Uploaded by khon nay

IMS Operation Manual

advertisement
IMS
Web Operation Manual
1 Overview ..................................................................................................................... 1
1.1 Advantages ....................................................................................................... 1
1.2 Functional Division ........................................................................................... 1
1.3 Get Started With Webmaster .......................................................................... 2
2 Configuration .............................................................................................................. 3
2.1 IMS ................................................................................................................... 3
2.1.1 Common ................................................................................................ 4
2.1.2 Proxy-Call Session Control Function(P-CSCF) ........................................ 6
2.1.3 Interrogating-Call Session Control Function(I-CSCF) ............................. 8
2.1.4 Serving-Call Session Control Function(S-CSCF) ................................... 10
2.1.5 Emergency-Call Session Control Function(E-CSCF) ............................. 14
2.1.6 MMTEL-AS ........................................................................................... 16
2.1.7 Location Retrieval Function(LRF) ........................................................ 20
2.1.8 Multimedia Resource Function Controller(MRFC) .............................. 22
2.1.9 Breakout Gateway Control Function(BGCF) ........................................ 24
2.1.10 XCAP .................................................................................................. 26
2.2 UDM ............................................................................................................... 28
2.2.1 Authentication Data ............................................................................ 28
2.2.2 IMS Subscription ................................................................................. 37
3 Device Management ................................................................................................. 53
3.1 NF Management ............................................................................................ 54
3.1.1 Add NF ................................................................................................. 54
3.1.2 Query NF ............................................................................................. 55
3.1.3 Delete NF............................................................................................. 55
3.1.4 Other Configuration ............................................................................ 56
3.2 System Service Management ......................................................................... 56
3.2.1 Modify System Services ...................................................................... 56
3.3.2 Query System Services ........................................................................ 56
3.3 NIC Management ........................................................................................... 57
3.3.1 Add NIC ............................................................................................... 57
3.3.2 Query NIC ............................................................................................ 58
3.3.3 Delete NIC ........................................................................................... 58
3.4 Route Management ....................................................................................... 59
3.4.1 Add Route Management ..................................................................... 59
3.4.2 Query Route Management ................................................................. 60
3.4.3 Modify Route Management ................................................................ 60
3.4.4 Delete Route Management ................................................................. 60
3.5 System Management ..................................................................................... 61
3.5.1 Add System.......................................................................................... 61
3.5.2 Modify System .................................................................................... 61
3.5.3 Delete System ..................................................................................... 62
3.5.4 Other Configuration ............................................................................ 62
4 Security Management ............................................................................................... 63
4.1 User Management ......................................................................................... 63
I
4.1.1 Add User.............................................................................................. 63
4.1.2 Modify User ........................................................................................ 64
4.1.3 Copy User ............................................................................................ 65
4.1.4 Delete User ......................................................................................... 65
4.1.5 Query and View User .......................................................................... 66
4.1.6 Lock and Unlock User .......................................................................... 67
4.1.7 Add User IP Whitelist .......................................................................... 67
4.1.8 Logout User ......................................................................................... 68
4.2 User Group Management .............................................................................. 68
4.2.1 Add New Group................................................................................... 69
4.2.2 Modify Group ...................................................................................... 69
4.2.3 Copy Group ......................................................................................... 69
4.2.4 Delete User Group .............................................................................. 70
4.2.5 Query User Group ............................................................................... 71
4.2.6 User Group Management ................................................................... 72
4.2.7 Group Node Management .................................................................. 73
4.2.8 User Group Permission Management................................................. 73
4.3 Permission Management ............................................................................... 75
4.3.1 Permission List .................................................................................... 76
4.3.2 Permission Type .................................................................................. 78
5 Log Management ...................................................................................................... 80
5.1 Operation Log................................................................................................. 80
5.1.1 Query Operation Log........................................................................... 80
5.1.2 Download Operation Log .................................................................... 81
5.2 Security Log .................................................................................................... 81
5.3 Log Level Management .................................................................................. 82
5.3.1 Clear Log Files ..................................................................................... 82
5.3.2 Query and Download Log Files ........................................................... 83
5.3.3 Modify the NF Log Level ..................................................................... 83
5.4 Packet Capture Management ........................................................................ 84
5.4.1 Query Package..................................................................................... 84
5.4.2 Create A New Packet Capture ............................................................. 85
5.4.3 Stop Capturing .................................................................................... 85
5.4.4 Download Package .............................................................................. 86
5.4.5 Delete Package .................................................................................... 86
6 Software Management ............................................................................................. 87
6.1 Install Package Management ......................................................................... 87
6.2 Install Package Switch .................................................................................... 88
6.3 NF Process Management ............................................................................... 88
6.4 NF Version Management ............................................................................... 89
6.5 Query Software Status ................................................................................... 89
6.6 Update Web Management............................................................................. 90
7 Fault Management .................................................................................................... 90
7.1 Active Alarm ................................................................................................... 91
II
7.1.1 Query Alarm ........................................................................................ 91
7.1.2 Remark Alarm ..................................................................................... 91
7.1.3 Download Alarm ................................................................................. 92
7.1.4 Print Alarm .......................................................................................... 92
7.1.5 Edit Alarm Level .................................................................................. 93
7.1.6 Clear Alarm.......................................................................................... 93
7.1.7 Refresh Alarm...................................................................................... 94
7.2 History Alarm ................................................................................................. 94
7.2.1 Query History Alarm ........................................................................... 94
7.2.2 History Alarm Remarks ....................................................................... 95
7.2.3 Download Histroy Alarm ..................................................................... 96
7.2.4 Print Histroy Alarm .............................................................................. 96
7.2.5 Edit History Alarm Level ...................................................................... 96
7.3 View Alarm Summary..................................................................................... 97
7.4 Alarm File Management................................................................................. 97
7.4.1 Download Alarm File ........................................................................... 98
7.4.2 Delete A Single Alarm File ................................................................... 98
7.4.3 Delete Alarm Files In Batches ............................................................. 98
7.5 Alarm Storage Time Setting ........................................................................... 99
7.6 Alarm Time Duration Setting.......................................................................... 99
7.7 Alarm Threshold Setting .............................................................................. 100
8 Performance Management ..................................................................................... 101
8.1 Enter the Grafana Way ................................................................................. 101
8.2 Manage ........................................................................................................ 104
8.2.1 Manage-IMS ...................................................................................... 104
9 Call Trace(To be developed)............................................................................... 114
10 Other System Functions ........................................................................................ 114
10.1 License Information Management ............................................................. 114
10.1.1 View License Information ............................................................... 114
10.1.2 Import License File .......................................................................... 114
10.1.3 Get NFs License Status .................................................................... 115
10.2 Web Information Management ................................................................. 115
10.2.1 View the Web Information.............................................................. 115
10.2.2 Update Web Info ............................................................................. 115
10.2.3 Update Logo .................................................................................... 116
10.3 Status Query(To be developed) ................................................................. 117
10.4 Quick Modification ..................................................................................... 117
10.4.1 Quickly Modify PLMN ..................................................................... 117
10.4.2 Quickly Modify IP ............................................................................ 117
11 FAQ ........................................................................................................................ 119
12 Conclusion ............................................................................................................. 119
III
1 Overview
This product is the management system of IMS4.0 version,which aims to provide
users with a Web platform that interacts with IMS devices.
1.1 Advantages
The interface is simple and elegant,very user-friendly,as long as there is a
browser,it can be used without installation,and it can be adapted to terminals of
various resolutions.
Support HTTPS protocol to improve security performance.
Support internationalization and localization,currently Chinese and English are
implemented,and other languages will be added in the future according to actual
needs.
Independent deployment,supports concurrent operations.
1.2 Functional Division
Web network management has the following functions:
•
Configuration Management:Configuration of network elements (IMS) as well
as import,export and initialization of data.
•
Fault Management
•
Performance Management
•
Security Management
•
Log Management
•
Software Management
•
Call Trace
•
Device Management
•
UE Information
•
Web Information Management
•
License Management
1
1.3 Get Started With Webmaster
The first step is to log in.After the network management is installed,open the
web management login interface from a browser (Chrome browser,Firefox browser
or edge browser is recommended).Log in to the system using the account and
password provided by default (account: admin,password: 123456) and the IP and
port of the backend of the network management (default 127.0.0.0:8500).
Figure1.3-1 Login Interface
The system interface after initial login is shown in Figure 1.3-2:
Figure1.3-2 The interface after initial login to the system
The interface after configuring each NF login is shown in Figure 1.3-3:
Figure1.3-3 The interface after logging in to the system
The second step is to add the system.See Section 3.5 for details.
The third step is to add NF,see Section 3.1 for details.
2
The fourth step is to start configuring the parameters of each network element
of the IMS.For details,see Chapter 2 Configuration or Section 9.2 for configuration
initialization.
If you want to check the performance parameters of IMS,please refer to Chapter
8 Performance Management.
If you want to view the alarms of the IMS,please refer to Chapter 7 Fault
Management.
For other functions,please refer to other chapters later.
2 Configuration
This chapter mainly configures the parameters of IMS network elements,
including PCSCF, ICSCF, SCSCF, ECSCF, MMTEL-AS, LRF, MRFC, BGCF, and XCAP
network elements.Users can flexibly configure the parameters of each network
element according to actual needs through this Web platform.Each network element
communicates with the Web platform through a Restful interface that follows the
HTTP protocol.
2.1 IMS
IMS (IP Multimedia Subsystem), using sip protocol for control, realizes mobility
management, multimedia session signaling and bearer service transmission, and
realizes end-to-end IP services.
Figure2.1-1 IMS Menu
3
2.1.1 Common
Description:General configuration provides the configuration of setting the system's
PLMN,country code,system realm name and mobile phone number prefix.
Path:Configuration → IMS → NF Name → Common
Figure2.1.1-1 Common Configuration
2.1.1.1 System Configuration
Description:System Configuration provides the configuration of setting IMS server
realm name,country code and mobile phone number prefix.
2.1.1.1.1 Modify System Configuration
Path:Configuration → IMS → NF Name → Common →System Configuration
Step:Enter the data in the image below,such as Country_Code,Msisdn_seg,etc.,and
then click the "Modify" button to save the data.
Figure2.1.1.1.1-1 Modify System Configuration
Configuration items and descriptions:
Configuration items
Descriptions
Country_Code
\
4
Msisdn_seg
Realm
Mobile phone number segment/number prefix of this
IMS system
IMS server realm name
2.1.1.2 PLMN Configuration
Description:Set the PLMN of the system.
Configuration items and descriptions:
Configuration items
Descriptions
Public Land Mobile Network,consisting of
MCC and MNC
PLMN
2.1.1.2.1 Add PLMN Configuration
Path:Configuration → IMS → NF Name → Common →PLMN Configuration
Step:Enter the relevant PLMN value in the input box and click "Add" to complete
adding data.
Figure2.1.1.2.1-1 Add PLMN Configuration
2.1.1.2.2 Delete PLMN Configuration
Path:Configuration → IMS → NF Name → Common →PLMN Configuration
Step:Select the PLMN of one of the records,click the red recycle bin button,and
select "OK" in the next pop-up box to delete the record.
5
Figure2.1.1.2.2-1 Delete PLMN Configuration
2.1.2 Proxy-Call Session Control Function(P-CSCF)
Description:The P-CSCF is the first point of connection to the user in IMS,providing
proxy function, which accepts business requests and forwards them.The P-CSCF also
provides user agent (UA) function,which breaks and independently generates SIP
sessions in abnormal situations.
