m2000-huawei

112
HUAWEI TECHNOLOGIES CO., L TD. All rights reserved www.huawei.com Security Level: Internal Operation and Maintenance of M2000 Client

Upload: anang-prasetyo

Post on 07-Aug-2018

212 views

Category:

Documents


0 download

TRANSCRIPT

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 1/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved

www.huawei.com

Security Level: Internal 

Operation and Maintenanceof M2000 Client

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 2/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 2

Developed independently by Huawei

Technologies Co., Ltd, the iManager M2000

V2 functions as EMS in the Huawei wireless

network solution. The M2000 V2 can access a

whole series of products developed by Huawei

and perform centralized management on them.

This slide introduces the basic operations of on

the M2000 client. 

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 3/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 3

After learning this course, you will have a basic

knowledge of:

Basic operations on the M2000 client.

Operations related to monitoring management,

topology management, security management, log

management, fault management, performance

management, software management, data

management, and configuration management.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 4/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 4

Reference

iManager M2000 System Description

iManager M2000 Administrator Guide

iManager M2000 Commissioning Guide

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 5/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 5

Chapter 1 Logging In to the M2000 ClientChapter 2 Network Monitoring

Chapter 3 Topology Management

Chapter 4 Security Management

Chapter 5 Log Management

Chapter 6 Fault Management

Chapter 7 Performance Management

Chapter 8 Software Management

Chapter 9 Data Management

Chapter 10 Configuration Management

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 6/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 6

Logging In to the M2000 Client

Logging in to the

M2000 server

Logging out

Exiting

Upgrading the

software on the client

Automatically

Logging In to

the M2000

Other operations

The diagram on the left lists

some basic operations involved

in M2000 client login.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 7/112HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 7

Logging In to the M2000 Server

To log in to the M2000 server, choose Start > All programs > iManager M2000 client >M2000 client. 

Type the user name and password

in the corresponding fields.

Type the IP address of the M2000

server.

Note:

 The initial user name is admin

and the password is null.

 The user password is saved on

the M2000 server. Only when the

server is initially installed, the

password is null.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 8/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 8

Logging In to the M2000 Server

|Main interface of the M2000 client|

 Navigation

tree

Information

display

Menu bar

Status bar

Tool bar

Topology

view

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 9/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 9

Logging Out Off the M2000 Client

To log out off the M2000 client, choose System > Logout.

 Note: Logging out

off the M2000client does not

mean the

applications

running on the

M2000 client are

terminated.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 10/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 10

Exiting

To exit the M2000 client, choose System > Exit.

Note: Exiting the

M2000 clientmeans the

applications

running on the

M2000 client are

terminated.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 11/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 11

Upgrading the Software on the M2000 Client Automatically

To upgrade the software on the M2000 client automatically, perform the following steps:Step 1: Start the M2000 client.

Step 2: Log in to the M2000 server.

After you log in to the M2000 server, the Confirmation dialog box is displayed, click Yes. 

Prerequisites:

The M2000 can be automatically

and correctly upgraded only when:

• The versions of the software on

the M2000 client and on the M2000

server are of the same version

sequence.

• The version of the software on the

M2000 server is higher than that on

the M2000 client.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 12/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 12

Upgrading the Software on the M2000 Client Automatically

Step 3: In the displayed Update Wizard dialog box, click Continue.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 13/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 13

Other Operations

System Settings

Display/Hide/Customize

Toolbar

Region Settings

Metrology Setting

Lock Terminal

Change Password

Proxy Service Setting

LMT Prompt Setting

Broadcast Message

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 14/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 14

Region Settings

 Number tab page

Time tab page

Date tab page

Time Mode tab page

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 15/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 15

Overview of Other Common Operations

System security settings

 Single-user mode: indicates the system status

during the maintenance. The single-user mode allows

only one user to log in to the client and set upsessions.

