Professional Documents
Culture Documents
June 2017
User Manual – NuBiz GS8000B LSW
Copyright Statement
NuBizTM is the registered trademark of Genew Technologies Co. Ltd. Without the prior written
consent of GENEW, this document shall not be excerpted, reproduced or translated into other
languages in whole or in part, and disclosed to others in any form or by any means.
Contact Us
Website: http://www.genew.cn/
Postcode:518057
FAX:(+86755)26619963
User Manual – NuBiz GS8000B LSW
Statement
The copyright of this data is reserved by Genew Technologies Co., Ltd. No part of this
documentation can be excerpted, reproduced, translated, annotated or duplicated, in any form
or by any means without the written permission of copyright owner. All rights reserved.
NuBiz® is a registered trademark of Genew Technologies Co., Ltd. The name and logo of
the product of Genew Technologies Co., Ltd. are the proprietary marks or the registered
trademarks thereof. Names of other products or corporations mentioned in this manual can be
the trademarks or the trade names of their respective owners. No permission or right present
in this manual can be granted for any use to readers, in any form or by any means without the
prior written permission of Genew Technologies Co., Ltd. or the owner of the third party
trademarks or the trade names.
This product conforms to the design requirements for environmental protection and
personal safety, and the storage, the use and the discard of the product should comply with the
product manuals, relevant contracts or relevant national laws and regulations.
Due to the continual renovation and perfection of products and technologies, the content
in this data may not be completely consistent with the practical product. Thanks for
understanding. Please contact the local office for the update condition of the product.
Feedback Form
In order to improve the quality of the documention for users of Genew Technologies Co., Ltd. and to
provide better service, please take time to give your advices and suggestions, and fax to: 0755-26619963,
or post to: F-3, Dazu-Creative Tower C, 9018 Beihuan Ave., Nanshan District, Shenzhen, China, 518057 ,
Postcode: 518057. Valuable advices and suggestions will be rewarded.
Addition of FAQ
Miscellaneous
Other Advices
On User
Document of
Genew
Technologies
Co., Ltd.
User Manual – NuBiz GS8000B LSW
Preface
Manual Description
This is an User Manual for NuBiz® GS8000, which is applicable to NuBiz® GS8000 (short for NuBiz®
GS8000). This manual is applicable to engineering technicians, system engineers and other administrators.
The relevant manuals matched therewith include the Maintenance Manual for NuBiz® GS8000 and the
Installation Manual for NuBiz® GS8000.
1. Conventions on Symbols
The content with angular bracket "<>" represents the key names, the button names and the information
input by the operator from the terminal; the content with square bracket [
" ]" represents the human-machine
interface, the menu bar, the data sheet and the field name, and the multilevel menu is separated by "→", for
example, the multilevel menu [File→New→Folder] represents the [Folder] menu item under the [new]
submenu of the [File] menu.
Format Meaning
Represents the key names and the button names,
for
example, <Enter>, <Tab>, <Backspace>, <a>,
Characters with angular etc.
bracket
represent the Enter key, the Tab key, the Backspace key
and the lowercase letter "a" respectively.
Means that several keys on the keyboard are
pressed
simultaneously,for example, <Ctrl+Alt+A> means that
1+ Key 2> "Ctrl" key, key and "A" key are
"Alt" pressed
simultaneously.
Means that Key 1 is firstly pressed and released, and then
key 2 is pressed, for example, <Alt, F> means that <Alt>
1, Key 2>
key is firstly pressed and released, and then <F> key is
pressed.
Format Meaning
Click The left key of the mouse is pressed and released quickly.
Double click The left key of the mouse is quickly pressed and released
twice consecutively.
The right key of the mouse is pressed and
Right click released
quickly.
Drag The mouse is moved by pressing the left key of the mouse
and holding it down.
4. Signs
Four obvious signs are used in this book to represent the places where special attentions should be
paid during the operation.
