Академический Документы
Профессиональный Документы
Культура Документы
V200R007C03
Issue 01
Date 2009-06-30
Website: http://www.huawei.com
Email: support@huawei.com
and other Huawei trademarks are the property of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but the statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Contents
2 Getting Started............................................................................................................................2-1
2.1 T2000 Process.................................................................................................................................................2-3
2.2 Starting or Shutting Down the T2000.............................................................................................................2-5
2.2.1 Starting the Computer............................................................................................................................2-6
2.2.2 Starting the T2000 Server......................................................................................................................2-7
2.2.3 Viewing the T2000 Process Status.........................................................................................................2-8
2.2.4 Logging In to the T2000 Client..............................................................................................................2-9
2.2.5 Changing the Login Server..................................................................................................................2-11
2.2.6 Exiting a T2000 Client.........................................................................................................................2-11
2.2.7 Shutting Down the T2000 Server.........................................................................................................2-11
2.2.8 Shutting Down the Computer...............................................................................................................2-12
2.3 Changing the Current User Password...........................................................................................................2-13
2.4 Setting Client Display...................................................................................................................................2-14
2.4.1 Setting the Main Frame Title...............................................................................................................2-14
2.4.2 Setting Output Display.........................................................................................................................2-14
2.4.3 Setting Topology Display Style...........................................................................................................2-15
2.4.4 Setting the Topology Background........................................................................................................2-16
2.4.5 Setting Alarm Colors............................................................................................................................2-17
2.4.6 Setting Alarm Local Display Properties...............................................................................................2-17
2.5 Customizing the Client Time Format............................................................................................................2-18
2.5.1 Setting the Time Format.......................................................................................................................2-18
3 Security Management................................................................................................................3-1
3.1 Security Management Strategy.......................................................................................................................3-3
3.1.1 Operating System Security Policy..........................................................................................................3-3
3.1.2 Database Security Policy........................................................................................................................3-4
3.1.3 Network Security Isolation Policy.........................................................................................................3-4
3.1.4 T2000 User Security Policy...................................................................................................................3-5
3.1.5 Log Management Policy........................................................................................................................3-7
3.1.6 NE Security............................................................................................................................................3-8
3.2 Users and Rights............................................................................................................................................3-10
3.2.1 OS User................................................................................................................................................3-10
3.2.2 Database Users and Authorities...........................................................................................................3-11
3.2.3 NMS Users and Rights.........................................................................................................................3-11
3.2.4 NE Users and Authorities.....................................................................................................................3-12
3.2.5 Concepts Related to the T2000 Users..................................................................................................3-12
3.2.6 T2000 User Rights Assignment Policies..............................................................................................3-14
3.3 Security Management Processes...................................................................................................................3-15
3.4 Managing SolarisSUSE Linux OS Security..................................................................................................3-17
3.4.1 Changing the Password of User root....................................................................................................3-18
3.4.2 Changing the Password of User sybase................................................................................................3-18
3.4.3 Changing the Password of User t2000.................................................................................................3-19
3.4.4 Removing Redundant Hosts Configuration Files.................................................................................3-19
3.4.5 Inhibitting User sybase from Using FTP..............................................................................................3-20
3.5 Managing Database Users.............................................................................................................................3-20
3.5.1 Changing the Password of sa...............................................................................................................3-20
3.5.2 Changing the Password of T2000user..................................................................................................3-21
3.6 Setting the Security Access of the T2000.....................................................................................................3-23
3.6.1 Setting SSL Protocol Communication Between Server and Client.....................................................3-23
3.6.2 Setting the System ACL of T2000.......................................................................................................3-25
3.7 Setting Security Policy for a T2000 User......................................................................................................3-26
5 Topology Management.............................................................................................................5-1
5.1 Basic Concepts................................................................................................................................................5-3
5.1.1 Topology Management Functions..........................................................................................................5-3
5.1.2 Topology Objects...................................................................................................................................5-4
5.1.3 Optical NE..............................................................................................................................................5-4
5.1.4 GNE and Non-Gateway NE...................................................................................................................5-4
5.1.5 Virtual NE..............................................................................................................................................5-5
5.1.6 Fiber Types.............................................................................................................................................5-5
5.1.7 Fiber/Cable Pipe.....................................................................................................................................5-6
5.1.8 Flow of Constructing the Network Topology........................................................................................5-6
5.2 Creating NEs...................................................................................................................................................5-7
5.2.1 Creating NEs in Batches........................................................................................................................ 5-8
5.2.2 Creating a Single NE............................................................................................................................5-10
5.2.3 Creating Optical NEs...........................................................................................................................5-12
5.2.4 Creating Virtual NE.............................................................................................................................5-13
5.3 Configuring the NE Data...............................................................................................................................5-14
5.3.1 Configuring the NE Data Manually.....................................................................................................5-14
5.3.2 Replicating the NE Data.......................................................................................................................5-16
5.3.3 Uploading the NE Data........................................................................................................................5-18
5.3.4 Configuring Virtual NE Data...............................................................................................................5-19
5.4 Configuring Master/Slave Subrack...............................................................................................................5-20
5.4.1 Master/Slave Subrack Configuration...................................................................................................5-21
5.4.2 Adding a Slave Subrack.......................................................................................................................5-23
5.4.3 Modifying Subrack Name....................................................................................................................5-23
5.4.4 Querying the Status of a Slave Subrack...............................................................................................5-24
5.4.5 Deleting a Slave Subrack.....................................................................................................................5-25
5.5 Adding Boards and Ports...............................................................................................................................5-25
5.5.1 Adding Boards......................................................................................................................................5-26
5.5.2 Adding Sub-Boards..............................................................................................................................5-27
5.5.3 Adding Dynamic Ports.........................................................................................................................5-27
5.5.4 Adding Client Side Ports......................................................................................................................5-28
5.5.5 Adding a Line-Side Port.......................................................................................................................5-29
7 Alarm Management...................................................................................................................7-1
7.1 Basic Concepts................................................................................................................................................7-4
7.1.1 Alarm Reporting Process.......................................................................................................................7-5
7.1.2 Alarm Handling Procedure.....................................................................................................................7-7
7.1.3 Alarm template.......................................................................................................................................7-9
7.1.4 Alarm Viewing Operations..................................................................................................................7-10
7.1.5 Alarm Setting Operations.....................................................................................................................7-12
7.1.6 Alarm Correlation Analysis.................................................................................................................7-16
7.1.7 Alarm Notification...............................................................................................................................7-19
7.1.8 Alarm Severity.....................................................................................................................................7-21
7.1.9 Alarm Status.........................................................................................................................................7-22
7.1.10 Alarm Category..................................................................................................................................7-23
7.1.11 Current Alarms and History Alarms..................................................................................................7-23
7.1.12 Alarm Statistics..................................................................................................................................7-24
7.1.13 Alarm Dumping..................................................................................................................................7-24
7.2 Customizing Alarm Template.......................................................................................................................7-25
7.2.1 Creating an Alarm or Event Browse Template....................................................................................7-25
7.2.2 Exporting or Importing an Alarm Template........................................................................................7-27
7.2.3 Creating the Alarm Statistics Template...............................................................................................7-28
7.2.4 Setting the Startup Template................................................................................................................7-30
7.2.5 Customizing Alarm Attribute Template...............................................................................................7-31
7.3 Synchronizing Alarms...................................................................................................................................7-32
7.3.1 Synchronizing Networkwide Current Alarms......................................................................................7-32
7.3.2 Synchronizing the Current Alarms for an NE......................................................................................7-33
7.3.3 Synchronizing the Current Alarms for the T2000................................................................................7-33
7.3.4 Setting Alarm Auto Synchronization...................................................................................................7-33
8 Performance Management........................................................................................................8-1
8.1 Basic Concept..................................................................................................................................................8-3
8.1.1 Performance Event Type........................................................................................................................8-3
8.1.2 Performance Reporting Process.............................................................................................................8-4
8.1.3 Performance Monitoring Settings.......................................................................................................... 8-5
8.1.4 Operation of Viewing Performance Data...............................................................................................8-6
8.1.5 RMON Performance.............................................................................................................................. 8-7
8.1.6 Performance Threshold..........................................................................................................................8-7
8.1.6.1 Current Performance and History Performance..................................................................................8-8
8.1.7 Performance Dumping........................................................................................................................... 8-8
8.1.8 Performance Analysis............................................................................................................................ 8-9
8.2 Viewing Performance Data.............................................................................................................................8-9
8.2.1 Viewing Current Performance Data.....................................................................................................8-10
8.2.1.1 Viewing History Performance Data..................................................................................................8-11
8.2.2 Viewing UAT Records.........................................................................................................................8-12
8.2.3 Viewing Performance Threshold Crossings.........................................................................................8-13
8.2.4 Viewing Current Performance Data of an Ethernet Port......................................................................8-14
8.2.5 Viewing History Performance Data of an Ethernet Port......................................................................8-15
8.2.6 Viewing Current Performance Data of an ATM Port..........................................................................8-15
8.2.7 Viewing History Performance Data of an ATM Port...........................................................................8-16
8.2.8 Viewing the Current Performance Data of an SDH Trail....................................................................8-16
8.2.9 Viewing History Performance Data of an SDH Trail..........................................................................8-17
8.2.10 Querying Current Performance of WDM Trails................................................................................8-17
8.2.11 Browsing the History Performance of WDM Trails..........................................................................8-18
8.2.12 Browsing the Performance of an Ethernet Trail.................................................................................8-18
8.2.13 Querying the NE Temperature...........................................................................................................8-19
8.3 Viewing RMON Performance Data..............................................................................................................8-20
8.3.1 Viewing History Group Performance..................................................................................................8-21
8.3.2 Viewing Statistics Group Performance of an Ethernet Port.................................................................8-23
8.4 Managing Lower Order Performance Data...................................................................................................8-25
8.4.1 Enabling Performance Monitoring for a Lower Order Path.................................................................8-25
8.4.2 Setting the Lower Order Performance Threshold................................................................................8-26
8.4.3 Setting the Lower Order Performance Monitoring Status....................................................................8-27
8.4.4 Viewing Current Lower Order Performance Data...............................................................................8-28
8.4.5 Viewing History Lower Order Performance Data...............................................................................8-29
8.4.6 Viewing UAT Records for a Lower Order Service..............................................................................8-30
12 Viewing Reports.....................................................................................................................12-1
12.1 Report Types Supported by the T2000....................................................................................................... 12-3
12.2 Viewing the Networking Diagram..............................................................................................................12-3
12.3 Viewing the Clock Tracing Diagram..........................................................................................................12-4
12.4 Viewing the Timeslot Allocation Diagram.................................................................................................12-5
12.5 Viewing the NE Information Report...........................................................................................................12-6
12.6 Viewing the Physical Location Information Report................................................................................... 12-7
12.7 Viewing the Equivalent NE Statistics Report.............................................................................................12-7
12.8 Viewing the Port Resource Statistics Report.............................................................................................. 12-8
12.9 Viewing the Board Information Report...................................................................................................... 12-8
12.10 Viewing the Slot Information Report........................................................................................................12-9
12.11 Viewing the Board Count Report............................................................................................................12-10
12.12 Viewing the Board Manufacturer Information Report............................................................................12-11
12.13 Viewing Common Manufacturer Information Report.............................................................................12-11
12.14 Viewing WDM NE Master/Slave Subrack Info Report..........................................................................12-12
12.15 Viewing the Lower Order Cross-Connection Statistics Report..............................................................12-12
12.16 Viewing the WDM Protection Group Switching Status Report.............................................................12-13
12.17 Browsing the Fiber Cable/Radio Link Resource Occupancy..................................................................12-14
13 Appendix..................................................................................................................................13-1
13.1 Performing Remote Maintenance................................................................................................................13-2
13.1.1 Remote Maintenance..........................................................................................................................13-2
13.1.2 Enabling a Remote Maintenance User...............................................................................................13-3
13.1.3 Performing Remote Maintenance.......................................................................................................13-4
13.2 Mutual Exclusion List for Multiclient Operations......................................................................................13-4
13.3 Timeslot Numbering Policy........................................................................................................................13-7
13.4 Configuration Data Management Information List.....................................................................................13-8
13.4.1 General Configuration Data Management Information List..............................................................13-9
13.4.2 SDH Configuration Data Management Information List.................................................................13-11
13.4.3 PTN Configuration Data Management Information List.................................................................13-21
13.4.4 WDM Configuration Data Management Information List...............................................................13-23
13.4.5 NG WDM Configuration Data Management Information List........................................................13-41
13.4.6 RTN Configuration Data Management Information List.................................................................13-51
13.4.7 Ethernet Configuration Data Management Information List...........................................................13-54
13.4.8 ATM Configuration Data Management Information List................................................................13-71
A Glossary.....................................................................................................................................A-1
B Acronyms and Abbreviations.................................................................................................B-1
Figures
Tables
Table 10-3 Characteristics and application scenarios of three data maintenance methods..............................10-11
Table 11-1 Backup and restoration methods and application scenarios.............................................................11-3
Purpose
The Operation Guide for Common Features describes the operations for common feature on the
T2000. This document also provides the glossary and the acronyms and abbreviations.