 Multi-user mode: indicates the system status when

the system is functional. The multi-user mode allows

several users to log in to the client at the same time.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 16/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 16

Overview of Other Common Operations

View license information 

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 17/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 17

Overview of Other Common Operations

Download NE match files to the M2000 client

 When the version of an NE on the M2000

client is different from that on the M2000

server, download the NE match file to the

M2000 client, as shown on the right.

 If the files related to the new version of the

 NE are not available, the system displays a

message, indicating that the system cannot

 perform the upgrade operation.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 18/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 18

Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring

Chapter 3 Topology Management

Chapter 4 Security Management

Chapter 5 Log ManagementChapter 6 Fault Management

Chapter 7 Performance Management

Chapter 8 Software Management

Chapter 9 Data Management

Chapter 10 Configuration Management

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 19/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 19

Overview of the M2000 Network Monitoring

The M2000 network monitoring monitors the operational status of

the M2000. For instance, the monitoring management monitors the

status of hard disk, database, session, or services. The M2000

monitoring management involves the following operations: 

Setting the server threshold

Monitoring the performance status of the server

Monitoring the hard disk status of the server

Monitoring the database status of the server

Monitoring the database serving status

Monitoring the process status of the server

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 20/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 20

Setting the Server Threshold

Step 1: Set the hard disk threshold.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 21/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 21

Setting the Server Threshold

Step 2: Set the database threshold.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 22/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 22

Monitoring the Performance Status of the Server

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 23/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 23

Monitoring the Hard Disk Status of the Server

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 24/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 24

Monitoring the Database Status of the Server

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 25/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 25

Monitoring the Database Serving

Status

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 26/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 26

Monitoring the Process Status

of the Server

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 27/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 27

Chapter 1 Logging In to the M2000 Client 

Chapter 2 Network Monitoring

Chapter 3 Topology Management

Chapter 4 Security Management

Chapter 5 Log ManagementChapter 6 Fault Management

Chapter 7 Performance Management

Chapter 8 Software Management

Chapter 9 Data Management

Chapter 10 Configuration Management

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 28/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 28

Topology Management

The topology management is used for constructing and managing the

topology structure of the entire network. In this way, the networking

topology and the operational status of the entire network are

displayed clearly.

Creating physical subnets

Creating physical NEs

Managing SNMP parameter template

Monitoring NEs

Adjusting the network topology

Adjusting the display of the topology view

Printing the topology view

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 29/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 29

Creating Physical SubnetsTo create physical subnets, perform the following steps:

Step 1: Right-click the topology view and choose Create Physical Subnet from the

shortcut menu.

Set background

Create physical subnets

Create topological objects

The Create Topo Object 

option is used to create physical NEs, virtual NEs, IP

devices, virtual links, and

 physical links.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 30/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 30

Creating Physical SubnetsStep 2: Set the file server.

The file server is used for the file transfer between the M2000 and the NEs. An NE is used as the

file server to set up connections between the M2000 and other NEs. In this way, the problem that

the M2000 cannot set up direct connection with other NEs are solved. 

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 31/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 31

Creating Physical NEs

 Create a single physical NE.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 32/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 32

Creating Physical NEs

Create multiple physical NEs.

For instance, the Search NodeB 

function enables you to find the

 NodeBs that belong to the RNCon the topology view. Similarly,

you can set Search IMSOUT to

create multiple physical NEs

simultaneously.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 33/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 33

Creating Physical NEs

 NE attributes template

Export NE attributes template

The NE attributes template provides standard formatsfor information input when NEs are created in

 batches.

The formats consist of INI (editable in notepad) and

CSV file formats (editable in Excel).

After editing the NE information, enter the NE

configuration script file when you create a topological

object.

Note

 The .CSV file format supports the

 bulk creation of NEs in the WCDMA

and WiMAX network.

 The .INI file format supports the bulk

creation of all NEs except virtual NEs.

 The virtual NEs cannot be created in batches.

 The CSCF, HSS, ATS, RM, CCF, and

DOPRA cannot be created in batches. 