Path:Configuration → IMS → NF Name → P-CSCF
Figure2.1.2-1 P-CSCF
2.1.2.1 Pcscf Configuration
Description:Pcscf Configuration provides configuration such as setting the IP used by
the PCSCF network element,the listening port,and the log level.
2.1.2.1.1 Modify Pcscf Configuration
Path:Configuration → IMS → NF Name → P-CSCF →Pcscf Configuration
Step:Enter the data in the image below,such as Name,Listen,Port,etc.,and then click
the "Modify" button to save the data.
6
Figure 2.1.2.1.1-1 Modify Pcscf Configuration
Configuration items and descriptions:
Configuration items
Descriptions
Name
URI of pcscf,Uniform Resource Identifier,format: "sip: IP address:
port",the default port of pcscf is 5060
Listen
Set the IP address used by the Pcscf network element
Port
Set the port that the Pcscf network element listens on,the
default is 5060
Emerg Support
Set whether to enable emergency calls,on means open,off
means close
Debug
Set the log level,the value range is -3~4,the value description
(ALERT=-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG
=4,sorted from small to large)
Rtpproxy Enable
Set whether to enable the rtp proxy function,on means open,off
means close
Pcrf Realm
Setting PCFR/PCF realm names
2.1.2.2 P-CSCF Rx Peer
Description:The P-CSCF Rx Peer is used to provide the Rx interface configuration of
the PCF/PCRF interconnected by the PCSCF.You need to configure the IP of the Rx
interface,the listening port,the host name,and the realm name.
2.1.2.2.1 Add P-CSCF Rx Peer
Path:Configuration → IMS → NF Name → P-CSCF →P-CSCF Rx Peer
Step:Enter the data in the figure below,such as Id,Interface,Fqdn,Realm,etc.,and then
click the "Add" button to save the data.
Figure2.1.2.2.1-1 Add P-CSCF Rx Peer
Configuration items and descriptions:
Configuration items
Descriptions
7
Id
Set the ID of the Configuration item
Default
The default is 0,only for declaration without special meaning
Interface
Set the listening port of the Rx interface of the PCF/PCRF
network element,format: "IP:port"
Metric
Set the priority,the smaller the value,the higher the priority
Fqdn
Set the hostname used by the Rx interface
Realm
Set the realm name used by the Rx interface
2.1.2.2.2 Delete P-CSCF Rx Peer
Path:Configuration → IMS → NF Name → P-CSCF →P-CSCF Rx Peer
Step:Select the ID of one of the records,click the red recycle bin button,and select
"OK" in the next pop-up box to delete the record.
Figure2.1.2.2.2-1 Delete Pcscf Configuration
2.1.3 Interrogating-Call Session Control Function(I-CSCF)
Description:Similar to the gateway node of IMS,it provides the functions of local user
service node allocation,route query and topology hiding between IMS realms.
Path:Configuration → IMS → NF Name → I-CSCF
Figure2.1.3-1 I-CSCF
8
2.1.3.1 Icscf Configuration
Description:Icscf Configuration provides configuration such as setting the IP used by
the ICSCF network element,the listening port,and the log level.
2.1.3.1.1 Modify Icscf Configuration
Path:Configuration → IMS → NF Name → I-CSCF →Icscf Configuration
Step:Enter the data in the image below,such as Name,Listen,Port,etc.,and then click
the "Modify" button to save the data.
Figure2.1.3.1.1-1 Modify Icscf Configuration
Configuration items and descriptions:
Configuration items
Descriptions
Name
URI of I-CSCF,Uniform Resource Identifier,in the format: "realm
name of icscf.ims"
Bgcf Interface
Set the IP and port of the bgcf network element,format:
"ip:port"
Debug
Set the log level,the value range is -3~4,the value description
(ALERT=-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG
=4,sorted from small to large)
Hss realm
Set the realm name of the Cx interface of the connected
HSS/UDM NE
Listen
Set the IP address used by the icscf network element
Port
Set the port that the icscf network element listens on,the
default is 4060
2.1.3.2 I-CSCF Cx Peer
Description:The I-CSCF Cx Peer is used to provide the configuration of the Cx
interface of the HSS/UDM connected to the ICSCF network element.It is necessary to
configure the IP of the Cx interface,the listening port,the host name and the realm
name and other information.
9
2.1.3.2.1 Add I-CSCF Cx Peer
Path:Configuration → IMS → NF Name → I-CSCF →I-CSCF Cx Peer
Step:Enter the data in the figure below,such as Id,Interface,Fqdn,Realm,etc.,and then
click the "Add" button to save the data.
Figure2.1.3.2.1-1 Add I-CSCF Cx Peer
Configuration items and descriptions:
Configuration items
Descriptions
Id
Set the ID of the Configuration item
Default
The default is 0,only for declaration without special meaning
Interface
Set the listening IP and port of the Cx interface of the HSS/UDM
network element,format: "IP:port"
Metric
Set the priority,the smaller the value,the higher the priority
Fqdn
Set the hostname used by the Cx interface
Realm
Set the realm name used by the Cx interface
2.1.3.2.2 Delete I-CSCF Cx Peer
Path:Configuration → IMS → NF Name → I-CSCF →I-CSCF Cx Peer
Step:Select the ID of one of the records,click the red recycle bin button,and select
"OK" in the next pop-up box to delete the record.
Figure2.1.3.2.2-1 Delete I-CSCF Cx Peer
2.1.4 Serving-Call Session Control Function(S-CSCF)
Description:The S-CSCF is in the core control position in the IMS core network.It is
10
responsible for the registration authentication and session control of UE,performs
the basic session routing function for the calling end and the called end IMS
users,and performs the value-added AS routing trigger and business control
interaction according to the IMS trigger rules signed by the user.
Path:Configuration → IMS → NF Name → S-CSCF
Figure2.1.4-1 S-CSCF
2.1.4.1 Scscf Configuration
Description:Scscf Configuration provides setting the IP used by the SCSCF NF,listening
port,log level and other configuration.
2.1.4.1.1 Modify Scscf Configuration
Path:Configuration → IMS → NF Name → S-CSCF →Scscf Configuration
Step:Enter the data in the following figure,such as Name,Listen,Port,etc.,and then
click on the "Modify" button to save the data.
Figure2.1.4.1.1-1 Modify Scscf Configuration
Configuration items and descriptions:
Configuration items
Descriptions
11
Name
URI for Scscf,Unified Resource Identifier,Format: "sip: scscf Host
name: port",scscf The default port number is 6060
Debug
Set the log level,take the value range-3~4,the value description
(ALERT=
-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte
d from small to large)
Dialogs Expiration time
Set the dialogs expiration time
Free Call
Set whether to enable free calling,on means open,off means
close
Online Charing
Set whether to enable the online billing function,on means
open,off means close
Port
Set the port that the scscf network element listens on,the
default is 6060
Hss Realm
Set the realm name of the Cx interface of the connected UDM
NE
Ocs Realm
Set the realm name of OCS
Bgcf_interface
Set the IP and port of the bgcf network element,format:
"ip:port"
Listen
Set the IP address used by scscf
2.1.4.2 S-CSCF Cx Peer
Description:S-CSCF Cx Peer is used to provide the Cx interface configuration of
HSS/UDM for SCSCF NF docking,including the IP of the Cx interface,the port of
listening,the host name and the realm name.
2.1.4.2.1 Add S-CSCF Cx Peer
Path:Configuration → IMS → NF Name → S-CSCF →S-CSCF Cx Peer
Step:Enter the data in the following figure,such as Id,Interface,Fqdn,Realm,etc.,and
then click on the "Add" button to save the data.
Figure2.1.4.2.1-1Add S-CSCF Cx Peer
12
Configuration items and descriptions:
Configuration items
Descriptions
Id
Set up the ID of the Configuration item
Default
The default is 0,only for declaration without special meaning
Interface
Set the IP and port for the HSS / UDM NE Cx interface listening
to,format: "IP: port"
Metric
Set the priority,the smaller the value,the higher the priority
Fqdn
Set the hostname used by the Cx interface
Realm
Set the realm name used by the Cx interface
2.1.4.2.2 Delete S-CSCF Cx Peer
Path:Configuration → IMS → NF Name → S-CSCF →S-CSCF Cx Peer
Step:Select the Id of one of the records,click the red recycle bin button,and select
"OK" in the following pop-up box to delete the record.
Figure2.1.4.2.2-1 Delete S-CSCF Cx Peer
2.1.4.3 S-CSCF Ro Peer
Description:The S-CSCF Ro Peer is used to provide the Ro interface configuration of
the OCS for the SCSCF NF docking,including the IP of the Ro interface,the listening
port,the host name,and the realm name.
2.1.4.3.1 Add S-CSCF Ro Peer
Path:Configuration → IMS → NF Name → S-CSCF →S-CSCF Ro Peer
Step:Enter the data in the following figure,such as Id,Interface,Fqdn,Realm,etc.,and
then click on the "Add" button to save the data.
13
Figure2.1.4.3.1-1 Add S-CSCF Cx Peer
Configuration items and descriptions:
Configuration items
Descriptions
Id
Set the ID of the configuration item
Default
The default is 0,only for declaration without special meaning
Interface
Set the IP and port that the Ro interface of the OCS NF listens
to,in the format: "IP:port"
Metric
Set the priority,the smaller the value,the higher the priority
Fqdn
Set the hostname used by the Ro interface
Realm
Set the realm name used by the Ro interface
2.1.4.3.2 Delete S-CSCF Ro Peer
Path:Configuration → IMS → NF Name → S-CSCF →S-CSCF Ro Peer
Step:Select the Id of one of the records,click the red recycle bin button,and select
"OK" in the following pop-up box to delete the record.
Figure2.1.4.3.2-1 Delete S-CSCF Ro Peer
2.1.5 Emergency-Call Session Control Function(E-CSCF)
Description:The E-CSCF is responsible for handling emergency sessions in the IMS
core network,receiving emergency session establishment requests from the
P-CSCF,and routing emergency calls nearby to the emergency call service business
center where the user visits.
Path:Configuration → IMS → NF Name → E-CSCF
14
Figure2.1.5-1 E-CSCF
2.1.5.1 Modify Ecscf Configuration
Path:Configuration → IMS → NF Name → E-CSCF →Ecscf Configuration
Step:Enter in the data in Figure,such as Name,Listen,Debug,etc.,and then click on the
"Modify" button to save the data.
Figure2.1.5.1-1 Modify Ecscf Configuration
Configuration items and descriptions:
Configuration items
Descriptions
Name
URI of ecscf,Uniform Resource Identifier,the format is: "sip:ecscf
realm name:7060",the default port of ecscf is 7060
Debug
Set the log level,take the value range-3~4,the value description
(ALERT=
-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte
d from small to large)
Default Sos
Set the default emergency number in the format of: SIP:
Number @ realm Name"
Enable Default Sos
Set whether to enable the default emergency number
15
function,on means open,off means close
Lrf Interface
Set the URI of the LRF NE with a grid of: "sip: Full realm name:
9060"
Listen
Sets the IP address used by the ecscf
2.1.6 MMTEL-AS
Description:MMTEL-AS provides multimedia telephone
complementary services in the IMS core network.
