Академический Документы
Профессиональный Документы
Культура Документы
Student Guide
GENBAND
2801 Network Boulevard, Suite 300
Frisco, TX 75034
All rights reserved.
Disclaimer of GENBAND:
Material contained in this document is subject to change without notice. The material
herein is solely for information purposes and does not represent a commitment by
GENBAND or its representatives. GENBAND has prepared the information contained in
this document solely for use by its employees, agents and customers.
Copyright 2000-2013 GENBAND
All rights reserved. All copy, reproduction, derivatives (including, without limitation,
translation), modification, distribution, republication, transmission, re-transmission
and public display or showing of this document, whether in whole or part, is strictly
prohibited, without the prior written permission of an authorized GENBAND
representative. This document, and any software of GENBAND mentioned in this
document, whether delivered electronically or via other media, are the sole property
of GENBAND and are available only under and pursuant to license agreement.
GENBAND and the GENBAND corporate logo are registered trademarks of GENBAND
and its affiliates. All other brand and product names are trademarks or registered
trademarks of their respective holders.
Warning
For training purposes only. Always refer to the procedures described in the GENBAND
standard documentation that are appropriate for the system and software release
that you support. Failure to use the appropriate documentation can result in serious
technical difficulties and damage to your system. For additional information about
referenced documentation, visit www.genband.com or contact your local GENBAND
sales office or account representative.
GENBAND products and services are produced using a TL 9000 certified Quality
Management System.
CERT-0056636
Revision History
Issue
Date
01.00
December 2014
01.01
July 2015
Changes Incorporated
Initial Course Release
Rebranding
References
Document
Number
Document Name
630-00453-07
630-00454-01
630-00469-01
630-00479-01
630-01193-01
630-00524-01
630-00643-01
630-01234-01
630-00648-01
630-00664-01
630-00724-01
630-00857-01
630-01012-01
NN10205-511
NN10602-002
SEB 08-00-102
630-01036
630-01037
Courseware Contents
Lesson 1
Lesson 2
C3 and G9 Hardware
Lesson 3
C3 G9 Operations
Lesson 4
Lesson 5
Lesson 6
Lesson 7
Lesson 8
Call Flows
Lesson 9
10
11
12
13
14
Initially IPX was introduced for Mobile Network Operators (NMO) for 4G Long Term
Evolution (LTE) roaming on a global basis while still providing their customers the same
level of service.
IPX The Evolution
IPX has evolved beyond just mobile operators, any service provider or network operator
can connect to the IPX network, if it meets their requirements. Some examples of this
interoperability are:
Content Providers
Fixed Network Operators
Internet Service Providers
Application Providers
Enterprise Services
These are just some examples of the interoperability with IPX.
IPX The End to End Design
IPX is designed and engineered to connect anywhere in the world in 2 hops or less across a
private and secure IP network, with guaranteed end to end quality. This gives the IPX
providers end to end responsibility and end to end control of the network.
A Peering connection is setup between the IPX Providers.
15
16
17
The GENBAND SBC serves as the Session Border Controller, SIP Proxy Server and the IPX
Proxy Server for the GENBAND IPX Solution. The Real-time Session Manager (RSM) acts as
the management element for the SBCs. The SBCs will serve as the endpoints for the
Service Level Agreements (SLA).
The Border Gateway function is served by the GENBAND G9 Media Gateway and is
controller by the GENBAND C3 Media Gateway Controller. The C3 and G9 are managed by
the Genview EMS, which is a software application that runs on a pair of C3 servers.
The Core Routing Engine (CRE) is used to provide an authoritative DNS service and to
support IP to IP calls.
18
Shown in the diagram is a simple call set up illustrating where all the elements are used.
19
Shown in the diagram is a simple call set up illustrating where all the elements are used.
20
21
22
Security
Malicious attacks such as Denial-of-Service (DoS)
Topology Hiding
Connectivity
NAT Traversal
SIP Message and Header Manipulation
IPv4 to IPv6 Interworking
Regulatory
Emergency Call s prioritization
Lawful Interception
Media Services
DTMF Relay and Interworking
Media Transcoding
23
The Session Border Controller (SBC) is deployed in Voice over Internet Protocol (VoIP)
networks to exert control over the signaling and media streams involved in setting up,
conducting, and tearing down telephone calls or other interactive media communications
which typically uses the following call-signaling protocols:
Session Initiation Protocol (SIP)
H.323
Media Gateway Control Protocol (MGCP)
The SBC delivers secure carrier class. With extensive security, policy enforcement, and
session management capabilities, the SBC brings service providers advanced levels of
functionality, flexibility, and performance at IP network borders.
The SBC 2U Server scales up to 64,000 concurrent sessions.
Security
The SBC protects service provider and enterprise networks by providing multi-layer
security against a wide variety of Internet threats meant to disrupt or disable IP networks
including flood attacks, DoS / DDoS attacks, and SIP signaling attacks. Capabilities include
intelligent access and admission control, private-to-public IP network address and port
address translation NAT & NAPT (Network Address Translation & Network Address Port
Translation).
24
Based on RFC 3261, A proxy server is an intermediary entity that acts as both a server and
a client for the purpose of making requests on behalf of other clients.
A proxy server primarily plays the role of routing, which means its job is to ensure that a
request is sent to another entity closer to the targeted user. Proxies are also useful for
enforcing policy (for example, making sure a user is allowed to make a call).
A proxy interprets, and, if necessary, rewrites specific parts of a request message before
forwarding it.
25
Session Management
The SBC provides Session Management services like:
Redirects - Points the endpoint to the right location for delivery of services
Billing - Generates Call Detail Records for all sessions managed by the SBC
Registrar - Keeping record of location and authorization of endpoints requesting
service from the SBC
Lawful Intercept - When required by law, enable the delivery of signaling and media
traffic of session to the law enforcement agencies that so require
Advanced Routing
Routing based on Quality of Service
Routing based on cost
Routing based on policies
26
Network Interworking
Signaling Interworking - Fill in for differences in Signaling protocols on both sides /
endpoints
Protocol Interworking - Need to enable connectivity between elements speaking
different protocols (e.g. SIP vs. H323)
Media Interworking / Transcoding - When there is a different codec being used on
every leg of the call, or DTMF translation is needed
Header Manipulation - Match or adapt differences in session handling between the
networks involved
Service-Level Agreement (SLA)
A Service-Level Agreement (SLA) is a contract between a network service provider and a
customer that specifies, usually in measurable terms, what services the network service
provider will furnish. Items to consider:
Call Admission Control - Protecting and optimizing the network by controlling the
volume of traffic
Bandwidth Management - Administering system resources for availability
Quality of Service (QoS) Metrics - Keeping track of Network performance
Real-time Traffic Monitoring - Based on capabilities above mentioned, how is the
service performing at any particular time
27
28
29
30
The hardware supported for the SBC 2U SBC and the RSM is based on an Intel Infrastructure.
The Intel Server Chassis provides a flexible and serviceable 2U rack-optimized chassis for
performance intensive and storage-demanding solutions.
31
1:1 high available redundant system with state full call migration of signaling and
media with no loss of service
Up to 625 Call Attempts Per Second (CPS)
Up to 160,000 simultaneous SIP Signaling sessions
Up to 18,000 simultaneous media sessions (G.711)
Up to 28,000 simultaneous media sessions (G.729)
Up to 200,000 SIP registered endpoints
Up to 2M routes and calling plans
32
The SBC 2U Server has Gigabit RJ-45 ports on the rear of the server for connectivity to the
network.
One additional full-height PCI-X card with four ports is added for Media. The ports are
designated hk0,0; hk0,1; hk0,2; and hk0,3.
Port allocation is as follows:
Eth0 - Management - used for all non-signaling traffic (CDR Streaming, Administration,
Radius Packets, RSM Integration)
Eth1 - Control Interface - Connected Directly to the redundant peer (heartbeat)
Eth2 - Primary Signaling - Generally Public Facing - dummy IP from 127.0.0.0/8
network
Eth3 - Primary Signaling - Generally Private Facing - dummy IP from 127.0.0.0/8
network
Eth4 - Secondary Signaling or backup Control (bonded)
Eth5 - Secondary Signaling or can be used for Transcoding
Hk0,0 and Hk0,1 - used for Media
Hk0,2 - Future Use - will be available for Lawful Intercept / CALEA
Hk0,3 Spare
33
34
Q20 uses purpose-built hardware (ie. Cavium NP3 card) for media processing, whereas
Q21 leverages new Intel DPDK (Data Plane Development Kit) technology and Intel multicore processors to allow media processing to be done all in software.
Q21 can provide high scale integrated media density. Q21 can support 70,000
simultaneous pass-through media sessions when fiber-based media interfaces are used.
The Q21 uses SFP+ interfaces for the media traffic. That means it will auto negotiate to
1Gbps or 10Gbps.
The database in the Q20 can be transferred to a Q21.
Q21 will support onboard transcoding using the same DSP board that is used in the Q20.
Supported codecs are the same as available in SBC release 8.3.
An existing RSM that manages a Q20 can also be used to manage a Q21. However, that
RSM must be at release 8.4 or higher to manage a Q21 on release 8.4. Phase 1 of the Q21
will not support SRTP, LI (Lawful Intercept) and certain other customer specific features.
Phase 2 delivery of the Q21 is expected to have the same feature set as the Q20.
35
36
37
38
39
RSM Freedom
New with release 8.0.2, you can now deploy the GENView RSM software on alternative
server hardware. This type of deployment only supports GENView RSM in a simplex
(standalone) configuration . The following table identifies the minimum and
recommended hardware specifications for a Freedom GENVIEW RSM:
40
The SBC 2U has two Gigabit RJ-45 ports mounted on the server board which are accessible on the
chassis back panel and are labeled eth0 and eth1. Two low-profile PCI Express cards, each with two
Ethernet ports are installed to accommodate interfaces eth2 and eth3 (Slot 1) and interfaces eth4
and eth5 (Slot 2). One additional full-height PCI-X card with four ports is added for Media in PCI-X
Slot 3. The ports are designated hk0,0; hk0,1; hk0,2; and hk0,3.
Eth0 - Management - used for all non-signaling traffic (CDR Streaming, Administration, Radius
Packets, RSM Integration)
Eth1 - Control Interface - Connected Directly to the redundant peer (heartbeat)
Eth2 - Primary Signaling - Generally Public Facing - dummy IP from 127.0.0.0/8 network
Eth3 - Primary Signaling - Generally Private Facing - dummy IP from 127.0.0.0/8 network
Eth4 - Secondary Signaling or backup Control (bonded)
Eth5 - Secondary Signaling or can be used for Transcoding
Hk0,0 and Hk0,1 - used for Media
Hk0,2 - Future Use - will be available for Lawful Intercept / CALEA
Hk0,3 - Future Use
Note: You can configure control links by connecting two systems with two cables connected to
Eth1 and Eth4 and bonding the interfaces together. The single bond0 interface can then be
assigned to an IP Address. If needed, Eth4 and Eth5 can be used for Signaling.
41
42
NSF-NP3
The NSF-NP3 is a 4-port GbE device and supports Copper and Fiber Interfaces and can use
Small Form-factor Pluggable (SFP) transceivers. The NSF-NP3 provides DSP centric
applications such as soft DSP Emulation on the Core and DTMF Detection and Generation.
Note:
The current GA release supports three interfaces (port hk0,0, port hk0,1 and port hk0,2)
with a total of 3 Gbps throughput for media processing. The other interface (port hk0,3) is
for future use.
43
44
45
Hardware Query
To determine which base chassis you are using, run the following linux command:
hwinfo --bios |grep Product
The results will provide information on the actual product which can help you see what
chassis you have in your network.
Possible Results for linux hwinfo command
Product ID
46
Machine Type
SE7520JR22
S5000PA
Annapolis
FWA-3210
S2600CO
The linux command, lspci - n |grep 177d can also help you determine which Media Card
you have installed on your SBC. If the output contains ASCII string:
Output
Meaning
177d:0005
48
49
The C3 provides multi call processing functionality such as the Signaling Gateway, Media
Gateway Controller and Application Gateway.
A typical deployment with the GENBAND G9 Converged Gateway provides a physical
interface into the PSTN. The G9 is controlled by the C3, which provides the controller
function of the G9 trunk inventory and call processing.
A GENBAND system (C3/G9 deployment) uses two proprietary call processing protocols:
Extensible Call Control Protocol (ECCP) for signaling event communication. ECCP uses
a proprietary message flow and content based on Q.931.
50
51
G9 Converged Gateway
The G9 Converged Gateway can be deployed as a Media Gateway using the GENBAND C3
Media Gateway Controller using GENBAND proprietary Extensible Gateway Control
Protocol (EGCP) and Extensible Call Control Protocol (ECCP) or another type of Media
Gateway Controller (MGC) Call Control using the industry standard H.248 (Megaco)
protocol
The G9 provides simultaneous, any-to-any switching for enhanced flexibility and costeffectiveness, including protocol, interface, security, signaling, and media processing
support in all wireless and wireline, access and core, and IP and TDM environments,
maximizing investment protection as networks migrate.
A powerful IP gateway, the G9 supports Class 4/IP Tandem/IP Trunking and Class
5/subscriber solutions, as well as global applications such as wholesale interconnect. In
converged wireless/wireline networks, the G9 provides advanced solutions for Fixed
Mobile Convergence/femtocells and IP-to-IP multimedia transcoding.