CSCF: call session control function

HSS: home subscriber server

ATS:general telephony application server

RM: resource manager

CCF:call control function

DOPRA:distributed object-oriented programmable

realtime architecture

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 34/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 34

Creating Physical NEs

 NE attributes template

Example of NE configuration

information in .ini format

Example of NE configuration

information in .csv format

Template

模板: 

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 35/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 35

Monitoring NEs

• Monitor the NE status.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 36/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 36

Monitoring NEs

•Set NE reconnection status.

When the M2000 server is disconnected

from NEs, set the M2000 to re-connect NEs.

The NE reconnection has two statuses:

 Forbidden connection

When the M2000 server is disconnectedfrom an NE, the M2000 will not attempt to

connect the NE.

 Permitted connection

When the M2000 server is disconnected

from an NE, the M2000 attempts to re-

connect the NE. By default, a new NE is in permitted connection status.

Disconnection icon:

Forbidden connection icon: 

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 37/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 37

Monitoring NEs

Reconnect NE manually.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 38/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 38

Adjusting Network Topology/Adjusting Network Topology

Display/Printing Topology View

Zoom in

Zoom out

Partially zoom in

RestoreElements display

View

Print

Search

Save

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 39/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 39

Adjusting Network Topology/Adjusting Network Topology

Display/Printing Topology View

Adjust the NE position.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 40/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 40

Adjusting Network Topology/Adjusting Network Topology

Display/Printing Topology View

View or modify the basic attributes of subnets.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 41/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 41

Adjusting Network Topology/Adjusting Network

Topology Display/Printing Topology View

Search or modify the physical links.

To search for physical links,

double-click a physical link or a

 physical link set on thetopology view.

In the displayed dialog box,

right-click a link and choose

Link Browser.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 42/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 42

Adjusting Network Topology/Adjusting Network

Topology Display/Printing Topology View

Delete a subnet. Delete an NE.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 43/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 43

Adjusting Network Topology/Adjusting Network

Topology Display/Printing Topology View

Customize the display of topology alarms.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 44/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 44

Adjusting Network Topology/Adjusting Network Topology

Display/Printing Topology View

Set the topology view to start the subnet.

The subnet view refers to that

displayed on the client after the

topology view is displayed.

If you do not plan to set thetopology view manually, the

default view of the subnet

started by the topology view is

the root subnet view.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 45/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 45

Chapter 1 Logging In to the M2000 Client 

Chapter 2 Network Monitoring

Chapter 3 Topology Management

Chapter 4 Security Management

Chapter 5 Log Management

Chapter 6 Fault Management

Chapter 7 Performance Management

Chapter 8 Software Management

Chapter 9 Data ManagementChapter 10 Configuration Management

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 46/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 46

M2000 Security Management

The M2000 security management involves the following operations:

Configuring the security management

Managing OM users

Managing NE users

Managing OM and NE users

Setting FTPS parameters

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 47/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 47

Interface of Security Management

Set the NE types to bedisplayed.

Refresh the security

management interface.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 48/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 48

Managing OM Users

Add an OM user group.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 49/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 49

Managing OM Users

Authorizing OM User Group

Assigning privileges to OM user group

Assigning new device rights to OM user

groupAssigning MML command rights to

OM user group

Three default user groups are available on theM2000 client. They are Administrators group,

Guests group, and Operators group.

The Administrators group has the highest

 privileges. You cannot modify or copy the

 privileges of the Administrator group. You can,

however, authorize the Guests group and the

Operators group.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 50/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 50

Managing OM Users

Synchronize OM user data

Add OM users to OM user group

Bind OM user private rights

Assign MML command rights to OM

users

Change password

 Note that each NE is assigned with the corresponding MML

command rights. When a new NE is added, you need to re-assign

the MML command rights for each user in the OM user group.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 51/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 51

Managing OM UsersSet rules for NE type rights.

You can set the rules for NE

type rights in a template. Aftersetting the template, all the NEs

added have the rights inherited

from this template.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 52/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 52

Managing NE Users

After the OM user is

 bound with a real NE, you

can create at the NE side a

user with the same name asthe OM user. This user is

called NE user. The NE

user logs in to the NE

through the LMT.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 53/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 53

Monitoring OM Users and NE Users

Monitor the OM Users.

