save a task l Cancel the modification of a task l View tasks missed l View logs l Set capacity l Suspend backup 11-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Task Type Available Operation Configuration Data Backup l View logs l Suspend the task l Activate the task File and Database Backup File Clean-up Alarm Background Task l Suspend the task l Modify the task l Save the task l Cancel the modification of the task l Modify a task l Save a task l Cancel the modification l View logs l Suspend backup l Activate a task l Suspend a task l Modify a task l Executive a task l View file information l View logs l Query tasks l Customize columns to be displayed l Refresh the task l Modify the task l View logs l Save the task l Cancel the modification of the task l Activate the task l Suspend the task Note: To modify the task executing time, refer to 11.10 Modifying the Task Starting Time. Opening Task Management View On the main menu of U31 R22 system, select Maintenance > Task Management > Show Timing Task. The Task Management window is displayed. 11-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 11 Task Management 11.2 Introduction to Task Management View The task management module is used to manage all scheduled tasks in the system. All tasks are listed under the task navigation tree as tree nodes. The corresponding operation windows of tasks and the implementation logic on the server are all provided by task-related modules. On the main menu of the U31 R22 client, select Maintenance > Task Management > Show Timing Task. The Task Management window is displayed, see Figure 11-1. Figure 11-1 Task Management View 1. Main menu 2. Toolbar 3. Navigation tree 4. Task management tree 11.3 Backing up and Deleting Log Data It is necessary to backup and delete log data regularly because the increasing size of the database can influence the system stability. This task runs once a day. At predefined time, the system carries out this task automatically. Context The buttons used in this task provide the following functions: To... Do... Modify the export information and period Click information of a task Description area into the editable status. on the toolbar to change the Backup 11-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Save the modifications to the task Click on the toolbar. Cancel the modifications to the task Click on the toolbar. View tasks that are not executed Click on the toolbar. Obtain the latest task information when multiple Click on the toolbar. View the information about the task execution Click on the toolbar. Set the capacity of the database Click on the toolbar. clients coexist Steps 1. In the left navigation tree in the Task Management window, select Common Task > Historical Data Archiving > Log Data Backup and Deletion Task. The task details are displayed in the right pane. 2. On the toolbar, click the button. 3. Select the log type(s) to be backed up. 4. Click the button. – End of Steps – 11.4 Backing up and Deleting Performance Data It is necessary to backup and delete performance data regularly because the increasing size of the database can influence the system stability. This task runs once a day automatically at predefined time. Before deletion, you can choose whether to back up performance data. Context The buttons used in this task provide the following functions: To... Do... Modify the export information and period information of a task Click on the toolbar to change the Backup Description area into the editable status. Save the modifications to the task Click Cancel the modifications to the task Click Obtain the latest task information when multiple clients coexist View the information about the task execution on the toolbar. on the toolbar. Click on the toolbar. Click on the toolbar. Click on the toolbar. View tasks that are not executed 11-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 11 Task Management Steps 1. In the left navigation tree in the Task Management window, select Common Task > Historical Data Archiving > PM Data Backup and Deletion Task. The task details are displayed in the right pane. 2. Click the button. 3. Select the log type(s) to be backed up. 4. Click the button. – End of Steps – 11.5 Backing up and Deleting Alarm Data It is necessary to backup and delete log data regularly because the increasing size of the database can influence the system stability. This task runs once a day automatically at predefined time. Context The buttons used in this task provide the following functions: To... Do... Modify the export information and period Click information of the task Description view into the editable status. Save the modifications to the task Click on the toolbar. Cancel the modifications to the task Click on the toolbar. View tasks that are not executed Click on the toolbar. Obtain the latest task information when multiple Click on the toolbar. View the information about the task execution Click on the toolbar. Set the capacity of the database Click on the toolbar. on the toolbar to change the Backup clients coexist Steps 1. In the left navigation tree in the Task Management window, select Common Task > Historical Data Archiving > Alarm Data Backup and Deletion Task. The task details are displayed in the right pane. 2. Click the button. 3. Select the log type(s) to be backed up. 4. Click the button. – End of Steps – 11-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 11.6 Viewing the Backup Logs of Basic Data The Basic Data Backup task backs up all current basic data, except the table structure and history data. Steps 1. In the left navigation tree in the Task Management window, select Common Task > Configuration Data Backup > Backup Basic Data . The task backup and period information is displayed in the right pane. 2. Click the button. The View Log dialog box is displayed. 3. View the backup logs. – End of Steps – 11.7 Viewing the Backup Logs of the Whole Database Structure Whole database structure backup backs up the structures of all databases used by the system, and that of all database objects and the basic data in these databases every day, except the history data. Steps 1. In the left navigation tree in the Task Management window, select Common Task > Version and Database Backup > Backup Whole DB Structure. The whole database backup and period information is displayed in the right pane. 2. Click the button. The View Log dialog box is displayed. 3. View the logs. – End of Steps – 11.8 Viewing the File Backup Logs This procedure describes how to view the backup logs of the file system. Context The File System Backup task backs up version files, configuration files and runtime files on the server every day. l l l Version files refer to all files generated by the U31 R22 server, except those generated during runtime. Configuration files refer to the files related to configuration generated on the server. Runtime files refer to the files generated on the server during runtime. 11-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 11 Task Management Steps 1. In the left navigation tree in the Task Management window, select Common Task > Version and Database Backup > Backup File. The file system backup and period information is displayed in the right pane. 2. Click the button. The View Log dialog box is displayed. 