m2000-huawei
TRANSCRIPT
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 1/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved
www.huawei.com
Security Level: Internal
Operation and Maintenanceof M2000 Client
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 2/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 2
Developed independently by Huawei
Technologies Co., Ltd, the iManager M2000
V2 functions as EMS in the Huawei wireless
network solution. The M2000 V2 can access a
whole series of products developed by Huawei
and perform centralized management on them.
This slide introduces the basic operations of on
the M2000 client.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 3/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 3
After learning this course, you will have a basic
knowledge of:
Basic operations on the M2000 client.
Operations related to monitoring management,
topology management, security management, log
management, fault management, performance
management, software management, data
management, and configuration management.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 4/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 4
Reference
iManager M2000 System Description
iManager M2000 Administrator Guide
iManager M2000 Commissioning Guide
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 5/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 5
Chapter 1 Logging In to the M2000 ClientChapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
Chapter 10 Configuration Management
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 6/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 6
Logging In to the M2000 Client
Logging in to the
M2000 server
Logging out
Exiting
Upgrading the
software on the client
Automatically
Logging In to
the M2000
Other operations
The diagram on the left lists
some basic operations involved
in M2000 client login.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 7/112HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 7
Logging In to the M2000 Server
To log in to the M2000 server, choose Start > All programs > iManager M2000 client >M2000 client.
Type the user name and password
in the corresponding fields.
Type the IP address of the M2000
server.
Note:
The initial user name is admin
and the password is null.
The user password is saved on
the M2000 server. Only when the
server is initially installed, the
password is null.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 8/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 8
Logging In to the M2000 Server
|Main interface of the M2000 client|
Navigation
tree
Information
display
Menu bar
Status bar
Tool bar
Topology
view
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 9/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 9
Logging Out Off the M2000 Client
To log out off the M2000 client, choose System > Logout.
Note: Logging out
off the M2000client does not
mean the
applications
running on the
M2000 client are
terminated.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 10/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 10
Exiting
To exit the M2000 client, choose System > Exit.
Note: Exiting the
M2000 clientmeans the
applications
running on the
M2000 client are
terminated.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 11/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 11
Upgrading the Software on the M2000 Client Automatically
To upgrade the software on the M2000 client automatically, perform the following steps:Step 1: Start the M2000 client.
Step 2: Log in to the M2000 server.
After you log in to the M2000 server, the Confirmation dialog box is displayed, click Yes.
Prerequisites:
The M2000 can be automatically
and correctly upgraded only when:
• The versions of the software on
the M2000 client and on the M2000
server are of the same version
sequence.
• The version of the software on the
M2000 server is higher than that on
the M2000 client.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 12/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 12
Upgrading the Software on the M2000 Client Automatically
Step 3: In the displayed Update Wizard dialog box, click Continue.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 13/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 13
Other Operations
System Settings
Display/Hide/Customize
Toolbar
Region Settings
Metrology Setting
Lock Terminal
Change Password
Proxy Service Setting
LMT Prompt Setting
Broadcast Message
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 14/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 14
Region Settings
Number tab page
Time tab page
Date tab page
Time Mode tab page
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 15/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 15
Overview of Other Common Operations
System security settings
Single-user mode: indicates the system status
during the maintenance. The single-user mode allows
only one user to log in to the client and set upsessions.
Multi-user mode: indicates the system status when
the system is functional. The multi-user mode allows
several users to log in to the client at the same time.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 16/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 16
Overview of Other Common Operations
View license information
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 17/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 17
Overview of Other Common Operations
Download NE match files to the M2000 client
When the version of an NE on the M2000
client is different from that on the M2000
server, download the NE match file to the
M2000 client, as shown on the right.
