Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
www.huawei.com
Technologies Co., Ltd, the iManager M2000 V2 functions as EMS in the Huawei wireless network solution. The M2000 V2 can access a whole series of products developed by Huawei and perform centralized management on them.
This slide introduces the basic operations of on
Page 2
Page 3
Reference
iManager M2000 System Description iManager M2000 Administrator Guide iManager M2000 Commissioning Guide
Page 4
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management
Page 5
Page 6
Type the user name and password in the corresponding fields. Type the IP address of the M2000 server.
Note: The initial user name is admin and the password is null. The user password is saved on the M2000 server. Only when the server is initially installed, the password is null.
Page 7
Topology view
Information display
Status bar
Page 8
Note: Logging out off the M2000 client does not mean the applications running on the M2000 client are terminated.
Page 9
Exiting
To exit the M2000 client, choose System > Exit.
Note: Exiting the M2000 client means the applications running on the M2000 client are terminated.
Page 10
Prerequisites: The M2000 can be automatically and correctly upgraded only when: The versions of the software on the M2000 client and on the M2000 server are of the same version sequence. The version of the software on the M2000 server is higher than that on the M2000 client.
Page 11
Page 12
Other Operations
System Settings Region Settings Proxy Service Setting LMT Prompt Setting Metrology Setting Broadcast Message Change Password
Display/Hide/Customize Toolbar
Lock Terminal
Page 13
Region Settings
Number tab page Time tab page Date tab page Time Mode tab page
Page 14
Single-user mode: indicates the system status during the maintenance. The single-user mode allows only one user to log in to the client and set up sessions. Multi-user mode: indicates the system status when the system is functional. The multi-user mode allows several users to log in to the client at the same time.
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 15
Page 16
When the version of an NE on the M2000 client is different from that on the M2000 server, download the NE match file to the M2000 client, as shown on the right.
If the files related to the new version of the NE are not available, the system displays a message, indicating that the system cannot perform the upgrade operation.
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 17
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management
Page 18
the M2000. For instance, the monitoring management monitors the status of hard disk, database, session, or services. The M2000 monitoring management involves the following operations: Setting the server threshold Monitoring the performance status of the server Monitoring the hard disk status of the server Monitoring the database status of the server
Page 19
Page 20
Page 21
Page 22
Page 23
Page 24
Page 25
Page 26
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management
Page 27
Topology Management
The topology management is used for constructing and managing the
topology structure of the entire network. In this way, the networking topology and the operational status of the entire network are displayed clearly. Creating physical subnets Creating physical NEs Managing SNMP parameter template Monitoring NEs
Create physical subnets Create topological objects Set background The Create Topo Object option is used to create physical NEs, virtual NEs, IP devices, virtual links, and physical links.
Page 29
The file server is used for the file transfer between the M2000 and the NEs. An NE is used as the file server to set up connections between the M2000 and other NEs. In this way, the problem that the M2000 cannot set up direct connection with other NEs are solved.
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 30
Page 31
For instance, the Search NodeB function enables you to find the NodeBs that belong to the RNC on the topology view. Similarly, you can set Search IMSOUT to create multiple physical NEs simultaneously.
Page 32
Export NE attributes template CSCF: call session control function HSS: home subscriber server ATSgeneral telephony application server RM: resource manager CCFcall control function
Note
The .INI file format supports the bulk creation of all NEs except virtual NEs. The virtual NEs cannot be created in batches. The CSCF, HSS, ATS, RM, CCF, and DOPRA cannot be created in batches.
Template
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 34
Monitoring NEs
Monitor the NE status.
Page 35
Monitoring NEs
Set NE reconnection status.
When the M2000 server is disconnected from NEs, set the M2000 to re-connect NEs. The NE reconnection has two statuses:
Forbidden connection
When the M2000 server is disconnected from an NE, the M2000 will not attempt to connect the NE. Permitted connection
When the M2000 server is disconnected from an NE, the M2000 attempts to reconnect the NE. By default, a new NE is in permitted connection status.
