Вы находитесь на странице: 1из 67

Security Level:

Basic Training on I2000V3


Network Management (Dh
version)
ISSUE 2.1

www.huawei.com

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential


Contents

Chapter 1 I2000 V3 NM Solutions

Chapter 2 Functions of I2000 V3 Client

Chapter 3 Maintenance Tools of I2000 V3

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 2


Hierarchical Management

Service NM , i.e. I2000


Application in IN, RBT and Mobile Data, etc. IN service management solution

Host, database and middleware, etc. AMOS

AMOS control solution

Equipment room, temperature, access


control and moisture, etc. RMU
Environmental control

Telecom Overall Huawei Management Solutions


System

Based on complicated network integrating telecommunication and IT, Huawei


iManager I2000 provides multilayer solutions to meet customers’ requirements.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 3


I2000 NM Location
CC&CRM

Billing
Service Provision
SML Integrated Management Platform Custom information mgt

NML RMS, comprehensive faults……

Operation tool, product engineering

EML I2000 service subsystem I2000 AMOS subsystem I2000 RMU subsystem

Configuration
console ICD Data…
LMT Maintenance
Networking device Temperature, moisture,
and Test smoke, intrusion, etc
console
NEL SMSC IN RBT Host/database/middleware

Note: NML is network management system of Mobile company, for example, Yiyang NMS.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 4


OM Solution


Maintenance Tools

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 5


IN NM Solutions

NM
Center Upper-layer
comprehensive NM
system

Database + alarm real-time forwarding interface

MML MML MML

Local
Maintenance
center

Reference: support website: Documentation > Application and Software Product Line >
Service and Software Public > I2000 > Function and Feature > Training Document > Advanced
Training> A&S public - Advanced Training on I2000 IN Uniform Monitor

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 6


OCS NM Solution

Upper-layer NM

I2000 system
Server MML USAU
MML Client
OAM
Server
BAM

MML SNMP SNMP MML MML SNMP

UOA UOA
OAMAgent Agent Agent iMonitor

SCP CBP BMP RBI FEP host, database

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 7


SMC NM Solutions
Upper-layer NM

Server
Client

I2000 system
MML

MT
Server
MML MML

Local
maintenance Local
SMSC maintenance infoX

Reference: support website: Documentation > Application and Software Product Line >
Service and Software Public > I2000 > Function and Feature > Training Document >
Advanced Training > 《业软公共 提高培训 I2000 短消息集中监控培训胶片》

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 8


Data Service NM Solutions
Upper-layer NM

Server
Client
I2000 system

SNMP SNMP SNMP

MMSC …
WAPGW MDSP

Reference: support website: Documentation > Application and Software Product Line >
Service and Software Public > I2000 > Function and Feature > Training Document > Advanced
Training> A&S public - Advanced Training on I2000 Data Service Uniform Monitor

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 9


RBT NM Solutions (old)
VRS
I2000 Client
MML
I2000 Server MML

Upper-layer NM
I2000 DB MML AIP

OAS
Server
OAS DB

icdcomm

icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm icdcomm


OMD OMD OMD OMD OMD OMD OMD OMD OMD

FE CTI UIScript VP Portal WEB DB File
P Server Server Server Server Server
Reference : support website : Documentation > Application and Software Product Line >
Service and Software Public > I2000 > Function and Feature > Training Document > Advanced
Training> A&S public - Advanced Training on I2000 RBT Uniform Monitor

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 10


RBT NM Solutions (new)
Upper-layer NM

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 11


CC&CRM NM Solutions (old)
I2000 Client MML

Upper-layer NM I2000 Server


AIP
MML

OAS Server
OAS DB
icdcomm

OMD OMD OMD OMD OMD OMD OMD OMD OMD

CCS, FP,
APLOGIC
CTI CTI UIScript VP IVR WEB DB File …
Server LIN Server Server Server Server
K
Note: The I2000 cannot monitor customer service system of earlier versions. Therefore, only
the CTI platform and AIP NEs are shown in the figure above.
Reference : support website : Documentation > Application and Software Product Line
> Service and Software Public > I2000 > Function and Feature > Training Document >
Advanced Training> A&S public - Advanced Training on I2000 CC&CRM Uniform Monitor

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 12


CC&CRM NM Solutions (new)

Upper-layer NM

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 13


Monitoring of the RBT Customer Service
System with Multiple Call Planes
I2000 Client

I2000 Server
Upper-layer NM

MML MML

Call plane 1 AIP Call plane 2 AIP Management plane AIP


OAS Server OAS Server OAS Server

Management
Call Plane 1 Call Plane 2 Call Plane n...