User Manual – NuBiz GS8000B-LSW
Table of Contents
Statement............................................................................................................................................. 3
Feedback Form....................................................................................................................................4
Preface................................................................................................................................................. 6
Table of Contents................................................................................................................................ 9
List of Tables..................................................................................................................................... 11
List of Figures................................................................................................................................... 12
1 Discovery Management................................................................................................................. 15
1.1 Configure SNMP device discovery based on community and proxy ports....................... 16
1.2 Configure the discovery of SNMPv3 devices.................................................................... 16
1.3 Find the log......................................................................................................................... 17
1.3.1 Network Discovery Status....................................................................................... 17
1.3.2 Find the query for the log........................................................................................ 18
2 Map management........................................................................................................................... 20
2.1 IP Topology Management................................................................................................ 20
3 Security Management.................................................................................................................... 23
3.1 Defining a User................................................................................................................ 24
3.1.1 Adding a User.......................................................................................................... 24
3.1.2 User Settings............................................................................................................ 27
3.1.3 Deleting Users.......................................................................................................31
3.2 Defining a Group................................................................................................................ 32
3.2.1 Adding a Group.....................................................................................................32
3.2.2 Group Configuration.............................................................................................35
3.3 Operation Tree..................................................................................................................36
3.3.1 Adding an Operation................................................................................................ 38
3.3.2 Deleting an Operation..............................................................................................38
3.3.3 Default Operation Tree............................................................................................ 39
3.4 Customizing the View’s Function Domain.........................................................................41
3.4.1 Adding the Authorization Function Domain........................................................... 41
3.4.2 Designating the Authorization Function Domain....................................................42
3.4.3 Setting the Attributes of the Authorization Function Domain.................................44
4 Managing Devices in the IP Network............................................................................................45
4.1 Device Faceplate.............................................................................................................. 47
4.1.1 Views of General Switches and Routers..................................................................47
4.1.2 Frame switch Faceplate Graphic............................................................................. 47
4.2 Common Functions.............................................................................................................49
4.3 Performance Management.................................................................................................. 49
4.4 RMON Management...........................................................................................................51
4.4.1 RMON Statistics Admin.......................................................................................... 51
4.4.2 RMON History Group Management....................................................................... 52
User Manual – NuBiz GS8000B-LSW
4.5 Symbol Attribute................................................................................................................. 56
4.6 Attributes of the Managed Object.......................................................................................58
5 Equipment Performance Monitoring............................................................................................. 59
5.1 Memory Real-time Performance Collection.......................................................................59
5.2 Memory Historical Performance Collection.......................................................................59
5.3 CPU Real-time Performance Collection.............................................................................60
5.4 CPU Historical Performance Collection.............................................................................60
6 Fault Management..........................................................................................................................62
6.1 Network Events...................................................................................................................62
6.2 Network Alarms.................................................................................................................. 64
6.2.1 Canceling the alarm notification..............................................................................72
6.2.2 Sound of the alarm notification............................................................................... 72
6.2.3 Alarm type management.......................................................................................... 74
7 Performance Management............................................................................................................. 77
7.1 Performance statistics......................................................................................................... 77
7.1.1 Real-Time Performance Statistics........................................................................... 78
7.1.2 Historical Performance Statistics.............................................................................80
8 Functions of Task Policy Configuration........................................................................................ 81
8.1 Starting the Functions of Task Policy Configuration......................................................... 81
8.2 Backuping the Database......................................................................................................82
8.3 Distributing/Backuping Devices.........................................................................................83
8.4 Patch Upgrade..................................................................................................................... 87
8.5 Setting the Time Policy of Task Execution.........................................................................87
8.6 Operations of Task Policy................................................................................................... 88
8.7 Browsing the Results of Task Policy.................................................................................. 88
9 Common Configuration................................................................................................................. 90
9.1 Port aggregation.................................................................................................................. 90
9.2 Telnet Device...................................................................................................................... 92
9.3 Port Flow Control Settings................................................................................................. 92
9.4 Port Storm Control Settings................................................................................................93
9.5 Change Device Name......................................................................................................... 93
9.6 Port Vlan Configuration......................................................................................................94
10 SNMP Tool...................................................................................................................................95
10.1 MIB Browser.....................................................................................................................95
10.1.1 Toolbar................................................................................................................... 95
10.1.2 Menu Description.................................................................................................. 96
10.1.3 Uploading MIB...................................................................................................... 99
10.1.4 Uninstalling MIB................................................................................................. 100
10.1.5 MIB Browser—Setup.......................................................................................... 100