Monitor the operations of OM users who are

now in session status.

When the M2000 server restarts or the network

is disconnected and restored, click Refresh to

refresh the session monitor table.

M it i OM U d NE U

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 54/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 54

Monitoring OM Users and NE Users

Monitor the sessions of the OM user on the LMT.

 Note that this function is applicable only to NEs inthe WCDMA network and supports only the LMT

users.

O

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 55/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 55

Monitoring OM Users and NE Users

Set the status for a non-default NE user.

By setting the status, the non-default NE user's login and operation of the

MML commands on the LMT can be

controlled. Non-default NE users refer

to the NE local users excluding the

admin and guest users.

The statuses of non-default NE userscan be manageable and lock.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 56/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 56

Monitoring OM Users and NE Users

Force OM users to exit the M2000.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 57/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 57

Monitoring OM Users and NE Users

Force OM users to exit the LMT.

Monitoring OM Users and NE Users

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 58/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 58

Monitoring OM Users and NE Users

Unlocking OM users.

If the times that a user

enters wrong password at

a time exceeds themaximum attempts, the

OM user is locked for a

 period. Right-click the

user and choose Unlock

User from the shortcut

menu to unlock the user.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 59/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 59

Monitoring OM Users and NE Users

Set to lock an OM user automatically.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 60/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 60

Setting FTPS Parameters

Encryption mode: self-adaptation mode, SSL encryption mode, and plain mode.

Supported mode: refers to the FTPS connection mode, mainly including active modeand passive mode.

Transmission mode: refers to the mode in which the FTPS transfers files. The

transmission mode can be in ASCII mode or in text mode.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 61/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 61

Chapter 1 Logging In to the M2000 Client 

Chapter 2 Network Monitoring

Chapter 3 Topology Management

Chapter 4 Security Management

Chapter 5 Log Management

Chapter 6 Fault Management

Chapter 7 Performance Management

Chapter 8 Software Management

Chapter 9 Data Management

Chapter 10 Configuration Management

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 62/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 62

M2000 Log Management

Types of logs

Types oflogsOperation log

Security

log

System log

NE operation

log

NE

security

log

Records all the important

operations performed by

OM users.

Records security events occurred in the

system, such as logging in to the M2000,

modifying rights for OM user group, or

adding OM users.

Records significant events occurred

in the system.

Records all the

important operations

 performed by NE users

Records security events

occurred to NEs.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 63/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 63

M2000 Log Management

Log template

1

2Log statistics template

Log query template

Notes:

 Saved on the server background, the contents of a templateare associated with users. For instance, the templates created

 by user A can be seen by user A only.

 The names of log templates that are of the same type and

 belong to the same user cannot be duplicate. If the names of

log templates are duplicate, the system cannot save the

template.

 A maximum of 40 characters are allowed for the name of

the template. The following characters are not allowed:

`~!@#$%^&*()\":;?,|{}

[]<>'

  The template information node does not support dynamic

refresh. If user A logs in to two terminals at the same time

and delete or modify template 1 on terminal 1, the deletion ormodification cannot be performed on terminal 2

automatically. The manual refresh provided by the system,

however, enables you to refresh the template information

manually.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 64/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 64

M2000 Log Management

Operations involved in the M2000 log management are as follows:

Querying logs

Collecting statistics on logs

Managing log templates

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 65/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 65

Querying Logs

Querying operation logs

Querying system logs

Querying security logs

Querying NE operation logsQuerying NE

security logs

Collecting Statistics on Logs

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 66/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 66

Collecting Statistics on Logs

Collecting statistics on operation logs

Collecting statistics on system logsCollecting statistics on security logs

Collecting statistics on NE operation logs

Collecting statistics on NE

security logs

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 67/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 67

Managing Log Templates

Saving a template

Modifying

a template

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 68/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 68

