Professional Documents
Culture Documents
Operation Guide
Version: A
Code: MN000002229
Fax:
Website: http://www.fiberhomegroup.com
Legal Notice
Preface
Related Documentation
Version
Intended Readers
This manual is intended for the following readers:
u
Commissioning engineers
II
SDH theory
WDM theory
PTN theory
OTN theory
Ethernet technology
Conventions
Terminology Conventions
Terminology
Convention
FiberHome e-Fim OTNM2000 Element Management
OTNM2000
System
FiberHome e-Fim OTNM2100 Network Management
OTNM2100
System
Symbol Conventions
Symbol
Convention
Note
Description
Important features or operation
guide.
Possible injury to persons or
Caution
Warning
Jump
Cascading menu
Bidirectional service
Unidirectional service
III
VI
VII
VIII
Contents
Preface...................................................................................................................I
Related Documentation ...................................................................................I
Version ...........................................................................................................II
Intended Readers ...........................................................................................II
Conventions ..................................................................................................III
Operation Safety Rules ......................................................................................... V
1
1.2
1.1.2
1.2.2
2.2
2.3
Login / Logout................................................................................2-2
2.1.1
2.1.2
2.2.2
Main Menu.......................................................................2-5
2.2.3
Shortcut Icons................................................................2-19
2.2.4
2.2.5
Object Tree....................................................................2-23
2.2.6
2.2.7
Task Panel.....................................................................2-26
2.2.8
Common Operations....................................................................2-28
2.3.1
2.3.2
2.4
2.5
2.5.2
2.6
2.7
2.8
Basic Concepts..............................................................................3-2
3.2
3.2.2
3.2.3
3.2.4
3.2.5
3.3
3.4
3.5
3.6
3.5.1
3.5.2
3.5.3
3.5.4
3.5.5
3.6.2
3.6.3
3.6.4
3.7
3.8
4.2
4.2.1
4.2.2
4.2.3
4.3
4.4
4.5
4.6
4.7
4.4.1
4.4.2
4.4.3
Adding an NE ................................................................4-15
4.5.2
4.5.3
4.5.4
Moving an NE ................................................................4-18
4.5.5
Deleting an NE ..............................................................4-19
Adding a Card................................................................4-20
4.6.2
4.6.3
4.6.4
Editing a Card................................................................4-24
4.6.5
Deleting a Card..............................................................4-25
4.7.2
Topology Management.................................................................................5-1
5.1
5.2
5.3
5.2.1
5.2.2
5.3.2
5.3.3
5.3.4
5.4
5.5
5.6
5.7
5.3.5
5.3.6
5.3.7
5.3.8
Layer-based Topology..................................................................5-14
5.4.1
5.4.2
5.4.3
5.5.2
5.6.2
5.6.3
5.6.4
5.7.2
5.7.3
5.7.4
5.7.5
Time Calibration.............................................................................6-2
6.2
6.3
6.4
6.2.1
6.2.2
6.3.2
Device Configuration......................................................................6-8
6.4.1
6.4.2
6.5
6.6
6.7
6.8
6.9
6.6.1
6.6.2
6.7.2
6.7.3
6.7.4
6.7.5
6.8.2
6.8.3
6.8.4
6.8.5
NE Communication......................................................................6-34
6.9.1
6.9.2
SSH ..............................................................................6-35
6.9.3
6.10
6.11
6.12
PTN/IPRAN ...................................................................................7-4
7.1.1
Tunnel .............................................................................7-4
7.1.2
PW ................................................................................7-15
7.1.3
7.1.4
7.1.5
7.1.6
Group Service................................................................7-40
7.1.7
7.1.8
7.1.9
POTN/PE-OTN ............................................................................7-51
7.2.1
7.2.2
7.2.3
7.2.4
7.2.5
7.2.6
7.2.7
Tunnel ...........................................................................7-66
7.2.8
PW ................................................................................7-66
7.2.9
SDH/MSTP..................................................................................7-68
7.3.1
Circuit............................................................................7-68
7.3.2
7.3.3
7.4
7.5
Routing Template.........................................................................7-85
7.6
7.6.2
7.6.3
7.6.4
7.6.5
7.6.6
7.6.7
7.6.8
7.6.9
7.7.2
7.7.3
7.7.4
7.7.5
7.8
7.9
Options...................................................................................... 7-115
7.10
7.11
7.12
7.13
7.14
Full Download............................................................................7-124
7.14.1 Saving Cross-connect Data (NE)..................................7-124
7.14.2 Delivering the Cross-connect Data (NE) .......................7-126
7.14.3 Saving SDH NE Cross-connect Data............................7-128
8.2
8.3
Viewing Alarms............................................................................8-10
8.4
8.5
8.3.1
8.3.2
8.3.3
8.3.4
8.4.2
8.4.3
8.5.2
8.5.3
Isolating Alarm...............................................................8-29
8.5.4
8.5.5
8.5.6
8.5.7
Alarm Statistics..............................................................8-33
8.5.8
8.5.9
8.7
8.7.2
8.7.3
8.7.4
8.7.5
8.7.6
8.8
8.9
8.10
8.11
Performance Management...........................................................................9-1
9.1
9.2
9.3
9.4
Viewing Performance.....................................................................9-5
9.4.1
9.4.2
9.5
9.6
Managing Performance................................................................9-12
9.6.1
9.6.2
9.6.3
9.6.4
9.6.5
9.6.6
9.6.7
9.6.8
9.6.9
9.8
9.7.2
9.7.3
9.8.2
9.8.3
9.8.4
9.9
9.10
10 Log Management.......................................................................................10-1
10.1
10.2
10.3
10.4
10.5
10.6
10.7
10.8
11 Statistical Management..............................................................................11-1
11.1
11.2
11.3
PM Statistics.............................................................................. 11-45
11.4.1 Managing Bandwidth Usage Statistics.......................... 11-45
11.4.2 Managing 15-minute Traffic Statistics ........................... 11-49
11.4.3 Managing 24-hour Traffic Statistics............................... 11-53
11.4.4 Managing Device Environment Parameter Statistics..... 11-57
11.4.5 Managing Optical Power Performance Statistics........... 11-61
11.4.6 Gathering Statistics of NE CPU and Memory Usage ..... 11-64
11.5
11.6
IP Statistics................................................................................ 11-70
11.6.1 Statistics of Management Interface IP Addresses ......... 11-71
11.6.2 Statistics of Logical Interface IP Addresses................... 11-72
11.7
11.8
11.9
12.2
12.3
Appendix B
Appendix C
Abbreviations.......................................................................... C-1
Figures
Figure 1-1
Figure 1-2
Figure 1-3
Figure 2-1
Figure 2-2
Figure 2-3
Figure 2-4
Figure 2-5
Figure 3-1
Figure 3-2
Figure 5-1
Figure 5-2
Figure 5-3
Figure 5-4
Figure 5-5
Figure 5-6
Figure 5-7
Figure 5-8
Figure 5-9
Collapsing Subnet........................................................................5-27
Figure 6-2
Figure 6-3
Figure 6-4
Figure 6-5
Figure 6-6
Figure 6-7
Figure 6-8
Figure 6-9
Figure 7-2
Figure 7-3
Figure 7-4
Figure 7-5
Figure 7-6
Figure 7-7
Figure 7-8
Figure 7-9
Figure 8-2
Figure 8-3
Figure 8-4
Figure 8-5
Figure 8-6
Figure 8-7
Figure 8-8
Figure 8-9
Figure 9-2
Figure 9-3
Figure 9-4
Figure 9-5
Figure 9-6
Figure 9-7
Figure 9-8
Figure 9-9
Figure 9-10 Viewing the Performance History Statistical and Analytical Report 9-18
Figure 9-11
Figure 9-12 The Custom Reasons and Measures Dialog Box .......................9-21
Figure 9-13 Checking All the Performance Help Information............................9-21
Figure 9-14 The PM Backup Management Tab..............................................9-25
Figure 9-15 File Result List .............................................................................9-26
Figure 9-16 The PM-REPORT Dialog Box ......................................................9-27
Figure 9-17 Setting the Card Performance Filter..............................................9-28
Figure 9-18 The Filter Settings Window - Performance History ......................9-33
Figure 9-19 Viewing History Performance Filter...............................................9-34
Figure 9-20 Viewing the Optical Power Statistics.............................................9-36
Figure 9-21 Setting the Performance Query Condition.....................................9-39
Figure 9-22 Viewing the Port Traffic ................................................................9-41
Figure 11-2
Figure 11-3
Figure 11-4
Figure 11-5
Figure 11-6
Figure 11-7
The Add Dialog Box - NE CPU and Memory Usage Statistics..... 11-65
Figure 11-8
Figure 11-9
Tables
Table 2-1
Table 2-2
Table 2-3
Table 2-4
Table 2-5
Table 2-6
Table 2-7
Table 2-8
Table 2-9
Table 2-10
Table 2-11
Table 2-12
Table 2-13
Table 2-14
Table 2-15
Table 2-16
Table 2-17
Table 3-1
Table 3-2
Table 3-3
Table 3-4
Table 3-5
Creating Users.............................................................................3-35
Table 3-6
Table 3-7
Table 4-1
NE IP Address Settings................................................................4-30
Table 5-1
Table 5-2
Table 6-1
Table 6-2
Table 6-3
Table 6-4
Table 6-5
Table 6-6
Table 6-7
Table 6-8
Table 6-9
Table 6-10
Table 6-11
Table 7-1
Table 7-2
Table 7-3
Table 7-4
Table 7-5
Table 7-6
Table 7-7
Table 7-8
Table 7-9
Table 7-10
Table 7-11
Table 7-12
Table 7-13
Table 7-14
Table 7-15
Table 7-16
Table 7-17
Table 7-18
Table 7-19
Table 7-20
Table 7-21
Table 7-22
Table 7-23
Table 7-24
Table 8-1
Table 8-2
Table 8-3
Table 8-4
Table 8-5
Table 8-6
Table 8-7
Table 8-8
Table 8-9
Table 8-10
Table 8-11
Table 8-12
Table 8-13
Table 9-1
Table 9-2
Table 9-3
Table 9-4
Table 9-5
Table 9-6
Table 9-7
Table 10-1
Table 11-1
Table 11-2
Table 11-3
Table 11-4
Description for the Items in the Parameter Setting of the 15min Traffic
Statistics.................................................................................... 11-50
Table 11-5
Table 11-6
Table 11-7
Table 11-8
Table 11-9
Description for the Items in the Parameter Setting of the VOA Status
Statistics.................................................................................... 11-69
Table 12-1
Table 12-2
Table A-1
Preparatory Knowledge
The OTNM2000 Element Management System (the OTNM2000 for short) performs
effective and unified management of various access equipment offered by
FiberHome to facilitate users operations and reduce the maintenance costs of the
equipment. Below are detailed contents.
Management System
Numbering Hierarchy
Version: A
1-1
1.1
Management System
The following introduces the management model and management structure of the
OTNM2000.
1.1.1
Management Model
Practically, the network management uses a multi-layered distributed structure and
each layer has the management capability of preset level. The most elementary
management model includes three units: manager (M), agent (A) and managed
object (MO).
u
Manager:
Note:
In the OTNM2000, there are usually two "M"s on one module, which are
"Ma" (active manager) and "Mb" (standby manager) respectively. Under
normal occasion, "Ma" performs as the manager; when "Ma" fails, "Mb"
replaces "Ma" to be the manager.
u
Figure 1-1 shows the relationship among the manager, agent and managed object.
1-2
Version: A
1 Preparatory Knowledge
Figure 1-1
Interrelationship between the Manager, the Agent and the Managed Object
The one-to-many relationship between the manager and the agent means that one
manager is able to exchange information with many agents.
1.1.2
Management Structure
The OTNM2000 uses layered management mode to achieve the management of
multiple elements with one network management system, as shown in Figure 1-2.
Version: A
1-3
Figure 1-2
The OTNM2000 is connected to the equipments EMU via F interface, and manages
all EMUs through monitoring path. An EMU is able to serve as both the manager
and the agent. It communicates with BCT (Board Control Terminal) of each card via
internal bus. The communications include transmitting management operation
commands and receiving notifications. BCT (Board Control Terminal), as the
managed object, receives and implements the administrating commands from EMU,
and informs EMU of its activities.
Note:
BCT (Board Control Terminal) is a subcard on the card for managing the
card. The BCT collects the alarm and performance information of the card
and transmits them to the EMU. Simultaneously, the BCT operates the
configuration management of the card according to the commands from
EMU.
The OTNM2000 performs real-time monitor to the NE via both polling and active
report modes.
u
Polling: Usually, the NE-level manager calls each NE in the part in turn via
polling mode, collects and stores the alarm and performance of them.
1-4
Version: A
1 Preparatory Knowledge
Active report: If one alarm occurs in some NE of the part, it will be reported to
the NE-Level manager immediately. To view the information, users should send
a request to the NE-level manager, who will show users the collected
information via GUI immediately.
1.2
Numbering Hierarchy
In the OTNM2000, managed objects are divided into logical part and physical part.
Using the unique numbering system can correctly locate each managed object in
the network, as shown in Figure 1-3.
Figure 1-3
Numbering Hierarchy
Physical part: The actual physical structure of the equipment, including bureau,
rack, shelf, slot and card.
Logical part: The concepts including project, part, NE and group that facilitates
EMS management of equipment.
Both of these two parts are independent of each other but cannot be separated.
Version: A
1-5
1.2.1
Physical Part
The bureau number, rack number, shelf number and slot number compose the
physical address.
u
Rack: Racks in one bureau are numbered uniformly. The number is unique.
Shelf: Shelves in one rack are numbered uniformly. The number is unique.
Card: The address of a card and group number compose the unique
identification (ID number) for the card within NE. The address of the card is
unique within a group.
1.2.2
Logical Part
The project number, part number, NE number, group number and slot number
compose the logical address.
u
Note:
In one part, the quantity of NEs should be no more than 32.
u
Group: Group number and slot address compose the only identity (ID number)
for the card within NE. In one NE, the group number is unique.
1-6
Version: A
Version: A
2-1
2.1
Login / Logout
The following introduces how to log into or log out of the OTNM2000 client end.
2.1.1
Prerequisite
u
The client IP address is included in the access control list of the OTNM2000
system settings. See Setting the Access Control List for the settings of access
control list.
You have been assigned with a valid user account (username and password).
1.
2.
Procedure
If the server IP address is not set, follow the steps below to add the server IP
address.
1.
Click
Parameter
IP Address
Name
2-2
Description
It is required. Sets the IP address corresponding to the
network card of the OTNM2000 server database.
Sets the name of the OTNM2000 server, used to
differentiating from other OTNM2000 servers.
Version: A
Parameter
Description
Configures this item according to the actual situation. If the
NAT gateway
Server Extranet IP
3.
In the Server configuration dialog box, select the server in the list and
click Connect Test.
4.
5.
3.
Click
2.
In the displayed Client NAT configuration dialog box, set the client
Version: A
Type the username and password in the Login dialog box and click OK.
2-3
Note:
u
2.1.2
Prerequisite
The OTNM2000 runs normally.
Procedure
1.
2.2
GUI Introduction
The following introduces the layout and functions of the OTNM2000 GUI.
2.2.1
System GUI
The main GUI of the OTNM2000 is composed of the object tree pane, toolbar, menu
bar, status bar, etc, as shown in Figure 2-1.
2-4
Version: A
Figure 2-1
2.2.2
(3) Toolbar
Main Menu
The following introduces the functions of the main menu and the sub menus of the
OTNM2000.
Version: A
2-5
2.2.2.1
System
The submenus under the System main menu are described in Table 2-1.
Table 2-1
Menu Option
Object Searching
Query
Condition
Option
Searches for the desired object by setting the search condition. The
search objects include NEs, network block and shelves.
Sets the parameters related to alarm / performance search, including
setting the alarm / performance query conditions and setting conditions
before querying the alarm /performance history data.
Automatic
Function
Sound
Option
enable the sound, sound play mode, play time and play priority.
Opens the Save Settings tab to set the data save policy.
Save Data
Network Status
Monitor
Lock the EMS
2.2.2.2
Description
Opens the Network Status Monitor tab to monitor the network status.
Locks the current operating and you cannot perform any operations on
the GUI.
Change Password
Connect to MSMP
Service
Start Devcfg.exe
Log out
Logs out of the current OTNM2000 GUI and returns to the login GUI.
Exit
View
The submenus under the View main menu are described in Table 2-2.
Table 2-2
Menu Option
Topo Layer Management
2-6
Description
Opens the Topo Layer Management tab to set the layer-based
topology.
Topo
Bureau
Display
Name
topology.
Version: A
Table 2-2
Menu Option
IP Address
topology.
Sets whether to display the logical address of the NE in the main
Address
topology.
Connection
Number
main topology.
Sets whether to display the dialing switch of the NE in the main
topology.
Show link
remark
topology.
Show NE in
the network
block only
NE Icon
Line Property
Setting
Logic
Switch
Topo
Description
Regional
Sets the size of the main topology area, including the width and
Size
height.
Background
image
Use default
background
Logical Tree
Operational Tree
Browse Tree
Command Manager
DCN Topo
Version: A
2-7
2.2.2.3
Business Management
The submenus under the Business Management main menu are described in
Table 2-3.
Table 2-3
Menu Option
Description
Queries and manages the tunnel data configured in the
Tunnel
OTNM2000.
Queries and manages the PW data configured in the
PW
OTNM2000.
Queries and manages the L2VPN data configured in the
L2VPN Service
OTNM2000.
Queries and manages the L3VPN data configured in the
L3VPN Service
OTNM2000.
Queries and manages the group service data configured in
Group Service
the OTNM2000.
Queries and manages the MPLS ring data configured in
MPLS Ring
the OTNM2000.
Queries and manages the VRRP data configured in the
VRRP
OTNM2000.
Queries and manages the protection pair data configured
Protection Pair
in the OTNM2000.
Queries and manages the OTN circuit data configured in
OTN Circuit
the OTNM2000.
Queries and manages the OTN ring data configured in the
OTN Ring
OTNM2000.
Queries and manages the OTN NE structure data
OTN NE graph
SDH/MSTP Circuit
the OTNM2000.
Queries and manages the SDH/MSTP ring data
SDH/MSTP Ring
management
2-8
VCG Channel
Broken data
Broken PW
Broken Service
Data
OTNM2000.
Version: A
Table 2-3
Menu Option
Description
Broken MPLS
Rings
OTNM2000.
Broken
Protection
Pairs
Broken OTN
Broken OTN
Rings
OTNM2000.
Broken
SDH/MSTP
Circuits
Broken
SDH/MSTP
Rings
Full Download
Save Cross-
connect (NE)
database.
Deliver Cross-
connect (NE)
database.
Save SDH NE
Cross-connect
Increment
Import
Datasource
Merge Config
Clear Config
Data
Synchronize
circuit data and report the circuits onto the GUI. The GUI
Backup/Restore
Switch to
Offline Mode
Backup to File
Version: A
Table 2-3
Menu Option
Description
Recovery From
File
Downloaded
Data to the
Client End
2.2.2.4
Uploaded Data
to the Server
offline mode.
Business Configuration
The submenus under the Business Configuration main menu are described in
Table 2-4.
Table 2-4
Menu Option
Description
Tunnel
PW
L2VPN Service
L3VPN Service
ATM Service
Group Service
PTN/IPRAN
Ring protection
IPRAN VRRP
Config
Quickly Create
Tunnel
Quickly Create
Ethernet
Service
Optical
Channel
POTN/PE-OTN
ODUk Channel
Client Service
Channel
2-10
Version: A
Table 2-4
Menu Option
Description
ODUk
Protection
Group
OCh Ring
Protection
ODUk Ring
Protection
Tunnel
PW
L2VPN Service
L3VPN Service
Group Service
Ring Protection
IPRAN VRRP
Config
SDH/MSTP
Circuit
VCG Channel
Ring protection
PTN NE Global
Settings
Global VS
OAM Enable
Global LM
Frame Enable
Merge OTN
NEs
Service Global
OTN
Settings
wavelength
setup
OTN NE
Optical Link
OTN
OTUk/ODUk
Overhead
OTN WSS
group
Version: A
2-11
Table 2-4
Menu Option
Description
OTN OPM
Wavelength
Monitor
OTN SAPU
Protection
SPC Resource
Management
(SDH/PTN)
SPC Resource
Management
(OTN/POTS)
ASON
Resource
Management
Synchronize
SPC Port Data
Synchronize
SPC Resource
Synchronize
SPC Tunnels
Display Route
Options
2-12
Version: A
2.2.2.5
Configuration
The submenus under the Configuration main menu are described in Table 2-5.
Table 2-5
Menu Option
Manager Service
config
GNE Configuration
NE IP Remote Config
Downloading
Management Config
Download Structure
Config
Download Equipment
Config
Check Config
Network Block
Management Config
Analysis
Network Block
Structure Config
Analysis
Optical Cable Router
Setting
Version: A
Description
Reads the structure configuration data of the network block from the
device and check whether the configuration is correct.
Sets the information of the same optical cable route. Check whether
the active and standby circuits are in the same optical cable route so
as to ensure the availability of the standby circuit.
Sets the scheduled synchronization task of card configuration to
synchronize the configuration data at the device side to the
OTNM2000.
Sets the automatic backup task of DCG files to back up the
configuration file to the specified directory.
2-13
2.2.2.6
Alarm
The submenus under the Alarm main menu are described in Table 2-6.
Table 2-6
Menu Option
Description
Current Alarm
Alarm History
Management
House-Keeping Alarm
2-14
Version: A
2.2.2.7
Performance
The submenus under the Performance main menu are described in Table 2-7.
Table 2-7
Menu Option
Description
Current Performance
History Performance
Flow Monitor
2.2.2.8
Statistics
The submenus under the Statistics main menu are described in Table 2-8.
Table 2-8
Menu Option
Description
Link Resource
Usage
Circuit Statistics on
Link
NE-Tributary-Port
Service Data
Usage
Query Report
Tributary-Port Circuit
Statistics
Version: A
NE Cross-connect
Capacity
2-15
Table 2-8
Menu Option
Description
NE Port Usage
Statistics
NE Port Protection
LSP
NE VPWS Statistics
NE VPLS Statistics
PTN Service/Label
Statistics
point
ID
Used Label
Information
L2VPN Report
OAM&BFD Enable
Report
OTN Station
Capacity
OTN Wavelength
Resource
Wavelength and
Channel
Comparison Report
Protection
Information
NE Statistics
2-16
Version: A
Table 2-8
Menu Option
Description
Gathers statistics of all the cards in the entire network,
including card name, card type, card address and
associated NE. It supports filtering cards, exporting
Board Statistics
SN Statistics
entire network.
Management
Statistics
Manage Port IP
Statistics
IP Statistics
Version: A
Logic Port IP
Statistics
2-17
2.2.2.9
Security
The submenus under the Security main menu are described in Table 2-9.
Table 2-9
Menu Option
Description
Manages the users, user groups, object groups and operation
User Management
EMS_f Management
2.2.2.10
Help
The submenus under the Help main menu are described in Table 2-10.
Table 2-10
2-18
Menu Option
Description
OTNM2000 Help
Help
performance.
About
Version: A
2.2.3
Shortcut Icons
The following introduces the commonly used shortcut icons.
Name
Description
Lock the
EMS
Alarm
Sound
(alarm
sound is
turned on)
Alarm
Sound
(alarm
sound is
turned off)
Alarm
Flickering
Standard
(alarm
flickering is
turned on)
Turns on or off the alarm flickering.
Alarm
Flickering
(alarm
flickering is
turned off)
Object
Searching
in the topology.
View Report
Alarm
Command
Manager
Version: A
2-19
Table 2-11
Area
Name
Description
Dynamically displays the information of interruption
alarms. The first digit indicates the total number of
Interruption
Alarm
Critical
alarm
Current
Alarm
Major alarm
Panel
Minor alarm
Prompt
Alarm
Normal
Business
Service
Data
Amount
Statistics
Object
Statistics
To-beactivated
Business
Object
statistics window.
Statistics
2-20
Version: A
Table 2-11
Area
Name
Description
To-bedeleted
Business
Object
statistics window.
Statistics
Broken
Business
Object
Statistics
Selection
Mode
topological object.
Drag Mode
Airscape
Enable Edit
Legend
Version: A
Description
Zoom In
Zoom Out
Revert
Scaling Ratio
2-21
Name
Description
Opens the corresponding filter dialog box to set the filter
Filter
2.2.4
Refresh
Sort
Select
Column
Export Report
Description
F1
Shift+F1
Ctrl+F
Ctrl+Shift+L
Ctrl+L
2-22
Open the Quick search dialog box to locate the object in the
topograph.
Lock the current operating GUI manually.
Open the Topo Layer Management tab to set layer-based
topology.
Ctrl+M
Ctrl+H
Ctrl+U
Ctrl+P
Ctrl+W
Ctrl+K
Add a connection.
Ctrl+Insert
Shift+Insert
Version: A
2.2.5
Object Tree
The object tree is located at the upper left part of the main screen. It supports the
following functions:
u
Provides the alarm status LEDs for users. Via the object tree pane or topology
view, users can focus on the alarm and status information of the target NE or
NEs quickly and conveniently.
Version: A
2-23
The object tree pane is composed of three tabs, the Logical Tree pane, the
Operational Tree pane and the Browse Tree pane. The panes are described in
Table 2-14.
2-24
Version: A
Table 2-14
Pane
Description
Version: A
2-25
2.2.6
Display Pane
The display pane is located in the middle of the main GUI to display the current
operation tab of the OTNM2000. For example, Figure 2-2 shows the Current Alarm
tab. The communication between users and the OTNM2000 is mainly achieved via
this pane.
Figure 2-2
2.2.7
Display Pane
Task Panel
The Task panel is located on the right side of the main screen, which displays the
operation commands that can be operated on the selected object. The operation
commands displayed on the Task panel vary with the object selected. For example:
The Task panel of the XSJ2 card is as shown in Figure 2-3.
2-26
Version: A
Figure 2-3
2.2.8
Status Bar
The status bar is located at the bottom of the main screen. It shows the status
information of the current login user and the system.
Table 2-15
Icon
Version: A
2-27
2.3
Common Operations
The following introduces the commonly used operation in the OTNM2000.
2.3.1
Procedure
u
Right-click the title bar and select the columns to be displayed from the shortcut
menu. The columns not selected will not appear in the window.
2-28
Version: A
box. You can select the columns to be displayed in the title bar and the display
sequence.
Version: A
2-29
2.3.2
Procedure
1.
Select data in a table in the OTNM2000, right-click in a blank area and select
Copy to Clipboard from the shortcut menu.
2-30
Version: A
2.
Switch to another program, for example, Notepad and press down Ctrl+V. The
selected data are pasted.
2.4
Procedure
1.
Select the path in Table 2-16 to bring up the Command Manager window, as
shown in Figure 2-4.
Table 2-16
Operation
Viewing the
command
ManagementCommand Manager.
manager
Click
Version: A
2-31
Figure 2-4
2.
Users can check whether your management operations are successful in the
command manger.
2.5
2.5.1
Procedure
1.
client.
2-32
Version: A
2.5.2
Prerequisite
The OTNM2000 has been locked.
Procedure
1.
Enter the password into the dialog box as shown in Figure 2-5.
Figure 2-5
Note:
The OTNM2000 will automatically exit after users enter incorrect
passwords for three times successively.
2.
Version: A
2-33
2.6
Procedure
1.
Select the path in Table 2-17 to open the Network Status Monitor tab.
The Network Status Monitor tab has six sub-tabs: Event, Manager, Device,
Synchronize and Automatic NE Discovery.
Table 2-17
Operation
Access Method
Select SystemNetwork Status Monitor in the main menu.
Network status
monitor
2.
Note:
The Automatic NE Discovery sub-tab is not available currently.
2-34
Version: A
2.7
Procedure
2.8
1.
2.
View the version information of the OTNM2000 in the dialog box that appears.
Procedure
1.
Select SystemExit in the main menu and click OK in the displayed alert box.
2.
Type the username and password in the displayed Login dialog box and click
OK.
Version: A
2-35
2-36
Version: A
Security Management
The security management is used to prevent illegal operation of users and
guarantee the network data security. The security management includes user
management, user session management and EMS_f authority management.
Basic Concepts
Security Policy Management
Scenarios for Authority and Domain Division
Authorization Planning
Managing System Users
Managing User Sessions
Managing the EMS_f Authority
Network Management Tool
Version: A
3-1
3.1
Basic Concepts
The administrative objects of authorization and domain division include user groups,
operation groups, object groups and users. Understanding the concepts related to
the authorization and domain division helps plan and allocate user authorities.
User Group
A user group is a set of OTNM2000 users with the same management authorities.
For the users to be granted with the same authorities, you can add them into a same
user group and authorize the user group to make every user in the user group have
the same authorities, quickly allocating the authorities to users.