3. View the logs. – End of Steps – 11.9 File Clearing Tasks 11.9.1 Modifying Monitor Attributes The system monitors the directories where various query files generated by tasks are stored. Once the size of a directory exceeds the preset threshold, the system clear the files in the directory in accordance with the task settings. Context You can modify the monitoring attributes, including directory settings and cleanup settings. This procedure uses modifying the Performance Query FTP Directory Monitoring attributes as an example. Steps 1. In the left navigation tree in the Task Management window, select Common Task > File Clear-up > Directory Monitoring. The monitoring task details are displayed in the right pane. 2. Select a task from the list. 3. Click . displayed. The Performance Query FTP Directory Monitoring dialog box is 4. Set the parameters, and click OK. – End of Steps – 11.9.2 Executing Monitoring Tasks Immediately You can manually execute a task by clicking the Instantly Execute button before the preset time. Context You can modify the monitoring attributes, including directory settings and cleanup settings. This procedure uses modifying the Performance Query FTP Directory Monitoring attributes as an example. 11-7 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Steps 1. In the left navigation tree in the Task Management window, select Common Task > File Clean-up > Directory Monitoring. The monitoring task details are displayed in the right pane. 2. Select Performance Query FTP Directory Monitoring from the task list. 3. Click the Instantly Execute button. The Confirm message box is displayed. 4. Click Yes. – End of Steps – 11.10 Modifying the Task Starting Time This procedure describes how to modify the task time. Context You can modify the start time of the five predefined types of tasks, including history data backup and deletion, configuration data backup, version and database backup, file clearing, and alarm background tasks. You can only modify the start time by hour. The actual start time of a task might be the preset time plus an offset, which takes 10 minutes as the granularity, between 0 and 60 minutes. (If the preset time is 18:00, for example, the start time might be 18:10, 18:20, etc.) Steps 1. From the main menu, select Maintenance > Task Management > Modify Task Start Time. The Modify Task Start Time dialog box is displayed. 2. Select a task based in the Task Sort field. 3. Click the button. The Modify Time dialog box is displayed. 4. Set the start time, and click OK. – End of Steps – 11-8 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 12 Troubleshooting Table of Contents Troubleshooting Flow ...............................................................................................12-1 Methods for Collecting Failure Information................................................................12-3 Common Troubleshooting Methods ..........................................................................12-3 Common Troubleshooting Tools ...............................................................................12-4 Troubleshooting Precautions and Requirements.......................................................12-5 Contacting Technical Support ...................................................................................12-6 Troubleshooting of Server Failures ...........................................................................12-6 Troubleshooting of Ethernet Switch Failures...........................................................12-10 Troubleshooting of Software Failures .....................................................................12-13 Failure of Querying Performance Data ...................................................................12-17 12.1 Troubleshooting Flow When a failure occurs in the U31 R22 system, you need to observe the fault symptom, analyze the service flow and involved network elements (NEs), and then locate the exact module where the failure occurs based on the understanding of system composition. After locating the failure, repair the faulty module in accordance with proper handling method or the instructions provided in this manual. Figure 12-1 illustrates the general troubleshooting flow of the U31 R22 system. 12-1 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Figure 12-1 Troubleshooting Flow The following describes the general flow of troubleshooting in the U31 R22 system. 1. Determine the failure conditions. Perform simple service tests to find the conditions of the failure. 2. Collect failure information. 12-2 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 12 Troubleshooting Record the details of the failure symptom, related alarms displayed on the fault management view, operation information of the system, and handling operations that have been done. Use the maintenance functions provided by the system (for example, service observation, and performance statistics) to collect and save related information at the time when the failure occurs. 3. Analyze the failure and find out the failure type. Determine the possible causes of the failure and find out the type of the failure by analyzing the failure symptom and related information collected from the system. 4. Locate the cause of the failure. Analyze the service flow and related NE(s) based on the conditions when the failure occurs to find out the real cause of the failure. 5. Remove the failure. Perform handling operations according to the failure cause to remove the failure. 6. Record the troubleshooting process. After the troubleshooting, record the failure symptom and handling method in detail so that other maintenance personnel can refer to the handling experience to troubleshoot similar failures. 12.2 Methods for Collecting Failure Information In the case of a failure, the first thing you need to do is collecting all information related to the failure. For those failures that you cannot remove from the system, information collection is also important because you need provide useful information to ZTE's support engineers for troubleshooting them. The following summarizes basic methods of how to collect required information related to a failure. l l l l l l Check operation logs of related modules. Use a packet catcher to collect packets. Perform basic network tests, for example, ping, telnet, and traceroute. Check operation logs, including the operation logs of related service, the operating system, and dual servers. Check and analyze related alarms. Perform tests on the actual service. 12.3 Common Troubleshooting Methods A number of methods can be used to troubleshoot failures in the U31 R22 system. In actual situation, the flexible combination of different methods is recommended when it is hard to determine whether a failure is a software failure or a hardware failure. Being familiar with all the troubleshooting methods is helpful for you to troubleshoot failures in the system quickly. 