Disconnection icon: Forbidden connection icon: Page 36
Monitoring NEs
Reconnect NE manually.
Page 37
Zoom in Zoom out Partially zoom in Restore Elements display Print View Search Save
Page 38
Page 39
Page 40
To search for physical links, double-click a physical link or a physical link set on the topology view. In the displayed dialog box, right-click a link and choose Link Browser.
Page 41
Page 42
Page 43
The subnet view refers to that displayed on the client after the topology view is displayed. If you do not plan to set the topology view manually, the default view of the subnet started by the topology view is the root subnet view.
Page 44
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management
Page 45
Page 46
Page 47
Managing OM Users
Add an OM user group.
Page 48
Managing OM Users
Authorizing OM User Group
Three default user groups are available on the M2000 client. They are Administrators group, Guests group, and Operators group. The Administrators group has the highest privileges. You cannot modify or copy the privileges of the Administrator group. You can, however, authorize the Guests group and the Operators group. Assigning privileges to OM user group Assigning new device rights to OM user group Assigning MML command rights to OM user group
Page 49
Managing OM Users
Change password Add OM users to OM user group Bind OM user private rights Assign MML command rights to OM users Synchronize OM user data
Note that each NE is assigned with the corresponding MML command rights. When a new NE is added, you need to re-assign the MML command rights for each user in the OM user group.
Page 50
Managing OM Users
Set rules for NE type rights.
You can set the rules for NE type rights in a template. After setting the template, all the NEs added have the rights inherited from this template.
Page 51
Managing NE Users
After the OM user is bound with a real NE, you can create at the NE side a user with the same name as the OM user. This user is called NE user. The NE user logs in to the NE through the LMT.
Page 52
Page 53
Note that this function is applicable only to NEs in the WCDMA network and supports only the LMT users.
Page 54
Page 55
Page 56
Page 57
If the times that a user enters wrong password at a time exceeds the maximum attempts, the OM user is locked for a period. Right-click the user and choose Unlock User from the shortcut menu to unlock the user.
Page 58
Page 59
Encryption mode: self-adaptation mode, SSL encryption mode, and plain mode. Supported mode: refers to the FTPS connection mode, mainly including active mode and passive mode. Transmission mode: refers to the mode in which the FTPS transfers files. The transmission mode can be in ASCII mode or in text mode.
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 60
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management
Page 61
System log
Security log
Records all the important operations performed by OM users.
NE operation log
Records security events occurred to NEs.
Operation log
Types of logs
NE security log
Page 62
Log template
Saved on the server background, the contents of a template are associated with users. For instance, the templates created by user A can be seen by user A only. The names of log templates that are of the same type and belong to the same user cannot be duplicate. If the names of log templates are duplicate, the system cannot save the template. A maximum of 40 characters are allowed for the name of the template. The following characters are not allowed: `~!@#$%^&*()\":;?,|{} []<>'
The template information node does not support dynamic refresh. If user A logs in to two terminals at the same time and delete or modify template 1 on terminal 1, the deletion or modification cannot be performed on terminal 2 automatically. The manual refresh provided by the system, however, enables you to refresh the template information manually.
Page 63
Page 64
Querying Logs
Querying operation logs Querying system logs
Page 66
Saving a template
Modifying a template
Page 67
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management
Page 68
Function
The M2000 reports, manages, and analyzes NE alarms in a centralized manner. The M2000 collects NE alarms to the M2000 and displays different audio and video device alarms for the maintenance personnel. In addition, the M2000 notifies the maintenance personnel of device alarms by short message or email at the time when the alarm is generated.
Operations: The following operations and analysis can be performed on NE alarms at the M2000 side. Manual restore Filtering Severity redefinition Alarm relevance
In this way, the M2000 can perform centralized analysis and processing on the device alarms generated in the current network.
Page 69
Alarm severity
Critical Indicates that the device or the resource cannot be used completely and needs to be restored immediately.