Path:Configuration → IMS → NF Name → MMTEL-AS
basic
services
and
Figure2.1.6-1 MMTEL-AS
2.1.6.1 MMTEL-AS Configuration
Description:MMTEL-AS Configuration provides configuration such as setting the IP
used by the MMTEL-AS network element,the listening port,and the log level.
2.1.6.1.1 Modify MMTEL-AS Configuration
Path:Configuration → IMS → NF Name → MMTEL-AS →MMTEL-AS Configuration
Step:Enter the data in the following figure,such as Name,Listen,Port,etc.,and then
click on the "Modify" button to save the data.
16
Figure2.1.6.1.1-1 Modify MMTEL-AS Configuration
Configuration items and descriptions:
Configuration items
Descriptions
Name
URI of mmtel-as,Uniform Resource Identifier,format: "sip: full
realm name: 5065",the default port of mmtel-as is 5065
Debug
Set the log level,take the value range-3~4,the value description
(ALERT=
-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte
d from small to large)
Cdiv wait time
Set the call waiting time
No Answer Release Time
Set the non-responsive voice release time.If the call is signed for
the non-response call transfer,the call will be transferred to the
target number at the set time at the ringing time
Free Call
Set whether to enable free calling,on means open,off means
close
Online Charing
Set whether to use the online billing function,on means open,off
means close
Enable Voice Mail
Set the voice mail switch,on means open,off means close
Hss Realm
Set the realm name of the sh interface of the connected
HSS/UDM NE
Ocs Realm
Set the realm name of OCS
Port
Set the port that the mmtel-as network element listens on,the
default is 5065
Voice Mail Target
Set the voicemail number,the format is: "SIP:number@realm
name"
Listen
Set the IP address used by mmtel-as
2.1.6.2 MMTEL-AS Sh Peer
Description:The MMTEL-AS Sh Peer provides the configuration of the Sh interface of
the HSS/UDM connected to the MMTEL-AS network element.You need to set the IP
of the Sh interface,the listening port,the host name,and the realm name.
17
2.1.6.2.1 Add MMTEL-AS Sh Peer
Path:Configuration → IMS → NF Name → MMTEL-AS →MMTEL-AS Sh Peer
Step:Enter the data in the image below,such as Name,Listen,Port,etc.,and then click
on the "Add" button to save the data.
Figure2.1.6.2.1-1 Add MMTEL-AS Sh Peer
Configuration items and descriptions:
Configuration items
Descriptions
Id
Set the ID of the configuration item
Default
The default is 0,only for declaration without special meaning
Interface
Set the IP and port monitored by the Sh interface of the
HSS/UDM network element,format: "IP:port"
Metric
Set the priority,the smaller the value,the higher the priority
Fqdn
Set the hostname used by the Sh interface
Realm
Set the realm name used by the Sh interface
2.1.6.2.2 Delete MMTEL-AS Sh Peer
Path:Configuration → IMS → NF Name → MMTEL-AS →MMTEL-AS Sh Peer
Step:Select the ID of one of the records,click the red recycle bin button,and select
"OK" in the next pop-up box to delete the record.
Figure2.1.6.2.2-1 Delete MMTEL-AS Sh Peer
18
2.1.6.3 MMTEL-AS Ro Peer
Description:The MMTEL-AS Ro Peer provides the configuration of the Ro interface of
the OCS connected to the MMTEL-AS.You need to set the IP of the Ro interface,the
listening port,the host name,and the realm name.
2.1.6.3.1 Add MMTEL-AS Ro Peer
Path:Configuration → IMS → NF Name → MMTEL-AS →MMTEL-AS Ro Peer
Step:Enter the data in the image below,such as Name,Listen,Port,etc.,and then click
on the "Add" button to save the data.
Figure2.1.6.3.1-1 Add MMTEL-AS Ro Peer
Configuration items and descriptions:
Configuration items
Descriptions
Id
Set the ID of the configuration item
Default
The default is 0,only for declaration without special meaning
Interface
Set the IP and port that the Ro interface of the OCS NE listens
to,in the format: "IP:port"
Metric
Set the priority,the smaller the value,the higher the priority
Fqdn
Set the hostname used by the Ro interface
Realm
Set the realm name used by the Ro interface
2.1.6.3.2 Delete MMTEL-AS Ro Peer
Path:Configuration → IMS → NF Name → MMTEL-AS →MMTEL-AS Ro Peer
Step:Select the ID of one of the records,click the red recycle bin button,and select
"OK" in the next pop-up box to delete the record.
19
Figure2.1.6.3.2-1 Delete MMTEL-AS Ro Peer
2.1.7 Location Retrieval Function(LRF)
Description:LRF provides routing information in the IMS core network,selects the
nearest PSAP/emergency center,provides UE location information,and routes the
information to the emergency call service center accurately,accepts the positioning
request from the PSAP/emergency center and sends it to the PSAP/emergency center
Initial location information of the UE,updates the location information of the UE at
the request of the PSAP/emergency center.
Path:Configuration → IMS → NF Name → LRF
Figure2.1.7-1 LRF
2.1.7.1 Lrf Configuration
Description:Lrf Configuration provides configuration such as setting the IP used by
the LRF network element,the listening port,and the log level.
2.1.7.1.1 Modify Lrf Configuration
Path:Configuration → IMS → NF Name → LRF →Lrf Configuration
Step:Enter the data in the figure below,such as IMS Name,Listen,etc.,and then click
on the "Add" button to save the data.
20
Figure2.1.7.1.1-1 Modify Lrf Configuration
Configuration items and descriptions:
Configuration items
Descriptions
IMS Name
URI of LRF,Uniform Resource Identifier,the format is: "sip: full
realm name: 9060",the default port used by lrf is 9060
Debug
Set the log level,take the value range-3~4,the value description
(ALERT=
-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte
d from small to large)
Listen
Set the IP address used by the lrf NE
Use Lost Server
Set the location service switch,on means open,off means close
Use Lost Number
Set the local number switch,on means open,off means close
2.1.7.2 Emerg Num Peer
Description:Emerg Num Peer provides the configuration of the real emergency
center number of the PSAP/emergency center connected to the LRF network
element,and is used to realize the mapping between the UE location information and
the real emergency number of the PSAP/emergency center.
2.1.7.2.1 Add Emerg Num Peer
Path:Configuration → IMS → NF Name → LRF →Emerg Num Peer
Step:Enter the data in the image below,such as Name,Listen,Port,etc.,and then click
on the "Add" button to save the data.
21
Figure2.1.7.2.1-1 Add Emerg Num Peer
Configuration items and descriptions:
Configuration items
Descriptions
Id
Set the ID of the configuration item
Orig Num
Set the source emergency number to match the emergency
number dialed by the user
Emerg Name
Set emergency number name
Real Num
Set the real emergency number,the number that the IMS
actually transfers,that is,the specific rescue center number
2.1.7.2.2 Delete Emerg Num Peer
Path:Configuration → IMS → NF Name → LRF →Emerg Num Peer
Step:Select the ID of one of the records,click on the red recycle bin button,and select
"OK" in the next pop-up box to delete the record.
Figure2.1.7.2.2-1 Delete Emerg Num Peer
2.1.8 Multimedia Resource Function Controller(MRFC)
Description:Control media resources on MRFP,parse SIP resource control commands
from other S-CSCFs and ASs,convert them into corresponding control commands for
MRFP and generate corresponding charging information. MRFC and MRFP cooperate
with network elements such as CSCF in IMS network Work together to complete IMS
users' multimedia CRBT (for example,playing the specified background music to the
calling party while waiting for the called party to answer),multimedia chromatic
22
images,and video calls and other service functions closely related to multimedia.
Path:Configuration → IMS → NF Name →MRFC
Figure2.1.8-1 MRFC
2.1.8.1 Modify Mrfc Configuration
Path:Configuration → IMS → NF Name →MRFC →Mrfc Configuration
Step:Enter the data in the figure below,such as Name,Listen,Debug,etc.,and then
click on the "Modify" button to save the data.
Figure2.1.8.1-1 Modify Mrfc Configuration
Configuration items and descriptions:
Configuration items
Descriptions
IMS Name
URI of mrfc,Uniform Resource Identifier,the format is: "sip: full
realm name: 5066",the port used by mrfc is 5066 by default
Debug
Set the log level,take the value range-3~4,the value description
(ALERT=
-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte
d from small to large)
Listen
Set the IP address used by mrfc
23
Mrf Enable Precondition
Set the resource reservation switch,on means open,off means
close
Port
Set the port that mrfc listens on,the default is 5066
2.1.9 Breakout Gateway Control Function(BGCF)
Description:The BGCF selects the MGCF for the call from the IMS to the PSTN/PLMN
network according to the interworking rule configuration or the called party
analysis,so as to realize the automatic acquisition of the MGCF route.
Path:Configuration → IMS → NF Name →BGCF
Figure2.1.9-1 BGCF
2.1.9.1 BGCF Configuration
Description:BGCF Configuration provides configuration such as setting the IP used by
the BGCF network element,the listening port,and the log level.
2.1.9.1.1 Modify BGCF Configuration
Path:Configuration → IMS → NF Name → BGCF →BGCF Configuration
Step:Enter the data in the figure below,such as IMS Name,Listen,etc.,and then click
on the "Modify" button to save the data.
Figure2.1.9.1.1-1 Mofigy BGCF Configuration
24
Configuration items and descriptions:
Configuration items
Descriptions
IMS Name
URI of bgcf,Uniform Resource Identifier,the format is: "sip: full
realm name: 8060",the default port used by bgcf is 8060
Debug
Set the log level,take the value range-3~4,the value description
(ALERT=
-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG=4,sorte
d from small to large)
Listen
Set the IP address used by the bgcf network element
Port
Set the port that the bgcf network element listens on,the
default is 8060
2.1.9.2 MGW Route
Description:Mgw routing,configure the number segment to route to the
corresponding MGCF/MGW
2.1.9.2.1 Add MGW Route
Path:Configuration → IMS → NF Name → BGCF →MGW Route
Step:Enter the data in the image below,such as Id,Number Prex,Mgw,etc.,and then
click on the "Add" button to save the data.
Figure2.1.9.2.1-1Add MGW Route
Configuration items and descriptions:
Configuration items
Descriptions
Id
Set the ID of the configuration item
Number Prex
Mgw
Set phone number prefix
Set the IP port of MGCF/MGW,the format is: "IP:port"
25
2.1.9.2.2 Delete MGW Route
Path:Configuration → IMS → NF Name → BGCF →MGW Route
Step:Select the ID of one of the records,click on the red recycle bin button,and select
"OK" in the next pop-up box to delete the record.
Figure2.1.9.2.2-1 Delete MGW Route
2.1.10 XCAP
Description:The XCAP service processes the HTTP requests for reading,writing and
modifying application configuration data in XML format stored by the application
client to the application server,and updates to HSS/UDM.
Path:Configuration → IMS → NF Name →XCAP
Figure2.1.10-1 XCAP
2.1.10.1 XCAP Configuration
Description:XCAP Configuration provides configuration such as setting the IP used by
the XCAP network element,the listening port,and the log level.
26
2.1.10.1.1 XCAP Configuration
Path:Configuration → IMS → NF Name →XCAP →XCAP Configuration
Step:Enter the data in the figure below,such as IMS Name,Listen,etc.,and then click
on the "Modify" button to save the data.