Plane …

Note: New versions of the CTI platform can also be accessed in the I2000 through the UOA, that
is, an OASserver connects to a UOA, and the UOA connects to the I2000 through SNMP. Multiple
OASservers can connect to only one UOA and one OASserver can connect to multiple UOAs.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 14


Contents

Chapter 1 I2000 V3 NM Solutions

Chapter 2 Functions of I2000 V3 Client

Chapter 3 Maintenance Tools of I2000 V3

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 15


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 16


Alarm Management-Basic Concept
Basic concept
 Fault alarm
It is, reflected as an error, a physical or logical factor causing
failure of system running.
• Current fault alarm : It is the fault alarm not recovered or
confirmed. User should pay attention and handle this alarm.
• History fault alarm : It is the fault alarm recovered and
confirmed.
 Event alarm
It is notification without any impact on services. Some
event alarms are sent regularly and there are no
corresponding recovery operation.
HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 17
Scenario 1: How to monitor alarms of all
network devices
Choose: Alarms > Current Fault Alarms Contents and
Overall alarm
sequence of
monitoring (device
columns are
alarms, QoS alarms,
configurable.
process error alarms,
communication alarms,
Centered and environment
alarms)
monitoring of all
device alarms

Detailed alarm recovery


recommendations

If selected, alarms
are displayed in
real time.

Detailed
alarm
information

Note: Alarm contents and handling suggestions are defined on each NE.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 18


Scenario 2: How to focus on uncleared alarms
Choose: Alarms > Browse Current Fault Alarms By Status Browsing and operating alarms
based on alarm statuses

Unacknowledged and
uncleared alarms Unacknowledged
and cleared alarms

Acknowledged and
Acknowledged and cleared alarms
uncleared alarms

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 19


Scenario 3: How to automatically acknowledge
cleared alarms
Choose : Set to enable automatic
Alarms > Settings> Automatic Acknowledgement Rules acknowledgement

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 20


Scenarios 4: How to shield unimportant alarms
Choose: Alarms > Settings>Alarm Filter Rule
Set alarm shield rules to
shield alarms

You can shield


alarms of specified
names or NEs

Note: Shielded alarms are discarded, rather than stored in the database.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 21


Scenario 5: How to redefine the level of an alarm

Alarm processing policies vary with alarm levels. Users can adjust an alarm
level by redefining the level to meet the requirements for operation and
maintenance, and alarm processing.

Choose: Alarms > Settings > Alarm Redefine

Original alarm Redefined


levels alarm levels

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 22


Scenario 6: How can I be notified of alarms when I
am away
Choose: Alarms > Settings > Remote NotificationMaintenance engineers can learn
Step1:Configuring the alarm situation of the entire
notification network in real time.
conditions

Step2:Configurin
g the notification
time

Step3:Configurin
g the notification
Reference documents: mode
1. Commissioning Guide
2. Knowledge Base > Service and Software > Service and
Software Public > I2000 > Technical Application Reference >
Commissioning of the Alarm-To-SM Function of the I2000

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 23


Scenario 7: How to record and query alarm handling
experience
Maintenance
Choose: Alarms > Settings > Explain and Experience Experience Share

With the alarm knowledge


library and explanation
library, maintenance
engineers can accumulate
the experience in clearing
alarms, and share the
experience with others.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 24


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 25


Performance Management
 I2000 performance management provides performance
statistics data and display it in the following modes:
• Data browsing
• Data monitoring
• Performance reports

 I2000 principle on collecting performance data:


• MML interface: NE device makes a statistics and packets data to I2000 actively in
periodical time.
• SNMP interface: I2000 periodically queries corresponding statistics data from NE
side.
• NEs accessed through UOA: NE collects performance statistics and reports the data
to the UOA. The UOA periodically sends the data to the I2000 server through FTP.
• I2000 principle on collecting RBI data (applied only to IN):
RBI data is periodically reported to /usr/omc/data of the I2000 through FTP and the
I2000 imports the data to the I2000 database at 12:00 every day.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 26


Scenario 1: How to view results of a statistics task

The DH04SPC006 version allows you to directly view and export results of a statistics
task on the user interface of the I2000 client.