Separate IP and TDM fabrics provide high quality native switching and interworking for IP
to IP and TDM-to-IP applications. The G9s massively scalable backplane and flexible 28slot chassis also provides an efficient card design that allows operators to easily scale TDM
and IP session capacity as well as incremental functions and services.
As a carrier class gateway, the G9 provides multiple levels of redundancy and load-sharing
on critical system components, cards, and network interfaces, in addition to in-service
software upgrades
52
1. One of the advantages to IPX is to provide support for interconnecting beyond IPX,
including multiple other IP and legacy technologies.
a) True
b) False
b) False
53
54
55
56
57
58
59
60
Transcoding is the direct digitaltodigital data conversion of one encoding to another, such as for
AMRWB audio stream with a G.711 audio stream.
In order to make communications possible in the presence of incompatibilities, user agents need
to introduce intermediaries that provide transcoding services to a audio session.
The G9 (MRFP) will transcode (translate) the incompatible codecs between the two endpoint
61
users to create an RTP IP Media audio stream.
Transcoding Overview
The Transcoding logic is integrated with the S-CSCF. The Transcoding of media (RTP) is done by
the Media Resource Function (MRF). In this implementation, the MRF is split into separate
Control and Transport plane components:
MRFC: The GENBAND C3 product is deployed as the Media Resource Function Controller
(MRFC) and acts as the control plane for MRF. The MRFC is responsible to control the MRFP
media resources. The MRFC is deployed in the IMS core sites, in the same location as the SCSCF.
MRFP: The GENBAND G9 product is deployed as the Media Resource Function Processor
(MRFP) and acts as the transport plane for the MRF. The MRFP holds the DSP resources and
performs the media Transcoding.
Separation of the media processing and control functions enables Verizon Wireless to reduce the
amount of signaling traffic and processing delay between the IMS Core and MRFC by co-locating
the C3 MRFC close to the Core, while preserving RTP bandwidth by placing MRFPs close to the
location of the user elements. Additionally this separation of media processing from the control
function allows independent and more flexible scaling when the volume of traffic requires it.
The S-CSCF introduces the MRF into the media path when it determines that the two
communicating endpoints do not support a common codec. The S-CSCF utilizes Mr interface
based on RFC 4117 to interface to the MRFC.
62
63
64
65
66
Each frame also includes an audible alarm that sounds a distinctive tone for each level of alarm.
The audible alarm may be acknowledged and manually silenced at the frame.
Minor audible alarms are self-retiring.
67
69
70
71
72
73
C3 Clustering
The C3 can be configured as a computing complex composed of up to 16 pairs of computing
nodes.
Most of the MGC software applications running on the C3 operate as active/standby pairs or
pooled resources.
Cluster capacity is grown by:
Adding C3 node pairs
Spreading protocol stacks and other applications across more node pairs
Adding additional instances of processing applications
Ensuring sufficient working memory is allocated to key applications
C3 cluster expansion is always implemented with C3 node pairs. Because the Call Manager is a
loadshared application, it is typically deployed on all C3 nodes in the cluster.
74
75
76
RAM: 64G
Disk: 2 x Seagate Savvio 900GB 2.5 10K SAS HDD
Ethernet: 4 x 1GigE RJ-45 On-board + 4 x 1GigE RJ-45 NIC
Power Supply:DC Power Supply Unit (GBRY41JA) or AC Power Supply Unit (GBRY41JD)
77
78
Item
Description
Power button
C
C
D
D
EE
FF
Item
G
H
I
J
K
L
Description
Minor alarm (amber)
Power alarm (amber)
HDD activity LED
NIC activity LED
Chassis ID button
NMI button
79
Item
Item
Description
AA
Serial Port
DC Power Supply
BB
DC Power Supply
Expansion Slots
D
D
JJ
EE
Ethernet 4, 5, 6, 7 (top to
bottom)
FF
Ground Point)
LL
CC
80
Description
USB ports
C3 / G9 Connectivity diagram
81
82
http://docs.sun.com/
Note: this link now takes you to the Oracle documentation site where the documents are found.
83
Alarm Level LED - shows highest alarm present on the G9 (minor, major, critical)
Solid Amber Minor
Solid Red Major
Blinking Red Critical
85
G9 Top-Rear Panel
Each G9 node in the frame will have an alarm connect to the Frame Alarm Indication Panel
(FAIP). This connection runs from the G9 Alarm Card Output.
Contains alarm card outputs.
Requires a DB-9 connector.
Connects to appropriate Alarm Connector on FAIP.
86
87
G9 Power Filters
There are two generations of G9 Chassis the latest being the G9e (the power filters of which are
shown in the top diagram)
In both cases the -48v input filters are located on the upper-rear of the G9 Gateway chassis and
help to eliminate noise when power inputs are not received clean.
The power feed and return cables on the back side of the filters have three (3) parallel power
connectors that connect to the top of the mid-plane.
88
Control Cards
SST Card (Switch, Service and Timing) - Provides Switching (DS0 Matrix), Service circuits (DTMF
receivers, Tone detectors, etc.) and Timing (clock distribution).
PAC Card (Packet and Control) - Contains 2 GbE switches used to switch Control plane and Bearer
plane traffic independently.
SI Card (Shelf Interface) - T1/E1 test access, BITS clock interface, PAC console interface, PAC
control interface
Server Cards
VS/ES/SG - Server Cards - Voice Server, Echo Server and/or Signaling Gateway
Network Interface Cards (NIC)
TDM Cards - T1/E1, DS3, OC-3/STM-1
Packet Interface Cards - GEI (Gigabit Ethernet) and AI (ATM Interface)
89
G9 Mid-plane
The G9 is a single-shelf design with a mid-plane chassis architecture. All cards in the G9 plug into
the Ethernet-based mid-plane. The mid-planes primary functions are to provide redundant
point-to-point connectivity, power, and physical grounds for all card slots.
The chassis mid-plane is designed and manufactured to be extremely reliable and provides two
GbE bearer paths and a GbE control path from each PAC slot (slot 7 and 8) to every other slot in
the chassis.
The chassis mid-plane also provides a point-to-point, unidirectional serial TDM DS0 highway
from each SST slot (slot 21 and 22) to and from every other slot.
The TDM connections provide up to 8000 timeslots and are allocated in 1K increments when
a slot is provisioned for a specific card type.
This allows the available TDM DS0 matrix capacity to be allocated to each slot on an asneeded basis, reducing wasted capacity due to over-allocation of TDM matrix capacity to
slots that dont require it.
The G9 mid-plane:
Supports 28 card slots, 14 front and 14 rear slots
________________________________
3. How many slots are there in a G9 Gateway chassis?________ rear and ________front.
4. How many fan trays are on the G9e chassis? How are they numbered and where are they
located?
a. Number of fan trays ______________
b. Fan numbers
a. ______________; location______________________________
b. ______________; location______________________________
c. ______________; location______________________________
d. ______________; location______________________________
5. Alarms can be silenced from the front alarm panel on the G9?
a. True ____________________
b. False ___________________
6. There is a one-to-one direct connection on the mid-plane, between front and rear cards on
the G9 chassis.
a. True ____________________
b. False ___________________
91
92
93
Green - Link.
Cards utilizing TDM services PAC coordinates path monitoring on each TDM highway between the card
and associated functions on the SST card.
Cards utilizing the mid-plane GbE bearer plane the PAC verifies the function of the cards GbE bearer
capabilities using the PAC- resident GbE switching resources.
Offline Test Support - The PAC and the G9 Gateway support he capability for the craft to take a PAC
card offline and perform a comprehensive card test.
95
96
4. The PAC card has two on-board __________________ whose general functions are:
a. ___________________________________________________________
b. ___________________________________________________________
5. Serial port interface communication to the PAC card is achieved through the
_______________card.
6. The PAC cards have dual connections to both SI cards.
a. True
b. false
97
98
99
Server Cards
Server cards on the G9 Gateway Chassis can be installed in slots 1-6 and 9-14.
There are three (3) server card types:
Voice Server Card - VS-8B or VS-9
Echo Server Card - ES
Signaling Gateway Card - SG
100
102
The maximum number of active Echo Server cards that are supported by a G9 Gateway with
the 64K SST card is four (4), therefore, four active cards support 4 x 4,026 = 16,104 calls
The maximum number of active Echo Server cards that are supported by a G9 Gateway with
the 104K SST card is five (5), therefore, five active cards support 5 x 4,026 = 20,130 calls
The Echo Server card provides Hybrid Echo Cancellation (HEC) and Transcoder Free Operation
(TFO) In-Path Equipment (IPE) functions. HEC and IPE functions are directional. The ES card
provides them in the appropriate direction for each call leg.
ES Card Protection
The ES card operates in 1:N active/standby redundancy protection, where N can be a maximum
of 4 or 5 as described above, for a potential maximum of six (six) card per G9. When a card fails
the standby card becomes active and takes over the calls from the failed card.
103
104
Relaying of SS7 signaling and Q.931 signaling to MGC(s) over an IP network (SG functionality)
SG Card Protection
The SG cards operate with load-sharing protection (N+1 where N = 1-6), with up to seven cards
and a minimum of two cards.
Up to seven (maximum) Signaling Gateway cards can be installed in slots 1-6 and 9- 14.
105
106
107
Communications IP network:
GEI card IP Links
M3UA/SCTP (MTP3 User Adaptation layer 3 peer protocol)/(SIGTRAN transport)
IUA/SCTP (ISDN User Adaptation layer 3 peer protocol)/ (SIGTRAN transport)
108
109
110
T1/E1 Protection
The T1/E1 card utilizes 1:N unidirectional protection scheme, where N is from 1 to 11. In this 1:N
protection scheme there is one (1) protection card for (N) working cards.
When there is a failure on a working card, traffic is switched to the protection circuit. Since
multiple working cards share the same protection card, a single failure among the set of (N)
working cards causes the one protection card to be used and the other working cards are no
longer protected. When the failed card is replaced, protection once again, is available.
T1/E1 protection supports revertive switching mode with a configurable Restore Time.
111
Redundant Card
Fault LED is Off
Status LED is Blinking Green (300 ms ON and 3 seconds OFF)
112
113
T1 / E1 Interface Cable
114
At this point, traffic is routed through the bypass cables to the redundant card and not through
the midplane.
115
116
The second (bottom) connector on each DS3 Super Slot card carries redundant traffic to the
mid-plane to be forwarded to the redundant card (during failed card scenarios).
DS3 cables connect from the digital connectors to the customers digital cross-connect by way of
a GENBAND provided BNC patch panel (see DS3 interface cables graphic on the next page).
117
DS3 Protection
The 1:1 protection scheme is provided using a Y-cable that interconnects up to three DS3
facilities on each of two DS3 Super slot cards. Up to six 1:1 protection groups can be configured.
Protection switching can be configured as revertive or nonrevertive. There is a provisionable
Restore Time.
The 1:N protection is provided by two DS3 redundancy busses in the midplane. Bus 1 - slots 1520 with slot 15 housing the protection card Bus 2 - slots 23-28 with slot 23 housing the
protection card
Protection is revertive only in a 1:N protection scheme with a provisionable Restore Time
period.
Two SCSI connectors on each Super slot card Primary connector carries the three DS3 circuits
supported by that card. The second connector carries redundant traffic to the mid-plane to be
forwarded to the redundant card.
118
119
120
122
123
The on-board CPU on the card performs forwarding table management and local OAM&P
functions
While two network processors (NPUs) on the card serve as forwarding engines, supporting a persession firewall for VoIP calls.
The GEI-2e includes two GbE layer 2 switches, one for switching bearer plane packets and the
other for switching control plane packets
GEI-2e Card protection
The GEI-2e card supports load-sharing redundancy as all GEI cards can carry traffic, up to 3
remaining GEI cards to carry all traffic when one GEI card fails. The GEI card also supports 1:1
active/standby redundancy.
When used as load-sharing redundancy, the GEI cards can be inserted in slots 19, 20, 23 and
24. Currently up to 4 GEI cards per shelf, with up to 6 Gbps worth of working traffic per G9
shelf survivable from any single GEI card failure.
When used with pairs of 1:1 active/standby redundancy, the slots 19/24 and 20/23 are
paired. Currently up to 2 pairs of GEI cards per shelf, with up to 4 Gbps worth of working
traffic per G9 shelf survivable from any single GEI card failure or any single GbE link failure.
124
125
126
127
128
129
130
131
132
133
NOTE: The client ensures that its software version matches the version of server's software;
if the client is out-of-date, it can pull a new client executable from the server and restart
itself immediately.
135
The GUI client connects to the C3s IP address, allowing access to the active OA&M
processor.
An operator may run multiple copies of the GUI client on a single workstation to manage
multiple systems.
The GUI allow access to all elements of OA&M (FCAPS) for both TDM and packet telephony
capabilities of the switch (the C3).
To Specify Switch:
To add a new switch to the list click the Update List... button to add or modify list of
available switches.
Select a switch (a C3 G9 EMS server) using the drop down menu.
Click the Try.. button.
Logging In
After specifying the switch you a dialogue box requests login information to log into that
switch.
An operator may run multiple copies of the GUI client on a single workstation to manage
multiple systems.
Each login is part of the 100 logins available for simultaneous clients.
136
138
Equipment Status
Hardware and software in the G9 is hierarchical, meaning there may be slots, channels, facilities, ports, etc..
dependent on the status of the entity above them.