The OTNM2000 provides the following default user groups, among which
Administrators, Security Administrator Group, Devcfg, Eot Group and NMS Group
cannot be deleted and modified.
u
Administrators: This user group has the management domain over assembly of
objects and operation authorities over assembly of application operations.
Note:
The Assembly of Application Operations does not include the operation
authorities related to the security management.
u
Security Administrator Group: This user group has the operation authorities
related to the security management, including user management and online
user management.
Operator Group: This user group has the management domain over assembly
of objects and operation authorities over assembly of application operators by
default.
Maintainer Group: This user group has the management domain over assembly
of objects and operation authorities over assembly of application maintainers
by default.
Inspector Group: This user group has the management domain over assembly
of objects and operation authorities over assembly of application inspectors by
default.
3-2
Version: A
3 Security Management
Devcfg: This user group has the operation authorities of the Devcfg.
Eot Group: This user group has the operation authority of the Eot group.
NMS Group: This user group has the operation authority of the OTNMApi.
When the upper-level NMS system connects to the OTNM2000 through the
northbound interface, you need to create a user for the NMS on the
OTNM20000 and add the user into the NMS group. The NMS group is for
managing the access authorities of the NMSs.
If the default user groups do not meet the requirements, you can create user groups
of the two types: Domain Security Admin Group and Common User Group.
Security administrators (users in the Security Admin Group user group) can create
sub domain security administrator groups and common user groups, while the sub
domain administrator can only create common user groups. Creating a sub domain
administrator group equals creating a sub domain. The users belonging to the sub
domain administrator group have the operation authorities within the sub domain
range, that is, the object sets, operation sets, user groups and users created by a
sub domain administrator are only visible to the sub domain administrators in the
same group. When creating a common user group, the operation authority cannot
be set as the security management authorities.
Operation Group
An operation group is a set of operation authorities provided by the OTNM2000.
When a user or user group is bound with an operation group, this user or user group
has all the operation authorities of the operation group. By creating an operation
group and adding the required operation authorities into the operation group, you
can allocate the authorities to relevant users or user groups, implementing quick
allocation of user authorities.
The OTNM2000 EMS provides the following default operation groups:
u
Version: A
3-3
Object Group
An object group is a set of manageable objects provided by the OTNM2000. When
a user or user group is bound with an object group, this user or user group has the
authorities to manage all the objects in the object group. By creating an object group
and adding the objects to be managed into the object group, you can specify a user
or user group to manage all the objects in the object group, lowering the
management cost. You can create object groups based on geographical regions,
network layers or equipment type.
The object group provided by the OTNM2000 by default is Assembly of Objects,
which cannot be deleted or modified. The objects include subnets, network blocks
and NEs, with the NE as the smallest granularity.
User
For the OTNM2000 client users, their usernames and passwords uniquely
determine their respective operation and management authorities on the
OTNM2000.
There are two default built-in users: admin and root. The "admin" user is a system
administrator, which cannot be deleted or modified.
Authority Allocation
Binding a user with an operation group, object group and user group implements the
authorization and domain division function. After a user logs in, the OTNM2000 only
displays the sets of equipment applicable to the user group that the user belongs to
and the user can only perform the operations defined in the bound operation group
on the equipment; The path list of the domain user are the paths among the NE
nodes managed by the user. The cross-domain paths will only appears in the global
user's path list, which means it will not appear in the domain user's path list.
Authorities can be assigned to a user through the following ways:
u
Adding a user into a specific user group so that the user has the authorities
assigned to the user group.
3-4
Version: A
3 Security Management
Note:
u
3.2
3.2.1
Procedure
1.
Version: A
3-5
Figure 3-1
2.
Select Enable Auto Lock and enter the interval for locking the client end in the
Auto Lock Time Interval (Minute) text box. As shown in Figure 3-1, the client
end will be locked if no operations are performed in 5 minutes.
Note:
If Enable Auto-lock is not selected, the automatic lock function of the
client end will be disabled.
3.
3.2.2
Click OK.
3-6
Version: A
3 Security Management
Procedure
1.
Figure 3-2
2.
Select Enable Auto-exit and enter the interval for exiting the client end
automatically in the Auto-exit Time Interval (Minute) text box. As shown in
Figure 3-2, 100 minutes is set, indicating the client end will exit automatically
when no operation is performed in 100 minutes.
Note:
If Enable Auto-exit is deselected, the automatic exit function of the client
end will be disabled.
3.
Version: A
Click OK.
3-7
3.2.3
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group.
Procedure
1.
2.
Click the User node, and click the Login Check Setup button in the right pane
or right-click in the right pane to select Login Check Setup.
3-8
3.
4.
Type the desired IP address in the IP Address text box, and click OK.
Version: A
3 Security Management
5.
After completing the settings, click OK in the User Login Check Setup dialog
box.
3.2.4
Procedure
1.
2.
3.
3.2.5
Version: A
3-9
Note:
The admin user will never be locked.
Procedure
1.
2.
3.
3.3
3-10
Version: A
3 Security Management
Table 3-1
Scenario
Description
Sub Scenario
1.
authorization
2.
Authority
adjustment
3.4
Authorization Planning
Make a plan before the authorization to reduce unnecessary authorization and
maintenance workload. The authorization plan flow is as shown in Table 3-2.
Version: A
3-11
Table 3-2
Planning Flow
Principle
requirements:
authority management.
responsibilities.
groups
3-12
Version: A
3 Security Management
3.5
3.5.1
When a user or user group is bound with an object group, this user or user
group has the authorities to manage all the objects in the object group.
Only the users in "Security Admin Group" and "Domain Security Admin Group"
can manage object groups.
The default object group cannot be deleted and only its description information
can be modified.
3.5.1.1
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
Procedure
1.
Select SecurityUser Management from the main menu to open the User
Management window.
2.
Expand the Object Group node in the left pane to view the existing object
groups.
Version: A
3-13
3.
Select the desired object group, click the Member tab on the right to view the
specific objects included in the object group.
Other Operations
u
Note:
For the "Assembly of Objects", only the description information can be
modified.
3.5.1.2
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
3-14
Version: A
3 Security Management
Procedure
1.
Select SecurityUser Management from the main menu to open the User
Management window.
2.
Select one of the following access methods to open the Add Object Group
dialog box.
Function-
Access Method
al Item
Right-click Object Group in the left pane and select Add Object Group from the
Creating
shortcut menu.
an Object
Click Object Group in the left pane and then click the Add Object Group button
Group
3.
Set the object group name and description information in the Basic Info tab
according to the planning.
4.
In the Member tab, expand the Device node under Object For Select on the
left, select the members and click
5.
Version: A
After completing the settings, click OK in the Add Object Group dialog box.
3-15
3.5.2
When a user or user group is bound with an operation group, this user or user
group has all the operation authorities assigned to the operation group.
Only the users in "Security Admin Group" and "Domain Security Admin Group"
can manage operation groups.
The default operation groups cannot be deleted and only their description
information can be modified.
3.5.2.1
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
Procedure
1.
Select SecurityUser Management from the main menu to open the User
Management window.
2.
Expand the Operation Group node in the left pane to view the existing
operation groups.
3.
Select the desired operation group, click the Member tab on the right to view
the specific operation objects included in the operation group.
3-16
Version: A
3 Security Management
Other Operations
u
Note:
The default operation groups cannot be deleted and only their description
information can be modified.
3.5.2.2
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
Version: A
3-17
Procedure
1.
Select SecurityUser Management from the main menu to open the User
Management window.
2.
Select one of the following access methods to open the Add Operation Group
dialog box.
Functional
Access Method
Item
Right-click Operation Group in the left pane and select Add Operation Group
Creating an
Operation
Click Operation Group in the left pane and then click the Add Operation
Group
3.
Set the operation group name and description information in the Basic Info tab
according to the planning.
4.
In the Member tab, select the members under Operation For Select on the left
and click
5.
After completing the settings, click OK in the Add Operation Group dialog
box.
3-18
Version: A
3 Security Management
3.5.3
When a user is bound with a user group, this user owns the authorities
assigned to the user group.
Only the users in "Security Admin Group" and "Domain Security Admin Group"
can manage user groups.
3.5.3.1
Prerequisite
You have logged into the OTNM2000 as a user in Security Admin Group or
Domain Security Admin Group.
Procedure
1.
Select SecurityUser Management from the main menu to open the User
Management window.
2.
Expand the User Group node in the left pane to view the existing user groups.
3.
Select the desired user group in the left pane, and view the related information
of the user group in the right pane.
Version: A
3-19
Other Operations
u
3.5.3.2
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
Procedure
1.
Select SecurityUser Management from the main menu to open the User
Management window.
2.
Select one of the following access methods to open the Add User Group
dialog box.
3-20
Version: A
3 Security Management
Function-
Access Method
al Item
Right-click User Group in the left pane and select Add User Group from the
Creating a
shortcut menu.
User
Click User Group in the left pane and then click the Add User Group button in
Group
3.
Set the relevant parameter of the user group in the Add User Group dialog box
according to the planning.
Note:
There are two types of user group: Domain Security Admin Group and
Common User Group.
u
4.
Version: A
After completing the settings, click OK in the Add User Group dialog box.
3-21
3.5.4
Managing Users
The security administrator reasonably authorizes the EMS users to ensure the
users have necessary authorities to perform operations and meanwhile avoid
authority-exceeding operations.
Planning users should combine with the requirement of maintenance and
management, authorizing users with appropriate privileges and restraining them to
use the management and maintenance functions in corresponding situations. The
OTNM2000 V2.0R5 (Build04.20.05.50) uniquely identifies the user logged in and its
operation privileges by the username and password.
After the OTNM2000 V2.0R5 (Build04.20.05.50) is installed, it only provides the
default user: admin (username and password are admin) and the users (1, 2, 3, 4)
will be no longer used.
The admin user is the super user, who has all the operation and management
privileges. Other users will be directly or indirectly created by the admin user.
3.5.4.1
Viewing Users
You can view the related information of users, conveniently managing them.
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
Procedure
1.
Select SecurityUser Management from the main menu to open the User
Management window.
2.
3-22
Expand the User node in the left pane to view the existing users.
Version: A
3 Security Management
3.
Select the desired user in the left pane, and view the related information of the
user in the right pane.
Other Operations
u
Delete a user.
Right-click the user, select Del from the shortcut menu and click Yes in the
displayed alert box.
Modify a user.
Select the user in the left pane, modify the corresponding information in the
right pane as needed, and then click Apply.
Version: A
3-23
3.5.4.2
Creating a User
You can create OTNM2000 user accounts, assign them with corresponding
authorities, and then allocate the accounts to users with different responsibilities.
Note:
After creating users, you can add them into corresponding user groups
and authorize the user groups to avoid cross-over authorization. It is not
recommended to set management domain and operation authorities for
users respectively.
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
Procedure
1.
2.
Select one of the following paths to open the Add User dialog box.
Functional Item
Path
Right-click User in the left pane and select Add User from the
shortcut menu.
Creating a User
Click User in the left pane and then click the Add User button in the
right pane.
Click User in the left pane, right-click in a blank area in the right pane
and select Add User Group from the shortcut menu.
3-24
Version: A
3 Security Management
3.
See Table 3-3 to set the relevant parameter of the user in the Add User dialog
box according to the planning.
Table 3-3
User Settings
Parameter
Description
User name
Description
Password
Basic
Information
Confirm
password
Password
Valid Days
Version: A
3-25
Table 3-3
Parameter
Description
Maximum number of users allowed to use this account to log
into the OTNM2000.
Max Online
No.
u
Disable This
User
used.
Sets the user group to which this user belongs. One user can
4.
3.5.4.3
Sets the allowed IP range for login, allowing the users to login
from the client in the specified IP range.
After completing the settings, click OK in the Add User dialog box.
Disabling a User
You can disable a user account that is not used at present. The disabled user
cannot log into the OTNM2000.
Background Information
u
The users in the "Security Admin Group" can enable or disable all the other
users except themselves and the admin user.
The users in the "Domain Security Admin Group" can enable or disable the
users created by them.
1.
2.
Expand the User node on the left navigation tree, select the desired user and
Procedure
Version: A
3 Security Management
3.
3.5.4.4
Unlocking Users
After being unlocked, the users can log into the OTNM2000 again.
Context
u
When a user's login attempts reach three times, the user will be locked. Only
the users in "Security Admin Group" and "Domain Security Admin Group" can
unlock users.
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
Procedure
u
Manual Unlocking
1)
Version: A
3-27
2)
3)
Right-click the locked user, and select Unlock User from the shortcut
menu.
Automatic Unlocking
A locked user cannot log into the OTNM2000 until it is automatically unlocked
after specified time period.
Note:
The system automatically unlocks the locked user accounts in the
following ways:
3.5.4.5
Context
u
A user in Security Admin Group can reset the passwords for all the users
except admin and himself / herself.
A user in Domain Security Admin Group can reset the passwords for its
created users.
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
3-28
Version: A
3 Security Management
Procedure
1.
Select SecurityUser Management from the main menu to open the User
Management window.
2.
3.
Right-click the corresponding user account, select Reset Password from the
shortcut menu.
4.
In the Reset Password dialog box, set the New Password and Confirm New,
and then click OK.
3.5.4.6
Procedure
1.
2.
In the displayed Change Password dialog box, enter Old Password, New
Password and Confirm Password.
Note:
The password should contain at least 8 bytes. If the password complexity
check function is enabled, the password should contain three types of
capital letters, lowercase letters, numbers or other characters.
Version: A
3-29
3.
3.5.4.7
Click OK.
Background Information
The access control list applies only to the desired user.
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
Procedure
1.
2.
Expand the User node on the left navigation tree,, select the desired user and
click Access Control List tab.
3-30
Version: A
3 Security Management
3.
4.
Set the Start IP Address and End IP Address, and click OK. The added IP
address range appears in the access control list.
5.
3.5.4.8
Prerequisite
You have logged into the OTNM2000 as a user belonging to "Security Management
Group".
Version: A
3-31
Context
A user's original authorities coupled with the authorities of the user groups to which
the user belongs amount to the total authorities of the user. For example,
As shown in the above figure, the user "test" owns the following authorities:
u
For the objects in the Object Group A, the user has the operation authorities
defined in Operation Group A.
For the objects in the Object Group B, the user has the operation authorities
defined in Operation Group B.
However, the user "test" cannot perform the operations defined in Operation Group
B on the objects defined in Object Group A, and similarly the user cannot perform
the operations defined in Operation Group A on the object defined in Object Group
B.
Procedure
1.
Select SecurityUser Management from the main menu to open the User
Management window.
2.
Expand the User node in the left pane, and select the desired user.
View the user groups to which the user belongs. In the right pane, click
User Group Belong To to view the user groups to which the user is
added.
View the object groups to which the user belongs. In the right pane, click
Object Group Belong To to view the object groups to which the user is
added.
3-32
Version: A
3 Security Management
View the operation groups to which the user belongs. In the right pane,
click Operation Group Belong To to view the operation groups to which
the user is added.
3.
Expand User Group in the left pane to view the object groups and operation
groups associated with the user groups that the user belongs to.
4.
3.5.5
3.5.5.1
Scenario Description
There are region A and region B. The equipment in the two regions are centrally
monitored managed and maintained through the OTNM2000. To have the
equipment in region A monitored, managed and maintained by the staff in region A
and the equipment in region B by the staff in region B, you need to create user
accounts and allocate authorities for the staff in region A and region B respectively.
Procedure
1.
2.
Version: A
3-33
Table 3-4
User Group
Type
Management
Authorities
Domain
Name
Inspector Group
Common User
Group
Operator Group
Common User
Group
Maintainer
Common User
Group A
Group
Inspector Group
Common User
Group
Operator Group
Common User
Group
Maintainer
Common User
Group B
Group
Object Set A
Object Set A
Object Set A
Assembly of Application
Maintainers
Object Set B
Object Set B
Object Set B
Assembly of Application
Maintainers
Create users.
Set the user groups to which the users belong respectively. Suppose six
users A, B, C, D, E and F are created. You can add the users into the
respective user groups, as shown in Table 3-5. After being added into the
corresponding user groups, the users own the management domain and
operation authorities of their corresponding user groups.
3-34
Version: A
3 Security Management
Table 3-5
Creating Users
User
User Group
Inspector Group A
Operator Group A
Maintainer Group A
Inspector Group B
Operator Group B
Maintainer Group B
Set the access control list to restrict users' login IP address to the specified
ones.
3.5.5.2
Description
Delete the Modify NE authority of the EMS user B.
Adjustment Analysis
User's Original Authorities
Analysis
Description
In this example, you need to
unbind the user group Operator
Group A with the operation group
Assembly of Application
Operator Group A
A.
Version: A
3-35
Analysis
Description
operation group
Assembly of
Application Operators.
Procedure
1.
2.
3.6
3.6.1
Background Information
u
3-36
Session: The connection established between the client and the server.
Version: A
3 Security Management
A same user account can be used to log in on multiple clients. You can define
the maximum number of concurrent logins of a same user account. See
Creating a User.
Procedure
1.
2.
In the Online User Management tab, view the information of online users.
Other Operations
Right-click in the Online User Management tab and select Refresh to refresh the
online users.
3.6.2
Background Information
u
Session: The connection established between the client and the server.
A same user account can be used to log in on multiple clients. You can define
the maximum number of concurrent logins of a same user account. See
Creating a User.
Version: A
3-37
The objects of logging out user and sending messages are user sessions. For
example, the account user is used to log in to a same OTNM2000 server on
client A and client B concurrently, which generate session a and session b
respectively. When you log out the account user that generates the session a,
the account user that generates session b will not be influenced.
The admin user can log out all other users, while the users belonging to the
Security Admin Group can only log out ordinary users.
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
Procedure
1.
2.
In the Online User Management tab, view the information of online users.
3.
Right-click the corresponding user session and select Force Exit from the
shortcut menu.
4.
3-38
Enter the logout reason in the Force Exit dialog box and click OK.
Version: A
3 Security Management
3.6.3
Background Information
u
Session: The connection established between the client and the server.
A same user account can be used to log in on multiple clients. You can define
the maximum number of concurrent logins of a same user account. See
Creating a User.
1.
2.
In the Online User Management tab, view the information of online users.
Procedure
Version: A
3-39
3.
Right-click the selected user session and select Send Message from the
shortcut menu.
Note:
The OTNM2000 supports sending message to multiple user sessions
simultaneously. You can press down the Ctrl or Shift key to select
multiple sessions.
4.
3-40
Enter the message content in the Send Message dialog box and click OK.
Version: A
3 Security Management
3.6.4
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group or Domain Security Admin Group.
Procedure
1.
2.
3.
Click the corresponding user and click Active Info in the right pane to view the
activity information of the user.
Note:
When anomaly information is detected, you can process the user
accordingly. For example, log out the user through the Online User
Management tab.
3.7
Version: A
3-41
Prerequisite
The EMU card supports the f interface authority management function.
Prerequisite
You have logged in as the admin user.
Procedure
1.
Select the path in Table 3-6 to open the EMS_f Management tab.
Table 3-6
Operation
Access Method
Select SecurityEMS_f Management in the main menu, and select the
corresponding NE in the lower part of the Operational Tree pane and click
.
Managing EMS_
f Authority
2.
Note:
Set the configuration items in a batch manner conveniently via the
shortcut menu.
Table 3-7
Parameter
f-interface setting flag
f-interface status
User code
3-42
Description
Only after users select the f-interface setting flag of an NE can the
configuration performed on this f interface be valid.
For setting the f interface status of the corresponding NE to Refuse
of All, Set Enable of All or Set Read only of All.
Only after users select the code setting flag of an NE can the
configuration on the password of this f interface be valid.
For setting the password of the f interface belonging to the
corresponding NE.
Version: A
3 Security Management
3.
Select the NE, right-click anywhere in the EMS_f Management tab and select
Set EMS_f Authority of Selected from the shortcut menu.
4.
Selecting Get EMS_f Authority of All: Gets the f-interface status and
passwords of all the NEs in the OTNM2000, and check whether the EMS_f
settings of all NEs are correct.
3.8
Prerequisite
The EMS_unmcmagent and EMS_unmcmservice services have been started up
at the server end.
Procedure
1.
Version: A
3-43
2.
Note:
The system provides two users by default:
u
The username and password of the ordinary query user are Query,
which only has the authority to view and export data.
3.
You can perform the following operations via the network management tool:
The Admin user is used as example.
Item
Description
The Process Management window lists all the services that can be
Process
Management
Resource
Management
Historical Data
3-44
Version: A
3 Security Management
Item
Description
Log Management
In the Log Management window, you can view the operation records,
operation result.
Settings
In the Settings window, you can set the save time of Historical Data
and Logs.
In the Import/Export window, you can import and export the
OTNM2000 configuration.
u
It supports setting the backup server. You can select local backup
or the FTP server and set the parameters related to the backup
Import / Export
Version: A
3-45
Integrated Configuration
Management
The following introduces the concept of the integrated configuration and how to
manage the projects, network blocks, NEs, cards and manager services through the
integrated configuration in the OTNM2000.
Integrated Configuration
The integrated configuration implements the integration of the network data
configuration and management. It changes the configuration mode in which both the
Devcfg and the OTNM2000 are involved. The integrated configuration has the
following features:
u
Version: A
4-1
Managing Cards
Configuring NE IP Remotely based on SN
4-2
Version: A
4.1
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
In the Logical Tree of the OTNM2000, right-click a project and select Project
Attribute from the shortcut menu to open the Project Property dialog box.
2.
Modify the project name, structure configuration height and width parameters.
Click OK to complete modifying the project attributes.
4.2
Version: A
4-3
To ensure the communication between the EMS and the NE, it is necessary to
configure the manager services for managing NEs at the EMS side. The following
introduces how to add, edit and delete manager services in the OTNM2000.
4.2.1
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
2.
Click Add to open the Add Manager Service dialog box and set the attributes.
The items with * are required, and others are optional.
4-4
Version: A
Note:
u
3.
4.2.2
Click OK.
Prerequisite
You have the privileges of Operator Group or higher privileges.
Version: A
4-5
2.
2)
Modify the attributes in the displayed dialog box. The items with * are
required, and others are optional.
Note:
u
4-6
Version: A
3)
Click OK.
2.
3.
4.
Select the new manager service in the displayed Please Select Manager
Service dialog box.
Version: A
4-7
4.2.3
5.
Click OK.
6.
Caution:
The manager services in use cannot be deleted. To delete it, modify the
manager service managing the network block to another one. For
modifying the manager service, see the Procedure (Switching Manager
Services of Network Blocks) section in Modifying a Manager Service.
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
4-8
2.
3.
Version: A
4.
4.3
Background Information
u
The gateway NE is directly or indirectly connected with the OTNM2000 via the
management interface (through the DCN network). A gateway NE coupled with
its connected non-gateway NE constitutes a Administrative Domain. The
OTNM2000 accesses the non-gateway NE of the administrative domain by way
of the gateway NE.
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
Version: A
4-9
2.
Note:
When configuring the network block, you can click Config GNE (Group)
Quickly in the Add Part dialog box to configure the GNE (group).
b)
Click Add GNE Group to add a GNE group in the Choose GNE pane.
b)
Select the corresponding GNE group in the Choose GNE pane, and
click Add GNE in the GNE Details pane in the lower part to set the
Gateway NE IP, Gateway NE Mask and Gateway NE Gateway.
c)
4-10
Repeat the above step to add other GNEs. Then click Save GNE.
Version: A
Other Operations
u
In the Choose GNE pane, select the desired GNE group and click Delete.
2)
Delete a GNE.
1)
In the Choose GNE pane, select the desired GNE and click Delete.
2)
Select the desired GNE group in the Choose GNE pane, then select the
desired GNE in the GNE Details pane in the lower part and click Delete
GNE.
2)
Note:
Before deleting a GNE (group), adopt another GNE (group) for the
network block to avoid communication interruption between the network
block and the OTNM2000.
4.4
4.4.1
Prerequisite
The manager service is created.
Version: A
4-11
Procedure
1.
In the Logical Tree of the OTNM2000, right-click a project and select Add
Network Block from the shortcut menu to open the Add Part dialog box.
2.
Note:
u
The network block number must be unique, and a network block can
be managed only by one manager service.
3.
4-12
Version: A
2)
Set the attributes of the Ma NE. The items with * are required, and others
are optional.
3)
4.
4.4.2
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
In the Logical Tree of the OTNM2000, right-click a network block and select
Modify Network Block from the shortcut menu to open the Modify Network
Block dialog box.
Version: A
4-13
2.
Modify the network block No., name, Ma NE No., manager service according to
the actual situation.
Note:
An Ma NE must exists under each network block.
3.
4.4.3
Caution:
u
When a network block is deleted, all the NEs under the network
block will be deleted simultaneously.
Deleting a network block will break the services carried by the NEs
under the network block.
Prerequisite
You have the privileges of Operator Group or higher privileges.
4-14
Version: A
Procedure
1.
Right-click the network block in the Logical Tree pane and select Delete to
open the Delete Part dialog box.
2.
Caution:
When the Delete Part dialog box appears as shown in the following
figure, go to the Business Management menu to check and adjust the
service carried by the network block to another network block according
to the prompt in red. Otherwise, deleting the network block directly will
greatly influence the service.
4.5
Managing NEs
The following introduces how to add, edit and delete network NEs in the OTNM2000.
4.5.1
Adding an NE
The following introduces how to add NEs in the OTNM2000.
Prerequisite
Version: A
Procedure
1.
In the Logical Tree of the OTNM2000, right-click a project and select Add NE
from the shortcut menu to open the Add NE dialog box.
2.
Specify the NE attributes and configuration. The items with * are required, and
others are optional.
Note:
u
3.
Note:
After an NE is added, the system automatically adds the main switch card
(in the default slot) for the NE.
4.5.2
4-16
Version: A
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
Right-click the NE in the Logical Tree pane and select Property to open the
Property dialog box.
2.
In the Property dialog box, modify the NE attribute and click OK to save your
changes.
4.5.3
Copying / Pasting an NE
Copying and pasting an NE of the similar parameters can simplify the procedures of
creating an NE.
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
Right-click the desired NE in the Logical Tree pane and select Copy NE from
the shortcut menu.
Version: A
4-17
2.
Right-click the desired network block in the Logical Tree pane and select
Paste NE from the shortcut menu to open the dialog box, as shown below,
displaying the parameters of the copied NE.
3.
Note:
u
4.5.4
Moving an NE
The OTNM2000 allows you to move an NE to another network block.
Prerequisite
You have the privileges of Operator Group or higher privileges.
4-18
Version: A
Procedure
1.
Right-click the desired NE in the Logical Tree pane and select Move NE from
the shortcut menu.
2.
In the displayed Move NE dialog box, set the network block No., NE No. and
NE name after the move. Then click OK.
Note:
The name and numbering of a NE must be unique under a network block.
4.5.5
Deleting an NE
The following introduces how to delete an NE in the OTNM2000.
Caution:
u
Version: A
4-19
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
Right-click the NE in the Logical Tree pane and select Delete NE to open the
Delete NE dialog box.
2.
Caution:
When the Delete NE dialog box appears as shown in the following figure,
go to the Business Management menu to check and adjust the service
carried by the NE to another NE according to the prompt in red.
Otherwise, deleting the NE directly will greatly influence the service.
4.6
Managing Cards
The following introduces how to add, replace, edit and delete cards in the
OTNM2000.
4.6.1
Adding a Card
The following introduces how to add a card in the OTNM2000.
4-20
Version: A
Note:
After an NE is added, the system will automatically add the core switch
card (in the default slot for the core switch card).
Prerequisite
u
1.
Right-click the null slot in the NE shelf view (using CiTRANS 620 as an example)
Procedure
4.6.2
Version: A
4-21
Prerequisite
u
Procedure
1.
2.
Select the corresponding NE in the lower part of the Operational Tree pane
and click
Note:
In the Board Auto Find tab, the EMS Configured Board Type indicates
the types of cards configured in the OTNM2000; Device Configured
Board Type indicates the types of cards saved in the device EMU card;
Online Status indicates whether or not the card is present in the
corresponding slot of the device. If the card is present, it will automatically
synchronize the configuration of the device.
3.
4-22
Click Sync All, or select the corresponding slot and click Sync Selected.
Version: A
Note:
The synchronization refers to synchronizing the types of cards configured
on the device to the OTNM2000. After the synchronization, the cards
automatically discovered will be added. The Sync Result column of the
corresponding slot will display Synchronized successfully, and those
cards configured in the OTNM2000 but not present on the device will be
deleted. The Board Auto Find tab will no longer display the
corresponding cards.
4.
4.6.3
Replacing a Card
The following introduces how to replace a card in the OTNM2000.
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
Right-click the card in the NE shelf view (using CiTRANS 620 as an example),
select Replace the Card from the shortcut menu and select the new card.
2.