If the files related to the new version of the
NE are not available, the system displays a
message, indicating that the system cannot
perform the upgrade operation.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 18/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 18
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log ManagementChapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
Chapter 10 Configuration Management
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 19/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 19
Overview of the M2000 Network Monitoring
The M2000 network monitoring monitors the operational status of
the M2000. For instance, the monitoring management monitors the
status of hard disk, database, session, or services. The M2000
monitoring management involves the following operations:
Setting the server threshold
Monitoring the performance status of the server
Monitoring the hard disk status of the server
Monitoring the database status of the server
Monitoring the database serving status
Monitoring the process status of the server
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 20/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 20
Setting the Server Threshold
Step 1: Set the hard disk threshold.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 21/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 21
Setting the Server Threshold
Step 2: Set the database threshold.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 22/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 22
Monitoring the Performance Status of the Server
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 23/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 23
Monitoring the Hard Disk Status of the Server
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 24/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 24
Monitoring the Database Status of the Server
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 25/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 25
Monitoring the Database Serving
Status
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 26/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 26
Monitoring the Process Status
of the Server
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 27/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 27
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log ManagementChapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
Chapter 10 Configuration Management
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 28/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 28
Topology Management
The topology management is used for constructing and managing the
topology structure of the entire network. In this way, the networking
topology and the operational status of the entire network are
displayed clearly.
Creating physical subnets
Creating physical NEs
Managing SNMP parameter template
Monitoring NEs
Adjusting the network topology
Adjusting the display of the topology view
Printing the topology view
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 29/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 29
Creating Physical SubnetsTo create physical subnets, perform the following steps:
Step 1: Right-click the topology view and choose Create Physical Subnet from the
shortcut menu.
Set background
Create physical subnets
Create topological objects
The Create Topo Object
option is used to create physical NEs, virtual NEs, IP
devices, virtual links, and
physical links.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 30/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 30
Creating Physical SubnetsStep 2: Set the file server.
The file server is used for the file transfer between the M2000 and the NEs. An NE is used as the
file server to set up connections between the M2000 and other NEs. In this way, the problem that
the M2000 cannot set up direct connection with other NEs are solved.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 31/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 31
Creating Physical NEs
•
Create a single physical NE.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 32/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 32
Creating Physical NEs
Create multiple physical NEs.
For instance, the Search NodeB
function enables you to find the
NodeBs that belong to the RNCon the topology view. Similarly,
you can set Search IMSOUT to
create multiple physical NEs
simultaneously.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 33/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 33
Creating Physical NEs
NE attributes template
Export NE attributes template
The NE attributes template provides standard formatsfor information input when NEs are created in
batches.
The formats consist of INI (editable in notepad) and
CSV file formats (editable in Excel).
After editing the NE information, enter the NE
configuration script file when you create a topological
object.
Note
The .CSV file format supports the
bulk creation of NEs in the WCDMA
and WiMAX network.
The .INI file format supports the bulk
creation of all NEs except virtual NEs.
The virtual NEs cannot be created in batches.
The CSCF, HSS, ATS, RM, CCF, and
DOPRA cannot be created in batches.
CSCF: call session control function
HSS: home subscriber server
ATS:general telephony application server
RM: resource manager
CCF:call control function
DOPRA:distributed object-oriented programmable
realtime architecture
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 34/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 34
Creating Physical NEs
NE attributes template
Example of NE configuration
information in .ini format
Example of NE configuration
information in .csv format
Template
模板:
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 35/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 35
Monitoring NEs
• Monitor the NE status.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 36/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 36
Monitoring NEs
•Set NE reconnection status.
When the M2000 server is disconnected
from NEs, set the M2000 to re-connect NEs.
The NE reconnection has two statuses:
Forbidden connection
When the M2000 server is disconnectedfrom an NE, the M2000 will not attempt to
connect the NE.
Permitted connection
When the M2000 server is disconnected
from an NE, the M2000 attempts to re-
connect the NE. By default, a new NE is in permitted connection status.
Disconnection icon:
Forbidden connection icon:
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 37/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 37
Monitoring NEs
Reconnect NE manually.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 38/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 38
Adjusting Network Topology/Adjusting Network Topology
Display/Printing Topology View
Zoom in
Zoom out
Partially zoom in
RestoreElements display
View
Search
Save
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 39/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 39
Adjusting Network Topology/Adjusting Network Topology
Display/Printing Topology View
Adjust the NE position.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 40/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 40
Adjusting Network Topology/Adjusting Network Topology
Display/Printing Topology View
View or modify the basic attributes of subnets.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 41/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 41
Adjusting Network Topology/Adjusting Network
Topology Display/Printing Topology View
Search or modify the physical links.