This document guides the user to understand basic operations of the T2000.
Related Version
The following table lists the product version related to this document.
Intended Audience
The intended audiences of this document are:
l Network Monitoring Engineer
l Data Configuration Engineer
l NM Administrator
l System Maintenance Engineer
Organization
This document is organized as follows.
Chapter Description
Chapter Description
9 Keeping Data in the T2000 Consistent This chapter describes how to keep data in the
with NEs T2000 consistent with NEs.
10 Backing Up and Restoring T2000 Data This chapter describes how to back up and
restore the T2000 data.
11 Backing Up and Restoring the NE Data This chapter describes how to back up and
restore the NE Data.
B Acronyms and Abbreviations This part lists the acronyms and abbreviations
used in the document.
Conventions
Symbol Conventions
The following symbols may be found in this document. They are defined as follows.
Symbol Description
General Conventions
Convention Description
Command Conventions
Convention Description
Convention Description
GUI Conventions
Convention Description
Keyboard Operation
Format Description
Mouse Operation
Action Description
Action Description
Update History
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Chapter 13 Appendix
l The function of datacenter operator operation set.
The following pages describe the main functions of the T2000, its position in the
telecommunication management network (TMN), and the new features of the T2000
V200R007C03 version.
The T2000 is a subnetwork management system (SNMS). In the TMN architecture, SNMS is
located between the NE layer and network layer. The T2000 supports all functions of the NE
layer and some of the network layer management functions. Figure 1-1 shows the position of
the T2000 in the TMN architecture.
NE NE ... NE NE NE NE
NE NE NE
NOTE
The T2100 is a network management system (NMS), and manages the subnetwork management system
(SNMS).
l Uniformly manage multiple types of equipment and services, including SDH, WDM, PTN,
RTN, submarine cable system, Ethernet, ATM, ASON, and SAN.
l Provide the Network Management System Maintenance Suite to complete the T2000
deployment and expansion, fault data collection, and northbound interface configuration.
l Deploy the processes of the NE management service, network service, and NBI service
independently.
l As a subnetwork management system (SNMS), provide all element management functions
and some network management functions.
l Support end-to-end trail management.
l Support both Windows, Solaris and SUSE Linux platforms, on which the same operations
are provided.
l Support distributed deployment.
l Support several open external interfaces, such as CORBA, SNMP, and MML.
l Provide Java-based graphical user interface, in a structure of "tree on the left and table on
the right".
l Provide powerful equipment search function, with which the user can search for and then
create NEs and fibers in batches.
l Provide complete alarm, configuration, performance and security (FCPS) management
functions.
l Support the IP, OSI and ECC communication protocols.
l Provide three high availability solutions, including Veritas hot standby, Veritas warm
standby, and 1:N cold standby.
l Provide several tools and methods for data backup and restoration , to ensure network data
security.
l Provide various reports and drawings.
Table 1-1, Table 1-2 and Table 1-3 lists the SDH equipment that the T2000 V200R007C03
manages.
OptiX OSN 2500 REG STM-16 regenerator OptiX OSN 2500 REG
Table 1-4 lists the WDM equipment that the T2000 V200R007C03 manages.
Metro WDM series OptiX Metro 6020 compact OptiX Metro 6020
container CWDM system
V100R001
LH WDM series OptiX BWS 320G backbone OptiX BWS OAS, OptiX
DWDM optical transmission BWS OCS, OptiX BWS OIS
system V300R002
NOTE
The OptiX BWS 1600G OLA is an independent power supply subrack. It is supported by the OptiX BWS
1600G backbone DWDM optical transmission system V100R004 and higher versions.
Table 1-5 lists the RTN equipment that the T2000 V200R007C03 manages.
Table 1-6 lists the submarine line equipment that the T2000 V200R007C03 manages.
Table 1-7 lists the PTN equipment that the T2000 V200R007C03 manages.
OptiX PTN 1900 optical network PTN series OptiX PTN 1900
multi-service packet transmission platform
OptiX PTN 3900 optical network PTN series OptiX PTN 3900
multi-service packet transmission platform
OptiX PTN 912 optical network PTN series OptiX PTN 912
multi-service packet transmission platform
OptiX PTN 910 optical network PTN series OptiX PTN 910
multi-service packet transmission platform
OptiX PTN 950 optical network PTN series OptiX PTN 950
multi-service packet transmission platform
T2000 Deployment
l The T2000 server supports the SUSE Linux + Sybase platform.
l The T2000 server supports the distributed deployment on the Solaris and SUSE Linux.
Specifically, the functions includes deleting and migrating instances from a slave server,
monitoring the NMS status of a slave server, starting and stopping the T2000 on the master
server and slave servers simultaneously.
l The T2000 client supports the Windows Vista.
l The T2000 supports the blade server that can run on SUSE Linux and Windows.
l The T2000 supports the installation of single servers on Solaris and SUSE Linux in a
distributed manner.
l The T2000 supports the installation of the HA system (Veritas hot standby) in a distributed
manner.
l The MSuite supports the fault analysis tool for the T2000.
l The MSuite supports the functions of downloading the dump files and downloading files
from the server.
l The MSuite client can be automatically upgraded by using the CAU tool.
Other Changes
l Based on the original upgrade scheme, the T2000 supports a new upgrade scheme, to
achieve a quick version upgrade.
NOTE
The new upgrade scheme is only applicable to an upgrade from T2000 V200R007C01, T2000
V200R007C02 to T2000 V200R007C03 by the database upgrade mode.
l The T2000 V200R006C01 and V200R006C03 can be directly upgraded to V200R007C03
by using the upgrade wizard.
l In the Veritas hot standby and warm standby schemes, the version of the Veritas software
is changed from 4.1 to 5.0.
l In the case of the HA system (Veritas hot or warm standby), the T2000 supports a quick
installation of the Solaris operating system and its patch, and the HA software.
l In the Veritas hot standby scheme, the VCS no longer directly monitors the NMS processes.
The VCS monitors only the NMSServer and NMSAgent processes. With the NMSServer
process, you can start and stop the T2000, and monitor the status of the T2000 server. With
the NMSAgent process, you can ensure that the T2000 is shut down during the automatic
switching triggered by a T2000 failure. The service processes of the T2000 are monitored
on the System Monitor.
NOTE
With the preceding changes, the only difference between the operations on the T2000 for single server
and HA system schemes is in the operations to start and stop the T2000. The other operations to start
and stop the service processes of the T2000 between the two schemes are the same.
l In the function of backing up the NMS information (include the deployment information
about the T2000 and the database of the T2000). After the backup operation, the backup
data is saved simultaneously in the backup directory on the client of the NMS maintenance
suite.
l In the function of restoring the NMS information (include the deployment information
about the T2000 and the database of the T2000). In addition, cross-operating system, cross-
scheme (HA scheme or single server scheme) restoration is supported. In this case,
however, only the deployment information about the T2000 can be restored. The data of
the database cannot be restored.
l The T2000 supports the ability to import and export script files by subnet.
l The networkwide maintenance status indicator is optimized. When the maintenance status
indicator is on, no query is performed before a specific status category is specified for query.
l The T2000 supports the ability to manage DC user login.
l The T2000 supports the ability to modify the NE ID on the T2000.
l The T2000 supports the ability to configure the equipment to automatically enable LCT
access rights after the communication between the equipment and T2000 stops.
New Equipment
The T2000 V200R007C03 supports no new equipment.
New Boards
Table 1-8 lists the new boards supported in the T2000 V200R007C03.
Equipment Board
New Features
The T2000 V200R007C03 supports the following new features:
l New Features for OSN 1500, OSN 3500
– Supports the features of L2VPN.
– Supports the management of multiprotocol label switching (MPLS) tunnels.
– Supports OAM management for MPLS tunnels, OAM management for Ethernet
services and OAM management for Ethernet port.
– Supports the following QoS features: configuring the differentiated service (DiffServ)
domains, port policy, CAR policy, Port WRED Policy, V-UNI ingress policy, V-UNI
egress policy, PW policy, weighted random early detection (WRED) congestion and
discarding policy of services, QinQ policy, weighted fair queuing (WFQ) schedule
policy, and mapping between the CoS priority and the scheduling queue.
– Supports the control plane for configuring the static routes and address resolution.
– Supports the management of the Ethernet multi-service transmission platform (MSTP)
protocol and the Internet group management protocol (IGMP) Snooping.
– Supports the management of the Ethernet interface.
– Supports the automatic protection switching (APS) of MPLS tunnels.
– Supports the packet Ethernet services including E-Line service, E-LAN service, E-
AGGR service and clock service.
– Supports the management of inband DCN.
l New Features of SDH Network
– Supports the ability to manage SDH platinum services.
– Supports the ability to manage fiber/cable pipes.
– Supports the service alarm analysis function.
l Optimize the SDH ASON Features
– Supports the SDH UNI service management.
– Supports the ability to create associated SDH services of the same source and query the
synchronization status of associated SDH services of different source nodes.
– Supports the in-service migration between a diamond SDH ASON trail and a gold SDH
ASON trail.
– Supports the ability to query the timeslot segmentation of links.
New Equipment
The T2000 V200R007C03 supports no new equipment.
New Boards
Table 1-9 lists the new boards supported in the T2000 V200R007C03.
Equipment Board
New Features
The T2000 V200R007C03 supports the following new features.
l New Features for the OptiX OSN 1800: The LQG board supports the mapping of client-
side services to WDM-side FEC5G or OTU5G services.
l New Features for the OptiX OSN 3800, OptiX OSN 6800
– Supports the ability to enable scrambling for FC services.
– Supports the WDM ports for the black-and-white light on the OTU board.
– Supports IEEE-1588 clocks and Ethernet synchronous clocks.
– Supports the relay mode for the TN12ND2 board, and supports the ability to set and
query the working mode for the TN12ND2 board.
– Supports the ability to set and query new fiber types and the dispersion coefficient.
– Supports the ability to set and query the compensation value of a dispersion
compensation module (DCM).
– Supports the ability to set and query the cable length for cascaded clock ports.
– Supports the ability to set and query time precision compenstation and the compensation
mode.
New Equipment
The T2000 V200R007C03 supports no new equipment.
New Boards
Table 1-10 lists the new boards supported in the T2000 V200R007C03.
Equipment Board
New Features
The T2000 V200R007C03 supports the following new features:
l Supports the 1+N optical path protection.
l Supports the ability to set the rights of users to manage the laser switch of the UHBA board.
Maintainers are assigned with the rights by default.
l Supports the ability to configure return loss detection thresholds for the UHBA, OPA, and
OBA boards.
l Supports the orderwire functions of the LU40S, LUR40S, and TMX40S boards.
l Supports the E1 cross-connect functions of the LU40S, TMX40S, and LUR40S boards.
l Supports the pseudo-random binary sequence (PRBS) functions of the LU40S and
TMX40S boards.
l Supports the ESC protocol mode for the LU40S, TMX40S, and LUR40S boards.
l Supports the ability to release disabling IPA function automatically in the automatic release
of NE functions.
New Equipment
Table 1-11 lists the new equipment supported in theT2000 V200R007C03.
New Boards
Table 1-12 lists the new boards supported in the T2000 V200R007C03.
