IMS Web Operation Manual 1 Overview ..................................................................................................................... 1 1.1 Advantages ....................................................................................................... 1 1.2 Functional Division ........................................................................................... 1 1.3 Get Started With Webmaster .......................................................................... 2 2 Configuration .............................................................................................................. 3 2.1 IMS ................................................................................................................... 3 2.1.1 Common ................................................................................................ 4 2.1.2 Proxy-Call Session Control Function(P-CSCF) ........................................ 6 2.1.3 Interrogating-Call Session Control Function(I-CSCF) ............................. 8 2.1.4 Serving-Call Session Control Function(S-CSCF) ................................... 10 2.1.5 Emergency-Call Session Control Function(E-CSCF) ............................. 14 2.1.6 MMTEL-AS ........................................................................................... 16 2.1.7 Location Retrieval Function(LRF) ........................................................ 20 2.1.8 Multimedia Resource Function Controller(MRFC) .............................. 22 2.1.9 Breakout Gateway Control Function(BGCF) ........................................ 24 2.1.10 XCAP .................................................................................................. 26 2.2 UDM ............................................................................................................... 28 2.2.1 Authentication Data ............................................................................ 28 2.2.2 IMS Subscription ................................................................................. 37 3 Device Management ................................................................................................. 53 3.1 NF Management ............................................................................................ 54 3.1.1 Add NF ................................................................................................. 54 3.1.2 Query NF ............................................................................................. 55 3.1.3 Delete NF............................................................................................. 55 3.1.4 Other Configuration ............................................................................ 56 3.2 System Service Management ......................................................................... 56 3.2.1 Modify System Services ...................................................................... 56 3.3.2 Query System Services ........................................................................ 56 3.3 NIC Management ........................................................................................... 57 3.3.1 Add NIC ............................................................................................... 57 3.3.2 Query NIC ............................................................................................ 58 3.3.3 Delete NIC ........................................................................................... 58 3.4 Route Management ....................................................................................... 59 3.4.1 Add Route Management ..................................................................... 59 3.4.2 Query Route Management ................................................................. 60 3.4.3 Modify Route Management ................................................................ 60 3.4.4 Delete Route Management ................................................................. 60 3.5 System Management ..................................................................................... 61 3.5.1 Add System.......................................................................................... 61 3.5.2 Modify System .................................................................................... 61 3.5.3 Delete System ..................................................................................... 62 3.5.4 Other Configuration ............................................................................ 62 4 Security Management ............................................................................................... 63 4.1 User Management ......................................................................................... 63 I 4.1.1 Add User.............................................................................................. 63 4.1.2 Modify User ........................................................................................ 64 4.1.3 Copy User ............................................................................................ 65 4.1.4 Delete User ......................................................................................... 65 4.1.5 Query and View User .......................................................................... 66 4.1.6 Lock and Unlock User .......................................................................... 67 4.1.7 Add User IP Whitelist .......................................................................... 67 4.1.8 Logout User ......................................................................................... 68 4.2 User Group Management .............................................................................. 68 4.2.1 Add New Group................................................................................... 69 4.2.2 Modify Group ...................................................................................... 69 4.2.3 Copy Group ......................................................................................... 69 4.2.4 Delete User Group .............................................................................. 70 4.2.5 Query User Group ............................................................................... 71 4.2.6 User Group Management ................................................................... 72 4.2.7 Group Node Management .................................................................. 73 4.2.8 User Group Permission Management................................................. 73 4.3 Permission Management ............................................................................... 75 4.3.1 Permission List .................................................................................... 76 4.3.2 Permission Type .................................................................................. 78 5 Log Management ...................................................................................................... 80 5.1 Operation Log................................................................................................. 80 5.1.1 Query Operation Log........................................................................... 80 5.1.2 Download Operation Log .................................................................... 81 5.2 Security Log .................................................................................................... 81 5.3 Log Level Management .................................................................................. 82 5.3.1 Clear Log Files ..................................................................................... 82 5.3.2 Query and Download Log Files ........................................................... 83 5.3.3 Modify the NF Log Level ..................................................................... 83 5.4 Packet Capture Management ........................................................................ 84 5.4.1 Query Package..................................................................................... 84 5.4.2 Create A New Packet Capture ............................................................. 85 5.4.3 Stop Capturing .................................................................................... 85 5.4.4 Download Package .............................................................................. 86 5.4.5 Delete Package .................................................................................... 86 6 Software Management ............................................................................................. 87 6.1 Install Package Management ......................................................................... 87 6.2 Install Package Switch .................................................................................... 88 6.3 NF Process Management ............................................................................... 88 6.4 NF Version Management ............................................................................... 89 6.5 Query Software Status ................................................................................... 89 6.6 Update Web Management............................................................................. 90 7 Fault Management .................................................................................................... 90 7.1 Active Alarm ................................................................................................... 91 II 7.1.1 Query Alarm ........................................................................................ 91 7.1.2 Remark Alarm ..................................................................................... 91 7.1.3 Download Alarm ................................................................................. 92 7.1.4 Print Alarm .......................................................................................... 92 7.1.5 Edit Alarm Level .................................................................................. 93 7.1.6 Clear Alarm.......................................................................................... 93 7.1.7 Refresh Alarm...................................................................................... 94 7.2 History Alarm ................................................................................................. 94 7.2.1 Query History Alarm ........................................................................... 94 7.2.2 History Alarm Remarks ....................................................................... 95 7.2.3 Download Histroy Alarm ..................................................................... 96 7.2.4 Print Histroy Alarm .............................................................................. 96 7.2.5 Edit History Alarm Level ...................................................................... 96 7.3 View Alarm Summary..................................................................................... 97 7.4 Alarm File Management................................................................................. 97 7.4.1 Download Alarm File ........................................................................... 98 7.4.2 Delete A Single Alarm File ................................................................... 98 7.4.3 Delete Alarm Files In Batches ............................................................. 98 7.5 Alarm Storage Time Setting ........................................................................... 99 7.6 Alarm Time Duration Setting.......................................................................... 99 7.7 Alarm Threshold Setting .............................................................................. 100 8 Performance Management ..................................................................................... 101 8.1 Enter the Grafana Way ................................................................................. 101 8.2 Manage ........................................................................................................ 104 8.2.1 Manage-IMS ...................................................................................... 104 9 Call Trace(To be developed)............................................................................... 114 10 Other System Functions ........................................................................................ 