10.1.6 MIB Browser – SNMP Operations......................................................................102
10.2 SNMPv3 Security...........................................................................................................102
10.2.1 Adding the Protocol Information.........................................................................102
User Manual – NuBiz GS8000B-LSW
List of Tables
Table 3- 1 Default operation Tree............................................................................................................ 39
Table 3- 2 Administrator’s operations......................................................................................................39
Table 3- 3 Operations related with Network events................................................................................ 40
Table 3- 4 Operations of related topologies.............................................................................................40
Table 3- 5 Operations related with alarm.................................................................................................40
Table 4- 1 Interface parameters................................................................................................................54
Table 4- 2 History Data Table.................................................................................................................. 56
Table 10- 1 Functions of MIB browser’s toolbar.................................................................................... 95
Table 10- 2 MIB browser setup............................................................................................................. 101
User Manual – NuBiz GS8000B-LSW
List of Figures
Figure 1- 1 Discover management...........................................................................................................15
Figure 1- 2 Discover a device.................................................................................................................. 16
Figure 1- 3 Find Log................................................................................................................................ 17
Figure 1- 4 Query logs............................................................................................................................. 18
Figure 1- 5 Query special logs................................................................................................................. 19
Figure 2- 1 IP Network management.......................................................................................................20
Figure 2- 2 Detected IP topology.............................................................................................................22
Figure 3- 1 Security Management........................................................................................................... 23
Figure 3- 2 Security Administration........................................................................................................ 23
Figure 3- 3 User Administration.............................................................................................................. 24
Figure 3- 4 User account setting.............................................................................................................. 25
Figure 3- 5 Group permissions................................................................................................................ 26
Figure 3- 6 Browsing all user lists........................................................................................................... 27
Figure 3- 7 Select Group..........................................................................................................................28
Figure 3- 8 User Profile........................................................................................................................... 29
Figure 3- 9 User Profile setting................................................................................................................30
Figure 3- 10 Change Password................................................................................................................ 30
Figure 3- 11 Permissions tree hierarchy.................................................................................................. 31
Figure 3- 12 Permitted Operations for User............................................................................................ 32
Figure 3- 13 Add Group........................................................................................................................... 33
Figure 3- 14 Add a group option..............................................................................................................33
Figure 3- 15 Group description................................................................................................................34
Figure 3- 16 Group Wizard...................................................................................................................... 35
Figure 3- 17 Select Users.........................................................................................................................36
Figure 3- 18 Security Adminstration....................................................................................................... 37
Figure 3- 19 Security................................................................................................................................37
Figure 3- 20 Operation tree configuration............................................................................................... 38
Figure 3- 21 Security Adminstration....................................................................................................... 41
Figure 3- 22 Scope Settings..................................................................................................................... 42
Figure 3- 23 Custom View Scope for Group........................................................................................... 43
Figure 3- 24 Select Authorized Scopes....................................................................................................43
Figure 3- 25 Custom View Scope for Group........................................................................................... 44
Figure 3- 26 Scope Settings..................................................................................................................... 45
Figure 4- 1 Network Maps.......................................................................................................................46
Figure 4- 2 Device Management............................................................................................................. 46
Figure 4- 3 Device management Menu....................................................................................................47
Figure 4- 4 Faceplates of a general device.............................................................................................. 47
Figure 4- 5 GS8000B Chassis..................................................................................................................48
Figure 4- 6 Device panel diagram............................................................................................................49
User Manual – NuBiz GS8000B-LSW
Figure 4- 7 Collect monitors.................................................................................................................... 50
Figure 4- 8 Current statistics....................................................................................................................50
Figure 4- 9 RMON1 (statistical group) management..............................................................................51
Figure 4- 10 Create interface................................................................................................................... 52
Figure 4- 11 RMON History Admin........................................................................................................53
Figure 4- 12 RMON History Table..........................................................................................................54
Figure 4- 13 RMON History admin.........................................................................................................55
Figure 4- 14 RMON History admin.........................................................................................................56
Figure 4- 15 Map Symbol Properties.......................................................................................................57
Figure 4- 16 Display Map Symbol.......................................................................................................... 57
Figure 4- 17 Managed Object Properties.................................................................................................58
Figure 5- 1 Memory real-time performance............................................................................................ 59
Figure 5- 2 Memory historical performance............................................................................................59
Figure 5- 3 CPU real-time performance Collection................................................................................ 60
Figure 5- 4 Show CPU real-time performance........................................................................................ 60
Figure 5- 5 CPU historical performance Collection................................................................................61
Figure 6- 1 Network Events.....................................................................................................................63
Figure 6- 2 Search Events........................................................................................................................ 64
Figure 6- 3 Set alarm notification............................................................................................................ 64