Figure2.1.10.1.1-1 Modify XCAP Configuration
Configuration items and descriptions:
Configuration items
Descriptions
IMS Name
URI of xcap,Uniform Resource Identifier,the format is: "sip: full
realm name: 80",the port used by xcap is 80 by default
Debug
Set the log level,take the value range-3~4,the value description
(ALERT=-3,CRITICAL,ERROR,DEFAULT,WARN,NOTICE,INFO,DEBUG
=4,sorted from small to large)
Listen
Set the IP address used by the xcap network element
Port
Set the port that the xcap network element listens on,the
default is 80
2.1.10.2 XCAP Sh Peer
Description:For XCAP Sh Peer,you need to fill in the HSS/UDM IP,listening port,host
name and realm name and other information.
2.1.10.2.1Add XCAP Sh Peer
Path:Configuration → IMS → NF Name →XCAP →XCAP Sh Peer
Step:Enter the data in the image below,such as Id,Fqdn,Realm,etc.,and then click on
the "Add" button to save the data.
27
Figure2.1.10 .2.1-1Add XCAP Sh Peer
Configuration items and descriptions:
Configuration items
Descriptions
Id
Set the ID of the configuration item
Default
The default is 0,only for declaration without special meaning
Interface
Set the IP and port of HSS/UDM listening,format: "IP:port"
Metric
Set the priority,the smaller the value,the higher the priority
Fqdn
Set the hostname used by HSS/UDM
Realm
Set the realm name used by HSS/UDM
2.1.10.2.2 Delete XCAP Sh Peer
Path:Configuration → IMS → NF Name →XCAP →XCAP Sh Peer
Step:Select the ID of one of the records,click on the red recycle bin button,and select
"OK" in the next pop-up box to delete the record.
Figure2.1.10.2.2-1 Delete XCAP Sh Peer
2.2 UDM
2.2.1 Authentication Data
Description:Authentication data management is used to provide all authentication
data operations related to the authentication mode,involving K4 data
operations,AMF data operations and OP data operations.
Path:Configuration → UDM → NF Name → Auc →Authentication Data
28
Figure2.2.1-1 Authentication Data
2.2.1.1 Authentication Data
Description:Authentication Data involves K4 (see 2.2.1.2), AMF (see 2.2.1.3), OP (see
2.2.1.4).
Before adding user authentication data,you need to add K4,AMF,and OP
template data parameters in the navigation bar at the same level.
2.2.1.1.1 Add Authentication Data
Path:Configuration → UDM → NF Name → Auc →Authentication Data
Step:Enter the data in the image below,such as IMSI,KI (32-digit hexadecimal
number),etc.,and then click on the "Add" button to save the data.
Figure2.2.1.1.1-1 Add Authentication Data
Configuration items and descriptions:
Configuration items
Descriptions
29
IMSI
Uniquely identifies a mobile user globally
KI
Used to authenticate user data
K4
The transmission key,used when adding the KI value,is used to
encrypt the KI value to ensure the security of the authentication
key KI in the storage process,and is used to encrypt and decrypt
KI/OPC
KI K4 Encrypted
Opc encryption options
OP
Introduced when using the MILENAGE authentication
algorithm,it is an input parameter of the authentication
calculation.All users of one operator can use the same OP to
distinguish them from users of other operators.
OPC
It is the result of encrypting the OP value with KI as the key,and
can be used for the calculation of the encryption function
OPC K4
Associate the required K4 template,indicating whether to
encrypt or decrypt OPC when the user has selected OPC.If the
K4 template is not 0,it means encryption
OPC K4 Encrypted
/
AMF
Associate the required AMF template
Card Type
SIM Card Type
Algorithm
2G and 3G are HLR user authentication configuration items
Auth Type
Authentication algorithm template required for association
2.2.1.1.2 Modify Authentication Data
Path:Configuration → UDM → NF Name → Auc →Authentication Data
Step:Click one of the IMSIs to jump to the details interface.After modification,click on
the "Modify" button,and then click on the "Back" button to return to the previous
interface.
30
Figure2.2.1.1.2-1 Modify Authentication Data
2.2.1.1.3 Delete Authentication Data
Path:Configuration → UDM → NF Name → Auc →Authentication Data
Step:
Method 1: Select the record to be deleted,click on the red delete button,and
select "OK" in the next pop-up box
Figure2.2.1.1.3-1 Delete Authentication Data
Method 2: Click one of the IMSIs to jump to the details interface,and click on
31
the "Delete" button in the displayed details interface.
Figure2.2.1.1.3-2 Delete Authentication Data
2.2.1.1.4 Query Authentication Data
Path:Configuration → UDM → NF Name → Auc →Authentication Data
Step:Click one of the IMSIs of the user authentication data,or fill in the IMSI to edit in
the IMSI input box and click on the "Query" button or press Enter.
Figure2.2.1.1.4-1 Query Authentication Data List
32
Figure2.2.1.1.4-2 Query Authentication Data
2.2.1.2 K4
Description:K4 is the cipher key,which is the key of the authentication key KI,and is
used to encrypt and decrypt the KI.
Configuration items and descriptions:
Configuration items
Descriptions
ID
Template ID
Name
Template Name
Value
Transport key
Algorithm
Authentication algorithm
2.2.1.2.1 Add K4
Path:Configuration → UDM → NF Name → Auc →K4
Step:Enter the relevant value in the input box,where ID is a positive integer
value.Name is no more than 64 characters.Value is a 32-bit 64-digit number.Finally
click "Add" to complete the Add data.
33
Figure2.2.1.2.1-1 Add K4
2.2.1.2.2 Delete K4
Path:Configuration → UDM → NF Name → Auc →K4
Step:Select the ID of one of the records,click on the red recycle bin button,and select
"OK" in the next pop-up box to delete the record.
Figure2.2.1.2.2-1 Delete K4
2.2.1.3 AMF
Description:AMF is the Access and Mobility Management Function,and can calculate
the MAC value together with SQN,RAND,and KI.
Configuration items and descriptions:
Configuration items
Descriptions
ID
Template ID
Name
Template Name
The value of Authentication management
Value
field
2.2.1.3.1 Add AMF
Path:Configuration → UDM → NF Name → Auc →AMF
Step:Enter the relevant value in the input box,where ID is a unique positive
34
integer.Name is unique and no more than 64 characters.Value is a hexadecimal
number with a length of 32.Finally click "Add" to complete the Add data.
Figure2.2.1.3.1-1 Add AMF
2.2.1.3.2 Delete AMF
Path:Configuration → UDM → NF Name → Auc →AMF
Step:Select the ID of one of the records,click on the red recycle bin button and select
"Ok" in the next pop-up box to delete the record.
Figure2.2.1.3.2-1 Delete AMF
2.2.1.4 OP
Description:OP is the operator variable algorithm configuration field,which is an
input parameter of authentication calculation.The OP value can be obtained by
encrypting and calculating with KI as the key.
Configuration items and descriptions:
Configuration items
Descriptions
ID
Template ID
Name
Template Name
Value
The value of OP
35
2.2.1.4.1 Add OP
Path:Configuration → UDM → NF Name → Auc →OP
Step:Enter the relevant value in the input box,where ID is a unique positive
integer.Name no more than 64 characters.Value is optional but no more than 33
characters.Finally click "Add" to complete adding data.
Figure2.2.1.4.1-1 Add OP
2.2.1.4.2 Delete OP
Path:Configuration → UDM → NF Name → Auc →OP
Step:Select the ID of one of the records,click the red recycle bin button,and select
"OK" in the next pop-up box to delete the record.
Figure2.2.1.4.2-1 Delete OP
36
2.2.2 IMS Subscription
2.2.2.1 Network
2.2.2.1.1 Visited Network
2.2.2.1.1.1 Add Visited Network
Path:Configuration → UDM → NF Name → IMS Subcription → Network →Visited
Network
Step:Click on the "Add" button,fill in the parameters in the following details
interface,and finally click on the "Add" button at the bottom of the interface to save.
Figure2.2.2.1.1.1-1 Visited Network List
Figure2.2.2.1.1.1-2 Add Visited Network
Configuration items and descriptions:
Configuration items
Descriptions
ID
List ID
Identity
Allowed access network name identifier
37
Example:ims.mnc000.mcc460.3gppnetwork.org
2.2.2.1.1.2 Modify Visited Network
Path:Configuration → UDM → NF Name → IMS Subcription → Network →Visited
Network
Step:Click the visited network name under the Identity list.After modification,click
the "Modify" button and select "OK" in the next pop-up box to modify the data.
Figure2.2.2.1.1.2-1 Modify Visited Network
2.2.2.1.1.3 Delete Visited Network
Path:Configuration → UDM → NF Name → IMS Subcription → Network →Visited
Network
Step:Select the name of one of the records,click on the red recycle bin button,and
select "OK" in the next pop-up box to delete the record
Figure2.2.2.1.1.3-1 Delete Visited Network
38
2.2.2.1.2 S-CSCF Capability
2.2.2.1.2.1 Add S-CSCF Capability
Path:Configuration → UDM → NF Name → IMS Subcription → Network →S-CSCF
Capability
Step:Click on the "Add" button,fill in the parameters in the following details
interface,and finally click on the "Add" button at the bottom of the interface to save.
Figure2.2.2.1.2.1-1 S-CSCF Capability List
Figure2.2.2.1.2.1-1 Add S-CSCF Capability
2.2.2.1.2.2 Modify S-CSCF Capability
Path:Configuration → UDM → NF Name → IMS Subcription → Network →S-CSCF
Capability
Step:Click the S-CSCF Capability name under the Name list,and after the modification
is completed,click on the "Modify" button,and select "Ok" in the next pop-up box to
modify the data.
39
Figure2.2.2.1.2.2-1 Modify S-CSCF Capability
2.2.2.1.2.3 Delete S-CSCF Capability
Path:Configuration → UDM → NF Name → IMS Subcription → Network →S-CSCF
Capability
Step:Select the name of one of the records,click on the red recycle bin button,and
select "OK" in the next pop-up box to delete the record.
Figure2.2.2.1.2.3-1 Delete S-CSCF Capability
2.2.2.1.3 Preferred S-CSCF
2.2.2.1.3.1 Add Preferred S-CSCF
Path:Configuration → UDM → NF Name → IMS Subcription → Network →Preferred
S-CSCF
Step:Click on the "Add" button,fill in the parameters in the following details
interface,and finally click on the "Add" button at the bottom of the interface to save.
40
Figure2.2.2.1.3.1-1 Preferred S-CSCF List
Figure2.2.2.1.3.1-2 Add Preferred S-CSCF
Configuration items and descriptions:
Configuration items
Descriptions
Id Set
ID Set
Name
The name of Prefferred S-CSCF
Sip Url
S-CSCF Sip Url
Example:sip:scscf.ims. com:6060
Priority
The priority of Prefferred S-CSCF
2.2.2.1.3.2 Modify Preferred S-CSCF
Path:Configuration → UDM → NF Name → IMS Subcription → Network →Preferred
S-CSCF
Step:Click the Preferred S-CSCF name under the Name list.After the modification is
completed,click on the "Modify" button,and select "Ok" in the next pop-up box to
modify the data.