When selecting a particular component or node the General tab is opened by default. For most components
this will give an overview of the operational status (Unlocked / Locked or Enabled / disabled)
Administrative State - determines if traffic can pass or not
Locked - Administrator disabled (drops all calls and puts circuit(s) OOS)
Unlocked - Puts circuit(s) back into service and able to carry traffic
Operating State - hardware status; can carry traffic provided it has been unlocked.
Channel Status
139
Browser
The Browser (Query) function provides the following:
Query capabilities based on resource attributes and values
Initiated from the navigation tree on various leaf nodes
Used when number of resources to be accessed is potentially very large (i.e. subscribers,
circuits, translations, etc..)
Table display of the query results with overall and individual row views.
140
Configuration Management
The Configuration Manager offers a Java-based graphics that has an intuitive and easy to use interface
that allows complete provisioning for all system and subsystems parameters.
NOTE: Metadata and XML rules-based behavior provides context-sensitive display, operation and
data entry.
Fields are specific to the area in which you have chosen.
System notifications inform user of underlying resource changes.
Function Keys
The GenView EMS architecture is designed with a multitude of Functional keys to assist the user in
various operations.
The function keys will vary based upon which folder, which level as well as what options are valid.
The user will be presented different keys for each of the various levels within display, creation,
deletion and modification operations.
Add Key
The Add key allows the user to add a new entry of the current selected type.
Each Tab may require the user to enter information into text fields (as shown above) or make
selections from drop down lists.
Users can switch between tabs as needed as sequential progression through the tabs is not required.
Add Function
GenView EMS also supports the ability for the user to implement commands by selecting an item in
the navigational tree then depressing the right mouse button.
The supported commands will vary based upon a number of criteria such as command, mode,
141
operation, provisioning type, as well as support for a given protocol that is being managed.
Datafill Types
The following convention is used to indicate the type of input expected for provisioning
procedures:
Input - field requires a value to be typed in using the keyboard (these fields have a white
background on the screen).
Pull-down list - system provides a list of valid values that can be selected by clicking on
the down-arrow.
Checkbox - used for choices with only two possible values (e.g. on/off);
There are 4 datafill types for data entry:
Non-modifiable - data set at creation time and is not modifiable.
Dependent Modifiable - modifiable however, cannot be modified in an Administrative
State of In-Service.
Selectable - data selectable either by system supported options or prerequisite datafill.
Modifiable - data input pertaining to system values or operations.
142
Discard Changes
GenView EMS will inform the user, via a pop-up, if the user selects a new object in the
navigation item or selects cancel when changes have been made and have not been commit
to the active database.
143
Delete Key
The Delete key allows the user to delete an entry of the current selected type in the
navigational tree.
Delete Function
The user can initiate a delete operation of the item selected in the navigation tree by
depressing the right mouse button and then selecting the delete
144
Print Key
The Print key allows the user to print the details of the current selected item or save the
print as an HTML file.
145
146
147
148
1. The GenView EMS supports _________ simultaneous clients of which ________ can logon from a single workstation.
2. Utilizing the Tools dropdown menu on the GenView EMS Main Screen, the
______________________________________ selection allows the user to initiate an
update request to all sub-systems for posted alarm messages?
3. All G9s must be configured on the GENView Client so that it will appear in the pull
down menu to select switch.
a) True
b) False
4. When selecting a particular component or node the General tab will give an overview
of the operational status.
a) True
b) False
149
150
151
152
G9 Diagnostics
The G9 provides a number of on board diagnostic and testing capabilities to ensure the
system operates at the highest-level availability. There are 3 categories of diagnostic
capabilities that perform a particular role in the operation and maintenance of the G9:
Power on Self Test (POST) - Can be done manually and is also performed each time a card
is powered up or inserted. It determines the operational readiness of that card and does
not affect the overall operation of the system.
Online Exerciser Routines - This category of diagnostics are designed to continually
validate the integrity of the system and its components. The diagnostics are not intrusive
to the operation of the G9. These tests ensure that all memory, busses, disks and other
system resources are functional and ready for use if application software require it.
Online Diagnostics - Online diagnostics cover in-service and out-of service components.
Diagnostics on in-service components do not affect the overall operation of the
component. Out-of-service diagnostics can be run on live systems, but the tested
component is off-line (locked).
153
154
155
G9 Admin State
An entity larger than a DS1 bandwidth cannot be locked by the user if there are active
channels in use. The user will show the Locked command greyed out.
You must initiate the Shutting Down action. This will initiate action to lock channels as
they become inactive.
157
G9 Node Properties
The Node Properties tab provides various Node specific information. Not all entities are
provisional data fields.
SST Span Type - Specifies the span type on the SST cards in this Node
PCM Encoding - Either MuLaw (T1) or ALaw (E1)
Echo Cancellation - Specifies if fax/modem tone detection is to be reported for calls on
this Node.
Diagnostics - Enable/Disable Highway Monitoring on VS card and Audit/Validation of the
Standby PAC card.
DSP Configuration - Mode to be used by the MG - Normal or R2 (used in Indonesia and
Brazil).
158
G9 Clock
The Primary and Secondary reference source can be set to either;
EXT-1 (Primary)/EXT-2 (Secondary) - This reference source is derived from a BITS clock
(network synchronization timing source (GPS) - could be a Stratum 1 clocking source.
If you select EXT-1 and EXT-2 you must indicate either Twist or Coax as the termination mode
(See Figure below).
159
G9 Clock Switchover
The settings on this screen are for used for maintenance and/or service of the SST card. If the
user needs to switch the clock reference, the Timing Reference Switch - Active SST Card or
Standby SST Card command is initiated.
160
161
162
163
G9 Nodes Thresholds
The Threshold tab provides threshold settings to turn on and off SNMP traps for alarm and
event reporting. The settings in the above example set the threshold for CPU and memory
usage (HIGH) at 90%. It is set at 80% (Low) for clearing the alarm condition.
The Interval setting specifies the number of seconds over which to compute the average CPU
and memory utilization. In the above example the setting is 15 seconds. So every 15 seconds
the system will check the CPU and Memory usage to see if an alarm should be generated or
cleared.
164
166
167
168
169
170
G9 Protection Schemes
There are 4 types of protection schemes available for cards in the G9 Gateway.
1:1 - One active card is protected by a single hot standby card. If the active card fails for any
reason, the standby card immediately begins processing from the point of failure.
1:N - Several (N) active cards are protected by a single hot standby card. If any one of the N
active cards fail for any reason, the standby card immediately begins processing from the
point of failure.
1+1 - Two active cards share the processing load (load sharing) with either card being able
to handle the entire processing load if one of the cards should fail.
N+1 - Several (N+1) identical cards share the processing load (load sharing) with N of the
cards being able to handle the entire processing load if one of the cards should fail.
NOTE: Bi-directional and uni-directional refer to how local and remote equipment
co-ordinate with each other during a switchover
171
172
173
174
175
176
177
178
2. What Administrative and Operating state must a span be in to be ready to carry traffic?
a. Administrative State:______________________
b. Operating State: _________________________
3. When choosing EXT-1 and EXT-2 for the timing source on a G9 Gateway, the source is
derived from ___________________. This is most commonly a Stratum ________
clocking source. You must also select either ______________ or
_____________________ in the EMS GUI as the termination mode.
4. What 3 processes do all cards have to pass in order to be put in an Enable state?
a. ______________________________________
b. ______________________________________
c. ______________________________________
5. A CPU Low threshold of 80% will turn on an SNMP trap when CPU usage is at 80%
utilization.
a. True
b. False
179
Using the EMS GUI determine the Protecting and Protected PAC and their status for 1 Plano
Training G9.
7. Using the EMS, determine which PAC is Active and which is in the Standby mode.
PAC Slot 7_____________; PAC Slot 8 _____________
8. Describe the different ways in which the status and the protection can be verified using
the EMS.
a. _________________________________________________________
b. _________________________________________________________
c. _________________________________________________________
15. Using the EMS, determine which SST card is the Protecting card and which
the Protected card. Slot 21 SST___________; Slot 22 SST__________
16. List the ways the status and the protection can be verified using the EMS.
a. __________________________________________________________
b. __________________________________________________________
c. __________________________________________________________
17. 1. Using EMS, determine which T1 is Protecting and which T1 s are Protected. Give
slot number(s) _______________________________
18. 2. List how status and protection of the T1 Channelized Interface cards can be verified
using the EMS.
a. _______________________________________________________
b. _______________________________________________________
c. ______________________________________________________
G9 Protection Groups
19. Using the EMS GUI determine Protection Groups for various service types in a G9.
Which protection group is utilized for:
a. Quad OC3/STM1 cards? _____________________________
b. SST cards? _____________________________
b. __________________________________________________________
181
182
183
184
185
186
187
188
189
Active Channels
The section Status shows LOF and LOS alarms.
190
191
192
Active Channels
The section Status shows LOF and LOS alarms.
193
STM-1 The STM-1 port(s) on the QUAD OC-3/STM-1 card. Each port will be defined with a
Facility of 1, that will be broken down to the following Payload.
194
STM-1 The STM-1 port(s) on the QUAD OC-3/STM-1 card. Each port will be defined with a
Facility of 1, that will be broken down to the following Payload.
195
196
197
Span Properties
The Properties tab for a Span allows the user to view the provisioning.
Send Codes provide a way of testing spans. On this screen the Send Code will indicate the type of
code that is sent across the DS1 to the far end.
Send AIS Sends a AIS (Alarm Indication Signal)
Send Yellow alarm Sends a RAI (Remote Alarm Indication)
Send No Code
Send In-band Line Code
Send In-band Reset Code
Send Idle Code
Send Out-band Line Code
Send Out-band Payload Line Code
Send Out-band Reset Code
198
Span Loopback
199
Span Inventory
The Inventory tab for a span provides identification and status information on the spans
channels.
200
Channel
Admin State
Oper
Group
Circuit
CIC Status
Specifies the current ISUP status of the CIC assigned to this channel.
(Ie. Transient, Unequipped, incoming Busy/Active etc.)
201
202
Span Operations
This screen in the GenView EMS GUI allows the user and/or technician to perform a BERT test on
a span.
BERT results can be viewed at Faults/Events Tab. The event will be identified as:
Severity of INF (Informational)
Category of APP (Application)
Code of 20992
Event Name TDM_BERT_RESULTS.
203
204
205
206
207
208
NOTE:
The span must be Unassigned in order to terminate it to another device.
You can only Monitor spans that are assigned.
209
210
211
212
213
214
3. When a shutdown is performed, channels that are currently in service will go into a
_________________ ______________ state until the call is completed.
4. A Call Trace works when the circuit is busy only.
1. True
2. False
5. List three Trunk tests that can be performed to ensure validity of operations?
1. ______________________________________
2. ______________________________________
3. ______________________________________
215
216
217
218
219
220
1.
221
222
223
224
225
SBC DB Operation
We need to bear in mind the way the different Databases at the SBC and RSM are managed
depending on the tool used for configuration.
When the configuration is done directly on the SBC via the CLI, the corresponding command
is implemented and stored in the local Postgres database, and through is autosync operation,
copied to the redundant database. But no update is sent to the RSM and its own MySQL
database, so a difference is generated between these two entities.
When the command is generated via the RSM-Console, the information is stored in the
MySQL database and the command sent to the SBC, which in turn will apply it and save it to
its own database and redundant peer.
For the SBC configuration that is not at the global level, and for some administration tasks,
you can use the SBCs CLI commands. The CLI commands will update the database tables
and lets you configure many SBC objects including Endpoints, Realms, Signaling Vnets,
Routes and Calling Plans. It will not allow you to create or modify the Media configuration
from the CLI command line, that will need to be done using the RSM Console.
NOTE:
PostgreSQL is a powerful, open source object-relational database system. It runs on all major
operating systems, including Linux, UNIX, and Windows. It is fully ACID compliant, has full support for
foreign keys, joins, views, triggers, and stored procedures (in multiple languages).
226
227
CLI View
Type cli | more at the prompt to see a complete listing of all the cli commands that are
available.
228
RSM Console
As an alternative to using the command line, you can use a the RSM Console which is a
Graphical User Interface included with the RSM server software.
To Access the RSM Console:
From the RSM, click on the RSM Console Link.
When you click on the RSM Console Link, the system will download the RSM Console
application to your desktop.
229
230
231
232
233
234
235
236
SBC Networking
237
The Realm
238
SBC Network
The SBC Networking connectivity is established by configuring the following:
Signaling Vnets A Signaling Virtual Network (Vnet) is the combination of a physical
interface, a gateway IP Address (router), and an optional Virtual Local Area Network (VLAN)
ID. You have to define Signaling Vnets before you can configure other network connectivity
components.
Media Devices If routing media, you must define the media devices configured on your SBC.
Supported device types include the Network Processor Cord installed in your system (NSF-NP,
NSF-NP2 or NSF-NP2G) and transcoders.
Media Vnets A Media Vnet is the association of a physical interface for a media device with
a gateway IP Address (router) and an optional VLAN ID.
Media Resource and Media Service Pools A Media Resource Pool is one or more
associations of an IP Address, Netmask and UDP Port Range assigned to a Media Vnet. A
Media Service Pool is a group of one or more Media Resource Pools and is assigned to the
Realm.
239
240
241
When you define a Realm, you assign it a Realm Signaling Address (RSA) and it is associated
with a Signaling Vnet which defines the physical port the signaling traffic will use. You also
assign a Specific Media Service Pool which is responsible for routing Media traffic. The Media
Routing Pool provides the configuration details required for routing media such as a Realm
Media Address (RMA), a range of Media Ports and Media Routes.