Version: A
4-23
Caution:
When the Replace the Card dialog box appears as shown in the
following figure, go to the Business Management menu to check and
adjust the service carried by the card to another card according to the
prompt in red. Otherwise, replacing the card may influence the service.
4.6.4
Editing a Card
The following introduces how to set the attributes of cards in the OTNM2000,
convenient for querying and maintaining the cards of the project.
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
Right-click the card in the NE shelf view and select Property from the shortcut
menu to open the Property dialog box.
4-24
Version: A
2.
4.6.5
Deleting a Card
The following introduces how to delete a card in the OTNM2000.
Caution:
When a card is deleted, the topological connection of the card will be also
deleted. Meanwhile, the services carried by the card will be broken.
Prerequisite
You have the privileges of Operator Group or higher privileges.
Version: A
4-25
Procedure
1.
Right-click the card in the NE shelf view and select Delete the card from the
shortcut menu to open the Delete Board dialog box.
2.
Caution:
When the Delete Board dialog box appears as shown in the following
figure, go to the Business Management menu to check and adjust the
service carried by the card to another card according to the prompt in red.
Otherwise, deleting the card directly will greatly influence the service.
4.7
4-26
Version: A
1.
Note:
Local NE: Indicates the NE directly connected to the network
management computer through a network cable.
2.
2)
Version: A
4-27
Note:
u
4.7.1
Prerequisite
u
The physical connection between the network management computer and the
local NE is completed.
1.
Procedure
4-28
Version: A
Note:
The NE IP Remote Config window displays the NE entries that have
completed the basic configuration.
2.
Set the local NE: In the NE IP Remote Config window, select a local NE entry,
and then select SettingsSet as Local NE.
3.
Query the SN of the local NE: In the NE IP Remote Config window, click
QueryRead Local NE SN.
Version: A
4-29
Note:
If there are multiple local NEs as the network management server is
connected through Hub, the SN will be randomly obtained. You need to
confirm the SN corresponding to the equipment according to the SN label
on the panel of the NMU card of the equipment.
4.
Set the IP address and switch-related parameters of the local NE: Click the
parameter bar according to Table 4-1.
Table 4-1
NE IP Address Settings
Item
Description
SN
For the local NE, this item displays the network block / NE number
stored in the database.
Object
For the remote NE, this item automatically displays the network block /
NE number according to the neighboring SN detection sequence.
u
EMU Equipment
SN
Source NE IP
Address
neighboring NE.
For example, suppose NE 1 is the local NE with the IP address 11.18.1.1,
and NE 2 is the neighboring NE of NE 1, the Source NE Address of NE2 is
11.18.1.1.
Switch 1/2
The switch 1 and switch 2 are the NE IDs and the combination of switch 1
and switch 2 must be unique in the entire network.
u
u
IP address of the NE, which must be unique in the entire network.
As the local NE is connected with the network management server through
IP Address
network cables, the IP address of the NE must be in the same subnet as the
IP address of the network card on the network management server;
otherwise, detecting the SN of the neighboring NE may be influenced.
4-30
IP Mask
255.255.255.0
IP Gateway
No need to set.
Version: A
Table 4-1
Item
Note 1: For the parameters not listed above, the default settings will be adopted.
5.
6.
Save the IP address of the local NE and the switch-related parameter settings:
In the NE IP Remote Config window, select SystemSave Configuration.
Note:
After saving the settings, you can query the IP address, switch and other
information of the NE in the Modify NE.
4.7.2
Prerequisite
u
Version: A
4-31
Procedure
1.
2.
Click
3.
4.
2)
4-32
Version: A
Caution:
u
5.
6.
Repeat Step 5 to compete configuring the IP addresses of the NEs in the entire
network and then close NE IP Remote Config window.
Version: A
4-33
Topology Management
Topology management is used to create and manage the topology structure of the
entire network, so as to reflect the network connection status and operation status of
the equipment. You can view the topological objects and real-time alarms on the
topology view.
Version: A
5-1
5.1
Figure 5-1
5-2
Version: A
5 Topology Management
Table 5-1
Operation
Description
Before deploying NEs in the topology view, design the
layers in the physical topology and the location of NEs.
Adding topological
Managing
topological
nodes
Managing
fiber
connections
nodes
Deleting
topological nodes
Adding fiber
connections
Deleting fiber
connections
Setting the
topology display
topology
size
display
Setting the
background image
Setting the color of
the NE
connection
Setting the
Topology
topology layers
Layer
Management
Version: A
Modifying the
topology layer
attribute
needed.
5-3
5.2
5.2.1
Procedure
1.
Click the object in the Logical Tree pane, press the left mouse button and drag
it to the desired location on the main topology view.
5.2.2
Prerequisite
u
1.
Right-click the source NE in the main topology and select Add Link from the
Procedure
shortcut menu.
2.
5-4
Version: A
5 Topology Management
Note:
You can click the sink NE, or click any NE and then set the sink NE
information manually in the Add Link dialog box. The fiber connection
will automatically adjust to connect the desired sink NE.
3.
See Table 5-2 to set the fiber connection attribute according to the project
planning. Then click Add to save the settings.
Table 5-2
Configuration Item
Description
Indicates the fiber connection sequence number of the
Link No.
Related Link
Link Cost
Not required.
Version: A
NE.
5-5
Table 5-2
Configuration Item
Description
Port
to
Part No
NE No
Board
to
Remark
5.3
5.3.1
Procedure
1.
Select the submenus under ViewTopo Display in the main menu or rightclick in the blank area of the Main Topology tab and select the corresponding
shortcut menus to perform the following operations:
5-6
Version: A
5 Topology Management
Select Bureau Name to display the corresponding bureau name under the
NE in the Main Topology tab.
Select Show NE in the network block only to only display the NEs in the
selected network block in the Main Topology tab.
5.3.2
Procedure
1.
Select ViewTopo SettingNE Icon in the main menu to open the NE Image
Setting dialog box.
2.
Double-click the NE image corresponding to the desired NE type and select the
new icon from the drop-down list.
Version: A
5-7
Figure 5-2
3.
5.3.3
Click OK.
Procedure
1.
2.
In the Line settings dialog box, select the link rate, line width and line type
(solid or dashed line).
5-8
Version: A
5 Topology Management
Figure 5-3
3.
Click OK. In this example, the link of the GE rate is displayed as dotted line, as
shown in the following figure.
5.3.4
Version: A
5-9
For better display and viewing, the OTNM2000 supports link aggregation in case of
multiple links between two NEs to simplify the complicated topology view.
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
2.
Click any of the multiple links between two NEs to implement link aggregation,
as shown in the figure.
Note:
The +(*) appears on the link after the aggregation. The asterisk *
indicates the number of links aggregated.
Other Operations
Double-click the link after the aggregation to expand the links.
5.3.5
Procedure
5-10
1.
2.
In the Topology Size dialog box, set the width and height of the display area.
Version: A
5 Topology Management
Figure 5-4
3.
5.3.6
Click OK.
Procedure
1.
2.
Select the background image from the folder and click OK. The image appears
as the background image of the main topology, as shown in the figure below:
Version: A
5-11
Figure 5-5
Other Operations
Select ViewTopo SettingUse default background in the main menu to restore
the original background of the main topology.
5.3.7
Procedure
1.
Right-click the NE in the Main Topology tab and select Modify the selected
NE colorModify net element color from the shortcut menu.
5-12
Version: A
5 Topology Management
2.
In the Color dialog box, select the desired color and click OK. The icon of the
NE appears in the new color. In the following figure, the color of the NE icon in
red rectangle is set to purple.
Figure 5-6
Other Operations
Right-click the NE in the Main Topology tab and select Modify the selected NE
colorRestore net element color from the shortcut menu to restore the default
color of the NE.
5.3.8
Procedure
1.
Right-click the line in the Main Topology tab and select Modify the selected
lines colorsCustomized Color from the shortcut menu.
2.
In the Color dialog box, select the desired color and click OK. The line appears
in the new color. In the following figure, the color of the line in red rectangle is
set to purple.
Version: A
5-13
Figure 5-7
Other Operations
Right-click the line in the Main Topology tab and select Modify the selected lines
colorsRestore the selected NE color from the shortcut menu to restore the
default color of the line.
5.4
Layer-based Topology
The OTNM2000 manages the network topology through the main topology. You can
understand the networking status information and monitor the running status in real
time in the topological view.
The OTNM2000 of the R0550 version implements the layer-based topology display,
which graphically displays topological connections among NEs and NE groups,
including the paths among nodes and the information of NEs based on layers. This
helps locate and manage NEs, improving management efficiency.
u
Manages the topology based on layers and changes the topological view in the
previous version, in which too much NEs are displayed with no layer-based
display function, inconvenient for locating commonly concerned objects.
Reasonably places the stations in an area at a same layer, convenient for you
to quickly select the source / sink stations and set the routes in the topology,
without the need to drag over the topology. This greatly improves the service
configuration efficiency.
5-14
Version: A
5 Topology Management
5.4.1
Context
According to the actual network, the layer-based topology of the R0550 version
supports classifying objects into different layers by device type or NE type, meeting
different management requirements.
u
The Default Layer is a system-defined layer. All the uncategorized NEs will be
added to this layer.
Procedure
1.
2.
Click
to open the "Add Topology Layer" dialog box. Then select Basic
Property tab to set the name and remark information of the topological layer.
Version: A
5-15
3.
Select the Member tab, select the desired NE in the NE to be Selected box
and click
or
Note:
: Indicates adding the selected objects in the left box into the
right box.
u
: Indicates adding all the objects in the left box into the right
box.
to filter the
5-16
Click
Version: A
5 Topology Management
Other Operations
The other shortcut icons on the toolbar of the Topo Layer Management tab are
described in the following figure:
Icon
Description
Deletes the selected layer.
Modifies the selected layer.
Moves up the selected layer.
Moves down the selected layer.
Categorizes all NEs into Core Layer, Convergence Layer and
Access Layer according to their device type.
Note: When this button is clicked, the customized layers
will be deleted and all the NEs will be re-categorized
according to their device types.
5.4.2
Procedure
1.
2.
information.
Version: A
5-17
2)
3.
Click OK.
Method 1
a)
b)
or
to adjust the
members.
c)
Click OK.
Method 2
a)
Double-click the desired layer, or select the desired layer and click the
Detail button at the lower left corner of the Topo Layer Management
window to open the Detail pane.
b)
5-18
5 Topology Management
c)
5.4.3
4.
Click
5.
In the displayed dialog box that prompts successful saving, click OK.
Context
The layer-based topology adopts the display mode similar to the way how the map
is browsed (a city includes the information of all its urban areas and streets). The
layer-based topology display adopts this browsing mode. When you select the layer
at the top of the Current View drop-down list, all the NEs at the selected layer as
well as those at the layers under the selected one will be displayed in the main
topology. The layer-based topological view has the following functions:
u
When the current view is locked, zooming in / out the topology will not switch
the current view.
Version: A
A network block can be taken as an independent layer to view the NEs under it.
Procedure
1.
2.
Click
to the right of Current View to select the desired layer from the drop-
down list.
Note:
The topological chart will display the NEs at the selected layer and those
at the layers under the selected one. For example, if you select Core
Layer, the topological chart displays the members at the access layer,
convergence layer and core layer.
5-20
Version: A
5 Topology Management
Description
Locks / unlocks the current view. When the current view is
locked, zooming in / out the topology will not switch the
current view.
Switches to the selected mode, in which you can select the
topology objects.
Switches to the drag mode, in which you can move the
topology view.
Opens / closes the thumbnail view.
Opens / closes the editing mode, in which you can drag the
NE.
Opens the Chart pane to view the object type and status
information corresponding to each icon in the topology view.
Zoom in the topology.
Zoom out the topology.
Restore the topology to the original size.
Select the display size of the topology.
Other Operations
u
If the current view is not locked, scrolling the mouse wheel or zooming in / out
the topology will switch the topology among different layers according to the
scaling.
If the current view is locked, scrolling the mouse wheel or zooming in / out the
topology will scale the current view to reach the best display.
Select a network block in Logical Tree, and then select ViewTopo Display
Show NE in the network block only in the main menu to only display the
NEs under a specific network block.
Version: A
5-21
5.5
5.5.1
Background Information
Deleting a fiber connection will also delete the services on the fiber connection.
Prerequisite
You have the privileges of Operator Group or higher privileges.
Procedure
1.
In the Main Topology tab, right-click the desired fiber connection and select
Delete from the shortcut menu to open the Delete Fiber Connection dialog
box.
2.
5-22
Version: A
5 Topology Management
Caution:
When the Delete Fiber Connection dialog box appears as shown in the
following figure, go to the Business Management menu to check and
adjust the relevant services according to the prompt in red. Otherwise,
deleting the fiber connection directly will greatly influence the service.
5.5.2
Deleting a Node
When adjusting the network topology, you can delete the topological nodes from the
main topology according to your needs.
Background Information
u
Deleting the NE node from the topology will not delete the NE object; however,
deleting the NE will delete the NE node from the topology simultaneously.
Deleting a topological node will also delete the services carried by the node and
its fiber connections.
Version: A
5-23
Procedure
1.
In the Main Topology tab, right-click the desired NE and select Delete node
from the shortcut menu to open the Delete node dialog box.
2.
Caution:
When the Delete node dialog box appears as shown in the following
figure, go to the Business Management menu to check and adjust the
service carried by the NE to another NE according to the prompt in red.
Otherwise, deleting the node directly will greatly influence the service.
3.
5.6
In the displayed Delete Prompt alert box, click Yes to delete the current node.
5.6.1
5-24
Version: A
5 Topology Management
Procedure
1.
Select the Main Topology tab and view the network of the monitored NEs and
related information.
2.
See Table 2-12 to lock, edit, or zoom in / out the main topology using the
toolbar displayed above the Main Topology tab.
Other Operations
Right-click and select the corresponding shortcut menus to perform the following
operations:
u
Right-click in the Main Topology tab and select Save Topology As Image
from the shortcut menu to save the current topograph as an SVG file.
Right-click in the Main Topology tab and select Export from the shortcut menu
to open the Output Report. View the configuration report of the OTNM2000
subnet structure and export the report as an XML, Txt, CSV or XSL file.
5.6.2
Procedure
1.
Click
the main topology to open the Airscape pane and view the full view thumbnail
of the topograph.
Note:
The area in red rectangle of the Airscape pane is the visible area of the
topology. You can click the desired location in the airscape or drag the
red rectangle to locate the display area of the main topology.
Version: A
5-25
5.6.3
Prerequisite
The subnet has been created in the Devcfg.
Procedure
1.
Click the corresponding subnet in the Browse Tree tab and view the selected
subnet and its NEs in the Main Topology tab, as shown in Figure 5-8.
Figure 5-8
2.
(Optional) In the Main Topology tab, right-click an NE in the subnet and select
Collapse to Subnet from the shortcut menu. The NE nodes in the subnet
appear as the subnet icon.
5-26
Version: A
5 Topology Management
Figure 5-9
3.
Collapsing Subnet
(Optional) In the Main Topology tab, right-click the subnet icon and select
Expand the Subnet from the shortcut menu to expand the NEs included in the
subnet.
5.6.4
Searching Objects
The object searching function enables you to quickly locate the desired object.
Background Information
The search objects include NEs, network block and shelves.
Procedure
1.
2.
Version: A
Click
3.
Enter the keyword in the text box according to the prompt in the text box.
Note:
When searching the object, the system adopts dynamic fuzzy search,
which means in the process of entering the keyword, the drop-down list
dynamically displays the result matching the entered content.
4.
Select the desired object from the drop-down list and the object is marked in
the Logical Tree pane and the Main Topology tab.
5-28
Version: A
5 Topology Management
5.7
Background Information
The DCN network is composed of the OTNM2000, gateway NE, non-gateway NE
and the communication networks among them. A gateway NE coupled with its
connected non-gateway NE constitutes a Administrative Domain. The OTNM2000
accesses the non-gateway NE of the administrative domain by way of the gateway
NE.
The DCN can be divided into two types in terms of the DCN message bearing
mode: Out-of-band DCN and In-band DCN.
u
In-band DCN: Indicates the DCN network that uses the service channel
provided by the device to transmit the network management information.
Out-band DCN: Indicates the DCN network that uses the channels other than
the service channel to transmit the network management information.
Version: A
5-29
DCN Management
The OTNM2000 supports the following DCN network management functions:
u
Displays the routes from the OTNM2000 to the NE and from the
OTNM2000 to the NE by way of Ma / Mb.
Queries the status of the MCC channel (NE network status: disabled /
enabled, UP / DOWN).
5.7.1
5-30
Version: A
5 Topology Management
Background Information
The DCN management function only supports the PTN device and the prerequisite
is that the EMU software of the device must support this function.
Procedure
1.
Switch to the DCN topology. Select ViewDCN Topo to switch between the
main topology and the DCN topology.
2.
Right-click in the blank area of the Main Topology tab and select Add
Network Device from the shortcut menu to open the Add Network
Device dialog box.
2)
3.
Version: A
5-31
2)
4.
2)
Right-click the target NE and select Set Destination NE from the shortcut
menu.
3)
Note:
For the concepts of Ma and Mb, see Management Model.
5-32
Version: A
5 Topology Management
5.7.2
5.7.2.1
Background Information
The MCC channel status function only supports the PTN device and the
prerequisite is that the EMU software of the device must support this function.
Procedure
1.
Switch to the DCN topology. Select ViewDCN Topo to switch between the
main topology and the DCN topology.
2.
Right-click the NE in the DCN topology and select MCC Channel Status to
open the MCC Channel Status tab.
3.
Version: A
In the MCC Channel Status tab, set the shutdown status of the port.
5-33
4.
Right-click in the blank area of the MCC Channel Status tab and select
Channel Setting from the shortcut menu to issue the channel setting command
to the device.
5.
Right-click in the blank area of the MCC Channel Status tab and select
Refresh from the shortcut menu to view the status of the port and confirm
whether the setting is successful or not.
5.7.2.2
Background Information
The NE F interface management function only supports the PTN device and the
prerequisite is that the EMU software of the device must support this function.
Procedure
1.
2.
Select the corresponding NE in the lower part of the Operational Tree pane
and click
5-34
Version: A
5 Topology Management
3.
4.
After completing the settings, right-click in the blank area of the NE-Port
Management tab and select Set Shutdown Status from the shortcut menu
and set the "Set the shutdown status" command to the device.
5.
Right-click in the blank area of the NE-Port Management tab and select
Refresh from the shortcut menu and view the status of the F interface to
confirm whether the setting is successful or not.
5.7.3
Version: A
5-35
5.7.3.1
Background Information
The MCC channel status function only supports the PTN device and the
prerequisite is that the EMU software of the device must support this function.
Procedure
1.
Switch to the DCN topology. Select ViewDCN Topo to switch between the
main topology and the DCN topology.
2.
Right-click the NE in the DCN topology and select MCC Channel Status to
open the MCC Channel Status tab.
3.
In the MCC Channel Status tab, view the related status of the corresponding
port.
5.7.3.2
Background Information
The NE F interface management function only supports the PTN device and the
prerequisite is that the EMU software of the device must support this function.
5-36
Version: A
5 Topology Management
Procedure
1.
2.
Select the corresponding NE in the lower part of the Operational Tree pane
and click
3.
5.7.3.3
Background Information
The NE port status query function only supports the PTN device and the
prerequisite is that the EMU software of the NE must support this function.
Procedure
1.
Switch to the DCN topology. Select ViewDCN Topo to switch between the
main topology and the DCN topology.
2.
Right-click the NE in the DCN topology and select Get NE Port Status from the
shortcut menu to open the Get NE Port Status tab.
3.
Version: A
5-37
Figure 5-10
5.7.4
Background Information
The alarms of the out-of-band communication network (the device F interface)
include F_DISABLE, which indicates the F port shutdown alarms.
Procedure
1.
2.
Right-click anywhere in the Current Alarm tab and select Query Condition
from the shortcut menu.
3.
In the displayed Set Current Alarm Query Condition dialog box, select the
alarms related to the MCC channel or the F interface in the list under Alarm
Code. The following figure uses querying the MCC shutdown alarms as an
example.
5-38
Version: A
5 Topology Management
4.
Version: A
Click OK. The matching alarms appear in the Current Alarm tab.
5-39
5.7.5
Background Information
The automatic discovery of topological links only supports the PTN device and the
prerequisite is that the EMU software of the device must support this function.
Procedure
1.
Switch to the DCN topology. Select ViewDCN Topo to switch between the
main topology and the DCN topology.
2.
Right-click the NE in the DCN topology and select Topo Link Auto Discovery
from the shortcut menu. The OTNM2000 will issue the query command to
automatically add the detected NE topological links to the topology.
5-40
Version: A
Configuration Management
The configuration management is used to configure the information of the network
and NE devices, which is the core management function of the OTNM2000.
Time Calibration
Management Configuration
Structure Configuration
Device Configuration
Refreshing Configuration Time
Configuration Check
Managing Card
Managing NE Software
NE Communication
Optical Cable Router Settings
Setting the NE to the Not Started Status
Backing Up DCG Files
Version: A
6-1
6.1
Time Calibration
Time calibration synchronizes the time of the equipment and the time of the
OTNM2000.
Background Information
When the time of the equipment and the time of the OTNM2000 are asynchronous,
the delivering of equipment configuration will fail.
Procedure
1.
Figure 6-1
2.
Click Yes in the Time Calibration alert box. Query the operation result in the
Command manager window that appears subsequently.
6.2
Management Configuration
The following introduces the management configuration function of the OTNM2000.
6-2
Version: A
6 Configuration Management
6.2.1
Background Information
Management configuration designates members for the part and the managermanaged relationships between the members, including EMU configurations and
other configurations, of which:
u
Procedure
1.
Select the path in Table 6-1, the Management Configuration alert box
appears on the OTNM2000 GUI, as shown in Figure 6-2.
Table 6-1
Operation
Access Method
Select a network block in the Logical Tree pane and select
Downloading
Management
menu.
Configuration
Figure 6-2
Version: A
2.
3.
Query the operation result in the Command manager window that appears.
6-3
If other contents are displayed in the remark column, the operation fails.
You need to eliminate the failure according to the prompts and download
the equipment configuration again until the operation is successful.
Note:
When downloading the management configuration to a network block, all
the working EMU cards under this network block will restart and the new
data will be written into the EEPROM of each EMU card.
6.2.2
Procedure
1.
Select the path in Table 6-2 to open the management config data window, as
shown in Figure 6-3.
Table 6-2
Operation
Access Method
Select the desired network block in the Logical Tree pane and
6-4
Version: A
6 Configuration Management
Figure 6-3
2.
6.3
Structure Configuration
The following introduces the structure configuration function of the OTNM2000.
6.3.1
Version: A
6-5
Background Information
Structure configuration shows the connection relationships between the NEs in the
part and shows the topology of the entire part.
Procedure
1.
Select one method in Table 6-3, the Structure Configuration alert box
appears on the OTNM2000 GUI, as shown in Figure 6-4.
Table 6-3
Operation
Access Method
Select a network block in the Logical Tree pane and select
Downloading the
Structure Configuration
Figure 6-4
2.
3.
Query the operation result in the Command manager window that appears.
If other prompts are displayed under the remark column, the operation fails.
Users should eliminate the fault according to the prompts and deliver the
structure configuration again until the operation is successful.
6.3.2
6-6
Version: A
6 Configuration Management
Procedure
1.
Select the path in Table 6-4 to open the structure config data window, as
shown in Figure 6-5.
Table 6-4
Operation
Access Method
Select the desired network block in the Logical Tree pane and
Figure 6-5
Version: A
6-7
2.
Check whether the structure configuration data in the window is consistent with
the OTNM2000 configuration data. If not, users need to re-download the
structure configuration data.
6.4
Device Configuration
The following introduces the device configuration function of the OTNM2000.
6.4.1
Background Information
Usually, the equipment configuration is saved on the basis of each NE and it
includes all the card configurations, cross-connect configurations and so on. The
equipment configuration of NE is saved in EEPROM of that NEs EMU card. If an
EMU card is powered off due to fault, the configuration data will not be lost. When
the EMU card is powered on, the configuration will be read out and the NE will be
initialized.
Procedure
1.
Select one method in Table 6-5, and the Device Configuration alert box
appears on the OTNM2000 GUI, as shown in Figure 6-6.
Table 6-5
Operation
Access Method
Select a network block or NE in the Logical Tree pane and select
Downloading the
Equipment
Configuration
6-8
Version: A
6 Configuration Management
Figure 6-6
2.
3.
Query the operation result in the Command manager window that appears.
If other prompts are displayed under the remark column, the operation fails.
Users should eliminate the fault according to the prompts and deliver the
equipment configuration again until the operation is successful.
6.4.2
Procedure
1.
Right-click the desired NE in the Logical Tree pane or in the logical view and
select ConfigRead Device Config.
2.
Version: A
6-9
3.
6.5
Background Information
If the management or structure configuration to be downloaded is the same with the
existing one, the OTNM2000 prompts Configuration has no change. To still
download the configuration, you need to refresh the configuration time.
Procedure
1.
Select the path in Table 6-6, the Refresh Config Time alert box appears, as
shown in Figure 6-7.
Table 6-6
Configuration Item
Access Method
Select a network block in the Logical Tree pane and then select
Refreshing
configuration time
Right-click a network block in the Logical Tree pane and select Config
Refresh Config Time from the shortcut menu.
6-10
Version: A
6 Configuration Management
Figure 6-7
2.
3.
Query the operation result in the Command manager window that appears.
If other prompts are displayed under the remark column, the operation fails.
Users should eliminate the fault according to the prompts and refresh the
configuration time again until the operation is successful.
6.6
Configuration Check
The following introduces the configuration check of the OTNM2000.
6.6.1
Configuration Check
The configuration check is a checking mechanism for checking whether the actual
equipment configuration is consistent with the configuration in the database.
Procedure
1.
Select the path in Table 6-7 to open the Check Config tab and bring up the
Check Config Parameter Setting dialog box.
Table 6-7
Operation
Access Method
Select ConfigurationCheck Config in the main menu.
Configuration
Check
Version: A
6-11
Table 6-7
Operation
Access Method
Right-click the desired project or NE in the Browse Tree pane and select
Check Config from the shortcut menu.
In the Operational Tree pane, select Management Tool Configuration
ManagementCheck Config.
2.
Note:
u
Open the Check Config tab in the Logical Tree / Browse Tree
shortcut menu, Step 4.
3.
Select the object that needs checking configuration in the Operational Tree
tab.
4.
Click
Select Result Auto Scroll to switch the scroll mode of displaying results.
Subsequent Operation
Record the difference between the equipment and the database, and verify the
correctness according to the actual circuit condition.
u
6-12
Version: A
6 Configuration Management
6.6.2
Background Information
Only the IPRAN NE supports the NE configuration comparison function.
Procedure
1.
Right-click the IPRAN NE in the Logical Tree pane or in the logical view and
select ConfigNE Config Compare from the shortcut menu to open the NE
Config Compare window.
2.
Figure 6-8
3.
Version: A
6-13
6.7
Managing Card
The following introduces the related functions of card management.
6.7.1
Procedure
1.
Double-click the desired NE in the Logical Tree pane and click the
corresponding card in the subrack view. Then click the Card Configuration on
the Task Panel at the right side of the tab to open the card configuration page,
as shown in Figure 6-9.
Figure 6-9
2.
Configure the specific card parameters in the different tabs of the card
configuration page.
The configuration tabs of the card configuration window vary with the card
types. Please configure the card according to the actual project requirements.
See Configuration Guide and Card Configuration Parameter Reference of the
equipment for detailed instruction.
3.
Right-click the blank area of the card configuration page or click the buttons at
the left part of the page to perform the following operations, as shown in
Table 6-8.
6-14
Version: A
6 Configuration Management
Table 6-8
Button
Write config
(GUIDatabase)
Write config
(DatabaseDevice)
Description
equipment.
-
Write config
(GUIDevice)
equipment.
Read config
(DatabaseGUI)
to the GUI.
Reads the configuration data on the
Read config
(DeviceGUI)
database.
-
Read config
(DeviceGUI block
read)
Configuration Check
Expand
Collapse
Version: A
6-15
Table 6-8
Button
Description
Users should save the data to the database
after the card configuration. Then read the
database and click this item, users can
Undo
Redo
Task Pane
6.7.2
Note:
This operation only modifies the configuration data in the database and
does not deliver the data to the equipment.
Procedure
1.
2.
Select the source card and the target card in the Operational Tree pane, and
click
6-16
Version: A
6 Configuration Management
3.
Click the row of the source card, right-click anywhere in the tab and select
Select Current Card as Copy Source from the shortcut menu. The Current
Operation column in the Copy Board Config tab displays Copy Source.
4.
In the right part of the Copy Board Config tab, select the configuration block to
be copied in the Sub Config Block pane and click Start Copying.