12-3 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) The following introduces four common troubleshooting methods for your reference. l Comparison Method The comparison method is a simple method that you can use to find the difference between the faulty configuration data (or faulty device) and the correct configuration data (or normal device) by comparing them and then locate the failure by analyzing the difference. l Replacement Method The replacement method is a simple and practical troubleshooting method that you can use to determine whether a hardware is faulty. For example, use a board of the same type to replace the possible faulty board. If the failure disappears after the replacement, it can be concluded that the replaced board is faulty. l System Simplification Method The system simplification method is a troubleshooting method that you can use to locate a failure by observing the simplest system after removing all the other irrelevant hardware. If the failure still exists in the simplest system, it can be concluded that the failure locates in a hardware in the simplest system. If the failure does not exist in the simplest system, add the previously-removed hardware to the system one by one. Once the failure appears after a hardware is added, it can be concluded that the added hardware is faulty. Then you can replace the faulty hardware to restore the system. l Failure Code Analysis Method The failure code analysis method is a troubleshooting method that you can use to diagnose software and service failures. The system provides failure codes and causes for all operation failures. You can conveniently determine the cause of an operation failure by checking corresponding failure code. The following gives two examples of how to combine different methods for troubleshooting failures. l l Example 1: To troubleshoot a hardware failure, you need to observe the indicator lights of the hardware, and then use the replacement method and comparison method to judge whether the hardware is working properly. Example 2: To troubleshoot a software or service failure, you need to use the maintenance functions of the system to find possible causes by checking and analyzing the failure code, related logs and data in the system. 12.4 Common Troubleshooting Tools Some tools can be used to facilitate the troubleshooting of the U31 R22 system, including log viewer, packet catcher, and Management Information Base (MIB) browser. The following gives a brief introduction to these common tools. l Log Viewer By using the log viewer, you can view the log of operations and the log of operation errors that are automatically recorded by the operating system. In this way, you can . 12-4 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 12 Troubleshooting When a failure occurs, you can view the operation log to find the operation when the failure occurs and judge whether the failure is caused by this operation, and locate the failure cause by analyzing the operation error log. l Packet Catcher The packet catcher can be used to catch needed data from network ports, and translate the data into a format that can be easily understood and analyzed by end users. l MIB Browser The MIB browser is used to obtain the attributes of Simple Network Management Protocol (SNMP). It can extract data from an NE agent and compare the data with that in corresponding NE and U31 R22. 12.5 Troubleshooting Precautions and Requirements Be familiar with the following precautions and requirements before you begin a troubleshooting procedure. l l Prepare common tools that may be used during the troubleshooting, for example, flat screwdriver, cross screwdriver, test pencil, and network cable crimper pliers. Follow the safety regulations and precautions specified by the operator in the equipment room during troubleshooting. Note: The operator is recommended to establish rules and regulations to control and direct the troubleshooting operations in equipment rooms, and authorize qualified maintenance personnel to perform troubleshooting operations, to prevent new failures caused by improper operations during troubleshooting. l l l l Before troubleshooting, back up service data and operation parameters. During troubleshooting, collect all failure-related data for analyzing and finding the failure cause, and record useful information in detail, for example, failure symptoms, version information, and data changes. After troubleshooting, fill in the troubleshooting log to record all details of the troubleshooting procedure. Add shift records to the log for the troubleshooting that cannot be completed in a day. Such troubleshooting may involve different maintenance personnel. Begin a troubleshooting procedure immediately when a failure occurs. If you fail to remove a failure, contact your local ZTE office for support. Frequently update the contact information of your local ZTE office and paste the latest contact information of your local ZTE office on an eye-catching place so that you can contact the local office in time in the case of emergency. 12-5 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 12.6 Contacting Technical Support In the following cases, contact your local ZTE office for technical support immediately. l l l l Occurrence of a critical failures, for example, interruption of part or all services Occurrence of a failure that cannot be removed in accordance with the instructions provided by this manual Occurrence of a failure that cannot be removed in accordance with the handling methods you already know Occurrence of a failure that cannot be removed in accordance with your troubleshooting experience on similar failures Before contact technical support, prepare the following information, which may be required by ZTE support engineers. l l l l l Failure details, including occurrence time, location, and failure symptoms Log files on the server and the client Data collected by a packet catcher Details of the troubleshooting operations you have done Remote login method, and the contact phone number You can contact your local ZTE office for the following support: l Field Support ZTE maintenance engineers go to the field to troubleshoot the failure l Phone Support ZTE maintenance engineers guide the field engineers to troubleshoot the failure by phone. l Remote Support ZTE maintenance engineers log in to the system or equipment remotely to troubleshoot the failure. 12.7 Troubleshooting of Server Failures 12.7.1 An Indicator of the Server Lights Red Symptom An indicator on the front panel of the server lights red. Analysis An indicator glowing in red usually indicates a hardware failure, which may be caused by l l Loose hardware part in the server. Hardware damage in the server. 12-6 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 12 Troubleshooting Troubleshooting The following describes the troubleshooting procedure of this failure. 1. Check for any loose hardware part in the server. l If any loose part is found, use a proper tool to fasten the part. l If no loose part is found, proceed to Step 2. 2. Contact the manufacturer of the server for technical support after the following preparations: l Find the hardware manual of the server, which is delivered with the server together, and then read the description of indicators in the manual to judge the current status of the server. l Write down the serial number of the server. Result Verification After the failure is removed, the indicator of the server glows in green. 