It is important to know that a Realm can only be associated with one Media Service Pool, but
you can have multiple Realms pointed to the same Media Service Pool.
242
243
244
245
ipver {4|6}
Creates and names a new signaling Vnet, and specifies the IP version for
the Vnet, where: <vnetname> is the name you want to assign to the new
Vnet.
The name cannot exceed 31 characters in length.
4 indicates IP version 4
6 indicates IP version 6
If you do not specify 6 (IPv6) for this parameter when you create the Vnet,
the default value is 4 (IPv4). The IP version type cannot be changed once
the Vnet is created.
Assigns a physical interface to the Vnet, where:
<vnetname> is the name of the Vnet that you want to edit.
<interface name> is the ethernet port you want to use with
this Vnet. Valid values include eth0 through eth5, but eth2 and
eth3 are recommended for use as signaling interfaces. The other
ports are generally reserved for other uses.
Optionally assigns a VLAN ID to the Vnet, where: <vnetname> is the name
of the Vnet that you want to edit.
<VLAN ID> is the integer VLAN ID for the portion of your network using this
Vnet. Valid values are 2-4094 and none, however values above 3999 are
reserved. If you do not specify this parameter the default value is none.
246
Description
Command
Description
Sets the frequency at which ICMP echo requests are generated to monitor
gateways.
<vnetname> is the name of the Vnet that you want to edit.
<ping interval> is the interval at which ICMP echo requests are generated.
Default is 500 msec
Range is 50 msec to 3 sec in multiples of 50 msec
Must be greater than the round trip time the gateway router.
If gateway-monitoring is set to none, this parameter is disabled.
Sets the number of successful consecutive ICMP echo requests required to
transition a gateway from unreachable status to reachable status, where:
<vnetname> is the name of the Vnet that you want to edit.
<successful ping count> is the number of successful consecutive ICMP echo
requests required.
Default is 5
Range is 1 to 10
If gateway-monitoring is set to none, this parameter is disabled.
Lists the names and configured settings for all signaling Vnets
currently defined in your system.
Lists the specified vnet name only
247
248
249
VLANs and IP Subnets provide independent Layer 2 and Layer 3 constructs that map to one
another and this correspondence is useful during the network design process. Multiple VNETs
which are created using the same Ethernet interface, have to have VLANs assigned to them
to provide a one-to-one relationship between the VLAN and the IP Subnet.
250
251
About Synchronization
Occasionally, the databases between the SBC and RSM can get out of sync. Among the
reasons that this can occur are:
A user executes CLI commands to add database entries to SBC
Data successfully added into SBC but failed when added into the RSM
Data successfully added into SBC but a network-related error occurred.
The Synchronization features in the RSM allows you to perform the following tasks:
Manually synchronize database data from the SBC (MSX) to the RSM (import) and from
the RSM to the SBC (MSX) (export)
Detect an out-of-sync condition between GenView-RSM and iServer databases
NOTE:
Database synchronization and auditing is limited by the size of the database. Access to the
synchronization process is restricted to system administrators. During synchronization,
affected partition users should temporarily suspend operation!!
252
253
Manual Synchronization
The manual synchronization process allows you to:
Synchronize database data from the SBC to the RSM (import), allowing you to
overwrite the RSM database data with SBCs database data.
Synchronize database data from the RSM to the SBC (export), allowing you to
overwrite SBCs PostGres database data with the RSM database data.
Select an action for each table shown to identify which database should serve as the
source for synchronizing the databases:
RSM to MSX - Copies from the RSM to the SBC
MSX to RSM - Copies from the SBC to the RSM / RSM Console
No action - Does not update the table
254
255
256
257
RSM Console
You can also use the RSM Console to create signaling Vnets. To access the area where you
work with signaling Vnets, select Utilities Vnet from the Database View.
258
259
260
261
262
263
264
265
266
267
268
1.
269
270
271
272
273
FCE Tab
The basic media configuration options are all accessible from the FCE (Firewall Control Entity)
Tab of the iServer Configuration dialog within the RSM Console.
Steps in Basic Media Configuration
Add a Media Routing Device (Define Media Card)
Add a Media Vnet
Add Media Routes
Create a Media Resource Pool
Create a Media Routing Pool
Note:
When you configure Media, you are adding objects (devices, pools) to the mdevices.xml file
stored in the servercfg table. Adding new objects to the mdevices.xml file does not require a
restart to the iServer process; however, changing objects already in the mdevices.xml file
requires a restart of the iServer Process. You will see a message box notifying you when a
restart of the iServer Process is required. You must restart the iServer process from the
command line (by issuing iserver all stop / iserver all start) before the changes will be
effective. It is recommended to stop and restart the Standby SBC first and once it is back
online, stop and restart the Active SBC. This will ensure there is not a major outage in the
network. In-process H.323 calls and all incomplete call setups are dropped during a restart of
the iServer process!!
274
275
RTP injection refers to attempts by malicious users to inject extraneous IP packets with the
intention of negatively impacting network service quality, to deny service, and to overload
network resources. To prevent rogue RTP packets in media streams, the SBC assures that only
media streams with authorized packet data are accepted and routed. To accomplish this, the
media processor card determines the Source IP Address from signaling information rather
than from media packets as they arrive and are filtered.
Note: When the source of the packets is behind a NAT device, the SBC cannot ensure that
RTP injection is prevented!
276
277
278
279
280
On the egress leg, the SBC does not yet know which RRMA the called party will be using.
Therefore it examines all link groups in the pool associated with the egress endpoint and
identifies the link group with the most available bandwidth. Within that group, the link with
the most available bandwidth is identified and the SBC selects the LRMA associated with that
link. The SBC then reserves bandwidth on all the links that share the selected LRMA. Once
the SBC receives a response from the called party that identifies which RRMA will be used,
the SBC releases the reservations on the links that are no longer needed.
281
282
283
284
Valid VLAN IDs range from 2 to 3999 inclusive. The values 0 and 1 should not be used. If you
do not want to associate the Vnet with a particular VLAN ID, check none.
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
Creating Realms
You can create Realms using either CLI commands or using the RSM console. We will focus
on the RSM console but you should be aware of the following precautions when performing
command-line operations involving Realms:
These commands should be executed only while the iServer Process is running
If the SBC database containing new Realms is put into service by executing the
command cli db create followed by cli db switch, the realms will not be plumbed until
the iServer Process is stopped and restarted.
306
307
Field
308
Description
Partition
Enable Signaling
When checked, enables new call setups. If unchecked, calls in progress will
not drop but new call setups are prohibited
Realm Name
SIP Authentication
Use the list to specify which SIP message types will trigger authentication.
SIP Blocked
Methods
Use the list to specify which SIP message types the SBC should block.
CID Block
The prefix digit sequence a caller on this Realm can send to prevent the
Caller ID data from being sent for that call
CID Unblock
The digit sequence a caller on this Realm can pre-pend to the dialed number to
send the Caller ID data for that call
The SBC can be configured to Pass, Insert, or Manipulate SIP Headers according
to rules you define. These rules determine how the SBC handles specific SIP
headers or specific parameters within them based on the type of SIP message in
which they appear. You can combine sets of header rules into the header policy
profiles that are applied at different levels to influence the SBCs processing
Field
Description
This option is applicable for IP PBX endpoints and determines whether the SBC includes
service-route header fields in the REGISTER response it returns to this endpoint.
Service Route
Pass -indicates that you want the SBC to include a service-route header field if one
is already present in the REGISTER response sent by the registrar. Otherwise the
SBC should not insert one.
Disable - indicates that you do not want the SBC to forward a service-route header
field in REGISTER responses.
Enable - indicates that you want the SBC to include service-route header field
information in the REGISTER response. If one is not already present, the SBC adds
one, inserting an identifier for the SBCs Realm in the header (in the form of its RSA
or the Realms Fully Qualified Domain Name (FQDN
Strict Route
Check
Check whether the routes in the Route header included in incoming requests match
those in the service-route information that the SBC previously sent to that endpoint as
part of a REGISTER response. This check applies to messages originating from endpoints
that registered through the specified Realm and are now making a non-REGISTER
request (such as an INVITE). If the comparison of the two route sets reveals a
discrepancy, the SBC responds to the request with a 400 Bad Request message.
PBX endpoints and determines whether the SBC adds an identifier for the SBCs Realm
to the path header information (in the form of its RSA or Realm FQDN if the Realm is
configured with an FQDN) in the REGISTER responses it returns to this endpoint.
Disable - instructs the SBC to not add an identifier for the SBCs Realm to the path
header field in the REGISTER response.
Enable instructs the SBC to add an identifier for the SBCs Realm to the path
header field in the REGISTER response.
Default Server
Reg ID
Use this option to select an endpoint Registration ID to use as the default server. These
options are available only after you select IEdge Default Server for the previous option.
Default Server
Port
Use these options to select a User Port (uport) to use as the default server. These
options are available only after you select IEdge Default Server for the previous option.
Three-digit integer , between 001 and 999, that identifies the code map file you want to
use when the iServer process initialized.
RFC 3261 defines Timer B as the INVITE transaction timeout timer. The SBC derives a
value for Timer B using your configured value for Timer T1 and your configured value
for the maximum INVITE retransmission count. The retransmit count parameter
controls the number of times an INVITE is retransmitted before a call setup attempt is
abandoned. The Timer B value is derived using the formula: Timer B = Timer T1 * (2^
retransmit count) The value for the maximum INVITE retransmission count can be
configured at the endpoint, realm, and global level. The configured value at the most
specific level applicable takes precedence. The default value is 0. The range allowed is 0
309
to 10.
310
SCTP Section
The SBC supports Stream Control Transmission Protocol (SCTP), an IP Transport Protocol that
offers reliable data transfer and functions. SCTP supports multi-homing, a capability that
further ensures network resilience and reliability.
Multi-homing refers to the concept of configuring a network to use an alternative
transmission path in the event that the primary path is unavailable. To support using SCTPs
multi-homing capabilities, the SBC allows you to configure a secondary (alternative) Realm
and alternative IP Addresses on endpoints.
You can configure the realm to have up to 4 secondary realms. Together, a primary Realm and
its secondary Realms are considered a Realm-Set. Secondary realms provide an alternative
network configuration (Vnet, RSA, and subnet mask) that the SBC can use as an alternative
path for traffic in the event that the primary realm network path becomes unavailable. The
Realm is thus protected against network faults through the presence of these alternative
paths.
311
Field
Description
SCTP Status
The SBC supports the following three status values for the realm:
Single-homed
Multi-homed SCTP Secondary
Multi-homed SCTP Primary
The name of the Primary Realm within the Realm-Set. You cannot specify a Realm
as the Primary Realm for another Realm if it is already a Secondary Realm (has a
SCTP-Primary-Realm configured on it).
Secondary SCTP
Realm Names
The name of the Realm you want to specify as a Secondary Realm within a Realmset
SCTP Ordered
Delivery
If checked, enables the SBC to use SCTP ordered delivery mode. By default, this
field is disabled.
SCTP Fallback
Transport
312
Field
Description
Realm Signaling
Address (RSA)
The IP Address that Endpoints will use to send Signaling traffic to the SBC
Subnet Mask
Domain Names
(Comma
Separated)
You can configure the SBC to replace the RSA IP Address with a Fully
Qualified Domain Name (FQDN) . You can specify up to 8 domains in a
comma-separated list.
Dynamic EP
Domain
Vnet Name
The name of the Signaling Vnet assigned to this Realm. The Vnet
identifies a physical interface (port) on the SBC, an optional VLAN ID and
a default gateway for traffic from the SBC.
313
Field
314
Description
SIP Port 1
SIP Port 2
SIP Port 3
Specify up to three additional ports on which the SBC should listen for SIP
messages for this Realm. These ports are in addition to the globally
configured SIP port
Note: Endpoints that are dynamically registering through this realm can
send their REGISTER message to one of these alternative ports. The SBC
keeps track of which port an endpoint uses when it registers and uses
that same port for sending subsequent messages to that endpoint.
TLS Port 1
TLS Port 2
TLS Port 3
Specify up to three additional ports on which the SBC should listen for
Transport Layer Security (TLS) connection requests for this Realm. These
ports are in addition to the globally configured TLS port
TLS Certificate
Domain
Select a certificate domain to associate with this realm When you assign a
certificate domain to a realm, this associates the x.509 certificate file
specified by the certificate domain with the realm so that the SBC uses it
as its certificate file for connections that are made to or from the realm.
The list contains the names of certificate domains currently defined on
your system
Field
Description
TLS Client
Certificate
Select an option that determines to what extent the requesting endpoint (client)
must authenticate itself.
The choices in the list are:
NOT REQUESTED - the SBC does not request a client certificate.
REQUESTED NOT ENFORCED (default)- the SBC requests a certificate and, if one is
provided, the SBC will validate it before proceeding. However if one is not provided,
the SBC will still continue to establish the TLS connection.
REQUESTED ENFORCED - the SBC requests that clients provide a valid certificate and
the SBC will validate it before proceeding. If a valid certificate is not provided, the SBC
will drop the connection
TLS Fallback
Select an option to specify what action the SBC should take when it cannot establish a
TLS connection. You can specify that it should attempt to connect using an alternative
type of transport (UDP or TCP) or to not continue to attempt to connect (NONE). The
default value is NONE.