Chapter 1 Logging In to the M2000 Client 

Chapter 2 Network Monitoring

Chapter 3 Topology Management

Chapter 4 Security Management

Chapter 5 Log Management

Chapter 6 Fault Management

Chapter 7 Performance Management

Chapter 8 Software Management

Chapter 9 Data Management

Chapter 10 Configuration Management

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 69/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 69

M2000 Fault Management

Function: 

The M2000 reports, manages, and analyzes NE alarms in a centralized manner. The

M2000 collects NE alarms to the M2000 and displays different audio and video device

alarms for the maintenance personnel. In addition, the M2000 notifies the maintenance

 personnel of device alarms by short message or email at the time when the alarm is

generated.

Operations:

The following operations and analysis can be performed on NE alarms at the M2000 side.

  Manual restore

  Filtering

  Severity redefinition

  Alarm relevance

In this way, the M2000 can perform centralized analysis and processing on the device

alarms generated in the current network.

  CriticalIndicates that the device or the

resource cannot be used

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 70/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 70

M2000 Fault Management

Alarm

type

Fault

Management

Alarm

category

Alarm

severity

resource cannot be used

completely and needs to be

restored immediately.

  MajorIndicates that the quality of the

device or the resource is severely

damaged. Corrective measuresshould be taken immediately.

 MinorIndicates that the quality of the

device or the resource is slightly

affected. 

  PromptIndicates that the quality of the

device or the resource may

 probably be affected.

 Event alarm

Refers to the notification generated

when the system detects the events

occurred. 

 Fault alarm

Refers to the notification generatedwhen the system detects the faults

occurred. 

Alarms can be related to the following items:

Power supply system

Environment system

Signaling system

Relay system

Hardware system

Software system

Operating system

Telecommunications system

Service quality

Fault handling

Internal alarm

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 71/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 71

M2000 Fault Management

Saving alarms

In the alarm database, four tables are available for saving alarms. The four tables

are as follows:

 tbl_cur_alm: saves currently generated alarms.

 tbl_his_alm: saves alarms generated in the past.

 tbl_event: saves the event alarms.

tbl_mask_alm: saves the shielded alarms.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 72/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 72

Mechanism for Processing Alarm Table Overflow

By default, the alarm service detects whether the number of alarms in the alarm table reaches to the upper

threshold every 83 seconds after it is started.

The upper threshold for each alarm table is as follows:

tbl_cur_alm: 100, 000

tbl_his_alm: 2 million and can be modified through the M2000 client.

tbl_event: 200 million and can be modified through the M2000 client.

tbl_mask_alm: 200, 000

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 73/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 73

Mechanism for Processing Alarm Table Overflow

When the alarms recorded in the alarm table exceed the threshold, different alarm tables havedifferent mechanisms to process alarm table overflow.

tbl_cur_alm: sorts the alarms by alarm generation time in sequence and forcibly changes first ten

thousand unacknowledged and cleared alarms to the tbl_his_alm. If the alarm table still has the

 problem of overflow, move the earliest unacknowleged and uncleared alarms to the tbl_his_alm.

tbl_his_alm: sorts the alarms by alarm generation time in sequence and documents the 20 percent of

the earliest alarms. Then, the system deletes these earliest alarms automatically.

tbl_event: sorts the alarms by alarm generation time in sequence and documents the 20 percent of the

earliest alarms. Then, the system deletes these earliest alarms automatically.

tbl_mask_alm: deletes the earliest 100,000 alarms from the alarm table.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 74/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 74

Operations Involved in the M2000 Fault Management

Browsing current fault alarms

Browsing event

alarms

Querying

current

fault

alarms

Querying

eventalarms

Querying

history fault

alarms

Querying

shielded

alarms

Collecting

statistics on

alarms

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 75/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 75

Operations Involved in the M2000 Fault Management

Browsing current fault

alarmsBrowsing event alarms

Setting alarm

services

Operations Involved in the

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 76/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 76

Operations Involved in the

M2000 Fault ManagementSet alarm services.