Display of statistics results

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 27


Entry 1: Choose Statistics Tasks, right-click a task, and choose

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 28


Entry 2: Choose Performance > Browse Data. Select an NE and choose
Query

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 29


Scenario 2: How to monitor the variation of key performance
indexes in real time during service peak hours
Performance monitoring
Choose: Performance > Performance Monitoring

Step1: Create a Step2: View monitoring


monitoring task of up to results displayed in
256 indexes histograms and line
charts

Double-click
histograms or line
charts to view data
tables

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 30


Scenario 3: How to know abnormal performance
indexes at the earliest time
You can set alarm conditions for each performance index. When the alarm conditions of
an index are met, the I2000 generates an alarm to notify you of the abnormal index.
Step 1: Set alarm conditions for an index by choosing Performance > Performance Alarms

Set alarm details

Set the measurement object

Select Set alarm generation and recover


NEs conditions (new function)

Set the valid time


segment

Click to add

Set the reason


and suggestion

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 31


Step 2: Create a statistics task for the index by choosing Performance > Statistics Tasks

Sele
ct Set statistics
NEs parameters

Click to
create

Note:
1. If the statistics task already exists, skip this step.
2. If the statistics task does not exist, it can be automatically created in the Dho4 version and
later. This step is required in the DH04 version and earlier.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 32


Step 3: View alarm information by choosing Alarms > Current Fault Alarms

When the alarms conditions are met, the alarm is displayed.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 33


Scenario 4: How to analyze the variation of a
performance index in a time period
Report system

• The report system is an optional value-added peripheral


component of the I2000.
• Not all types of NEs provide report template, for example, SNMP
NEs.
• The report system is installed with the I2000 server on the same
host.

To use the report system:


• Step 1: Create a statistics task.
• Step 2: Generate real-time or periodical reports.
For details, see the commissioning guide.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 34


Scenario 5: What statistics task needs to be created to
commission a report template
View the statistics task matching each report template by selecting a
report template and clicking

Note: This method applies to Dh04SPC006 and later. In the earlier versions, install the webtools.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 35


Scenario 6: How to diagnose the problem that a report
has no data or incomplete data
In DH04SPC006, the report system provides the data
diagnosis function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 36


Click Data Diagnosis, use the following functions:
 View diagnosis results to known the causes and solutions

Diagnosis results

Possible causes

Solution

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 37


 View statistics task information
Statistics tasks for
this report

Information about the created statistics task

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 38


 View the data sources of each report field and the table structure

Click to view the table


structure

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 39


Scenario 7: How to make sure the completeness of
reported performance data

Requirement 1 : The performance data’s real time and completeness is very


important. If the data is incomplete, we can know it immediately and use the
manual supplement function or other method to complete the data.
. Scheme : When system detect the incompleteness, it can auto supply the lost
data firstly. Then if the data is still incomplete, alarm will appear to notify the user
using the manual supplement function or other method to complete the data.

Step1 : Modify the configuration file in the I2000 server. ( If I2000


version is V300R001C02B280 or higher version, you can pass
this step. )
Modify the following parameter of this file :
$I2000_ROOT/etc/conf/PerfPara_svc_ex.xml
<param name=“DataMissAlarmRepeat”>0</param> -- Change “0” to “1”

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 40


Step2 : To set supplement policies, choose: Performance > Data
Integrity > Set Policy

This is the default policy after the


system is installed. That is system will
detect the completeness of all the
task’s performance data 72 hours
before 3:00 at 3:15 every
day(period:24h) 。

If the performance data of


If you need to realize the following function you some tasks need to be
must choose both: when system detect the real time and complete,
incompleteness, it can auto supply the lost data you can add the policy for
firstly. Then if the data is still incomplete, alarm these tasks.
will appear
The setting in the picture
means the system will detect
the completeness of all the
task’s performance data 1
hour before 11:00(that is
10~11:00) from 11:47. Later
do the same thing per hour.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 41


You can verify the
When you get the alarm of “Performance correction of the
data is incomplete”, you can right click to alarm in the data
choose “Lost information” and you can brower page: no
see the data incompleteness duration and
data from 10:00 to
collection percentage in the collect
scope. 11:00

Manual
supplement

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 42


Requirement 2: The performance data need to be complete. But need not to be real
time complete.
Scheme: When system detect the incompleteness, it can auto supply the lost data.
Then you need to check the completeness manually at regular intervals. If you find
the data lost you can use the manual supplement function or other method to
complete the data.