114 10.1 License Information Management ............................................................. 114 10.1.1 View License Information ............................................................... 114 10.1.2 Import License File .......................................................................... 114 10.1.3 Get NFs License Status .................................................................... 115 10.2 Web Information Management ................................................................. 115 10.2.1 View the Web Information.............................................................. 115 10.2.2 Update Web Info ............................................................................. 115 10.2.3 Update Logo .................................................................................... 116 10.3 Status Query(To be developed) ................................................................. 117 10.4 Quick Modification ..................................................................................... 117 10.4.1 Quickly Modify PLMN ..................................................................... 117 10.4.2 Quickly Modify IP ............................................................................ 117 11 FAQ ........................................................................................................................ 119 12 Conclusion ............................................................................................................. 119 III 1 Overview This product is the management system of IMS4.0 version,which aims to provide users with a Web platform that interacts with IMS devices. 1.1 Advantages The interface is simple and elegant,very user-friendly,as long as there is a browser,it can be used without installation,and it can be adapted to terminals of various resolutions. Support HTTPS protocol to improve security performance. Support internationalization and localization,currently Chinese and English are implemented,and other languages will be added in the future according to actual needs. Independent deployment,supports concurrent operations. 1.2 Functional Division Web network management has the following functions: • Configuration Management:Configuration of network elements (IMS) as well as import,export and initialization of data. • Fault Management • Performance Management • Security Management • Log Management • Software Management • Call Trace • Device Management • UE Information • Web Information Management • License Management 1 1.3 Get Started With Webmaster The first step is to log in.After the network management is installed,open the web management login interface from a browser (Chrome browser,Firefox browser or edge browser is recommended).Log in to the system using the account and password provided by default (account: admin,password: 123456) and the IP and port of the backend of the network management (default 127.0.0.0:8500). Figure1.3-1 Login Interface The system interface after initial login is shown in Figure 1.3-2: Figure1.3-2 The interface after initial login to the system The interface after configuring each NF login is shown in Figure 1.3-3: Figure1.3-3 The interface after logging in to the system The second step is to add the system.See Section 3.5 for details. The third step is to add NF,see Section 3.1 for details. 2 The fourth step is to start configuring the parameters of each network element of the IMS.For details,see Chapter 2 Configuration or Section 9.2 for configuration initialization. If you want to check the performance parameters of IMS,please refer to Chapter 8 Performance Management. If you want to view the alarms of the IMS,please refer to Chapter 7 Fault Management. For other functions,please refer to other chapters later. 2 Configuration This chapter mainly configures the parameters of IMS network elements, including PCSCF, ICSCF, SCSCF, ECSCF, MMTEL-AS, LRF, MRFC, BGCF, and XCAP network elements.Users can flexibly configure the parameters of each network element according to actual needs through this Web platform.Each network element communicates with the Web platform through a Restful interface that follows the HTTP protocol. 2.1 IMS IMS (IP Multimedia Subsystem), using sip protocol for control, realizes mobility management, multimedia session signaling and bearer service transmission, and realizes end-to-end IP services. Figure2.1-1 IMS Menu 3 2.1.1 Common Description:General configuration provides the configuration of setting the system's PLMN,country code,system realm name and mobile phone number prefix. Path:Configuration → IMS → NF Name → Common Figure2.1.1-1 Common Configuration 2.1.1.1 System Configuration Description:System Configuration provides the configuration of setting IMS server realm name,country code and mobile phone number prefix. 2.1.1.1.1 Modify System Configuration Path:Configuration → IMS → NF Name → Common →System Configuration Step:Enter the data in the image below,such as Country_Code,Msisdn_seg,etc.,and then click the "Modify" button to save the data. Figure2.1.1.1.1-1 Modify System Configuration Configuration items and descriptions: Configuration items Descriptions Country_Code \ 4 Msisdn_seg Realm Mobile phone number segment/number prefix of this IMS system IMS server realm name 2.1.1.2 PLMN Configuration Description:Set the PLMN of the system. Configuration items and descriptions: Configuration items Descriptions Public Land Mobile Network,consisting of MCC and MNC PLMN 2.1.1.2.1 Add PLMN Configuration Path:Configuration → IMS → NF Name → Common →PLMN Configuration Step:Enter the relevant PLMN value in the input box and click "Add" to complete adding data. Figure2.1.1.2.1-1 Add PLMN Configuration 2.1.1.2.2 Delete PLMN Configuration Path:Configuration → IMS → NF Name → Common →PLMN Configuration Step:Select the PLMN of one of the records,click the red recycle bin button,and select "OK" in the next pop-up box to delete the record. 5 Figure2.1.1.2.2-1 Delete PLMN Configuration 2.1.2 Proxy-Call Session Control Function(P-CSCF) Description:The P-CSCF is the first point of connection to the user in IMS,providing proxy function, which accepts business requests and forwards them.The P-CSCF also provides user agent (UA) function,which breaks and independently generates SIP sessions in abnormal situations. Path:Configuration → IMS → NF Name → P-CSCF Figure2.1.2-1 P-CSCF 2.1.2.1 Pcscf Configuration Description:Pcscf Configuration provides configuration such as setting the IP used by the PCSCF network element,the listening port,and the log level. 2.1.2.1.1 Modify Pcscf Configuration Path:Configuration → IMS → NF Name → P-CSCF →Pcscf Configuration Step:Enter the data in the image below,such as Name,Listen,Port,etc.,and then click the "Modify" button to save the data. 6 Figure 2.1.2.1.1-1 Modify Pcscf Configuration Configuration items and descriptions: Configuration items Descriptions Name URI of pcscf,Uniform Resource Identifier,format: "sip: IP address: port",the default port of pcscf is 5060 Listen Set the IP address used by the Pcscf network element Port Set the port that the Pcscf network element listens on,the default is 5060 Emerg Support Set whether to enable emergency calls,on means open,off means close Debug Set the log level,the value range is -3~4,the value description (ALERT=-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG =4,sorted from small to large) Rtpproxy Enable Set whether to enable the rtp proxy function,on means open,off means close Pcrf Realm Setting PCFR/PCF realm names 2.1.2.2 P-CSCF Rx Peer Description:The P-CSCF Rx Peer is used to provide the Rx interface configuration of the PCF/PCRF interconnected by the PCSCF.You need to configure the IP of the Rx interface,the listening port,the host name,and the realm name. 2.1.2.2.1 Add P-CSCF Rx Peer Path:Configuration → IMS → NF Name → P-CSCF →P-CSCF Rx Peer Step:Enter the data in the figure below,such as Id,Interface,Fqdn,Realm,etc.,and then click the "Add" button to save the data. Figure2.1.2.2.1-1 Add P-CSCF Rx Peer Configuration items and descriptions: Configuration items Descriptions 7 Id Set the ID of the Configuration item Default The default is 0,only for declaration without special meaning Interface Set the listening port of the Rx interface of the PCF/PCRF network element,format: "IP:port" Metric Set the priority,the smaller the value,the higher the priority Fqdn Set the hostname used by the Rx interface Realm Set the realm name used by the Rx interface 2.1.2.2.2 Delete P-CSCF Rx Peer Path:Configuration → IMS → NF Name → P-CSCF →P-CSCF Rx Peer Step:Select the ID of one of the records,click the red recycle bin button,and select "OK" in the next pop-up box to delete the record. Figure2.1.2.2.2-1 Delete Pcscf Configuration 2.1.3 Interrogating-Call Session Control Function(I-CSCF) Description:Similar to the gateway node of IMS,it provides the functions of local user service node allocation,route query and topology hiding between IMS realms. Path:Configuration → IMS → NF Name → I-CSCF Figure2.1.3-1 I-CSCF 8 2.1.3.1 Icscf Configuration Description:Icscf Configuration provides configuration such as setting the IP used by the ICSCF network element,the listening port,and the log level. 2.1.3.1.1 Modify Icscf Configuration Path:Configuration → IMS → NF Name → I-CSCF →Icscf Configuration Step:Enter the data in the image below,such as Name,Listen,Port,etc.,and then click the "Modify" button to save the data. Figure2.1.3.1.1-1 Modify Icscf Configuration Configuration items and descriptions: Configuration items Descriptions Name URI of I-CSCF,Uniform Resource Identifier,in the format: "realm name of icscf.ims" Bgcf Interface Set the IP and port of the bgcf network element,format: "ip:port" Debug Set the log level,the value range is -3~4,the value description (ALERT=-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG =4,sorted from small to large) Hss realm Set the realm name of the Cx interface of the connected HSS/UDM NE Listen Set the IP address used by the icscf network element Port Set the port that the icscf network element listens on,the default is 4060 2.1.3.2 I-CSCF Cx Peer Description:The I-CSCF Cx Peer is used to provide the configuration of the Cx interface of the HSS/UDM connected to the ICSCF network element.It is necessary to configure the IP of the Cx interface,the listening port,the host name and the realm name and other information. 9 2.1.3.2.1 Add I-CSCF Cx Peer Path:Configuration → IMS → NF Name → I-CSCF →I-CSCF Cx Peer Step:Enter the data in the figure below,such as Id,Interface,Fqdn,Realm,etc.,and then click the "Add" button to save the data. Figure2.1.3.2.1-1 Add I-CSCF Cx Peer Configuration items and descriptions: Configuration items Descriptions Id Set the ID of the Configuration item Default The default is 0,only for declaration without special meaning Interface Set the listening IP and port of the Cx interface of the HSS/UDM network element,format: "IP:port" Metric Set the priority,the smaller the value,the higher the priority Fqdn Set the hostname used by the Cx interface Realm Set the realm name used by the Cx interface 2.1.3.2.2 Delete I-CSCF Cx Peer Path:Configuration → IMS → NF Name → I-CSCF →I-CSCF Cx Peer Step:Select the ID of one of the records,click the red recycle bin button,and select "OK" in the next pop-up box to delete the record. Figure2.1.3.2.2-1 Delete I-CSCF Cx Peer 2.1.4 Serving-Call Session Control Function(S-CSCF) Description:The S-CSCF is in the core control position in the IMS core network.It is 10 responsible for the registration authentication and session control of UE,performs the basic session routing function for the calling end and the called end IMS users,and performs the value-added AS routing trigger and business control interaction according to the IMS trigger rules signed by the user. Path:Configuration → IMS → NF Name → S-CSCF Figure2.1.4-1 S-CSCF 2.1.4.1 Scscf Configuration Description:Scscf Configuration provides setting the IP used by the SCSCF NF,listening port,log level and other configuration. 