To search for physical links,
double-click a physical link or a
physical link set on thetopology view.
In the displayed dialog box,
right-click a link and choose
Link Browser.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 42/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 42
Adjusting Network Topology/Adjusting Network
Topology Display/Printing Topology View
Delete a subnet. Delete an NE.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 43/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 43
Adjusting Network Topology/Adjusting Network
Topology Display/Printing Topology View
Customize the display of topology alarms.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 44/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 44
Adjusting Network Topology/Adjusting Network Topology
Display/Printing Topology View
Set the topology view to start the subnet.
The subnet view refers to that
displayed on the client after the
topology view is displayed.
If you do not plan to set thetopology view manually, the
default view of the subnet
started by the topology view is
the root subnet view.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 45/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 45
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data ManagementChapter 10 Configuration Management
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 46/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 46
M2000 Security Management
The M2000 security management involves the following operations:
Configuring the security management
Managing OM users
Managing NE users
Managing OM and NE users
Setting FTPS parameters
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 47/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 47
Interface of Security Management
Set the NE types to bedisplayed.
Refresh the security
management interface.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 48/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 48
Managing OM Users
Add an OM user group.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 49/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 49
Managing OM Users
Authorizing OM User Group
Assigning privileges to OM user group
Assigning new device rights to OM user
groupAssigning MML command rights to
OM user group
Three default user groups are available on theM2000 client. They are Administrators group,
Guests group, and Operators group.
The Administrators group has the highest
privileges. You cannot modify or copy the
privileges of the Administrator group. You can,
however, authorize the Guests group and the
Operators group.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 50/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 50
Managing OM Users
Synchronize OM user data
Add OM users to OM user group
Bind OM user private rights
Assign MML command rights to OM
users
Change password
Note that each NE is assigned with the corresponding MML
command rights. When a new NE is added, you need to re-assign
the MML command rights for each user in the OM user group.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 51/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 51
Managing OM UsersSet rules for NE type rights.
You can set the rules for NE
type rights in a template. Aftersetting the template, all the NEs
added have the rights inherited
from this template.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 52/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 52
Managing NE Users
After the OM user is
bound with a real NE, you
can create at the NE side a
user with the same name asthe OM user. This user is
called NE user. The NE
user logs in to the NE
through the LMT.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 53/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 53
Monitoring OM Users and NE Users
Monitor the OM Users.
Monitor the operations of OM users who are
now in session status.
When the M2000 server restarts or the network
is disconnected and restored, click Refresh to
refresh the session monitor table.
M it i OM U d NE U
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 54/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 54
Monitoring OM Users and NE Users
Monitor the sessions of the OM user on the LMT.
Note that this function is applicable only to NEs inthe WCDMA network and supports only the LMT
users.
O
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 55/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 55
Monitoring OM Users and NE Users
Set the status for a non-default NE user.
By setting the status, the non-default NE user's login and operation of the
MML commands on the LMT can be
controlled. Non-default NE users refer
to the NE local users excluding the
admin and guest users.
The statuses of non-default NE userscan be manageable and lock.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 56/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 56
Monitoring OM Users and NE Users
Force OM users to exit the M2000.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 57/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 57
Monitoring OM Users and NE Users
Force OM users to exit the LMT.
Monitoring OM Users and NE Users
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 58/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 58
Monitoring OM Users and NE Users
Unlocking OM users.
If the times that a user
enters wrong password at
a time exceeds themaximum attempts, the
OM user is locked for a
period. Right-click the
user and choose Unlock
User from the shortcut
menu to unlock the user.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 59/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 59
Monitoring OM Users and NE Users
Set to lock an OM user automatically.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 60/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 60
Setting FTPS Parameters
Encryption mode: self-adaptation mode, SSL encryption mode, and plain mode.
Supported mode: refers to the FTPS connection mode, mainly including active modeand passive mode.