Setting remotealarm

notification

Setting parameters

of remote alarm

notification

Acknowledgingalarms

Redefining

alarm severity

Settingconditions for

alarm filtering

Setting

alarm

correlation

analysis

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 77/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 77

Chapter 1 Logging In to the M2000 Client 

Chapter 2 Network Monitoring

Chapter 3 Topology Management

Chapter 4 Security Management

Chapter 5 Log Management

Chapter 6 Fault Management

Chapter 7 Performance Management

Chapter 8 Software Management

Chapter 9 Data Management

Chapter 10 Configuration Management

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 78/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 78

Performance Management

Measurement is a process during which the value of an attribute for an NE

entity (including logical entity) in a period is acquired.

Category of performance measurement counters

System counters: a kind of a default counter defined in the NE. System

counters are categorized into common counters and extended counters. 

- Common counters: By default, the common counters are in the

measurement state. The measurement can be cancelled.

- Extended counters: By default, the extended counters are in the non-

measurement state. Before performing any measurement on extended

counters, you need to activate them first. You can enable or disable the

measurement on extended counters.

 Custom counters: refers to the counters that are defined on the M2000

client by users. The principle for customizing counters is to perform

arithmetic operations on the default counters, including common counters

and extended counters, in the system. In this way, custom counters are

self-defined.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 79/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 79

Performance Measurement Objects

Class 1Refers to some significant objects of NEs. By default, objects belonging to class 1 are in

the measurement state. The measurement on class 1 objects can be cancelled. For

instance, the Iu interface of the RNC belongs to class 1. 

Class 2

By default, the objects belonging to class 2 are in the non-measurement state. You need

to first activate these objects before performing any measurement on them. You can

enable or cancel the measurement on these objects. For instance, the neighbors of

the RNC belongs to class 2.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 80/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 80

Performance Measurement Objects

Class 3

Refers to those objects created manually by users in the Setting Performance

Measurement Object dialog box. You need to first activate these objects before

 performing any measurement on them. You can add, modify, or delete the Class 3

objects. In addition, you can also enable or cancel any measurement on class 3

objects. For instance, the IMSI number of the SGSN belongs to class 3. The RNC

does not have class 3 objects. 

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 81/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 81

Performance Measurement Periods

The measurement periods vary according to the measurement objects. The following

measurement periods are available: 5 minutes, 15 minutes, 30 minutes, 60 minutes, or 24

hours.  Note that the measurement whose periods are 5 minutes or 15 minutes are called

real-time measurement, or short-period measurement. Only some of the NEs support the

real-time measurement.

Caution:

The measurement periods for all the NEs of the same type must be same.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 82/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 82

Performance Measurement Results and Counter Threshold

Performance measurement results refer to the values of measurement counters of NE

measurement objects.

Performance counter threshold can be set in either of the following windows:

 Threshold Management window

 Performance Monitor window

If the value of a counter exceed this threshold, the threshold alarm is generated.

For the same counter, you can set alarm thresholds for various time phases, or set an alarm

threshold for all time periods in each measurement period. These thresholds can be set for all

objects of a measurement type, or for one or more objects.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 83/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 83

Results of Performance Measurement Statistics

The maximum saving days for the results whose measurement period is 5 minutes or 15 minutes are 7 and

represented by the parameter maxRTResultSavingDay.

The maximum saving days for the results whose measurement period is 30 minutes, 60 minutes, or 1 day are

30 and represented by the parameter maxResultSavingDay.

The M2000 checks the results whose period is 30 minutes, 60 minutes, or 1 day on a fixed time 03:25 a.m.

each day. This is represented by the parameter capacityControlTime. The M2000 deletes the data saved for

over 30 days.

The M2000 checks the results whose period is 5 minutes or 15 minutes on a fixed time 04:35 a.m. each day.

This is represented by the parameter capacityControlTime + 70 minutes. The M2000 deletes the data saved

for over 7 days.

The parameters described previously are described in the file /export/home/omc/var/etc/conf/pmsvc.xml.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 84/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 84

Measurement Settings

Open the

MeasurementSettings window.