Equipment Board
New Features
T2000 V200R007C03 supports the following new features:
l The RTN 605 supports the following new features:
– Supports the Hybrid and AM features. Therefore, the E1+Ethernet services can be
carried, thus enhancing the usability of links.
– Supports the clock features of setting the priority table of NE clock sources and querying
the currently-traced clock source.
– Supports Ethernet services.
– Supports the QoS management.
– Supports the link aggregation group.
– Supports 802.3 ah ETH OAM and 802.1 ag ETH OAM.
– Supports the ability to manage Ethernet interfaces.
– Supports the RMON performance.
l The RTN 610/620 supports the following new features:
– Supports the Hybrid and AM features. Therefore, the E1+Ethernet services can be
carried, thus enhancing the usability of links.
– Supports the ability to configure board shaping in the QoS management.
– Supports the ability to manage Ethernet interfaces.
– Supports the RMON performance functions such as browsing history groups of Ethernet
ports, collecting performance statistics of a group, setting an alarm group of Ethernet
ports, and setting a history control group.
– Supports LPT management and point-to-multipoint LPT management.
– Supports the 802.1 ad bridge.
– Supports the link aggregation group.
– Supports 802.3 ah ETH OAM and 802.1 ag ETH OAM.
– Supports the SDH performance.
– Supports the ability to diagnose protocol faults and restore protocols.
– Supports the ability to configure the traffic load sharing algorithm for the EMS6 board
in an LAG.
– Supports the ability to set the LAG revertive mode.
– Enable IEEE-1588 overhead bytes.
– Supports the ability to query the Ethernet license.
– Supports the ability to set the maximum transmit power of the ODU interface.
l The RTN 910 supports the following new features:
– Supports the feature of packet-based microwave.
– Supports the offload protection between MPLS tunnels and IP or GRE tunnels.
– Supports the IEEE 1588 packet clock.
– Supports PWs with UDP encapsulation that are carried in IP tunnels.
– Supports the ability to configure the long and short serial numbers for an MP group.
– Supports the ability to set the maximum transmit power of the ODU interface. The
function of compressing the MAC address for a microwave interface is deleted.
– Supports a centralized clock domain. An ACR clock can be configured as a system clock
source.
l The RTN 950 supports the following new features:
– Supports the feature of packet-based microwave.
– Supports the offload protection between MPLS tunnels and IP or GRE tunnels.
– Supports the IEEE 1588 packet clock.
– Supports PWs with UDP encapsulation that are carried in IP tunnels.
– Supports the ability to configure the long and short serial numbers for an MP group.
– Supports the ability to set the maximum transmit power of the ODU interface. The
function of compressing the MAC address for a microwave interface is deleted.
– Supports a centralized clock domain. An ACR clock can be configured as a system clock
source.
New Equipment
Table 1-13 lists the new equipment supported in the T2000 V200R007C03.
OptiX PTN 910 optical network PTN series OptiX PTN 910
multi-service packet transmission platform
OptiX PTN 950 optical network PTN series OptiX PTN 950
multi-service packet transmission platform
New Boards
Table 1-14 lists the new boards supported in the T2000 V200R007C03.
New Features
The T2000 V200R007C03 has the following new functions:
l Supports the ability to replace board.
l Supports the mixed Ethernet interfaces at Layer 2 and Layer 3.
l Supports the mixed VLAN sub-interfaces at Layer 2 and Layer 3.
l Supports the ability to configure the long and short serial numbers for an MP group.
l Supports the features of packet-based microwave.
– Supports the ability to configure a microwave interface, including basic attributes, IF
attribute, L2 attribute, L3 attribute, and advanced attributes.
– Supports the ability to configure a radio link, including the IF 1+1 protection, IF boards,
and ODU boards.
– Supports the HOP management.
– Supports the ODU interface.
l Supports the ability to configure an IS-IS protocol instance.
l Supports the ability to create CES service carried by IP/GRE Tunnel.
l Supports the ability to configure the timeslot mode of the E1/VC12.
l Supports the ability to configure the OSPF protocol.
l Supports the ability to configure the MP-BGP protocol.
l Supports the ability to configure the IEEE 1588 packet clock.
l Supports the ability to configure the TOP packet clock.
l Supports the PWs with UDP encapsulation that are carried in IP tunnels.
l Supports the offload protection between MPLS tunnels and IP or GRE tunnels.
l Supports the ability to configure L3VPN trails.
– Supports the ability to create L3VPN trails.
– Supports the ability to search for L3VPN trails.
– Supports the ability to filter L3VPN trails.
– Supports the ability to view alarms generated on L3VPN trails.
– Supports the ability to view performance events generated on L3VPN trails.
– Supports the ability to view PE nodes on L3VPN trails.
– Supports the ability to view the UNI interfaces of L3VPN trails.
– Supports the ability to view the ARP table of L3VPN trails.
– Supports the ability to view the tunnels of L3VPN trails.
– Supports the ability to view the routing protocol of L3VPN trails.
– Supports the ability to view the router target rule of L3VPN trails.
– Supports the ability to view the FIB table of L3VPN trails.
– Supports the ability to view the routing table of L3VPN trails.
l Supports the ability to configure L2VPN trails.
– Supports the ability to create L2VPN E-Line trails.
– Supports the ability to search L2VPN trails.
2 Getting Started
The following pages introduces some preparation operations that will ensure a smooth, trouble-
free launch of the T2000.
The Main Menu and submenus of the T2000 are described as follows.
2.12 Custom View
The custom view is a topological view similar to the Main Topology. In the T2000, different
users have different network management scopes. The T2000 provides many view setting modes,
including customizing views and setting to start views. The user can customise a view for the
network topologies and equipment under administration as a working interface. The custom
view window displays the topological structure of the network, including links, subnets or
NEs.You can set a corresponding view according to requirements to facilitate the management
of network topologies.
2.13 Customizing Parameter Display
You can customize the display of parameters by placing the important parameters that you use
on a regular basis, in a place that is easy to find. You can also hide the parameters that are not
regularly used.
2.14 Customizing Naming Rule
When you create fibers or trails, the T2000 automatically creates the names of the fibers, trails
and ASON trails based on the naming rule. The settings can be modified according to actual
requirements. This section takes the fiber naming rule as an example to illustrate how to
customize the naming rule.
2.15 Copying Table Text Quickly
The T2000 allows you to copy and paste table text. You can copy text from a table to other
programs quickly.
2.16 Filtering Operation Objects in a View
The topology view displays submaps, links, and device nodes. When there are too many objects,
to be located in You can use the filter tree to filter the objects in the view according to the object
type.
2.17 Moving Operation Objects
You can move the operation objects that are shown in the Main Topology.
2.18 Searching for NEs in a View
This operation enables you to find an NE quickly.
2.19 Counting the Number of NEs
By counting the number of NEs,you can learn the number of NEs that are created on the T2000
and the number of the equivalent NEs. The NEs contain real, preconfigured, and virtual NEs.
2.20 Setting Parameters in the List
On the T2000 GUI, the Object Tree is arranged on the left and the parameter list is arranged on
the right. All the parameters are set in the list. To perform operations in the NE Explorer, follow
the procedure.
2.21 Operation Precautions
The operation precautions that have to be taken to ensure correct operations are as follows:
2.22 Rules of Entering Information on User Interface
These rules specify the typing requirements for the text boxes in the T2000 operation interface.
These text boxes are used to enter character strings, file names, IP addresses, MAC addresses,
numerals, passwords, dates, time, and so on.
Context
l You are recommended to start the computer and the T2000 application in the following
sequence: Start the computer, start the T2000 server, and then start the T2000 client.
l You are recommended to shut down the T2000 application and the computer in the
following sequence: Exit the T2000 client, stop the T2000 server, and then shut down the
computer.
2.2.1 Starting the Computer
To avoid equipment damage or data loss, strictly follow the procedure provided, to start the
computer. The startup procedures of the workstation are different from that of a normal PC.
Perform the startup procedure according to the actual situation.
2.2.2 Starting the T2000 Server
For network management first start the T2000 server, and then start the T2000 server application.
2.2.3 Viewing the T2000 Process Status
If the process status of the T2000 server is abnormal, the T2000 client may fail to be logged in
or may run abnormally. In this event, you can view the status of each process of the T2000 server
in the user interface of the System Monitor client.
2.2.4 Logging In to the T2000 Client
To manage networks through the T2000 client graphical user interface, you need to use the
T2000 client to access to the T2000 server.
Prerequisite
l The T2000 must be installed successfully.
l The power cable of the workstation or the computer, the power cable of the monitor, data
line and Ethernet line must be connected correctly.
l If there is printer, modem or other peripherals, their power line and data line must be
connected correctly.
l If there is disk array, start the disk array first.
Context
The T2000 supports Windows, Solaris and SUSE Linux operating systems. For details on the
hardware, refer to the OptiX iManager T2000 Product Description.
Procedure
l On Windows
1. Power on the printer, modem and other peripherals.
2. Power on the computer and the Windows is automatically started. The Login dialog
box is displayed.
3. Enter the Username and the Password in the Login dialog box.
4. Click OK to open the Windows user interface.
l On Solaris
NOTE
In the case of a distributed system, you need to start the master server, slave servers, and then slave
protection servers.
----End
Prerequisite
l The computer where the T2000 is installed must be started correctly.
l The operating system of the T2000 server must be running correctly and the database must
be started normally.
l The T2000 license must be in the correct directory.
l In the case of the distributed system, the slave server must be started and the communication
among the master server and slave server must be normal.
l In the case of the distributed system, the server of the network management system
maintenance suite on the T2000 server, including the master server and slave server must
be started.
l The instance must be deployed.
Context
NOTE
Normally, when the operating system is started, the network management system maintenance server is
started automatically along. You can also manually start the network management system maintenance
server by running the following commands:
l On Windows,
> cd C:\HWMSuite\server\
> msserver
l On Solaris,
# /etc/rc3.d/S91msserver start
l On SUSE Linux:
# /opt/HWMSuite/server/bin/msdaemon.sh start
Procedure
l If the operating system of the server is Windows:
1. Double-click the T2000Server icon on the desktop of the T2000 server. The Login
dialog box is displayed in a few seconds.
2. Enter the User Name, Password and Server.
For example, User Name: admin, Password: T2000 (T2000 by default) and Server:
Local.
NOTE
Periodically change the password and memorize it.
3. Click Login to display the System Monitor window.
NOTE
If the System Monitor client application is started, you can restart the T2000 server on the
System Monitor client. Perform the following step:
Choose System > Start All NMS Service on the Main Menu of the System Monitor client.
l If the operating system of the server is Solaris:
1. Double-click the T2000Server icon on the desktop of the T2000 server. The Login
dialog box is displayed in a few seconds.
2. Enter the User Name, Password and Server.
For example, User Name: admin, Password: T2000 (T2000 by default) and Server:
Local.
NOTE
Periodically change the password and memorize it.
3. Click Login to display the System Monitor window.
NOTE
If the System Monitor client application is started, you can restart the T2000 server on the
System Monitor client. Perform the following step:
Choose System > Start All NMS Service on the Main Menu of the System Monitor client.
– In the case of the non-distributed system, if the database process, T2000 core
process, and the processes that are optional according to the actual situation are in
the Running state, it indicates that the T2000 server is started.
– In the case of the distributed system, if the database process, T2000 core process,
and the processes that are optional according to the actual situation of the master
server, slave server, and slave protection server (optional) are in the Running state,
it indicates that the T2000 server is started.
l If the operating system of the server is SUSE Linux:
1. Use the t2000 to logging in the server.
2. You can manually start the T2000 server by running the following commands:
% /T2000/server/bin/t2000server
----End
Context
NOTE
l To view the status of the T2000 processes by Solaris command line, run the following command as
user t2000:
% /T2000/server/bin/showt2000server
If each process entered has a corresponding process ID and the specific ID does not change, the T2000
processes are normal.
l To view the status of the T2000 processes by SUSE Linux command line, run the following command
as user t2000:
% /T2000/server/bin/showt2000server
If each process entered has a corresponding process ID and the specific ID does not change, the T2000
processes are normal.
Procedure
Step 1 Start and log in to the System Monitor.