2.1.4.1.1 Modify Scscf Configuration Path:Configuration → IMS → NF Name → S-CSCF →Scscf Configuration Step:Enter the data in the following figure,such as Name,Listen,Port,etc.,and then click on the "Modify" button to save the data. Figure2.1.4.1.1-1 Modify Scscf Configuration Configuration items and descriptions: Configuration items Descriptions 11 Name URI for Scscf,Unified Resource Identifier,Format: "sip: scscf Host name: port",scscf The default port number is 6060 Debug Set the log level,take the value range-3~4,the value description (ALERT= -3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte d from small to large) Dialogs Expiration time Set the dialogs expiration time Free Call Set whether to enable free calling,on means open,off means close Online Charing Set whether to enable the online billing function,on means open,off means close Port Set the port that the scscf network element listens on,the default is 6060 Hss Realm Set the realm name of the Cx interface of the connected UDM NE Ocs Realm Set the realm name of OCS Bgcf_interface Set the IP and port of the bgcf network element,format: "ip:port" Listen Set the IP address used by scscf 2.1.4.2 S-CSCF Cx Peer Description:S-CSCF Cx Peer is used to provide the Cx interface configuration of HSS/UDM for SCSCF NF docking,including the IP of the Cx interface,the port of listening,the host name and the realm name. 2.1.4.2.1 Add S-CSCF Cx Peer Path:Configuration → IMS → NF Name → S-CSCF →S-CSCF Cx Peer Step:Enter the data in the following figure,such as Id,Interface,Fqdn,Realm,etc.,and then click on the "Add" button to save the data. Figure2.1.4.2.1-1Add S-CSCF Cx Peer 12 Configuration items and descriptions: Configuration items Descriptions Id Set up the ID of the Configuration item Default The default is 0,only for declaration without special meaning Interface Set the IP and port for the HSS / UDM NE Cx interface listening to,format: "IP: port" Metric Set the priority,the smaller the value,the higher the priority Fqdn Set the hostname used by the Cx interface Realm Set the realm name used by the Cx interface 2.1.4.2.2 Delete S-CSCF Cx Peer Path:Configuration → IMS → NF Name → S-CSCF →S-CSCF Cx Peer Step:Select the Id of one of the records,click the red recycle bin button,and select "OK" in the following pop-up box to delete the record. Figure2.1.4.2.2-1 Delete S-CSCF Cx Peer 2.1.4.3 S-CSCF Ro Peer Description:The S-CSCF Ro Peer is used to provide the Ro interface configuration of the OCS for the SCSCF NF docking,including the IP of the Ro interface,the listening port,the host name,and the realm name. 2.1.4.3.1 Add S-CSCF Ro Peer Path:Configuration → IMS → NF Name → S-CSCF →S-CSCF Ro Peer Step:Enter the data in the following figure,such as Id,Interface,Fqdn,Realm,etc.,and then click on the "Add" button to save the data. 13 Figure2.1.4.3.1-1 Add S-CSCF Cx Peer Configuration items and descriptions: Configuration items Descriptions Id Set the ID of the configuration item Default The default is 0,only for declaration without special meaning Interface Set the IP and port that the Ro interface of the OCS NF listens to,in the format: "IP:port" Metric Set the priority,the smaller the value,the higher the priority Fqdn Set the hostname used by the Ro interface Realm Set the realm name used by the Ro interface 2.1.4.3.2 Delete S-CSCF Ro Peer Path:Configuration → IMS → NF Name → S-CSCF →S-CSCF Ro Peer Step:Select the Id of one of the records,click the red recycle bin button,and select "OK" in the following pop-up box to delete the record. Figure2.1.4.3.2-1 Delete S-CSCF Ro Peer 2.1.5 Emergency-Call Session Control Function(E-CSCF) Description:The E-CSCF is responsible for handling emergency sessions in the IMS core network,receiving emergency session establishment requests from the P-CSCF,and routing emergency calls nearby to the emergency call service business center where the user visits. Path:Configuration → IMS → NF Name → E-CSCF 14 Figure2.1.5-1 E-CSCF 2.1.5.1 Modify Ecscf Configuration Path:Configuration → IMS → NF Name → E-CSCF →Ecscf Configuration Step:Enter in the data in Figure,such as Name,Listen,Debug,etc.,and then click on the "Modify" button to save the data. Figure2.1.5.1-1 Modify Ecscf Configuration Configuration items and descriptions: Configuration items Descriptions Name URI of ecscf,Uniform Resource Identifier,the format is: "sip:ecscf realm name:7060",the default port of ecscf is 7060 Debug Set the log level,take the value range-3~4,the value description (ALERT= -3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte d from small to large) Default Sos Set the default emergency number in the format of: SIP: Number @ realm Name" Enable Default Sos Set whether to enable the default emergency number 15 function,on means open,off means close Lrf Interface Set the URI of the LRF NE with a grid of: "sip: Full realm name: 9060" Listen Sets the IP address used by the ecscf 2.1.6 MMTEL-AS Description:MMTEL-AS provides multimedia telephone complementary services in the IMS core network. Path:Configuration → IMS → NF Name → MMTEL-AS basic services and Figure2.1.6-1 MMTEL-AS 2.1.6.1 MMTEL-AS Configuration Description:MMTEL-AS Configuration provides configuration such as setting the IP used by the MMTEL-AS network element,the listening port,and the log level. 2.1.6.1.1 Modify MMTEL-AS Configuration Path:Configuration → IMS → NF Name → MMTEL-AS →MMTEL-AS Configuration Step:Enter the data in the following figure,such as Name,Listen,Port,etc.,and then click on the "Modify" button to save the data. 16 Figure2.1.6.1.1-1 Modify MMTEL-AS Configuration Configuration items and descriptions: Configuration items Descriptions Name URI of mmtel-as,Uniform Resource Identifier,format: "sip: full realm name: 5065",the default port of mmtel-as is 5065 Debug Set the log level,take the value range-3~4,the value description (ALERT= -3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte d from small to large) Cdiv wait time Set the call waiting time No Answer Release Time Set the non-responsive voice release time.If the call is signed for the non-response call transfer,the call will be transferred to the target number at the set time at the ringing time Free Call Set whether to enable free calling,on means open,off means close Online Charing Set whether to use the online billing function,on means open,off means close Enable Voice Mail Set the voice mail switch,on means open,off means close Hss Realm Set the realm name of the sh interface of the connected HSS/UDM NE Ocs Realm Set the realm name of OCS Port Set the port that the mmtel-as network element listens on,the default is 5065 Voice Mail Target Set the voicemail number,the format is: "SIP:number@realm name" Listen Set the IP address used by mmtel-as 2.1.6.2 MMTEL-AS Sh Peer Description:The MMTEL-AS Sh Peer provides the configuration of the Sh interface of the HSS/UDM connected to the MMTEL-AS network element.You need to set the IP of the Sh interface,the listening port,the host name,and the realm name. 17 2.1.6.2.1 Add MMTEL-AS Sh Peer Path:Configuration → IMS → NF Name → MMTEL-AS →MMTEL-AS Sh Peer Step:Enter the data in the image below,such as Name,Listen,Port,etc.,and then click on the "Add" button to save the data. Figure2.1.6.2.1-1 Add MMTEL-AS Sh Peer Configuration items and descriptions: Configuration items Descriptions Id Set the ID of the configuration item Default The default is 0,only for declaration without special meaning Interface Set the IP and port monitored by the Sh interface of the HSS/UDM network element,format: "IP:port" Metric Set the priority,the smaller the value,the higher the priority Fqdn Set the hostname used by the Sh interface Realm Set the realm name used by the Sh interface 2.1.6.2.2 Delete MMTEL-AS Sh Peer Path:Configuration → IMS → NF Name → MMTEL-AS →MMTEL-AS Sh Peer Step:Select the ID of one of the records,click the red recycle bin button,and select "OK" in the next pop-up box to delete the record. Figure2.1.6.2.2-1 Delete MMTEL-AS Sh Peer 18 2.1.6.3 MMTEL-AS Ro Peer Description:The MMTEL-AS Ro Peer provides the configuration of the Ro interface of the OCS connected to the MMTEL-AS.You need to set the IP of the Ro interface,the listening port,the host name,and the realm name. 2.1.6.3.1 Add MMTEL-AS Ro Peer Path:Configuration → IMS → NF Name → MMTEL-AS →MMTEL-AS Ro Peer Step:Enter the data in the image below,such as Name,Listen,Port,etc.,and then click on the "Add" button to save the data. Figure2.1.6.3.1-1 Add MMTEL-AS Ro Peer Configuration items and descriptions: Configuration items Descriptions Id Set the ID of the configuration item Default The default is 0,only for declaration without special meaning Interface Set the IP and port that the Ro interface of the OCS NE listens to,in the format: "IP:port" Metric Set the priority,the smaller the value,the higher the priority Fqdn Set the hostname used by the Ro interface Realm Set the realm name used by the Ro interface 2.1.6.3.2 Delete MMTEL-AS Ro Peer Path:Configuration → IMS → NF Name → MMTEL-AS →MMTEL-AS Ro Peer Step:Select the ID of one of the records,click the red recycle bin button,and select "OK" in the next pop-up box to delete the record. 19 Figure2.1.6.3.2-1 Delete MMTEL-AS Ro Peer 2.1.7 Location Retrieval Function(LRF) Description:LRF provides routing information in the IMS core network,selects the nearest PSAP/emergency center,provides UE location information,and routes the information to the emergency call service center accurately,accepts the positioning request from the PSAP/emergency center and sends it to the PSAP/emergency center Initial location information of the UE,updates the location information of the UE at the request of the PSAP/emergency center. Path:Configuration → IMS → NF Name → LRF Figure2.1.7-1 LRF 2.1.7.1 Lrf Configuration Description:Lrf Configuration provides configuration such as setting the IP used by the LRF network element,the listening port,and the log level. 2.1.7.1.1 Modify Lrf Configuration Path:Configuration → IMS → NF Name → LRF →Lrf Configuration Step:Enter the data in the figure below,such as IMS Name,Listen,etc.,and then click on the "Add" button to save the data. 20 Figure2.1.7.1.1-1 Modify Lrf Configuration Configuration items and descriptions: Configuration items Descriptions IMS Name URI of LRF,Uniform Resource Identifier,the format is: "sip: full realm name: 9060",the default port used by lrf is 9060 Debug Set the log level,take the value range-3~4,the value description (ALERT= -3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte d from small to large) Listen Set the IP address used by the lrf NE Use Lost Server Set the location service switch,on means open,off means close Use Lost Number Set the local number switch,on means open,off means close 2.1.7.2 Emerg Num Peer Description:Emerg Num Peer provides the configuration of the real emergency center number of the PSAP/emergency center connected to the LRF network element,and is used to realize the mapping between the UE location information and the real emergency number of the PSAP/emergency center. 2.1.7.2.1 Add Emerg Num Peer Path:Configuration → IMS → NF Name → LRF →Emerg Num Peer Step:Enter the data in the image below,such as Name,Listen,Port,etc.,and then click on the "Add" button to save the data. 21 Figure2.1.7.2.1-1 Add Emerg Num Peer Configuration items and descriptions: Configuration items Descriptions Id Set the ID of the configuration item Orig Num Set the source emergency number to match the emergency number dialed by the user Emerg Name Set emergency number name Real Num Set the real emergency number,the number that the IMS actually transfers,that is,the specific rescue center number 2.1.7.2.2 Delete Emerg Num Peer Path:Configuration → IMS → NF Name → LRF →Emerg Num Peer Step:Select the ID of one of the records,click on the red recycle bin button,and select "OK" in the next pop-up box to delete the record. Figure2.1.7.2.2-1 Delete Emerg Num Peer 2.1.8 Multimedia Resource Function Controller(MRFC) Description:Control media resources on MRFP,parse SIP resource control commands from other S-CSCFs and ASs,convert them into corresponding control commands for MRFP and generate corresponding charging information. MRFC and MRFP cooperate with network elements such as CSCF in IMS network Work together to complete IMS users' multimedia CRBT (for example,playing the specified background music to the calling party while waiting for the called party to answer),multimedia chromatic 22 images,and video calls and other service functions closely related to multimedia. Path:Configuration → IMS → NF Name →MRFC Figure2.1.8-1 MRFC 2.1.8.1 Modify Mrfc Configuration Path:Configuration → IMS → NF Name →MRFC →Mrfc Configuration Step:Enter the data in the figure below,such as Name,Listen,Debug,etc.,and then click on the "Modify" button to save the data. Figure2.1.8.1-1 Modify Mrfc Configuration Configuration items and descriptions: Configuration items Descriptions IMS Name URI of mrfc,Uniform Resource Identifier,the format is: "sip: full realm name: 5066",the port used by mrfc is 5066 by default Debug Set the log level,take the value range-3~4,the value description (ALERT= -3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte d from small to large) Listen Set the IP address used by mrfc 23 Mrf Enable Precondition Set the resource reservation switch,on means open,off means close Port Set the port that mrfc listens on,the default is 5066 2.1.9 Breakout Gateway Control Function(BGCF) Description:The BGCF selects the MGCF for the call from the IMS to the PSTN/PLMN network according to the interworking rule configuration or the called party analysis,so as to realize the automatic acquisition of the MGCF route. Path:Configuration → IMS → NF Name →BGCF Figure2.1.9-1 BGCF 2.1.9.1 BGCF Configuration Description:BGCF Configuration provides configuration such as setting the IP used by the BGCF network element,the listening port,and the log level. 