Store Inactive
Endpoints
Check this option to enable the SBC to store configuration data for dynamic
endpoints registered through this Realm that are no longer active
Enable Port
Mapping
Port Mapping
Range
Enter values to define the range from which the SBC allocates ports to
registering endpoints. You can specify multiple port ranges by providing a
sequence of lowport:highport values delimited by commas in ascending
order. Port ranges should not overlap; they do not have to be contiguous. If you do
not specify a port range, then the SBC uses the default range of
6000:65535.
Select the name of the Rate Limit Profile assigned to the Realm
OBP
Registration
Scaling Factor
Use this field in conjunction with the global (Cache Timeout) timeout value or an
IEdge group timeout value (if configured). It can be used to require registering
endpoints to send their re-registration messages to the SBC at a different frequency
from which the SBC forwards the REGISTERs on to the registrar server. This effectively
"throttles" the re-registration rate.
Endpoints register at the rate prescribed by this option, but the registrar
server only receives messages at the timeout interval defined by either an IEdge
group timeout (if applicable) or the global timeout setting. The default value is 900
seconds, the same as the global timeout default.
Min-Expires
Use this field to define the minimum Expires value that the SBC will accept from a
registering endpoint. If the Expires value an endpoint offers is less than the
configured minimum, the SBC will respond to the endpoint with a 423 (Interval Too
Brief) message. If a Realm-level Min-Expires value is also configured, the Realm value
takes precedence. The default value is 0 which indicates that no minimum value is
required.
315
Field
316
Description
IP Sec Mode
Encryption Type
IKE Phase 1
Lifetime
Field
Description
IKE Phase 2
Lifetime
IKE negotiates IPSec SA parameters and sets up matching IPSec SAs and
the peers
Dead Peer
Detection
Authentication
Algorithm
Authentication
Method
Pre-Shared Key
If you are using the pre-shared key method of authentication you must
assign a matching pre-shared key to both the SBC and the endpoint. Use
these fields to type, and then re-type, the pre-shared key.
You are asked to type the key twice to ensure that you have entered it
accurately. The pre-shared key length is limited to 255 characters. There
are no restrictions on character formats.
Gateway IP
Address
317
Field
Description
Registration ID
Select the registration ID for the endpoint for which you want the SBC to
behave as a mirror proxy. The list includes endpoints you previously
configured as SIP proxies.
Port
The port number on the proxy to which traffic originating in this realm will be
sent.
Public / Private
Field
Allow Dynamic
BlackListing
Dynamic
BlackListing Policy
318
Description
Use this option to specify whether this endpoint should be subject to
dynamic blacklisting.
Inherit from System inherit the Dynamic Blacklisting Policy from the
System
Enable Enable Dynamic Blacklisting and select one of the Dynamic
Blacklisting Policies from the Dynamic BlackListing drop-down list
Disable Disable Dynamic BlackListing from the Realm
Allows you to select policies, previously created, to protect the Realm from
potentially malicious traffic.
Field
Description
Signaling Only
Media Pool ID
The Media Service Pool which defines the Realm Media Address (RMA)
and Subnet Mask, port range, and the physical interface (media port) for
this Realm.
Between Realm
Media Routing
When the call is between different Realms, you can specify Dont Care,
Always On, Always Off, or On.
Within Realm
Media Routing
When the call is within the same Realm, you can specify Dont Care,
Always On, Always Off, or On.
When a call occurs between endpoints behind the same NAT device, you
can specify Dont Care, Always On, Always Off, or On.
319
Field
320
Description
Signaling Only
Media Pool ID
The Media Service Pool which defines the Realm Media Address (RMA)
and Subnet Mask, port range, and the physical interface (media port) for
this Realm.
Between Realm
Media Routing
When the call is between different Realms, you can specify Dont Care,
Always On, Always Off, or On.
Within Realm
Media Routing
When the call is within the same Realm, you can specify Dont Care,
Always On, Always Off, or On.
When a call occurs between endpoints behind the same NAT device, you
can specify Dont Care, Always On, Always Off, or On.
Description
Media
Authorization
Transcoding
Codec Profile
321
Field
322
Description
RTP Timeout
RTCP Timeout
Field
Description
Methods - Rate
Limit Column
The maximum number of requests (per second) for the chosen SIP
Method type that you want to allow for this Realm.
Methods - Burst
Column
Burst value for the chosen SIP Method which defines a temporary
increase in the number of requests of that you will permit to
accommodate occasional fluctuations in network traffic for this Realm.
Methods - EP
Default Rate
Column
Limits (per second) you want to apply to one or more of the SIP Methods
to use as a default for endpoints within this Realm that are not
configured with their own limits.
Methods - EP
Default Burst
Specify a Burst value for the SIP Method which defines a temporary
increase in the number of requests you will permit to accommodate
occasional fluctuations in network traffic for endpoints within this Realm
that are not configured with their own limits.
Select either Drop or Respond. Drop - the SBC will simply drop the calls
when rate limits are exceeded. Respond - the SBC will send the SIP
message you specify as the Rate Limit Error Response Code when rate
limits are exceeded.
323
Field
Description
Rate Limit
Error Code
The SIP message value to send when your configured rate limits are exceeded. The default SIP
message code is 503 (Service Unavailable).
Note: If you select a SIP response that contains a Retry- After header, you can configure the
interval that the header contains as the recommended time to wait before retrying.
Reporting
Interval
Minimum number of seconds the SBC should wait between logging reports of request rates
exceeding the Rate Limit for this Realm. Default, 0, logs all instances regardless of the frequency
UDP
Select the UDP traffic Rate Limit Bucket you want to assign to this Realm
TCP
Select the TCP traffic Rate Limit Bucket you want to assign to this Realm
Default Input Buckets.
Phone
Rate Limit Bucket used to set a default Input Rate Limit for Generic IP Endpoints within this
Realm - typically devices which are not configured with their own individual Rate Limits.
NAT
Rate Limit Bucket used to set a default Input Rate Limit for Endpoints within this realm that are
behind NAT devices and are not configured with their own individual Rate Limits.
Gateway
Rate Limit Bucket used to set a default Input Rate Limit for Gateway Endpoints within this realm
not configured with their own individual Rate Limits.
Gatekeeper
Rate Limit Bucket used to set a default Input Rate Limit for Gatekeeper Endpoints within this
realm not configured with their own individual Rate Limits.
Proxy
Rate Limit Bucket used to set a default Input Rate Limit for Proxy Endpoints within this realm
not configured with their own individual rate limits.
Subnets
Rate Limit Bucket used to set a default Input Rate Limit for subnets within this realm that are
not configured with their own individual Rate Limits.
Unknown
Rate Limit Bucket used to set a default Input Rate Limit for unknown Endpoints within this
realm that are not configured with their own individual rate limits. Note: Unknown endpoints
are those that are not yet registered with the SBC.
Default Output Buckets
Phone
Rate Limit Bucket used to set a default Output Rate Limit for Generic IP Endpoints within this
realm that are not configured with their own individual Rate Limits.
NAT
Rate Limit Bucket used to set a default Output Rate Limit for Endpoints within this realm that
are behind NAT devices and are not configured with their own individual rate limits.
Gateway
Rate Limit Bucket used to set a default Output Rate Limit for Gateway Endpoints within this
realm that are not configured with their own individual Rate Limits.
Gatekeeper
Rate Limit Bucket used to set a default Output Rate Limit for Gatekeeper Endpoints within this
realm that are not configured with their own individual Rate Limits.
Proxy
Rate Limit Bucket used to set a default Output Rate Limit for Proxy Endpoints within this Realm
that are not configured with their own individual Rate Limits.
324
Field
Description
Signaling 802.1p/q
Priority (1-7)
Specify a value between 1 and 7 to substitute for the received signaling 802.1q user
priority value. Or check None to use the OS default for signaling.
Media 802.1p/q
Priority (1-7)
Specify a value between 1 and 7 to substitute for the received media 802.1q user
priority value. Or check None to transparently pass the priority value.
Signaling IP Layer
ToS (0-255)
Specify a value between 0 and 255 to substitute for the received signaling ToS
value. Or check None to use the OS default for signaling.
Specify a value between 0 and 255 to substitute for the received media ToS value
for audio. Or check None to transparently pass the received value.
Specify a value between 0 and 255 to substitute for the received media ToS value
for Video. Or check None to transparently pass the received value.
Specify a value between 0 and 255 to substitute for the received media ToS value
for Image. Or check None to transparently pass the received value.
Specify a value between 0 and 255 to substitute for the received media ToS value
for Data. Or check None to transparently pass the received value.
Specify a value between 0 and 255 to substitute for the received media ToS value
for MSRP. Or check None to transparently pass the received value.
325
326
327
Understanding Endpoints
Once you have established basic network connectivity you must add endpoints to your
system to be able to send and receive calls. Endpoints represent devices in your network and
must be added and configured appropriately for the type of call traffic you want to support.
The configuration settings on an endpoint help to govern how calls are processed.
Endpoints represent devices in your network and must be added and configured for the type
of call traffic you want to support. The configuration settings on an endpoint help to govern
how calls are processed.
Endpoints must be added and configured as the appropriate endpoint(s) for your network
layout and your specific installed devices.
328
Generic IP Device
A Generic IP Device is a device such as an IP Phone. When you configure a Generic IP Device
on the SBC, you can control all of the options on the device, such as enabling H.323 or SIP.
Minimum Required Fields:- A Generic IP Device endpoint requires that the following fields be
set:
Device type of Generic IP Device
Registration ID
Port number (0-255)
Extension / phone number
Realm with which the endpoint is associated
329
330
You should select one of the SIP endpoint types if the device it represents will be sending out SIP calls.
Configuring an endpoint as a SIP gateway or SIP proxy automatically disables H.323 configuration
options on that endpoint.
SIP Gateway - Minimum Required Fields:
Device type of SIP Gateway
Registration ID
Port number (0-255)
IP Address
Realm with which the gateway is associated
If an Egress Gateway, a Calling Plan
Other applicable fields are optional.
SIP Proxy - Minimum Required Fields:
Device type of SIP Proxy
Registration ID
Port number (0-255)
IP Address
Realm with which the Proxy Server is associated
If an Egress Gateway, a Calling Plan
Other applicable fields are optional.
Softswitch Minimum Required Fields
When you configure an endpoint as a Softswitch, both H.323 and SIP configuration options are
automatically enabled on that endpoint. Calls of either type can be sent, based on the type of call
received.
Device type of Softswitch
Registration ID
Port number (0-255)
Realm with which the endpoint is associated
SIP and H.323 protocol support enabled
If an Egress Gateway, a Calling Plan
Other applicable fields are optional.
ENUM Server
An ENUM Server converts E.164 (telephone) numbers into Internet URIs, using DNS lookups. If you
are going to do ENUM queries, create an ENUM server endpoint to represent the ENUM server in
your system. The SBC can support multiple defined ENUM Server endpoints.
331
332
333
334
Field
Description
Partition
Device Type
Registration ID
Port Number
IP Address
335
Field
Description
Allow Dynamic
Registration
Extension
The E.164 address of an endpoint. This is only available to Device Type Generic IP Device or when you specify that you are configuring an IP PBX
endpoint (by enabling the option Allow Dynamic Registration
Calling Plan
Carrier ID
336
Field
Description
Realm
Domain Name
Select one of the domains from the list if you want the SBC to replace the RSA IP
Address with the selected domain (FQDN) in outgoing SIP messages when this
endpoint is the destination endpoint. The list contains any domains specified in
the
configuration of the realm in which this endpoint resides
IEdge Group
Enable
Transcoding
Codec Profile
337
338
Field
Description
Use this field to specify the reject string you have configured your ENUM
server to return when it is unable to look up a number. The value you specify
must be in A.B format where A and B are each strings, separated by a period.
For example, reject.com. The ENUM server must also be configured to
insert the appropriate ISDN cause code within the string, in a position
immediately following the A value and preceding the period within the
string. When the SBC receives this string from the ENUM server it extracts
the ISDN cause code embedded in the string and returns it when it is
terminating the failed call.
Use this field to specify a default ISDN cause code for the SBC to use when it
receives a reject string from the ENUM server, but the string does not
include an embedded ISDN cause code. The SBC sends this code when
terminating the failed call. The default value is 31.
DNS Domain Object
Encryption Type
Select the type of encryption you want to use for IPSec connections to the
Endpoint.
IKE Phase 1
Lifetime and
Unit for Phase 1
Lifetime
Use Phase 1 Lifetime fields to specify a number and a unit of time (minute,
second, or hour) to define a lifetime for Phase 1 of the IKE Process.
IKE Phase 2
Lifetime and
Unit for Phase 2
Lifetime
Use Phase 2 Lifetime fields to specify a number and a unit of time (minute,
second, or hour) to define a lifetime for Phase 2 of the IKE Process
Dead Peer
Detection
Specify the number of seconds for the Dead Peer Detection (DPD) value.
The DPD value functions as a timeout. When there is no traffic from the
endpoint, over the secure channel within the specified interval, the channel
is torn down
Authentication
Algorithm
Authentication
Method
Select either PSK (pre-shared Key) or X.509 digital certificate method for
authentication between the SBC and the endpoint
Preshared Key
Specify the pre-shared key (password) to use between the SBC and this
endpoint.