Step 2 In the user interface of the System Monitor, click the Process tab, and view whether the status
of each process is Running.
NOTE
When the Sybase database is used and the number of CPUs configured for the T2000 server exceeds eight,
the database management tool automatically increases the number of engines configured for the Sybase
database to enhance the performance of the Sybase database. The number of CPUs configured for the
Sybase database is increased according to the principle of 1/4 of total number of CPUs (the value down
to a nearest integer). For example, if the number of CPUs is 9, the database management tool automatically
configures two engines for the Sybase database. In this case, the System Monitor of the T2000 displays
two database processes.
l If the process status is Stopped, right-click on the process, and choose Start Process from
the shortcut menu. In this way, the status of the process is Running.
l If the manual startup fails, it indicates that the process is abnormal.
l To save resources, you can close unwanted processes. Set the startup mode of the desired
process to Manual, and then select Stop Process.
----End
Prerequisite
The T2000 server must be started correctly.
Context
NOTE
When the T2000 server and the T2000 client are not on a computer, the IP address that is used during the
first login to the T2000 client is added to the ACL automatically. Other IP addresses, however, can be used
during login to the T2000 client only after they are added to the ACL manually.
l On the T2000 client, choose System > NMS Security Settings > ACL from the Main Menu.
l Click Add. In the dialog box displayed, enter related information.
l Select IP address or segment and set an IP address or network section that can be accessed
according to the Example of format.
l Select Start IP address to end IP address and set the range of IP addresses that can be accessed
according to the Example of format.
Procedure
Step 1 On the computer that is installed the T2000 client, double-click the T2000Client icon on the
desktop.
NOTE
In the case of the SUSE Linux operating system, the T2000 client cannot be installed on a local computer.
Therefore, you need to double-click the T2000Client icon on the desktop of the remote computer where
the T2000 client is installed.
The version of the T2000 client must be consistent with the version of the server to be logged in.
l By default, the initial user name is admin, and the password is T2000. To protect the T2000 from
unauthorized logins, you need to immediately change this password.
l The administrator needs to create new T2000 users and assign them to certain authority groups.
l After the automatic login is selected, you do not need to enter the user name and password.
l The IP address is the IP address used by the T2000 server. In the case of a distributed system,
select the IP address of the main server.
l The Mode has two options including Common and Security (SSL). When you choose the
Security (SSL) mode, the communication between the client and the server is encrypted.
l The communication mode of the client must be consistent with that of the server. Otherwise, the
client cannot log in to the server. To view the communication mode of the server, choose
System > Communication Security Setting on the Main Menu of the System Monitor client.
l You need not enter the Port number. After the Mode is specified, the system selects a Port
number automatically. It is recommended to use the default port.
4. Click OK to complete adding a server.
5. Click OK to complete the server settings.
Step 4 Select a server and click Login to access the Main Topology of T2000.
----End
Prerequisite
l The login account is set for the server to be switched.
l The IP address of the client is added to the ACL of the server to be switched.
l In the Server Settings dialog box, the settings of the server to be switched are added.
Procedure
Step 1 Choose File > Change Login Server from the main menu.
Step 2 In the Change Login Server dialog box, select the server you want to access, and then click
OK.
Step 3 In the Change Login User dialog box, enter User Name and Password, and then click OK.
----End
Prerequisite
The T2000 client must be started normally.
Procedure
Step 1 Choose File > Exit from the Main Menu.
Step 2 Click OK in the confirmation dialog box.
NOTE
If the layout of the view is changed and not saved, the Confirm dialog box appears asking you whether to
save the changes. After you confirm the dialog box, automatically exit the client.
----End
Prerequisite
All the T2000 clients connected to the T2000 server must be shut down.
Context
NOTE
l when performing the operations related to the database (such as initializing the T2000 database,
restoring T2000 databases and restoring T2000 MO data) or the operations related to the T2000 (such
as the upgrade, installing patches and re-installing the T2000), you need to shut down the T2000 server
first. You are recommended to shut down the T2000 server in the way of shutting down the T2000
server and the System Monitor Client.
l In the case of a distributed system, perform this operation on only the master server.
Procedure
l Shut down the T2000 server only.
1. From the Main Menu of System Monitor Client, choose System > Stop All NMS
Services to close all processes of the T2000 server.
2. Click OK in the confirmation dialog box. Wait until the T2000 core process, and the
processes that are optional according to the actual situation are in the Stopped state.
Now the T2000 server is shut down successfully.
Now you cannot shut down the MDP process or initialize the database.
l Shut down the T2000 server and the System Monitor Client.
From the Main Menu of System Monitor Client, choose System > Shutdown System to
shut down the T2000 server and the System Monitor Client. Click OK in the confirmation
dialog box.
On Solaris, you can run /T2000/server/bin/shutdownserver in the terminal window of
master server also.
On SUSE Linux, you can run /T2000/server/bin/shutdownserver in the terminal window
of master server also.
After all the T2000 processes are finished, you can initialize the database.
----End
Postrequisite
Perform the following operation to ensure that the T2000 server is already shut down. On
Windows, if the T2000 core process, and the processes that are optional according to the actual
situation do not exist, this indicates that the T2000 server is already shut down.
Perform the following operation to ensure that the T2000 server is already shut down. Run /
T2000/server/bin/showt2000server on the master server as user t2000. If the ID of each process
displayed does not exist, this indicates that the T2000 server is already shut down.
Prerequisite
The T2000 server and client applications must be stopped.
Context
CAUTION
To avoid equipment damages or data loss, perform the following step one by one to shut down
the workstation.
Procedure
l On Solaris or SUSE Linux platform
1. Enter the following commands in the terminal window, the UNIX workstation shuts
down automatically.
% su root
Password: rootkit
# sync;sync;sync;sync;sync
# shutdown -y -g0 -i5
NOTE
l rootkit is the default password of super user root. If the password is changed, enter the
new password.
l To restart the Sun workstation, the last command is # shutdown -y -g0 -i6.
2. Turn off the monitor and the peripheral equipment.
l On Windows platform
1. Choose Start > Shut down from the Windows desktop.
2. Choose Shut down and click OK in the dialog box. The computer shuts down
automatically.
3. Turn off the monitor and the peripheral equipment.
----End
Prerequisite
The user already logs in to the T2000 server.
Procedure
Step 1 Choose File > Change Password from the main menu.
Step 2 In the Change Password dialog box, set Current Password, New Password, and Confirm
Password.
----End
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, click the Main Frame Title tab.
Step 3 In Main Frame Title, enter the title you want to display.
----End
Result
The main frame title that you set is displayed.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, click the Output Window tab.
Step 3 In Output Window, set Maximum Output Lines for the output information. Select
Automatically scroll to the new message and Automatic dump as required.
----End
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, click the View Display tab.
Step 3 Click the View Display tab to set the parameters for display effect.
----End
Prerequisite
You must be an NMS user with the "Topo Watcher" authority or higher.
Context
l The background image supports the JPG and the GIF formats. It is recommended that the
background image is provided by Huawei Technologies Co., Ltd..
l The background image is saved on the local client. If the image file does not exist on the
client, the corresponding submap has no background.
Procedure
Step 1 Choose View > Set Background from the main menu.
Step 2 In the Set Background dialog box, in the submap list, select the submap that you want to modify.
Click Select Background.
Step 3 In the Open dialog box, set the background image file, and then click Open.
----End
Result
The selected image is set to the background of the submap.
Prerequisite
You must be an NMS user with the "Fault Watcher" authority or higher.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, click the Color tab.
Step 3 Set the colors for Critical Alarm, Major Alarm, Minor Alarm, and Warning as required.
Step 4 Click OK.
----End
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, click the Local Fault Settings tab.
Step 3 In the Local Fault Settings tab, set the alarm display mode and effect on the T2000 as required.
----End
Context
You need to restart the client to have the settings take effect after you change the time format.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 3 In the Time Settings group box, set the time format.
NOTE
The format is displayed in the Time Example text box in real time.
----End
Context
You need to restart the client to have the settings take effect after you change the client date
format.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 3 In the Date Settings group box, set the date format.
NOTE
----End
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, click the Lock Settings tab.
Step 3 Select Automatically locked. In the minutes later, this terminal will be automatically
locked text box, enter the time to enable the lock time.
NOTE
----End
Result
If you set auto locking and do not perform any operations in the preset interval, the client is
locked automatically.
Procedure
Step 1 Choose File > Lock Terminal from the main menu.
----End
Result
The client is locked.
Prerequisite
The client is locked.
Procedure
Step 1 Press Ctrl+Alt+U.
Step 2 In the Unlock dialog box, enter the user password. Click OK.
NOTE
You can also enter the admin account and password to unlock the client.
----End
Result
If the password is correct, the client is unlocked, and you can perform operations on it.
Precautions
l A T2000 license exists in the form of text file. The file name is in the format of
licenseXXXXXXX.txt.
l One license file corresponds to the MAC address of the network card of a T2000 computer,
which can only be used on the corresponding computer.
l For the server that has multiple network cards, obtain the license for only the master network
card that is used by the T2000.
l Never make any modifications to the license file. Otherwise, the license will fail.
l Ensure that there is only one License file in the license folder of the T2000 server directory.
l On Solaris, FTP the license file to a workstation as user t2000 in the mode of ASCII.
l On SUSE Linux, FTP the license file to a workstation as user t2000 in the mode of ASCII.
l The license of the T2000 V200 is incompatible with that of the T2000 V100. If you have
upgraded the T2000, reapply for a license.
l The items that the license supports vary with different versions of the T2000. You must
use the application form template specific to that T2000 version when applying for the
license.
Context
l The T2000 license file is not sent to the customer with the T2000 installation DVD-ROM,
but is applied by the Huawei engineer according to the contract number and the MAC
address.
l When users need to change the T2000 computer server or increase the management
capability of the server, they need to feed back the MAC address and the contract number
to a Huawei engineer for the T2000 license.
l The Huawei engineer applies for a T2000 license according to the contract number and the
MAC address.
Procedure
Step 1 Get the contract number in project documents.
In Windows:
In Solaris 10:
1. Open a Terminal.
2. Run the following command to switch to user root:
% su - root
NOTE
Enter the password of user root according to the screen prompt. The default password is root.
3. Run the following command to view the MAC address:
# ifconfig -a
Step 3 Send the contract number and the MAC address to a Huawei engineer or the nearest branch.
Step 4 The Huawei engineer fills in the application form to obtain a T2000 license.
Step 5 After the Huawei engineer obtains the T2000 license, she or he sends it to the customer.
----End
Prerequisite
The T2000 license file is ready.
Context
To install the T2000 license, you can copy the license file to the license directory of the
T2000.
NOTE
l If the T2000 server is installed on SolarisSUSE Linux, copy the license to the T2000/server/license
directory (the default directory is /T2000/server/license).
l If the T2000 server is installed on Windows, copy the license to the T2000\server\license directory
(the default directory is C:\T2000\server\license).
Procedure
Step 1 Exit all the T2000 client software.
Step 3 On the computer where the T2000 server is installed, transfer the license file in ASCII mode by
FTP to the T2000 installation directory server/license as user t2000.
Step 4 On the computer where the T2000 server is installed, copy the authorized license file to the
T2000 installation directory server\license as the user that installs the T2000.
----End
Result
Then the license can take effect. Choose Help > About from the Main Menu and then click
License to check the license information when the T2000 client is started.
Prerequisite
l Log in to the T2000 as user admin.
l The T2000 license must be obtained.
Context
NOTE
l When the types of equipment supported by the new license are different from those supported by the
old license, do as follows:
l You can change the license if additional types of equipment are supported by the new license and
if the additional equipment types are supported by the current T2000 version. You cannot change
the license if the additional equipment types are not supported by the current T2000 version.
l You can change the license if some types of equipment are no longer supported by the new license
and if no NEs are created on the T2000 for the unsupported equipment types. You cannot change
the license if NEs have been created on the T2000 for the unsupported equipment types.
l You cannot change the license if the new license supports different function items than the old license.
l When the new license supports a different number of clients than the old license, do as follows:
l You can change the license if the new license supports lesser number of clients than the old license
and if the number of the currently logged-in clients is lesser compared to the clients of the new
license. You cannot change the license if the currently logged-in clients are more than the number
of clients of the new license.
l You can change the license if the new license supports more clients than the old license.