12.7.2 An Indicator of the Server Lights Yellow Symptom An indicator on the front panel of the server lights in yellow. Analysis The meaning of yellow indicator varies with the actual model of the server. An indicator glowing in yellow usually indicates a hardware failure, which may be caused by l l Loose hardware part in the server. Hardware damage in the server. Troubleshooting The following describes the troubleshooting procedure of this failure. 1. Check for any loose hardware part in the server. l If any loose part is found, use a proper tool to fasten the part. l If no loose part is found, proceed to Step 2. 2. Contact the manufacturer of the server for technical support after the following preparations: l Find the hardware manual of the server, which is delivered with the server together, and then read the description of indicators in the manual to judge the current status of the server. l Write down the serial number of the server. Result Verification After the failure is removed, the indicator of the server glows in green. 12-7 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 12.7.3 The Indicator of a Hard Disk Lights Red Symptom The indicator of a hard disk lights red. Analysis The indicator lighting red indicates that the hard disk is damaged. Note: Generally, a Redundant Array of Inexpensive Disks (RAID) is configured for the U31 R22 system. That is, multiple disks are used to keep the data integrity and reliability of the system. Troubleshooting When a hard disk in the system is damaged, do the following: 1. Contact the manufacturer of the hard disk to obtain a new hard disk. 2. Contact your local ZTE office for replacing the damaged hard disk. Result Verification After the replacement of the damaged hard disk, the indicator of the new hard disk lights green. 12.7.4 Startup Failure of the Server Symptom The server fails to start up after power on. Analysis The startup failure of the server may be caused by l l l Power module failure of the server Hardware damage of the server, for example, hard disk damage, I/O confliction, CPU failure, and memory failure Startup errors, for example, file system damage Troubleshooting To troubleshoot the startup failure of the server, do the following: 1. Observe the status indicator of each power module. 12-8 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 12 Troubleshooting l If the indicator of a power module is off, the power module fails. Replace it with a new power module. l If the indicators of all power modules light green, proceed to the next step. 2. Check for loosen part or hardware damage in the server. l If a loosen part is found, fix the part and then check whether the server can start up successfully. l If a damaged part is found, replace it with a good one, and then check whether the server can start up successfully. l If no loosen or damaged part is found, proceed to the next step. 3. Check the error information if an error message is prompted during the startup of the server. l If the error indicates a file system damage, reboot the server into security mode or maintenance mode, and then repair the file system. After that, restart the server and check whether it can start up successfully. l If the error is not caused by file system damage, proceed to the next step. 4. Record the error information, and then contact your local ZTE office for technical support. Result Verification The server can start up successfully. 12.7.5 Remote Login Failure to the Server Symptom You can successfully ping the server, but cannot log in to the server remotely via Telecommunication Network Protocol (TELNET) or Secure Shell (SSH). Analysis The possible causes of this failure include: l l l The server fails to start up because of file system damage. The file system is full. An exception happens in the TELNET or SSH service. Troubleshooting Log in to the server via a serial port, and then troubleshoot the remote login failure as follows: 1. Check whether the server is started without errors. If some error is found, restart the server into maintenance mode or security mode. Observe the error message on the screen during restart, and troubleshoot the error. 2. Check whether the file system is full. In the case of full file system, clear junk files in the system and ensure that the utilization of the root partition or the boot disk does not exceed 80%. 12-9 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 3. Check whether the TELNET or SSH service is successfully started. If the service is not started or started with an exception, restart the TELNET or SSH service. 4. If you fail to troubleshoot the remote login failure, contact your local ZTE office for technical support. Result Verification You can successfully log in to the server remotely. 12.8 Troubleshooting of Ethernet Switch Failures 12.8.1 Indicators of the Switch Port Connected to the Server Are Off Symptom Two indicators of the network port on the switch are off after you connect the U31 R22 server to the switch with a network cable. The status of the indicators indicates that no device is connected to this port. Analysis The possible causes of this problem include: l l l The network port of the switch fails. The network cable is defective. The peer network port on the server fails, which is connected to the switch with the network cable. Troubleshooting To troubleshoot this problem, do the following: 1. Check whether the network port on the Ethernet switch works properly. Log in to the switch via a serial port, and then run the following command in a command terminal to view the status of the network port. show port Port No. l If the network port fails to work properly, replace the switch, or connect the network cable to a normal network port on the switch. l If the network port works properly, proceed to the next step. 2. Check whether the network cable is defective. Insert both connectors of the network cable to corresponding ports of a network cable tester, and observe the indicators on the tester. l l If some indicator(s) on the network cable test is off, the network cable is defective. In this case, replace the network cable. If all indicators on the network cable test are on, the network cable is good. Proceed to the next step. 12-10 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 12 Troubleshooting 3. Check whether the network adapter in the U31 R22 server is normal. a. Enable the Terminal window on the server through the ifconfig -a command to view the status of the network adapter in the server. If the status of the network adapter is normal, the system feedback information is shown in Figure 12-2. Figure 12-2 View the Status of Network Adapter l l If the system cannot identify the network adapter, install a proper driver for the network adapter. If the status of the network adapter is not "UP", use the following command to activate this network adapter. ifconfig Network Adapter Name plumb b. If the status of the network adapter is "UP", use the netstat -i command to check the data transmission information of the network adapter, including the received package count, sent package count, error package count, analyze the information and judge whether the network adapter is working properly. If the network adapter is normal, proceed to the next step. 4. If you fail to troubleshoot this failure after using the previously-mentioned methods, collect the failure information and contact your local ZTE office for technical support. Result Verification Insert the network cable to the network port on the switch. Both indicators of the network port light green after a while. 