Major
Indicates that the quality of the device or the resource is severely damaged. Corrective measures should be taken immediately. Minor Indicates that the quality of the device or the resource is slightly affected.
Prompt
Indicates that the quality of the device or the resource may probably be affected.
Alarm category
Event alarm
Refers to the notification generated when the system detects the events occurred.
Fault alarm
Refers to the notification generated when the system detects the faults occurred.
Alarm type
Page 70
Page 71
Page 72
tbl_event: sorts the alarms by alarm generation time in sequence and documents the 20 percent of the earliest alarms. Then, the system deletes these earliest alarms automatically.
tbl_mask_alm: deletes the earliest 100,000 alarms from the alarm table.
Page 73
Page 74
Page 75
Page 76
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management
Page 77
Performance Management
Measurement is a process during which the value of an attribute for an NE
System counters: a kind of a default counter defined in the NE. System counters are categorized into common counters and extended counters.
- Common counters: By default, the common counters are in the measurement state. The measurement can be cancelled.
- Extended counters: By default, the extended counters are in the nonmeasurement state. Before performing any measurement on extended counters, you need to activate them first. You can enable or disable the measurement on extended counters. Custom counters: refers to the counters that are defined on the M2000 client by users. The principle for customizing counters is to perform arithmetic operations on the default counters, including common counters and extended counters, in the system. In this way, custom counters are self-defined. Page 78
All rights reserved
Class 2
By default, the objects belonging to class 2 are in the non-measurement state. You need to first activate these objects before performing any measurement on them. You can enable or cancel the measurement on these objects. For instance, the neighbors of
Page 79
Page 80
hours. Note that the measurement whose periods are 5 minutes or 15 minutes are called
real-time measurement, or short-period measurement. Only some of the NEs support the real-time measurement. Caution: The measurement periods for all the NEs of the same type must be same.
Page 81
Performance measurement results refer to the values of measurement counters of NE measurement objects. Performance counter threshold can be set in either of the following windows: Threshold Management window Performance Monitor window
If the value of a counter exceed this threshold, the threshold alarm is generated.
For the same counter, you can set alarm thresholds for various time phases, or set an alarm threshold for all time periods in each measurement period. These thresholds can be set for all objects of a measurement type, or for one or more objects.
Page 82
The maximum saving days for the results whose measurement period is 5 minutes or 15 minutes are 7 and represented by the parameter maxRTResultSavingDay. The maximum saving days for the results whose measurement period is 30 minutes, 60 minutes, or 1 day are 30 and represented by the parameter maxResultSavingDay. The M2000 checks the results whose period is 30 minutes, 60 minutes, or 1 day on a fixed time 03:25 a.m. each day. This is represented by the parameter capacityControlTime. The M2000 deletes the data saved for over 30 days. The M2000 checks the results whose period is 5 minutes or 15 minutes on a fixed time 04:35 a.m. each day. This is represented by the parameter capacityControlTime + 70 minutes. The M2000 deletes the data saved for over 7 days. The parameters described previously are described in the file /export/home/omc/var/etc/conf/pmsvc.xml.
Page 83
Measurement Settings
Page 84
Setting Measurement
Change of function sets Change of function subset Periods for the selected function subset Two navigation modes Counter ID
Objects
Several NEs
Page 85
Monitoring NE Performance
Measurement management
Page 86
Monitoring NE Performance
Monitor the integrity of measurement results of current NEs.
Page 87
Query template
Create a query
Page 88
Setting an object
Other settings, such as querying the busy-hour results, measurement periods, sorting, and filter conditions
Setting a counter
Page 89
Importing the information about measurement objects Exporting the information about measurement objects HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page 90
Page 91
Page 92
Page 93
Page 94
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management
Page 95
Software Management
Page 96
Browsing the file information on the server. The file information includes software, patches, license, data, and others.