41
Figure2.2.2.1.3.2-1 Modify Preferred S-CSCF
2.2.2.1.3.3 Delete Preferred S-CSCF
Path:Configuration → UDM → NF Name → IMS Subcription → Network →Preferred
S-CSCF
Step:Select the name of one of the records,click on the red recycle bin button,and
select "OK" in the next pop-up box to delete the record
Figure2.2.2.1.3.3-1 Delete Preferred S-CSCF
2.2.2.2 Service
2.2.2.2.1 Service Profile
2.2.2.2.1.1 Add Service Profile
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile
Step:Fill in the service name in the box behind Name,and then click on the "Add"
button.After the prompt is added successfully,click "OK" to add it successfully.
42
Figure2.2.2.2.2.1-1 Service Profile List
Figure2.2.2.2.2.1-2 Add Service Profile
2.2.2.2.1.2 Delete Service Profile
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile
Step:Click on the red Recycle Bin button and select "OK" in the next pop-up box to
delete the data.
Figure2.2.2.2.2.2-1 Delete Service Profile
2.2.2.2.2 Initial Filter Criteria
2.2.2.2.2.1 Add Initial Filter Criteria
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile Association
Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service
Profile,click on the "Add" button,click the "Add" button behind the Initial Filter
Criteria,fill in the parameters in the next details interface,and finally click on the
"Add" button below the page to save.
43
Figure2.2.2.2.2.1-1 Add Initial Filter Criteria
Figure2.2.2.2.2.1-2 Add Initial Filter Criteria
Figure2.2.2.2.2.1-3 Add Initial Filter Criteria
2.2.2.2.2.2 Modify Initial Filter Criteria
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile Association
Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service
Profile,click the service name in the Name list in "Initial Filter Criteria",after the
modification is completed,click on the "Modify" button,and select "OK" in the next
pop-up box ,you can modify the data.
44
Figure2.2.2.2.2.2-1 Modify Initial Filter Criteria
2.2.2.2.2.3 Delete Initial Filter Criteria
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile Association
Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service
Profile,click on the red recycle bin button,and select "Ok" in the next pop-up box to
delete the data.
Figure2.2.2.2.2.3-1 Delete Initial Filter Criteria
45
2.2.2.2.3 Application Server
2.2.2.2.3.1 Add Application Server
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile Association
Step:Click on the "Add" button behind the Application Server,fill in the parameters in
the following details interface,and finally click on the "Add" button at the bottom of
the interface to save.
Figure2.2.2.2.3.1-1 Add Application Server
Configuration items and descriptions:
Configuration items
Descriptions
Name
\
Server Name
Example:sip:Name.ims.IMS realm Name:5065
FQDN
Example:Name.ims.IMS realm Name
2.2.2.2.3.2 Modify Application Server
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile Association
Step:Click the Name list service name in Figure 2.2.2.2.2.1-1 Service Profile,click the
Name list service name in "Application Server",click on the "Modify" button,and
select "OK" in the next pop-up box to modify the data.
46
Figure2.2.2.2.3.2-1 Modify Application Server
2.2.2.2.3.3 Delete Application Server
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile Association
Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service
Profile,click on the red recycle bin button,and select "OK" in the next pop-up box to
delete the data.
Figure2.2.2.2.3.3-1
Delete Application Server
47
2.2.2.2.4 Trigger Point
2.2.2.2.4.1 Add Trigger Point
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile Association
Step:Click on the "Add" button after the Trigger Point,fill in the parameters in the
following details interface,and finally click on the "Add" button at the bottom of the
interface to save.
Figure2.2.2.2.4.1-1 Add Trigger Point
Configuration items and descriptions:
Configuration items
Descriptions
Name
/
Condition Type
/
2.2.2.2.4.2 Modify Trigger Point
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile Association
Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service
Profile,click the service name in the Name list in "Trigger Point",after the
modification is completed,click on the "Modify" button,and select "OK" in the next
pop-up box to modify the data.
48
Figure2.2.2.2.4.2-1 Modify Trigger Point
2.2.2.2.4.3 Delete Trigger Point
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile Association
Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service
Profile,click on the red recycle bin button,and select "OK" in the next pop-up box to
delete the data.
Figure2.2.2.2.4.3-1 Delete Trigger Point
2.2.2.2.5 Service Point Trigger
2.2.2.2.5.1 Add Service Point Trigger
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
49
Profile Association
Step:Click on the "Add" button behind the Service Point Trigger,fill in the parameters
in the following details interface,and finally click on the "Add" button at the bottom
of the interface to save.
Figure2.2.2.2.5.1-1 Add Service Point Trigger
2.2.2.2.5.2 Modify Service Point Trigger
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile Association
Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service
Profile,click the service name in the Name list in "Service Point Trigger",after the
modification is completed,click on the "Modify" button,and select "OK" in the next
pop-up box ,you can modify the data.
50
Figure2.2.2.2.5.2-1 Modify Service Point Trigger
2.2.2.2.5.3 Delete Service Point Trigger
Path:Configuration → UDM → NF Name → IMS Subcription → Service→Service
Profile Association
Step:Click the service name in the Name list in Figure 2.2.2.2.2.1-1 Service
Profile,click on sthe red recycle bin button,and select "OK" in the next pop-up box to
delete the data.
Figure2.2.2.2.5.3-1 Delete Service Point Trigger
51
2.2.2.3 IMS Batch Subscription
2.2.2.3.3 Batch Subscription
2.2.2.3.3.1 Batch Add IMS Subscription Information
Path:Configuration → UDM → NF Name → IMS Subscription → IMS Batch
Subscription
Step:Fill in the required parameters and click on the Add button.
Figure2.2.2.3.3.1-1 Add bulk subscription data
Configuration items and descriptions:
Configuration items
Descriptions
IMSI
Uniquely identifies a mobile user globally
Realm Name
realm name (must be in the following format)
Example:ims.mnc007.mcc460.3gppnetwork.org
Msisdn
Phone number
AMF Name
A new profile is required here on the Auc interface (located
below)
Figure2.2.2.3.3.1-2 New ims_amf Configuration
52
2.2.2.3.3.2 Batch Delete IMS Subscription Information
Path:Configuration → UDM → NF Name → IMS Subscription → IMS Batch
Subscription
Step:Fill in the required parameters and click on the delete button.
Figure2.2.2.3.3.2-1 Delete bulk subscription data
2.2.2.4 IMS User
The addition of the User page (IMS user information) can be added quickly using the
batch addition method.After opening accounts in batches,you can modify and delete
them.
3 Device Management
Description:Provide
network
element
53
management,system
service
management,network card management,routing
management functions
Path:System --> Device Management
management
and
system
Description:Provide
network
element
management,system
management,network card management,routing management and
management functions
Path:System --> Device --> NF Management
service
system
3.1 NF Management
Figure3.1-1 NF List
3.1.1 Add NF
Path:System --> NF Management --> NF Management
Step:Click on the "Add NF" button under the NF Management interface --> Fill in the
configuration information in the pop-up box --> Click the "Save" button to add it
successfully.
Figure3.1.1-1 Add NF
Configuration items and descriptions:
Configuration items
Descriptions
System
Select the system to which the NE belongs from the drop-down list
NF Type
\
NF Internal Id
Name the NF,which will be displayed under Configuration
NF Name
Name this configuration item and identify this configuration item
54
NF Descriptions
NF description items
IP
IP address used by the network element
License ID
Its value comes from the ID of the corresponding NF in the License
management interface under System
3.1.2 Query NF
Path:System-->NF Management-->NF Management
Step:Select the NF type in the NF Type drop-down box --> Select the system to which
the NE belongs in System --> Click on the "Query" button,and the query results will
be displayed in the list.
Figure3.1.2-1 Query NF
3.1.3 Delete NF
Path:System-->NF Management
Steps to delete multiple network elements:Check the list in the NF Management
interface and select multiple NFs to be deleted-->Click the "Delete NFs"
button-->Click the "OK" in the pop-up box to delete it successfully.
Figure3.1.3-1 Delete NF
Steps to delete a single network element:Select the NF to be deleted from the list
on the NF Management interface --> Click the "Delete" icon on the right side of the
corresponding row --> Click the "OK" in the pop-up box to delete it successfully.
Figure3.1.3-2 Delete NF
55
3.1.4 Other Configuration
Path:System-->NF Management-->NF Management
Description: :View the performance parameters of the NF system,including hard
disk usage,CPU usage,NF management IP address,and memory usage.
:Edit NF Information
:Restart the NF device
Figure3.1.4-1 Other configuration paths
3.2 System Service Management
Description:Provide management related service node configuration
Path:System-->Device Management-->System Service Management
3.2.1 Modify System Services
Path:System-->Device Management-->System Service Management
Step:Click on the Modify button under the System Service Management interface -->
Fill in the configuration information in the pop-up box --> Click the "Modify" button
to modify it successfully.
Figure3.2.1-1 Service List
3.3.2 Query System Services
Path:System-->Device Management-->System Service Management
Step:Select the type of query in the drop-down box --> Click on the "Query" button.If
it exists,the query result will be displayed under the list.If it does not exist,the list will
be displayed as empty.
56
Figure3.3.2-1 Query System Services
3.3 NIC Management
Description:Provides management NIC configuration
Path:System-->Device Management-->NIC Management
3.3.1 Add NIC
Path:System-->Device Management-->NIC Management
Step:Click the "Add NIC" button under the NIC Management interface --> fill in the
configuration information in the pop-up box --> click the "Add" button in the pop-up
box,the addition is successful.
Notice:
1. Add lo: X.IP and Mask.After filling in the IP,you must write the mask prefix.Net
Mask must also be written,and the Gateway can be omitted.
Figure3.3.1-1 NIC List
57
Figure3.3.1-2 Add NIC
Configuration items and descriptions:
Configuration items Descriptions
System
Select the core network system
NIC
NIC name
IP
IP address
Gateway
Gateway address
Net Mask
Subnet mask
3.3.2 Query NIC
Path:System-->Device Management-->NIC Management
Step:Select the type of query system in the drop-down box --> Click on the "Query"
button,if it exists,the query results will be displayed under the list
Figure3.3.2-1 Query NIC
3.3.3 Delete NIC
Path:System-->Device Management-->NIC Management
Step:Click on the delete icon in the corresponding row of the NIC to be deleted on
the NIC Management interface --> Click the "OK" in the pop-up box to delete it
successfully.
58
Figure3.3.3-1 Delete NIC
3.4 Route Management
Description:Provides Route Management
Path:System-->Device Management-->Route Management
3.4.1 Add Route Management
Path:System-->Device Management-->Route Management
Step:Click "Add Route" --> Fill in the configuration information in the pop-up box -->
Click on the "Add" button to add successfully.
Figure 3.4.1-1 Route List
Figure 3.4.1-2 Add Route
Configuration items and descriptions:
Configuration items
Descriptions
59
System
Select the core network system
NIC
NIC name
Network Segment
Network segment,format:ip network segment/subnet mask
bits
Gateway
Gateway address
3.4.2 Query Route Management
Path:System-->Device Management-->Route Management
Step:Select epc in the drop-down box-->click "Query",if it exists,the result will be
displayed under the list,if not,the list will be empty.
Figure3.4.2-1 Query Route
3.4.3 Modify Route Management
Path:System-->Device Management-->Route Management
Step:Click the NIC name of the configuration item you want to modify in the Iface
column in the list --> Fill in the NIC,Network Segment,and Gateway information in the
pop-up box --> Click the "Modify" button to modify it successfully.
Figure3.4.3-1 Modify Route Management
3.4.4 Delete Route Management
Path:System-->Device Management-->Route Management
Step:Click the delete icon in the row corresponding to the routing configuration you
want to delete in the list --> click the "OK" button --> Click on the "OK" button to
60
delete it successfully.