Figure 6- 4 Alert Filters............................................................................................................................65
Figure 6- 5 Alert Filter setting................................................................................................................. 66
Figure 6- 6 Match Criteria....................................................................................................................... 67
Figure 6- 7 Add Action of Notifications.................................................................................................. 67
Figure 6- 8 Alarm configuration.............................................................................................................. 68
Figure 6- 9 Suppress Notificatinos.......................................................................................................... 69
Figure 6- 10 Run Command of Notificatons........................................................................................... 70
Figure 6- 11 Alert Filters..........................................................................................................................71
Figure 6- 12 Filter Details........................................................................................................................71
Figure 6- 13 Confirmation Message of Alert Filters............................................................................... 72
Figure 6- 14 Alarm Audio Notification................................................................................................... 73
Figure 6- 15 Alarm Audio Notification Setting....................................................................................... 73
Figure 6- 16 Alert Manager......................................................................................................................74
Figure 6- 17 Alert Severity Set................................................................................................................ 75
Figure 6- 18 CPU Util Alert.....................................................................................................................75
Figure 6- 19 Alert Severity Modify......................................................................................................... 76
Figure 7- 1 Performance statistics........................................................................................................... 77
Figure 7- 2 Performance collection......................................................................................................... 78
Figure 7- 3 Ethernet Port..........................................................................................................................78
Figure 7- 4 Add port.................................................................................................................................79
Figure 7- 5 Real-time performances collection....................................................................................... 79
Figure 7- 6 Display real-time performance............................................................................................. 80
Figure 7- 7 Historical Performance Colletcion.....................................................................................81
Figure 8- 1 Task Cofiguration..................................................................................................................81
User Manual – NuBiz GS8000B-LSW
Figure 8- 2 Database backup....................................................................................................................83
Figure 8- 3 Version File Backup.............................................................................................................. 83
Figure 8- 4 Config File Backup............................................................................................................... 84
Figure 8- 5 Add policy of version file backup.........................................................................................85
Figure 8- 6 Destination Filename setting.................................................................................................85
Figure 8- 7 Select Destination Filename................................................................................................. 86
Figure 8- 8 Policy scheduler.................................................................................................................... 87
Figure 8- 9 Poliy Scheduler setting..........................................................................................................87
Figure 8- 10 Operations of task policy.................................................................................................... 88
Figure 8- 11 Display results of task policy.............................................................................................. 88
Figure 8- 12 Task setting..........................................................................................................................89
Figure 9- 1 Port Aggregator..................................................................................................................... 90
Figure 9- 2 Add aggregation port.............................................................................................................90
Figure 9- 3 Link aggregator port configuration.......................................................................................91
Figure 9- 4 Port VLAN Configuration.................................................................................................... 91
Figure 9- 5 Telnet Device.........................................................................................................................92
Figure 9- 6 Port flow control settings...................................................................................................... 92
Figure 9- 7 Port storm control setting......................................................................................................93
Figure 9- 8 Change device name............................................................................................................. 93
Figure 9- 9 Port VLAN configuration..................................................................................................... 94
Figure 10- 1 MIB manager...................................................................................................................... 95
Figure 10- 2 Toolbar of MIB browser......................................................................................................95
Figure 10- 3 File menu of MIB browser..................................................................................................97
Figure 10- 4 Edit menu of MIB browser................................................................................................. 97
Figure 10- 5 View menu of MIB browser................................................................................................98
Figure 10- 6 Operations menu of MIB browser...................................................................................... 98
Figure 10- 7 Help menu of MIB browser................................................................................................ 99
Figure 10- 8 Load a MIB file...................................................................................................................99
Figure 10- 9 Load a MIB file setting..................................................................................................... 100
Figure 10- 10 MIB browser setting........................................................................................................101
Figure 10- 11 SNMP V3 Security.......................................................................................................... 102
User Manual – NuBiz GS8000B-LSW
1 Discovery Management
Discovery Management provides a platform for device management. All managed devices are logged
in from this platform. After login the system will differentiate the devices according to device types and
their states and then provide different proper management methods to different devices. The system obtains
the basic information of the devices and then stores the information in the database and at last display the
information on the corresponding windows according to device types.
The administrator can click System Management -> Runtime Administration or use the shortcut key
“ALT+R” to open the real-time management window, as shown in the following figure:
By default, when Broad Director discovers an SNMP device, the Broadmaster discovery engine uses a
community string of public and a proxy port of 161. However, some devices in the network may use
different ports and communities. To discover these devices, the administrator can configure the discovery
of SNMP devices based on community and proxy ports through the following options:
SNMP version : Select the appropriate SNMP version, v1 / v2 / v3, from the SNMP version
drop-down box.
community:Specifies the community of the node, defaults to public.
SNMP agent port:Specifies the SNMP agent port of the node. The default is 161.
After the configuration node is discovered, the click application will automatically jump to the
discovery log interface. Found the network, equipment, etc. will appear in the log. If there is a network
discovery, the log interface will be found in the state as shown below.
If you need to query the device discovery and delete the log, you can query in this function. Users can
follow their own set of conditions to query the required log records, if not enter the default query for all the
log.
User Manual – NuBiz GS8000B-LSW
2 Map management
Unfold the IP Network node to open the IP topology management page. See the following figure:
Select mode: There are two modes available for choice: the anchor mode and the non-anchor mode.
The anchor mode: the detected device icons are forbidden to move in this mode.