For situations where you cannot change the license, shut down the T2000 server, change the license and
then restart the server.
Procedure
Step 1 Backup the original license from the T2000 server.
NOTE
l If the T2000 server is installed on Solaris, create a folder backup in the default directory /T2000/
server/license/backup, and copy the license to the directory /T2000/server/license/backup.
l If the T2000 server is installed on SUSE Linux, create a folder backup in the default directory /T2000/
server/license/backup, and copy the license to the directory /T2000/server/license/backup.
l If installed on Windows, create a folder backup in the default directory \T2000\server\license\, and
copy the license to the directory \T2000\server\license\backup.
Step 2 Delete the original license from the T2000 server, and copy the new license that is authorized
to the license directory of the T2000 server.
NOTE
l If the T2000 server is installed on Solaris, copy the license to the default directory /T2000/server/
license/.
l If the T2000 server is installed on SUSE Linux, copy the license to the default directory /T2000/server/
license/.
l If installed on Windows, copy the license to the default directory\T2000\server\license\.
Step 3 Choose Help > About from the Main Menu. Click the License tab. Then, click Update. In the
Open dialog box displayed, select the new license file and click Open.
Step 4 If the license file is invalid, follow the procedure described as follows to check the correctness
of the license.
1. Run the following command to get the MAC address of the host computer.
# ifconfig -a
The characters that follow "ether" is the MAC address of the network card. The MAC
address format is xx:xx:xx:xx:xx:xx, where xx is one or two hexadecimal numbers.
NOTE
You must run the ifconfig -a command as user root to get the MAC address of the host computer.
2. View the license file by the more command.
# cd /T2000/server/license
# more licenseXXXXXXX.txt
License = A26F90385ACE5FD947F057C36786A4C5E33E1C854AB410A11292
0687F007548AF4A586BBE902313F309F6A82DD19
The characters that follow "MAC=" is the MAC address of the network card that
corresponds to the license. Check whether the two MAC addresses are the same or not. If
not, get the proper license file.
3. Make sure that /T2000/server/bin/imapgetmac is owned by root, and the permission is
4755.
4. Check whether the text mode, namely ASCII mode, is adopted to transfer the license file.
NOTE
To check the transfer mode, open the licenseXXXXXXX.txt file at the workstation by the vi
command. If every line is ended with "^M", it indicates that the transfer mode is incorrect, and the
transfer should be repeated in the mode of ASCII.
1. Run the following command to get the MAC address of the host computer.
# ifconfig -a
The characters that follow "ether" is the MAC address of the network card. The MAC
address format is xx:xx:xx:xx:xx:xx, where xx is one or two hexadecimal numbers.
NOTE
You must run the ifconfig -a command as user root to get the MAC address of the host computer.
License = A26F90385ACE5FD947F057C36786A4C5E33E1C854AB410A11292
0687F007548AF4A586BBE902313F309F6A82DD19
The characters that follow "MAC=" is the MAC address of the network card that
corresponds to the license. Check whether the two MAC addresses are the same or not. If
not, get the proper license file.
3. Make sure that /T2000/server/bin/imapgetmac is owned by root, and the permission is
4755.
4. Check whether the text mode, namely ASCII mode, is adopted to transfer the license file.
NOTE
To check the transfer mode, open the licenseXXXXXXX.txt file at the workstation by the vi
command. If every line is ended with "^M", it indicates that the transfer mode is incorrect, and the
transfer should be repeated in the mode of ASCII.
1. Choose Start > Programs > Accessories > Command Prompt to start a command
terminal. Run the following command.
ipconfig /all
The characters that follow "Physical Address" is the MAC address of the network card.
2. Open the license file.
License = A26F90385ACE5FD947F057C36786A4C5E33E1C854AB410
A112920687F007548AF4A586BBE902313F309F6A82DD19
The characters that follow "MAC=" is the MAC address of the network card that
corresponds to the license. Check whether the two MAC addresses are the same or not. If
not, get the proper license file.
3. Check whether the network adapter is available or not.
l If not, the MAC address cannot be detected, and the license will be invalid. Check
whether there is any error during the transfer of the license.
l If yes, re-transfer the license file and store it in the C:\T2000\server\license directory.
Restart the T2000 to see whether it is valid.
----End
Context
NOTE
Do not modify the name, the content, or the format of the license file. Otherwise the license will be invalid.
If the license file is invalid, follow the procedure described as follows to check the correctness
of the license.
Procedure
l Check the correctness of the license on Solaris or SUSE Linux.
1. Run the following command to get the MAC address of the host computer.
# ifconfig -a
The characters that follow "ether" is the MAC address of the network card. The MAC
address format is xx:xx:xx:xx:xx:xx, where xx is one or two hexadecimal numbers.
NOTE
You must uses ifconfig -a command as user root to get the MAC address of the host computer.
2. View the license file by the more command.
# cd /T2000/server/license
# more licenseXXXXXXX.txt
License = A26F90385ACE5FD947F057C36786A4C5E33E1C854AB410A11292
0687F007548AF4A586BBE902313F309F6A82DD19
The characters that follow "MAC=" is the MAC address of the network card that
corresponds to the license. Check whether the two MAC addresses are the same or
not. If not, get the appropriate license file.
3. Make sure that $IMAP/imapgetmac is owned by root, and the permission is 4755.
4. Check whether the text mode, namely ASCII mode, is adopted to transfer the license
file.
NOTE
To check the transfer mode, open the licenseXXXXXXX.txt file at the workstation by the vi
command. If every line is ended with "^M", it indicates that the transfer mode is incorrect, and
the transfer should be repeated in the mode of ASCII.
l Check the correctness of the license on Windows.
1. Choose Start > Programs > Accessories > Command Prompt to start a command
terminal. Run the following command.
ipconfig /all
The characters that follow "Physical Address" is the MAC address of the network
card.
2. Open the license file.
License = A26F90385ACE5FD947F057C36786A4C5E33E1C854AB410
A112920687F007548AF4A586BBE902313F309F6A82DD19
The characters that follow "MAC=" is the MAC address of the network card that
corresponds to the license. Check whether the two MAC addresses are the same or
not. If not, get the appropriate license file.
3. Check whether the network adapter is available or not.
– If not, the MAC address cannot be detected, and the license will be invalid. Check
whether there is any error during the transfer of the license.
– If yes, re-transfer the license file and store it in the C:\T2000\server\license
directory. Re-activate the T2000 to see whether it is valid.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Applies to OptiX OTU40000 and OptiX OSN 900A.
Procedure
Step 1 Double-click an optical NE on the topology. The NE Panel is displayed.
Step 2 Right-click an NE and choose Start WEB Client from the shortcut menu. The Web LCT user
interface is displayed.
----End
You can view the current and history performance data, UAT events and performance threshold
crossings.
2.10.10 Operation Object Status
The meaning of legends on a view is described here.
2.10.11 Key GUI Components
The key T2000 GUI components are as follows:
2.10.12 Frequently Used Buttons
The frequently used buttons on the T2000 GUI are as follows:
2.10.13 Shortcut Icon
The shortcut icons in the Main Topology, NE Explorer and NE Panel are described.
2.10.14 Common Shortcut Keys
Using shortcut keys, you can increase the operation efficiency. The shortcut keys include Enter,
Ctrl, Esc, Tab and so on.
GUI
To open the Main Topology, log in to the T2000, and choose Window > Main Topology from
the Main Menu. Figure 2-1 shows the Main Topology of the T2000.
2.10.2 NE Explorer
The NE Explorer is the main user interface used to manage OptiX equipment. In the NE Explorer,
a user can configure, manage and maintain the NE, boards, and ports on a per-NE basis. The NE
Explorer is the main user interface for commissioning and configuration on a per-NE basis. The
NE Explorer contains a Function Tree that makes the operations easy. To display the
configuration window for an object, the user can just select the object and then choose a desired
function in the Function Tree.
Note
You can open a maximum of five NE Explorer windows at the same time.
GUI
To display the SDH NE Explorer, right-click an NE on the Main Topology and choose NE
Explorer from the shortcut menu.
To display the WDM NE Explorer, double-click an optical NE on the Main Topology. In the
displayed window, right-click an NE in the left-hand pane and choose NE Explorer from the
shortcut menu.
The NE Explorer window is shown in Figure 2-2.
Customizing a Window
You can select either of the two options to customize the NE Explorer window: Display in
Maximization and Display in Window. By default, the NE Explorer window is displayed in
the display mode that you select.
Choose File > Preferences > Custom Window from the Main Menu. Set the initial display
mode for the NE Explorer window.
NOTE
The window display mode you set is enabled when you open the NE Explorer next time.
If the NE Explorer is already open before you modify the settings, close and open the window again. Thus,
the settings take effect.
GUI
To open the Clock View, choose Configuration > Clock View from the Main Menu. In the
object tree on the left, select the NE that you want to query or set. Figure 2-3 shows the GUI of
the Clock View.
Legends
l The Clock View uses continuous lines to represent the trace relations between NEs. Smaller
number indicates higher priority. The number displayed on the continuous line indicates
the priority of the traceable clock. The Clock View displays the line clock source numbers
only. Internal and tributary clock sources are also numbered, but they are not displayed in
the Clock View.
l The arrow direction in the Clock View indicates the clock tracing direction. For example,
if NE2 points to NE3, it indicates that NE3 traces the clock information transmitted from
NE2, and that NE3 traces the primary PRC NE1-External 1.
l The arrow direction in the Clock View indicates the clock tracing direction.
l An internal clock source is the clock provided by an NE, and has no trace relations with
other NEs. Therefore, internal clock sources are not displayed on the Clock View.
l Tributary clock sources have no relation with the clock sources that are not provided by
the T2000. Therefore, the clock trace relations are not displayed on the Clock View.
l On the T2000, the four clock trace relations of free-run, tracing, holdover, and invalid are
respectively identified in blue, green, yellow, and red.
l In the Clock View, you can select multiple NEs, right-click, and query the clock
synchronization status or search for clock trace relations.
NOTE
The rule of verifying an invalid clock tracing relation is as follows: First, verify whether a clock source is in the
SSM protocol mode. In the non-SSM protocol mode, verify the status of a clock source. The status directly
determines whether a clock tracing relation is invalid. In the SSM protocol mode, verify the status of a clock
source. If the status is unavailable, it indicates that the clock tracing relation is invalid. If the status is available,
you also need to verify the S1 byte (clock quality). When you manually cancel settings of the quality of the S1
byte and the quality of the S1 byte is unknown, the clock tracing relation is invalid.
GUI
Double-click an NE on the Main Topology to display the NE Panel. See Figure 2-4.
To add a new board, right-click an idle slot and choose a board type.
NOTE
l Choose the Always On Top for the Slot Layout window to always remain on top.
l When a board occupies multiple slots, the slot ID of the main slot is displayed in boldface, and the slot
ID of the slave slot is grayed out.
l In the NE panel, when you click the processing board that is accompanied by an interface board, the
slot ID of this interface board is displayed in orange.
Click the icon on the toolbar to view the legends on the right of the Slot Layout. For example,
Figure 2-5 shows the legends of the OptiX OSN 3500.
To select an operation related to an installed board, right-click the installed board and choose it
from the shortcut menu. For example, right-click an AUX board and choose Path View to display
the detailed path information. See Figure 2-6.
GUI
To display the NE Panel, double-click an NE icon on the Main Topology. Figure 2-7 shows the
NE Panel.
To add a board in an empty slot, right-click the slot and select a board type from the shortcut
menu.
NOTE
Check the Always On Top check box and the Slot Layout window is not hidden by other windows.
Click on the toolbar, to view the information on the legends of boards and ports in the right-
hand pane. For example, Figure 2-8 shows the legends of the OptiX RTN 620.
To perform an operation on an installed board, right-click the board and select an operation from
the shortcut menu. For example, right-click the PO1 and choose Path View to view the status
of each channel. See Figure 2-9.
GUI
Double-click an ONE icon on the Main Topology to display the NE Panel, and select the NE.
See Figure 2-10.
To add a new board, right-click an idle slot and choose a board type.