2.1.9.1.1 Modify BGCF Configuration Path:Configuration → IMS → NF Name → BGCF →BGCF Configuration Step:Enter the data in the figure below,such as IMS Name,Listen,etc.,and then click on the "Modify" button to save the data. Figure2.1.9.1.1-1 Mofigy BGCF Configuration 24 Configuration items and descriptions: Configuration items Descriptions IMS Name URI of bgcf,Uniform Resource Identifier,the format is: "sip: full realm name: 8060",the default port used by bgcf is 8060 Debug Set the log level,take the value range-3~4,the value description (ALERT= -3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte d from small to large) Listen Set the IP address used by the bgcf network element Port Set the port that the bgcf network element listens on,the default is 8060 2.1.9.2 MGW Route Description:Mgw routing,configure the number segment to route to the corresponding MGCF/MGW 2.1.9.2.1 Add MGW Route Path:Configuration → IMS → NF Name → BGCF →MGW Route Step:Enter the data in the image below,such as Id,Number Prex,Mgw,etc.,and then click on the "Add" button to save the data. Figure2.1.9.2.1-1Add MGW Route Configuration items and descriptions: Configuration items Descriptions Id Set the ID of the configuration item Number Prex Mgw Set phone number prefix Set the IP port of MGCF/MGW,the format is: "IP:port" 25 2.1.9.2.2 Delete MGW Route Path:Configuration → IMS → NF Name → BGCF →MGW Route Step:Select the ID of one of the records,click on the red recycle bin button,and select "OK" in the next pop-up box to delete the record. Figure2.1.9.2.2-1 Delete MGW Route 2.1.10 XCAP Description:The XCAP service processes the HTTP requests for reading,writing and modifying application configuration data in XML format stored by the application client to the application server,and updates to HSS/UDM. Path:Configuration → IMS → NF Name →XCAP Figure2.1.10-1 XCAP 2.1.10.1 XCAP Configuration Description:XCAP Configuration provides configuration such as setting the IP used by the XCAP network element,the listening port,and the log level. 26 2.1.10.1.1 XCAP Configuration Path:Configuration → IMS → NF Name →XCAP →XCAP Configuration Step:Enter the data in the figure below,such as IMS Name,Listen,etc.,and then click on the "Modify" button to save the data. Figure2.1.10.1.1-1 Modify XCAP Configuration Configuration items and descriptions: Configuration items Descriptions IMS Name URI of xcap,Uniform Resource Identifier,the format is: "sip: full realm name: 80",the port used by xcap is 80 by default Debug Set the log level,take the value range-3~4,the value description (ALERT=-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG =4,sorted from small to large) Listen Set the IP address used by the xcap network element Port Set the port that the xcap network element listens on,the default is 80 2.1.10.2 XCAP Sh Peer Description:For XCAP Sh Peer,you need to fill in the HSS/UDM IP,listening port,host name and realm name and other information. 2.1.10.2.1Add XCAP Sh Peer Path:Configuration → IMS → NF Name →XCAP →XCAP Sh Peer Step:Enter the data in the image below,such as Id,Fqdn,Realm,etc.,and then click on the "Add" button to save the data. 27 Figure2.1.10 .2.1-1Add XCAP Sh Peer Configuration items and descriptions: Configuration items Descriptions Id Set the ID of the configuration item Default The default is 0,only for declaration without special meaning Interface Set the IP and port of HSS/UDM listening,format: "IP:port" Metric Set the priority,the smaller the value,the higher the priority Fqdn Set the hostname used by HSS/UDM Realm Set the realm name used by HSS/UDM 2.1.10.2.2 Delete XCAP Sh Peer Path:Configuration → IMS → NF Name →XCAP →XCAP Sh Peer Step:Select the ID of one of the records,click on the red recycle bin button,and select "OK" in the next pop-up box to delete the record. Figure2.1.10.2.2-1 Delete XCAP Sh Peer 2.2 UDM 2.2.1 Authentication Data Description:Authentication data management is used to provide all authentication data operations related to the authentication mode,involving K4 data operations,AMF data operations and OP data operations. Path:Configuration → UDM → NF Name → Auc →Authentication Data 28 Figure2.2.1-1 Authentication Data 2.2.1.1 Authentication Data Description:Authentication Data involves K4 (see 2.2.1.2), AMF (see 2.2.1.3), OP (see 2.2.1.4). Before adding user authentication data,you need to add K4,AMF,and OP template data parameters in the navigation bar at the same level. 2.2.1.1.1 Add Authentication Data Path:Configuration → UDM → NF Name → Auc →Authentication Data Step:Enter the data in the image below,such as IMSI,KI (32-digit hexadecimal number),etc.,and then click on the "Add" button to save the data. Figure2.2.1.1.1-1 Add Authentication Data Configuration items and descriptions: Configuration items Descriptions 29 IMSI Uniquely identifies a mobile user globally KI Used to authenticate user data K4 The transmission key,used when adding the KI value,is used to encrypt the KI value to ensure the security of the authentication key KI in the storage process,and is used to encrypt and decrypt KI/OPC KI K4 Encrypted Opc encryption options OP Introduced when using the MILENAGE authentication algorithm,it is an input parameter of the authentication calculation.All users of one operator can use the same OP to distinguish them from users of other operators. OPC It is the result of encrypting the OP value with KI as the key,and can be used for the calculation of the encryption function OPC K4 Associate the required K4 template,indicating whether to encrypt or decrypt OPC when the user has selected OPC.If the K4 template is not 0,it means encryption OPC K4 Encrypted / AMF Associate the required AMF template Card Type SIM Card Type Algorithm 2G and 3G are HLR user authentication configuration items Auth Type Authentication algorithm template required for association 2.2.1.1.2 Modify Authentication Data Path:Configuration → UDM → NF Name → Auc →Authentication Data Step:Click one of the IMSIs to jump to the details interface.After modification,click on the "Modify" button,and then click on the "Back" button to return to the previous interface. 30 Figure2.2.1.1.2-1 Modify Authentication Data 2.2.1.1.3 Delete Authentication Data Path:Configuration → UDM → NF Name → Auc →Authentication Data Step: Method 1: Select the record to be deleted,click on the red delete button,and select "OK" in the next pop-up box Figure2.2.1.1.3-1 Delete Authentication Data Method 2: Click one of the IMSIs to jump to the details interface,and click on 31 the "Delete" button in the displayed details interface. Figure2.2.1.1.3-2 Delete Authentication Data 2.2.1.1.4 Query Authentication Data Path:Configuration → UDM → NF Name → Auc →Authentication Data Step:Click one of the IMSIs of the user authentication data,or fill in the IMSI to edit in the IMSI input box and click on the "Query" button or press Enter. Figure2.2.1.1.4-1 Query Authentication Data List 32 Figure2.2.1.1.4-2 Query Authentication Data 2.2.1.2 K4 Description:K4 is the cipher key,which is the key of the authentication key KI,and is used to encrypt and decrypt the KI. Configuration items and descriptions: Configuration items Descriptions ID Template ID Name Template Name Value Transport key Algorithm Authentication algorithm 2.2.1.2.1 Add K4 Path:Configuration → UDM → NF Name → Auc →K4 Step:Enter the relevant value in the input box,where ID is a positive integer value.Name is no more than 64 characters.Value is a 32-bit 64-digit number.Finally click "Add" to complete the Add data. 33 Figure2.2.1.2.1-1 Add K4 2.2.1.2.2 Delete K4 Path:Configuration → UDM → NF Name → Auc →K4 Step:Select the ID of one of the records,click on the red recycle bin button,and select "OK" in the next pop-up box to delete the record. Figure2.2.1.2.2-1 Delete K4 2.2.1.3 AMF Description:AMF is the Access and Mobility Management Function,and can calculate the MAC value together with SQN,RAND,and KI. Configuration items and descriptions: Configuration items Descriptions ID Template ID Name Template Name The value of Authentication management Value field 2.2.1.3.1 Add AMF Path:Configuration → UDM → NF Name → Auc →AMF Step:Enter the relevant value in the input box,where ID is a unique positive 34 integer.Name is unique and no more than 64 characters.Value is a hexadecimal number with a length of 32.Finally click "Add" to complete the Add data. Figure2.2.1.3.1-1 Add AMF 2.2.1.3.2 Delete AMF Path:Configuration → UDM → NF Name → Auc →AMF Step:Select the ID of one of the records,click on the red recycle bin button and select "Ok" in the next pop-up box to delete the record. Figure2.2.1.3.2-1 Delete AMF 2.2.1.4 OP Description:OP is the operator variable algorithm configuration field,which is an input parameter of authentication calculation.The OP value can be obtained by encrypting and calculating with KI as the key. Configuration items and descriptions: Configuration items Descriptions ID Template ID Name Template Name Value The value of OP 35 2.2.1.4.1 Add OP Path:Configuration → UDM → NF Name → Auc →OP Step:Enter the relevant value in the input box,where ID is a unique positive integer.Name no more than 64 characters.Value is optional but no more than 33 characters.Finally click "Add" to complete adding data. Figure2.2.1.4.1-1 Add OP 2.2.1.4.2 Delete OP Path:Configuration → UDM → NF Name → Auc →OP Step:Select the ID of one of the records,click the red recycle bin button,and select "OK" in the next pop-up box to delete the record. Figure2.2.1.4.2-1 Delete OP 36 2.2.2 IMS Subscription 2.2.2.1 Network 2.2.2.1.1 Visited Network 2.2.2.1.1.1 Add Visited Network Path:Configuration → UDM → NF Name → IMS Subcription → Network →Visited Network Step:Click on the "Add" button,fill in the parameters in the following details interface,and finally click on the "Add" button at the bottom of the interface to save. Figure2.2.2.1.1.1-1 Visited Network List Figure2.2.2.1.1.1-2 Add Visited Network Configuration items and descriptions: Configuration items Descriptions ID List ID Identity Allowed access network name identifier 37 Example:ims.mnc000.mcc460.3gppnetwork.org 2.2.2.1.1.2 Modify Visited Network Path:Configuration → UDM → NF Name → IMS Subcription → Network →Visited Network Step:Click the visited network name under the Identity list.After modification,click the "Modify" button and select "OK" in the next pop-up box to modify the data. Figure2.2.2.1.1.2-1 Modify Visited Network 2.2.2.1.1.3 Delete Visited Network Path:Configuration → UDM → NF Name → IMS Subcription → Network →Visited Network Step:Select the name of one of the records,click on the red recycle bin button,and select "OK" in the next pop-up box to delete the record Figure2.2.2.1.1.3-1 Delete Visited Network 38 2.2.2.1.2 S-CSCF Capability 2.2.2.1.2.1 Add S-CSCF Capability Path:Configuration → UDM → NF Name → IMS Subcription → Network →S-CSCF Capability Step:Click on the "Add" button,fill in the parameters in the following details interface,and finally click on the "Add" button at the bottom of the interface to save. Figure2.2.2.1.2.1-1 S-CSCF Capability List Figure2.2.2.1.2.1-1 Add S-CSCF Capability 2.2.2.1.2.2 Modify S-CSCF Capability Path:Configuration → UDM → NF Name → IMS Subcription → Network →S-CSCF Capability Step:Click the S-CSCF Capability name under the Name list,and after the modification is completed,click on the "Modify" button,and select "Ok" in the next pop-up box to modify the data. 39 Figure2.2.2.1.2.2-1 Modify S-CSCF Capability 2.2.2.1.2.3 Delete S-CSCF Capability Path:Configuration → UDM → NF Name → IMS Subcription → Network →S-CSCF Capability Step:Select the name of one of the records,click on the red recycle bin button,and select "OK" in the next pop-up box to delete the record. Figure2.2.2.1.2.3-1 Delete S-CSCF Capability 2.2.2.1.3 Preferred S-CSCF 2.2.2.1.3.1 Add Preferred S-CSCF Path:Configuration → UDM → NF Name → IMS Subcription → Network →Preferred S-CSCF Step:Click on the "Add" button,fill in the parameters in the following details interface,and finally click on the "Add" button at the bottom of the interface to save. 40 Figure2.2.2.1.3.1-1 Preferred S-CSCF List Figure2.2.2.1.3.1-2 Add Preferred S-CSCF Configuration items and descriptions: Configuration items Descriptions Id Set ID Set Name The name of Prefferred S-CSCF Sip Url S-CSCF Sip Url Example:sip:scscf.ims. com:6060 Priority The priority of Prefferred S-CSCF 2.2.2.1.3.2 Modify Preferred S-CSCF Path:Configuration → UDM → NF Name → IMS Subcription → Network →Preferred S-CSCF Step:Click the Preferred S-CSCF name under the Name list.After the modification is completed,click on the "Modify" button,and select "Ok" in the next pop-up box to modify the data. 41 Figure2.2.2.1.3.2-1 Modify Preferred S-CSCF 2.2.2.1.3.3 Delete Preferred S-CSCF Path:Configuration → UDM → NF Name → IMS Subcription → Network →Preferred S-CSCF Step:Select the name of one of the records,click on the red recycle bin button,and select "OK" in the next pop-up box to delete the record Figure2.2.2.1.3.3-1 Delete Preferred S-CSCF 2.2.2.2 Service 2.2.2.2.1 Service Profile 2.2.2.2.1.1 Add Service Profile Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Step:Fill in the service name in the box behind Name,and then click on the "Add" button.After the prompt is added successfully,click "OK" to add it successfully. 