The anchor mode: the detected device icons are allowed to move in this mode.
If you click the “Select mode” shortcut button in non-anchor mode, the non-anchor mode changes to the
anchor mode. So it is with the anchor mode.
Zoom: Click it, and the zoom preview is shown in the following figure:
User Manual – NuBiz GS8000B-LSW
Zoom mode: Click it and then you cannot choose a device icon and the device icon can only be
Icon zoom rate:When you move the slide, you can enlarge or reduce the
size of a chosen device icon.
Resume: A device icon can be removed to another place, but it can go back to its original place if you
click the Resume button.
Search state:
The search state tells users the number of currently searched devices and the state of the radar detector. The
following figure shows that 14 devices are currently being found and the search is still going on.
The following figure shows that the search is already done and 17 devices are found.
3 Security Management
Security Management helps the system administrator to carry on the granular permission management
based on user and user group.
The provided security management tasks can be divided into user definition and group definition, as
shown in the following table:
The system administrator can follow the following steps to add a new user.
On the security management page, the administrator can use one of the following methods to open
the Add the user guide window:
1 Click File -> New -> Add user.
2 Click the Add a user icon in the toolbar.
3 Right click the User node in the left tree and then choose the Add a user option.
The Add the user guide window is shown in the following figure:
After setting the expiration date for the account and the password, click Next and enter the last
window of Add the user guide, as shown in the following figure:
User Manual – NuBiz GS8000B-LSW
clicking .
Choose Direct distribution, and then the administrator can designate the authorization operation to
users directly without adding users to any group. Click the Permission button in the Direct distribution of
the access permission faceplate to pop up the Designate the permission window. The system
administrator can designate the authorization operation to users.
After distributing users to the group or designating the authorization operation to users, the
administrator click Over to confirm the above-mentioned settings. The newly-added users will be
displayed under the User tree node.
Note: If the administrator wants some alteration, he or she can click Back to return to the previous
window for necessary alteration before Over is clicked.
The system administrator can provide new users the following items: username, group, password and
password confirmation, and their durations. If the administrator clicks the Everlasting Password checkbox
and the Everlasting Account checkbox, the password and the account will never expire. If the
administrator deselects the two checkboxes, he or she should set the efficient period for the password and
the account. After the period, the password and the account will take no effect again.
User Manual – NuBiz GS8000B-LSW
If the username is already existing, the system will give an alarm information, notifying users cannot
be created.
If you select the User tree node in the security management window, all users will be displayed in the
sub-node, as shown in the following figure:
The authorization service provided by the NMS module can limit users' access permission to the
objects and instances. For example, users are limited in the authorization and can access only some specific
devices.
The system provides the group-based authorization, and the administrator designates the
corresponding groups to users according to actual needs. Thus users can be managed through the group
authorization. The detailed procedure is shown below:
Select specific users in the User tree node, open the User’s group attribute page, click Set a group
and open the Select a group window, as shown in the following figure:
User Manual – NuBiz GS8000B-LSW
NMS enables the system administrator to modify user’s status, password, account and password’s
validation period.
Select a specific user on the User tree node and open the User Configuration File page, on which the
current user’s status, the account's validation period and the password’s validation period are displayed, as
shown in the following figure:
User Manual – NuBiz GS8000B-LSW
As to a selected user, the administrator can right click this user and select Change password or click
Edit -> Change passwordin the security management window to modify the password, as shown in the
following figure:
The system administrator can follow the procedure below to assign authorization to users.
In the User tree node, select a specific user, open the User access permission page and click Set
permission. The Designate permission window appears, as shown in the following figure:
The system administrator can perform the following operations to delete a user.
User Manual – NuBiz GS8000B-LSW
You can select a specific user in the User tree node, right click this user and then click Delete to delete
this user, or you can do this by choosing a user and then clicking Edit -> Delete. See the following figure:
The system administrator can add a new group through the following steps:
User Manual – NuBiz GS8000B-LSW
Figure 3- 13 Add Group
On the security management page, the administrator can use one of the following methods to open
the Add the group guide window:
On the security management window, click File -> New -> Add a group.
Click the Add a group icon in the toolbar.
Right click the Group tree node and select the Add a group option.
The system administrator can distribute users for a group by conducting the following steps:
Select a specific group under the Group tree node, open the Member attribute page, and click
Settings. The Select users window appears, as shown in the following figure:
User Manual – NuBiz GS8000B-LSW
The system administrator can follow the procedure below to assign authorization to users.
Select a specific group under the Group tree node, open the Group permission attribute page, and
click Set the permission. The Designate the permission window appears.