NOTE
l Choose the Always On Top for the Slot Layout window to always remain on top.
l When a board occupies multiple slots, the slot ID of the main slot is displayed in boldface, and the slot
ID of the slave slot is grayed out. For example, in Figure 2-10, slot 11 is the main slot, and slot 12 is
the slave slot.
Click the icon on the toolbar to view the legends on the right of the Slot Layout. For example,
Figure 2-11 shows the legends of the OptiX 1600G.
To select an operation related to an installed board, right-click the installed board and choose it
from the shortcut menu. For example, right-click an FIU and choose Path View to display the
detailed path information. See Figure 2-12.
GUI
Take the OptiX PTN 3900 as an example. Double-click an NE on the Main Topology to display
the NE Panel. See Figure 2-13.
To add a new board, right-click an idle slot and choose a board type.
NOTE
l Check the Always On Top check box for the Slot Layout window to always remain on top.
l When a board occupies multiple slots, the slot ID of the main slot is displayed in boldface, and the slot
ID of the slave slot is grayed out. For example, in Figure 2-13, slot 05 is the main slot, and slot 06 is
the slave slot.
l In the NE panel, when you click the processing board that is accompanied by an interface board, the
slot ID of this interface board is displayed in orange.
Click the icon on the toolbar to view the legends on the right of the Slot Layout. For example,
Figure 2-14 shows the legends of the OptiX PTN 3900.
To select an operation related to an installed board, right-click the installed board and choose it
from the shortcut menu. For example, right-click an MP1 board and choose Path View to display
the detailed path information. See Figure 2-15.
GUI
l Choose Fault > Browse Current Alarm from the Main Menu.
l Choose Fault > Browse History Alarm from the Main Menu.
l Choose Fault > Browse Event from the Main Menu.
l Choose Fault > Alarms Statistics from the Main Menu.
GUI
Choose Performance > Browse SDH Performance from the Main Menu.
Choose Performance > Browse WDM Performance from the Main Menu.
Figure 2-17 shows the window of SDH performance.
Figure 2-18 shows the window of WDM performance.
NE
Table 2-2 describes each status of the NE icon.
The NE is preconfigured.
Working Status
The working status of an operation object, such as an NE, is shown in different colors. The
Table 2-4 describes the default colors and the corresponding alarm status.
Component Example
Button
Shortcut icon
Radio button
Check box
Tab
Field
Component Example
Drop-down
menu
Menu
Function Tree
Dialog box
Button Functionality
Button Functionality
Button Functionality
Shortcut Description
Key
Ctrl+A Selects all contents in the list if the cursor is in the list box.
Enter If the cursor is in the list box, press Enter once and the cursor moves
downward to the next line. If the cursor locates on a button, pressing
Enter means to confirm the operation.
Tab Switches between text boxes if the cursor is in the list box. Switches between
buttons if the cursor is on a button.
Alt+N Opens the Protection Subnet menu from the Main Menu.
Alt+C+V Opens the Clock View menu from the Main Menu.
Shortcut Description
Key
Menu Items
Menu Item Description
Menu Items
Menu Item Function
Menu Items
Menu Item Function
Save Icon Location Current Subnet Saves the icon location in the
current subnet.
Menu Items
Menu Item Description
Note
A wavelength protection subnet cannot be created by using the T2000. You need to successfully
complete the physical connections, and use the T2000 to search for the wavelength protection
subnet.
Menu Items
Menu Item Description
SDH Protection Subnet Search Searches for SDH protection subnets for the
management and maintenance of protection
subnets.
SDH Protection Subnet Management Manages SDH protection subnets. You can
adjust the capacity, set protection subnet
parameters and query information about
protection subnet configuration.
SDH Protection Subnet Maintenance Maintains SDH protection subnets. You can
start and stop the MSP protocol, perform
protection switching and view the protection
status.
SDH Protection Type Change Changes the protection type from non-
protection chain to 1+1 linear MSP.
SDH NNI Management Manages SDH NNIs. You can create and
delete an SDH NNI, and view its details.
Navigation Path
Choose Configuration > Clock View from the Main Menu and the Clock View menu is
displayed.
Menu Items
Menu Item Description
Menu Items
Menu Item Function
Stop the Alarm Sound Permanently Sets the alarm panel not to
play the alarm sound.
Stop the Current Alarm Sound Stops the current alarm sound
and plays the alarm sound
again when a new alarm is
raised.
Menu Items
Menu Item Description
Browse SDH Control Plane Performance Queries or sets the current performance data,
history performance data, and threshold-
crossing records of the NEs on the SDH
control plane.
Browse WDM Control Plane Performance Queries or sets the current performance data,
history performance data, and threshold-
crossing records of the NEs on WDM the
control plane.
History Performance Data Analysis Sets the monitoring filter criteria, such as the
monitor period, time range and data source of
the performance time so that the T2000 can
analyze the history performance data of the
monitored object.
Menu Items
Menu Item Description
Trunk Link Trunk Link Creation Enables you to create trunk links
after you set parameters such as
the bandwidth, port attributes
and so on.
Menu Items
Menu Item Description
Clock Tracing Diagram Creates the clock tracing diagram. This report
contains the NE ID, NE name, equipment
type, and Fiber/Cable connections.
Board Manufacturer Information Report Provides the information of board code, type,
manufacturing data and BOM.
Low Order Cross-Connections Statistic Displays the capacity of lower order cross-
Report connections, available lower order cross-
connections on each NE, and specifies
thresholds of lower order cross-connection
alerts.
WDM Protection Group Switching State Displays the switching status information of
Report WDM protection groups.
Fiber Cable Occupancy Resources Provides the information of fiber name, level,
source NE, source board, source port, sink
NE, sink board, sink port, direction.
SDH Trail Statistics between NEs Displays the trail information between SDH
NEs.
WDM Client Port Resource Statistics Displays the WDM client-side port
information of the NE that is selected, such as
Service Type, Total Port Number, and
Activated Port Number.
Port Resource Statistics EPL Displays the port resources of the Ethernet
board of the NE that is selected, such as NE
Name, Board Name, Used MAC Port, and
Unused Trunk Port.
Ethernet Inter-NE Service Resource Statistic Displays the resources of the services
between the NEs that are selected, such as
Source NE, Sink NE, EPL Number, EVPL
Number, and EVPL(QinQ) Number.
Menu Items
Menu Item Description
Menu Items
Field Description
Board Level Software Upgrade Configures the board level software upgrade.
Board Level Patch Software Upgrade Configures the board level patch software
upgrade.
Menu Items
Menu Item Function
NOTE
The Window menu also includes a list of all windows that are currently open. The check mark to the left
of the window name indicates that the window is active. Select a window from the list to make it the active
window.
Menu Items
Menu Item Description
Context
You can perform the following custom view functions:
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Context
l You can create at most five views.
l When the selected two devices are connected with a link, the link is added to the Selected
Links table.
l Custom views are user-based. Users can view only their own custom views.
Procedure
Step 1 Choose File > New > View from the Main Menu.
The Create View dialog box is displayed.
Step 2 In the Create View dialog box, select the General tab.
Step 4 Click on the right of the Background text box. In the Open dialog box, set the background
of the custom view.
Step 5 Click Select Object, and then move the cursor to the topology navigation tree or the topology
view. Right-click a device or link and then choose Select.
The selected submap, device, or link is displayed in the Select Object dialog box.
Step 7 On the Selected Nodes and Selected Links tabs of the Create View dialog box, view the object
selected in the custom view.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Procedure
Step 1 Choose View > Set Startup Subnet from the Main Menu. The Set Startup Subnet dialog box
is displayed.
Step 2 Select a subnet in the Set Startup Subnet dialog box, click OK.
Step 3 Restart the T2000 client, and the custom subnet is displayed automatically.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 In the right-hand pane of a window, right-click on the top of a parameter list, and choose the
desired items from the shortcut menu. The unselected items are not shown in the parameter list.
Step 2 Optional: Click Setting in the shortcut menu and the Column Settings dialog box is displayed.
You can set whether to show a column in the parameter list, set the sequence of columns and
the column width.
----End
Context
The naming rule is a string that comprises a series of fields. The T2000 provides some fields by
default. The user can add new fields, modify or delete the existing fields and adjust the field
position according to the actual requirements, to customize the naming rule.
Procedure
Step 1 Choose System > Naming Define Rule from the Main Menu. The Naming Rule dialog box is
displayed.
Step 2 Choose Function Configuration > Fiber/Cable from the Function Tree. The naming rule is
displayed on the right-hand pane.
Step 3 Optional: Click Refresh to obtain the latest naming rule customized by other users.
Step 4 Click Create Rule and enter the name of the newly created rule in the first row.
Step 5 Add new fields.
1. Right-click on the Field Description list, and choose Add Field from the shortcut menu
to add a new field.
2. Select the field type in the Type list and define its value.
There are four types of fields.
l Fixed Field: This type of field defines fixed strings contained in all names. Enter the
string in Fixed Field field.
l Connector Field: This type of field defines the connector used in the name. Select the
connector in the Connector Field field.
l Dynamic Field: In this type of field, you can select some attributes of the fiber or cable
and add the value to the name, for example, contain the name of Source NE in the
naming rule. Select the attributes in the Dynamic Field field.
l Digital Field: In this type of field, the numerals contained in the naming rule can be set
to change regularly so that the names of fibers or cables following the same rule is not
repeated. In the Digital Field field, set Current Value, Min. Value, Max. Value and
Step Length.
NOTE
It is recommended that there is only one Digital Field in the naming rule. If there are multiple digital
fields, it is recommended to set others to Fixed Field.
3. Define the field name in the Name list.
4. Define the field length in the Length list.
Step 6 Optional: Delete fields. Select the field to delete in the Field Descriptions list. Right-click it
and choose Delete Field from the shortcut menu.
Step 7 Optional: Set how the field is sequenced in the naming rule. Select the field and click
Step 10 Click Save to save the current naming rule and set it as the default rule.
----End
Procedure
Step 1 Select the text in a table, and press the shortcut keys Ctrl+C.
NOTE
l Select all texts in the table by pressing the shortcut keys Ctrl+A. Only the current screen of the table
is supported.
l To view all data in the current table, click Print or Save As.
Step 2 Switch to another program, and press Ctrl+V. The selected text is copied to the system clipboard.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Context
l When the T2000 is started, the filter criteria are empty by default. All the topology objects
are displayed.
l When you deselect a filter criterion, the objects matching the criterion are not displayed.
Procedure
Step 1 Choose View > Display > Filter Tree and Legend from the Main Menu, or click on the
toolbar.
The Filter/Legend Panel is displayed on the right of the topology view.
Step 2 In the Filter/Legend panel, click the Filter tab.
Step 3 Click Filter Tree and select Switch. In the Switch Filter Tree dialog box, select the filter tree
template. Click Open.
NOTE
If the object to be filtered is a single NE, connection, or submap, you can click Other Conditions, and
directly enter the object name for filtering.
Step 4 Choose View > Display > Filter Tree and Legend again to close the Filter Tree and
Legend panel.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Optional: If the view is locked out, choose View > Unlock View from the Main Menu.
NOTE
l In the Main Topology, if a shortcut icon displayed as exists, this indicates that the view is locked
out.
l In the Main Topology, if a shortcut icon displayed as exists, this indicates that the view is
unlocked.
Step 2 Select one or more NEs icon on the Main Topology, hold the primary mouse button and drag
the object to the specified position.
----End
Context
l This operation applies to all the submaps in the topology view, not limited within the current
submap.
l You must have the right of object management.
l When you search for a NE, dynamic fuzzy search is used. That is, when you enter the search
content, the result is displayed dynamically.
Procedure
Step 1 Choose Edit > Search from the Main Menu, or click .
The Search dialog box is displayed.
Step 2 Select the search conditions, which are Search By and Direction.
Step 3 Enter the keyword according to the search mode.
Step 4 Click Search.
All the found records are displayed in the area of NE ID and NE Name.
Step 5 Select an NE from the search result list, and then click Locate. You can also double-click the
NE.
The NE is located in the topology view and navigation tree.
----End
Procedure
Step 1 Choose View > Display > Device Statistics from the Main Menu.
Step 2 In the Device Statisticsdialog box displayed, view the number of the NEs.