S tti M t

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 85/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 85

Setting Measurement

Twonavigation

modes

Change of

function sets

Change of

function

subset

Periods for the

selected function

subset

Counter ID

Several

 NEs

Objects

Applying the

measurement

Monitoring NE Performance

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 86/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 86

Monitoring NE Performance

Synchronizing measurement results of NEs

Querying missing measurement results of NEs

Measurement management

Monitoring NE Performance

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 87/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 87

Monitoring NE Performance

Monitor the integrity of measurement results of current NEs.

Querying Performance Measurement Results (I)

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 88/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 88

Querying Performance Measurement Results (I)

Query

template

Create a

query

Q i P f M t R lt (II)

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 89/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 89

Querying Performance Measurement Results (II)

Setting

anobject

Setting

a

counter

Other settings, such as

querying the busy-hour

results, measurement

 periods, sorting, and filterconditions

Managing

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 90/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 90

g g

Measurement Objects

Importing the information

about measurement

objects

Exporting the

information about

measurement objects

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 91/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 91

Managing Measurement ObjectsActivate/Suspend measurement tasks.

Activating

measurementtasks

Suspending

measurement

tasks

Managing User-Defined

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 92/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 92

g g

Counters

Creating user-defined

countersModifying user-

defined countersImporting user-defined

counters

Exporting user-defined

counters

Managing Counter Threshold

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 93/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 93

Setting the counter

threshold Modifying the

counterthreshold

Setting the

status of the

counterthreshold

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 94/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 94

Monitoring NEs in Real Time

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 95/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 95

Chapter 1 Logging In to the M2000 Client 

Chapter 2 Network Monitoring

Chapter 3 Topology Management

Chapter 4 Security Management

Chapter 5 Log Management

Chapter 6 Fault Management

Chapter 7 Performance Management

Chapter 8 Software Management

Chapter 9 Data Management

Chapter 10 Configuration Management

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 96/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 96

Software Management

The software management involves the following operations:

Managing the software and files

Upgrading NE software and patches

Managing RAN Licenses

Querying Version Information on Software Installed on the Server

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 97/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 97

Managing Software and Files

Browsing the file information

on the server. The file

information includes software,

 patches, license, data, and

others.

Managing Software Transferring files

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 98/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 98

g g

and Filesg

from the client to the

serverTransferring files

from the server to the

client

Transferring

files from NEs to the

server

Transferring

files from theserver to NEs

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 99/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 99

Upgrading NE Software and Patches

The software management function enables you to upgrade the software and patches ofthe following NEs:

  RNC

  NodeB

  SGSN

  GGSN

  MSC server

  MGW

  ASN-GW

 Note: 

For details about how to upgrade the RNC, the NodeB, and their corresponding

 patches, refer to the upgrade guide.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 100/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 100

Chapter 1 Logging In to the M2000 Client 

Chapter 2 Network Monitoring

Chapter 3 Topology Management

Chapter 4 Security Management

Chapter 5 Log Management

Chapter 6 Fault Management

Chapter 7 Performance Management

Chapter 8 Software Management

Chapter 9 Data Management

Chapter 10 Configuration Management

Overview of Data Management: Backing Up NM Data

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 101/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 101

g g p

You can back up the NM data in two ways: periodic backup and manual backup.

You can back up the NM data through the full backup and the incremental backup. The

following gives the difference between the full backup and the incremental backup:

Each time when a full backup is performed, the M2000 removes all the previous files

related to full backup and incremental backup on the server and saves one and only the

latest compressed full backup file. The file of full backup is named in the following way:

all-current time, such as, all-20060106103055.tar.gz. 

Each time when an incremental backup is performed, a new backup file is generated. The

incremental backup is on the basis of previous backup data that can be a full backup or an

incremental backup. The file of an incremental backup is named in the following way: inc-

current time, such as, inc-20060106103055.tar.gz. 