12.8.2 Indicators of the Switch Port Connected to the Server Light Solid Yellow Symptom Two indicators of the network port on the switch light solid yellow after you connect the U31 R22 server to the switch with a network cable. The status of the indicators indicates that network connection is unavailable between the switch and the server. Analysis The possible causes of this problem include: l l l The network port of the switch fails. The network cable is defective. The peer network port on the server fails, which is connected to the switch with the network cable. 12-11 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Troubleshooting To troubleshoot this problem, perform the following: 1. Check whether the network port on the Ethernet switch works properly. Log in to the switch via a serial port, and then run the following command in a command terminal to view the status of the network port. show port Port No. l If the network port fails to work properly, replace the switch, or connect the network cable to a normal network port on the switch. l If the network port works properly, proceed to the next step. 2. Check whether the network adapter in the U31 R22 server is normal. a. Enable the Terminal window on the server through the ifconfig -a command to view the status of the network adapter in the server. If the network adapter is normal, the system feedback information is shown in Figure 12-3. Figure 12-3 View the Status of Network Adapter l l If the system cannot identify the network adapter, install a proper driver for the network adapter. If the status of the network adapter is not "UP", use the following command to activate this network adapter. ifconfig Network Adapter Name plumb b. If the status of the network adapter is "UP", use the netstat -i command to check the data transmission information of the network adapter, including the received package count, sent package count, error package count, analyze the information and judge whether the network adapter is working properly. If the network adapter is normal, proceed to the next step. 3. Check whether the network cable is good. Insert both connectors of the network cable to corresponding ports of a network cable tester, and observe the indicators on the tester. l If some indicator(s) on the network cable test is off, the network cable is defective. In this case, replace the network cable. l If all indicators on the network cable test are on, the network cable is good. Proceed to the next step. 4. If you fail to troubleshoot this failure after using the previously-mentioned methods, collect the failure information and contact your local ZTE office for technical support. 12-12 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 12 Troubleshooting Result Verification The indicators of the network port light green. 12.9 Troubleshooting of Software Failures 12.9.1 Failure of Removing the Server Program Symptom The operating system prompts "version is running" when you remove the U31 R22 server program from the server although you already exited the server program. Analysis Some related process is still running after you exited the U31 R22 server program. Troubleshooting l l Troubleshooting of Windows operating system 1. Press Ctrl+Alt+Del. The Task Manager dialog box is displayed. 2. Find the processes start with "zte_", and then right-click it. Select End Processe from the shortcut menu. 3. Repeat the previous step to end all the processes start with "zte_". 4. In the service list of the Computer Management window, stop MySQL, ZX DHCP Service, and ZXISAM DHCP Web Business services. 5. (Optional) If you cannot uninstall the sever through the above three steps. Restart the sever and then uninstall it again. Troubleshooting of Linux/Solaris operating system 1. Open the command line terminal on the sever as a root user. Enter the following command. The running processes are displayed. #prstat –a 2. End all the processes start with "zte_". For example, there is a current running process "zte_console1", and its corresponding PID is 8892. Enter the following command in the command line to close the process: #kill 8892 3. Execute the #prstat –a command, if there is no process starts with "zte_", the installation is successful. 4. (Optional) If you cannot uninstall the sever through the above three steps. Restart the sever and then uninstall it again. Result Verification You can successfully remove the U31 R22 server program from the server. 12-13 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 12.9.2 Insufficient Disk Space During Server Installation Symptom During the installation of the U31 R22 server program, the system does not pass the detection of system information with the message "Database Detection: Detecting is not passed" prompted, see Figure 12-4. Figure 12-4 NetNumen Setup - System Information Detection (Database Detection Not Passed) Analysis The space of the disk where the installation directory of the server program locates does not meet the previously-set space requirements of database. Troubleshooting To solve this problem for continuing the installation of the server program, do the following: 1. In the NetNumen Setup - System information detection window, click Back to return to the NetNumen Setup - Database config window. 2. Select the product, and then click Modify Path. The Database Configuration dialog box is displayed, see Figure 12-5. 12-14 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 12 Troubleshooting Figure 12-5 Database Configuration Dialog Box l l Note: You cannot install the NMS to the system disk. It is not recommended to modify the size of the database space. 3. Change the path for saving the database file. Click OK. A confirm message box is displayed. Click Yes. 4. Repeat step 2 to 3 to change the paths for saving the database files of other products. 5. After decreasing the space size allocated to the database, click Next in the NetNumen Setup - Database config window. The system passes the database detection if the disk meets the space requirements of the database, see Figure 12-6. Figure 12-6 NetNumen Setup - System Information Detection (Database Detection Passed) Result Verification All detections are passed, and you can continue the installation of the U31 R22 server program. 12-15 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) 12.9.3 FTP Server Start Error Symptom The startup of the server program fails with the following message prompted: FATAL [com.zte.ums.uep.psf.ftp.server.FtpServer] ftp server start error! java.io.IOException: ftp server start error! The port *** has been used! Analysis The port of FTP (File Transfer Protocol) is occupied by another process and error occurs. Troubleshooting You can assign another FTP port to the process so that the process can release the FTP port needed by the server program. Or configure the server to use another port for the communication with NEs. The following describes how to change the FTP port used by the server program in the NetNumen Configuration Center. 