5.
In the Batch Modification Config alert boxes that appear, click Yes. Then click
OK in the OTNM2000 alert box that appears subsequently.
6.
6.7.3
Version: A
6-17
Procedure
1.
Figure 6-10
2.
According to the prompts, confirm the command is correct and click OK. The
command will be delivered to the equipment.
6.7.4
Background Information
The card status includes the basic card information (such as card number, software
version, activation status) and special status items. Different cards have different
status items.
Procedure
1.
Double-click the NE in the Logical Tree pane and click the corresponding card
in the subrack view. Click STATUS in the Task Panel pane at the right side of
the GUI to open the card status page, as shown in Figure 6-11.
6-18
Version: A
6 Configuration Management
Figure 6-11
Note:
For the EMU card, you need to click STATUS, EMU_STATUS,
EMU_BCT_ADDR, EMU_BCT_DATA, EMU_NE_NETWORK and
EMU_NE_CONFIG_TIME on the Task Panel respectively to open the
corresponding status tabs.
2.
Version: A
Check the current status information of the card in the card status page.
6-19
6.7.5
Procedure
1.
Select the access method described in Table 6-9 to access the Card Config
Timing Synchronization tab.
Table 6-9
Operation
Access Method
Select ConfigurationCard Config Timing Synchronization in the
Synchronizing the
main menu.
Card Configuration
2.
Select the desired object in the Operational Tree pane and click Add, or rightclick anywhere of the Card Config Timing Synchronization tab and select
Add from the shortcut menu to open the Add dialog box, as shown in
Figure 6-12.
6-20
Version: A
6 Configuration Management
Figure 6-12
3.
See Table 6-10 for setting related parameters of the scheduled synchronization
task of card configuration.
Table 6-10
Parameter
Task Name
Task Enable
Task Type
Basic
setting
Sets the task time only when the Timing Run is selected for the
task type.
Task Time
The Begin Time and the End Time are optional setting items
Setting
and used to set the time range of the scheduled task. The
Running Time is the compulsory item used for setting the time
for running the scheduled task.
Version: A
6-21
Table 6-10
Parameter
Sets the task period only when the Timing Run is selected for
the task type.
Sets the period of executing the task and there are two types
including Day and Week.
Task Period
Sets the time interval in the Interval (Day) text box when the
Day is selected for the Task Period.
4.
Click OK and then view the added card configuration synchronization task in
the Card Config Timing Synchronization.
5.
(Optional) To modify a task, select the task and click Modify, or right-click the
desired task and select Modify from the shortcut menu. See Table 6-10 to
modify the parameters and click OKTable 6-10.
6.
(Optional) To delete a task, select the task and click Delete, or right-click the
desired task and select Delete from the shortcut menu. Then click OK in the
displayed dialog box.
6.8
Managing NE Software
The following introduces the related functions of managing NE software.
6.8.1
Prerequisite
6-22
Version: A
6 Configuration Management
Background Information
u
When the IPRAN and POTS equipment downloads the software via this
function, the new software will be enabled promptly.
When other equipment downloads the software via this function, the time for
enabling the software needs to be set. This function should be used together
with the card software delay enabling function.
Procedure
1.
Select the path in Table 6-11 to bring up the Open dialog box.
Table 6-11
Configuration Item
Access Method
Select Management ToolCard ManagementSoftware
Download in the Operational Tree pane. Then select the desired
card in the lower part of the Operational Tree pane and drag it to
Downloading Software
2.
Select the upgrade package in the Open dialog box and click Open and the
card to be upgraded appears in the left side of the Software Download tab.
Version: A
6-23
3.
Select the card in Software Download tab and right-click the blank area of tab,
select Software Download / Force Software Download from the shortcut
menu.
Note:
When selecting Software Download, the system will deliver the selected
software only when it is the later version of the card software on the
equipment. Otherwise the system will reject the delivering request.
4.
6.8.2
6-24
Version: A
6 Configuration Management
Prerequisite
You have downloaded the new version of card software.
Procedure
1.
2.
Select the corresponding card in the lower part of the Operational Tree pane
and click
3.
Select the corresponding card in the Apply the card software later tab and
right-click anywhere in the tab to perform the following operations:
Select Set starting board software time, configure the time in the Card
software restart time setting box and click OK.
After configuration, the User Setting Enable Time of the corresponding
card on the tab shows the configured time. If the configuration is
successful, the displayed Equipment Enable Time is the same as the
User Setting Enable Time. If the configuration fails, the Equipment
Enable Time shows the configured time is invalid. Users should check the
configured starting time and see whether it is incorrect.
Select Apply the card software right now to set the enabling time as the
current time plus 3 seconds.
Note:
If you fail to select Start board software immediately, please check
whether the EMS time is consistent with the NE BCT time. If not, solve
the problem via NE time calibration.
Operation Result
After successfully configuring the card software enabling time, the system will
enable the new version of card software at the configured time.
Version: A
6-25
6.8.3
Background Information
Only the POTS NE supports the FTP setting function.
Procedure
1.
2.
Select a POTS NE and set the related parameters of the FTP server in the FTP
Setting window.
The IP address of the FTP server: Enter the IP address of the OTNM2000
server which is the actual FTP server.
3.
Click Write FTP Setting... and click OK in the dialog box that appears.
4.
(Optional) Select a POTS NE and click Read FTP Setting... to check whether
the FTP settings of the corresponding NE are correct.
6-26
Version: A
6 Configuration Management
6.8.4
Procedure
1.
Figure 6-13
2.
Select the card of the equipment at the left side of the GUI and click Import
Boar....
2)
to select
6-27
3)
Confirm that the selected card is correct and click Imported into the
software library, as shown in Figure 6-14.
Figure 6-14
4)
Click the cross button at the top right corner of the Single disk software
set to close the Single disk software set dialog box.
5)
6-28
Version: A
6 Configuration Management
Figure 6-15
3.
Select the card of the equipment at the left side of the object tree and
select the row where the software is located at the right side of the pane
and click Export Boar.....
2)
Select the path to export the software in the Save as dialog box that
appears and enter the file name. Click Save.
4.
2)
Enter the key word of the card software and click Search.
If the corresponding software exists, the result will display at the right
side of the Single disk software set dialog box.
If the corresponding software does not exist, the OTNM2000 alert box
appears, prompting Can't find the matched object!.
5.
Version: A
6-29
6.8.5
NE Software Download
Users can manage the software and data of the NE, back up the NE data and
upgrade / downgrade the NE software via the NE software download.
Background Information
Only the IPRAN and POTS NEs support the function of NE software download.
Procedure
1.
2.
6-30
Version: A
6 Configuration Management
Note:
u
Click Ftp-IP Setting to open the Ftp-IP Setting dialog box and set
the IP address of the FTP server.
3.
Note:
The NE data should be backed up before upgrading / downgrading to
avoid data loss or damage caused by the upgrade / downgrade failure of
NE software.
1)
2)
3)
4)
4.
Download NE Software.
1)
Version: A
6-31
2)
behind
the "File path" textbox, select the corresponding file and click Import Into
Software Library.
3)
In the NE software set dialog box, click before the NE name to expand
and view the corresponding software of the NE in the software library.
4)
5)
6-32
Version: A
6 Configuration Management
6)
In the Set Time dialog box, set the start time for downloading the NE
software and click OK.
7)
in the Reboot
8)
Set the reboot time of the card in the Set Time dialog box and click OK.
Caution:
The card software is forwarded to the other cards by the EMU card via
the FTP server. When the EMU card software download is completed
and restarted but the other cards' software is not completed downloading,
the download of the other cards' software fails. If the delivered cards
include the EMU card, users should set the reboot time of the EMU card
with care.
Version: A
6-33
9)
6.9
NE Communication
The following introduces the functions related to NE communication.
6.9.1
Pinging the NE
Check whether the communication between the OTNM2000 and an NE is normal.
Procedure
1.
Right-click the desired NE in the Logical Tree pane to perform the following
operations:
For OTNM2000 server end, select Ping from the shortcut menu to open
the ping window.
2.
6-34
Version: A
6 Configuration Management
Figure 6-16
6.9.2
SSH
SSH is a secure remote login protocol developed based on the traditional Telnet
protocol. It greatly enhances the security in terms of authentication mode and data
transmission.
Procedure
1.
Right-click the NE in the Logical Tree pane and select SSH (IP address) from
the shortcut menu.
2.
Version: A
Click Yes in the displayed alert box to open the command line interface (CLI).
6-35
3.
Enter the login name and password (both are root by default) on the CLI and
press Enter.
4.
6-36
Version: A
6 Configuration Management
6.9.3
Telneting the NE
Procedure
1.
Right-click the NE in the Logical Tree pane or in the logical view and select
Telnet from the shortcut menu. Then configure the NE via the CLI in the
displayed dialog box.
6.10
Procedure
1.
Version: A
6-37
Figure 6-17
The Optical Cable Router Setting dialog box includes two list boxes.
The Optical Cable Information list box displays the optical cables in the
project and is entered by users.
The Identical Router Information list box displays the actual routing
information in the project and is entered by users. The optical cable
information is imported from the Optical Cable Information list box.
2.
In the Optical Cable Information list box, click Edit to open the Optical
Cable Settings window.
6-38
Version: A
6 Configuration Management
2)
In the Optical Cable Settings window, click Add and enter the cable
information in the displayed Add dialog box. Then click OK to save the
settings.
Version: A
6-39
3)
(Optional) In the Optical Cable Settings window, click Search and enter
the cable information in the displayed Search Content dialog box. Then
click OK to search for the desired cable.
4)
(Optional) Select the corresponding optical cable and click Delete to delete
the selected optical cable information.
5)
6)
7)
(Optional) Click Import to import the optical cable information from the
CSV file.
3.
Set the same-route information. The procedure for setting the same-route
information is same as Set the optical cable information.
4.
2)
Click Next. The Identical Router Information pane changes to the Fiber
and Optical Cable Comparison Table pane.
3)
Select the optical cable in the Optical Cable Information list box
according to the actual project and select the corresponding optical fiber
information in the Fiber And Optical Cable Comparison Table list box.
Click
fiber information.
Note:
Isolate the corresponding optical fiber and cable promptly via the Search
Fib function at the bottom of the Fiber And Optical Cable Comparison
list box.
4)
to delete the
6-40
Version: A
6 Configuration Management
5.
Click Finish to save the information in the Optical Cable Router Setting
dialog box and then click Yes in the displayed alert box.
Note:
If the incorrect information exists in the Optical Cable Router Setting
dialog box, the system will bring up the Configuration data is incorrect
alert box. Users can modify according to the prompt message.
6.11
Procedure
1.
2.
to open the
Select the NE, right-click anywhere in the tab and select Set the Selected
Nodes to Be Not Setup from the shortcut menu. The Set or not? column of
the selected NE is No, as shown in Figure 6-18.
Figure 6-18
Version: A
6-41
Operation Result
The status alarm indicator of the NE is
6.12
Figure 6-19
2.
6-42
In the Backup DCG File dialog box, click Add to open the Add dialog box.
Version: A
6 Configuration Management
2)
In the Add dialog box, enter the relevant information and click Run. The
backup task is added to the Backup DCG File dialog box.
3)
(Optional) Select the corresponding task and click Modify to modify the
selected task.
Version: A
6-43
4)
(Optional) Select the corresponding task and click Delete to delete the
selected task.
5)
(Optional) Select the backup task that has executed backing up files, click
Task Result Files to open the File Result List. Select the desired backup
file, click Save As and select the saving directory. You can go to the
specified directory to view the DCG file.
6)
(Optional) Select the corresponding task and click View Log to query the
task logs.
6-44
Version: A
Version: A
7-1
PTN/IPRAN
POTN/PE-OTN
SDH/MSTP
Service Template
Routing Template
Service Global Settings
7-2
Version: A
Version: A
7-3
7.1
PTN/IPRAN
The following introduces the service configuration GUI and parameters of the PTN/
IPRAN device.
The PTN/IPRAN configuration item contains multiple circuit configurations, service
configurations and protection ring configurations, as shown in Figure 7-1.
Figure 7-1
7.1.1
Tunnel
The following introduces the Tunnel configuration GUI and related parameters.
Configuration GUI
1.
Set the basic attributes of the static / dynamic tunnel, including the name, type,
direction, etc.
7-4
Version: A
Version: A
7-5
Note:
For description of the LSP template configuration, see Service Template.
2.
Set the source / sink nodes, source / sink ports of the static / dynamic tunnel
and BFD. See Table 7-3.
7-6
Version: A
3.
Set the routing policy and intermediate route constraints of the static / dynamic
tunnel. See Table 7-4.
Version: A
7-7
4.
7-8
Version: A
5.
Confirm the pre-created protection circuit. See Table 7-6. Compared with the
Precreate circuit pane, this pane contains an extra Revert Properties group
box.
Version: A
7-9
6.
Configure the working path and protection path when the BFD or Proactive
OAM is enabled. See Table 7-7.
7-10
Version: A
Table 7-1
Item
Use VLAN Sub-interface
Description
It is not selected by default. It should be checked when the VLAN
sub-interface is to be used.
Path Name
Signaling
Static / Dynamic
u
Protection
No Protection
Path
Tunnel
Grooming
EXP
EXP Value
Version: A
No Protection
Bidirectional / Unidirectional.
u
Primary
Bypass
Secondary
Secondary auto
assign
mapping
The elsp supports setting the EXP priority. Value range: 0 - 15.
7-11
Table 7-2
Item
Description
Bandwidth
Disable
CIR (M)
PIR (M)
CBS
PBS
Description of static / dynamic tunnel settings (source/ sink node, source / sink
port, and BFD).
Table 7-3
Description of Static / Dynamic Tunnel Settings (Source/ Sink Node, Source / Sink
Description
Source / Sink LSP
Preset Label
Forward
Reverse
Positive Label+1
The Bidirectional Forwarding Detection
(BFD) protocol is a high-speed
independent Hello protocol. When
Enable BFD is selected, the devices
Enable BFD
Enable BFD
Local / Remote
7-12
Version: A
Table 7-3
Description of Static / Dynamic Tunnel Settings (Source/ Sink Node, Source / Sink
Description
Enable Proactive OAM and Enable
Auto Allocate
Tunnel ID
Reverse
Table 7-4
Route Constraints)
Item
Description
Enable CSPF
Strict Routing
Routing Policy Settings
Static Policy
Min. NE Quality
Minimal Length
Lowest Cost
Load Balance
Routing Constraint
Operation
Constrained to Positive
Constrained to Reserve
Version: A
7-13
Table 7-4
Description
Configures the NE, Pass LAG Port,
tunnels.
Table 7-5
Item
Description
Precreate circuit
Route Info
Activate Immediately
This item is available only for the tunnel with the No Protection
after Creation
type.
Search Routing
Template by Manual
It is selected by default.
Routing
Advance Property
Click
Setting
tunnel.
Table 7-6
Item
Description
Revert Type
Revert Properties
WTR (m)
7-14
Version: A
Table 7-6
Item
Description
This item is available only when the
Revert Type is set to Return.
Hold-off Time (10ms)
Table 7-7
OAM is enabled)
Item
Description
APS Enable
CV Frame Enable
CV Frame Sending
Period
7.1.2
PW
The following introduces the PW configuration GUI and related parameters.
Configuration GUI
1.
Set the basic attributes, including dynamic / static PW name, type, Tunnel
selection policy and BFD. Then select the source / sink node, ingress / egress
label and next-hop. See Table 7-8.
Version: A
7-15
2.
Select the lower-level tunnel that carries the PW to complete the creation of PW.
See Table 7-9 and Table 7-10.
7-16
Version: A
Note:
For creating the PW template, see Service Template.
Description of GUI Parameters
u
Table 7-8
Item
Description
Selects this option when configuring multiple
Multiple PW
PWs.
VC ID
PW Basic
PW Name
Properties
Version: A
7-17
Table 7-8
Item
Description
VC Type
Tunnel Policy
Signaling
Ethernet
vlantag
no lsp
tunnel
ldp lsp
policy
Static / Dynamic
PW Protection
Network Type
Primary
Secondary
Spoke
Mesh
Source
Sink
Forward
Source / Sink
Node Properties
Reverse
Next Hop
BFD Settings
Table 7-9
7-18
Item
Description
Tunnel Policy
In the Select the Service Layer (LSP) box, select the tunnel that
(LSP)
Set Advanced
Click
Version: A
Table 7-10
Item
Description
u
Mode
Dropping PolicerProfile
QoS
u
CM
Properties
CIR
PIR
CBS
PBS
Policy
PHB to
TMC/TMP EXP
Mapping
Assign
EXP
PHB2EXP_ID
Version: A
Assign EXP
Value range: 0 - 7.
When the policy is set to Assign EXP, specify
the EXP value of the PW.
When the policy is set to PHB to TMC/TMP
EXP, specify the preset PHB2EXP table ID
that the PW bases on.
7-19
Table 7-10
Item
Description
Policy
Select PHB
Select
Mapping
PHB
EXP2PHB_ID
Template Application
7.1.3
Click
L2VPN Service
The following details the L2VPN configuration GUI and related parameters.
Configuration GUI
1.
7-20
Version: A
2.
When the service type is set to E-LINE, configure the source / sink NEs
and ports. See Table 7-12.
Version: A
7-21
When the service type is set to E-LAN or E-TREE, configure the source /
sink NEs and ports. See Table 7-13.
7-22
Version: A
When the service type is set to E-CES, configure the source / sink NEs
and ports. See Table 7-14.
Version: A
7-23
When the service type is set to E-Nto1, configure the node NE and port of
the N:1 group service. See Table 7-15.
7-24
Version: A
3.
Version: A
7-25
Select the lower-level PW circuit that bears the E-LAN, E-TREE or ENto1circuit.
a)
7-26
Version: A
b)
Version: A
7-27
c)
7-28
Version: A
Version: A
7-29
4.
7-30
Set the circuit virtual interface, UNI port and NNI port properties of the service.
Version: A
Table 7-11
Item
Description
Service Name
Client Info
Port Rate
Service Type
Direction
Protection
The circuit source / sink configuration parameters of the E-LINE service are
described in the following table.
Table 7-12
Service
Item
Description
u
Caution:
For the User to User service, you can select only
one node and two UNI ports.
Constraints
Sets the routing constraints when selecting the PW. The source
and sink NEs cannot be selected as the constrained NEs.
7-32
Version: A
Table 7-13
TREE Service
Item
Description
u
Caution:
For the User to User service, you can select only
one node and two UNI ports.
After selecting the NE, select the Set PW Filter option and set the
Other Settings
The circuit source / sink configuration parameters of the CES service are
described in the following table.
Table 7-14
Item
Description
Bandwidth Type
Source / Sink NE
Constraints
The node NE and port configuration parameters of the N:1 group service are
described in the following table.
Version: A
7-33
Table 7-15
Item
Description
u
and Port.
u
Other Settings
After selecting the NE, select the Set PW Filter option and set the
routing constraints for the PW circuit that bears the E-Nto1 service.
Note 1: For the E-Nto1 service with no protection, the first NE is the root node by default.
Note 2: For the E-Nto1 service with protection, the first two nodes are the active / standby
nodes by default.
7.1.4
L3VPN Service
The following details the L3VPN Service configuration GUI and related parameters.
Configuration GUI
1.
7-34
Version: A
2.
Set the network topology of the L3 VPN and the selection policy for the tunnel
that bears the VPN.
Version: A
7-35
3.
Select the tunnel that bears the L3 VPN and the VPN FRR settings.
7-36
Version: A
Table 7-16
of the L3 VPN
Item
Description
Service Name
Signaling Type
RD/RT Format
Basic Properties
RD Value
Static
Dynamic
AS: Number
IP: Number
Egress Label
NE
Interface and
Port
Ingress RT Value
Ingress / Egress
RT
7.1.5
ATM Service
The following details the ATM Service configuration GUI and related parameters.
Configuration GUI
1.
Version: A
7-37
2.
7-38
Version: A
3.
Version: A
7-39
The ATM service cross-connect settings are described in the following table.
Table 7-17
Item
Description
Link Enable
Enable / Disable.
Link Mode
Number of Encapsulated
Signaling Cells
7.1.6
VCC1:1
VPC1:1
N:1
AAL5
Group Service
The following details the Group Service configuration GUI and related parameters.
7-40
Version: A
Configuration GUI
1.
7.1.7
Configure the combination service bridging the L2VPN and the L3 VPN.
Protection Ring
The following introduces the Protection Ring configuration GUI and related
parameters.
Version: A
7-41
Configuration GUI
1.
7-42
Version: A
Caution:
When the ring type is set to Ring_Wrapping_V1, Ring_Wrapping_V2 or
Ring_Sterring, check Cross-EMS. The hidden Cross-EMS Properties
combo box appears under the Basic Properties, as shown in the figure
below:
2.
Version: A
7-43
7-44
The basic properties of the protection ring are described in the following table.
Version: A
Table 7-18
Item
Description
Ring_Wrapping_V1
Ring_Wrapping_V2
Ring_Wrapping_V3
Ring_Sterring
MSRPRing
DNI PW Protect
Ring Type
Ring Name
User Label
Revert Type
WTR (m)
Indicates the time needed for the service to restore from the
protection path to the working path.
This item is available only when the Revert Type is set to Return.
In case of working channel failure, the service will switch after the
hold-off time.
APS Enable
Version: A
Enable / Disable.
7-45
7.1.8
VRRP Configuration
The VRRP indicates the Virtual Router Redundancy Protocol. In normal status, the
active router undertakes the forwarding task while the standby routers are in
monitoring status. Once the active route fails to work, one of the standby routers in
the virtual router will be selected as the new active router according to the priority.
This new active router continues to forward data for the network host.
Configuration GUI
For setting the VRRP parameters, see Table 7-19.
7-46
Version: A
Item
Description
Sets it according to the data planning.
Virtual Router ID
Virtual IP
Address
router.
VRRP
Announcement
VRRP messages.
Interval (s)
Interval (m)
Delay
Preemption Time
IPRAN VRRP
Basic
Config
Properties
(s)
Priority
Reduction
Enable BFD
VRRP Mode
VRRP Session
Enabling /
Disabling
Version: A
7-47
Table 7-19
Item
Description
Active / Standby
Track ID
Active / Standby
VRRP Router
Active /
Batch Rule
Settings
7.1.9
Standby
Active / Standby
Router
VRRP Port
Active / Standby
Monitor Port
standby router.
Signaling
Declaration Port
Configuration GUI
For description of the parameters on the Quickly Create Tunnel window, see
Description of GUI Parameters in Tunnel.
7-48
Version: A
7.1.10
Configuration GUI
1.
Configure the Ethernet service and PW. For the description of the parameters,
see Description of GUI Parameters in L2VPN Service and PW.
Version: A
7-49
7-50
Version: A
7.2
POTN/PE-OTN
The following introduces the POTN/PE-OTN configuration item in the Service
Configuration tab.
The POTN/PE-OTN configuration item contains multiple channel configurations,
protection ring configurations and service configurations, as shown in Figure 7-2.
Version: A
7-51
Figure 7-2
7.2.1
Optical Channel
Click Business ConfigurationPOTN/PE-OTNOptical Channel to open the
configuration GUI, as shown in Figure 7-3.
7-52
Version: A
Figure 7-3
Multi-Service Configuration
Auto Create All OCH Circuit: This button can be used to automatically generate the
OCh circuits of the entire network, without the need of manual configuration.
Circuit Properties
Circuit Code: Configures the circuit numbering assigned when configuring the OCh
channel.
Circuit Name: Sets a name for the Och channel.
Version: A
7-53
Connection Type:
u
Path Direction:
u
Port Type (2.5G, 10G, 40G and 100G): Selects the corresponding rate according to
the card port. If the port selected is inappropriate, the desired card and port cannot
be found in the configuration GUI of next step.
Protection Type (No Protection, SNCP OCh 1+1, SNCP OCh m:n and Card 1+1
Protection): Select the desired protection type. After the protection is selected, the
Protection Parameters are available.
Protection Parameters
Protection Mode:
u
7-54
Version: A
Return Type:
u
Return: In case failures of working channel, the service will switch to the
protection channel. Once the working channel restores, the service will
automatically switch back to the working channel after the time period specified
in WTR Time.
Non Revertive: In case failures of working channel, the service will switch to the
protection channel and will still runn in the protection channel even if the
working channel restores.
Hold-off Timing: In case of working channel failure, the service will conduct
switching after the hold-off time.
WTR Time: Indicates the waiting time for the service to switch from protection
channel to the working channel once the working channels restore from the failure.
Alarm Monitor Type: Sets the monitoring type that triggers switching.
u
SNCP/I: Indicates the inherent monitoring. The triggering conditions include the
OCh layer alarms, such as card disabling, optical signaling loss, and the SM
section overhead alarm.
OCh: The triggering conditions include the OCh layer alarms, such as card
disabling, optical signaling loss, and the overhead alarms of the SM and PM
sections.
User Properties
Client Name: Sets the username for the channel, which provides convenience for
maintenance.
User Label: Sets the user label for the channel, which provides convenience for
maintenance.
Version: A
7-55
Figure 7-4
7-56
Selecting SPC
Version: A
Figure 7-5
Protection Type:
u
1+1 Trail Protection: ASON calculates the active and standby routes from the
source end to the sink end for the service. When this protection is selected,
Return Type can be set to No Recovery, Re-routing Restoration or
Permanent 1+1.
Dynamic Re-routing: When the route that the service uses fails, ASON will
dynamically find other available route. When this protection is selected, Return
Type can be only set to Re-routing Restoration.
Return Type: Selects different return types according to the Protection Type.
Routing Policy: Indicates the policy adopted by the service for first routing. Options
are Min NE Quantity, Min Link Cost and Load Balance.
Re-routing Policy: Indicates the policy adopted for re-routing when the current route
fails. Options are Min NE Quantity, Min Link Cost and Load Balance.
Version: A
7-57
Node Unrelated / Link Unrelated / SRLG: When Protection Type is set to 1+1 Trail
Protection, you can set the irrelevance of the active / standby route.
u
Link Unrelated: The active and standby routes have no coincident links. The
calculation method is same as "Node Unrelated".
SRLG: The active and standby nodes are in the same shared-risk link group.
The calculation method is the opposite to "Node Unrelated".
CrankBack: When the control plane performs routing according to the routing policy,
it will feed back the prompt information upon node failure or insufficient resource
and perform re-routing until no resources are available.
Prevent Mis-deletion: In project application, once the channel is deleted by mistake
due to the signaling network, the system will lock the resources of the channel to
prevent deletion of the services by mistake.
Make before break: In case that a route passes multiple nodes and one of its SPC
channels fails and is disconnected, the rest SPC channels will be released and
used promptly.
Revert Delay: When the revert delay is configured, the system will start the
protection switching of the corresponding layer after the delay set here once the
protection switching trigger condition is deleted.
Reserve Priority: Indicates the priority level for obtaining the resources. Value range:
0 - 7. The smaller the value is, the higher the priority level is.
Setup Priority: Indicates the priority level for keeping resources. Value range: 0 - 7.
The smaller the value is, the higher the priority level is.
Recovery Priority: Indicates the priority for the service to restore when passing the
same failed link. Value range: 0 - 255. The smaller the value is, the higher the
priority level is.
M: N Priority: Indicates the M:N priority.
M:N ID: Indicates the M: N ID.
7-58
Version: A
Opto-electrical Protection Hold-off Time: Indicates the hold-off time for the protection
and restoration of the optical and electrical layers.
7.2.2
ODUk Channel
Click Business ConfigurationPOTN/PE-OTNODUk Channel to open the
configuration GUI, as shown in Figure 7-6.
Figure 7-6
Auto Create: In case the circuits of the same ODUk level use the same OCh port,
you can select Auto Create to create ODUk channels in a batch manner.
As Server Layer of LSP:
Batch Configuration, not support rollback to modify:
Low Order Cross:
Single NECross:
Version: A
7-59
Circuit Properties
ODUk Level: Sets the service type used by the port of the source / sink NE line
interface card.
Circuit Code: Sets the circuit numbering assigned when configuring the ODUk
channel.
Circuit Name: Sets a name for the ODUk channel.
Path Direction:
u
Protection Info
Protection Type (No Protection, SNCP ODUk 1+1, SNCP ODUk m:n and ETH
Protect over ODUk): Selects the desired protection type. After the protection is
selected, other parameters under Protection Info are available.
Protection Mode: See the related configuration in Optical Channel.
Revert Type: See the description of Revert Type in Optical Channel.
Hold-off Time: See the description of Hold-off Time in Optical Channel.
WTR Time: See the related configuration in Optical Channel.
Monitor: See the related configuration in Optical Channel.
User Properties
Client Name: See the related configuration in Optical Channel.
User Label: See the related configuration in Optical Channel.
7-60
Version: A
7.2.3
Figure 7-7
Circuit Properties
Low Order Cross: See the related configuration in ODUk Channel.