Transmission mode: refers to the mode in which the FTPS transfers files. The
transmission mode can be in ASCII mode or in text mode.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 61/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 61
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
Chapter 10 Configuration Management
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 62/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 62
M2000 Log Management
Types of logs
Types oflogsOperation log
Security
log
System log
NE operation
log
NE
security
log
Records all the important
operations performed by
OM users.
Records security events occurred in the
system, such as logging in to the M2000,
modifying rights for OM user group, or
adding OM users.
Records significant events occurred
in the system.
Records all the
important operations
performed by NE users
Records security events
occurred to NEs.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 63/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 63
M2000 Log Management
Log template
1
2Log statistics template
Log query template
Notes:
Saved on the server background, the contents of a templateare associated with users. For instance, the templates created
by user A can be seen by user A only.
The names of log templates that are of the same type and
belong to the same user cannot be duplicate. If the names of
log templates are duplicate, the system cannot save the
template.
A maximum of 40 characters are allowed for the name of
the template. The following characters are not allowed:
`~!@#$%^&*()\":;?,|{}
[]<>'
The template information node does not support dynamic
refresh. If user A logs in to two terminals at the same time
and delete or modify template 1 on terminal 1, the deletion ormodification cannot be performed on terminal 2
automatically. The manual refresh provided by the system,
however, enables you to refresh the template information
manually.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 64/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 64
M2000 Log Management
Operations involved in the M2000 log management are as follows:
Querying logs
Collecting statistics on logs
Managing log templates
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 65/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 65
Querying Logs
Querying operation logs
Querying system logs
Querying security logs
Querying NE operation logsQuerying NE
security logs
Collecting Statistics on Logs
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 66/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 66
Collecting Statistics on Logs
Collecting statistics on operation logs
Collecting statistics on system logsCollecting statistics on security logs
Collecting statistics on NE operation logs
Collecting statistics on NE
security logs
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 67/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 67
Managing Log Templates
Saving a template
Modifying
a template
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 68/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 68
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
Chapter 10 Configuration Management
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 69/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 69
M2000 Fault Management
Function:
The M2000 reports, manages, and analyzes NE alarms in a centralized manner. The
M2000 collects NE alarms to the M2000 and displays different audio and video device
alarms for the maintenance personnel. In addition, the M2000 notifies the maintenance
personnel of device alarms by short message or email at the time when the alarm is
generated.
Operations:
The following operations and analysis can be performed on NE alarms at the M2000 side.
Manual restore
Filtering
Severity redefinition
Alarm relevance
In this way, the M2000 can perform centralized analysis and processing on the device
alarms generated in the current network.
CriticalIndicates that the device or the
resource cannot be used
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 70/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 70
M2000 Fault Management
Alarm
type
Fault
Management
Alarm
category
Alarm
severity
resource cannot be used
completely and needs to be
restored immediately.
MajorIndicates that the quality of the
device or the resource is severely
damaged. Corrective measuresshould be taken immediately.
MinorIndicates that the quality of the
device or the resource is slightly
affected.
PromptIndicates that the quality of the
device or the resource may
probably be affected.
Event alarm
Refers to the notification generated
when the system detects the events
occurred.
Fault alarm
Refers to the notification generatedwhen the system detects the faults
occurred.
Alarms can be related to the following items:
Power supply system
Environment system
Signaling system
Relay system
Hardware system
Software system
Operating system
Telecommunications system
Service quality
Fault handling
Internal alarm
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 71/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 71
M2000 Fault Management
Saving alarms
In the alarm database, four tables are available for saving alarms. The four tables
are as follows:
tbl_cur_alm: saves currently generated alarms.
tbl_his_alm: saves alarms generated in the past.
tbl_event: saves the event alarms.
tbl_mask_alm: saves the shielded alarms.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 72/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 72
Mechanism for Processing Alarm Table Overflow
By default, the alarm service detects whether the number of alarms in the alarm table reaches to the upper
threshold every 83 seconds after it is started.