Figure3.4.4-1 Delete Route
3.5 System Management
Description:Provides configuration for managing core network element machines
Path:System-->Device Management-->System Management
3.5.1 Add System
Path:System-->Device Management-->System Management
Step:Click "Add System" under the System Management interface --> Fill in the
configuration information in the pop-up box --> Click "Add" in the pop box to add
successfully
Figure3.5.1-1 System Management List
Figure3.5.1-2 Add System Management
3.5.2 Modify System
Path:System-->Device Management-->System Management
61
Step:Click the system you want to modify in the list --> Fill in the information in the
pop-up box --> click the "Modify" button to modify it successfully.
Figure3.5.2-1 Modify System Management
3.5.3 Delete System
Path:System-->Device Management-->System Management
Step:Click the delete icon in the corresponding row of the system you want to delete
in the list --> Click on the "OK" button --> Click the "OK" button to delete it
successfully.
Figure3.5.3-1 Delete System Management
3.5.4 Other Configuration
Path:System-->Device Management-->System Management
Description:The ip address of the network management login, and the configured ip
address should be consistent with the ip address of the network management
host.The default port is 8500.If they are inconsistent,the login to the network
management fails.
Figure3.5.4-1 Other System Configuration
62
4 Security Management
This chapter mainly configures IMS network user access security configuration
parameters,including three major functional modules: User Management,User
Group Management,and Permission Management.
The User Management module implements adding,deleting,locking,and unlocking
access users.The User Group Management module implements the addition,deletion
and authority management of user groups.The Permission Management module
implements adding and deleting management functions to the permission list.
Figure4-1 Security Management Path
4.1 User Management
Path:System--> Security Management --> User Management
Figure 4.1-1 User Management Path
4.1.1 Add User
Path:System--> Security Management --> User Management --> Add New
Step:Click on the "Add New" button to pop up the add user pop-up window,fill in the
user parameters in the pop-up window and click on the "Save" button to save the
63
user.
Figure4.1.1-1 User Management List
Figure4.1.1-2 Add User
Configuration items and descriptions:
Configuration items
Descriptions
User Name
\
Password
\
Password Level
Password level,A(6~128 digits)
B(6~128 digits,characters)
C(6~128digits,characters,,special characters)
Password Expiration Time
Password Expiration Time
Account Expiration Time
Account Expiration Time
4.1.2 Modify User
Path:System--> Security Management --> User Management
Step:Click the User Name to pop up the details page. After the modification is
completed, click on the "Save" button to complete the modification.
Figure4.1.2-1 Modify User Management
64
4.1.3 Copy User
Description:The function is to copy the user with the same permission to avoid a
series of complicated permission adding operations.
Path:System--> Security Management --> User Management
Step:Click the User Name of the user to be copied to pop up the details interface
(see Figure 4.1.3-1),and then click the "Copy" button to pop up the copy user details
interface,fill in the new user name and password in the pop-up window,and click on
the “Save” button to complete the user copy.
4.1.3-1 Copy User Management
4.1.3-2 Copy User Management
4.1.4 Delete User
Path:System--> Security Management --> User Management
Step:
Method 1: Select the record to be deleted,click the red delete button,and select "OK"
in the next pop-up box
65
Figure4.1.4-1 Delete User
Method 2: Click the check box of the user to be deleted,then click on the red "Delete
Users" button,and select "OK" in the next pop-up box
Figure4.1.4-2 Delete User
4.1.5 Query and View User
Path:System--> Security Management --> User Management
Step:Fill in the user name to be queried in the User Name box and the online Status
box,and then click on the "Query" button or press Enter.After the user is
identified,click on the "View" (eye shape) button in Opration to view the user details.
Figure4.1.5-1 Query User
66
Figure4.1.5-2 User Information
4.1.6 Lock and Unlock User
Description:当用户被锁定后,该用户将无法登入以及后续一系列操作没有执行权
限.
Path:System--> Security Management --> User Management
Step:
Lock: Click the check box of the User Name that needs to be locked,and click on
the "Lock" button to complete the locking of the user.
Unlock: Click the check box of the User Name that needs to be locked,and click
on the "Unlock" button to complete the unlocking of the user.
Figure4.1.6-1 Lock and Unlock User
4.1.7 Add User IP Whitelist
Description:After the user adds the IP whitelist,the corresponding IP that is not in
the list will not be able to log in and access.
Path:System--> Security Management --> User Management
Step:Select the user to be added to the IP whitelist,click on the "IP WhiteList" button
to pop up a pop-up window,fill in the IP value in the pop-up window,and click on the
"Save" button to save.
67
Figure4.1.7-1 User List Whitelist Operation
4.1.8 Logout User
Path:System--> Security Management --> User Management
Step:Select the user who needs to go offline,click on the "Logout" button in
operation,and the status of the user will be changed from "Online" to "Offline".
Figure4.1.8-1 Logout User Operation
4.2 User Group Management
Figure4.2-1 User Group Management Path
Description:There are 11 user groups by default in user group management.Among
them,the SuperOperator (super user group) is the highest privilege group,this group
cannot be deleted and the super user (admin) interface of this group cannot be
removed.
Path:System--> Security Management --> User Group Management
Figure4.2-2 User Group Management List
68
4.2.1 Add New Group
Path:System--> Security Management --> User Group Management --> Add New
Group
Step:Click on the "Add New Group" button to pop up the add user pop-up window,fill
in the user parameters in the pop-up window and click on the "Save" button to save
the user.
Figure4.2.1-1 Add New Group
Configuration items and descriptions:
Configuration item
Description
User Group Name
/
Create Time
/
4.2.2 Modify Group
Path:System--> Security Management --> User Group Management
Step:Click the User Group Name to be modified to pop up the details interface.After
modification is completed,click on the "Save" button to complete the modification.
Figure4.2.2-1 Modify Group
4.2.3 Copy Group
Description:This function is to copy the user group of the same permission which can
avoid a subsequent series of complex permission additions.
69
Path:System--> Security Management --> User Group Management
Step:Click the User Group Name of the user to be copied to pop up the details
interface (see Figure 4.2.3-1),then click on the "Copy" button to pop up the copy user
details interface,fill in the new user group name in the pop-up window,and click on
the "Save" button to complete the user group copy.
Figure4.2.3-1 Copy User Group
Figure4.2.3-2 Copy User Account Password
4.2.4 Delete User Group
Path:System--> Security Management --> User Group Management
Step:
Method 1: Select the records that you need to delete,Click on the red delete
button,and select "OK" in the next pop-up box.
70
Figure4.2.4-1 Delete User Group
Method 2: Click the check box for the user to delete,then click the red "Delete
Group" button,and select "OK" in the next pop-up box,as shown in Figure 4.2.4-1.
Figure4.2.4-2 Delete User Group
4.2.5 Query User Group
Path:System--> Security Management --> User Group Management
Step:Fill in the user group name to be queried in the Group Name box,then click on
the "Query" button or press Enter
71
Figure4.2.5-1 Query User Group
4.2.6 User Group Management
Path:System--> Security Management --> User Group Management
Step:Select the user group to be modified, click on the "Group Users Management"
(humanoid) button in Operation (see figure 4.2.6-1 red selected box), pop-up, the
left Selected for the user in the group added, candidates on the right, can move the
selected user to the designated area, or use the double arrow to move, click on the
"Save" button to save (see figure 4.2.6-2).
Figure4.2.6-1 User Group Management
Figure4.2.6-2 User Group Management Interface
72
4.2.7 Group Node Management
Path:System--> Security Management --> User Group Management
Step:Select the user group to be modified,click on the "Group NFs Management"
button in Operation,and a pop-up window will pop up.In the pop-up
window,Selected on the left is the user that has been added in the current group,and
on the right is the candidate user.Move the selected users to the specified area,or
use the double arrows to move them all,and click on the "Save" button to save when
finished.
Figure4.2.7-1 User Group Node
Figure4.2.7-2 User Group Node Selection
4.2.8 User Group Permission Management
Description:Group permission management is to add,delete and query the
permission functions in the existing permission types.
Path:System--> Security Management --> User Group Management --> User Group
Permission Management
73
Figure4.2.8-1 User Group Permission Management
4.2.8.1 Add Group Permission
Path:System--> Security Management --> User Group Management --> User Group
Permission Management
Step:Click on the "Add New" button,a pop-up window for adding group permissions
will pop up,select the permission type and permission name in the pop-up window
and click on the "Save" button to save the group permission.
Figure4.2.8.1-1 Group Permission List
Figure4.2.8.1-2 Add Group Permission
Configuration items and descriptions:
Configuration items
Descriptions
Permission Type
/
Permission Name
/
74
4.2.8.2 Remove Group Permission
Path:System--> Security Management --> User Group Management --> User Group
Permission Management
Step:
Method 1: Select the record to be deleted,click on the red delete button,and select
"OK" in the next pop-up box.
Method 2: Click the check box of the permission name to be deleted,then click on
the red "Batch Remove" button,and select "OK" in the next pop-up box.
Figure4.2.8.2-1 Remove Group Permission
4.2.8.3 Query Group Permission
Path:System--> Security Management --> User Group Management --> User Group
Permission Management
Step:Select the permission type to be queried in the query radio box,and then click
on the "Query" button or press Enter
Figure4.2.8.3-1 Query Group Permission
4.3 Permission Management
Description:Permission management is mainly to add,modify,delete and query
functions for each permission type and its permission name and interface name.
Path:System--> Security Management --> Permission Management
75
Figure4.3-1 Permission Management Path
4.3.1 Permission List
Description:Permission list management is to add,delete and query the permission
names and interface names in the existing permission types.
Path:System--> Security Management --> Permission Management --> Permission List
Figure4.3.1-1 Permission Management List
4.3.1.1 Add Permissions
Path:System--> Security Management --> Permission Management --> Permission List
Step:Click on the "Add New" button to pop up the add user pop-up window,fill in the
user parameters in the pop-up window and click on the "Save" button to save the
user.
Figure4.3.1.1-1 Add Permissions
Configuration items and descriptions:
76
Configuration items
Descriptions
Permission Name
/
Permission Type
/
Interface Name
/
4.3.1.2 Modify Permissions
Path:System--> Security Management --> Permission Management --> Permission List
Step:Click the Permission Name to be modified to pop up the details interface.After
modification is completed,click on the "Save" button to complete the modification.
Figure4.3.1.2-1 Modify Permissions
4.3.1.3 Delete Permissions
Path:System--> Security Management --> Permission Management --> Permission List
Step:
Method 1: Select the records that you need to delete,click on the red delete
button,and select "OK" in the next pop-up box.
Method 2: Click the check box for the user to delete,then click on the red "Delete
Permission" button,and select "OK" in the next pop-up box.
Figure 4.3.1.3-1 Delete Permissions
77
4.3.1.4 Query Permissions
Path:System--> Security Management --> Permission Management --> Permission List
Step:Select the permission type to be queried in the query radio box,and then click
on the "Query" button or press Enter
Figure4.3.1.4-1 Query Permissions
4.3.2 Permission Type
Description:Permission type management is to add,delete and query the existing
permission types.
Path:System--> Security Management --> Permission Management --> Permission
Type
Figure4.3.2-1 Permission Type
4.3.2.1 Add Permission Type
Path:System--> Security Management --> Permission Management --> Permission
Type
Step:Click on the "Add New" button to pop up the add user pop-up window,fill in the
user parameters in the pop-up window and click on the "Save" button to save the
user.