339
DTMF
Egress DTMF
SIP DTMF
340
Field
Description
First Name
Last Name
Email Address
Location
Country
Comments
Customer ID
341
Protocol Tab
Field
Description
Gateway / Proxy
342
Gateway / Proxy
Priority
The SBC considers this priority setting when it searches for a destination
route
Zone
Routes Active Time-of-Day
Route Binding Priority
Destination Pattern Longest Match
Priority Setting
LNP
Field
Description
SIP / H.323
SIP
H.323
URI (SIP/H.323)
Use to specify the Uniform Resource Identifier (URI) to use for this endpoint.
SIP / H.323 (continued)
For use with PortaOne Billing System. Select whether you want to populate
the PortaBilling Username field with the ANI of the Calling Party to use in
Authentication and Authorization.
Enforce Privacy
Select yes to ensure that the calling party's number is not sent in egress call
requests.
You can control whether the peer endpoint participating in the call is notified
if a SIP endpoint changes its IP Address or port during a call in which the
media is being routed through the SBC
Calling Party
Number Plan
Select the type of number value to put in an egress call setup. The default
setting is Pass which causes SBC to pass through the value from the
incoming setup. For H.323 endpoints, if a value other than pass is
specified, that value is inserted as the Type of Number in the egress Calling
Party Number. For SIP endpoints a value of international causes SBC to
insert a leading plus (+) sign in the username of the egress From header. For
any value other than pass or international SBC ensures a plus sign is not
inserted.
Codemap File
Number
Enter the three-digit number for the custom codemap file you want to use to
map codes
received by this endpoint. Refer to Chapter 40 Cause Code/Response Code
Operations of the SBC Operations Guide for more information.
Cisco GTD
Select this check box to enable relay of Cisco GTD (Generic Transparency
Descriptor) messages to and from this endpoint. GTD is a message format
used to transmit SS7 ISUP call information between the PSTN and the VOIP
network.
343
Field
Description
Trunk Group
x-route-tag Support
When checked, the SBC will treat the x-route-tag value, rather than the tgrp
parameter value in the Contact header, as the source trunk group value in
incoming SIP call requests
Selects the endpoint as the ingress endpoint when the incoming call contains
a source trunk group ID that matches the string configured in this field.
Controls the insertion of destination trunk information into the egress legs
setup message.
Trunk Group - Continued
x-route-tag Support
When checked, the SBC will treat the x-route-tag value, rather than the tgrp
parameter value in the Contact header, as the source trunk group value in
incoming SIP call requests
New Origination TG
on Egress
If this endpoint is the egress endpoint, a value in this field will replace the
origination (source) trunk group value in egress leg messages.
New Destination
TG on Egress
If this endpoint is the egress endpoint, a value in this field will replace the
destination trunk group value in egress leg messages.
Trunk Context
344
If this option is enabled, both trunk group ID and trunk group context can be
used to select ingress and egress endpoints. On a destination endpoint, it
specifies that trunk group and trunk group context parameters are paired in
the outgoing message, or they are removed. For destination endpoints it also
specifies that the SBC positions the originating trunk group value (tgrp) as a
user parameter in the Contact header in messages sent to that endpoint,
according to RFC 4904. If it is disabled on a destination endpoint, the SBC
positions tgrp as a URI parameter in the Contact header.
Field
Description
The value of this parameter will replace the source trunk group
context value in the outgoing call messages. However, the egress
endpoint must have the option use 4904tg enabled to send
trunk group context parameters in the outgoing call.
345
346
When NAT traversal processing is triggered for either reason, the SBC alters its regular
processing to ensure that it can successfully route messages back to the endpoints. The SBC
stores the source IP address and port information from which the SIP request was received.
The SBC sends responses back to this source IP address and port if the transport protocol is
UDP. If it is TCP, responses are sent back over the established TCP connection. If the SIP
request contains an rport parameter, the SBC inserts the rport parameter value in the Via
header of the responses.
347
Field
348
Description
Maximum Total
Calls
Maximum Ingress
Calls
An optional limit on the number of calls that may enter the network
through this endpoint/gateway. This value is independent of the
Maximum Egress Calls but limited by the Maximum Total Calls.
Maximum Egress
Calls
An optional limit on the number of calls that may be placed from the SBC
to that endpoint/gateway. This value is independent of the Maximum
Ingress Calls but limited by the Maximum Total Calls.
Enable Call
Hunting
Enable Call Hunting for this endpoint. Hunting specifies the number of
destination routes to be considered for call termination.
Inherit System
Default
If checked, this endpoint uses the system default settings for Maximum Call
Hunts configured within the Configuration > System Tab
Maximum Call
Hunts
Limits the number of Hunts allowed for a call originated by this endpoint.
Limit is 50.
Default Server
Selection
Use this option to indicate whether you want to specify a default server for
this endpoint. When configured, the SBC routes calls to this server when it
receives certain SIP response codes.
Field
Description
If checked, this endpoint will not route media. If left unchecked, this
endpoint will route media.
Route Media
Use this field to specify a limit, in seconds, on how long calls or call
attempts can be in the system for this endpoint.
Use this check box to enable setting a maximum call duration for this
endpoint.
Click to check this check box if you want to disable trap throttling for
this specific endpoint. When this option is disabled all CAC threshold
traps for this endpoint are sent.
Inherit Global
Configuration / Use
Endpoint Level
Configuration
Enter the maximum number of CAC traps you want sent for this
endpoint during the time interval specified in CAC Trap Throttling
Interval.
349
Field
Description
Use these fields to specify rate limits for the endpoint for one or more of the
SIP methods shown. In the Rate Limit column, specify the maximum number
of requests of that type per second that you want to allow. You can also
specify a Burst value for each type of method which defines a temporary
increase in the number of requests of that type that you will permit to
accommodate occasional fluctuations in network traffic.
Reporting Interval
Use this field to enter the minimum number of seconds that the SBC should
wait between logging reports of request rates exceeding the rate limit. The
default is 0 which means all instances are logged, regardless of the
frequency.
Use these two lists to select rate limit buckets to assign for both input and
output traffic for this endpoint.
New Destination
TG on Egress
If this endpoint is the egress endpoint, a value in this field will replace the
destination trunk group value in egress leg messages.
350
351
352
353
354
1.
355
356
357
358
1.
359
360
tethereal / tshark
tethereal or tshark is the non-graphical command line version of wireshark.
You can capture information from your SBC to a file and then SFTP the file to your desktop.
You really need to be careful in a production environment and should never run a full blown
capture (capturing everything).
Use filters to capture the information you need and then stop the capture to ensure you
arent running out of disk space.
361
Note:
-i any : This option captures traffic of all Ethernet interfaces on the SBC (excluding hk
interfaces). Use this option to see incoming and outgoing traffic, but generates a lot of
output and should be used with caution and mostly just with the option to write it to file.
362
363
Wireshark / tethereal
Originally named Ethereal, Wireshark is the most common network analyzer on the market.
tethereal is the cli (text) version of the tool, commonly used as there is no GUI on the
servers. Ethereal writes pcap files which can be read by virtually any other network
analyzer.
tethereal can be used to check traffic flowing over specific interfaces. Checking for spanning
tree, CDP (Cisco Discovery Protocol) frames and broadcast traffic can give a basic idea of
connectivity and it can give you a quick indication of whether the interface is in the correct
VLAN / Switch Port.
364
Statserver / Statclient
The Network Processing Card has its own Linux Operating system. Command processing and
data formatting is performed by the statserver which runs on the Network Processing Card.
It receives a single command from the statclient, executes the command, and then closes the
connection.
The Statclient tool provides detail on the media interfaces by querying the operating system
on the Netowrk Processing Card. It runs on the SBC and provides an interface for the user to
query the statserver.
365
366
367
368
369
370
371
372
373
374
375
376
Redundant Databases
Each node hosts a complete copy of the SBC database, with one considered the master
database and the other the slave database. The master database is the clusters source of
data for routes, calling plans, configured endpoints, and so on. Each node maintains a
consistent view of the system data through its access to the master database.
For backup purposes, the data in the master database is continually replicated to the slave
database over the control interface you configured during installation. The databases are
independent of node status (active or standby); that is, as long as a node is running, it can
host either the master or the slave database, regardless of whether that node is the active or
the standby for call processing.
377
Servicing Endpoints
When a switchover occurs, the standby node becomes active, in a seamless manner, and is
responsible for the same realm addresses. Call setup and tear-down to registered endpoints
is not lost since the realms signaling and media addresses remain available.
Endpoint registration data is also actively replicated from the active node to the standby. By
continually replicating registration data, the SBC protects the application server in your
network from receiving a flood of registration data in the event of a switchover.
378
379
CAC (Call Admission Control) data - The SBC provides CAC across multiple endpoint /
ports. Aggregate totals for calls in a CAC group are preserved and replicated to the
standby node so it will be able to continue appropriately limiting calls for an endpoint
group.
Session timers for active sessions are migrated to the standby node.
Call duration timers for active calls are migrated to the standby node.
Without SCM, when a switchover takes place, the node that is shutting down drops inprogress calls. The CDRs for such dropped calls are marked with shutdown in the call-error
CDR field 14.
380
Replication Status
You can use the cli scm command to display current information on the replication of callrelated data and dynamic registrations from the local node (on which the command is run)
to its peer.
The output from the command is displayed in 6 sections as described below. In each section,
Total indicates the total call states of that type on the node. The three values that follow
specify how many have been successfully replicated, how many are pending replication, and
how many failed to replicate.
381
382
The fourth section, shown as REG (Registration) provides internal endpoint registration states
383
384
385
386
387
388
389
390
391
392
393
394
Cluster Information
You can display information on the current status of your cluster by using the cli ha
command. The output shows the status of the node on which you ran the command, the
status of the databases on both nodes, and the resources and processes you chose to
monitor.
Initializing the node is in the process of initializing resources. This is a transient state;
after being initialized, the node will enter either the Active or Standby state
Active all the monitored resources are in an operational state and the local node is
standing by, ready to service calls in the event of a switchover
Impaired the node is considered impaired because one or more of the monitored
resources is not available or has exceeded a threshold. This node will not be able to
service calls
395
396
397
398
399
400
The RSM tracks the individual state of each node, then uses this information to determine
the state of the cluster as a whole. The individual state of a node can be one of the following:
Active: the node is providing the service
Standby: the node is ready to provide service if switchover occurs
Impaired: the node cannot provide service
Clusters can have the following states, based on the states of the individual nodes within the
cluster:
If one node is Active and the other is Standby, the cluster is Up. When the cluster is up, it
is providing service.
If one node in the cluster is Active and the other is Impaired, the cluster is Up with
Impaired Node. The cluster is still providing service but switchover cannot occur.
If neither of the nodes is Active or both nodes are Active, the cluster is Down and is not
providing service. This is the Outage state.
Note:
The SBC Outage report is available only to users who are members of the Admin partition. It
is designed to be a reporting tool, not a monitoring tool!!
401
402
403
404
405
406
407
408
409
410
411
NetNumber TITAN
TITAN SRD
Transactional IP Telephony Addressing and Numbering Server
Signaling, Routing and Database
The TITAN SRD server is produced by NetNumber and is a GENBAND offered option for a CRE in a
GENBAND IPX Solution for TDM and IP-based voice services, messaging services, number-portability
services and least-cost routing services.
The TITAN provides a common infrastructure for the virtual delivery of real-time signaling control,
policy enforcement and subscriber database services.
TITAN represents a paradigm shift for building a radically simplified core network where all signaling
control services (ENUM/DNS, SIP, DIAMETER, SS7/C7 and SIGTRAN) are provided on a common
TITAN infrastructure.
TITAN SRD enables smooth inter-working with legacy signaling management services and protocols
during the transition to a next gen network.
412
Architecture Overview
Dependent on the customer requirement, typically TITAN servers would be deployed with master
and edge servers.
The master servers (active and Standby) would hold all configuration and update the edge servers.
The edge servers would perform the call routing processes.
Further Information may be found at http://netnumber.com/products/titan
413
414
415
416
Egress S3
S3 = sbc-uk-bm-th02
DTG = tgukukipx-tnor222-22222
Event
Details
SIP
INVITE from
CP to S3-In
Request-URI = CdPN@uk.gen.band.net;user=phone
P-Asserted-ID= CgID1@cp-name.com;user=phone
From = CgID2@cp-name.com;user=phone
SDP Offer from source
S3-In
S3-In
S3 determines OTG and Context from data provisioned against point of network
attachment
SIP
INVITE from
S3-In to
Titan
Request-URI = CdPN@titan.uk.gen.band.net
Contact = ContactID1;
tgrp=tgukukipx-tnor1111-11111;
trunk-context=map01.sig01.p10.sbc-uk-mrdh01.
uk.gen.band.net@sbc-uk-mr-dh01.uk.gen.band.net
Titan
Titan determines service (to handle country specific numbering plans) from OTG
Titan inspects the Call Barring attribute of the OTG profile 0 for no calls barred.