----End
Context
l If an item in the list is grayed out, it indicates that it cannot be edited.
l If the value of an item in the list is "/", it means that the value of this item is unknown.
l If the value of an item in the list is "-", it means this operation object does not support this
item.
Procedure
Step 1 Select the operation object in the upper left pane of the NE Explorer: NE or board. The functions
that are supported by this operation are displayed on the Function Tree in the lower left pane.
Step 2 Select the desired function in the Function Tree. Click to the left of an icon to expand the
contained subdirectory.
Step 3 Optional: Click and the data saved on the T2000 is displayed in the list.
Step 4 Optional: Click Query and the data queried from the NE is displayed on the list.
Step 5 Select either of the following ways to set the parameters in the list.
l Double-click a column and the drop-down list or the text box is displayed. Select a proper
item from the drop-down list or enter a desired value in the text box.
l Right-click the item you want to modify, and directly select the proper item from the
shortcut menu.
NOTE
----End
l Do not modify the system time when the T2000 is running. Set the time before installing
the T2000.
– To modify the system time of the server, exit the T2000 server and restart it after the
modification.
– To modify the system time of the client, exit the T2000 client and restart it after the
modification.
l Avoid modifying the name and IP address of the T2000 server computer.
l Log in to the T2000 serverE as t2000 on SUSE Linux or Solaris. On Windows, log in with
the same user ID that you had chosen when installing the T2000. Do not change the
Windows user name.
l The data created on the NE is consistent with that on the T2000. When an NE is configured
and runs normally, you can store the data on the NE and the data on the T2000 consistent
through manual or automatic synchronization.
l Back up the T2000 database periodically to minimize the loss caused by abnormal
functioning of the system.
l It is recommended to query the latest data from NE before setting the parameters.
l When a hazardous operation is performed, the T2000 asks for confirmation.
l Common symbols: "(", ")", "-", "_", "/", "\", ".", "&", and a space
l When the Western European character set is supported in the operating system, you can
enter Western European characters in certain user interfaces, for example, the user
interfaces of the NE name, trail name, subnet name, and customer name.
The symbols / and \ can only be used in names of an NM (T2000), NE, fiber, trail and protection
subnet and be used in remarks. Note that these characters must be entered in English input mode.
NOTE
l The name of a rule, trail, fiber, subnet, or customer can contain "+" and ":",
l A subnet name can contain "+".
l The Tab key input cannot be contained in the above names or the values of overheads J0, J1, and J2.
l These rules are made in order to avoid database operation errors or errors occurred when an HTML
report is generated. The Tab key input cannot be contained in command lines.
CAUTION
When you enter characters in Microsoft Pinyin IME and keep pressing a key, too many characters
will be typed in. This leads to the exit of the T2000 client.
File Name
The general rule is file name + extension name. The extension name consists of letters, numerals
or underscores, and should not exceed three characters.
The naming rule is that a file name consists of letters, numerals or underscores. It cannot exceed
eight characters. A file name cannot contain spaces or any of the following characters: \ " . * ;
> [ ] ( ) ! $ { } < >. If you need to separate two characters, you may use "_".
IP Address
The IP address is decimal, for example, 129.9.0.254:9801 (9801 is the port ID, and can be
omitted).
MAC Address
The MAC address is hexadecimal, for example, 00-06-5B-84-50-84.
Types of Numerals
Integer type: In this mode, only integral numbers can be typed in.
Decimal fraction type: In this mode, besides numerals, characters f and e, as well as the decimal
point are allowed.
Password
When the password is entered, "▪" is present in the password box instead of the actual characters
entered.
3 Security Management
Security management is a crucial function to prevent unauthorized logins and ensure network
data security. Security management includes NM user management, NE user management and
log management.
3.1 Security Management Strategy
The security management function provides the role-based and domain-based management for
the T2000 and NEs. With this function, the T2000 can also monitor in real time the users that
already log in to the T2000 and NEs. In this way, the network and data security ensures that
login failures or illegal operations are captured.
3.2 Users and Rights
This section describes the OS users, database users, and T2000 users. It also describes the
T2000 user management concepts and rights management policies.
3.3 Security Management Processes
Security management processes include the T2000 security management process and NE
security management process.
3.4 Managing SolarisSUSE Linux OS Security
To enhance the Solaris operating system security, the Huawei SetSolaris product is
recommended. SetSolaris complies with the A019 and A020 standards. For SetSolaris security
policy settings, refer to the SetSolaris user manual. Some regular SolarisSUSE Linux security
operations are described here, such as modifying the user password and setting the password
valid period.
3.5 Managing Database Users
The database stores all data for the T2000 system, and is required for data security management.
3.6 Setting the Security Access of the T2000
To ensure the T2000 security, the server communicates with the client by using the SSL protocol.
The system ACL is used to control the IP address of the client that accesses the server.
3.7 Setting Security Policy for a T2000 User
This section describes how to set the security policy for a T2000 user.
3.8 Managing T2000 User Groups
Usually, the T2000 is used by multiple users. You can divide the users into different groups to
control their authorities.
3.9 Managing NM Users
You can create NM users and assign and change their authorities. The NM user authorities are
role-based and domain-based. An equipment set equals a management domain and an operation
set equals an authority group.
3.10 Managing T2000 Operation Sets
The T2000 default operation sets do not meet all user requirements. Hence, the NM administrator
can define an operation set to assign authorities conveniently.
3.11 Managing T2000 Equipment Sets
After the planning and creation of equipment sets, you can assign an equipment set to a specified
user group. In this way, all users in this user group are authorized to operate the equipment in
the equipment set. This management mode helps you uniformly allocate and manage authorities
of the T2000 users.
3.12 Managing T2000 Login
To ensure network data security, you can manage the users who are logged in to the T2000.
3.13 Managing the Remote Maintenance User
The T2000 remote maintenance function allows login to the T2000 server from a remote
maintenance terminal. Strict management for the remote maintenance user not only ensures
T2000 system security, but also makes maintenance operations easier.
3.14 Setting the Security Access of an NE
To ensure the NE security, you need to disable the unused interfaces on the NE.
3.15 Setting the NE ACL
You can ensure the security of NEs by setting the NE ACL.
3.16 Managing NE Users
To ensure NE data security, you can manage the authorities and passwords for NE users.
3.17 Managing NE Login
To ensure NE data security, you can manage the users who are logged in to NEs.
To use Windows, you can set a password for the CMOS of the T2000 computer and for the
user administrator to ensure the security of the operating system.
l Anti-virus. In Windows, you need to install the anti-virus software. In SUSE
LinuxSolaris, this is not required currently.
network by using the primary and standby GNEs. When the communication between the primary
GNE of an NE and the T2000 is interrupted, the T2000 automatically switches to the standby
GNE and communicates with it. After the working DCN channel returns to normal, the
communication automatically switches to the working channel. You can set the switching mode
and the primary and standby GNEs on the T2000. Figure 3-1 shows a sample of the DCN
protection.
DCN
Operator Operation Set, Security Watcher Operation Set, NE Administrator Operation Set, NE
Maintainer Operation Set, NE Operator Operation Set, NE Monitor Operation Set, SDH Network
Maintainer Operation Set, SDH Network Operator Operation Set, SDH Network Monitor
Operation Set, WDM Network Maintainer Operation Set, WDM Network Operator Operation
Set, WDM Network Monitor Operation Set, Ethernet Maintainer Operation Set, Ethernet
Operator Operation Set, Ethernet Monitor Operation Set. If the default operation sets do not
meet the requirements for the right allocation, you can create new operation sets as required.
Password Management
Password Template: The password template defines all the elements required to construct a
password. A good password template effectively raises the complexity of the password and
prevents the password from being decoded. The password template has the following parts:
password composition, password length, and the relation between the password and the user
name.
Password Reuse Frequency and Password Reuse Period: For the purpose of password
security, when you modify a password, you are not allowed to use a previously used password.
The password reuse frequency determines that a new password cannot repeat the one used in
the last N times. For example, if the password reuse frequency is set to 8, the new password
cannot repeat any one that was used during the last eight times. The password reuse period
determines that a password cannot repeat the one used in the past N days. For example, if the
password reuse period is set to 8, the new password cannot repeat any one that was used during
the past eight days.
The Weakness Password Dictionary: This is a collection of the passwords that are easy to be
decoded. If the password being constructed matches an entry in the dictionary, the password is
regarded as invalid. In this case you need to reconstruct a new password. The T2000 provides
a weakness password dictionary that helps to exclude some common passwords that are easy to
be decoded. You can redefine the dictionary as required.
Client Access Control: To avoid the illegal login, after you create a T2000 user, you can specify
an IP address range for the accessible clients. In this case, the T2000 user can only log in to the
T2000 server from the clients that are within the IP address range. If you do not specify an IP
address range, a T2000 user can log in to the T2000 server from the clients of local server.
SSL Protocol: If the server and the client communicate by the SSL protocol, the data
interchanged between the server and the client is encrypted. In this way, the security of the
network data is guaranteed.
Single-User Mode: If the T2000 switches from the multiuser mode to the single-user mode, all
other users are forced to log out and cannot log in again unless the multiuser mode is enabled.
If no user is logged in under the single-user mode, only the user that has the right of switching
user mode can log in to the T2000.
Client Lockout: To ensure the network security, the T2000 locks out a T2000 client if the user
does not perform any operations on the client for a long time. This operation only locks out the
client, but not affect the normal running of the T2000.
Usually you can use the following two ways to allocate rights to a user or a user group:
l Add a user to a user group. The user added to the user group enjoys all the rights of the
user group. This way is always used to allocate basic user rights.
l Adjust user rights. Some operation rights can be added or deleted. This way is always used
when the current user or user group does not meet the requirements for the user right.
Operation rights of the default user groups cannot be adjusted.
ACL
The ACL is a secure access control mechanism. It restricts a user to log in to the server through
only the clients with the specified IP addresses.
ACL can effectively control the client IP address from which the user can log in to the T2000.
In this case, even if the user account and the password are obtained by illegal users, these users
cannot log in to the T2000, thus the T2000 security is improved. The T2000 provides two ACLs:
l System ACL
The ACL of the entire T2000. All the users can log in to the T2000 only through specific
IP addresses or network segments.
l User ACL
The ACL of a user. The current user can log in to the T2000 only through specific IP
addresses or network segments.
NOTE
The IP addresses or the network segments for the user ACL need to be within the range of the IP addresses
or the network segments for the system ACL.
NE Security Log
Operations and operation results of all the NE users are recorded in the NE security log. The
T2000 provides an NE log browse function. You can also filter the logs according to the NE
user name, event name, and start and end time. You can view but not delete the NE security log.
Log Dump
By setting the scheduled task dump, you can enable the T2000 to periodically save the security
log to a specified directory. This function facilitates log viewing, reduces records in the database,
and speeds up the running of the system. By default, the dumped file is saved to the \T2000
\server\dump\ directory. The dumped log is saved as a text file and you can view it in EXCEL
format.
Log Forwarding
T2000 log forwarding: The T2000 can forward the T2000 operation log to the Syslog server,
and save all operations. This function provides references for maintenance and relieves the
storage burden of the T2000 server.
NE log forwarding: The T2000 forwards various types of NE information to the Syslog server
in a format that complies with the system log protocol. Network management and maintenance
personnel can learn the NE status according to emergency of the information.
3.1.6 NE Security
The NE security management includes NE access control, NE user management, NE operation
right management and NE data security management.
NE Access Control
LCT Access Control: If you need to use the T2000 LCT or Web LCT for the NE management
and commissioning, you can enable the LCT access control so that the LCT can access the NE.
ACL: The access control list (ACL) provides the basic filtering function for the data flow. All
NEs that have the ACL configured can determine whether to filter out an IP packet when the IP
packet passes the NE. The ACL controls the direction of a specific data flow as to whether the
data flow is transmitted in or out of a network.
Communication Port Access Control: An NE can access the T2000 by using the OAM, COM,
Ethernet port or serial port. You can set the port for the NE access by enabling the access control
of the port. By default, an NE is allowed to access the T2000 by Ethernet ports.
NE User Management
NE User: To ensure the security of the NE data, you must use the previously created NE user
to log in to the NE. Also, you can only perform the operations that are authorized to the NE user.