On the Designate the permission window, the administrator can set operations for a group by
selecting or deselecting the operations. After the settings is over, click Finish.
Note: If you click the Reset button, the group permission will be set through the default mode.
The operations in NMS are listed out in a tree structure, including the parent operations and child
operations.Operation is in the security management menu, click the system management button you can see
the pop-up menu under the security management options, as shown below:
User Manual – NuBiz GS8000B-LSW
Figure 3- 19 Security
On the security management window, the administrator can add new operations through the following
two methods:
1 Click File -> New -> Add an operation.
Choose the parent operations and then enter the to-be-added operation in the textbox.
Click Add.
The new operation is then added to the place under the parent operations.
Select the to-be-deleted operation from the operation tree and then click Remove. The operation is
then deleted.
User Manual – NuBiz GS8000B-LSW
The operation tree includes the default operation list provided by NMS. The administrator can
designate different operations for different users, which are given detailed explanation below:
The operations with relation to the administrator are shown in the following table:
Operation Remarks
Service
When a discovery is terminated by some reason, you can use this
Delete discovery
operation to delete this discovery.
Start backup It is used to enable the functionality of system backup.
If NMS stops running due to a certain reason during the backup
Resume the server process, you can perform this operation to resume all processes of
the server.
Disable the NMS
This operation is used to disable the NMS server.
server
This operation is used to provide logs for multiple modules, and
Set the log level
of course set the logs.
Real-time management It is used to conduct the settings for the running of NMS server.
Security management includes ID authentication during login and
Security Management
access permission designation for each user.
System Management It is used to process all operations of the administrator.
Table 3- 1 Default operation Tree
Operation Remarks
Delete discovery Deletes the already discovered devices.
Disable server Disables the network management server.
Security Management Sets the permission of the user and user group.
System Management Discovers and manages the devices in real time during running.
Table 3- 2 Administrator’s operations
User Manual – NuBiz GS8000B-LSW
Event
Network event means a description of all statuses of network equipment. The event can bear not only
the regular information but also the current status of a network device. The following table gives a
description of all kinds of operations related with network events.
Operation Remarks
Save the event to the It is used to save the selected events or those events on the event
file faceplate.
It is used to print the selected events or those events on the event
Print the event view
faceplate.
Table 3- 3 Operations related with Network events
Topology
Operation Remarks
Start and stop It is used to set the discovery status of a specific object during the
discovery running of the system.
Manage an object or It is used to set the management status of a specific object during
cancel management the running of the system.
Delete an object It is used to delete a specific object from the topology database.
Refresh a node It is used to refresh the polling status.
Table 3- 4 Operations of related topologies
Alarm
If the system detects a trouble of a device in the network, it will generate an alarm. This alarm will be
shown in the alarm view and users can browse alarms with a lot of levels, such as severe alarms, main
alarms, secondary alarms and deleted alarms and so on. The operations related with alarm are shown in the
following table:
Table 3- 5 Operations related with alarm
Set alarm’s
It is used to add an alarm remark.
remarks
Gain alarm
It is used to browse the details of a specific alarm.
details
Save the alarm to It is used to save the chosen alarms or those in the current alarm
the file faceplate to a folder.
Print the alarm It is used to print the chosen alarms or those in the current alarm
view faceplate.
Delete alarm It is used to delete alarms.
User Manual – NuBiz GS8000B-LSW
Obtain the alarm
It is used to browse the remarks of the existent specific alarm.
remark
Obtain the It is used to browse the history alarm, that is, the status change from the
history alarm first to the last of an alarm.
Obtain the alarm It is used to obtain alarms.
Set alarm’s
It is used to add an alarm remark.
remarks
You can customize the view's function domain to designate the read permission of a group.
On the existing authorization function domain, click Designate the authorization function domain, as
shown the following figure:
User Manual – NuBiz GS8000B-LSW
You can set the existing authorization function domain, as shown in the following figure:
The device faceplate graphic is displayed, including the port’s status. Port’s color: The color of a port is
decided by the configuration and connection statuses of this port. If this physical port’s configuration
status is Disable, the color of this port is red. In the case that the physical port’s configuration status is
Enable, if the protocol is down the color of this port is white, and if the protocol is up the color of this
port is green.
On general device faceplates, you can only find the statuses of devices. You, however, cannot operate their
ports, as shown in the following figure:
The Frame switch faceplate graphic enables you to operate the ports and the board cards. See the following
User Manual – NuBiz GS8000B-LSW
figure:
The data about a device’s performance can be obtained in time and presented by the statistics graphs
so that the administrator can know the operation performance of the device in an objective way. If you click
Menu -> Performance management -> Collect monitors, the following page appears:
User Manual – NuBiz GS8000B-LSW
4. Refresh
Click refresh to restart the polling.