Single NECross: See the related configuration in ODUk Channel.
Batch Configuration, not support rollback to modify: See the related configuration in
ODUk Channel.
Service Type (GE, GE_GFP_T, FE, ESCON, FICON, DVB, HDTV(1485M), EPON,
GPON or HD_SDI): Selects the service type of client-side port of the source NE
tributary interface card.
Version: A
7-61
Circuit Code: Sets the circuit numbering assigned when configuring the client
service channel.
Circuit Name: Sets a name for the client service channel.
Path Direction:
u
Connection Type:
u
Protection Type (No Protection, Extra Service, Tributary 1+1 Protection, Optical
Channel 1+1 Wavelength Protection and 1+1 Protection In Card): Select the
protection type according to your actual situation.
User Properties
Client Name: See the related configuration in Optical Channel.
User Label: See the related configuration in Optical Channel.
7-62
Version: A
7.2.4
Figure 7-8
Basic Information
ODUk Level: See the related configuration in ODUk Channel.
Protection Group Name: Sets a name for the ODUk protection group.
Protection Info
Protection Type (SNCP ODUk 1+1, SNCP ODUk m:n): Selects the desired
protection type.
Protection Mode: See the related configuration in Optical Channel.
Revert Type: See the description of Revert Type in Optical Channel.
Hold-off Time: See the description of Hold-off Time in Optical Channel.
WTR Time: See the related configuration in Optical Channel.
Version: A
7-63
7.2.5
Figure 7-9
Protection Parameters
Return Type: See the related configuration in Optical Channel.
7-64
Version: A
7.2.6
Figure 7-10
Protection Parameters
Return Type: See the related configuration in Optical Channel.
Hold-off Timing: See the related configuration in Optical Channel.
Version: A
7-65
7.2.7
Tunnel
For the description of the Tunnel configuration GUI and related parameters, see
Tunnel in the PTN/IPRAN configuration item.
7.2.8
PW
For the description of the PW configuration GUI and related parameters, see PW in
the PTN/IPRAN configuration item.
7.2.9
L2VPN Service
For the description of the L2VPN configuration GUI and related parameters, see
L2VPN Service in the PTN/IPRAN configuration item.
7-66
Version: A
7.2.10
L3VPN Service
For the description of the L3VPN configuration GUI and related parameters, see
L3VPN Service in the PTN/IPRAN configuration item.
7.2.11
Group Service
For the description of the Group Service configuration GUI and related parameters,
see Group Service in the PTN/IPRAN configuration item.
7.2.12
Ring Protection
The Ring Protection window under POTN/PE-OTN has the extra ERPS
protection ring configuration item, compared with the Protection Ring under PTN/
IPRAN. The ERPS indicates Ethernet Ring Protection Switching, which is ring
network protection protocol developed by International Telecommunication Union
(ITU), also called G.8032. It is a link layer protocol, specially applied to the Ethernet
ring network. This protocol can prevent broadcast storm caused by data loopback
when the Ethernet ring network is complete and quickly restores the communication
among nodes on the ring network when the previous link is disconnected.
For the description of the Ring Protection configuration GUI and related
parameters, see Protection Ring under the PTN/IPRAN configuration item.
7-67
7.2.13
7.3
SDH/MSTP
The following introduces the service configuration GUI and parameters of the SDH /
MSTP device.
7.3.1
Circuit
The following introduces the Circuit configuration GUI and related parameters.
7-68
Version: A
Configuration GUI
1.
Set the basic properties of the circuit, including the connection type, direction,
bandwidth and protection type. For detailed configuration of the parameters,
see Table 7-20 and Table 7-21.
u
Version: A
7-69
When the connection type is set to SPC, the configuration GUI is as shown
below:
7-70
Version: A
2.
Version: A
Set the source / sink NEs and source /sink ports of the circuit working path.
7-71
3.
Set the routing constraints to perform routing for the working path.
4.
Display the information of the working route. You can manually modify part of
all routes of the working path.
7-72
Version: A
Table 7-20
Item
Description
u
Connection Type:
Properties
Path Direction
Circuit Type
Bandwidth Type
Cascade Type
Concatena-
tion
Parameters
Concatenation
Real Concatenation.
Concatenation levels include: VC4_4, VC4_16 and VC4_
64.
Circuit Info
Client Name
Path Name
Path Code
Protection
Protection
Parameters
No Protection
Tunnel Protected
Extra Service
Revert Type
Revert Type
WTR Time
Version: A
7-73
Table 7-20
Item
Description
Hold-off Time
7-74
Version: A
Table 7-21
Item
Description
Protection Type
Return Type
ASON
Parameter
Routing Policy
Settings
Re-routing Policy
Version: A
7-75
Table 7-21
Item
Description
Node Unrelated / Link Unrelated / SRLG: When
Protection Type is set to 1+1 Trail Protection, you can
set the irrelevance of the active / standby route.
u
7-76
Version: A
7.3.2
VCG Channel
The following introduces the VCG Channel configuration GUI and related
parameters.
Configuration GUI
1.
Set or modify the source / sink NEs and source / sink ports of the VCG circuit.
For details, see Table 7-22.
Version: A
7-77
2.
Set or modify the lower-level service circuit of the VCG circuit and then
complete the creation.
The source / sink NEs and ports of the VCG circuit are described in the
following table.
Table 7-22
Item
Description
Source
Cross-EMS
Sink
7.3.3
Source / Sink NE
Port Type
Path Name
Protection Ring
The following introduces the Protection Ring configuration GUI and related
parameters for the SDH / MSTP device.
Configuration GUI
1.
Set the basic properties, such as ring type and return mode. For details, see
Table 7-23.
7-78
Version: A
2.
Specify the start node and link of the ring for routing and then complete the ring
creation.
Version: A
7-79
The basic properties of the SDH / MSTP protection ring are described in the
following table.
Table 7-23
Item
7-80
Description
Basic Ring
Cross-EMS
Properties
Ring
Version: A
Table 7-23
Item
Description
Protection Ring
Protection Ring
WTR Time
SDH 2F MS SPRING
SDH 4F MS SPRING-Working
SDH 4F MS SPRING-Protection
Revert Type
Maximum
Cross-EMS
Node
ring.
Properties
Start Node
Number
7.4
Service Template
The service templates include the LSP template, PW template, L2VPN template,
flow template, proactive OAM template and on-demand OAM template.
In the Template Management window, you can create, modify, delete and copy
templates as well as set a template as the default one.
Configuration GUI
u
Version: A
7-81
7-82
Version: A
Version: A
7-83
7-84
Version: A
7.5
Routing Template
The OTNM2000 supports unified management of tunnel circuits that has generated
routing templates and allows you to Copy, Modify and Delete routing templates.
Configuration GUI
The routing template management GUI is as shown in the following figure. You can
filter the desired template by setting the parameters under Filter.
Version: A
7-85
7.6
7.6.1
Version: A
Configuration GUI
u
The "PTN NE Global Settings" main GUI is as shown in the following figure. For
the configuration of the global variable parameters, see Table 7-24.
Version: A
7-87
Item
APSReturnTime
MaskCode
Mask: 0 - 16.
Port Type
7.6.2
Description
Configuration GUI
Select the entries in the list to enable the global section layer OAM, as shown in the
figure below:
7-88
Version: A
7.6.3
Configuration GUI
Select the entries in the list to enable the global section layer LM, as shown in the
figure below:
Version: A
7-89
7.6.4
7-90
Version: A
Figure 7-11
Version: A
7-91
Figure 7-12
7-92
Version: A
Version: A
Figure 7-13
Figure 7-14
7-93
Figure 7-15
7-94
Version: A
Version: A
Figure 7-16
Figure 7-17
7-95
Figure 7-18
7-96
Version: A
Version: A
Figure 7-19
Figure 7-20
7-97
Figure 7-21
7-98
Version: A
Figure 7-22
7.6.5
Version: A
7-99
7-100
Figure 7-23
Figure 7-24
Version: A
Selecting the NE
Single NE: Configures one NE.
Multiple NE: Configures multiple NEs.
NE (Select an NE): Selects the desired NE. For detailed configuration method, see
Search NE in Merging OTN NEs.
Parameter Configuration
Wave Band: Sets the waveband of the port. You can select the CE, CO, CE+ or CO
+ waveband.
Wavelength: Sets the wavelength of the port. You need to set the waveband before
setting the wavelength.
Interval: It is available for batch configuration. After the interval is set, the
wavelengths of the ports increase in arithmetic progression.
Synchronize Wavelength: Reads the wavelength status from the device and update
the configuration when this item is selected.
Get Status: Reads waveband and wavelength information of the port from the
device card. It is available only when the Synchronize Wavelength option is selected.
Refresh: Updates the configuration to ensure the configuration is consistent with
that on the device in case the configurations are inconsistent. It is available only
when the Synchronize Wavelength option is selected.
Download: Downloads the service properties configured to the device.
Apply: Applies the configuration data.
OK: Saves the configuration.
Cancel: Cancels the configuration.
Version: A
7-101
7.6.6
7-102
Figure 7-25
Figure 7-26
Version: A
Selecting the NE
NE (Select an NE): Select the desired NE. For detailed configuration method, see
Search NE in Merging OTN NEs.
7.6.7
Version: A
7-103
7-104
Figure 7-27
Figure 7-28
Selecting the NE
NE (Select an NE): Select the desired NE. For detailed configuration method, see
Search NE in Merging OTN NEs.
7.6.8
Version: A
7-105
7-106
Figure 7-29
Figure 7-30
Selecting the NE
NE (Select an NE): Select the desired NE. For detailed configuration method, see
Search NE in Merging OTN NEs.
Parameter Configuration
Name: Sets a name for the OTN WSS group.
Remote Node: Set the remote node for the protection group.
OSC Direction: Sets the OSC direction to eastward or westward.
OSC Slot (Card): Sets the slot for the OSC card.
WSSD Slot (Card): Sets the slot for the WSSD card.
WSSM Slot (Card): Sets the slot for the WSSM card.
Remark: Enters the remark information for the protection group.
Apply: Applies the configuration data.
OK: Saves the configuration.
Cancel: Cancels the configuration.
7.6.9
Version: A
7-107
7-108
Figure 7-31
Figure 7-32
Selecting the NE
NE (Select an NE): Select the desired NE. For detailed configuration method, see
Search NE in Merging OTN NEs.
Monitored Port
Displays the status of the monitored port.
Refresh: Refreshes the OTNM2000 configuration.
Download Config: Downloads the OTNM2000 configuration to the device.
Cancel: Cancels the operation.
7.6.10
Figure 7-33
Version: A
7-109
Figure 7-34
Selecting the NE
NE (Select an NE): Select the desired NE. For detailed configuration method, see
Search NE in Merging OTN NEs.
Parameter Configuration
Protection Type: Selects SAPU 1+1 or SAPU 1:n.
WTR Time: See the related configuration in Optical Channel.
Return Type: See the related configuration in Optical Channel.
Apply: Applies the configuration data.
OK: Saves the configuration.
Cancel: Cancels the configuration.
7-110
Version: A
7.7
7.7.1
Note:
In the displayed "Resource Dialog" window, the blue part indicates the
resources of the control plane while the black part indicates the
resources of the OTNM2000. You can select or deselect to divide the
resources of the OTNM2000 and the control plane.
7.7.2
Version: A
7-111
Note:
In the displayed "Resource Dialog" window, the blue part indicates the
resources of the control plane while the black part indicates the
resources of the OTNM2000. You can select or deselect to divide the
resources of the OTNM2000 and the control plane.
7.7.3
7.7.4
7.7.5
7-112
Version: A
7.8
Displaying Routes
During configuring services, you can select the Display Route function. The route
details alert box appears for you to check whether the selected route is in
accordance with the planned route. This section takes the L2VPN service as an
example to introduce the Display Route.
Note:
The Display Route function can be selected only in the process of
configuring the service; otherwise, this function is greyed out.
Configuration GUI
1.
Configure the L2VPN service according to the planning and select the lowerlevel PW circuit that bears the service circuit, as shown in the figure below:
Version: A
7-113
2.
7-114
Version: A
7.9
Options
The Options function enables you to configure Background Initialization
Parameters, Operation Parameter Settings, Menu, Script Comparer and
Display Settings.
Caution:
The parameters in the Options window are set to factory default values.
Please handle with care.
Configuration Access Method
Click Business ConfigurationOptions in the OTNM2000 main menu.
Version: A
7-115
Configuration GUI
The Options window is as shown in the following figure.
7.10
Querying Services
The service query window enables you to view the details of services and allows
you to modify or monitor alarms / performance.
7-116
Version: A
Background Information
The OTNM2000 removes the service query function from the service configuration
function to the Business Management menu. The types of services can be queried
are as shown in the figure below:
Prerequisite
The OTNM2000 has connected to the multi-service management service.
Precautions
This section uses the tunnel as an example. When querying services of other types,
the query procedures are the same except that the contents displayed in the filter
dialog box are different.
Version: A
7-117
Procedure
1.
2.
Enter the filter information in the Tunnel dialog box according to the service
details. as shown in the figure below:
3.
4.
View the details of the service filtered in the Tunnel tab, as shown in the figure
below:
7-118
Version: A
Filter Condition
Area
2
Query Result
Area
service in the list and select corresponding menus from the shortcut
menu to perform related operations.
Service Details
By selecting a service in the query result, you can view the detailed
Area
7.11
Prerequisite
u
The devices or links in the current network have been adjusted and broken
services exist.
Precautions
This section uses querying the broken tunnel as an example. When querying
broken services of other types, the query procedures are the same except that the
contents displayed in the filter dialog box are different.
Version: A
7-119
2)
In the displayed tunnel filter dialog box, enter the filter information and then
click Filter, as shown in the figure below:
7-120
Version: A
3)
Open the Broken Tunnel tab, click any entry and view the relevant
information, as shown in the figure below:
u
Version: A
1)
2)
In the displayed Business object statistics list, click the digit in red of the
Broken Tunnel item, as shown in the figure below:
3)
Open the Broken Tunnel tab, click any entry and view the relevant
information.
7.12
Prerequisite
u
1.
Procedure
menu.
2.
In the displayed Business Management dialog box, click Yes, as shown in the
figure below:
7-122
Version: A
3.
Click OK in the displayed alert box to save the configuration data, as shown in
the figure below:
7.13
Prerequisite
u
The configuration data saved into the database last time are correct.
1.
Procedure
menu.
2.
In the displayed Business Management dialog box, click Yes, as shown in the
figure below:
Version: A
7-123
3.
Click OK in the displayed alert box to read the configuration data, as shown in
the figure below:
7.14
Full Download
The following introduces how to save the NE cross-connect data to the database
and download the NE cross-connect data to the device.
7.14.1
Prerequisite
u
1.
Procedure
In the displayed Business Management alert box, click Yes to open the Save
NE Cross-connect dialog box, as shown in the figure below:
7-124
Version: A
3.
Click Compare the Script to compare whether the new and old scripts are
consistent.
Note:
Whether the new and old scripts are consistent does not influence saving
the NE cross-connect.
4.
Click Compare Board Config to compare whether the card configurations are
consistent.
Note:
Whether the card configurations are consistent does not influence saving
the NE cross-connect.
5.
6.
Click Yes in the displayed Saved to the file successfully alert box, as shown
in the figure below:
Version: A
7-125
7.
7.14.2
Click OK in the displayed Note alert box, as shown in the figure below:
Prerequisite
u
1.
Procedure
In the displayed Business Management alert box, click Yes to open the
Deliver NE Cross-connect dialog box, as shown in the figure below:
7-126
Version: A
3.
Click Compare the Script to compare whether the new and old scripts are
consistent.
Note:
Whether the new and old scripts are consistent does not influence saving
the NE cross-connect.
4.
Click Compare Board Config to compare whether the card configurations are
consistent.
Note:
Whether the card configurations are consistent does not influence saving
the NE cross-connect.
5.
Version: A
7-127
Caution:
1.
2.
If the download still fails after checking Force or Ignore Error and
Continue download, you need to eliminate the failure according to
the error note and perform Step 5 again.
6.
In the displayed Close save/download window alert box, click Yes, as shown
in the figure below:
7.
In the displayed Saved to file successfully alert box, click Yes. An alert box
appears, prompting the configuration data are saved successfully, as shown in
the figure below:
7.14.3
Prerequisite
u
7-128
Version: A
The SDH device and the corresponding NE data have been configured in the
OTNM2000.
1.
Procedure
View the SDH NEs and the corresponding NE cross-connect save status in the
Save NE Cross tab, as shown in the figure below:
Version: A
7-129
Alarm Management
The OTNM2000 network management system provides the alarm management
function of monitoring, displaying, restoring and statistics of the alarm signal. The
alarm management is used in daily maintenance to assist users in finding, isolating
and resolving faults.
Basic Concept
Setting Alarm-related Parameters
Viewing Alarms
Setting the Alarm Template
Handling Alarms
Saving Alarm History Data
Managing the Alarm Filter
Setting Alarm Suppression
Customizing Alarm Levels
Managing Alarm Report
Setting Alarm Audio-video Reminder
Version: A
8-1
8.1
Basic Concept
The alarm is the main information source for knowing about the operating condition
of the network and the fault isolation. Users must master related concept of alarms,
so as to manage alarms effectively.
Alarm Browsing
By viewing alarms, you can understand the running status of the network in a timely
manner. The alarm browsing operation includes viewing the current alarms or alarm
history of projects, network blocks, NEs, cards, channels and services and
refreshing, filtering, confirming and locating these alarms.
u
Alarm Browsing: Views the current alarms and alarm history of related
equipment and services in the OTNM2000 to understand the running status of
the network or equipment.
Manual Confirmation: You can manually confirm the selected alarm in the
current alarm window and add additional information for the alarm, which
will facilitate subsequent query.
Alarm Locating: You can locate the alarm information to NE in the logical tree or
main topology.
Alarm Refreshing: Obtains the newest alarm data from the OTNM2000 alarm
database and display them on the OTNM2000 GUI.
Refresh: Manually obtains the newest alarm data from the OTNM2000
alarm database and displays them on the OTNM2000 GUI.
8-2
Version: A
8 Alarm Management
Auto Refresh: The system automatically obtains the latest alarm data
from the OTNM2000 alarm database every 5 seconds and display them on
the OTNM2000 GUI.
Alarm Help Management: Sets the reason that may trigger the alarm and
general processing principle as well as other related information.
Alarm Indicator Color: The OTNM2000 adopts the color changes of the alarm
indicator to help you quickly locate the alarmed object. By default, the alarm
indicator uses grey to indicate the interruption alarm, red to indicate the critical
alarm, orange to indicate the major alarm, yellow to indicate the minor alarm
and blue to indicate the prompt alarm. You can also customize the color of the
alarm indicator for alarms of different levels.
Alarm Animation: When new alarms of the current project occur, the
OTNM2000 prompts OTNM2000 ALARM! animation which provides
equipment alarms for users for the equipment maintenance in a timely manner.
Alarm Flickering: When an new alarm of an NE occurs, the Main Topology tab
flashes the icon of the NE to prompt the occurrence of the new alarm.
Alarm Sound: The OTNM2000 client end connects to the loudspeaker box to
broadcast different sounds to distinguish alarms of different levels. You can
customize sounds for alarms of different levels. See Setting the Alarm Sound
Reminder.
Remote Alarm Notification: Notifies you of the alarms when you are not on site.
There are two ways of remote alarm notification.
Note:
Alarm remote notification is realized by the SmsAgent software
developed by Fiberhome.
Version: A
8-3
Alarm Level
Alarm levels are used to identify the severity, importance and urgency of the alarms.
The OTNM2000 classifies the alarms into the following four levels in terms of
severity: critical alarm, major alarm, minor alarm and prompt alarm. The alarms of
different levels have different meanings and should be processed differently, as
shown in Table 8-1.
Table 8-1
Alarm Level
Interruption alarm
Meaning
Indicates the alarms on interruption of
network blocks, NEs and cards.
Processing Principle
Processed immediately.
Processed urgently.
Minor alarm
Processed timely.
Processed accordingly.
Alarm Status
Alarms can be divided into different status according to whether the alarm has been
ended or confirmed.
u
Unended and unconfirmed: Alarms are not confirmed and ended by users.
Unended but confirmed: Alarms are confirmed but not ended by users.
Ended but unconfirmed: Locking alarm, alarms are not confirmed but ended by
users.
The switch of alarm status is triggered by the alarm ending and identifying.
8-4
Version: A
8 Alarm Management
Alarm ending refers to the causes of alarm disappear and the NE monitors that
the alarm ends and reports to the network management to refresh the alarm
status.
Alarm Type
Alarms can be divided into five types according to the different causes.
u
Quality of Service (QoS) alarm: Alarms of service status and network QoS.
Current alarm: An alarm that exists and has not been ended in current network
or equipment.
To meet different requirements, the current alarm tab allows you to view the
alarms already ended but unconfirmed.
Version: A
8-5
Any changes to managed objects are called events. The occurrence of events
only indicates the changes to managed objects, not necessarily resulting in
service anomaly.
Alarm Saving
When the alarm history saved in the OTNM2000 exceeds a certain limit, it will
influence the operations performed in the OTNM20000. The alarm saving function
can be used to remove the alarm history data from the database to a specified file,
which improves the running performance of the OTNM2000. The OTNM2000
supports triggering the alarm saving function by the number of records or saving
time.
u
Alarm saving triggered by number of records: You can set the alarm history
threshold and the OTNM2000 will regularly check the alarm history data. When
the alarm history data reach the preset capacity, the OTNM2000 will save the
data to a designated file in the specified time.
Alarm saving triggered by saving time: You can set the saving period (days) of
alarm history data. When the alarm history data saved in the database reach
the preset the time period, the OTNM2000 will save the data to a designated
file in the specified time.
Alarm Indicator
The alarm indicator is composed of the main indicator, frame and prompt icon. The
main indicator of the main topology and logical tree differs from the main indicator of
the subrack and card in that the former displays object types using different icons.
Location
Alarm Indicator
Main Topology
Logical Tree
Subrack
8-6
Version: A
8 Alarm Management
Location
Alarm Indicator
Main indicator: The color of the main indicator depends on the color of the
highest priority level of the unfinished alarms (excluding interruption alarms).
Frame: The color of the frame depends on the color of the highest priority level
of the unconfirmed alarms (excluding interruption alarms).
Prompt icon: Prompts the focused alarm and interruption alarm information. In
case of coexisting of focused alarms and interruption alarm, the defined icon for
focused alarms will be displayed preferentially. If there are no customized
alarms or interruption alarms, the prompt icon will be not displayed.
Note:
The icon for focused alarms is set in the Alarm Report Settings dialog
box according to Setting the Alarm Reporting.
8.2
Procedure
1.
Version: A
8-7
2.
Click the tab name on the left and the corresponding settings appear on the
right. For details, see Table 8-2.
Table 8-2
Tab
Query
Description
Query Condition
Query Condition
Condition
Current Alarm In Front
will end the query thread timed out and clear the
Out
8-8
Version: A
8 Alarm Management
Table 8-2
Tab
Menu Option
Description
Automatically refresh
automatically.
Automatic
Function
Automatically refresh
other current alarm
initial values
Enable Sound
Sound Option
Sound Priority
AVI StartUp
AVI Scrolling
3.
Version: A
Click OK.
8-9
8.3
Viewing Alarms
Network maintenance engineers can know about the network operating status in a
timely manner via viewing the alarm.
8.3.1
Background Information
Alarms are divided into current alarm and alarm history according to their status.
u
Current alarm: An alarm that exists and has not been ended in current network
or equipment.
1.
Select the path in Table 8-3 to open the Current Alarm tab.
Procedure
Table 8-3
Operation
Access Method
Select AlarmCurrent Alarm in the main menu and select the desired
project, network block or NE in the lower part of the Operational Tree pane,
and click
Alarms
Right-click the desired card or shelf in the shelf view or rack view and select
Current Alarm from the shortcut menu.
Select Management ToolAlarm ManagementCurrent Alarm in the
Operational Tree pane, select the desired project, network block or NE in
the lower part of the Operational Tree pane and click
8-10
Version: A
8 Alarm Management
Table 8-3
Operation
2.
In the Current Alarm tab, view the current alarm information of the selected
object, as shown in Figure 8-1.
Figure 8-1
3.
(Optional) Right-click the alarm list title bar to bring up the title bar option list to
select the title to be displayed, as shown in Figure 8-2.
Version: A
8-11
Figure 8-2
Other Operations
In the Current Alarm tab, right-click in the alarm display area and select the
corresponding shortcut menu to refresh alarms, confirm alarms or filter alarms. For
details, see Handling Alarms.
8.3.2
8-12
Version: A
8 Alarm Management
Background Information
Alarms are divided into current alarm and alarm history according to the time of
occurrence.
u
Current alarm: An alarm that exists and has not been ended in current network
or equipment.
1.
Select the path in Table 8-4 to open the Alarm History tab.
Procedure
Table 8-4
Operation
Access Method
Select AlarmAlarm History in the main menu, select the desired
project, network block or NE in the lower part of the Operational Tree
pane, and click
Right-click the desired project, network block or NE in the Logical Tree tab
and select Alarm History from the shortcut menu.
Right-click the desired card or shelf in the shelf view or rack view and
Viewing the alarm
history
2.
View the alarm history information of the selected objects in the Alarm History
tab, as shown in Figure 8-3.
Version: A
8-13
Figure 8-3
3.
(Optional) Right-click the alarm list title bar to bring up the title bar option list to
select the title to be displayed, as shown in Figure 8-4.
8-14
Version: A
8 Alarm Management
Figure 8-4
Other Operations
In the Alarm History tab, right-click anywhere in the tab and select the
corresponding shortcut menu to refresh, confirm or filter alarms. For details, see
Handling Alarms.
8.3.3
Version: A
8-15
Procedure
1.
Select SecurityView Report Event in the main menu to open the Report
Event tab and view the events related to the ASON equipment.
2.
(Optional) Right-click any area in the Report Event tab and select Query
Condition from the shortcut menu to set the reporting time range of the events
and click Query to display the reported events in the specified time range.
Note:
You can select SystemNetwork Status Monitor in the main menu and
click Event in the Network Status Monitor tab to view the information of
related events.
8.3.4
Procedure
1.
Select AlarmHouse-keeping Alarm in the main menu to open the Housekeeping Alarm window.
2.
Right-click Network in the left pane of the window and select Add NE Group
from the shortcut menu.
3.
Enter the NE group name in the Add NE Group dialog box that appears and
click OK.
4.
Drag the corresponding NE in the Logical Tree pane to the NE group in the
House-keeping Alarm window.
8-16
Version: A
8 Alarm Management
Note:
u
Users can drag the NE from one NE group to the other NE group.
Right-click the NE group and select Del Group from the shortcut
menu. Click Yes in the alert box that appears to delete the selected
NE group.
Right-click the NE and select Del NE from Group from the shortcut
menu to delete the selected NE.
5.
See Step 2 to 4 to set the monitoring object and click the corresponding
monitoring object to check the environment monitoring alarm information at the
right side of the pane.
Other Operations
In the Current Alarm tab, right-click in the alarm displaying area and select the
corresponding shortcut menu to refresh alarms, confirm alarms or filter alarms. For
details, see Handling Alarms.
Version: A
8-17
8.4
8.4.1
Procedure
1.
See Viewing Current Alarms and Viewing Alarm History to open the Current
Alarm / Alarm History tab.
2.
Right-click anywhere in the Current Alarm / Alarm History tab and select
Query Condition from the shortcut menu to open the Set Current Alarm
Query Condition or Set Alarm History Query Condition dialog box.
Figure 8-5 is the Set Current Alarm Query Condition dialog box. You can set
Oscillation Status, End Time and Duration in the Set Alarm History Query
Condition dialog box. The Alarm Status of the current alarm is different from
that of the alarm history.
8-18
Version: A
8 Alarm Management
Figure 8-5
3.
Set query conditions and click Export... to open the dialog box as shown in
Figure 8-6.
Version: A
8-19
Figure 8-6
4.
Note:
u
The check box Only for this card is active only for defining the
alarm query template of the card; otherwise it is greyed out.
If the Only for this card check box is selected, the query template
can be imported only when querying alarms of this card.
8.4.2
Procedure
1.
8-20
Version: A
8 Alarm Management
Figure 8-7
Note:
The Alarm Statistical Template tab's shortcut menu includes all
functions of the following buttons.
2.
2)
Click Add to open the Custom Alarm Static Template Name Setting
dialog box.
3)
Version: A
8-21
4)
3.
Note:
Do not modify the Set panel indicator display template.
1)
2)
4.
8-22
3)
Click OK.
4)
Version: A
8 Alarm Management
Note:
Do not delete the Set panel indicator display template.
Click Delete All and click OK in the dialog box that appears.
Select the template to be deleted and click Delete Select Row and click
OK in the dialog box that appears.