78
Figure4.3.2.1-1 Add Permission Type
Configuration items and descriptions:
Configuration items
Descriptions
Permission Type
/
4.3.2.2 Delete Permission Type
Path:System--> Security Management --> Permission Management --> Permission
Type
Step:
Method 1: Select the records that you need to delete,click on the red delete
button,and select "OK" in the next pop-up box.
Method 2: Click the check box for the user to delete,then click the red "Delete
Permission" button,and select "OK" in the next pop-up box.
Figure4.3.2.2-1 Delete Permission Type
79
5 Log Management
Figure4-1 Security Management Path
5.1 Operation Log
Description:The operation log mainly records some behaviors and actions of some
users
on
the
web
network
management,including
user,network
element,time,IP,operation content,etc.,which is convenient for operation and
maintenance personnel to quickly and accurately locate the problems of the operator
in using the network management.
Path:System--> Log Management --> Operation Log
Figure5.1-1 Operation Log Interface
5.1.1 Query Operation Log
Path:System--> Log Management --> Operation Log
Step:Select the type of query in the query box,then click on the "Query" button or
80
press Enter
Figure5.1.1-1 Query Operation Log
Configuration items and descriptions:
Configuration items
Descriptions
User
User name
NF Internal ID
Node name
NF Type
Node type
Start Time
/
End Time
/
5.1.2 Download Operation Log
Path:System--> Log Management --> Operation Log
Step:Click on the "Download" button in the upper right corner of the interface to
download the corresponding format file,according to the Excel and CSV format files
provided on the webinterface.
Figure5.1.2-1 Download Operation Log
5.2 Security Log
Description:The security log mainly includes the login IP,time,type,and status of
various types of users.
81
Path:System--> Log Management --> Security Log
Figure5.2-1 Download Security Log
Configuration items and descriptions:
Configuration items
Descriptions
User Name
/
IP
Login IP
Time
Login time
Type
State type
Result
/
5.3 Log Level Management
Path:System--> Log Management --> Security Log
Description:The main functions of log management include: clearing log
files,querying and downloading log files,and modifying NF log registration.
5.3.1 Clear Log Files
Clear the network element files of each system: clear with network element
modules,and clear with network elements.
82
5.3.2 Query and Download Log Files
Query button is the query of different systems,the input box is to enter the file that
you want to download for a few days,download needs to fill in the number of all
day,download the system of network element files: download the network element
module,download the network element.
5.3.3 Modify the NF Log Level
There are three functions: restore default level,best performance level,set all levels
Restore the default level,the best level of performance is the best level defined by
the NE itself
83
The query button on the setting level interface is displayed on a single network
element,which is convenient for customers to modify the level of a single network
element.When setting the level manually,modify the value of the drop-down box.The
setting level button supports modifying a single module level and multiple module
levels.
5.4 Packet Capture Management
Description:Provide new capture,stop capture,package download and delete
functions
Path:System--> Log Management --> PACP Package
5.4.1 Query Package
Description:Pull down select system to query grabbed packages in different systems
84
5.4.2 Create A New Packet Capture
Description:Create a new packet capture condition,click start to capture the
packet,and the interface generates a packet file.You can capture multiple packages at
the same time,the package name contains the selected network card name and port
name
5.4.3 Stop Capturing
Description:Click the stop button to stop capturing packets,and it will also stop
capturing packets when the time reaches the predetermined time.
85
5.4.4 Download Package
Description:Click to download,it will jump to the corresponding interface to
complete the download.
5.4.5 Delete Package
Description:Click “Delete” to delete the corresponding package.
86
6 Software Management
Figure6-1 Software Path
6.1 Install Package Management
Path:System-->Software Management-->Package Management
87
Figure6.1-1 Package Management Interface
6.2 Install Package Switch
Path:System-->Software Management-->Package Management
Step:Click the "Swap" button to switch the installation package.
Figure6.2-1 Package Switch Interface
6.3 NF Process Management
Path:System-->Software Management-->Process Management
88
Figure6.3-1 Process Management Interface
6.4 NF Version Management
Path:System-->Software Management--->NF Version
Figure6.4-1 NF Version Interface
6.5 Query Software Status
Description:You can view the running status of each network element,whether it is in
a disconnected state or a connected state
Path:System-->Software Management--->Software Status
Step:Click on the "Load" button,the query results will be displayed under the list.
89
Figure6.5-1 Software Status
Figure6.5-2 Software Status Loading Interface
6.6 Update Web Management
Path:System-->Software Management-->Web Upgrade
Figure6.6-1 Web Upgrade Interface
7 Fault Management
Description:Provides functions such as real-time alarms,historical alarms,alarm
summary view,alarm file management,alarm storage time,alarm generation time,and
CPU threshold setting.
90
7.1 Active Alarm
7.1.1 Query Alarm
Path:Alarm-->Active Alarm
Step:Select options in each drop-down box --> Click "Query Alarm" --> Click
"Refresh",the query result will be displayed in the list.
Figure7.1.1-1 Active Alarm Interface
Configuration items and descriptions:
Configuration items
Descriptions
NF Type
/
NF ID
/
Select Alarm Level
Select the alarm level,optional all
Status/minor/major/critical
Select Alarm Type
Select alarm type,optional
All/AppAlarm/LinkAlarm/SystemAlarm
Start
Start time
End
Terminal time
Alarm Code
/
Alarm Info
Alarm Information
Event Time
Trigger alarm time
Limit Set
Threshold
Alarm Status
/
7.1.2 Remark Alarm
Path:Alarm-->Active Alarm
Step:Check the alarm record item you want to add remarks in the list --> Click "Alarm
Remarks" --> Fill in the remark information --> Click "Save" --> Click on the "OK"
91
button in the bullet box to note successfully.
Figure7.1.2-1 Remark Alarm Example
7.1.3 Download Alarm
Path:Alarm-->Active Alarm
Step:Check the alarm record item you want to download in the list --> Click
"Download" --> Select to open or save the downloaded excel file.
Figure7.1.3-1 Alarm Download Example
7.1.4 Print Alarm
Path:Alarm-->Active Alarm
Step:Check the alarm record item you want to print in the list --> Click "Print" to
jump to the interface of connecting to the printer.
92
Figure7.1.4-1 Alarm Print Example
7.1.5 Edit Alarm Level
Path:Alarm-->Active Alarm
Step:Check the alarm record item whose alarm level you want to modify in the
list-->Click on the "Level Edit" button-->Select the level in the Select Alarm Level
drop-down box-->Click on the "Save" button-->Click the "OK" button to edit
successfully.
Figure7.1.5-1 Edit Alarm Level Example
7.1.6 Clear Alarm
Path:Alarm-->Active Alarm
Step:Check the alarm record item you want to delete in the list-->Click "Clear
Alarms"-->Click the "OK" button to edit successfully.
93
Figure7.1.6-1 Alarm Clearing Example
7.1.7 Refresh Alarm
Path:Alarm-->Active Alarm
Step:Use with "Query Alarm".
Figure7.1.7-1 Alarm Download Example
7.2 History Alarm
7.2.1 Query History Alarm
Path:Alarm-->History Alarm
Step:Select options in each drop-down box --> Click "Query",the query results will be
displayed in the list.
94
Figure7.2.1-1 Histroy Alarm Interface
Figure7.2.1-2 Histroy Alarm Query
Configuration items and descriptions:
Configuration item
Description
NF Type
/
NF Name
/
Select Alarm Level
/
Select Alarm Type
/
Start
Start time
End
End time
Alarm Level
/
Alarm Code
/
Alarm Info
Alarm information
Event Time
Trigger alarm time
Limit Set
Threshold
Alarm Status
/
End Time
/
Alarm Remarks
/
7.2.2 History Alarm Remarks
Path:Alarm-->History Alarm
Step:Check the alarm record item you want to add remarks in the list --> Click "Alarm
Remarks" --> Fill in the remark information --> Click "Save" --> Click the "OK" button
in the bullet box to note successfully.
95
Figure7.2.2-1 Histroy Alarm Remarks
7.2.3 Download Histroy Alarm
Path:Alarm-->History Alarm
Step:Check the alarm record item you want to download in the list --> Click
"Download" --> Select to open or save the downloaded excel file.
Figure7.2.3-1 Download Histroy Alarm
7.2.4 Print Histroy Alarm
Path:Alarm-->History Alarm
Step:Check the alarm record item you want to print in the list --> Click "Print" to
jump to the interface of connecting to the printer.
Figure7.2.4-1 Histroy Alarm Print
7.2.5 Edit History Alarm Level
Path:Alarm-->History Alarm
Step:Check the alarm record item whose alarm level you want to modify in the
list-->Click on the "Level Edit" button-->Select the level in the Select Alarm Level
drop-down box-->Click on the "Save" button-->Click "Save" button- -> Click on the
"OK" button to edit successfully.
96
Figure7.2.5-1 Edit Histroy Alarm Level
7.3 View Alarm Summary
Path:Alarm-->Alarm Summary View
Description:Provides statistics on the number of alarms
Figure7.3-1 View Alarm Summary Interface
Statistical parameters and descriptions:
Statistical parameters
Descriptions
Alarm Level
/
Alarm Code
/
Alarm Type
/
Alarm Info
Alarm information
NF Type
/
NF Name
/
Event Time
Trigger alarm time
7.4 Alarm File Management
Path:Alarm-->Alarm File Management
Description:Provides functions for downloading alarm files,deleting individual alarm
files,and deleting alarm files in batches.
97
Figure7.4-1 Alarm File Management Interface
Configuration items and descriptions:
Configuration items
Descriptions
Fill Name
/
Time Duration
/
Operation
/
7.4.1 Download Alarm File
Path:Alarm-->Alarm File Management
Step:Click the download icon on the right side of the corresponding row of the alarm
record item you want to download in the list --> select to open or save the
downloaded excel file.
7.4.2 Delete A Single Alarm File
Path:Alarm-->Alarm File Management
Step:Check the alarm record item you want to delete in the list-->click the "OK"
button in the pop-up box-->After clicking the "OK" button in the pop-up box,the
deletion is successful.
7.4.3 Delete Alarm Files In Batches
Path:Alarm-->Alarm File Management
Step:Click the delete icon on the right side of the corresponding row of the alarm
record item you want to delete in the list-->Click the "Delete Alarm Files" button in
the pop-up box-->Click the "OK" button in the pop-up box-->After clicking the "OK"
button in the pop-up box,the deletion is successful.
98
7.5 Alarm Storage Time Setting
Path:Alarm-->Alarm Storage Time
Description:Set the time that the alarm is stored in the system
Step:Select the time in the Select Time drop-down box --> Click on the "Save" button
-->Click on the "OK" button to set it successfully.
Figure7.5-1 Alarm Storage Time Interface
Configuration items and descriptions:
Configuration items
Descriptions
Select Time
Select the alarm storage time
7.6 Alarm Time Duration Setting
Path:Alarm-->Alarm Time Duration
Description:Set the duration of the alarm service in the system
Step:Enter the value in "Set Alarm Time" --> Select the unit in the drop-down box -->
Click "Save" -->Click on "OK" in the pop-up box to set it successfully.