42 Figure2.2.2.2.2.1-1 Service Profile List Figure2.2.2.2.2.1-2 Add Service Profile 2.2.2.2.1.2 Delete Service Profile Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Step:Click on the red Recycle Bin button and select "OK" in the next pop-up box to delete the data. Figure2.2.2.2.2.2-1 Delete Service Profile 2.2.2.2.2 Initial Filter Criteria 2.2.2.2.2.1 Add Initial Filter Criteria Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Association Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service Profile,click on the "Add" button,click the "Add" button behind the Initial Filter Criteria,fill in the parameters in the next details interface,and finally click on the "Add" button below the page to save. 43 Figure2.2.2.2.2.1-1 Add Initial Filter Criteria Figure2.2.2.2.2.1-2 Add Initial Filter Criteria Figure2.2.2.2.2.1-3 Add Initial Filter Criteria 2.2.2.2.2.2 Modify Initial Filter Criteria Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Association Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service Profile,click the service name in the Name list in "Initial Filter Criteria",after the modification is completed,click on the "Modify" button,and select "OK" in the next pop-up box ,you can modify the data. 44 Figure2.2.2.2.2.2-1 Modify Initial Filter Criteria 2.2.2.2.2.3 Delete Initial Filter Criteria Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Association Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service Profile,click on the red recycle bin button,and select "Ok" in the next pop-up box to delete the data. Figure2.2.2.2.2.3-1 Delete Initial Filter Criteria 45 2.2.2.2.3 Application Server 2.2.2.2.3.1 Add Application Server Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Association Step:Click on the "Add" button behind the Application Server,fill in the parameters in the following details interface,and finally click on the "Add" button at the bottom of the interface to save. Figure2.2.2.2.3.1-1 Add Application Server Configuration items and descriptions: Configuration items Descriptions Name \ Server Name Example:sip:Name.ims.IMS realm Name:5065 FQDN Example:Name.ims.IMS realm Name 2.2.2.2.3.2 Modify Application Server Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Association Step:Click the Name list service name in Figure 2.2.2.2.2.1-1 Service Profile,click the Name list service name in "Application Server",click on the "Modify" button,and select "OK" in the next pop-up box to modify the data. 46 Figure2.2.2.2.3.2-1 Modify Application Server 2.2.2.2.3.3 Delete Application Server Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Association Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service Profile,click on the red recycle bin button,and select "OK" in the next pop-up box to delete the data. Figure2.2.2.2.3.3-1 Delete Application Server 47 2.2.2.2.4 Trigger Point 2.2.2.2.4.1 Add Trigger Point Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Association Step:Click on the "Add" button after the Trigger Point,fill in the parameters in the following details interface,and finally click on the "Add" button at the bottom of the interface to save. Figure2.2.2.2.4.1-1 Add Trigger Point Configuration items and descriptions: Configuration items Descriptions Name / Condition Type / 2.2.2.2.4.2 Modify Trigger Point Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Association Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service Profile,click the service name in the Name list in "Trigger Point",after the modification is completed,click on the "Modify" button,and select "OK" in the next pop-up box to modify the data. 48 Figure2.2.2.2.4.2-1 Modify Trigger Point 2.2.2.2.4.3 Delete Trigger Point Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Association Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service Profile,click on the red recycle bin button,and select "OK" in the next pop-up box to delete the data. Figure2.2.2.2.4.3-1 Delete Trigger Point 2.2.2.2.5 Service Point Trigger 2.2.2.2.5.1 Add Service Point Trigger Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service 49 Profile Association Step:Click on the "Add" button behind the Service Point Trigger,fill in the parameters in the following details interface,and finally click on the "Add" button at the bottom of the interface to save. Figure2.2.2.2.5.1-1 Add Service Point Trigger 2.2.2.2.5.2 Modify Service Point Trigger Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Association Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service Profile,click the service name in the Name list in "Service Point Trigger",after the modification is completed,click on the "Modify" button,and select "OK" in the next pop-up box ,you can modify the data. 50 Figure2.2.2.2.5.2-1 Modify Service Point Trigger 2.2.2.2.5.3 Delete Service Point Trigger Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service Profile Association Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service Profile,click on sthe red recycle bin button,and select "OK" in the next pop-up box to delete the data. Figure2.2.2.2.5.3-1 Delete Service Point Trigger 51 2.2.2.3 IMS Batch Subscription 2.2.2.3.3 Batch Subscription 2.2.2.3.3.1 Batch Add IMS Subscription Information Path:Configuration → UDM → NF Name → IMS Subscription → IMS Batch Subscription Step:Fill in the required parameters and click on the Add button. Figure2.2.2.3.3.1-1 Add bulk subscription data Configuration items and descriptions: Configuration items Descriptions IMSI Uniquely identifies a mobile user globally Realm Name realm name (must be in the following format) Example:ims.mnc007.mcc460.3gppnetwork.org Msisdn Phone number AMF Name A new profile is required here on the Auc interface (located below) Figure2.2.2.3.3.1-2 New ims_amf Configuration 52 2.2.2.3.3.2 Batch Delete IMS Subscription Information Path:Configuration → UDM → NF Name → IMS Subscription → IMS Batch Subscription Step:Fill in the required parameters and click on the delete button. Figure2.2.2.3.3.2-1 Delete bulk subscription data 2.2.2.4 IMS User The addition of the User page (IMS user information) can be added quickly using the batch addition method.After opening accounts in batches,you can modify and delete them. 3 Device Management Description:Provide network element 53 management,system service management,network card management,routing management functions Path:System --> Device Management management and system Description:Provide network element management,system management,network card management,routing management and management functions Path:System --> Device --> NF Management service system 3.1 NF Management Figure3.1-1 NF List 3.1.1 Add NF Path:System --> NF Management --> NF Management Step:Click on the "Add NF" button under the NF Management interface --> Fill in the configuration information in the pop-up box --> Click the "Save" button to add it successfully. Figure3.1.1-1 Add NF Configuration items and descriptions: Configuration items Descriptions System Select the system to which the NE belongs from the drop-down list NF Type \ NF Internal Id Name the NF,which will be displayed under Configuration NF Name Name this configuration item and identify this configuration item 54 NF Descriptions NF description items IP IP address used by the network element License ID Its value comes from the ID of the corresponding NF in the License management interface under System 3.1.2 Query NF Path:System-->NF Management-->NF Management Step:Select the NF type in the NF Type drop-down box --> Select the system to which the NE belongs in System --> Click on the "Query" button,and the query results will be displayed in the list. Figure3.1.2-1 Query NF 3.1.3 Delete NF Path:System-->NF Management Steps to delete multiple network elements:Check the list in the NF Management interface and select multiple NFs to be deleted-->Click the "Delete NFs" button-->Click the "OK" in the pop-up box to delete it successfully. Figure3.1.3-1 Delete NF Steps to delete a single network element:Select the NF to be deleted from the list on the NF Management interface --> Click the "Delete" icon on the right side of the corresponding row --> Click the "OK" in the pop-up box to delete it successfully. Figure3.1.3-2 Delete NF 55 3.1.4 Other Configuration Path:System-->NF Management-->NF Management Description: :View the performance parameters of the NF system,including hard disk usage,CPU usage,NF management IP address,and memory usage. :Edit NF Information :Restart the NF device Figure3.1.4-1 Other configuration paths 3.2 System Service Management Description:Provide management related service node configuration Path:System-->Device Management-->System Service Management 3.2.1 Modify System Services Path:System-->Device Management-->System Service Management Step:Click on the Modify button under the System Service Management interface --> Fill in the configuration information in the pop-up box --> Click the "Modify" button to modify it successfully. Figure3.2.1-1 Service List 3.3.2 Query System Services Path:System-->Device Management-->System Service Management Step:Select the type of query in the drop-down box --> Click on the "Query" button.If it exists,the query result will be displayed under the list.If it does not exist,the list will be displayed as empty. 56 Figure3.3.2-1 Query System Services 3.3 NIC Management Description:Provides management NIC configuration Path:System-->Device Management-->NIC Management 3.3.1 Add NIC Path:System-->Device Management-->NIC Management Step:Click the "Add NIC" button under the NIC Management interface --> fill in the configuration information in the pop-up box --> click the "Add" button in the pop-up box,the addition is successful. Notice: 1. Add lo: X.IP and Mask.After filling in the IP,you must write the mask prefix.Net Mask must also be written,and the Gateway can be omitted. Figure3.3.1-1 NIC List 57 Figure3.3.1-2 Add NIC Configuration items and descriptions: Configuration items Descriptions System Select the core network system NIC NIC name IP IP address Gateway Gateway address Net Mask Subnet mask 3.3.2 Query NIC Path:System-->Device Management-->NIC Management Step:Select the type of query system in the drop-down box --> Click on the "Query" button,if it exists,the query results will be displayed under the list Figure3.3.2-1 Query NIC 3.3.3 Delete NIC Path:System-->Device Management-->NIC Management Step:Click on the delete icon in the corresponding row of the NIC to be deleted on the NIC Management interface --> Click the "OK" in the pop-up box to delete it successfully. 