CdPN manipulated if necessary (e.g. for Number Portability)
Titan determines Destination Group from CdPN
Titan determines DTG List from Destination Group
tgukukipx-tnor2222-22222
Titan performs Trunk Group attribute matching for each OTG/DTG pair to determine
Route (including whether interworking services are required)
S3 to S3 call (NT 1 to NT 1)
P-Time match
Codec intersect
SIP to SIP
Interworking not required
Select Default Route (direct to Egress S3)
sbc-uk-bm-th02.uk.gen.band.net
Titan determines Context associated with each DTG
map01.sig01.p10.sbc-uk-bm-th02.uk.gen.band.net
417
Event
Details
SIP 300
MULTIPLE
CHOICES
from TITAN
to S3
Contact = CdPN;
tgrp=tgukukipx-tnor2222-22222;
trunk-context=map01.sig01.p10.sbc-uk-bmth02.
uk.gen.band.net@ sbc-uk-bm-th02.uk.gen.band.net;
user=phone
Contact (alternate route)
S3-In
S3-In
SIP
INVITE from
S3-In to S3Eg
Request-URI = CdPN;
tgrp=tgukukipx-tnor2222-22222;
trunk-context=map01.sig01.p10.sbc-uk-bmth02.
uk.gen.band.net@sbc-uk-bm-th02.uk.gen.band.net;
Contact = ContactID2;
tgrp=tgukukipx-tnor1111-11111;
trunk-context=map01.sig01.p10.sbc-uk-mrdh01.
uk.gen.band.net@sbc-uk-mr-dh01.uk.gen.band.net
SDP Offer from source with transport addresses modified by S3In
S3-Eg
SIP
INVITE from
S3-Eg to CP
Request-URI = CdPN@customer.com;user=phone
Contact = ContactID3@uk.gen.band.net;user=phone
SDP Offer from source with transport addresses modified by S3Eg
418
419
Interworking C3
Egress S3
S3 = sbc-uk-mr-dh01
C3 = mgc-uk-pool, mgc-uk-999
S3 = sbc-uk-bm-th02
OTG = tgukukipx-tnor111111111
DTG = tgukukipx-tnor222244444
420
Event
Details
SIP
INVITE from
CP to S3-In
Request-URI = CdPN@uk.gen.band.net;user=phone
P-Asserted-ID= CgID1@cp-name.com;user=phone
From = CgID2@cp-name.com;user=phone
SDP Offer from source
S3-In
S3-In
S3 determines OTG and Context from data provisioned against point of network
attachment
SIP
INVITE from
S3-In to
Titan
Request-URI = CdPN@titan.uk.gen.band.net
Contact = ContactID1;
tgrp=tgukukipx-tnor1111-11111;
trunk-context=map01.sig01.p10.sbc-uk-mrdh01.
uk.gen.band.net@sbc-uk-mr-dh01.uk.gen.band.net
Titan
Titan determines service (to handle country specific numbering plans) from OTG
CdPN manipulated if necessary (e.g. for Number Portability)
Titan determines Destination Group from CdPN
Titan determines DTG List from Destination Group
tgukukipx-tnor2222-22222
Titan performs Trunk Group attribute matching for each OTG/DTG pair to determine
Route (including whether interworking services are required)
S3 to S3 call (NT 1 to NT 1)
P-Time mismatch
Codec intersect
SIP to SIP
Media Interworking required
Select Default Route (direct to Egress S3)
sbc-uk-bm-th02.uk.gen.band.net
Titan determines Context associated with each DTG
map01.sig01.p10.sbc-uk-bm-th02.uk.gen.band.net
421
Event
Details
SIP
300
MULTIPLE
CHOICES
from TITAN
to S3
Contact = CdPN
tgrp=tgukukipx-tnor2222-44444;
trunk-context=map01.sig01.p20.sbc-uk-bmth02.
uk.gen.band.net@map01.mm1.mgc-ukpool.
uk.gen.band.net; user=phone
Contact (alternate route)
300
MULTIPLE
CHOICES
from TITAN
to S3
tgrp=tgukukipx-tnor2222-44444;
trunk-context=map01.sig01.p20.sbc-uk-bmth02.
uk.gen.band.net@map01.mm1.mgc-ukpool.
uk.gen.band.net; user=phone
Contact (alternate route)
S3-In
S3-In
SIP
INVITE from
S3-In to C3Iw
Request-uri = CdPN;
tgrp=tgukukipx-tnor2222-44444;
trunk-context= map01.sig01.p20.sbc-uk-bmth02.
uk.gen.band.net@map01.mm1.mgc-uk-pool.uk.gen.band.net
Contact = ContactID2;
tgrp=tgukukipx-tnor1111-11111;
trunk-context=map01.sig01.p10.sbc-uk-mrdh01.
uk.gen.band.net@sbc-uk-mr-dh01.uk.gen.band.net
SDP Offer from source with transport addresses modified by S3In
422
Event
Details
C3-Iw
SIP
INVITE from
C3-Iw to
S3-Eg
Request-URI = CdPN;
tgrp=tgukukipx-tnor2222-44444;
trunk-context= map01.sig01.p20.sbc-uk-bmth02.
uk.gen.band.net@map01.sig01.p20.sbc-uk-bmth02.uk.gen.band.net
Contact = ContactID4;
tgrp=tgukukipx-tnor1111-11111;
trunk-context= map01.sig01.p10.sbc-uk-mrdh01.
uk.gen.band.net@mgc-uk-999.uk.gen.band.net
SDP Offer from source with transport addresses modified by S3In
S3-Eg
10
SIP
INVITE from
S3-Eg to
CP
Request-URI = CdPN@customer.com
Contact = ContactID3@uk.gen.band.net
SDP Offer from source with transport addresses modified by S3Eg
423
424
425
426
Egress C3
S3 = sbc-uk-mr-dh01
C3 = mgc-uk-999
OTG = tgukukipx-tnor1111-11111
DTG = tgukukpst-bm_jde00-99999
Event
Details
SIP
INVITE from
CP to S3-In
Request-URI = CdPN@uk.gen.band.net;user=phone
P-Asserted-ID= CgID1@cp-name.com;user=phone
From = CgID2@cp-name.com;user=phone
SDP Offer from source
S3-In
S3-In
SIP
INVITE from S3-In to
Titan
Request-URI = CdPN@titan.uk.gen.band.net
Contact = ContactID1
tgrp=tgukukipx-tnor1111-11111;
trunk-context=map01.sig01.p10.sbc-uk-mrdh01.
uk.gen.band.net@sbc-uk-mr-dh01.uk.gen.band.net
Titan
mgc-uk-999.uk.gen.band.net
427
Event
Details
SIP
300
MULTIPLE
CHOICES
from TITAN
to S3
Contact = CdPN;
tgrp=tgukukpst-bm_jde00-99999;
trunk-context= mgc-uk999.uk.gen.band.net@map01.mm0.mgc-uk-999.uk.gen.band.net;
user=phone
Contact (alternate route
S3-In
S3-In
SIP
INVITE from
S3-In to C3Eg
Request-URI = CdPN;
tgrp=tgukukpst-bm_jde00-99999;
trunk-context= mgc-uk999.uk.gen.band.net@map01.mm0.mgc-uk-999.uk.gen.band.net
Contact = ContactID2;
tgrp=tgukukipx-tnor1111-11111;
trunk-context=map01.sig01.p10.sbc-uk-mrdh01.
uk.gen.band.net@sbc-uk-mr-dh01.uk.gen.band.net
SDP Offer from source with transport addresses modified by S3In
C3-Eg
428
Event
Details
ISUP
IAM from
C3-Eg to
CP
CdPN
CgPN
C3-Eg
10
S3-Eg
11
C3-Eg
429
430
431
432
Egress S3
C3 = mgc-uk-888
S3 = sbc-uk-bm-th02
OTG = tgukukpst-mr_mllua-88888
DTG = tgukukipx-tnor2222-22222
Event
Details
ISUP
IAM from
PSTN to
C3-In
CdPN
CgPN
C3-In
C3 processes CdPN/CgPN
CdPN matched against local numbering plan data to determine end of digits
(Overlap handling)
Note: There is a trade off in terms of how much numbering plan data is
held locally in the C3 vs. using inter-digit timers to determine end of
Digits
C3-In
SIP
INVITE from
C3-In to Titan
Request-URI = CdPN@titan.uk.gen.band.net
Contact = ContactID1;
tgrp= tgukukpst-mr_mllua-88888;
trunk-context=mgc-uk-888.uk.gen.band.net@mgc-uk888.uk.gen.band.net
Titan
tgukukipx-tnor2222-22222
Titan performs Trunk Group attribute matching for each OTG/DTG pair to determine
Route (including whether interworking services are required)
C3 to S3 call (NT 2 to NT 1)
map01.sig01.p10.sbc-uk-bm-th02.uk.gen.band.net
map01.sig01.p10.sbc-uk-bm-th02.uk.gen.band.net
433
Event
Details
SIP
300 MULTIPLE
CHOICES from TITAN
to C3
Contact = CdPN;
tgrp=tgukukipx-tnor2222-22222;
trunk-context=map01.sig01.p10.sbc-uk-bmth02.
uk.gen.band.net@map01.sig01.p10.sbc-uk-bmth02.
uk.gen.band.net; user=phone
Contact (alternate route)
C3-In
SIP
INVITE from
C3-In to C3Eg
Request-URI = CdPN;
tgrp=tgukukipx-tnor2222-22222;
trunk-context=map01.sig01.p10.sbc-uk-bmth02.
uk.gen.band.net@map01.sig01.p10.sbc-uk-bmth02.
uk.gen.band.net
Contact = ContactID2;
tgrp=tgukukpst-mr_mllua-88888;
trunk-context=mgc-uk-888.uk.gen.band.net@mgc-uk888.uk.gen.band.net
Generated SDP Offer
434
Event
Details
S3-Eg
SIP
INVITE from
S3-Eg to
CP
Request-URI = CdPN@customer.com
Contact = ContactID3@uk.gen.band.net
SDP Offer from source
C3-In
9
C3-In
10
C3-In
11
C3-In
435
436
437
438
439
440
441
442
443
444
CDR Basics
445
446
447
448
449
450
451
CDR format
SBC saves CDRs in a format modeled after MIND CTI1. It is a semicolon-separated ASCII flat file
format that can be imported into a billing system, or into any system that supports CSV files. The
fields appear sequentially in each CDR .
Any field listed as Not currently used appears as two adjacent semi-colons in the actual CDR file,
representing a null field.
See the SBCs Operations guide, Billing and CDR Processing, CDR Contents and Format for a full
listing of fields.
Note that in the above documentation, the CDR fields are described in the context of the default
(end1) CDR which contains end-call data for the ingress call leg.
SBC can be configured to generate additional CDRs at other points within a call. For CDRs written at
other points within the call, the contents of the fields in CDRs will reflect the parameters of the call
at that time. For example, the designation of what is source and what is destination may be
reversed and some fields may not be populated.
Note that a CDR may contain both IPv4 and IPv6 addresses. For example, if a call originates in an
IPv4 realm, and terminates in an IPv6 realm, the call-source (field 4) will be an IPv4 address, while
the call-dest (field 6) will be an IPv6 address.
452
453
Sample CDR
Billing files may be viewed using the cat or more utilities.
The above example shows 4 call records in the billing file named D20120427.CDR.
Each record starts with the date or date and time, in year-month-date-time format.
In this example the filename starts with D, which stands for Daily. As can be seen there are
numerous fields not populated shown by the adjacent semi-colons.
454
455
CDR scripts
There are three main scripts we can use to troubleshoot CDR issues.
The cdr_decode.pl and the cdr.pl scripts are available from the GENBAND FTP server and usually
needs to be manually uploaded to your SBC.
In the training lab these scripts are located in the /var/cdrs directory.
tc - (which is an alias to tail -f /var/cdrs/*CDT): tails the current open CDR file
cdr_decode.pl - decodes the input - used with | (redirect),
cdr.pl - gives statistics on a collection of CDRs, including ASR, tallies of errors and normal calls,
etc.
456
CDR Script tc
This script is an alias of the command tail f /var/cdrs/*CDT
As new records are written to the file they will appear on the screen.
To quit the tc script, use ctrl+c
457
458
459
460
461
462
Host/SBC
example; TRN-SBC-82 I,e; SBC/MSX name as listed in Device tab.
Partition
example; Admin
463
464
The Report can be saved using the Save option. Reports can be saved in in one of the following
formats: HTML, XML, CSV, TEXT.
The Report can also be emailed Select Email button and enter email address.
Note For email to work, email settings have to have been configured via the System Tab.
The output shows successful, abandoned and failed calls.
Green - Successful
Yellow - Abandoned
Red Failed
Call detail information is available for each call via the Detail link.
Each line can be further explored by clicking on the Detail link on the right.
465
Answer Seizure Ratio (ASR). The Answer Seizure Ratio (ASR) reports contain information on
the ratio of successful calls to the total number of outgoing calls. The reports can be grouped
by source or destination IP address, source or destination Reg ID, Region, Supplier, Customer,
Day, Hour, or Minute. The List Calls option under ASR reports lists system ASR calls for a given
day.
Network Efficiency Ratio (NER). NER reports are engineering reports based on the Network
Efficiency Ratio (NER). The NER better represents pure network performance (compared to
ASR) by eliminating user behaviour as a factor.
The reports can be grouped by source or destination IP address, source or destination Reg ID,
region, supplier, customer, day, hour, or minute.
Quality of Service (QoS). Quality of Service (QoS) reports are engineering reports that contain
data on the call quality measurements that are captured in the CDR. The reports can be
grouped by source or destination IP address, source or destination Reg ID, region, supplier,
customer, day, hour, minute, source or destination codec.