99
Figure7.6-1 Alarm Time Duration Interface
Configuration items and descriptions:
Configuration items
Descriptions
Set Alarm Time
/
7.7 Alarm Threshold Setting
Path:Alarm-->Alarm Threshold Setting
Description:Set the CPU usage of each NF in the system to generate alarms.
Step:Fill in the configuration information in the pop-up box --> Click the "Save"
button -->Click on the "OK" button in the pop-up box and set it successfully.
Figure7.7-1 CPU Threshold Setting Interface
Configuration items and descriptions:
100
Configuration items
NF Type
NF Name
Alarm Created Threshold
Alarm Cleared Threshold
Descriptions
/
/
/
/
8 Performance Management
8.1 Enter the Grafana Way
(1) Default username and password for initial login: username: admin,password:
admin
(2) Web management link:
Click Integration configuration under the unified network management interface
--> Click Grafana to jump to the Grafana login interface --> Fill in the username and
password in the login interface --> Click "Log in" --> Enter the reset password
interface and click "Skip",log in and enter the Grafana homeinterface.
Figure8.1-1 Grafana Path
(3)Enter the Grafana website in the URL box of the browser: ip:3000-->Fill in the user
name and password-->Click "Log in"-->Enter the reset password interface and click
"Skip" to log in and enter the Grafana home interface.
101
Figure8.1-2 Grafana login Interface
Figure8.1-3 Grafana Home Interface
Figure8.1-4-1 Import The Basic-Info Template
102
Figure8.1-4-2 Upload basic-info.json Template
Figure8.1-4-3 Import The basic-info.json Template
PS:The basic_info.json file is provided by the IMS group when the version is
released,and is placed in the specified version collection directory
103
8.2 Manage
Description:Enter the KPI interface for selecting each NF of Grafana
Figure8.2-1 Manage Path
Figure8.2-2 Manage interface
8.2.1 Manage-IMS
Path:Manage-->IMS
104
Figure8.2.1-1 IMS Path
interface description:
1:Last 6 hours:Statistics for the last 6 hours
2:5s:The interface refreshes automatically every 5s
3:Real-time monitoring data statistics
4:Statistics in the last 6 hours
Figure8.2.1-2 IMS Path
8.2.1.1 PCSCF
Path:Manage-->IMS-->PCSCF
Description:Statistics on calls initiated by the UE
105
Figure8.2.1.1-1 PCSCF Statistics
8.2.1.1.1 MO Call Rate
Path:Manage-->IMS-->PCSCF-->MO Call Rate
Description:Statistics on the call completion rate and call answer rate of the P-CSCF
on the calling side
Figure8.2.1.2.1-1 MO Call Rate Statistical Graph
Statistical parameters and descriptions:
Statistical parameters
Descriptions
mo_connect_rate
When the P-CSCF on the MO side receives the
180/200 response from the called party,it
means that the session is connected.
mo_answer_rate
When the P-CSCF on the MO side receives a
200 (INVITE) response from the called party,it
means that the session is answered.
mo_avg_call_delay
Collect statistics on the average connection
duration of all sessions processed by the
P-CSCF on the MO side for a period of time in
the call service
106
8.2.1.1.2 MT Call Rate
Path:Manage-->IMS-->PCSCF-->MT Call Rate
Description:Statistics on the call completion rate and call answer rate of the P-CSCF
on the called side
Figure8.2.1.1.2-1 MT Call Rate statistical graph
Statistical parameters and descriptions:
Statistical parameters
Descriptions
mt_connect_rate
When the P-CSCF on the MT side receives the
180/200 response from the called party,it
means that the session is connected.
mt_answer_rate
When the P-CSCF on the MT side receives a
200 (INVITE) response from the called party,it
means the session is answered
mt_avg_call_delay
Statistics on the average connection duration
of all sessions processed by the P-CSCF on the
MT side for a period of time in the call service
8.2.1.1.3 Call Drop Rate
Path:Manage-->IMS-->PCSCF-->Call Drop Rate
Description:Statistics of the ratio of the number of session interruptions to the
number of sessions answered due to abnormal disconnection after VoLTE calls are
answered
107
Figure8.2.1.1.3-1 Call Drop Rate statistical graph
Statistical parameters and descriptions:
Statistical parameters
Descriptions
Call_drop_rate
After the VoLTE call is answered,the ratio of the
number of session interruptions caused by
abnormal disconnection to the number of
sessions answered
8.2.1.1.4 Call Duration
Path:Manage-->IMS-->PCSCF-->Call Duration
Description:Statistics on the average call duration of all sessions processed by the
P-CSCF for a period of time in VoLTE call answering.
Figure8.2.1.1.4-1 Call Duration statistical graph
Statistical parameters and descriptions:
Statistical parameters
Descriptions
mo_call_duration
Statistics on the average call duration of all
sessions processed by the P-CSCF on the MO
side for a period of time in the call service
mt_call_duration
Statistics on the average call duration of all
sessions processed by the P-CSCF on the MT
side for a period of time in the call service
8.2.1.1.5 Call Traffic
Path:Manage-->IMS-->PCSCF-->Call Traffic
Description:Count the times of UE registration,de-registration and call times
108
Figure 8.2.1.1.5-1 Call Traffic statistical graph
Statistical parameters and descriptions:
Statistical parameters
Descriptions
init_reg
Count the number of times that the PCSCF
receives the initial registration request initiated
by the UE under a certain access network
during the registration process
re_reg
Count the number of times the PCSCF receives
re-registration requests from UEs under a
certain
access
network
during
the
measurement period
de_reg
Count the number of times the PCSCF receives
a de-registration request from a UE under a
certain access network during the registration
process
trying_call
Count the number of times the PCSCF receives
the initial IVITE request from the calling side in
the call service
answer_call
In the call service,count the number of times
that the calling side user initiates a session
request and the session is connected
8.2.1.2 SCSCF
Path:Manage-->IMS-->SCSCF
Description:UE-initiated registration and call related statistics
109
Figure8.2.1.2-1 SCSCF statistics
8.2.1.2.1 Register Rate
Path:Manage-->IMS-->SCSCF-->Register Rate
Description:Statistics on the number of successful S-CSCF registrations
Figure8.2.1.2.1-1 Register Rate Statistical Graph
Statistical parameters and descriptions:
Statistical parameters
Descriptions
init_reg_success
The number of times the S-CSCF sends a
successful response to the UE's initial
registration request during the measurement
period
re_reg_success
During the measurement period,the number of
times that the S-CSCF returns a 200 OK
message to the UE after receiving the
re-registration request from the UE.
authAKA_success
In
the
process
of
user
registration,re-registration
and
cancellation,statistics have issued 401 test
110
challenges after the S-CSCF receives the
REGISTER request from UE using the AKA
verification method during the measurement
cycle.
8.2.1.2.2 Registered IMPUs
Path:Manage-->IMS-->SCSCF-->Register IMPUs
Description:Statistics on the number of successful S-CSCF registrations
Figure8.2.1.2.2-1 MO Call Rate Statistical Graph
Statistical parameters and descriptions:
Statistical parameters
Descriptions
reg_total
During the measurement period,the number of
registered users of the S-CSCF
8.2.1.2.3 MO Call Rate
Path:Manage-->IMS-->SCSCF-->MO Call Rate
Description:The response rate of the S-CSCF on the calling side, and cancel the rate
statistics of invite
Figure8.2.1.2.3-1 MO Call Rate statistical graph
Statistical parameters and descriptions:
Statistical parameters
Descriptions
111
mo_answer_rate
mo_early_cancel_rate
During the measurement period,the S-CSCF on
the MO side receives the session initial request
and responds with the response rate of the
session
During the measurement period,the ratio of
mo_ringring_cancel_rate
the total number of CANCEL requests received
from the calling side after receiving the called
INVITE 180 on the MO side of the S-CSCF
network element to the total number of times
INVITE 180 received by the MT side of the
S-CSCF network element
During the measurement period,the ratio of
the total number of CANCEL requests received
from the calling side after receiving the called
INVITE 180 on the MO side of the S-CSCF
network element to the total number of times
INVITE 180 received by the MT side of the
S-CSCF network element
8.2.1.2.4 MT Call Rate
Path:Manage-->IMS-->SCSCF-->MT Call Rate
Description:The response rate of the S-CSCF on the called side after receiving the
Invite,and the rate of canceling the Invite
Figure 8.2.1.2.4-1 MO Call Rate Statistical Graph
Statistical parameters and descriptions:
Statistical parameters
Descriptions
mt_answer_rate
During the measurement period,the ratio of
the number of times that the S-CSCF on the MT
side receives the session initial request and the
session responds
mt_early_cancel_rate
During the measurement period,the ratio of
the total number of CANCEL requests received
112
from the calling side without receiving the
called INVITE180 on the MT side of the S-CSCF
network element to the total number of times
INVITE 180 received by the MT side of the
S-CSCF network element
mt_ringring_cancel_rate
During the measurement period,the ratio of
the total number of CANCEL requests received
from the calling side after receiving the called
INVITE180 on the MT side of the S-CSCF
network element to the total number of times
the MT side of the S-CSCF network element
received INVITE 180
8.2.1.2.5 SMS
Path:Manage-->IMS-->SCSCF-->SMS
Description:Statistics on the number of SMS sent and received
Figure 8.2.1.2.5-1 SMS Statistical Graph
Statistical parameters and descriptions:
Statistical parameters
Descriptions
mo_sms
Statistics on the number of texting parties in a
measurement period
mt_sms
Statistics on the number of texting parties in a
measurement period
113
9 Call Trace(To be developed)
10 Other System Functions
10.1 License Information Management
10.1.1 View License Information
Path:System-->License Management-->License Server Information
Figure10.1.1-1 View License Information
10.1.2 Import License File
Path:System-->License Management-->License Server Information
Step:Click "Browse" to locate the path of the license file --> Click "Upload" --> Click
"OK",if the file is valid,the Status will display a green "valid" value,if the file is
invalid,the Status will display as Red "in-valid" value.
114
Figure10.1.2-1 Import License File
10.1.3 Get NFs License Status
Path:System -->License Management -->NFs License Status
10.1.3-1 Get NFs License Status
10.2 Web Information Management
Path:System--Web Info->Website Name Configuration
10.2.1 View the Web Information
Figure10.2.1-1 View the Web Information
10.2.2 Update Web Info
Path:System--Web Info->Website Name Configuration
Step:Enter new names for New Site Name and New Company Name and click update
115
Figure10.2.2-1 Update Web Info
10.2.3 Update Logo
Path:System--Web Info->Company Logo Update
Step:Select 'Select File' in Company Logo Update,select the required company
LogoFigure from the local area and upload it to Web Info,and then click
upload it to the network management.
Figure10.2.3-1 Update Logo
116
to
10.3 Status Query(To be developed)
10.4 Quick Modification
10.4.1 Quickly Modify PLMN
Path:System-->Quick Modification>PLMN
Description:The PLMN of each network element can be modified.
Step:Enter the specific PLMN and click the "Add" button to add a PLMN.If you click
the trash can button,the corresponding PLMN will be deleted.
Figure10.4.1-1 Quickly modify PLMN
10.4.2 Quickly Modify IP
Path:System-->Quick Modification>PLMN
Description:The physical IP and service IP of each NF can be modified.
Step:Follow the steps to modify the IP,and the IP modification will take effect after
the fourth step "apply".
117
Figure10.4.2 Quickly Modify IP
118
11 FAQ
12 Conclusion
This manual is suitable for users and field engineers.
119
Download