The upper threshold for each alarm table is as follows:
tbl_cur_alm: 100, 000
tbl_his_alm: 2 million and can be modified through the M2000 client.
tbl_event: 200 million and can be modified through the M2000 client.
tbl_mask_alm: 200, 000
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 73/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 73
Mechanism for Processing Alarm Table Overflow
When the alarms recorded in the alarm table exceed the threshold, different alarm tables havedifferent mechanisms to process alarm table overflow.
tbl_cur_alm: sorts the alarms by alarm generation time in sequence and forcibly changes first ten
thousand unacknowledged and cleared alarms to the tbl_his_alm. If the alarm table still has the
problem of overflow, move the earliest unacknowleged and uncleared alarms to the tbl_his_alm.
tbl_his_alm: sorts the alarms by alarm generation time in sequence and documents the 20 percent of
the earliest alarms. Then, the system deletes these earliest alarms automatically.
tbl_event: sorts the alarms by alarm generation time in sequence and documents the 20 percent of the
earliest alarms. Then, the system deletes these earliest alarms automatically.
tbl_mask_alm: deletes the earliest 100,000 alarms from the alarm table.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 74/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 74
Operations Involved in the M2000 Fault Management
Browsing current fault alarms
Browsing event
alarms
Querying
current
fault
alarms
Querying
eventalarms
Querying
history fault
alarms
Querying
shielded
alarms
Collecting
statistics on
alarms
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 75/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 75
Operations Involved in the M2000 Fault Management
Browsing current fault
alarmsBrowsing event alarms
Setting alarm
services
Operations Involved in the
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 76/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 76
Operations Involved in the
M2000 Fault ManagementSet alarm services.
Setting remotealarm
notification
Setting parameters
of remote alarm
notification
Acknowledgingalarms
Redefining
alarm severity
Settingconditions for
alarm filtering
Setting
alarm
correlation
analysis
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 77/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 77
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
Chapter 10 Configuration Management
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 78/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 78
Performance Management
Measurement is a process during which the value of an attribute for an NE
entity (including logical entity) in a period is acquired.
Category of performance measurement counters
System counters: a kind of a default counter defined in the NE. System
counters are categorized into common counters and extended counters.
- Common counters: By default, the common counters are in the
measurement state. The measurement can be cancelled.
- Extended counters: By default, the extended counters are in the non-
measurement state. Before performing any measurement on extended
counters, you need to activate them first. You can enable or disable the
measurement on extended counters.
Custom counters: refers to the counters that are defined on the M2000
client by users. The principle for customizing counters is to perform
arithmetic operations on the default counters, including common counters
and extended counters, in the system. In this way, custom counters are
self-defined.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 79/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 79
Performance Measurement Objects
Class 1Refers to some significant objects of NEs. By default, objects belonging to class 1 are in
the measurement state. The measurement on class 1 objects can be cancelled. For
instance, the Iu interface of the RNC belongs to class 1.
Class 2
By default, the objects belonging to class 2 are in the non-measurement state. You need
to first activate these objects before performing any measurement on them. You can
enable or cancel the measurement on these objects. For instance, the neighbors of
the RNC belongs to class 2.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 80/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 80
Performance Measurement Objects
Class 3
Refers to those objects created manually by users in the Setting Performance
Measurement Object dialog box. You need to first activate these objects before
performing any measurement on them. You can add, modify, or delete the Class 3
objects. In addition, you can also enable or cancel any measurement on class 3
objects. For instance, the IMSI number of the SGSN belongs to class 3. The RNC
does not have class 3 objects.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 81/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 81
Performance Measurement Periods
The measurement periods vary according to the measurement objects. The following
measurement periods are available: 5 minutes, 15 minutes, 30 minutes, 60 minutes, or 24
hours. Note that the measurement whose periods are 5 minutes or 15 minutes are called
real-time measurement, or short-period measurement. Only some of the NEs support the
real-time measurement.
Caution:
The measurement periods for all the NEs of the same type must be same.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 82/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 82
Performance Measurement Results and Counter Threshold
Performance measurement results refer to the values of measurement counters of NE
measurement objects.
Performance counter threshold can be set in either of the following windows:
Threshold Management window
Performance Monitor window
If the value of a counter exceed this threshold, the threshold alarm is generated.