58 Figure3.3.3-1 Delete NIC 3.4 Route Management Description:Provides Route Management Path:System-->Device Management-->Route Management 3.4.1 Add Route Management Path:System-->Device Management-->Route Management Step:Click "Add Route" --> Fill in the configuration information in the pop-up box --> Click on the "Add" button to add successfully. Figure 3.4.1-1 Route List Figure 3.4.1-2 Add Route Configuration items and descriptions: Configuration items Descriptions 59 System Select the core network system NIC NIC name Network Segment Network segment,format:ip network segment/subnet mask bits Gateway Gateway address 3.4.2 Query Route Management Path:System-->Device Management-->Route Management Step:Select epc in the drop-down box-->click "Query",if it exists,the result will be displayed under the list,if not,the list will be empty. Figure3.4.2-1 Query Route 3.4.3 Modify Route Management Path:System-->Device Management-->Route Management Step:Click the NIC name of the configuration item you want to modify in the Iface column in the list --> Fill in the NIC,Network Segment,and Gateway information in the pop-up box --> Click the "Modify" button to modify it successfully. Figure3.4.3-1 Modify Route Management 3.4.4 Delete Route Management Path:System-->Device Management-->Route Management Step:Click the delete icon in the row corresponding to the routing configuration you want to delete in the list --> click the "OK" button --> Click on the "OK" button to 60 delete it successfully. Figure3.4.4-1 Delete Route 3.5 System Management Description:Provides configuration for managing core network element machines Path:System-->Device Management-->System Management 3.5.1 Add System Path:System-->Device Management-->System Management Step:Click "Add System" under the System Management interface --> Fill in the configuration information in the pop-up box --> Click "Add" in the pop box to add successfully Figure3.5.1-1 System Management List Figure3.5.1-2 Add System Management 3.5.2 Modify System Path:System-->Device Management-->System Management 61 Step:Click the system you want to modify in the list --> Fill in the information in the pop-up box --> click the "Modify" button to modify it successfully. Figure3.5.2-1 Modify System Management 3.5.3 Delete System Path:System-->Device Management-->System Management Step:Click the delete icon in the corresponding row of the system you want to delete in the list --> Click on the "OK" button --> Click the "OK" button to delete it successfully. Figure3.5.3-1 Delete System Management 3.5.4 Other Configuration Path:System-->Device Management-->System Management Description:The ip address of the network management login, and the configured ip address should be consistent with the ip address of the network management host.The default port is 8500.If they are inconsistent,the login to the network management fails. Figure3.5.4-1 Other System Configuration 62 4 Security Management This chapter mainly configures IMS network user access security configuration parameters,including three major functional modules: User Management,User Group Management,and Permission Management. The User Management module implements adding,deleting,locking,and unlocking access users.The User Group Management module implements the addition,deletion and authority management of user groups.The Permission Management module implements adding and deleting management functions to the permission list. Figure4-1 Security Management Path 4.1 User Management Path:System--> Security Management --> User Management Figure 4.1-1 User Management Path 4.1.1 Add User Path:System--> Security Management --> User Management --> Add New Step:Click on the "Add New" button to pop up the add user pop-up window,fill in the user parameters in the pop-up window and click on the "Save" button to save the 63 user. Figure4.1.1-1 User Management List Figure4.1.1-2 Add User Configuration items and descriptions: Configuration items Descriptions User Name \ Password \ Password Level Password level,A(6~128 digits) B(6~128 digits,characters) C(6~128digits,characters,,special characters) Password Expiration Time Password Expiration Time Account Expiration Time Account Expiration Time 4.1.2 Modify User Path:System--> Security Management --> User Management Step:Click the User Name to pop up the details page. After the modification is completed, click on the "Save" button to complete the modification. Figure4.1.2-1 Modify User Management 64 4.1.3 Copy User Description:The function is to copy the user with the same permission to avoid a series of complicated permission adding operations. Path:System--> Security Management --> User Management Step:Click the User Name of the user to be copied to pop up the details interface (see Figure 4.1.3-1),and then click the "Copy" button to pop up the copy user details interface,fill in the new user name and password in the pop-up window,and click on the “Save” button to complete the user copy. 4.1.3-1 Copy User Management 4.1.3-2 Copy User Management 4.1.4 Delete User Path:System--> Security Management --> User Management Step: Method 1: Select the record to be deleted,click the red delete button,and select "OK" in the next pop-up box 65 Figure4.1.4-1 Delete User Method 2: Click the check box of the user to be deleted,then click on the red "Delete Users" button,and select "OK" in the next pop-up box Figure4.1.4-2 Delete User 4.1.5 Query and View User Path:System--> Security Management --> User Management Step:Fill in the user name to be queried in the User Name box and the online Status box,and then click on the "Query" button or press Enter.After the user is identified,click on the "View" (eye shape) button in Opration to view the user details. Figure4.1.5-1 Query User 66 Figure4.1.5-2 User Information 4.1.6 Lock and Unlock User Description:当用户被锁定后,该用户将无法登入以及后续一系列操作没有执行权 限. Path:System--> Security Management --> User Management Step: Lock: Click the check box of the User Name that needs to be locked,and click on the "Lock" button to complete the locking of the user. Unlock: Click the check box of the User Name that needs to be locked,and click on the "Unlock" button to complete the unlocking of the user. Figure4.1.6-1 Lock and Unlock User 4.1.7 Add User IP Whitelist Description:After the user adds the IP whitelist,the corresponding IP that is not in the list will not be able to log in and access. Path:System--> Security Management --> User Management Step:Select the user to be added to the IP whitelist,click on the "IP WhiteList" button to pop up a pop-up window,fill in the IP value in the pop-up window,and click on the "Save" button to save. 67 Figure4.1.7-1 User List Whitelist Operation 4.1.8 Logout User Path:System--> Security Management --> User Management Step:Select the user who needs to go offline,click on the "Logout" button in operation,and the status of the user will be changed from "Online" to "Offline". Figure4.1.8-1 Logout User Operation 4.2 User Group Management Figure4.2-1 User Group Management Path Description:There are 11 user groups by default in user group management.Among them,the SuperOperator (super user group) is the highest privilege group,this group cannot be deleted and the super user (admin) interface of this group cannot be removed. Path:System--> Security Management --> User Group Management Figure4.2-2 User Group Management List 68 4.2.1 Add New Group Path:System--> Security Management --> User Group Management --> Add New Group Step:Click on the "Add New Group" button to pop up the add user pop-up window,fill in the user parameters in the pop-up window and click on the "Save" button to save the user. Figure4.2.1-1 Add New Group Configuration items and descriptions: Configuration item Description User Group Name / Create Time / 4.2.2 Modify Group Path:System--> Security Management --> User Group Management Step:Click the User Group Name to be modified to pop up the details interface.After modification is completed,click on the "Save" button to complete the modification. Figure4.2.2-1 Modify Group 4.2.3 Copy Group Description:This function is to copy the user group of the same permission which can avoid a subsequent series of complex permission additions. 69 Path:System--> Security Management --> User Group Management Step:Click the User Group Name of the user to be copied to pop up the details interface (see Figure 4.2.3-1),then click on the "Copy" button to pop up the copy user details interface,fill in the new user group name in the pop-up window,and click on the "Save" button to complete the user group copy. Figure4.2.3-1 Copy User Group Figure4.2.3-2 Copy User Account Password 4.2.4 Delete User Group Path:System--> Security Management --> User Group Management Step: Method 1: Select the records that you need to delete,Click on the red delete button,and select "OK" in the next pop-up box. 70 Figure4.2.4-1 Delete User Group Method 2: Click the check box for the user to delete,then click the red "Delete Group" button,and select "OK" in the next pop-up box,as shown in Figure 4.2.4-1. Figure4.2.4-2 Delete User Group 4.2.5 Query User Group Path:System--> Security Management --> User Group Management Step:Fill in the user group name to be queried in the Group Name box,then click on the "Query" button or press Enter 71 Figure4.2.5-1 Query User Group 4.2.6 User Group Management Path:System--> Security Management --> User Group Management Step:Select the user group to be modified, click on the "Group Users Management" (humanoid) button in Operation (see figure 4.2.6-1 red selected box), pop-up, the left Selected for the user in the group added, candidates on the right, can move the selected user to the designated area, or use the double arrow to move, click on the "Save" button to save (see figure 4.2.6-2). Figure4.2.6-1 User Group Management Figure4.2.6-2 User Group Management Interface 72 4.2.7 Group Node Management Path:System--> Security Management --> User Group Management Step:Select the user group to be modified,click on the "Group NFs Management" button in Operation,and a pop-up window will pop up.In the pop-up window,Selected on the left is the user that has been added in the current group,and on the right is the candidate user.Move the selected users to the specified area,or use the double arrows to move them all,and click on the "Save" button to save when finished. Figure4.2.7-1 User Group Node Figure4.2.7-2 User Group Node Selection 4.2.8 User Group Permission Management Description:Group permission management is to add,delete and query the permission functions in the existing permission types. Path:System--> Security Management --> User Group Management --> User Group Permission Management 73 Figure4.2.8-1 User Group Permission Management 4.2.8.1 Add Group Permission Path:System--> Security Management --> User Group Management --> User Group Permission Management Step:Click on the "Add New" button,a pop-up window for adding group permissions will pop up,select the permission type and permission name in the pop-up window and click on the "Save" button to save the group permission. Figure4.2.8.1-1 Group Permission List Figure4.2.8.1-2 Add Group Permission Configuration items and descriptions: Configuration items Descriptions Permission Type / Permission Name / 74 4.2.8.2 Remove Group Permission Path:System--> Security Management --> User Group Management --> User Group Permission Management Step: Method 1: Select the record to be deleted,click on the red delete button,and select "OK" in the next pop-up box. Method 2: Click the check box of the permission name to be deleted,then click on the red "Batch Remove" button,and select "OK" in the next pop-up box. Figure4.2.8.2-1 Remove Group Permission 4.2.8.3 Query Group Permission Path:System--> Security Management --> User Group Management --> User Group Permission Management Step:Select the permission type to be queried in the query radio box,and then click on the "Query" button or press Enter Figure4.2.8.3-1 Query Group Permission 4.3 Permission Management Description:Permission management is mainly to add,modify,delete and query functions for each permission type and its permission name and interface name. Path:System--> Security Management --> Permission Management 75 Figure4.3-1 Permission Management Path 4.3.1 Permission List Description:Permission list management is to add,delete and query the permission names and interface names in the existing permission types. Path:System--> Security Management --> Permission Management --> Permission List Figure4.3.1-1 Permission Management List 4.3.1.1 Add Permissions Path:System--> Security Management --> Permission Management --> Permission List Step:Click on the "Add New" button to pop up the add user pop-up window,fill in the