The NM data to be backed up refers to the data contained the following files:

/export/home/omc/var/

/export/home/sysm/

The backup files of the NM data are saved in the directory of /export/home/backup/omc/ on the

M2000 server.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 102/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 102

Overview of Data Management: Backing Up NE Data

 NE data backup: The data management provided by the M2000 enables you to back upthe configuration files of all NEs managed by the M2000 and the files that change

dynamically during the operation.

You can back up the NE data in two ways: the periodic backup and the manual backup.

The system can generate one backup file after you perform the backup task once.

The maximum number of NE backup files stored on the server is determined by the

M2000 configuration file. At present, the M2000 server can store up to seven

 backup files for each NE. When more than seven backup files are generated for an

 NE, the M2000 server stores only the latest seven backup files for this NE.

Meanwhile, the M2000 server refreshes the backup file list.

The backup files of NE data are saved to the path: M2000

server/export/home/sysm/ftproot/NE type. Take the RNC for example, /data type/NE

FDN.

Overview of Data Management: NM Log Data

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 103/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 103

When the M2000 system fails, you can run the diagnostic tool to collect all the related diagnostic information

from the M2000 server and client through the FTP protocol. By using this information, you can locate faults.

The collected information is as follows:

Trace files on the client, for example, Client_DebugTrace . 

Java virtual machine thread stack and lock state of the client, for example, Client_ThreadStackDump.txt .

Trace files on the server, for example, iMAP.root.trace  (to store the current trace file),

imap_stacks.20070206.170237.trace  (to store history trace files before the currently collected NM log

file).

Core files on the server, for example, core.imapsvcd.0.21221.1170824184.stack . 

 NE alarm synchronization number, for example, FMSyncNo . 

 The pstack file, for example, imap_stacks.20070207.155817.trace . 

 Information of the Sybase, for example, SybaseConfig.zip  , SybaseVersion.zip  ,

SYBLog.20070206.171040.zip . 

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 104/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 104

Overview of Data Management: NM Log Data

By default, the collected files are saved in M2000client\iManagerM2000Client\diagnosis\collected files. You can change the save path.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 105/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 105

Data Management

Management

of server data Management of NE data

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 106/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 106

Data Management

 NE data

management

Refreshing

 NE backup

data

Restoring NE backup data

Backingup NE

data

Collecting NM Log Files

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 107/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 107

Step 1

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 108/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 108

Collecting NM Log Files

Step 2: Set the FTP server.

Enter the IP address of M2000 server.

Enter the port number.

Enter the FTP user name and password used to log in to the target server.

Step 3: Select information to be collected.

If you plan to collect trace files on the client, trace files on the server, core files on the server,

or trace files on the local maintenance station, you should enter Start Time and End Time to

collect the information within the specified time range.

If you plan to collect alarm diagnostic data of the NE, enter the name of the NE whose alarm

diagnostic data you want collect in NE Name.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 109/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 109

Collecting NM Log Files

Step 4: Set the folder for saving the diagnostic information.

The collected files are saved under the M2000 client installation directory:

\iManagerM2000Client\diagnosis\collected files. You can change the directory for

saving collected files.

Step 5: Click Collect to collect the diagnostic information.

If you click Stop when the diagnostic tool is collecting information from a client,you are not allowed to stop the progress of collecting information from the client.

If you click Stop when the diagnostic tool is collecting information from the M2000

server, you are not allowed to get any diagnostic information about the server.

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 110/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 110

Chapter 1 Logging In to the M2000 Client 

Chapter 2 Network Monitoring

Chapter 3 Topology Management

Chapter 4 Security Management

Chapter 5 Log Management

Chapter 6 Fault Management

Chapter 7 Performance Management

Chapter 8 Software Management

Chapter 9 Data Management

Chapter 10 Configuration Management

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 111/112

HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 111

Configuration Management

The operations involved in the configuration management vary with different products. Fordetails about the operations involved in the configuration management, refer to the

iManager M2000 Operator Guide. This part only illustrates how to start the LMT.

Starting the LMT

8/20/2019 M2000-Huawei

http://slidepdf.com/reader/full/m2000-huawei 112/112

Starting the LMT