For the same counter, you can set alarm thresholds for various time phases, or set an alarm
threshold for all time periods in each measurement period. These thresholds can be set for all
objects of a measurement type, or for one or more objects.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 83/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 83
Results of Performance Measurement Statistics
The maximum saving days for the results whose measurement period is 5 minutes or 15 minutes are 7 and
represented by the parameter maxRTResultSavingDay.
The maximum saving days for the results whose measurement period is 30 minutes, 60 minutes, or 1 day are
30 and represented by the parameter maxResultSavingDay.
The M2000 checks the results whose period is 30 minutes, 60 minutes, or 1 day on a fixed time 03:25 a.m.
each day. This is represented by the parameter capacityControlTime. The M2000 deletes the data saved for
over 30 days.
The M2000 checks the results whose period is 5 minutes or 15 minutes on a fixed time 04:35 a.m. each day.
This is represented by the parameter capacityControlTime + 70 minutes. The M2000 deletes the data saved
for over 7 days.
The parameters described previously are described in the file /export/home/omc/var/etc/conf/pmsvc.xml.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 84/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 84
Measurement Settings
Open the
MeasurementSettings window.
S tti M t
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 85/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 85
Setting Measurement
Twonavigation
modes
Change of
function sets
Change of
function
subset
Periods for the
selected function
subset
Counter ID
Several
NEs
Objects
Applying the
measurement
Monitoring NE Performance
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 86/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 86
Monitoring NE Performance
Synchronizing measurement results of NEs
Querying missing measurement results of NEs
Measurement management
Monitoring NE Performance
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 87/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 87
Monitoring NE Performance
Monitor the integrity of measurement results of current NEs.
Querying Performance Measurement Results (I)
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 88/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 88
Querying Performance Measurement Results (I)
Query
template
Create a
query
Q i P f M t R lt (II)
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 89/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 89
Querying Performance Measurement Results (II)
Setting
anobject
Setting
a
counter
Other settings, such as
querying the busy-hour
results, measurement
periods, sorting, and filterconditions
Managing
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 90/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 90
g g
Measurement Objects
Importing the information
about measurement
objects
Exporting the
information about
measurement objects
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 91/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 91
Managing Measurement ObjectsActivate/Suspend measurement tasks.
Activating
measurementtasks
Suspending
measurement
tasks
Managing User-Defined
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 92/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 92
g g
Counters
Creating user-defined
countersModifying user-
defined countersImporting user-defined
counters
Exporting user-defined
counters
Managing Counter Threshold
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 93/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 93
Setting the counter
threshold Modifying the
counterthreshold
Setting the
status of the
counterthreshold
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 94/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 94
Monitoring NEs in Real Time
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 95/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 95
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
Chapter 10 Configuration Management
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 96/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 96
Software Management
The software management involves the following operations:
Managing the software and files
Upgrading NE software and patches
Managing RAN Licenses
Querying Version Information on Software Installed on the Server
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 97/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 97
Managing Software and Files
Browsing the file information
on the server. The file
information includes software,
patches, license, data, and
others.
Managing Software Transferring files
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 98/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 98
g g
and Filesg
from the client to the
serverTransferring files
from the server to the
client
Transferring
files from NEs to the
server
Transferring
files from theserver to NEs
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 99/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 99
Upgrading NE Software and Patches
The software management function enables you to upgrade the software and patches ofthe following NEs:
RNC
NodeB
SGSN
GGSN
MSC server
MGW
ASN-GW
Note:
For details about how to upgrade the RNC, the NodeB, and their corresponding
patches, refer to the upgrade guide.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 100/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 100
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
Chapter 10 Configuration Management
Overview of Data Management: Backing Up NM Data
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 101/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 101
g g p
You can back up the NM data in two ways: periodic backup and manual backup.
You can back up the NM data through the full backup and the incremental backup. The
following gives the difference between the full backup and the incremental backup:
Each time when a full backup is performed, the M2000 removes all the previous files
related to full backup and incremental backup on the server and saves one and only the
latest compressed full backup file. The file of full backup is named in the following way:
all-current time, such as, all-20060106103055.tar.gz.
Each time when an incremental backup is performed, a new backup file is generated. The
incremental backup is on the basis of previous backup data that can be a full backup or an
incremental backup. The file of an incremental backup is named in the following way: inc-
current time, such as, inc-20060106103055.tar.gz.