1. On the server, use the following command in a Terminal window to open the uif directory under the installation directory of the server program and then run the runP lugCenter.sh file. # cd export/home/NetNumenU31/uif # ./runPlugCenter.sh The Network Configuration Center window is displayed, see Figure 12-7. Figure 12-7 NetNumen Configuration Center 12-16 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 12 Troubleshooting Note: If your U31 R22 server program is installed on a Windows operating system, double-click the runPlugCenter.bat file under the uif directory. 2. In the left pane of the NetNumen Configuration Center window, expand the Common Configuration node, and then click Common Configuration. 3. In the right pane, click the Server tab, expand the Global Configuration node, and then click the FTP port. 4. On the lower part of the right pane, enter the No. of the new port (for example, 21111) in the Value of config box, see Figure 12-8 Figure 12-8 FTP Port 5. Click Save All to save the change of FTP port. 6. Click Close to exit the NetNumen Configuration Center. Result Verification Run the server program again. The U31 R22 server starts up successfully without FTP server error. 12.10 Failure of Querying Performance Data Symptom The query result has no data when you query performance data in the U31 R22 system. Analysis The possible causes of the failure of performance data query include: 12-17 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) l l l l No measurement task is created in the U31 R22 system to collect the performance data you want. The measurement task used to collect the performance data you want is not activated. The measurement task does not collect the performance data you want because the time period set in the task does not cover that of the desired performance data. The communication between the NE(s) and the U31 R22 server has problem. Troubleshooting To troubleshoot the query failure of performance data, do the following: 1. In the client window of U31 R22, select Performance > Measurement Task Management on the menu bar. The Measurement Task Management tab is displayed. 2. On the Measurement Task Management tab, view the information of measurement tasks in the list to find whether a measurement task is responsible for collecting the performance data you want. l If no, create a new measurement task for collecting the desired performance data. Then the troubleshooting is completed. Note: For how to create a measurement task, refer to 4.3.1 Creating a Measurement Task. l If yes, proceed to the next step. 3. Check the status of the measurement task in the Task Status column on the Measurement Task Management tab. l If the status of the measurement task is "Suspend", right-click the measurement task, and then click Activate Measurement Task on the shortcut menu to activate the measurement task. Then the troubleshooting is completed. l If the status of the measurement task is "Active", proceed to the next step. 4. On the Measurement Task Management tab, check the start time and end time of the measurement task to find whether the collection period of the measurement task covers the time period set for querying performance data. l If no, modify the collection period of the measurement task in accordance with the instructions in 《 etNumen U31 R22 Unified Network Management System Performance Management Operation Guide 》 . l If yes, proceed to the next step. 5. In the client window of U31 R22, open the Topology Management window, and then check whether the NE whose performance data you want to query is online. If the NE is offline, check and make sure that the IP address of the NE is correctly configured on the server and the network connection between the NE and the U31 R22 server is normal. 12-18 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Chapter 12 Troubleshooting Result Verification You can successfully query the performance data you want in the U31 R22 system. 12-19 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) This page intentionally left blank. 12-20 SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Figures Figure 1-1 Operation Flow of the U31 R22................................................................ 1-2 Figure 1-2 Operation Result Display ......................................................................... 1-4 Figure 1-3 Portal ....................................................................................................... 1-7 Figure 1-4 Toolbar Customization Dialog Box.......................................................... 1-15 Figure 2-1 Topology Management Window ............................................................... 2-3 Figure 2-2 Topology Menu ........................................................................................ 2-4 Figure 2-3 Topology Graph Toolbar ........................................................................... 2-4 Figure 2-4 NE Icons .................................................................................................. 2-6 Figure 2-5 Alarm Color Illustration............................................................................. 2-7 Figure 2-6 Show Message Dialog Box .................................................................... 2-14 Figure 2-7 NE Tree ................................................................................................. 2-22 Figure 2-8 Entering a Keyword................................................................................ 2-23 Figure 2-9 Current Layer......................................................................................... 2-25 Figure 2-10 Topology Graph Toolbar ....................................................................... 2-27 Figure 2-11 Viewed Nodes ...................................................................................... 2-28 Figure 3-1 Fault Management View User Interface ................................................... 3-3 Figure 3-2 Management Tree.................................................................................... 3-4 Figure 3-3 NE Tree ................................................................................................... 3-4 Figure 3-4 Statistic Tree............................................................................................ 3-5 Figure 3-5 Alarm Panel ............................................................................................. 3-9 Figure 3-6 Alarm Panel Dialog Box ........................................................................... 3-9 Figure 3-7 Intermittent Alarm Setting Window ......................................................... 3-12 Figure 3-8 Intermittent Alarm Setting Dialog Box .................................................... 3-13 Figure 3-9 Alarm Monitoring Window ...................................................................... 3-14 Figure 3-10 Severity Regarding Setting Window ..................................................... 3-18 Figure 3-11 Setting Alarm Preload in Batches ......................................................... 3-20 Figure 3-12 Specified Alarms Monitoring Window ............................................... 3-22 Figure 3-13 BN-xTN Event Transforms to ADMC Alarm Dialog Box ........................ 3-23 Figure 3-14 Configuration Example (Alarm Setting) ................................................ 3-27 Figure 3-15 Right-Click Menu of Fault Management ............................................... 