The symbol attributes simply describe several attributes of a device, such as Regular and Show. The
regular attributes are shown in the following figure:
User Manual – NuBiz GS8000B-LSW
The attributes of the managed object show all kinds of data of the managed device, including SNMP.
The section is similar to section 4.5. Some attributes are the same, such as the Regular attribute.Only the
Monitor attribute are described here.
Monitor attribute
Right click OLT and select “Memory Utilization”. Set “Collection Mode” and click “Draw”. Then
you can collect the Memory real-time performance. See the following figure:
Click “Historical Performance Collection”, select “Collection Time”, “Collection Mode”, “Begin
Time” and “End Time”, and click “Draw”, then you can configure the Memory historical performance.
See the following figure:
6 Fault Management
If you can browse the information about corresponding trouble, it will be much convenient for
network management.The administrator can locate the troubled devices and the reasons and make a rapid
troubleshooting according to the information of network troubles.
Network events list all information about status changes of all managed devices, such as node trouble, node
recovery, port status change, failed polling and management information of NMS platform.Click Network
events. The following page appears:
User Manual – NuBiz GS8000B-LSW
The alarm notification is added so that the administrator can know the network alarms on time. The
alarm notification includes action limit, command running and E-mail generating.
Click Network Alarms -> alarm management -> Set alarm notification.See the following figure:
Note: The Alarm Notification menu is and the Alarm Notification’s Action
menu is .
Click Add . The page is available for entering information, as shown in the following figure:
User Manual – NuBiz GS8000B-LSW
After the above-mentioned parameters are selected, you can click . The following window appears:
E-Mail:
If you click E-Mail, the figure above appears.
The following are explanations of five parameters on the above-mentioned figure:
A. Notification’s name: It is the unique name for action trigger, consisting of letter, number and
underline.
B. SMTP account: It stands for the information about the SMTP account which sends E-mail.You
Limit:
If you click Limit, the following window appears:
User Manual – NuBiz GS8000B-LSW
Command execution:
If you click Command execution, the following window appears:
User Manual – NuBiz GS8000B-LSW
After the above mentioned information is set, click Add, all the current settings will relate with the
corresponding alarm filter.The view that appears in this case is shown below:
User Manual – NuBiz GS8000B-LSW
Click Network Alarm -> Alarm Management. A menu appears, as shown in the following figure:
User Manual – NuBiz GS8000B-LSW
On this window, you can select or cancel the sound of the corresponding alarm level by ticking or not.
Replay time: It means the time that the sound of alarm notification lasts (if the audio lasts too short, it will
be replayed).
Test: This button is for you to test the sound beforehand.
User Manual – NuBiz GS8000B-LSW
Open file: You can select any audio file by clicking it.
Note: The audio files are all stored in the /audio sub-directory of the installation path.
Click Network Alarm -> Alarm Management. A menu appears, as shown in the following figure:
7 Performance Management
his chapter gives a detailed description of the performance statistics mode.Performance statistics
means to browse the operation parameters of a device in a period of time and present these parameters on
the statistics graphic on the window, so performance statistics helps you to know the running status of the
device in a period of time.
This chapter consists of CPU performance statistics ,port’s traffic statistics and ONU port’s
traffic
It is to collect the information about the real-time traffic on some ports of a device.
Statistics options include Port type, Statistics item, and Polling interval.
Here Port type contains Ethernet port and PON port.
Statistics item contains Port’s incoming flow (Bps), Port’s outgoing flow (Bps), Number of received
unicast packets, and Number of transmitted unicast packets.
Polling interval means the statistics interval, whose smallest value is 10 seconds.
If you click Performance statistics, the Real-time performance statistics page appears:
Historical performance collection is used to view the data of the device over a certain period of time.The
collection process is done by the network management system daemon, the collection time interval is
generally 300 seconds.
Click on historical performance collection to enter the historical performance collection interface:
.
User Manual – NuBiz GS8000B-LSW
Figure 7- 7 Historical Performance Colletcion
As with the previous real-time performance collection, you need to configure the data collection items
before viewing the data. As shown above, configure the port after collecting the interface.
In the above figure, click the drawing button, the system will read the historical data of each port, and show
in the chart.
On the NMS client, open the NMS program tree on the left, click Task Management and then Task
Configuration. The following window appears:
The database backup function supports the manual or fixed automatic backup and saves all the running
information of NMS.In case of system breakdown, this function can resume all the running information,
including all discovered device information, topologies and all the database's information.
Note: All the information that is stored in the configuration files will not be backuped. For example,
the configured discovery information need be reset.