5.
Click Global panel indicator display and the entire network alarm
statistics displays in the current alarm panel.
Select the corresponding template and click Panel indicator display. The
alarm statistics of the corresponding template displays in the current alarm
panel in the toolbar.
Other Operations
u
8.4.3
Version: A
8-23
Procedure
1.
Figure 8-8
Note:
The Alarm Level Template tab's shortcut menu includes all functions of
the following buttons.
2.
2)
3)
Select the corresponding alarm code and set the alarm level in the
Customized Grade column.
8-24
Version: A
8 Alarm Management
4)
Note:
The Custom Alarm Level tab's shortcut menu includes all functions of
the above menus.
Table 8-5
Menu
Export
Description
Export to
Server
Export to Local
File
Import from
Import
Local File
Import from DB
Modify
Edit
Template
Description
Version: A
Apply to DB
Exit
8-25
3.
Select the desired template and click Modify in the Alarm Level Template
tab.
2)
3)
4.
Select the desired template and click Delete in the Alarm Level Template
tab.
2)
Other Operations
u
8.5
Handling Alarms
Users should handle alarms to eliminate faults after alarm information is detected
according to specified flow. Alarm handling includes isolating alarm, confirming
alarm, refreshing alarm, etc.
8.5.1
8-26
Version: A
8 Alarm Management
Figure 8-9
Version: A
8-27
Table 8-6
Operation
Description
Obtains the alarm information and then starts the alarm
processing flow. The OTNM2000 provides multiple ways of alarm
Locates the alarm to query the alarm information and collect the
information
failure information.
failure
information.
Eliminates the failure that triggers the alarm based on the failure
processing scheme
processing scheme.
Once the failure that results in the alarm is eliminated, the
After clearing the alarm, you need to verify the failure processing
eliminated or not
result.
8.5.2
Synchronizing Alarms
The OTNM2000 synchronizes with the equipment alarm via the function of
synchronizing the NE alarm.
Background Information
Only the IPRAN NE supports the NE alarm synchronization.
8-28
Version: A
8 Alarm Management
Procedure
1.
Right-click the IPRAN NE in the Logical Tree pane or in the Main Topology
tab and select AlarmNE Alarm Sync from the shortcut menu.
2.
Click
8.5.3
Isolating Alarm
The alarm isolation function helps users isolate the alarmed object.
Procedure
1.
See Viewing Current Alarms and Viewing Alarm History for opening the
Current Alarm / Alarm History tab.
2.
Select one alarm and right-click anywhere in the tab and perform the following
operations:
Select Navigate to Logic Tree. The Logical Tree pane appears with the
alarmed NE highlighted.
Select Navigate to Main Topo. The Main Topology tab appears with the
alarmed NE circled in blue.
8.5.4
Confirming Alarms
The following introduces how to confirm alarms manually.
Background Information
When an alarm is confirmed, it indicates the alarm is processed. It includes manual
confirmation and automatic confirmation.
u
Manual Confirmation: You can manually confirm the selected alarm in the
Current Alarm tab and add additional information for the alarm, which will
facilitate subsequent query.
Version: A
8-29
Procedure
1.
See Viewing Current Alarms for opening the Current Alarm tab.
2.
b)
Enter the additional information for the alarm in the displayed Confirm
Alarm dialog box and click Confirm Alarm.
Note:
Right-click the desired project, network block or NE in the Logical Tree
pane and select Batch Confirm Alarm from the shortcut menu to confirm
the alarms in a batch manner.
b)
Select All Alarms or Alarm Severity or the specific alarm code in the
Confirm Alarm dialog box.
8-30
Version: A
8 Alarm Management
c)
Note:
Select the Cover check box. The current additional information will
overwrite the existing one.
8.5.5
Background Information
The alarm correlation analysis function is mainly used in the following two situations:
u
Version: A
The correlation among the alarms on a same line under the same card.
8-31
The relevance among the alarms on two ends of a same optical fiber.
1.
Procedure
Analysis in the Operational Tree pane, and select the corresponding object in
the lower part of the Operational Tree tab to open the Alarm Correlation
Analysis tab, as shown in Figure 8-10.
Note:
Right-click in the alarm display area of the Current Alarm tab and select
Alarm Correlation Analysis from the shortcut menu to open the Alarm
Correlation Analysis tab.
Figure 8-10
Figure 8-10lists the correlated alarms, among which the PK_LOS indicates the
root source alarm that derives the BMC_LOS alarm. Users should pay special
attention to the PK_LOS root alarm when handling alarms.
2.
8-32
Version: A
8 Alarm Management
8.5.6
Procedure
1.
See Viewing Current Alarms and Viewing Alarm History for opening the
Current Alarm / Alarm History tab.
2.
8.5.7
Alarm Statistics
Users can know about the network overall faults and obtain related data via the
alarm statistics, so as to facilitate the troubleshooting and network optimization.
8.5.7.1
Procedure
1.
Click
to the right of the alarm indicator on the toolbar to open the current
Version: A
8-33
Figure 8-11
8.5.7.2
Procedure
1.
See Viewing Current Alarms for opening the Current Alarm tab.
2.
Right-click in the alarm display area of the Current Alarm tab and select Query
Condition from the shortcut menu.
3.
In the displayed Set Current Alarm Query Condition dialog box, set query
conditions and click OK.
4.
Right-click in the alarm display area of the Current Alarm tab and select
Export from the shortcut menu.
5.
Enter the report statistical range in the Set Range dialog box that appears and
click OK to open the Chart dialog box.
8-34
Version: A
8 Alarm Management
6.
Click Preview Report to open the Output Report tab and view the alarm
information in the tab.
7.
Click the button at the bottom of the Output Report tab to set the page format
and export the report as an XML, TXT, CSV or XLS file.
Version: A
8-35
8.5.7.3
Procedure
1.
2.
Right-click in the alarm display area of the Alarm History tab and select Query
Condition from the shortcut menu.
3.
In the displayed Set Alarm History Query Condition dialog box, set query
conditions and click OK.
4.
Right-click in the alarm display area of the Alarm History tab and select
ExportSelect Row from the shortcut menu.
5.
Enter the report statistical range in the Range dialog box that appears and click
OK to open the Chart dialog box.
6.
Click Preview Report to open the Output Report tab and view the alarm
information in the tab.
8-36
Version: A
8 Alarm Management
7.
Click the button at the bottom of the Output Report tab to set the page format
and export the report as an XML, TXT, CSV or XLS file.
8.5.7.4
Procedure
1.
2.
Right-click anywhere in the tab and select ExportAll from the shortcut menu.
3.
Click OK in the displayed alert box to generate the task of exporting all alarm
history.
Note:
Go to the D:\OTNM\md\task_result directory to view the exported alarm
history report according to the prompt information in the alert box.
Version: A
8-37
4.
Figure 8-12
5.
Select the task and click Task Result Files to open the File Result List dialog
box, as shown in Figure 8-13.
Figure 8-13
8-38
Version: A
8 Alarm Management
6.
Select the desired file and click Save As to save the selected file to the
specified directory.
Other Operations
Delete a task or result report.
1.
Select the corresponding task and click Delete, or right-click the task to select
Delete from the shortcut menu.
2.
3.
Click OK in the displayed alert box to delete the result file of the task
simultaneously.
Note:
Click No to save the result file of the task.
8.5.8
Refreshing Alarms
You can refresh alarms to make the alarm data displayed on the OTNM2000 GUI
consistent with that in the OTNM2000 alarm database.
Procedure
1.
See Viewing Current Alarms for opening the Current Alarm tab.
2.
Right-click the alarm displaying area in the tab and perform the following
operations:
Select Refresh to obtain the newest alarm data from the OTNM2000 alarm
database and display these data on the OTNM2000 GUI.
Select Auto Refresh to obtain the newest alarm data from the alarm
database in the OTNM2000 every 5 seconds and display these data on
the OTNM2000 GUI.
Version: A
8-39
8.5.9
Procedure
1.
See Viewing Current Alarms and Viewing Alarm History for opening the
Current Alarm / Alarm History tab.
2.
Print the selected data. Right-click the selected alarm data and select Print
Print Selected from the shortcut menu. Set the parameters in the Print
dialog box and click OK .
Print all. Right-click in the alarm displaying area of the tab and select Print
All from the shortcut menu. Set the parameters in the Print dialog box
and click OK.
8.5.10
Background Information
The OTNM2000 presets some common failure diagnosis rules such R_LOS,
TU_AIS, HP_TIM and B1_EXC.
Procedure
1.
See Viewing Current Alarms and Viewing Alarm History for opening the
Current Alarm / Alarm History tab.
2.
Select the alarm to be queried and check the alarm details and troubleshooting
suggestions at the bottom of the tab, as shown in Figure 8-14.
8-40
Version: A
8 Alarm Management
Figure 8-14
3.
(Optional) Right-click the alarm information that needs to customize help and
select Customize Help from the shortcut menu and open the dialog box as
shown in Figure 8-15. Type the user maintenance experience and click OK.
Version: A
8-41
Figure 8-15
4.
8-42
Version: A
8 Alarm Management
Figure 8-16
Note:
Click Change custom content... to record the user maintenance
experience.
8.6
Version: A
8-43
Prerequisite
The EMS_Dumper service is started up.
Procedure
1.
2.
Note:
The alert box prompts the number of remaining entries for each save item
that will reach the save threshold.
3.
See Table 8-7 to set the save parameters in the Save Data tab.
Table 8-7
Configuration Item
Start Time to
Save
End Time to
Save
Save
Path to Save
Settings
Description
Sets the save start time. The value range is 0 to 23. It is 3 by
default, indicating the data saving will start from three oclock in
the morning.
Sets the save end time. The value range is 0 to 23. It is 7 by
default, indicating the data saving will end at seven oclock in the
morning.
The path of data save.
Three file types are supported.
u
Save File
type
Default text: The data after save are in a TXT file, which
cannot be imported into the database.
DbBackup text: The data after save are in a script file, which
can be imported into the database.
Both: The data are saved according the default text and
DbBackup text type simultaneously.
Type of Save
Sub-item of
save
Save
Threshold
Current
Capacity
8-44
Version: A
8 Alarm Management
Table 8-7
Configuration Item
Description
Number of
Entries to
from the database and saved to a hard disk when the save
Save
condition is met.
Single File
Capacity
Number of
Save Files
Time limit of
Transfer
(days)
Caution:
If the quantity of actual save entries in the system is more than the Single
File Capacity the Number of Save Files, the data will be lost.
4.
After completing the above configuration, click the Settings at the bottom of the
Save Data tab.
5.
8.7
8.7.1
Version: A
8-45
Procedure
1.
Select the path in Table 8-8 to open the Current Alarm tab.
Table 8-8
Operation
Access Method
Right-click the NE in the Logical Tree pane and select AlarmCurrent
Alarm Filter from the shortcut menu. Then select the desired project,
network block or NE in the lower part of the Operational Tree pane and click
.
Setting the
Current Alarm
Filter
2.
Select the alarm name to be filtered in the Current Alarm Filter tab, as shown
in Figure 8-17.
Figure 8-17
3.
(Optional) Right-click anywhere in the Set Alarm Filter tab to perform the
following operations:
4
8-46
Version: A
8 Alarm Management
Click Select the Selected Items to select the selected alarms in the
current page.
Click Select the not Selected Items to select the alarms that are not
selected in the current page.
Select Refresh Current Alarm Filter Setting to refresh the filter setting in
the current tab.
8.7.2
Prerequisite
The desired card supports the filter setting function.
Procedure
1.
Double-click the NE in the Logical Tree pane, click the shelf in the rack view
and click the corresponding card in the shelf view. Click MASK_SETTING in
the Task Panel to open the card filter window, as shown in Figure 8-18.
Version: A
8-47
Figure 8-18
2.
Table 8-9
Parameter
Description
There are three filter modes, namely, Line (alarm / PM)-based Filter,
Alarm- / PM-based Filter and Line Filter.
u
Select Line (alarm / PM)-based Filter, select the line name and
specific alarm code at the right side of the pane to filter the specific
Filter Mode
Click Alarm- / PM-based Filter and select the alarm code and the
corresponding line at the right side of pane to filter the alarm code
of the selected line.
Click Line Filter and select the line name at the right side of pane
to filter the alarm and performance of the selected line.
Filters the alarm and performance on all lines of the selected card.
setting completed in the Line Filter mode. The filter setting completed
in the Line-based Filter mode will not be influenced.
8-48
8 Alarm Management
Table 8-9
8.7.3
Parameter
Description
Reads the filter setting of the selected card from the equipment.
Background Information
Only the IPRAN NE supports the NE alarm filter function.
Procedure
1.
Right-click the IPRAN NE in the Logical Tree pane or in the Main Topology
tab and select AlarmNE Mask Alarm from the shortcut menu to open the NE
Mask Alarm window.
2.
4
Version: A
8-49
a)
Select Mask All of the corresponding card and click Write To Device.
b)
b)
Set the line type, the line range and the filter code in the Add Item
dialog box that appears and click OK.
Note:
Mouse over the rules in the Line Range at the right side of the text box
and check the setting rules of the line range in the alert box that appears.
8-50
Version: A
8 Alarm Management
c)
Version: A
8-51
d)
8.7.4
Background Information
The filter operation only applies to the alarms reported when the filter rules are
enabled and valid; It does not apply to the alarms reported before setting the filter
rules.
Procedure
1.
2.
Click Create at the lower right of the tab or right-click in the right pane and
select Create to open the Add Alarm Filtering Rule dialog box.
8-52
Version: A
8 Alarm Management
Figure 8-19
3.
See Table 8-10 to set the alarm filter rule and click OK.
Table 8-10
Parameter
Description
Rule Type
Basic
Information
Rule Name
Rule
Remark
Enable or
not
Version: A
8-53
Table 8-10
Parameter
Description
It supports selecting the alarm source via the following three
ways.
Alarm
Alarm
select the alarm object from the project tree with the
Source
Filtering
Information
4.
(Optional) Quickly filter the current alarm. In the current alarm tab, right-click the
corresponding alarm and select Filter Alarm. Then select the filter rule as
needed and click OK. In the Filtering Rule Management tab, you can view the
added alarm filter rule.
Other Operations
Right-click any alarm filter rule and select Delete, Refresh, Modify Alarm Filtering
Rule, Start Task or End Task to perform the corresponding operation.
8-54
Version: A
8 Alarm Management
8.7.5
Procedure
1.
2.
Right-click anywhere in the Alarm History Filter tab and select Setting
History Alarm Filter to open the Alarm History Filter of the Filter Settings
window, as shown in Figure 8-20.
Figure 8-20
3.
Select the alarm code to be filtered in the Alarm History Filter tab.
4.
Other Operations
Select the submenus under the Action main menu or right-click anywhere in the
Filter Settings window to perform the following operations:
Version: A
8-55
Select Filter All to select and filter all codes in the current tab.
Select Filter the Selected Items to filter the selected codes in the current tab.
Select Unfilter the Selected Items to not filter the selected codes in the current
tab.
Select Save Current Alarm Filter Setting to save the filtering configurations in
the current tab.
8.7.6
Procedure
1.
Figure 8-21
Other Operations
Right-click any area in the Alarm History Filter tab to perform the following
operations:
8-56
Version: A
8 Alarm Management
Select View Alarm History Filter to view the filter information of alarm history.
Select Setting History Alarm Filter to open the History Alarm Filter tab of the
Filter Setting window and reset the alarm history filter rule.
Select View Command Log Filter to view the filter information of command
logs.
Select Set Command Log Filter to open the Command Log Filter tab of the
Filter Setting window.
8.8
Background Information
The alarm suppression function is used in the NE start-up stage. A series of alarms,
such as LOS alarms, occur because the NE service is not started up. In this case,
the maintenance staff can ignore these alarms. However, after the service is started
up, the NE should report the alarms normally.
Prerequisite
The corresponding card supports the alarm suppression function.
Procedure
1.
Double-click the corresponding NE in the Logical Tree tab and select the
desired card in the shelf view. Then click ALARM_INHIBIT on the Task Panel to
open the Alarm Suppression tab.
Version: A
8-57
2.
Select the corresponding line in the Line Name column. Select the
corresponding suppressed alarm in the Inhibited Alarm column. Right-click the
upper part of the tab and select Save from the shortcut menu.
3.
Right-click the newly-added suppressed alarm items in the lower part of the tab
and select Set Affected Alarm from the shortcut menu and the Inhibited
Alarm column changes into the Affected Alarm column.
4.
Select the corresponding line in the Line Name column. Select the
corresponding affected alarm in the Affected Alarm column. Right-click the
upper part of the tab and select Save from the shortcut menu.
8-58
Version: A
8 Alarm Management
5.
Select the corresponding item in the lower part of the pane and right-click
anywhere in the lower pane and select Save to the device from the shortcut
menu.
6.
Other Operations
Right-click in the lower pane and select the shortcut menus to perform the
corresponding operations:
u
Select Export to Template from the shortcut menu to export the alarm
suppression items as an INH file to the designated directory.
Select Import from File from the shortcut menu to import the alarm
suppression template previously backed up to the OTNM2000.
8.9
Version: A
8-59
Procedure
1.
Select AlarmCustom Alarm Level in the main menu to open the Customize
Alarm Level dialog box.
2.
In the Customize Alarm Level dialog box, select the row where the
corresponding alarm code is located and select the new alarm level in the dropdown box of the Customized Grade, as shown in Figure 8-22.
Figure 8-22
3.
(Optional) Right-click anywhere in the Customize Alarm Level dialog box and
select Restore Default Level from the shortcut menu to restore to the system
default settings.
4.
8.10
8-60
Version: A
8 Alarm Management
8.10.1
Procedure
1.
Select the path in Table 8-11 to open the Set Report Condition window, as
shown in Figure 8-23.
Table 8-11
Operation
Access Method
Figure 8-23
2.
Version: A
8-61
Table 8-12
Parameter
Switch
Select Sound
Optional file: Select the sound file (*.wav) for the alarm. The system will
generate a particular prompt sound when the alarm occurs.
Selects an alarm report icon for the alarm. The alarm indicator of the alarmed
Icon
object displays the icon when the alarm occurs. If more alarm icons are set
and these alarms occur at the same time, the displaying priority of these
alarm icons descends from the top down.
Line Number
Included
Line Number
Excluded
Double-click the Line Number Included of an alarm and enter the line
number. Only the alarm of the designated line number is reported. Use
comma to separate multiple line numbers.
Double-click the Line Number Excluded of an alarm and enter the line
number or separate multiple line numbers by comma. All alarms except the
alarm of the designated line number will be reported.
Duration
Time Filter
3.
Click
box.
8.10.2
Procedure
1.
on the toolbar
8-62
Version: A
8 Alarm Management
Figure 8-24
2.
Select Alarm Report Settings to open the Set Report Condition window
to reset the reporting conditions.
Select Print All to print all information in the Report Content Display tab.
Select Clear All Items to delete all information in the Report Content
Display tab.
Select Output Report to open the Output Report tab and export the
reported alarms as a report. You can also set the format of the page and
export the information as a XML, TXT, CSV or XLS file.
3.
Click Filter Content View to open the Filter Content View tab, as shown in
Figure 8-25.
Figure 8-25
The tab displays the alarm report contents according to the filtering conditions
set by users. The related information of the alarm is identical with that in the
Report Contents Display tab.
Version: A
8-63
4.
(Optional) Right-click anywhere in the Filter Content View tab to perform the
following operations:
Select Alarm Report Settings to open the Set Report Condition window
to reset the reporting conditions.
Select Set Filter Condition to open the filter condition dialog box. You can
set filter conditions according to the alarm level. The system selects
Communication interrupted and Critical Alarm by default, as shown in
Figure 8-26.
Figure 8-26
8.10.3
Background Information
SmsAgent is a proxy tool for SMSs and emails. It connects to the SMS center, SMS
card, website or mail server and notifies the user of the alarm via SMS or email. The
SmsAgent tool is embedded in the OTNM2000 and is installed upon the OTNM2000
installation.
8-64
Version: A
8 Alarm Management
Prerequisite
To send the alarms to the maintainer by SMS via the SMS card, you need to install
the wireless Modem first. For the installation procedures, see the documentation in
the Modem accessory.
Procedure
1.
2)
3)
2.
Version: A
8-65
3.
To send the reported alarms to the maintainer via SMS, you need to set the
SMS device.
1)
8-66
Version: A
8 Alarm Management
2)
See Table 8-13 to set the SMS device parameters in the SMS Device
Settings dialog box.
Version: A
8-67
Table 8-13
Parameter
Description
The SMS device supports the following three types of settings:
SMG
SMS Card
HTTP
set.
Select the SMS gateway type according to the gateway type
applied. Other parameters are specified when applying for the SMS
gateway.
Only when SMS Card is selected can the SMS card parameters be
set.
Select the serial port No. from the COM No. drop-down list
Website parameters
Specify the IP address and port of the proxy server for the SMS
group-sending website as well as the username and password of
the website account.
3)
4.
To send the reported alarms to the maintainer via email, you need to set the
mail device.
1)
8-68
Version: A
8 Alarm Management
2)
Select LAN, set the mail server, mailbox username and password,
and then click OK.
Select RAS Dial-up, set the telephone number, dialing account and
password, and then click OK.
5.
Note:
The SMS gateway may interrupt the service due to timeout, while the
SMS modem interrupt the service due to hardware failure. In this situation,
you can connect to the SMS device again manually.
In the fiberhome SmsAgent window, select ConnectionConnect SMG or
Card. A prompt appears, displaying it is connecting to the device. After the
device is connected, the SMS notification is available.
8.11
Version: A
8-69
8.11.1
Procedure
1.
Click
to the right of the alarm indicator on the toolbar to open the current
Figure 8-27
2.
Right-click the buzzer before the alarm indicator and select Change voice file
from the shortcut menu.
3.
Note:
The alarm sound setting is only valid for the current client end.
Other Operations
Click the buzzer at the top of the current alarm panel to open the System Option
Settings dialog box. See Setting Alarm-related Parameters for setting the sound
broadcast strategy.
8-70
Version: A
8 Alarm Management
8.11.2
Procedure
1.
2.
Select the row of the alarm type whose alarm indicator color is to be modified
and click
Figure 8-28
3.
Right-click anywhere in the Alarm Indicator Settings tab and select Save
Settings from the shortcut menu.
Other Operations
Right-click anywhere in the Alarm Indicator Settings tab and select Reset from the
shortcut menu to restore color of the alarm indicator to the default color.
8.11.3
Version: A
8-71
Procedure
1.
Click
Note:
The alarm flickering function is disabled by default. When the alarm
flickering icon appears as
8-72
Version: A
Performance Management
With powerful performance management function, the OTNM2000 can store various
types of performance information of equipment in the network. Users can monitor
the performance data to eliminate the potential problems in a timely manner and
reduce the risks that will affect the reliable operation of the equipment.
Basic Concept
Setting Performance-related Parameters
Setting the Performance Parameter Collection
Viewing Performance
Setting Performance Query Profile
Managing Performance
Managing Performance History Data
Managing Performance Filter
Gathering Statistics of Optical Power Information
Traffic Management
Version: A
9-1
9.1
Basic Concept
24-hour performance: the latest 24-hour performance and the 1st 24-hour
performance.
Saving Performance
When the performance history saved in the OTNM2000 exceeds a certain limit, it
will influence the operations performed in the OTNM20000. The performance saving
function saves the performance history data in the OTNM2000 to a specified file,
improving the running performance of the OTNM2000. The OTNM2000 supports
manual saving and automatic saving of performance history.
u
Automatic Saving: You can set the performance history threshold and saving
period (days) limit and the OTNM2000 will regularly check the performance
history data. When the performance history data reaches the preset capacity or
its saving period reaches the preset limit, the OTNM2000 will save the data to a
designated file in the specified time.
Manual Saving: You can save the performance history data as a TXT file to the
OTNM2000 server anytime.
9.2
9-2
Version: A
9 Performance Management
Procedure
1.
2.
Click Query Condition and see Table 9-1 to set the performance-related
parameters in the right pane.
Table 9-1
Menu Option
Save History Performance
Query Condition
When this item is selected, you need to set the query condition
3.
Version: A
Description
Click OK.
9-3
9.3
Procedure
1.
2.
Select the desired NE or the network block in the lower part of the Operational
Tree pane.
3.
Note:
Select the NE in the PM Collection tab and click Delete to delete the
selected NE. Click Delete All to delete all NEs in the PM Collection tab.
4.
Set the time and type of the performance parameter collection in the PM
Collection tab, as shown in Figure 9-1.
9-4
Version: A
9 Performance Management
Figure 9-1
Note:
The Copy and Paste in the shortcut menu of the PM Collection tab can
simplify the setting.
5.
9.4
Click Save and then Yes in the displayed Command Warning alert box.
Viewing Performance
Users can know whether the equipment or service in the network is abnormal or not
by viewing performances. Viewing performance also help the maintainers to handle
the faults in a timely manner and prevent faults.
9.4.1
Version: A
9-5
Procedure
1.
Select the path in Table 9-2 to open the Current Performance tab.
Table 9-2
Operation
Access Method
Select PerformanceCurrent Performance in the main menu and select
the desired project, network block or NE in the lower part of the
Operational Tree pane, and click
Right-click the desired network block or NE in the Logical Tree pane and
select Current Performance from the shortcut menu.
Right-click the desired card in the shelf view and select Current
Performance from the shortcut menu.
Viewing Current
Performance
2.
View the current performance information of the selected object in the Current
Performance tab.
3.
(Optional) Right-click the title bar of performance list to bring up the title bar
option list to select the item to be displayed, as shown in Figure 9-2.
9-6
Version: A
9 Performance Management
Figure 9-2
Other Operations
In the Current Performance tab, right-click anywhere in the tab and select the
corresponding shortcut menu to locate the performance, query accumulative
performance and detect the real-time performance. For details, see Managing
Performance.
9.4.2
Prerequisite
The performance collection task is set and at least one collection period (15 minutes
or 24 hours) has passed.
Procedure
1.
Version: A
Select the path in Table 9-3 to open the performance history tab.
9-7
Table 9-3
Operation
Access Method
Click PerformanceHistory Performance in the main menu, select the
corresponding project, network block or NE in the lower pane of the
Operational Tree tab and click .
network block or NE in the lower part of the Operational Tree pane and click
.
Right-click the project, network block or NE in the Logical Tree pane and
select Performance History from the shortcut menu.
Select relevant submenus under the Business Management menu to open
the service management tab, right-click the desired circuit or service and
select Alarm/Performance QueryQuery Performance History from the
shortcut menu. In the displayed Operation Object Selection dialog box,
select the desired object and click OK.
2.
Set filter conditions in the displayed Set Performance Query Condition dialog
box and click OK.
Note:
By default, you need to set the query condition before querying the
performance history. See Setting Performance-related Parameters to
modify the settings.
9-8
Version: A
9 Performance Management
Figure 9-3
3.
4.
(Optional) Right-click the title bar of performance list to bring up the title bar
option list to select the item to be displayed, as shown in Figure 9-4.
Version: A
9-9
Figure 9-4
Other Operations
In the Performance History tab, right-click anywhere in the tab and select the
corresponding shortcut menu to refresh, gather statistics of or analyze performance
data. For details, see Managing Performance.
9.5
Procedure
1.
2.
9-10
Version: A
9 Performance Management
Figure 9-5
Set query conditions in the Set Performance Query Condition dialog box.
Click Export... after completing setting to open the dialog box as shown in
Figure 9-6.
Version: A
9-11
Figure 9-6
4.
Note:
u
The check box Only for this card can be selected when users
define the performance query template of the card. The check box
Only for this card is grayed out in other situations.
If users select the Only for this card check box, the query template
can be imported only when users query the card performance.
9.6
Managing Performance
After browsing the performance information, you can perform related operations as
need to conveniently monitor the performance data.
9.6.1
Procedure
1.
9-12
Version: A
9 Performance Management
2.
Right-click the performance data and select Navigate to Logic Tree from the
shortcut menu. The Logical Tree pane appears, highlighting the NE
corresponding to the performance data.
9.6.2
Procedure
1.
See Viewing Current Performance for opening the Current Performance tab.
2.
Right-click in the performance display area of the tab and select Accumulative
Performance from the shortcut menu to view the accumulative performance of
the object, as shown in Figure 9-7.
Figure 9-7
9.6.3
Procedure
1.
Version: A
9-13
2.
Right-click in the performance display area of the tab and select the shortcut
menus to perform the corresponding operations:
Select Auto Refresh to obtain the newest alarm data from the OTNM2000
performance database every 5 seconds and display these data on the
network management GUI.
9.6.4
Procedure
1.
2.
Right-click in the performance display area of the tab and select Do not
display performance data whose value is 0 from the shortcut menu. The
Current Performance / Performance History tab will not display the
performance data whose value is 0.