Step1 : To set supplement policies, choose: Performance > Data Integrity


> Set Policy. The method is the same as the step2 of requirement 1. The
only difference is no need to choose “Send alarm when data lost”.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 43


Step2 : To query data completeness, choose: Performance > Data
Integrity > Recollect Data
2: Select a
time period

4: View results

5: Manual
1: Select supplement
an NE

3: Query

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 44


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 45


Topology Management Basics
The I2000 provides three topology views:
1. Service view (called physical view in Dh version and earlier)
 This view displays the network structure by function entity.
 The I2000 supports most of A&S products.
 To create a service NE, see the matching NE guide.

2. Physical view (called machine view in Dh version and earlier)


 This view displays the network structure by hardware device.
 The I2000 supports devices in the list of A&S purchased devices.
 To create a purchased device NE, see the iMonitor documents.

3. Customized view (called logical view in Dh version and earlier)


 This view can be customized as required by creating logical subnets
and adding NEs to logical subnets.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 46


Scenario 1: Suppose the I2000 accesses multiple service
systems including IN, RBT, and customer service. How can I
manage only IN NEs Create a physical subnet or
customized view
Method 1:
Step 1: Right-click a blank area of the service view, choose New > Create Physical Subnet. In
the Objects Selection window, select NEs that you want to manage, set their information,
and finish creating the subnet.
Step 2: Right-click the created subnet and select Setup to Startup Subnet or Setup to My
Topology.
Then, after you re-log in to the I2000 client, only the NEs in the created subnet are displayed in
the service view.
Method 2:
Choose Topology > New > Custom View. Add NEs that you want to manage to the
customized view.
Then, the customized view is displayed, consisting of the added NEs.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 47


Scenario 2: After finding that an NE reports an alarm in the I2000,
how can I directly log in to the NE through Telnet to rectify the
fault

After performing the following configuration in the I2000, you can


log in to an NE directly in the I2000 without login authentication.

Do as follows:
Step 1: Create an NE user.
Step 2: Bind the NE user to an I2000 user.
Step 3: Click the NE icon and select Telnet to check whether you can log in to the NE.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 48


Scenario 3: How to find an NE quickly in a
complicated topology structure

Press Ctrl+F for search by IP address or NE name.

Scenario 4: How to discard alarms of an NE that are


generated during the upgrade of the NE?

Right-click the NE and click Block. After the upgrade is complete,


right-click the NE and click Unblock. This is a new function of the
Dh version.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 49


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 50


Configuration Management Basics
This is the old configuration management
GUI, where the configuration data read
from NEs is displayed. You cannot deliver
configuration data to NEs (except SMS
debugging workstation). The displayed
configuration data is synchronized with
NE every 12 hours.

This is the new configuration management GUI, which is


applied to new products and solutions, such as OCS, NGIN,
convergent messaging, DLSC, IPTV. The iCnfg uses the
B/S architecture and can be deployed independently or
with the I2000. If the iCnfg is installed with the I2000, you
can choose this menu to start the iCnfg in the I2000. The
iCnfg can both read and write NE configuration data,
which is often used for NE deployment.

Note:
 Only Resource Manager and Resource Configuration in Equipment Configuration are
commonly used. Customers are recommended not to use Maintenance and Operation.
 This slide does not describe the iCnfg.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 51


Configuration Management---Resource
Management
For most of NE types, you can query and export their configuration information on the
following GUI

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 52


Configuration Management---Resource
Configuration
This GUI is used to record some office information that cannot be read
from NEs but are required for creating statistics reports and statistics
tasks.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 53


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 54


Function Collection of Safety Management
Users’ certification,
authorization, and use Log query, export,
of terminal printing, statistics
and log dump.
Access control
Log management

I2000 self safety management


User monitoring Safety alarm
Multiply attempts to configure password
System administrator monitors
operations of current users.
Password strategy Cannot access?

Password length, complication and encryption for saving

illegal login

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 55


Scenario 1: SOX has strict requirements for account
and password security
I2000 meets SOX requirements

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 56


Scenario 2: The carrier requires different department to have different rights to use the I2000

I2000 can control account by right and area


Step Operation Description
1 Set the IP addresses or network segment that Confirm the settings with the carrier.
can access the I2000.