Page 97
Transferring files from the client to the server Transferring files from the server to the client
Page 98
The software management function enables you to upgrade the software and patches of the following NEs: RNC NodeB SGSN GGSN MSC server MGW ASN-GW
Note
For details about how to upgrade the RNC, the NodeB, and their corresponding patches, refer to the upgrade guide.
Page 99
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management
Page 100
You can back up the NM data in two ways: periodic backup and manual backup. You can back up the NM data through the full backup and the incremental backup. The following gives the difference between the full backup and the incremental backup: Each time when a full backup is performed, the M2000 removes all the previous files related to full backup and incremental backup on the server and saves one and only the latest compressed full backup file. The file of full backup is named in the following way: all-current time, such as, all-20060106103055.tar.gz. Each time when an incremental backup is performed, a new backup file is generated. The incremental backup is on the basis of previous backup data that can be a full backup or an incremental backup. The file of an incremental backup is named in the following way: inccurrent time, such as, inc-20060106103055.tar.gz.
The NM data to be backed up refers to the data contained the following files: /export/home/omc/var/ /export/home/sysm/
The backup files of the NM data are saved in the directory of /export/home/backup/omc/ on the M2000 server.
Page 101
NE data backup: The data management provided by the M2000 enables you to back up the configuration files of all NEs managed by the M2000 and the files that change dynamically during the operation. You can back up the NE data in two ways: the periodic backup and the manual backup. The system can generate one backup file after you perform the backup task once. The maximum number of NE backup files stored on the server is determined by the M2000 configuration file. At present, the M2000 server can store up to seven backup files for each NE. When more than seven backup files are generated for an NE, the M2000 server stores only the latest seven backup files for this NE. Meanwhile, the M2000 server refreshes the backup file list. The backup files of NE data are saved to the path: M2000 server/export/home/sysm/ftproot/NE type. Take the RNC for example, /data type/NE FDN.
Page 102
When the M2000 system fails, you can run the diagnostic tool to collect all the related diagnostic information from the M2000 server and client through the FTP protocol. By using this information, you can locate faults.
The collected information is as follows: Trace files on the client, for example, Client_DebugTrace. Java virtual machine thread stack and lock state of the client, for example, Client_ThreadStackDump.txt. Trace files on the server, for example, iMAP.root.trace (to store the current trace file) imap_stacks.20070206.170237.trace (to store history trace files before the currently collected NM log file). Core files on the server, for example, core.imapsvcd.0.21221.1170824184.stack. NE alarm synchronization number, for example, FMSyncNo. The pstack file, for example, imap_stacks.20070207.155817.trace. Information of the Sybase, for example, SybaseConfig.zip, SybaseVersion.zip, SYBLog.20070206.171040.zip.
Page 103
Page 104
Data Management
Page 105
Data Management
NE data management
Backing data
Page 106
Page 107
Step 2: Set the FTP server. Enter the IP address of M2000 server. Enter the port number. Enter the FTP user name and password used to log in to the target server.
Step 3: Select information to be collected. If you plan to collect trace files on the client, trace files on the server, core files on the server, or trace files on the local maintenance station, you should enter Start Time and End Time to collect the information within the specified time range. If you plan to collect alarm diagnostic data of the NE, enter the name of the NE whose alarm diagnostic data you want collect in NE Name.
Page 108
The collected files are saved under the M2000 client installation directory: \iManagerM2000Client\diagnosis\collected files. You can change the directory for saving collected files.
Step 5: Click Collect to collect the diagnostic information. If you click Stop when the diagnostic tool is collecting information from a client, you are not allowed to stop the progress of collecting information from the client. If you click Stop when the diagnostic tool is collecting information from the M2000 server, you are not allowed to get any diagnostic information about the server.
Page 109
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management
Page 110
Configuration Management
The operations involved in the configuration management vary with different products. For details about the operations involved in the configuration management, refer to the iManager M2000 Operator Guide. This part only illustrates how to start the LMT.
Page 111
Page 112