9.6.5
Procedure
1.
2.
Print the selected rows. Right-click the selected performance data and
select PrintPrint Selected from the shortcut menu to print the selected
performance data.
9-14
Version: A
9 Performance Management
Print all. Right-click in the performance display area of the tab and select
PrintAll from the shortcut menu to print all performance data in the tab.
9.6.6
Procedure
1.
See Viewing Current Performance for opening the Current Performance tab.
2.
Right-click in performance display area of the tab and select Real Time
Performance Check from the shortcut menu.
3.
In the displayed Real Time Performance Check window, view the real-time
performance of the selected object, as shown in Figure 9-8.
Figure 9-8
Version: A
9-15
Other Operations
On the menu bar and toolbar of the Real Time Performance Check window, you
can select the display mode of the real-time performance data (pie chart or wave
form graph) and output mode to conveniently gather statistics and analyze the realtime performance value.
9.6.7
Procedure
1.
2.
Right-click in the performance display area of the tab and select Export from
the shortcut menu.
3.
In the displayed Range Settings dialog box, enter the report display range,
which determines the number of performance entries to be displayed in the tab.
4.
In the Output Report tab, view the generated performance report, as shown in
Figure 9-9.
9-16
Version: A
9 Performance Management
Figure 9-9
5.
(Optional) Click the button at the bottom of the Output Report tab to set the
page format and export the report as an XML, TXT, CSV or XLS file.
9.6.8
Procedure
1.
See Viewing Performance History for opening the Performance History tab.
2.
3.
In the object query pane of the tab, select the desired object and view the
performance statistics and analysis of the object, as shown in Figure 9-10.
Version: A
9-17
Figure 9-10
Other Operations
Select the shortcut menus to perform the corresponding operations.
u
Right-click in the left pane of the Performance Statistics and Analysis tab
and select Output Report from the shortcut menu to export the performance
history statistics and analysis as an XML file.
Right-click in the right pane of the Performance Statistics and Analysis tab to
set the display attribute of the performance history statistical and analytical
chart.
9.6.9
Procedure
u
9-18
Version: A
9 Performance Management
1)
Right-click the network block in the Logical Tree pane and select More
OperationsClear Part Performance Data from the shortcut menu.
2)
u
Right-click the NE in the Logical Tree tab or the Browse Tree tab or the
Main Topology tab and select PerformanceClear NE Performance
from the shortcut menu.
2)
u
Double-click the desired NE in the Logical Tree pane and click the
corresponding card in the subrack view. Then click the MASK_SETTING
in the Task Panel pane on the right to open the Filter Settings.
2)
In the left lower part of the Filter Settings tab, select the type of
performance to be cleared and click Clear PM.
The performance types include 15-minute Performance, 24-hour
Performance and Accumulative Performance.
3)
Version: A
9-19
9.6.10
Procedure
1.
2.
Figure 9-11
3.
9-20
Version: A
9 Performance Management
Figure 9-12
4.
Figure 9-13
Version: A
9-21
Note:
Click Change custom content... to record the user maintenance
experience.
9.7
9.7.1
Prerequisite
The EMS_Dumper service is started up.
Procedure
1.
2.
Note:
The alert box prompts the number of remaining entries for each save item
that will reach the save threshold.
3.
9-22
See Table 9-4 to set the save parameters in the Save Data tab.
Version: A
9 Performance Management
Table 9-4
Configuration Item
Start Time to
Save
End Time to
Save
Save
Path to Save
Settings
Description
Sets the save start time. The value range is 0 to 23. It is 3 by
default, indicating the data saving will start from three oclock in
the morning.
Sets the save end time. The value range is 0 to 23. It is 7 by
default, indicating the data saving will end at seven oclock in the
morning.
The path of data save.
Three file types are supported.
u
Save File
type
Default text: The data after save are in a TXT file, which
cannot be imported into the database.
DbBackup text: The data after save are in a script file, which
can be imported into the database.
Both: The data are saved according the default text and
DbBackup text type simultaneously.
Type of Save
Save
Threshold
the configured time. (Unit: entry. Users can set any integer
number above 0.)
Current
Capacity
the database.
Number of
Entries to
that will be deleted from the database and saved to a hard disk
Sub-item
Save
of save
Single File
Capacity
Number of
Save Files
Time limit of
Transfer
(days)
value set here, the data will be saved to another location in the
specified period of time.
Sub-item
of save
Version: A
Type of Save
9-23
Table 9-4
Configuration Item
Description
If the 24-hour historical performance data quantity in the
Save
Threshold
the configured time. (Unit: entry. Users can set any integer
number above 0.)
Current
Capacity
database.
Number of
Entries to
will be deleted from the database and saved to a hard disk when
Save
Single File
Capacity
Number of
Save Files
Time limit of
Transfer
(days)
Caution:
If the quantity of actual save entries in the system is more than the Single
File Capacity the Number of Save Files, the data will be lost.
4.
After completing the above configuration, click the Settings at the bottom of the
Save Data tab.
5.
9.7.2
9-24
Version: A
9 Performance Management
Procedure
1.
See Viewing Performance History for opening the Performance History tab.
2.
Note:
You can view the generated task name in the d:\otnm\ui\job directory.
3.
Figure 9-14
4.
Select the task and click Task Result Files to open the File Result List dialog
box, as shown in Figure 9-15.
Version: A
9-25
Figure 9-15
5.
Select the desired file and click Save As to save the selected file to the
specified directory.
Other Operations
Delete a task or result report.
1.
Select the corresponding task and click Delete, or right-click the task to select
Delete from the shortcut menu.
2.
3.
Click OK in the displayed alert box to delete the result file of the task
simultaneously.
Note:
Click No to save the result file of the task.
9-26
Version: A
9 Performance Management
9.7.3
Procedure
1.
Figure 9-16
2.
Set the relevant parameters in the dialog box as needed and click OK.
3.
After the task execution time is reached, go to the specified performance report
save directory to view the exported performance report.
9.8
Version: A
9-27
9.8.1
Prerequisite
The desired card supports the filter setting function.
Procedure
1.
Double-click the NE in the Logical Tree pane, click the shelf in the rack view
and click the corresponding card in the shelf view. Click MASK_SETTING in
the Task Panel to open the card filter window, as shown in Figure 9-17.
Figure 9-17
2.
9-28
Version: A
9 Performance Management
Table 9-5
Parameter
Description
There are three filter modes, namely, Line (alarm / PM)-based Filter,
Alarm- / PM-based Filter and Line Filter.
u
Select Line (alarm / PM)-based Filter, select the line name and
specific performance code at the right side of the pane to filter the
Filter Mode
Click Line Filter and select the line name at the right side of pane
to filter the alarm and performance of the selected line.
Filter all Pm
Filters the alarm and performance on all lines of the selected card.
Clear Pm Filter
setting completed in the Line Filter mode. The filter setting completed
in the Line-based Filter mode will not be influenced.
9.8.2
Save
Cancel Modification
Reads the filter setting of the selected card from the equipment.
Background Information
Only the IPRAN device supports the NE performance filter function.
Version: A
9-29
Procedure
1.
Right-click the IPRAN NE in the Logical Tree pane or in the Main Topology
tab and select PMNE Mask PM from the shortcut menu to open the NE Mask
PM window.
2.
Select Mask All of the corresponding card and click Write To Device.
b)
b)
Set the line type, the line range and the filter code in the Add Item
dialog box that appears and click OK.
Note:
Mouse over the rules in the Line Range at the right side of the text box
and check the setting rules of the line range in the alert box that appears.
9-30
Version: A
9 Performance Management
c)
Version: A
9-31
d)
9.8.3
Procedure
1.
9-32
Version: A
9 Performance Management
Figure 9-18
2.
3.
Other Operations
Select the submenus under the Action main menu or right-click anywhere in the
Filter Settings window to perform the following operations:
u
Select Filter All to select and filter all codes in the current tab.
Select Filter the Selected Items to filter the selected codes in the current tab.
Select Unfilter the Selected Items to not filter the selected codes in the current
tab.
Select Save Current Alarm Filter Setting to save the filtering configurations in
the current tab.
u
Version: A
9.8.4
Procedure
1.
2.
Right-click anywhere in the Alarm History Filter tab and select Performance
History Mask to open the History Performance Filter of the Filter Settings
window, as shown below.
Figure 9-19
Other Operations
Right-click any area in the Performance History Filter tab to perform the following
operations:
9-34
Version: A
9 Performance Management
Select View Alarm History Filter to view the filter information of alarm history.
Select Setting History Alarm Filter to open the History Alarm Filter tab of the
Filter Settings window.
Select View Command Log Filter to view the filter information of command
logs.
Select Set Command Log Filter to open the Command Log Filter tab of the
Filter Settings window.
9.9
Procedure
1.
Select the path in Table 9-6 to open the optical power information statistics
window, as shown in Figure 9-20.
Table 9-6
Operation
Access Method
Right-click the network block in the Logical Tree pane and select More
OperationsOptical Power Statistics from the shortcut menu.
Viewing optical
power information
statistics
Version: A
9-35
Table 9-6
Operation
Access Method
Double-click the NE in the Logical Tree pane and then right-click the
corresponding card in the Shelf View on the right and select Optical
Power Statistics from the shortcut menu.
Figure 9-20
Note:
When the optical power exceeds the specified threshold, it will be
highlighted in red, convenient for you to locate the anomaly.
2.
9-36
Version: A
9 Performance Management
9.10
Traffic Management
The OTNM2000 supports the general management of device traffic. You can query
the current traffic, traffic history and real-time traffic of the ports, fiber sections and
services to analyze the bandwidth usage of the entire network, observe the network
load increasing trend and make a plan for network capacity expansion and
optimization in advance.
The OTNM2000 traffic management includes the following functions:
u
Queries the maximum and minimum traffic of the monitored object by browsing
the performance history.
Monitors the performance of the NE at various layers, including the secondlevel performance of the port, VP layer (LSP) and VC layer (PW).
Supports statistics of bandwidth usage, 15-minute traffic and 24-hour traffic and
exporting as reports, which include the corresponding maximum, minimum and
average values.
Supports setting the traffic thresholds and viewing the alarms of the port
triggered by threshold-crossing traffic.
9.10.1
Version: A
Prerequisite
Procedure
The following uses the 15-minute performance history as an example to introduce
how to query the maximum and minimum traffic.
1.
Note:
For the CiTRANS 630, CiTRANS 640 and CiTRANS 660 devices, you
can query the device traffic performance on the cross-connect card.
2.
In the displayed Set Performance Query Condition dialog box, enter flow in
the PM Code text box, and select the traffic-related performance codes in the
Performance Code list. Then select the desired Start Time range, select the
15-minute Performance in the Performance Timestamp list and click Query.
9-38
Version: A
9 Performance Management
Figure 9-21
3.
View the history sent / received traffic of the monitored object in the
Performance History tab.
9.10.2
Version: A
9-39
Procedure
1.
The Flow Monitor window contains five tabs. You can switch the tabs to view
the traffic of different monitored objects.
2.
Right-click in the tabs and select the corresponding shortcut menus to query
the current traffic or traffic history of different monitored object.
The following example is to query the current transmitting traffic of the
corresponding port in the Port Traffic Monitoring tab, and the query result is
shown in Figure 9-22.
Note:
u
9-40
Version: A
9 Performance Management
Figure 9-22
3.
Figure 9-23
Version: A
9-41
2)
Set the start time, end time and time interval (1 to 10 seconds are
supported by the card at present) of the collection and set whether to
enable the collection.
3)
Click OK. An alert box appears prompting the settings are saved
successfully. Then click OK.
4.
(Optional) Right-click in the tabs and select the corresponding shortcut menus
to query the second-level Tx / Rx traffic of different monitored object.
Select Query Performance to set the start time and time range, and click
Query HistoryData to view the collected second-level history performance
traffic data.
Click Output Report to generate a statistical report for the traffic data and
save it to the specified directory.
9-42
Version: A
9 Performance Management
9.10.3
Prerequisite
u
1.
Procedure
1)
2)
3)
Select the corresponding card in the lower part of the Operational Tree
pane according to the prompt information and click
In the Card Performance Collection Settings tab, set the start / end time
and duration of the card real-time performance collection. In the real-time
performance list that the card supports, select the Switch of the desired
performance.
Version: A
9-43
5)
6)
2.
2)
3)
9-44
View the collected data of the selected line in the displayed window.
Version: A
9 Performance Management
Select View History Collection Data to set the start time and time
range, and click View History Statistical Data to view the collected
second-level history performance traffic data.
Deselect View History Collection Data to view the second-level realtime traffic data of the corresponding line.
9.10.4
Procedure
1.
Click the desired card in the shelf view and select Card Description in the
Rack View pane on the right. Then right-click the port in the Port List and
select the corresponding shortcut menu to query the current sent / received
traffic of the port. The following introduces how to query the current Tx traffic of
a port.
Version: A
9-45
Note:
The CiTRANS 640 supports the performance mapping function. If the
function is enabled, you can query the traffic information on the actual
card.
Related Operations
Enable the performance mapping function.
1.
2.
3.
9-46
Version: A
9 Performance Management
9.10.5
Procedure
1.
Version: A
9-47
Note:
u
After the above settings are completed, the system will obtain the
performance history data of the previous day from the database at 4
o'clock every morning according to the specified monitoring
conditions. Then it computes the daily, weekly and monthly data and
then save the data into files.
The file saving path cannot be modified once set. As modifying the
file saving path will cause loss of previous data, the Saving path
drop-down list will be greyed out after it is set.
2.
Double-click the NE in the Logical Tree pane and click the corresponding
card in the shelf view.
2)
3)
In the Card Description tab, right-click a port in the Port List textbox and
select View Long-term Receive Flow or View Long-term Send Flow.
4)
View the long-term traffic monitoring data in the displayed window. Select
the submenus under OperateGo to view the 15-minute traffic, daily
traffic, weekly traffic or monthly traffic respectively.
5)
Select the submenus under the Output menu to export the traffic data as a
report or an image.
9.10.6
Prerequisite
The corresponding device supports this function.
9-48
Version: A
9 Performance Management
Procedure
1.
Click the desired card in the shelf view and click Card Configuration in the
Task Panel pane.
2.
In the card configuration pane, select the corresponding tab to open the Traffic
Threshold Settings window according to Table 9-7.
Table 9-7
Card
Access Method
XSJ2
Line-Phy-Other-Config
GSJ2
LINE-Physical-Interface-Config
XCUJ2
GE-Port-Config
MPTN1
WAN-Config, LAN-Port-Config
SYS-Interface-Senior-Config
3.
Figure 9-24
4.
In the card configuration pane, select the Global-Config tab to set the "FlowExceed-Alarm-Delay-Time", as shown in the following figure.
Version: A
9-49
Figure 9-25
5.
Click Write to Device and click OK in the displayed Command Warning alert
box.When the settings are completed, the device will report the thresholdcrossing alarm once the traffic of the port exceeds the specified threshold, as
shown in Figure 9-26.
Figure 9-26
9-50
Version: A
10
Log Management
The log records the operation information and important events in the OTNM2000.
Users can query and output log information via the log management function.
Version: A
10-1
10.1
Command Logs
The command logs records the server operations performed in the OTNM2000
client and the operations that may influence the OTNM2000 security, such as
creating NEs and confirming alarms. By viewing the OTNM2000 operation logs, you
can accurately understand the operations performed in the OTNM2000 client,
convenient for you to trace and check the user operations. This provides support to
eliminating misoperations.
User Logs
The user logs record the operations performed in the OTNM2000 that influence the
OTNM2000 security, such as login, exit and unlocking. By viewing the OTNM2000
security logs, you can precisely understand the operations performed in the
OTNM2000 client that influence the OTNM2000 security. Querying user logs
regularly effectively ensures the security of the OTNM2000.
Business Logs
The business logs record the service-related operations performed in the
OTNM2000, such as querying service data and creating circuits. By viewing the
OTNM2000 business logs, you can accurately understand the service-related
operations performed in the OTNM2000 client, convenient for you to trace and
check the user operations. This provides support to eliminating misoperations.
EMU Logs
The EMU logs record the delivering object, time, command name and other
information of the EMU commands, which facilitate the tracing, checking and fault
isolating of the user operations. Only a part of the OTN equipment supports the
function of viewing EMU log.
10-2
Version: A
10 Log Management
Saving triggered by number of records: You can set the command log threshold
and the OTNM2000 will regularly check the command logs. When the
command log data reach the preset capacity, the OTNM2000 will save the data
to a designated file in the specified time.
Saving triggered by saving time: You can set the saving period (days) of
command logs. When the command log data saved in the database reach the
preset the time period, the OTNM2000 will save the data to a designated file in
the specified time.
10.2
Procedure
1.
Log tab.
Version: A
10-3
Figure 10-1
2.
(Optional) Set the query conditions to find out the command log which accords
with the set conditions.
1)
Right-click the log displaying area in the View Command Log tab and
select Query Condition from the shortcut menu to open the Query
Condition dialog box.
2)
Other Operations
u
Note:
Only the users having the Delete Logs authority can delete command
logs and the operation of deleting logs will be recorded in the command
log.
10-4
Version: A
10 Log Management
Right-click the log displaying area in the View Command Log tab and
select Output Report from the shortcut menu to display the log information
in the current page in the form of report. You can set the format of the page
and output the report as an XML, TXT, CSV or XSL file.
Right-click the log displaying area in the View Command Log tab and
select Print All from the shortcut menu. Set the parameters in the Print
dialog box and click OK to print the all command log information.
Right-click the command log to be printed and select Print the Selected
from the shortcut menu. Set the parameters in the Print dialog box and
click OK to print the selected command log information.
10.3
Procedure
1.
Version: A
10-5
Figure 10-2
2.
(Optional) Set the query conditions to find out the user log which accords with
the set conditions.
1)
Right-click the log displaying area in the View User Log tab and select
Query Condition from the shortcut menu to open the Query Condition
dialog box.
2)
Other Operations
u
Note:
Only the users having the Delete Logs authority can delete user logs and
the operation of deleting logs will be recorded in the command log.
10-6
Version: A
10 Log Management
Right-click the log displaying area in the View User Log tab and select
Output Report from the shortcut menu to display the log information in the
current page in the form of report. You can set the format of the page and
output the report as an XML, TXT, CSV or XSL file.
Right-click the log displaying area in the View User Log tab and select
Print All from the shortcut menu. Set the parameters in the Print dialog
box and click OK to print the all user logs.
Right-click the user log to be printed and select Print the Selected from
the shortcut menu. Set the parameters in the Print dialog box and click OK
to print the selected user log.
10.4
Procedure
1.
Select SecurityView Business Log in the main menu to open the View
Business Log tab.
2.
Version: A
10-7
Figure 10-3
10.5
Background Information
Only a part of the OTN equipment supports the function of viewing EMU log.
Procedure
1.
2.
(Optional) Set the query conditions to find out the EMU command log which
accords with the set conditions.
1)
Right-click the log displaying area in the View EMU Log tab and select
Query Condition from the shortcut menu to open the Query Condition
dialog box.
10-8
Version: A
10 Log Management
2)
Other Operations
u
Right-click the log displaying area in the View EMU Log tab and select
Output Report from the shortcut menu to display the log information in the
current page in the form of report. You can set the format of the page and
output the report as an XML, TXT, CSV or XSL file.
Right-click the log displaying area in the View EMU Log tab and select
Print All from the shortcut menu. Set the parameters in the Print dialog
box and click OK to print all EMU command logs.
Right-click the EMU log to be printed and select Print the Selected from
the shortcut menu. Set the parameters in the Print dialog box and click OK
to print the selected EMU command log.
10.6
Procedure
1.
Select SecurityView Report Event in the main menu to open the Report
Event tab and view the events related to the ASON equipment.
Version: A
10-9
2.
(Optional) Right-click any area in the Report Event tab and select Query
Condition from the shortcut menu to set the reporting time range of the events
and click Query to display the reported events in the specified time range.
Note:
You can select SystemNetwork Status Monitor in the main menu and
click Event in the Network Status Monitor tab to view the information of
related events.
10.7
Background Information
Only the IPRAN NE supports uploading NE device logs.
Procedure
1.
10.8
10.8.1
Procedure
1.
10-10
Version: A
10 Log Management
2.
Right-click anywhere in the Alarm History Filter tab and select Set the
Command Log Filter to open the Command Log Filter of the Filter Settings
window, as shown in Figure 10-4.
Figure 10-4
3.
Select the command types to be filtered in the Command Log Filter tab.
4.
Other Operations
Select the submenus under the Action main menu or right-click anywhere in the
Filter Settings window to perform the following operations:
u
Select Filter All to select and filter all codes in the current tab.
Select Filter the Selected Items to filter the selected codes in the current tab.
Select Unfilter the Selected Items to not filter the selected codes in the current
tab.
Select Save Current Alarm Filter Setting to save the filtering configurations in
the current tab.
Version: A
10-11
10.8.2
Procedure
1.
2.
Right-click anywhere in the Alarm History Filter tab and select View
Command Log Filter. In the Command Log Filter window, view the command
log filter information.
Other Operations
Right-click anywhere in the Command Log Filter tab to perform the following
operations:
u
Select View Alarm History Filter to view the filter information of alarm history.
Select Setting History Alarm Filter to open the History Alarm Filter tab of the
Filter Setting window.
Select View Command Log Filter to view the filter information of command
logs.
Select Set Command Log Filter to open the Command Log Filter tab of the
Filter Setting window.
10-12
10 Log Management
10.9
Prerequisite
The EMS_Dumper service is started up.
Procedure
1.
2.
Note:
The alert box prompts the number of remaining entries for each save item
that will reach the save threshold.
3.
See Table 10-1 to set the save parameters in the Save Data tab.
Table 10-1
Configuration Item
Start Time to
Save
End Time to
Save
Save
Path to Save
Settings
Description
Sets the save start time. The value range is 0 to 23. It is 3 by
default, indicating the data saving will start from three oclock in
the morning.
Sets the save end time. The value range is 0 to 23. It is 7 by
default, indicating the data saving will end at seven oclock in the
morning.
The path of data save.
Three file types are supported.
u
Save File
type
Default text: The data after save are in a TXT file, which
cannot be imported into the database.
DbBackup text: The data after save are in a script file, which
can be imported into the database.
Both: The data are saved according the default text and
DbBackup text type simultaneously.
Sub-item of
save
Version: A
Type of Save
Table 10-1
Description of the Parameters in the Save Data Tab - Command Logs (Continued)
Configuration Item
Save
Threshold
Current
Capacity
Description
If the command log quantity in the database reaches this
number, the data will be transferred within the configured time.
(Unit: entry. Users can set any integer number above 0.)
Displays the number of alarm history entries in the database.
Number of
Entries to
the database and saved to a hard disk when the save condition
Save
is met.
Single File
Capacity
Number of
Save Files
Time limit of
Transfer
(days)
Sets the time condition that triggers the data save of command
logs. When the duration of the command logs saved in the
database exceeds the value set here, the data will be saved to
another location in the specified period of time.
Caution:
If the quantity of actual save entries in the system is more than the Single
File Capacity the Number of Save Files, the data will be lost.
4.
After completing the above configuration, click the Settings at the bottom of the
Save Data tab.
5.
10-14
Version: A
11
Statistical Management
The OTNM2000 provides the statistical management and supports the setting of
task statistics of the equipment status, the bandwidth utilization ratio and traffic.
11-1
PM Statistics
Managing VOA Status Statistics
IP Statistics
Viewing the Opposite End Port Information
Viewing Software Version
Viewing IP Configuration
11-2
Version: A
11 Statistical Management
11.1
11.1.1
Procedure
1.
2.
Select the desired link in the left pane of the Link Resource Usage window.
If you select All Links, the system will query the resources of all links.
Click
of Start NE to select the start NE. The link resource list displays
the links related to the start NE, as shown in the following figure:
Version: A
11-3
3.
In the link resource list, select the desired link and click
, as shown in
11-4
Version: A
11 Statistical Management
4.
5.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
6.
11.1.2
Procedure
1.
2.
Select the desired link in the left pane of the Circuit Statistics on Link window.
If you select All Links, the system will query the resources of all links.
Click
of Start NE to select the start NE. The link resource list displays
the links related to the start NE, as shown in the following figure:
Version: A
11-5
3.
In the link resource list, select the desired link and click
, as shown in
4.
11-6
Version: A
11 Statistical Management
5.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
6.
11.1.3
Procedure
1.
2.
Version: A
11-7
Note:
In case there are massive data, click Previous Page or Next Page to
view all data.
3.
4.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
5.
11.1.4
Procedure
1.
11-8
Version: A
11 Statistical Management
2.
3.
4.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
5.
Version: A
11-9
11.1.5
Procedure
1.
2.
11-10
Version: A
11 Statistical Management
3.
4.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
5.
11.1.6
Procedure
1.
2.
Version: A
11-11
3.
4.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
5.
11.1.7
Procedure
1.
11-12
Version: A
11 Statistical Management
2.
3.
4.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
5.
Version: A
11-13
11.1.8
Procedure
1.
11-14
2.
3.
4.
Click the
Version: A
11 Statistical Management
Note:
Click Preview to view the file pattern of the selected transfer type.
5.
11.1.9
Procedure
1.
2.
Version: A
11-15
3.
4.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
5.
11.1.10
Procedure
1.
11-16
Version: A
11 Statistical Management
2.
3.
4.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
5.
Version: A
11-17
11.1.11
Procedure
1.
2.
Select the desired NE port in the left pane of the Port Flow Statistics tab.
If you select All NE Ports, the system will gather statistics of the traffic of
all NE ports.
Click the NE and Port drop-down lists to select the desired NE and port, as
shown in the following figure:
11-18
Version: A
11 Statistical Management
3.
Version: A
Click
11-19
4.
5.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
6.
11.1.12
Procedure
1.
11-20
Version: A
11 Statistical Management
2.
3.
4.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
5.
Version: A
11-21
11.1.13
Procedure
1.
2.
11.1.14
Procedure
1.
11-22
Version: A
11 Statistical Management
2.
figure:
3.
Version: A
2)
11-23
3)
4)
11-24
Version: A
11 Statistical Management
Caution:
When the IP address conflicts after being modified, click Duplicate
Detection. The NEs with conflicting LSR IDs will be highlighted in green.
In this situation, the modification operation cannot be performed, as
shown in the following figure:
4.
5.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
6.
11.1.15
Procedure
1.
Version: A
11-25
2.
In the Used Label Information tab, click the Label Continuous Interval
Report button, as shown in the figure below:
2)
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
3)
3.
In the Used Label Information tab, click the Adjust Label button, as
shown in the figure below:
11-26
Version: A
11 Statistical Management
2)
Type.
3)
4.
4)
5)
In the Used Label Information tab, click the Export Report button.
2)
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
3)
11.1.16
Version: A
11-27
Procedure
1.
2.
In the L2VPN filter dialog box, enter the filter information according to your
needs and click Filter, as shown in the following figure:
11-28
Version: A
11 Statistical Management
3.
4.
5.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
6.
11.1.17
Procedure
1.
Version: A
11-29
2.
3.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
4.
11.1.18
Procedure
1.
11-30
Version: A
11 Statistical Management
2.
3.
4.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
5.
Version: A
11-31
11.1.19
Procedure
1.
11-32
2.
3.
4.
Click the
Version: A
11 Statistical Management
Note:
Click Preview to view the file pattern of the selected transfer type.
5.
11.1.20
Procedure
1.
2.
3.
Click the
Note:
Click Preview to view the file pattern of the selected transfer type.
4.
Version: A
11-33
11.2
Stock Statistics
You can gather statistics of data in use at a specified time.
11.2.1
Procedure
1.
Select StatisticsNE Statistic in the main menu to open the NE Statistic tab,
which displays the data of all NEs, as shown in the following figure:
2.
Click Filter and enter the keyword in the Text Filter text box. The system
automatically lists the NEs related to the keyword, as shown in the following
figure:
11-34
Version: A
11 Statistical Management
3.
Click Export and enter the output information in the Option dialog box, as
shown in the following figure:
4.
5.
In the NE Statistics tab, select any NE entry and click Locate Shelf. The NE
Information tab appears, locating the subrack of the selected NE.
6.
In the NE Statistics tab, select any NE entry and click Locate Topo. The Main
Topology tab appears, locating the selected NE.
11.2.2
Version: A
11-35
Procedure
1.
2.
11.2.3
Procedure
1.
Select StatisticsSlot Used Statistic in the main menu to open the Slot
Used Statistic tab, which lists the slot information of all NEs, as shown in the
following figure:
11-36
Version: A
11 Statistical Management
2.
11.2.4
Procedure
1.
Version: A
11-37
2.
Extended Functions
The extended functions in the SN Statistics tab are described in Table 11-1.
Table 11-1
Button
Expand / Collapse OP
Sync
Download
Read
Write
Import
11.2.5
Function
11-38
Version: A
11 Statistical Management
Procedure
1.