The NM data to be backed up refers to the data contained the following files:
/export/home/omc/var/
/export/home/sysm/
The backup files of the NM data are saved in the directory of /export/home/backup/omc/ on the
M2000 server.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 102/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 102
Overview of Data Management: Backing Up NE Data
NE data backup: The data management provided by the M2000 enables you to back upthe configuration files of all NEs managed by the M2000 and the files that change
dynamically during the operation.
You can back up the NE data in two ways: the periodic backup and the manual backup.
The system can generate one backup file after you perform the backup task once.
The maximum number of NE backup files stored on the server is determined by the
M2000 configuration file. At present, the M2000 server can store up to seven
backup files for each NE. When more than seven backup files are generated for an
NE, the M2000 server stores only the latest seven backup files for this NE.
Meanwhile, the M2000 server refreshes the backup file list.
The backup files of NE data are saved to the path: M2000
server/export/home/sysm/ftproot/NE type. Take the RNC for example, /data type/NE
FDN.
Overview of Data Management: NM Log Data
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 103/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 103
When the M2000 system fails, you can run the diagnostic tool to collect all the related diagnostic information
from the M2000 server and client through the FTP protocol. By using this information, you can locate faults.
The collected information is as follows:
Trace files on the client, for example, Client_DebugTrace .
Java virtual machine thread stack and lock state of the client, for example, Client_ThreadStackDump.txt .
Trace files on the server, for example, iMAP.root.trace (to store the current trace file),
imap_stacks.20070206.170237.trace (to store history trace files before the currently collected NM log
file).
Core files on the server, for example, core.imapsvcd.0.21221.1170824184.stack .
NE alarm synchronization number, for example, FMSyncNo .
The pstack file, for example, imap_stacks.20070207.155817.trace .
Information of the Sybase, for example, SybaseConfig.zip , SybaseVersion.zip ,
SYBLog.20070206.171040.zip .
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 104/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 104
Overview of Data Management: NM Log Data
By default, the collected files are saved in M2000client\iManagerM2000Client\diagnosis\collected files. You can change the save path.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 105/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 105
Data Management
Management
of server data Management of NE data
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 106/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 106
Data Management
NE data
management
Refreshing
NE backup
data
Restoring NE backup data
Backingup NE
data
Collecting NM Log Files
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 107/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 107
Step 1
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 108/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 108
Collecting NM Log Files
Step 2: Set the FTP server.
Enter the IP address of M2000 server.
Enter the port number.
Enter the FTP user name and password used to log in to the target server.
Step 3: Select information to be collected.
If you plan to collect trace files on the client, trace files on the server, core files on the server,
or trace files on the local maintenance station, you should enter Start Time and End Time to
collect the information within the specified time range.
If you plan to collect alarm diagnostic data of the NE, enter the name of the NE whose alarm
diagnostic data you want collect in NE Name.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 109/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 109
Collecting NM Log Files
Step 4: Set the folder for saving the diagnostic information.
The collected files are saved under the M2000 client installation directory:
\iManagerM2000Client\diagnosis\collected files. You can change the directory for
saving collected files.
Step 5: Click Collect to collect the diagnostic information.
If you click Stop when the diagnostic tool is collecting information from a client,you are not allowed to stop the progress of collecting information from the client.
If you click Stop when the diagnostic tool is collecting information from the M2000
server, you are not allowed to get any diagnostic information about the server.
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 110/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 110
Chapter 1 Logging In to the M2000 Client
Chapter 2 Network Monitoring
Chapter 3 Topology Management
Chapter 4 Security Management
Chapter 5 Log Management
Chapter 6 Fault Management
Chapter 7 Performance Management
Chapter 8 Software Management
Chapter 9 Data Management
Chapter 10 Configuration Management
8/20/2019 M2000-Huawei
http://slidepdf.com/reader/full/m2000-huawei 111/112
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 111
Configuration Management
The operations involved in the configuration management vary with different products. Fordetails about the operations involved in the configuration management, refer to the
iManager M2000 Operator Guide. This part only illustrates how to start the LMT.
Starting the LMT