user parameters in the pop-up window and click on the "Save" button to save the user. Figure4.3.1.1-1 Add Permissions Configuration items and descriptions: 76 Configuration items Descriptions Permission Name / Permission Type / Interface Name / 4.3.1.2 Modify Permissions Path:System--> Security Management --> Permission Management --> Permission List Step:Click the Permission Name to be modified to pop up the details interface.After modification is completed,click on the "Save" button to complete the modification. Figure4.3.1.2-1 Modify Permissions 4.3.1.3 Delete Permissions Path:System--> Security Management --> Permission Management --> Permission List Step: Method 1: Select the records that you need to delete,click on the red delete button,and select "OK" in the next pop-up box. Method 2: Click the check box for the user to delete,then click on the red "Delete Permission" button,and select "OK" in the next pop-up box. Figure 4.3.1.3-1 Delete Permissions 77 4.3.1.4 Query Permissions Path:System--> Security Management --> Permission Management --> Permission List Step:Select the permission type to be queried in the query radio box,and then click on the "Query" button or press Enter Figure4.3.1.4-1 Query Permissions 4.3.2 Permission Type Description:Permission type management is to add,delete and query the existing permission types. Path:System--> Security Management --> Permission Management --> Permission Type Figure4.3.2-1 Permission Type 4.3.2.1 Add Permission Type Path:System--> Security Management --> Permission Management --> Permission Type Step:Click on the "Add New" button to pop up the add user pop-up window,fill in the user parameters in the pop-up window and click on the "Save" button to save the user. 78 Figure4.3.2.1-1 Add Permission Type Configuration items and descriptions: Configuration items Descriptions Permission Type / 4.3.2.2 Delete Permission Type Path:System--> Security Management --> Permission Management --> Permission Type Step: Method 1: Select the records that you need to delete,click on the red delete button,and select "OK" in the next pop-up box. Method 2: Click the check box for the user to delete,then click the red "Delete Permission" button,and select "OK" in the next pop-up box. Figure4.3.2.2-1 Delete Permission Type 79 5 Log Management Figure4-1 Security Management Path 5.1 Operation Log Description:The operation log mainly records some behaviors and actions of some users on the web network management,including user,network element,time,IP,operation content,etc.,which is convenient for operation and maintenance personnel to quickly and accurately locate the problems of the operator in using the network management. Path:System--> Log Management --> Operation Log Figure5.1-1 Operation Log Interface 5.1.1 Query Operation Log Path:System--> Log Management --> Operation Log Step:Select the type of query in the query box,then click on the "Query" button or 80 press Enter Figure5.1.1-1 Query Operation Log Configuration items and descriptions: Configuration items Descriptions User User name NF Internal ID Node name NF Type Node type Start Time / End Time / 5.1.2 Download Operation Log Path:System--> Log Management --> Operation Log Step:Click on the "Download" button in the upper right corner of the interface to download the corresponding format file,according to the Excel and CSV format files provided on the webinterface. Figure5.1.2-1 Download Operation Log 5.2 Security Log Description:The security log mainly includes the login IP,time,type,and status of various types of users. 81 Path:System--> Log Management --> Security Log Figure5.2-1 Download Security Log Configuration items and descriptions: Configuration items Descriptions User Name / IP Login IP Time Login time Type State type Result / 5.3 Log Level Management Path:System--> Log Management --> Security Log Description:The main functions of log management include: clearing log files,querying and downloading log files,and modifying NF log registration. 5.3.1 Clear Log Files Clear the network element files of each system: clear with network element modules,and clear with network elements. 82 5.3.2 Query and Download Log Files Query button is the query of different systems,the input box is to enter the file that you want to download for a few days,download needs to fill in the number of all day,download the system of network element files: download the network element module,download the network element. 5.3.3 Modify the NF Log Level There are three functions: restore default level,best performance level,set all levels Restore the default level,the best level of performance is the best level defined by the NE itself 83 The query button on the setting level interface is displayed on a single network element,which is convenient for customers to modify the level of a single network element.When setting the level manually,modify the value of the drop-down box.The setting level button supports modifying a single module level and multiple module levels. 5.4 Packet Capture Management Description:Provide new capture,stop capture,package download and delete functions Path:System--> Log Management --> PACP Package 5.4.1 Query Package Description:Pull down select system to query grabbed packages in different systems 84 5.4.2 Create A New Packet Capture Description:Create a new packet capture condition,click start to capture the packet,and the interface generates a packet file.You can capture multiple packages at the same time,the package name contains the selected network card name and port name 5.4.3 Stop Capturing Description:Click the stop button to stop capturing packets,and it will also stop capturing packets when the time reaches the predetermined time. 85 5.4.4 Download Package Description:Click to download,it will jump to the corresponding interface to complete the download. 5.4.5 Delete Package Description:Click “Delete” to delete the corresponding package. 86 6 Software Management Figure6-1 Software Path 6.1 Install Package Management Path:System-->Software Management-->Package Management 87 Figure6.1-1 Package Management Interface 6.2 Install Package Switch Path:System-->Software Management-->Package Management Step:Click the "Swap" button to switch the installation package. Figure6.2-1 Package Switch Interface 6.3 NF Process Management Path:System-->Software Management-->Process Management 88 Figure6.3-1 Process Management Interface 6.4 NF Version Management Path:System-->Software Management--->NF Version Figure6.4-1 NF Version Interface 6.5 Query Software Status Description:You can view the running status of each network element,whether it is in a disconnected state or a connected state Path:System-->Software Management--->Software Status Step:Click on the "Load" button,the query results will be displayed under the list. 89 Figure6.5-1 Software Status Figure6.5-2 Software Status Loading Interface 6.6 Update Web Management Path:System-->Software Management-->Web Upgrade Figure6.6-1 Web Upgrade Interface 7 Fault Management Description:Provides functions such as real-time alarms,historical alarms,alarm summary view,alarm file management,alarm storage time,alarm generation time,and CPU threshold setting. 90 7.1 Active Alarm 7.1.1 Query Alarm Path:Alarm-->Active Alarm Step:Select options in each drop-down box --> Click "Query Alarm" --> Click "Refresh",the query result will be displayed in the list. Figure7.1.1-1 Active Alarm Interface Configuration items and descriptions: Configuration items Descriptions NF Type / NF ID / Select Alarm Level Select the alarm level,optional all Status/minor/major/critical Select Alarm Type Select alarm type,optional All/AppAlarm/LinkAlarm/SystemAlarm Start Start time End Terminal time Alarm Code / Alarm Info Alarm Information Event Time Trigger alarm time Limit Set Threshold Alarm Status / 7.1.2 Remark Alarm Path:Alarm-->Active Alarm Step:Check the alarm record item you want to add remarks in the list --> Click "Alarm Remarks" --> Fill in the remark information --> Click "Save" --> Click on the "OK" 91 button in the bullet box to note successfully. Figure7.1.2-1 Remark Alarm Example 7.1.3 Download Alarm Path:Alarm-->Active Alarm Step:Check the alarm record item you want to download in the list --> Click "Download" --> Select to open or save the downloaded excel file. Figure7.1.3-1 Alarm Download Example 7.1.4 Print Alarm Path:Alarm-->Active Alarm Step:Check the alarm record item you want to print in the list --> Click "Print" to jump to the interface of connecting to the printer. 92 Figure7.1.4-1 Alarm Print Example 7.1.5 Edit Alarm Level Path:Alarm-->Active Alarm Step:Check the alarm record item whose alarm level you want to modify in the list-->Click on the "Level Edit" button-->Select the level in the Select Alarm Level drop-down box-->Click on the "Save" button-->Click the "OK" button to edit successfully. Figure7.1.5-1 Edit Alarm Level Example 7.1.6 Clear Alarm Path:Alarm-->Active Alarm Step:Check the alarm record item you want to delete in the list-->Click "Clear Alarms"-->Click the "OK" button to edit successfully. 93 Figure7.1.6-1 Alarm Clearing Example 7.1.7 Refresh Alarm Path:Alarm-->Active Alarm Step:Use with "Query Alarm". Figure7.1.7-1 Alarm Download Example 7.2 History Alarm 7.2.1 Query History Alarm Path:Alarm-->History Alarm Step:Select options in each drop-down box --> Click "Query",the query results will be displayed in the list. 94 Figure7.2.1-1 Histroy Alarm Interface Figure7.2.1-2 Histroy Alarm Query Configuration items and descriptions: Configuration item Description NF Type / NF Name / Select Alarm Level / Select Alarm Type / Start Start time End End time Alarm Level / Alarm Code / Alarm Info Alarm information Event Time Trigger alarm time Limit Set Threshold Alarm Status / End Time / Alarm Remarks / 7.2.2 History Alarm Remarks Path:Alarm-->History Alarm Step:Check the alarm record item you want to add remarks in the list --> Click "Alarm Remarks" --> Fill in the remark information --> Click "Save" --> Click the "OK" button in the bullet box to note successfully. 95 Figure7.2.2-1 Histroy Alarm Remarks 7.2.3 Download Histroy Alarm Path:Alarm-->History Alarm Step:Check the alarm record item you want to download in the list --> Click "Download" --> Select to open or save the downloaded excel file. Figure7.2.3-1 Download Histroy Alarm 7.2.4 Print Histroy Alarm Path:Alarm-->History Alarm Step:Check the alarm record item you want to print in the list --> Click "Print" to jump to the interface of connecting to the printer. Figure7.2.4-1 Histroy Alarm Print 7.2.5 Edit History Alarm Level Path:Alarm-->History Alarm Step:Check the alarm record item whose alarm level you want to modify in the list-->Click on the "Level Edit" button-->Select the level in the Select Alarm Level drop-down box-->Click on the "Save" button-->Click "Save" button- -> Click on the "OK" button to edit successfully. 96 Figure7.2.5-1 Edit Histroy Alarm Level 7.3 View Alarm Summary Path:Alarm-->Alarm Summary View Description:Provides statistics on the number of alarms Figure7.3-1 View Alarm Summary Interface Statistical parameters and descriptions: Statistical parameters Descriptions Alarm Level / Alarm Code / Alarm Type / Alarm Info Alarm information NF Type / NF Name / Event Time Trigger alarm time 7.4 Alarm File Management Path:Alarm-->Alarm File Management Description:Provides functions for downloading alarm files,deleting individual alarm files,and deleting alarm files in batches. 97 Figure7.4-1 Alarm File Management Interface Configuration items and descriptions: Configuration items Descriptions Fill Name / Time Duration / Operation / 7.4.1 Download Alarm File Path:Alarm-->Alarm File Management Step:Click the download icon on the right side of the corresponding row of the alarm record item you want to download in the list --> select to open or save the downloaded excel file. 7.4.2 Delete A Single Alarm File Path:Alarm-->Alarm File Management Step:Check the alarm record item you want to delete in the list-->click the "OK" button in the pop-up box-->After clicking the "OK" button in the pop-up box,the deletion is successful. 7.4.3 Delete Alarm Files In Batches Path:Alarm-->Alarm File Management Step:Click the delete icon on the right side of the corresponding row of the alarm record item you want to delete in the list-->Click the "Delete Alarm Files" button in the pop-up box-->Click the "OK" button in the pop-up box-->After clicking the "OK" button in the pop-up box,the deletion is successful. 