466
467
468
ASR by Source IP
ASR by Destination IP
ASR by Region
ASR by Supplier
ASR by Customer
ASR by Day
ASR by Hour
ASR by Minute
List Calls
469
470
471
472
NER by Destination IP
NER by Region
NER by Supplier
NER by Customer
NER by Day
NER by Hour
NER by Minute
473
474
QoS by Destination IP
QoS by Region
QoS by Supplier
QoS by Customer
QoS by Day
QoS by Hour
QoS by Minute
475
Region by Calls
Region by Minutes
Region by Revenue
Region by Profit
Supplier by Calls
Supplier by Minutes
Supplier by Revenue
Supplier by Profit
Customer by Calls
Customer by Minutes
Customer by Revenue
Customer by Profit
Orig IP by Calls
Orig IP by Minutes
Orig IP by Revenue
Orig IP by Profit
Term IP by Calls
Term IP by Minutes
Term IP by Revenue
Term IP by Profit
476
477
478
479
480
481
Practice
Lab Exercises
1. Generate an ASR by Day report for your allocated SBC, for a complete
working week period on the dates advised by your instructor. The period
should start at midnight on the first date, and finish at 23:59 on the last date.
2. Viewing the resulting output, identify which day had the most calls and click
the Detail link
a) How many calls were;
b) Successful____________ Abandoned___________ Error ________
Busy___________
3. Still using the above results, click on the Successful calls Detail link and then
click the Detail link for the very latest record listed.
a) a. Identify the CDR filename this record came from:
________________________________
b) Which end cleared down first? Source or
Destination?______________________________
c) c. Close Report windows to return to the RSM gui.
4.
Generate an NER by Source IP for this week, from 09:00 Monday until the
current date/time.
a) If available Select the first Error listed and click Detail If no Errors listed
change date/time to look back further until you find one.
b) In resulting list select Detail for Error again.
c) Note the Error name listed on the right, click Detail for one of them and
see where this error text is shown in the CDR.
d) Close Report windows to return to the RSM gui.
5.
482
cdrTotalPage / cdrPage : 1 / 1
Call_ID / smInstance
: 0x4000252 / 594
: TIME_GUARD_DEFAULT (0)
: LONG_DURATION_DEFAULT (0)
Origination Time
Answer
Time
Disconnect Party
Orig Disc Time
: DP_ORIG (1)
: Wed Oct 29 15:02:53 2014 (892 ms)
: NOT SET
: NOT SET
: NOT SET
483
Calling Party ID
: 17722857863 INTERNATIONAL NPI_ISDN PRES_RSTR_ALLOWED
SCR_NETWORK_PROVIDED
Charge Number
Dialed Number
: 2920262431
Called Party ID
: 2920262431 NATIONAL NPI_ISDN PRES_RSTR_ALLOWED
SCR_NETWORK_PROVIDED
Routing Number
: 2920262431 NATIONAL NPI_ISDN PRES_RSTR_ALLOWED
SCR_NETWORK_PROVIDED
Switch Id Routing
Digit Type
:N
: DT_NATIONAL (4)
: 616 / 1
TrunkGroup/CircuitID : 616 / 1
Term physical circuit
line-trunk type / MSF : ISUP (1)
span / channel
:5/6
TrunkGroup/CircuitID : 8999 / 6
Terminate Type Orig/Term : TT_ACCESS (1) / TT_ACCESS (1)
Orig Carrier Network No : 000000
Orig Routing Indicator : TANDEM (1)
Orig Carrier Type / ID : CT_FGD (1) / 0000
Term Carrier Network No : 000000
Term Routing Indicator : DIRECT (0)
Term Carrier Type / ID : CT_FGD (1) /
: 31
:0/0
:0
:0
: OLI_NOTPRESENT (255)
: INVALID (0)
SCP Feature ID
:0
: FEATURE_NONE (0)
:0
: / NOT_APPLICABLE (0)
: / NOT_APPLICABLE (0)
: SANTERA / CODEC_TYPE_G_729_CS_ACELP / 2
: N/A
EC Request Status
: no EC error
485
Outpulsed Digits
: 2920262431
: NO_PREFIX
: CPI_DELIVER
:0
Final Switch ID
:0
: N/A
Complete Code
Route List
: COMCODE_NORM
:0
: NO_PREFIX
Answer Type
: ANS_HARDWARE
QueuedFlag
:F
:0
AccessNode Switch ID
:1
: No
:F
:F
: INVALID
Account Code
Auth Code
:
:
:0
:
: 0x0
486
: NOA_NOTPRESENT
: No
Redirecting Number
:0
: False
: NO_CHARGE
Number Of Pulses
:0
Pulse Interval
:0
:0
:0
: 0x0
Original Switch Id
Call Mode
:0
: 0 / (0=Voice, 1=Fax Pass-thru, 2=Fax Relay)
: 0 / (0=No, 1=Yes)
: 0x4000252 / 4194898
: 10.92.184.165:5060
: 10.92.189.74:5060
: 10.92.189.74:5060
Remote User ID
: 17722857863
487
: 10.92.184.209:32538
: 10.92.157.149:35092
:0
Tx RTP Packet Lo
: 25338
Tx RTP Octets Hi
:0
Tx RTP Octets Lo
: 506760
:0
Rx RTP Packet Lo
: 25268
Rx RTP Octets Hi
:0
Rx RTP Octets Lo
: 505360
Rx Packet Lost Hi
:0
Rx Packet Lost Lo
: 51
: 10.92.157.149:35093
Tx Payload Type
: 11, 0, 0, 0
Tx Packet Lost Hi
:0
Tx Packet Lost Lo
:1
Tx Jitter Max
:0
Tx Jitter Mean
:0
Rx Jitter Max
: 32
Rx Jitter Mean
Round Trip Max
: 24
: 74
:0
IP to IP Switch Count
:0
488
:0
:4
: %0.00
: %0.20
:1
: 1 / 11
: 15 / 255
EC Group Id / EC Chan Id
: 1 / 68
EC Id In Group
:1
: 4445 / 0
:
: 0x0
: NOT SET
489
490
491
492
493
494
495
496
497
SNMP Basics
You must first configure the SNMP agent to monitor the health of the SBC. By means
of SNMP GETS for collecting statistics and traps for collecting events, SNMP lets an
NMS (Network Management System) like the RSM monitor one or more SBC's
remotely by using SNMP-compliant or other management software to receive traps.
Traps are SNMP notifications, sent over the network to specific NMS hosts, when
events occur. The configured SNMP agent generates traps for SBC events like disk
space warnings and authentication failures. The agent also performs GENBAND
proprietary MIB notifications.
The SBC SNMP support uses SNMPv3 security for authentication and authorization.
You must configure correct authentication details (user, password, encryption
method, etc.) in both the SBC and the NMS that will receive traps from the SBC.
If SNMPv3 security is not required, you can configure the SBC SNMP agent to use the
SNMPv2c security model.
Note: Trap messages are sent through the SBC's Ethernet management interface.
498
499
500
501
502
503
504
505
Heartbeat Management
The heartbeat monitor allows you to set up how often, in seconds to monitor the
heartbeat of the SBCs. Note: The heartbeat message sent by the SNMP agent is
Heartbeat.
Threshold Management
The Threshold Management Menu allows you to monitor the Ethernet Links, Free
Disk Space, Memory Usage and Idle CPU.
Things you should know about Threshold Management:
A trap is not sent after every check, even if a link remains down. Rather, a
new trap is sent only when any of the links changes status, either up or
down
Multiple thresholds can be defined for one partition
Traps are triggered when monitoring shows that a threshold has been
exceeded since the previous check. If memory usage continues to exceed
the threshold, traps are not resent after each check. Rather, another trap is
sent when monitoring shows that memory usage falls below the threshold
and then exceeds the configured threshold again
A trap is not sent after every check, even if a link remains down. Rather, a
new trap is sent only when any of the links changes status, either up or
down
506
Login Management
Login Management monitors SSH login attempts and report when an invalid login is
attempted. The trap information will identify the address of the machine from which
the invalid login was attempted and will include whether what was entered was an
invalid username or an invalid password.
507
508
509
510
511
512
513
Field
Description
Event Type
The type of event: CDR, Polled Stats, log, SNMP incident, or system.
The specific type of alarm within the specified category, for example, ASR
(CDR alarm type) or Audit (Log alarm type).
Status
The severity of the event: Critical, Major, Minor, Warning, Info, Clear.
Failure Object
Type
The type of object that was responsible for generating the event
Failure Object
Identifier or name of the object that was responsible for generating the
event.
Host
Device IP
Category
Identifies the category to which the event belongs: GENView-RSM uses the
category to correlate events into alarms. There will be only one alarm for
multiple events for the same failure object and category.
Message
Description
Partition ID
The numeric identifier assigned to the partition that generated the alarm.
If applicable, the trap OID of the associated trap sent from the SBC.
514
515
7. To add sorting criteria to the filter, click the + icon in the Sorting order field. From
the drop-down list, select the column you want to sort on. Specify whether you want
to sort in Ascending or Descending order. You can specify multiple sorting criteria.
8. Click Delete to delete the selected filter.
9. Click Save to save filter criteria to the database using the name you specify.
10. Click the Set as Default checkbox to make this filter the default. Every time you
open the Events page, the default filter will be applied. The Events page will list just
those events that meet the criteria in the default filter.
11. Click Show to refresh the Events page using the criteria from the filter you select.
12. Click Reset to clear the value in the last field you edited.
13. Click Cancel to cancel the current filter configuration options and return to normal
display mode.
516
517
518
Give the Action a name This name will be seen later when configuring Alarms. It would be
beneficial if the name specifically identifies the Action.
519
520
521
522
523
524
525
526
Description
Type
The type of alarm: CDR, Polled Stats, log, SNMP incident, or system.
Severity
The severity level of the event: Critical, Major, Minor, Warning, and Clear.
Host
Name of the SBC cluster or the SBC which generated the event.
MSX IP
Failure Object
Type
The type of object that was responsible for generating the alarm.
Failure Object
Identifier of the object that was responsible for generating the alarm.
Message
Description
Brief description of the condition including the Alarm Message you specified in
the alarm configuration.
Clear
Ack/Unack
Owner
527
528
529
530
531
The GENView-RSM checks for the configured alarm thresholds in order from Critical
severity to Warning. When it detects that a threshold has been crossed, GENView-RSM
triggers an alarm and assigns it the severity of the highest level exceeded (most severe)
and executes the corresponding action. If no thresholds are crossed the GENView-RSM
continues to regularly check for the condition.
Once an alarm has been triggered, the GENView-RSM continues to monitor the condition,
changing the severity level of the alarm when appropriate, and executing the associated
action when changing to a new level. Once the monitored value falls within the Clear
range, the GENView-RSM clears the alarm and executes the Clear action.
532
533
534
535
536
Practice
Lab Exercises
1.
Log into the RSM Web GUI. Go to the Alarm Tab and select
Configuration/Action. Click Add.
2.
3.
Select Alarm Type of High Packet Loss. Give the CDR Alarm a name
based on your student/team number and select the SBC you have been
working on.
4.
5.
Select the Alarm Type and Partition of your choice, use your student/team
number as a basis for the name, select the appropriate SBC.
6.
Depending on the Alarm Type, data fill the Min CDR, Duration values.
7.
Enter a value for the Severity of Critical and select your Action. Add a
description then click Submit. Confirm the CDR Alarm is listed on the
resulting screen.
537
538
539
540
541
Events
On the events screen, you can freeze the screen so that no new events will appear as you are
viewing. This is helpful when you are analyzing a particular event because as events occur they
will be updated to the screen and it is therefore constantly changing. Freezing the screen will
prevent the screen from updating as you are looking at it .
When you freeze the screen the Events tab will change to red, indicating that the screen is
frozen.
542
543
Minor
Warning
Informational
544
Event Definition
The Event Definition tab provides a complete listing of all the events that the can be generated,
along with the event severity level, category, recommended severity level default.
Event Definition Details lets a user select whether the NOC is alerted to the event.
545
546
547
Query History
The user has the ability to query event/alarm history in the G9. To do this, the Current Data field
must be unchecked on the Filters and Query screen.
548
549
550
551
System Security
System Administrators (users) are configured on the G9 using the Security functions in the FCAPS
Management Access area or via the Go drop down box.
To add a user, you must add a user group or add a user to an existing user group. The user will
have the access rights and privileges that are set for the user group.
552
User Profile
The User Profile provides specific information pertaining to that unique User ID. An
Administrator that creates the User ID will define:
User ID
Group ID
Status
Password
Optionality the Administrator can define
An Inactivity Logout after a specified time of inactivity
Provide Contact Information
553
554
555
556
557
Performance Management
The system administrator can query performance data from the Query tab using any
combination of the following parameters:
Resource type
Date (uncheck On Demand for access to enter dates)
ID information (MG Node, Slot Number, etc.)
The selections the user makes in the Resource Type field determines the fields that display on
the Query tab. There are two types of data that can be provided with the query
Current Data
Historical Data
The query type the user selects determines the mandatory fields for running a query. The ID
section indicates whether the ID fields are mandatory or optional.
When the system administrator selects On Demand, the date and time fields are grayed-out
and provides current data.
When the system administrator deselects On Demand as the query type, the date and time fields
are active and the ID fields become optional. This provides historical data. The Resource Type
must have Monitor Performance set to Yes before Performance Stats are available in the
Performance option/area.
558
Query Results
After a Query has been requested, the window changes to the Query Results tab that provides a
display of all the results from the query.
559
Performance Control
The system administrator uses the Control tab to specify performance data collection controls
for system resources, such as how often the system collects performance data and how long the
data is retained.
560
561
562
5. Click Apply
6. Click OK
7. Click Apply Event Filter
8. What Event(s) has been filtered from all of the other Events?
_________________________________________________________
9. Click Disable Event Filter
563
564
565
566
567
568