3.Set the policay name, the enablement staus and the task description, and then click Apply. The database
backup task is done.
If you select Invalid in the Enablement status dropdown box, the task will not be performed; if you
do not click the time table, the task should be manually performed.
Step 1: Start this task, that is, enter the basic information of this task.
Click Task Collection -> System Task -> Distribute/Backup and then right click Distribute/Backup.
The Add task button appears. Click Add task to open the following window:
After a task is done, the corresponding results will be shown in a window. See the following figure:
9 Common Configuration
Click the device icon, select the port aggregation function, you can view the current device aggregation
group, as shown below:
Right-click the device icon, select telnet to device, you can telnet directly to the specified device.
10 SNMP Tool
SNMP stands for Simple Network Management Protocol. This chapter will describe how to manage
SNMP, including how to set the MIB browser and SNMPv3 parameters.
MIB is a defined attribute set for managed objects.Each attribute of a managed object in MIB has a
unique ID, which consists of the object type, read/write permission, the size limit and the range.MIB is an
abstract data interface provided by the managed device, not a physical object.
NMS provides the MIB browser, helping users to obtain or browse the MIB information through
graphic window.Click SNMP tool -> MIB browser to open the MIB browser, as shown in the following
figure:
10.1.1 Toolbar
The toolbar lies on the top of the MIB browser, as shown in the following figure:
You can conduct the operations related to the MIB browser by clicking the corresponding icons in the
toolbar.If the cusor is put on an icon, the function of this icon will be shown.To show or hide the toolbar,
you can click Show -> Toolbar.
The following table shows the functions of each icon in the toolbar:
Table 10- 1 Functions of MIB browser’s toolbar
User Manual – NuBiz GS8000B-LSW
Icon Name Remarks
Install MIB It is used to download the MIB files in the MIB
browser.If you click this icon, a dialog box appears for
you to enter the URL or filename of a MIB file.
Uninstall MIB It is used to uninstall the installed MIB.
Description It is used to see the detailed description of a MIB node
after you select this MIB node.
Browse the MIB node It is used to find a specific node in the MIB tree.
Save the results of the It is used to save the results of the MIB browser. If you
MIB browser click this icon, a window appears for you to enter a file
name. After you enter this file name, the results will be
saved in this file.
Print the results of the It is to print the results of MIB query.
MIB browser
Get SNMP It is to designate a MIB node and a MIB instance and
then conduct a GET operation.
Get NEXT SNMP It is used to conduct a GET NEXT operation.If you
click this icon, you will get the value of the next
variable of the designated variable.
Get Bulk SNMP Click this icon and you will get the next object of the
designated object.
Set SNMP It is to designate a MIB node to conduct a SET
operation.
Set the MIB browser It is used to set the MIB browser.
Trap observer It is used to browse the received traps in a designated
port.
All lately uploaded MIBs (stores up to 5 file names) are listed out in the bottom of the menu.
Edit menu
Show menu
User Manual – NuBiz GS8000B-LSW
Help menu
User Manual – NuBiz GS8000B-LSW
Figure 10- 7 Help menu of MIB browser
Help -The help file for the NGN OMC-S-LSW MIB browser is displayed.
Click File -> Upload file or directly click in the toolbar. The Upload MIB dialog box opens, as
shown in the following figure:
The MIB browser provides the following options to upload the MIB:
You can uninstall the uploaded MIBs through the following method:
Select a node in the MIB tree, and then click File -> Uninstall MIB or directly click to uninstall
this MIB.
You can set the MIB browser through the following operation:
Click Edit -> Setup or directly click . The MIB browser setup window opens, as shown in the
following figure:
User Manual – NuBiz GS8000B-LSW
You can conduct some regular SNMP operations through the MIB browser, such as GET, GET NEXT,
GET BULK and SET.
To conduct a GET operation, select a node in the MIB tree and click or GET. The value
of the selected MIB variable will be obtained.
To conduct a GETNEXT operation, select a node in the MIB tree and click or GetNext.
The value of the next variable of the selected variable will be obtained.
To conduct a GETBULK operation, select a node in the MIB tree and then click or
GetBulk.A series of next objects of the designated object will be obtained.
To conduct a SET operation, select a node in the MIB tree, enter values in the textbox and
then click Set or .
SNMPv3 has three important services: ID checkup, ID encryption and ID access control.Each SNMP entity
includes a SNMP engine.The SNMP engine has the following functions: Sending and receiving information,
ID checkup, data encryption and de-encryption, and access control.Multiple applications, which are set by
the SNMP engine, consist of a SNMP entity.NMS supports the SNMPv3 protocol.实体.