3-31 Figure 3-16 Alarm Query Navigation Tree ............................................................... 3-32 Figure 3-17 Default Alarm Query Templates ........................................................... 3-37 I SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Figure 3-18 Query Active Alarms Dialog Box .......................................................... 3-39 Figure 3-19 Entering a User-Defined Alarm Template Name ................................... 3-41 Figure 3-20 User-Defined Alarm Query Template Name ......................................... 3-41 Figure 3-21 Viewing the User-Defined Suggestion .................................................. 3-59 Figure 3-22 Statistic Tree........................................................................................ 3-61 Figure 4-1 Performance Monitoring Scheme ............................................................. 4-3 Figure 4-2 Performance Management View .............................................................. 4-4 Figure 4-3 Performance Menu .................................................................................. 4-5 Figure 4-4 Logical Filtering /Rendering Dialog Box.................................................. 4-15 Figure 4-5 Threshold Rendering Dialog Box ........................................................... 4-15 Figure 4-6 Index/Counter Selection Tab .................................................................. 4-32 Figure 4-7 Template Management Tab .................................................................. 4-44 Figure 4-8 Counter Selection Tab............................................................................ 4-56 Figure 4-9 Template Management Window ............................................................. 4-57 Figure 5-1 Shelf Information.................................................................................... 5-18 Figure 5-2 Self Statistics by Type............................................................................ 5-18 Figure 6-1 Security Menu.......................................................................................... 6-2 Figure 6-2 Security Management View...................................................................... 6-3 Figure 6-3 Relation Model of Security Management.................................................. 6-5 Figure 6-4 Set User Account Rule Dialog Box........................................................... 6-8 Figure 7-1 Log Management View ............................................................................ 7-2 Figure 9-1 Database Restoration Flow of the U31 R22 ........................................... 9-15 Figure 10-1 System Monitoring Window.................................................................. 10-2 Figure 11-1 Task Management View ....................................................................... 11-3 Figure 12-1 Troubleshooting Flow........................................................................... 12-2 Figure 12-2 View the Status of Network Adapter ................................................... 12-11 Figure 12-3 View the Status of Network Adapter ................................................... 12-12 Figure 12-4 NetNumen Setup - System Information Detection (Database Detection Not Passed)........................................................................................ 12-14 Figure 12-5 Database Configuration Dialog Box ................................................... 12-15 Figure 12-6 NetNumen Setup - System Information Detection (Database Detection Passed) .............................................................................................. 12-15 Figure 12-7 NetNumen Configuration Center ........................................................ 12-16 Figure 12-8 FTP Port ............................................................................................ 12-17 II SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Tables Table 1-1 System Parameter Setting....................................................................... 1-10 Table 1-2 Parameter Description of Select Lock Type Dialog Box ........................... 1-16 Table 2-1 Description of Topology Toolbar Buttons .................................................... 2-4 Table 2-2 Tooltip Item Descriptions ......................................................................... 2-11 Table 2-3 Toolbar on Monitoring Pane..................................................................... 2-16 Table 2-4 View Details of Alarm Information ............................................................ 2-17 Table 2-5 Differences Between the Three Ways...................................................... 2-23 Table 3-1 Descriptions for Parameters in the Basic Tab.......................................... 3-10 Table 3-2 Parameter Descriptions for Intermittent Alarm Setting ............................. 3-13 Table 3-3 Descriptions for Three Modes of Alarm Preload....................................... 3-19 Table 3-4 Board Configuration Plan Table (Alarm Setting)....................................... 3-27 Table 3-5 External Alarm Parameters (Alarm Setting) ............................................. 3-27 Table 3-6 External Alarm Tandem Parameters (Alarm Setting) ................................ 3-28 Table 3-7 Common Alarm Query Template Settings ................................................ 3-39 Table 3-8 Time Parameter Descriptions .................................................................. 3-43 Table 3-9 Parameter Descriptions for the Others Tab .............................................. 3-44 Table 3-10 Alarm Management Rule ....................................................................... 3-52 Table 3-11 Alarm Rule Parameter Descriptions ....................................................... 3-56 Table 3-12 Common Alarm Tasks ........................................................................... 3-70 Table 3-13 Parameter Descriptions for a Scheduled Statistic Task .......................... 3-71 Table 3-14 Advanced Settings ................................................................................ 3-72 Table 3-15 Parameter Descriptions for a Scheduled Export Task ............................ 3-73 Table 3-16 FTP Server Parameter Setting............................................................... 3-75 Table 3-17 Parameter Descriptions for a Suppressing Plan Task ............................ 3-76 Table 4-1 Performance Management Buttons on the Main Toolbar............................ 4-5 Table 4-2 Common Buttons on the Performance Management Toolbar ..................... 4-6 Table 4-3 Performance Module Parameter Setting .................................................... 4-6 Table 4-4 Descriptions for Parameters on the Index/Counter Selection Tab............. 4-14 Table 4-5 Description of Toolbar Buttons on the Measurement Task Management Tab......................................................................................................... 4-16 Table 4-6 Description of Toolbar Buttons for Template Tasks................................... 4-27 Table 4-7 Description of Toolbar Buttons for Task Results ....................................... 4-28 III SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) Table 4-8 Function Button Descriptions ................................................................... 