2 Plan user group names, management area, Divide I2000 users into several groups by device or operation right.
and operation rights

3 Create I2000 user groups. Grouping users simplifies the management of users.

3.1Set the management area for each I2000 user Set the area that an I2000 user group can manage.
group.

3.2Set operation rights for each I2000 user group. The operation rights include the rights for operating the I2000 and NEs.

3.3Set the new device right for each I2000 user With the new device right, users can manage newly added devices.
group.

4 Create I2000 user accounts.


4.1Add users to I2000 user group. Add a user to a user group so that the user has the rights of the user group.

4.2Set the management area for each I2000 user A user can manage both the areas that are specified for the user and the areas that are
specified for the user group that the user belongs to.

4.3Set operation rights for each I2000 user. A user has both the operation rights assigned for the user and the operation rights
assigned for the user group that the user belongs to.

4.4Specify the IP address or network segment Perform this step to ensure the I2000 security.
from which an I2000 user can log in.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 57


Operation Guide
1. Log in to the I2000 client as the Administrator user.
2. Create the following user group:
• Name: XX operator group
• Management area: Part of NEs in the experiment environment
• Operation rights: rights to acknowledge fault alarms and browse statistics tasks.
3. Create the following user:
• Name: first letter of the name + work ID
• Set the login time segment.
• Set the allowed login IP address.
• Set that the user needs to change the password after initial login.
• Set the password reservation time to 60 days.
• Add the user to the user group created in the previous step.
4. Log out, and then log in again as the created user.
5. Check the user rights:
• You can view the NEs of the specified management areas in the service view and physical
view.
• You can only acknowledge alarms. Other operations are unavailable.
• You can only query statistics tasks. Other operations such as create and delete area
unavailable.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 58


Chapter 2 I2000 Functions

Section 1 Fault Management


Section 2 Performance Management
Section 3 Topology Management
Section 4 Configuration Management
Section 5 Safety Management
Section 6 Other Function

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 59


Common Functions
Self management:
 Managing I2000 services, disks, and databases
Choose System > System Monitoring
 Monitoring I2000 databases
Choose System > System Monitoring > Browse > Database Monitoring and right-
click a database
 Managing I2000 data
Choose Tools > Data Management
NE management:
 Managing access packages
Choose Tools > Access Package Management
Application: When the alarms or performance indexes of an NE are changed after
the NE is upgraded, you need to load the matching access package the NE in the
I2000 so that the I2000 supports the new alarms and performance indexes.
For details, see the I2000 Help.

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 60


Contents

Chapter 1 I2000 V3 NM Solutions

Chapter 2 Functions of I2000 V3 Foreground

Chapter 3 Maintenance Tools of I2000 V3

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 61


I2000 Operation and Maintenance Tool

Problems
 There is not dedicated or skillful I2000 maintenance engineers.
 Engineers are not familiar with I2000 commands.
 Engineers cannot solve some common I2000 problems on their own.
 Some I2000 offices are out of maintenance for a long time. System faults
are found a time long after they occur.

To solve the problems, we provide:


 I2000 Troubleshooting Guide
 Breeze MainAst
 Breeze iCheck (with I2000 inspection package)

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 62


1 I2000 Troubleshooting Guide
This document provides troubleshooting for the I2000.

Main contents:
Basic knowledge about I2000 modules
Troubleshooting
Case studies
Path:
Support website: Software Center > Version Software > Application and
Software > Service and Software Public > iManager I2000 > iManager
I2000 V300R001 >

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 63


2 Breeze MainAst
The Breeze MainAst is a graphic Windows-based tool for maintaining the I2000.

Functions:
Running basic I2000 server command
Collecting operating system information
Collecting logs
Performing common database operations
The Breeze MainAst will provide more and better functions.

Path:
iManager I2000 Troubleshooting Guide

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 64


GUI of the Breeze MainAst

Step 1: Add the


device and
import the device
package

Step2: Double-click
the execute and
view results

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 65


3 Breeze iCheck
The Breeze iCheck is an inspection framework used in A&S. The I2000 also provides
the I2000 inspection package based on the Breeze iCheck.

Step 2: Start
inspection

Step1: Add the


device and
import the
inspection
package

For details, see the I2000 Inspection Guide in the following path:
Support website: Knowledge Center > Application and Software >
Service and Software Public > I2000 > Technical Guides > Quality Check

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 66


Thank You

HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential Page 67