98 7.5 Alarm Storage Time Setting Path:Alarm-->Alarm Storage Time Description:Set the time that the alarm is stored in the system Step:Select the time in the Select Time drop-down box --> Click on the "Save" button -->Click on the "OK" button to set it successfully. Figure7.5-1 Alarm Storage Time Interface Configuration items and descriptions: Configuration items Descriptions Select Time Select the alarm storage time 7.6 Alarm Time Duration Setting Path:Alarm-->Alarm Time Duration Description:Set the duration of the alarm service in the system Step:Enter the value in "Set Alarm Time" --> Select the unit in the drop-down box --> Click "Save" -->Click on "OK" in the pop-up box to set it successfully. 99 Figure7.6-1 Alarm Time Duration Interface Configuration items and descriptions: Configuration items Descriptions Set Alarm Time / 7.7 Alarm Threshold Setting Path:Alarm-->Alarm Threshold Setting Description:Set the CPU usage of each NF in the system to generate alarms. Step:Fill in the configuration information in the pop-up box --> Click the "Save" button -->Click on the "OK" button in the pop-up box and set it successfully. Figure7.7-1 CPU Threshold Setting Interface Configuration items and descriptions: 100 Configuration items NF Type NF Name Alarm Created Threshold Alarm Cleared Threshold Descriptions / / / / 8 Performance Management 8.1 Enter the Grafana Way (1) Default username and password for initial login: username: admin,password: admin (2) Web management link: Click Integration configuration under the unified network management interface --> Click Grafana to jump to the Grafana login interface --> Fill in the username and password in the login interface --> Click "Log in" --> Enter the reset password interface and click "Skip",log in and enter the Grafana homeinterface. Figure8.1-1 Grafana Path (3)Enter the Grafana website in the URL box of the browser: ip:3000-->Fill in the user name and password-->Click "Log in"-->Enter the reset password interface and click "Skip" to log in and enter the Grafana home interface. 101 Figure8.1-2 Grafana login Interface Figure8.1-3 Grafana Home Interface Figure8.1-4-1 Import The Basic-Info Template 102 Figure8.1-4-2 Upload basic-info.json Template Figure8.1-4-3 Import The basic-info.json Template PS:The basic_info.json file is provided by the IMS group when the version is released,and is placed in the specified version collection directory 103 8.2 Manage Description:Enter the KPI interface for selecting each NF of Grafana Figure8.2-1 Manage Path Figure8.2-2 Manage interface 8.2.1 Manage-IMS Path:Manage-->IMS 104 Figure8.2.1-1 IMS Path interface description: 1:Last 6 hours:Statistics for the last 6 hours 2:5s:The interface refreshes automatically every 5s 3:Real-time monitoring data statistics 4:Statistics in the last 6 hours Figure8.2.1-2 IMS Path 8.2.1.1 PCSCF Path:Manage-->IMS-->PCSCF Description:Statistics on calls initiated by the UE 105 Figure8.2.1.1-1 PCSCF Statistics 8.2.1.1.1 MO Call Rate Path:Manage-->IMS-->PCSCF-->MO Call Rate Description:Statistics on the call completion rate and call answer rate of the P-CSCF on the calling side Figure8.2.1.2.1-1 MO Call Rate Statistical Graph Statistical parameters and descriptions: Statistical parameters Descriptions mo_connect_rate When the P-CSCF on the MO side receives the 180/200 response from the called party,it means that the session is connected. mo_answer_rate When the P-CSCF on the MO side receives a 200 (INVITE) response from the called party,it means that the session is answered. mo_avg_call_delay Collect statistics on the average connection duration of all sessions processed by the P-CSCF on the MO side for a period of time in the call service 106 8.2.1.1.2 MT Call Rate Path:Manage-->IMS-->PCSCF-->MT Call Rate Description:Statistics on the call completion rate and call answer rate of the P-CSCF on the called side Figure8.2.1.1.2-1 MT Call Rate statistical graph Statistical parameters and descriptions: Statistical parameters Descriptions mt_connect_rate When the P-CSCF on the MT side receives the 180/200 response from the called party,it means that the session is connected. mt_answer_rate When the P-CSCF on the MT side receives a 200 (INVITE) response from the called party,it means the session is answered mt_avg_call_delay Statistics on the average connection duration of all sessions processed by the P-CSCF on the MT side for a period of time in the call service 8.2.1.1.3 Call Drop Rate Path:Manage-->IMS-->PCSCF-->Call Drop Rate Description:Statistics of the ratio of the number of session interruptions to the number of sessions answered due to abnormal disconnection after VoLTE calls are answered 107 Figure8.2.1.1.3-1 Call Drop Rate statistical graph Statistical parameters and descriptions: Statistical parameters Descriptions Call_drop_rate After the VoLTE call is answered,the ratio of the number of session interruptions caused by abnormal disconnection to the number of sessions answered 8.2.1.1.4 Call Duration Path:Manage-->IMS-->PCSCF-->Call Duration Description:Statistics on the average call duration of all sessions processed by the P-CSCF for a period of time in VoLTE call answering. Figure8.2.1.1.4-1 Call Duration statistical graph Statistical parameters and descriptions: Statistical parameters Descriptions mo_call_duration Statistics on the average call duration of all sessions processed by the P-CSCF on the MO side for a period of time in the call service mt_call_duration Statistics on the average call duration of all sessions processed by the P-CSCF on the MT side for a period of time in the call service 8.2.1.1.5 Call Traffic Path:Manage-->IMS-->PCSCF-->Call Traffic Description:Count the times of UE registration,de-registration and call times 108 Figure 8.2.1.1.5-1 Call Traffic statistical graph Statistical parameters and descriptions: Statistical parameters Descriptions init_reg Count the number of times that the PCSCF receives the initial registration request initiated by the UE under a certain access network during the registration process re_reg Count the number of times the PCSCF receives re-registration requests from UEs under a certain access network during the measurement period de_reg Count the number of times the PCSCF receives a de-registration request from a UE under a certain access network during the registration process trying_call Count the number of times the PCSCF receives the initial IVITE request from the calling side in the call service answer_call In the call service,count the number of times that the calling side user initiates a session request and the session is connected 8.2.1.2 SCSCF Path:Manage-->IMS-->SCSCF Description:UE-initiated registration and call related statistics 109 Figure8.2.1.2-1 SCSCF statistics 8.2.1.2.1 Register Rate Path:Manage-->IMS-->SCSCF-->Register Rate Description:Statistics on the number of successful S-CSCF registrations Figure8.2.1.2.1-1 Register Rate Statistical Graph Statistical parameters and descriptions: Statistical parameters Descriptions init_reg_success The number of times the S-CSCF sends a successful response to the UE's initial registration request during the measurement period re_reg_success During the measurement period,the number of times that the S-CSCF returns a 200 OK message to the UE after receiving the re-registration request from the UE. authAKA_success In the process of user registration,re-registration and cancellation,statistics have issued 401 test 110 challenges after the S-CSCF receives the REGISTER request from UE using the AKA verification method during the measurement cycle. 8.2.1.2.2 Registered IMPUs Path:Manage-->IMS-->SCSCF-->Register IMPUs Description:Statistics on the number of successful S-CSCF registrations Figure8.2.1.2.2-1 MO Call Rate Statistical Graph Statistical parameters and descriptions: Statistical parameters Descriptions reg_total During the measurement period,the number of registered users of the S-CSCF 8.2.1.2.3 MO Call Rate Path:Manage-->IMS-->SCSCF-->MO Call Rate Description:The response rate of the S-CSCF on the calling side, and cancel the rate statistics of invite Figure8.2.1.2.3-1 MO Call Rate statistical graph Statistical parameters and descriptions: Statistical parameters Descriptions 111 mo_answer_rate mo_early_cancel_rate During the measurement period,the S-CSCF on the MO side receives the session initial request and responds with the response rate of the session During the measurement period,the ratio of mo_ringring_cancel_rate the total number of CANCEL requests received from the calling side after receiving the called INVITE 180 on the MO side of the S-CSCF network element to the total number of times INVITE 180 received by the MT side of the S-CSCF network element During the measurement period,the ratio of the total number of CANCEL requests received from the calling side after receiving the called INVITE 180 on the MO side of the S-CSCF network element to the total number of times INVITE 180 received by the MT side of the S-CSCF network element 8.2.1.2.4 MT Call Rate Path:Manage-->IMS-->SCSCF-->MT Call Rate Description:The response rate of the S-CSCF on the called side after receiving the Invite,and the rate of canceling the Invite Figure 8.2.1.2.4-1 MO Call Rate Statistical Graph Statistical parameters and descriptions: Statistical parameters Descriptions mt_answer_rate During the measurement period,the ratio of the number of times that the S-CSCF on the MT side receives the session initial request and the session responds mt_early_cancel_rate During the measurement period,the ratio of the total number of CANCEL requests received 112 from the calling side without receiving the called INVITE180 on the MT side of the S-CSCF network element to the total number of times INVITE 180 received by the MT side of the S-CSCF network element mt_ringring_cancel_rate During the measurement period,the ratio of the total number of CANCEL requests received from the calling side after receiving the called INVITE180 on the MT side of the S-CSCF network element to the total number of times the MT side of the S-CSCF network element received INVITE 180 8.2.1.2.5 SMS Path:Manage-->IMS-->SCSCF-->SMS Description:Statistics on the number of SMS sent and received Figure 8.2.1.2.5-1 SMS Statistical Graph Statistical parameters and descriptions: Statistical parameters Descriptions mo_sms Statistics on the number of texting parties in a measurement period mt_sms Statistics on the number of texting parties in a measurement period 113 9 Call Trace(To be developed) 10 Other System Functions 10.1 License Information Management 10.1.1 View License Information Path:System-->License Management-->License Server Information Figure10.1.1-1 View License Information 10.1.2 Import License File Path:System-->License Management-->License Server Information Step:Click "Browse" to locate the path of the license file --> Click "Upload" --> Click "OK",if the file is valid,the Status will display a green "valid" value,if the file is invalid,the Status will display as Red "in-valid" value. 114 Figure10.1.2-1 Import License File 10.1.3 Get NFs License Status Path:System -->License Management -->NFs License Status 10.1.3-1 Get NFs License Status 10.2 Web Information Management Path:System--Web Info->Website Name Configuration 10.2.1 View the Web Information Figure10.2.1-1 View the Web Information 10.2.2 Update Web Info Path:System--Web Info->Website Name Configuration Step:Enter new names for New Site Name and New Company Name and click update 115 Figure10.2.2-1 Update Web Info 10.2.3 Update Logo Path:System--Web Info->Company Logo Update Step:Select 'Select File' in Company Logo Update,select the required company LogoFigure from the local area and upload it to Web Info,and then click upload it to the network management. Figure10.2.3-1 Update Logo 116 to 10.3 Status Query(To be developed) 10.4 Quick Modification 10.4.1 Quickly Modify PLMN Path:System-->Quick Modification>PLMN Description:The PLMN of each network element can be modified. Step:Enter the specific PLMN and click the "Add" button to add a PLMN.If you click the trash can button,the corresponding PLMN will be deleted. Figure10.4.1-1 Quickly modify PLMN 10.4.2 Quickly Modify IP Path:System-->Quick Modification>PLMN Description:The physical IP and service IP of each NF can be modified. Step:Follow the steps to modify the IP,and the IP modification will take effect after the fourth step "apply". 117 Figure10.4.2 Quickly Modify IP 118 11 FAQ 12 Conclusion This manual is suitable for users and field engineers. 119