4-28 Table 4-9 Function Button Descriptions ................................................................... 4-29 Table 4-10 Descriptions for Parameters in the Counter Selection Tab ................... 4-31 Table 4-11 Descriptions for Parameters in the Location Selection Tab .................. 4-32 Table 4-12 Common Performance Query Template Settings ................................... 4-33 Table 4-13 Functions of Buttons on the Toolbar of Common Template Tab.............. 4-45 Table 4-14 Parameter Descriptions for Counter Selection ...................................... 4-51 Table 4-15 Parameter Descriptions for Object Selection ......................................... 4-51 Table 4-16 Parameter Descriptions for Time Selection ........................................... 4-52 Table 4-17 Ways of Querying Performances in the Main Menu ............................... 4-52 Table 4-18 Parameter Descriptions for Counter Selection ...................................... 4-54 Table 4-19 Parameter Descriptions for Location Selection ..................................... 4-54 Table 4-20 Descriptions for Parameters in the Counter Selection Tab ..................... 4-55 Table 4-21 Descriptions for Parameters in the Location Selection Tab..................... 4-57 Table 4-22 Parameter Descriptions for Querying Archived Data .............................. 4-58 Table 4-23 Object Selection Parameter Descriptions............................................... 4-58 Table 4-24 Time Selection Parameter Descriptions ................................................. 4-58 Table 4-25 Parameter Descriptions for Real-Time Traffic Monitoring ....................... 4-70 Table 4-26 Parameter Descriptions for Real-Time Monitoring Tasks........................ 4-72 Table 4-27 Descriptions for Parameters on the General Page ................................. 4-87 Table 5-1 Statistical Condition Parameter Descriptions ............................................. 5-2 Table 5-2 Parameter Descriptions for the Statistical Report on a Board..................... 5-4 Table 5-3 Statistical Condition Parameter Descriptions ............................................. 5-4 Table 5-4 Query Condition Parameter Descriptions................................................... 5-6 Table 5-5 Parameter Descriptions for Link Statistics Report ..................................... 5-8 Table 5-6 Statistical Condition Parameter Descriptions ............................................. 5-8 Table 5-7 CTN/SDH Port Status Parameter Description .......................................... 5-10 Table 5-8 Parameter Descriptions for the Service Data Report ............................... 5-30 Table 5-9 Operations for Exporting the Service Data Report ................................... 5-30 Table 5-10 Parameter Descriptions for Service Statistics Report ............................ 5-31 Table 5-11 Operations for Exporting the Service Statistics Report ........................... 5-32 Table 5-12 Operations for Exporting the MSTP Fiber Usage Statistics Report.................................................................................................... 5-32 Table 5-13 Operations for Exporting the Isolated Cross Connection Data Report.................................................................................................... 5-33 Table 5-14 Parameter Descriptions for Protection Subnet Report ........................... 5-34 IV SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Tables Table 5-15 Operations for Exporting the Protection Subnet Report.......................... 5-35 Table 6-1 Security Management Example ................................................................. 6-7 Table 6-2 Parameter Descriptions for Creating a Role............................................. 6-11 Table 6-3 Parameter Descriptions for Creating a Role Set ...................................... 6-17 Table 6-4 Parameter Descriptions for Creating an Operation Set ............................ 6-21 Table 6-5 Parameter Descriptions for Creating a Department.................................. 6-26 Table 6-6 Parameter Descriptions of the Basic Tab ................................................ 6-29 Table 6-7 Parameter Descriptions of the Advanced Information Tab..................... 6-31 Table 7-1 Description of Parameters on the Basic Tab .............................................. 7-8 Table 7-2 Description of Advanced Query Parameters .............................................. 7-9 Table 7-3 Parameter Descriptions for File Transfer Mode Configuration ................. 7-13 Table 7-4 Parameter Descriptions on the General Tab ............................................ 7-16 Table 7-5 Parameter Descriptions on the Page Setup Tab ...................................... 7-16 Table 8-1 Parameter Descriptions for NCP Backup Configuration ............................ 8-8 Table 8-2 Parameter Descriptions for NCP Backup Configuration ............................ 8-8 Table 8-3 Parameter Descriptions for NCP Restoration Configuration ...................... 8-9 Table 9-1 Description of the Backup and Restoration Modes .................................... 9-1 Table 9-2 Backup and Restoration Items of the U31 System .................................... 9-2 Table 9-3 Backup and Restoration Items of the dbtool Tool ...................................... 9-3 Table 9-4 Backup and Restoration Items of the Offline Tool....................................... 9-3 Table 9-5 Application Scenarios for the Backup and Restoration............................... 9-3 Table 9-6 Description of Parameters for Backup and Deletion................................... 9-9 Table 9-7 Description of Parameters for Backup and Deletion................................. 9-10 Table 9-8 Description of Parameters for Backup and Deletion................................. 9-11 Table 9-9 dbtool Window Parameter Description .................................................... 9-13 Table 9-10 Dbtool Window Parameter Descriptions ................................................ 9-19 Table 11-1 Task Type - Operations Reference......................................................... 11-1 V SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Tables This page intentionally left blank. VI SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential Glossary ADMC - Auto Detected Manually Cleared CPU - Central Processing Unit CTN - Converged Transport Network FTP - File Transfer Protocol GUI - Graphical User Interface IP - Intelligent Peripheral IP - Internet Protocol KPI - Key Performance Indicator LOS - Loss of Signal MIB - Management Information Base NE - Network Element OTN - Optical Transport Network PI - Performance Index QoS - Quality of Service RAID - Redundant Array of Independent Disks SDH - Synchronous Digital Hierarchy SMS - Short Message Service VII SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential NetNumen™ U31 R22 Operation Guide (Common Operations) SNMP - Simple Network Management Protocol SNR - Subscription-Notification-Request SPI - Statistical Performance Index SSH - Secure Shell TELNET - Telecommunication Network Protocol UAS - User Agent Server WDM - Wavelength Division Multiplexing VIII SJ-20141211100735-007|2014-12-30 (R5.0) ZTE Proprietary and Confidential