Select StatisticsNE Link Info Statistics in the main menu, as shown in the
following figure:
2.
Select the desired NE in the lower part of the Operational Tree pane and click
, as shown in the following figure:
Version: A
11-39
3.
In the NE Link Information List tab, click the Export to CSV File button.
4.
Select the save path and enter the file type in the displayed Save as dialog box,
and then click Save.
11.3
Alarm Statistics
The OTNM2000 supports gathering statistics of device-related alarms and
outputting reports.
11.3.1
Procedure
1.
2.
Select the desired object in the lower part of the Operational Tree pane and
click Add or right-click anywhere in the Alarm Filter Statistics tab and select
Add from the shortcut menu to open the Add dialog box, as shown in
Figure 11-1.
11-40
Version: A
11 Statistical Management
Figure 11-1
3.
Table 11-2
Parameter
Description
Task Name
Task Enable
Basic setting
Task Type
File Output
Version: A
11-41
Table 11-2
Parameter
Description
u
4.
Click OK and view the statistical task in the Alarm Filter Statistics tab.
5.
(Optional) Select the corresponding statistical task and click Modify or rightclick the desired task and select Modify from the shortcut menu. See
Table 11-2 to modify the parameters and click OKTable 11-2.
6.
(Optional) Select the corresponding statistical task and click Delete or rightclick the desired task and select Delete from the shortcut menu. See the alert
box to select the corresponding operation.
11-42
Version: A
11 Statistical Management
Click Yes in the displayed alert box to delete the selected task and its
result report.
7.
Click No in the displayed alert box to delete the selected task only.
Select the desired statistical task and click Task Result Files or right-click the
desired task and select Task Result Files from the shortcut menu to open the
File Result List dialog box.
8.
Select the file to be checked and click OK to save the selected file to the
designated directory.
11.3.2
Prerequisite
The task of exporting all alarm history is set. See Exporting All Alarm History Data.
Procedure
1.
Version: A
11-43
2.
Select any entry in the Alarm History Statistics tab and click Task Result
Files, as shown in the following figure:
3.
11-44
Version: A
11 Statistical Management
11.4
PM Statistics
The OTNM2000 supports the performance statistics of the equipment and outputs
the related report.
11.4.1
Procedure
1.
2.
Select the object in the Operational Tree tab in the object tree pane. Click Add
or right-click any area of the Bandwidth Utilization Statistics Management
tab and select Add from the shortcut menu to open the Add dialog box, as
shown in Figure 11-2.
Version: A
11-45
Figure 11-2
3.
See Table 11-3 to set the statistical task parameters in the Add dialog box.
Table 11-3
Description for the Items in the Parameter Setting of the Bandwidth Usage
Statistics
Description
Parameter
Task Name
Task Enable
Basic
default.
setting
Task Type
11-46
Version: A
11 Statistical Management
Table 11-3
Description for the Items in the Parameter Setting of the Bandwidth Usage
Statistics (Continued)
Description
Parameter
File Output
Sets the file output formats and includes CSV and HTML; CSV is
by default.
u
If Timing Run is selected for the task type, the Begin Time
and the End Time are used to set the time range of the
timing task and show the statistics time range of the
bandwidth utilization ratio.
Task Time
Setting
If Manual Run is selected for the task type, the Begin Time
and the End Time should not be later than the current time
and are used to set the statistics time range of the history
data of the bandwidth utilization ratio.
Running Time is the time for executing the Timing Run task and
Manual Run task.
Sets the task period only when the Timing Run is selected for
the task type.
Sets the period of executing the task and there are two types
including Day and Week.
Task Period
Sets the time interval in the Interval (Day) text box when the
Day is selected for the Task Period.
Only displays
the fiber-
When this item is selected, the Object Selection List dialog box
Object type
connected
setting
port.
4.
Packet loss
Sets the type of the port whose packet loss rate is to be included
rate statistics
in the statistics.
Click Run and select the object in the Object Selection List dialog box, as
shown in the following figure:
Version: A
11-47
5.
Click OK and check the statistics task in the Bandwidth Utilization Statistics
Management tab.
6.
(Optional) Select the corresponding statistical task and click Modify or rightclick the desired task and select Modify from the shortcut menu. See
Table 11-3 to modify the parameters and click Run.
7.
(Optional) Select the corresponding statistical task and click Delete or rightclick the desired task and select Delete from the shortcut menu. See the
following alert box to select the corresponding operation.
Click OK in the displayed Delete the selected task? alert box. The Delete
the result file simultaneously? alert box appears, as shown in the
following figure:
11-48
Version: A
11 Statistical Management
Note:
u
Click No to delete the task only, with the result file reserved.
Click Cancel in the displayed Delete the selected task? alert box to
cancel the operation.
8.
Select the desired statistical task and click Task Result Files or right-click the
desired task and select Task Result Files from the shortcut menu to open the
File Result List dialog box.
9.
Select the desired file and click Save As to save the selected file to the
specified directory.
11.4.2
Procedure
1.
2.
Select the object in the Operational Tree tab in the object tree pane and click
Add or right-click any area of the 15min Traffic Statistics Management tab
and select Add from the shortcut menu to open the Add dialog box, as shown
in Figure 11-3.
Version: A
11-49
Figure 11-3
3.
See Table 11-4 to set the statistical task parameters in the Add dialog box.
Table 11-4
Description for the Items in the Parameter Setting of the 15min Traffic Statistics
Description
Parameter
Task Name
Task Enable
Basic
by default.
setting
Task Type
11-50
Version: A
11 Statistical Management
Table 11-4
Description for the Items in the Parameter Setting of the 15min Traffic Statistics
(Continued)
Description
Parameter
File Output
Sets the file output formats and includes CSV and HTML;
CSV is by default.
u
Task Time
Setting
Running Time is the time for executing the Timing Run task
and Manual Run task.
Sets the task period only when the Timing Run is selected
for the task type.
Sets the period of executing the task and there are two types
including Day and Week.
Task Period
Sets the time interval in the Interval (Day) text box when
the Day is selected for the Task Period.
Only displays
Object type
setting
4.
statistics
Click Run and select the object in the Object Selection List dialog box, as
shown in the following figure:
Version: A
11-51
5.
Click OK and check the statistics task in the 15min Traffic Statistics
Management tab.
6.
(Optional) Select the corresponding statistical task and click Modify or rightclick the desired task and select Modify from the shortcut menu. See
Table 11-4 to modify the parameters and click Run.
7.
(Optional) Select the corresponding statistical task and click Delete or rightclick the desired task and select Delete from the shortcut menu. See the
following alert box to select the corresponding operation.
Click OK in the displayed Delete the selected task? alert box. The Delete
the result file simultaneously? alert box appears, as shown in the
following figure:
11-52
Version: A
11 Statistical Management
Note:
u
Click No to delete the task only, with the result file reserved.
Click Cancel in the displayed Delete the selected task? alert box to
cancel the operation.
8.
Select the desired statistical task and click Task Result Files or right-click the
desired task and select Task Result Files from the shortcut menu to open the
File Result List dialog box.
9.
Select the desired file and click Save As to save the selected file to the
specified directory.
11.4.3
Procedure
1.
2.
Select the object in the Operational Tree tab in the object tree pane and click
Add or right-click any area of the 24hour Traffic Statistics Management tab
and select Add from the shortcut menu to open the Add dialog box, as shown
in Figure 11-4.
Version: A
11-53
Figure 11-4
3.
See Table 11-5 to set the statistical task parameters in the Add dialog box.
Table 11-5
Description for the Items in the Parameter Setting of the 24-hour Traffic Statistics
Description
Parameter
Task Name
Task Enable
Basic
default.
setting
Task Type
11-54
Version: A
11 Statistical Management
Table 11-5
Description for the Items in the Parameter Setting of the 24-hour Traffic Statistics
(Continued)
Description
Parameter
File Output
Sets the file output formats and includes CSV and HTML; CSV is
by default.
u
If Timing Run is selected for the task type, the Begin Time
and the End Time are used to set the time range of the
timing task and show the statistics time range of the 24-hour
traffic.
Task Time
Setting
If Manual Run is selected for the task type, the Begin Time
and the End Time should not be later than the current time
and are used to set the statistics time range of the history
data of the 24-hour traffic.
Running Time is the time for executing the Timing Run task and
Manual Run task.
Sets the task period only when the Timing Run is selected for the
task type.
Sets the period of executing the task and there are two types
including Day and Week.
Task Period
Sets the time interval in the Interval (Day) text box when the
Day is selected for the Task Period.
Only displays
Object
type
setting
4.
the fiber-
When this item is selected, the Object Selection List dialog box
connected
port.
Packet loss
Sets the type of the port whose packet loss rate is to be included
rate statistics
in the statistics.
Click Run and select the object in the Object Selection List dialog box, as
shown in the following figure:
Version: A
11-55
5.
Click OK and check the statistics task in the 24hour Traffic Statistics
Management tab.
6.
(Optional) Select the corresponding statistical task and click Modify or rightclick the desired task and select Modify from the shortcut menu. See
Table 11-5 to modify the parameters and click Run.
7.
(Optional) Select the corresponding statistical task and click Delete or rightclick the desired task and select Delete from the shortcut menu. See the alert
box to select the corresponding operation.
Click OK in the displayed Delete the selected task? alert box. The Delete
the result file simultaneously? alert box appears, as shown in the
following figure:
11-56
Version: A
11 Statistical Management
Note:
u
Click No to delete the task only, with the result file reserved.
Click Cancel in the displayed Delete the selected task? alert box to
cancel the operation.
8.
Select the desired statistical task and click Task Result Files or right-click the
desired task and select Task Result Files from the shortcut menu to open the
File Result List dialog box.
9.
Select the desired file and click Save As to save the selected file to the
specified directory.
11.4.4
Procedure
1.
2.
Select the desired object in the lower part of the Operational Tree pane and
click Add or right-click anywhere in the Device Environment Parameters
Statistics tab and select Add from the shortcut menu to open the Add dialog
box, as shown in Figure 11-5.
Version: A
11-57
Figure 11-5
3.
See Table 11-6 to set the statistical task parameters in the Add dialog box.
Table 11-6
Parameter
Task Name
Basic setting
Task Enable
11-58
Version: A
11 Statistical Management
Table 11-6
Task Type
is selected.
u
File Output
4.
Click Run and view the statistical task in the Device Environment Parameters
Statistics tab.
5.
(Optional) Select the corresponding statistical task and click Modify or rightclick the desired task and select Modify from the shortcut menu. See
Table 11-6 to modify the parameters and click Run.
Version: A
11-59
6.
(Optional) Select the corresponding statistical task and click Delete or rightclick the desired task and select Delete from the shortcut menu. See the alert
box to select the corresponding operation.
Click OK in the displayed Delete the selected task? alert box. The Delete
the result file simultaneously? alert box appears, as shown in the
following figure:
Note:
u
Click No to delete the task only, with the result file reserved.
Click Cancel in the displayed Delete the selected task? alert box to
cancel the operation.
7.
Select the desired statistical task and click Task Result Files or right-click the
desired task and select Task Result Files from the shortcut menu to open the
File Result List dialog box.
8.
Select the desired file and click Save As to save the selected file to the
specified directory.
11-60
Version: A
11 Statistical Management
11.4.5
Procedure
1.
2.
Select the object in the Operational Tree tab in the object tree pane and click
Add or right-click any area of the Option of Power Statistics tab and select
Add from the shortcut menu to open the Add dialog box, as shown in
Figure 11-6.
Figure 11-6
Version: A
3.
See Table 11-7 to set the statistical task parameters in the Add dialog box.
Table 11-7
Parameter
Task Name
Task Enable
Task Type
File Output
Basic setting
Task Time
Setting
Running Time is the time for executing the Timing Run task
and Manual Run task.
Sets the task period only when the Timing Run is selected
for the task type.
Sets the period of executing the task and there are two
types including Day and Week.
Task Period
Performance
4.
Click Run and select the object in the displayed Object Selection List dialog
box, as shown in the following figure:
11-62
Version: A
11 Statistical Management
5.
Click OK and view the statistical task in the Option of Power Statistics tab.
6.
(Optional) Select the corresponding statistical task and click Modify or rightclick the desired task and select Modify from the shortcut menu. See
Table 11-7 to modify the parameters and click Run.
7.
(Optional) Select the corresponding statistical task and click Delete or rightclick the desired task and select Delete from the shortcut menu. See the alert
box to select the corresponding operation.
Click OK in the displayed Delete the selected task? alert box. The Delete
the result file simultaneously? alert box appears, as shown in the
following figure:
Version: A
11-63
Note:
u
Click No to delete the task only, with the result file reserved.
Click Cancel in the displayed Delete the selected task? alert box to
cancel the operation.
8.
Select the corresponding statistics task and click Task Result Files to open the
File Result List dialog box.
9.
Select the desired file and click Save As to save the selected file to the
specified directory.
11.4.6
Procedure
1.
2.
Select the desired object in the lower part of the Operational Tree pane and
click Add or right-click anywhere in the CPU MEM Statistics tab and select
Add from the shortcut menu to open the Add dialog box, as shown in
Figure 11-7.
11-64
Version: A
11 Statistical Management
Figure 11-7
3.
See Table 11-8 to set the statistical task parameters in the Add dialog box.
Table 11-8
Parameter
Task Name
Task Enable
Basic
default.
setting
Task Type
Version: A
11-65
Table 11-8
Parameter
File Output
Sets the file output formats and includes CSV and HTML; CSV is
by default.
u
If Timing Run is selected for the task type, the Begin Time
and the End Time are used to set the time range of the
timing task and show the statistics time range of the
bandwidth utilization ratio.
Task Time
Setting
If Manual Run is selected for the task type, the Begin Time
and the End Time should not be later than the current time
and are used to set the statistics time range of the history
data of the bandwidth utilization ratio.
Running Time is the time for executing the Timing Run task and
Manual Run task.
Sets the task period only when the Timing Run is selected for
the task type.
Sets the period of executing the task and there are two types
including Day and Week.
Task Period
Sets the time interval in the Interval (Day) text box when the
Day is selected for the Task Period.
Statistics of
NE CPU
NE CUPU
and
and Memory
Memory
Usage
Usage
4.
Click Run. View the statistical task set in the CPU MEM Statistics tab.
5.
(Optional) Select the corresponding statistical task and click Modify or rightclick the desired task and select Modify from the shortcut menu. See
Table 11-8 to modify the parameters and click Run.
6.
(Optional) Select the corresponding statistical task and click Delete or rightclick the desired task and select Delete from the shortcut menu. See the
following alert box to select the corresponding operation.
11-66
Version: A
11 Statistical Management
Click OK in the displayed Delete the selected task? alert box. The Delete
the result file simultaneously? alert box appears, as shown in the
following figure:
Note:
u
Click No to delete the task only, with the result file reserved.
Click Cancel in the displayed Delete the selected task? alert box to
cancel the operation.
7.
Select the desired statistical task and click Task Result Files or right-click the
desired task and select Task Result Files from the shortcut menu to open the
File Result List dialog box.
8.
Select the desired file and click Save As to save the selected file to the
specified directory.
11.5
Version: A
11-67
Procedure
1.
2.
Select the object in the Operational Tree tab in the object tree pane and click
Add or right-click any area of the VOA Status Statistics Management tab and
select Add from the shortcut menu to open the Add dialog box, as shown in
Figure 11-8.
Figure 11-8
3.
11-68
See Table 11-9 for setting related parameters of the statistics task.
Version: A
11 Statistical Management
Table 11-9
Description for the Items in the Parameter Setting of the VOA Status Statistics
Description
Parameter
Task Name
Task Enable
Task Type
File Output
Basic
setting
Task Time
The Begin Time and the End Time are optional setting items
Setting
and used to set the time range of the scheduled task. The
Running Time is the compulsory item used for setting the time
for running the scheduled task.
Sets the task period only when the Timing Run is selected for
the task type.
Sets the period of executing the task and there are two types
including Day and Week.
Task Period
Sets the time interval in the Interval (Day) text box when the
Day is selected for the Task Period.
4.
Click Run and check the statistical task in the VOA Status Statistics
Management.
5.
(Optional) Select the corresponding statistical task and click Modify or rightclick the desired task and select Modify from the shortcut menu. See
Table 11-9 to modify the parameters and click Run.
6.
(Optional) Select the corresponding statistical task and click Delete or rightclick the desired task and select Delete from the shortcut menu. See the alert
box to select the corresponding operation.
Version: A
11-69
Click OK in the displayed Delete the selected task? alert box. The Delete
the result file simultaneously alert box appears. as shown in the figure
below:
Note:
u
Click No to delete the task only, with the result file reserved.
Click Cancel in the displayed Delete the selected task? alert box to
cancel the operation.
7.
Select the desired statistical task and click Task Result Files or right-click the
desired task and select Task Result Files from the shortcut menu to open the
File Result List dialog box.
8.
Select the desired file and click Save As to save the selected file to the
specified directory.
11.6
IP Statistics
The OTNM2000 supports gathering statistics of the IP addresses of the devices in
the entire network, which is convenient for you to perform unified management of IP
addresses.
11-70
Version: A
11 Statistical Management
11.6.1
Procedure
1.
2.
Select the corresponding object in the lower part of the Operational Tree pane
and click
below:
3.
In the Filter text box, enter the keyword and click Filter to filter the IP data
entries matching the keyword.
4.
5.
(Optional) Select a data entry and click Locate to NE Config. The NE Config
tab appears.
6.
(Optional) Select a data entry and click Locate to Shelf. The corresponding
shelf view appears.
7.
(Optional) Select a data entry and click Locate to Topo. The Main Topology
tab appears.
Version: A
11-71
11.6.2
Procedure
1.
2.
Select the corresponding object in the lower part of the Operational Tree pane
and click
3.
In the Filter text box, enter the keyword and click Filter to filter the IP data
entries matching the keyword.
4.
5.
(Optional) Select a data entry and click Locate to NE Config. The NE Config
tab appears.
6.
(Optional) Select a data entry and click Locate to Shelf. The corresponding
shelf view appears.
7.
(Optional) Select a data entry and click Locate to Topo. The Main Topology
tab appears.
11-72
Version: A
11 Statistical Management
11.7
Procedure
1.
Right-click an NE in the Logical Tree tab or logical view and select Show
Opposite End Port Information to open the Show Opposite End Port
Information dialog box, as shown in Figure 11-9. You can view the information
of the opposite end port.
Figure 11-9
11.8
Procedure
1.
2.
Select NE whose software version you want to view in the lower part of the
Operational Tree pane and click
3.
View the software version and other related information of the selected NE in
the Software Version View tab that appears, as shown in Figure 11-10.
Version: A
11-73
Figure 11-10
4.
(Optional) Click Re-Query Failed Object to query the object whose query
status is Failure again.
5.
(Optional) Click Export to CSV File to save the software version information as
the *.Csv file in the designated directory.
11.9
Viewing IP Configuration
Check the IP addresses of the NEs.
Procedure
1.
2.
11-74
Version: A
11 Statistical Management
3.
Figure 11-11
Version: A
11-75
12
Data Management
Backing Up / Restoring the OTNM2000 Data
Managing Data Sources
Backing Up / Restoring Service Data
Version: A
12-1
12.1
Description
The OTNM2000 supports manual or automatic backup of
the OTNM2000 configuring data. The configuration to be
tool
12-2
Version: A
12 Data Management
Table 12-1
Description
When backing up the cross-connect data of service
management, the service management data will be saved
as a SNC file.
management
12.1.1
Background Information
When the configuration data is saved to the database by default, the OTNM2000
will automatically back up the original data in the database to the D:\OTNM\ui
\backup directory.
Procedure
1.
Double-click the
2.
3.
In the displayed User Login dialog box, enter the username and password
on the toolbar.
12-3
4.
Click
Other Operations
Restore the OTNM2000 configuration data.
1.
2.
12.1.2
Click
Background Information
The OTNM2000 supports backing up and restoring the configuring data through the
network management tool.
u
Supports setting the backup server to select local backup or FTP backup.
12-4
Version: A
12 Data Management
Prerequisite
The EMS_unmcmagent and EMS_unmcmservice services have been started up
at the server end.
Procedure
1.
2.
Enter the username and password, and click Login to access the GUI of the
network management tool.
Note:
The system provides two users by default:
u
The username and password of the ordinary query user are Query,
which only has the authority to view and export data.
Version: A
12-5
3.
On the GUI of the network management tool, click Import/Export to open the
import / export GUI.
4.
Click set timer to set whether to enable the timer and set the backup
interval and backup time.
2)
After completing the settings, click OK and then click OK in the displayed
alert box.
5.
Click set backup server to select the local backup or the FTP server and
set the parameters related to the backup server, including backup folder on
the local server and the IP address / port of the FTP server.
2)
After completing the settings, click OK and then click OK in the displayed
alert box.
6.
Click Export, enter the file description information in the file description
text box and click OK.
2)
Other Operations
Import the configuring data manually.
12-6
Version: A
12 Data Management
1.
2.
When all the processes are stopped, click Import/Export to select the file type
and the file to be imported. Then click OK.
3.
12.1.3
Prerequisite
u
1.
Procedure
main menu.
2.
In the displayed Save As dialog box, enter the Filename, specify the saving
directory and then click Save.
12.1.4
Prerequisite
Version: A
12-7
Procedure
1.
2.
In the displayed Open dialog box,select the service configuration file and click
Open.
12.1.5
Prerequisite
You have logged out of the OTNM2000.
Procedure
1.
Figure 12-1
2.
Select the Data export radio option and click Browse to select the save
directory of the data history. The save directory is D:\Otnm2000DataBck by
default. It is not recommended to modify the save directory for convenient
search.
3.
12-8
Click the Table options button to open the dialog box as shown in Figure 12-2.
Version: A
12 Data Management
Figure 12-2
4.
Click the >> button to move all the items from the left list to the right list. To
move a certain item from the left list to the right list, double-click the item, or
select the item and click >. The items available in the left list are described in
Table 12-2.
Table 12-2
Version: A
Name
Description
alarmhis
Alarm history.
pmhis15
pmhis24
commandlog
Command logs.
userlog
User logs.
nofaulttype
nopmtype
nocommandlog
filedatasource
Service data.
asonalarm
ASON alarms.
alarmdetailcond
pmtask
alarmnewgrade
Table 12-2
Name
Description
cmdauthorize
t_dcndev
t_dcntopolink
t_userinfo
User information.
The unended and unconfirmed current alarms and the
newalarm
newalarmmonth
5.
6.
7.
When the export is completed, the alert box as shown in Figure 12-3 appears.
Click Finish and then Quit.
Figure 12-3
8.
(Optional) When exporting data in versions later than Version 05.28, the export
logs will be generated. Go to the log directory displayed on Figure 12-3 to view
the logs. If no error appears in the log, the data is exported successfully.
12.1.6
12-10
Version: A
12 Data Management
Prerequisite
You have logged out of the OTNM2000.
Procedure
1.
Figure 12-4
2.
Select the Data Import radio option. Click Browse to select the file folder
saving the data history backup and then click OK.
3.
Version: A
Click the Table options button to open the dialog box as shown in Figure 12-5.
12-11
Figure 12-5
4.
Click the >> button to move all the items from the left list to the right list. To
move a certain item from the left list to the right list, double-click the item, or
select the item and click>. The items available in the left list are described in
Table 12-2.
5.
6.
7.
When the import is completed, the alert box as shown in Figure 12-6 appears.
Click Finish and then Quit.
12-12
Version: A
12 Data Management
Figure 12-6
8.
(Optional) Go to the log directory displayed on Figure 12-6 to view the logs. If
no error appears in the log, the data is imported successfully.
9.
Restart the related services of the OTNM2000 to validate the imported data
history.
1)
2)
12.2
12.2.1
Version: A
12-13
Background Information
After the multi-service management platform of the OTNM2000 is introduced and
applied, the service configuration efficiency concerns users. The multi-service
management platform adopts the Import from File, effectively improving the
efficiency of configuring the circuit data.
Prerequisite
u
Make sure the imported configuration data file will not influence the normal
communication of the current network.
Procedure
1.
2.
In the displayed Open dialog box, select the desired file and click the Open
button to import the file.
Note:
The type of the imported / exported circuit data file is *.dat by default.
12.2.2
Prerequisite
12-14
Version: A
12 Data Management
Warning:
The Clear Config Data operation is a high-risk operation. Please handle
with care.
Procedure
1.
2.
In the displayed Business Management alert box, click Yes, as shown in the
figure below:
3.
In the displayed Business Management alert box, click Yes, as shown in the
figure below:
12.3
Version: A
12-15
12.3.1
Background Information
u
Scenarios 1: In case that the subnet circuit data is lost but the device circuit
data is normal, the multi-service background obtains the NE configuration by
performing inversion algorithm of device-side data . Then it performs service
data synchronization, generates the subnet-side circuit data and reports to the
multi-service GUI.
Scenario 2: In the early period of the project, the device ran as a dynamic
service model and did not involve the OTNM2000 for service configuration and
management. As it is required to implement unified management and
configuration in the later period of the project, you can use the "Synchronize All
Configuration Data" function to synchronize all service data configured through
the CLI to the OTNM2000.
Prerequisite
u
Make sure the Synchronize All Config Data operation will not cause
communication failure of the network.
Procedure
1.
2.
In the displayed Configuration Synchronize All Config Data tab, click Total
Search. The multi-service background obtains the result by performing
inversion algorithm of device data and writes the result to the NE configuration.
Besides, it summarizes the number of circuits of different types and presents
the result on the GUI, as shown in the figure below:
12-16
Version: A
12 Data Management
3.
12.3.2
Prerequisite
u
Make sure the operation will not cause communication failure of the network.
1.
Procedure
In the displayed Business Management alert box, click Yes, as shown in the
figure below:
Version: A
12-17
12.3.3
Prerequisite
u
1.
Procedure
main menu.
2.
In the displayed Save As dialog box, enter the Filename, specify the saving
directory and then click Save.
12.3.4
Prerequisite
u
1.
Procedure
In the displayed Open dialog box,select the service configuration file and click
Open.
12-18
Version: A
12 Data Management
12.3.5
Prerequisite
u
The service configuration data to be downloaded from the server are correct.
1.
Procedure
In the displayed Business Management alert box, click Yes to complete data
download, as shown in the figure below:
12.3.6
Prerequisite
u
1.
Procedure
12-19
2.
12-20
Version: A
Service
Description
EMS_cfgdatamgr
EMS_DataBusServer
EMS_DispServer
EMS_Dtserver
processing results.
Data processing component, receiving and processing the
commands sent from other components.
EMS_Dumper
EMS_FileServer
EMS_IceNode
EMS_IceRegister
EMS_Manager2
EMS_MSMPServer
EMS_NeCfgService
NE configuration service.
EMS_OtnmApiServer
EMS_OtnmCfgService
EMS_QueryServer
Version: A
EMS_RsyncServer
EMS_unmcmagent
EMS_unmcmservice
A-1
Set the default browser. If the default browser is Internet Explorer 8, skip this
step.
1)
2)
Click the Programs tab, select the Tell me if Internet Explorer is not the
default web browser. check box under Default web browser.
3)
Click OK and restart the Internet Explorer 8 browser. In the displayed alert
box, click Yes to complete the settings.
2.
2)
Select the General tab, click Settings under Tabs to open the Tabbed
Browsing Settings dialog box.
Version: A
B-1
3)
4)
Select to open links in The current tab or window, indicating that the new
help tab will replace the original help tab.
B-2
Version: A
5)
3.
Click OK. The settings take effect after the browser is restarted.
2)
Select the Privacy tab and make sure the Turn on Pop-up Blocker option
is not selected.
Version: A
B-3
3)
4.
Click OK. The settings take effect after the browser is restarted.
B-4
Version: A
Appendix C Abbreviations
Version: A
BCT
BML
BMS
CPU
DCC
DCN
DDN
EML
EMS
EMU
FTP
GE
Gigabit Ethernet
GNE
GUI
IP
Internet Protocol
LSP
NE
Network Element
NEL
NML
NMS
OTN
PW
Pseudo Wire
QoS
Quality of Service
SML
SMS
SSM
TCP
TMN
UDP
UPS
VLAN
WDM
C-1
in daily maintenance
in trouble
3. What is the percentage of the operations on the product for which you can get instruction from the
documentation?
100% 80%
50% 0%
4. Are you satisfied with the promptness with which we update the documentation?
Satisfied
Somewhat
Normal
Practical
11. Thinking of the documentations you have ever read offered by other companies, how would you compare
our documentation to them?
Product documentations from other companies:
Satisfied (please specify)
Unsatisfied (please specify)
12. Additional comments about our documentation or suggestions on how we can improve:
Thank you for your assistance. Please fax or send the completed survey to us at the contact information
included in the documentation. If you have any questions or concerns about this survey please email at
edit@fiberhome.com