NE User Level: According to the operation types authorized to a user, the NE users are regarded
as having different operation levels. This level is known as the NE user level. The NE users of
different levels are allocated to different NE user groups.
NE Security Parameters: According to the security settings of the NE, an NE automatically
determines whether the password of the NE user remains valid, and whether the NE user is
allowed to log in. The network manager should know the security settings of the NE, and modify
the password of the NE user before it expires. The NE security parameters include the following:
Allowable Used Times for Outdated Password, Password Max. Valid Period, Password
Min. Valid Period , Password Uniqueness, Lock Testing Time, Allowable illegal Access
Times and Lock Time.
NE Operation Rights
NE Operation Rights: The operation right of NE users has five levels. From the lowest level
to the highest level, they are monitor level, operation level, maintenance level, system level and
debug level. The user with a higher right level can perform all operations that are authorized to
a user with a lower right level. For example, the user of the operation level has all the operation
rights authorized to the user of the monitor level. The following describes what operations are
authorized to each level.
l Monitor level: all the query commands, login, logout, password modification
l Operation level: all the fault and performance settings, part of security settings, part of
configurations
l Maintenance level: part of security settings, part of configurations, communication settings,
log management
l System level: all the security settings, all the configurations
l Debug level: all the security settings, all the configurations, debug commands
Authority Management: To ensure the security of the NE data, any one who wants to perform
operations for an NE must log in to the NE as an NE user, and can only perform the operations
authorized to this user. It is recommended that you create an NE user before configuring services.
Make sure that when you create a common user account that can be used on all NEs, keep the
right levels consistent to avoid the disorder of user right.
NE Data Backup/Restoration
NE Data Backup: Backing up the NE database is necessary for the daily maintenance. With
the backup of the database, the NE can automatically restore the NE data and run normally in
case the data in SCC is lost or the equipment powers off.
NE Data Restoration: During the daily maintenance, if an NE becomes faulty, the NE data is
restored based on the data backup on the SCC or CF card.
3.2.1 OS User
This section describes the OS user types and their rights related to T2000.
3.2.2 Database Users and Authorities
After you install the Sybase database, the system provides a default administrator account sa.
During the database initialization, the system also automatically creates a user account
T2000user.
3.2.3 NMS Users and Rights
This section describes the NMS users and related rights. The NMS user account is used to
perform operations on the T2000 client. In the T2000, the NMS user refers to the T2000 user.
3.2.4 NE Users and Authorities
NE users are mainly used for NE operations. If an NE user wants to operate an NE, the user
must log in to the NE first. Authority of the NE user restricts relevant operations performed to
the NE.
3.2.5 Concepts Related to the T2000 Users
When you perform user management tasks, you need to know some basic concepts, such as the
user, user group, operation set, ACL, managed domain, and operation right. Knowing these
concepts helps you perform user management, especially when rights management is complex.
3.2.6 T2000 User Rights Assignment Policies
When assigning user rights, you need to know the management policies such as the general
policy, user group management policy, and user management policy. These policies help you
to complete user rights management more quickly and accurately.
3.2.1 OS User
This section describes the OS user types and their rights related to T2000.
root
The root user is the default system administrator of the solarislinux operating system.
With the highest right of the operating system, the root user controls all resources, creates other
users, assigns rights to other users, and performs all operations of the operating system. The
root user is responsible for installing or uninstalling the T2000 server application.
administrator
The administrator user is the default system administrator of the Windows operating system.
With the highest right of the operating system, the administrator user controls all resources,
creates other users, assigns rights to other users, and performs all operations of the operating
system. The administrator user is responsible for installing or uninstalling the T2000 server
application.
nmsuser
During the T2000 installation, the T2000 creates a nmsuser user of the operating system
automatically. The nmsuser user is responsible for setting environment variables of the T2000
server and starting the T2000 client at the server.
The nmsuser user has all the rights of its home directory. The file .profile in this directory records
environment variables for the T2000 running.
sybase
The sybase user is responsible for setting Sybase environment variables, installing, maintaining
and managing the Sybase database.
With all the rights of the directory /opt/sybase, the sybase user can manage the Sybase database,
for example, configuring Sybase environment variables and starting/stopping the Sybase service.
sa sa is the database system administrator account. This account has the highest
database operation authorities. It can manage all resources, create other users,
assign authorities for other users, and perform all operation functions that the
database provides.
T2000user T2000user is a user account that accesses the T2000 database server. This
account is responsible to add, delete, query, and modify the contents of the
T2000 database.
Other T2000 users are created by the admin user. These T2000 users are created base on
the requirements of management.
NE user has the following five levels in ascending order: monitor level, operation level,
maintenance level, system level, and commissioning level. The authorities of the five user levels
are as follows:
l Monitor level: all query commands, NE login and logout, and password change.
l Operation level: all fault and performance settings, some security settings, and some
configurations.
l Maintenance level: some security settings, some configurations, communication settings,
and log management.
l System level: all security settings and all configurations.
l Commissioning level: all security settings, all configurations, and commissioning
command execution.
NOTE
A higher level user has all functions of a lower level user. For example, an operation level user has all authorities
of a monitor level user.
NE user has four user flags. That is, you need to log in to the NE as different NE users for
different network management systems.
l LCT NE user: The NE user used to manage NEs on the LCT.
l EMS NE user: The NE user used to manage NEs on the T2000.
l CMD NE user: The NE user used to manage NEs on the CMD.
l General NE user: The NE user used to manage NEs in the case of any network management
system.
– User ACL
The ACL of a user. The current user can log in to the T2000 only through specific IP
addresses or network segments.
NOTE
The IP addresses or the network segments for the user ACL cannot exceed the range of the IP addresses
or the network segments for the system ACL.
l Managed domain
A managed domain refers to the physical resources and logical resources managed by the
user or the specific domains managed by the user group.
In the topology view or on the device panel, only the managed objects are displayed. You
can change the managed domain of a user or a user group to change the user rights. The
managed domain is represented as a submap tree (consistent with the physical topology
view).
– If the entire submap tree is selected, the parent submap and all the child submaps in the
parent submap can be managed.
– If the tree is partially selected, the parent submap can be managed, but some child
submaps under it cannot be managed.
– If the tree is not selected, the parent submap cannot be managed, but some child
submaps under it may be manageable.
l Operation rights
Operation rights determine the operations that a user can perform.
l Group-level operations
These are operations performed on user groups. For example, the operations such as setting
the managed domain or operation rights to a user group, creating a user group, or deleting
a user group.
the normal users in the managed user groups of the security administrators. Security
administrators can manage users only when the users are in the managed user groups of
the security administrators.
User management realizes simple division of authority and domain. Division of authority
specifies the operation rights that a user has and division of domain specifies the user groups
that can be managed by a user. You can manage users only when you have security rights
and manageable user groups. If you have manageable user groups and you have the rights
to query the information on a single user and set user operation rights, you can assign all
non-security rights to other users. If you can manage all user groups and you have the rights
to query the information on a single user group and set operation rights of user groups, you
can assign all non-security rights to other user groups. In this case, you cannot assign non-
security rights to your own user group.
l Operation set management policy
Operation set management is not restricted by managed user groups. Only admin can
create, delete, and modify security operation sets. Normal operation sets can be managed
by security administrators, and they are not related to the user groups or users that they
belong to. As a security administrator, if you have the right to manage operation sets, you
can add non-security operation sets.
l Login rights management policy
User login rights are related to security properties. You can set security properties to manage
the login period and the IP address range for login.
NOTE
A user can use the default operation set, equipment set, and user group provided by the T2000, or customize
them according to the planning.
Role-Based and
T2000 Access Security Policy of T2000 Login
Domain-Based
Control T2000 User Management
Management
Setting SSL Protocol Setting the Password Creating an Locking the T2000
Communication Template Operation Set Client Screen
Assigning a Managed
Setting the User
Domain to a T2000
Lockout Duration
User
Assigning Operation
Unlocking a T2000
Authorities for T2000
User
Users
The NE security management process describes the security management operations of the NE,
and the relations between the operation tasks. See Figure 3-3.
NE User NE Login
NE Access Control
Management Management
Controlling Communication
Between NE and T2000 Through Creating an NE User Locking Out NE Login
Ethernet Port
Prerequisite
Only the root user of the operating system is authorized to perform this operation.
Context
CAUTION
Periodically change the password of the root user to avoid unauthorized login or intended
damage caused by password disclosure.
Procedure
Step 1 Log in as user root.
Step 2 Run the following command to change the password of user root:
# passwd root
----End
Prerequisite
The root user of the operating system is authorized to perform this operation.
Context
CAUTION
Periodically change the password of the sybase user to avoid misoperations or intended damage
caused by password disclosure.
Procedure
Step 1 Log in as user root.
Step 2 Run the following command to change the password of user sybase:
# passwd sybase
----End
Prerequisite
The root user of the operating system is authorized to perform this operation.
Context
CAUTION
Periodically change the password of the t2000 user to avoid unauthorized login or intended
damage caused by password disclosure.
Procedure
Step 1 Log in as user root.
Step 2 Run the following command to change the password of user t2000:
# passwd t2000
----End
Procedure
Step 1 Enter the following commands:
# rm -f /.netrc
# rm -f /export/home/t2000/.rhosts
# rm -f /export/home/t2000/.netrc
# rm -f /opt/sybase/.rhosts
# rm -f /opt/sybase/.netrc
# rm -f /etc/hosts.equiv
----End
Procedure
Step 1 Enter the following command:
# echo sybase >> /etc/ftpd/ftpusers
# echo sybase >> /etc/ftpusers
----End
Prerequisite
Only the t2000 user of the operating system is authorized to perform this operation.
Context
CAUTION
Periodically change the password of a database user to avoid misoperations or intended damage
caused by password disclosure.
Procedure
Step 1 Run the password management tool.
l In Solaris, open a terminal window, and run the following commands as user t2000.
% cd /T2000/server/bin
% ./DbPwdTool
l In SUSE Linux, open a terminal window, and run the following commands as user
t2000.
% cd /T2000/server/bin
% ./DbPwdTool
l In Windows, switch to the server\bin directory of the T2000 installation path, and double-
click dbpwdtool.exe.
The following information appears.
iManager NMS Database Password Tool
----End
Prerequisite
Only the t2000 user of the operating system is authorized to perform this operation.
Context
CAUTION
Periodically change the password of a database user to avoid misoperations or intended damage
caused by password disclosure.
Procedure
Step 1 Run the password management tool.
l In Solaris, open a terminal window, and run the following commands as user t2000.
% cd /T2000/server/bin
% ./DbPwdTool
l In SUSE Linux, open a terminal window, and run the following commands as user
t2000.
% cd /T2000/server/bin
% ./DbPwdTool
l In Windows, switch to the server\bin directory of the T2000 installation path, and double-
click dbpwdtool.exe.
The following information appears.
iManager NMS Database Password Tool
----End
Prerequisite
You must be an NM user with the "Security Maintainer" authority or higher.
Context
CAUTION
The communication security setting takes effect only after the T2000 server is restarted.
Procedure
Step 1 If the T2000 server is installed on Windows, follow the steps below to enable the SSL protocol
at the server.
1. Open the System Monitor window.
2. Choose System > Communication Mode Settings from the Main Menu. The
Communication Mode Settings dialog box is displayed.
3. Click the Security (SSL) option button.
4. Click OK.
Click OK in the Confirmation dialog box. The settings take effect after the T2000 is
restarted.
Step 2 If the T2000 server is installed on SolarisSUSE Linux, follow the steps below to enable the SSL
protocol at the server.
1. Open a terminal window.
2. Run the following commands on the server:
# cd /opt/HWICMR/bin
# ./enablerootlogin.sh
You only need to select or enter a value when setting the SSL. For other steps, press
Enter to proceed until the terminal displays the following information:
======= SSL Protocol =======
Select[N]:
Confirm[Y]:
5. Enter Y.
/var/ICMR/ICMR_LOG_20060313150632
/var/ICMR/ICMR_LOG_20060313150731
After all these operations are complete, the SSL of the server is successfully enabled. The
settings take effect after the T2000 is restarted.
Step 3 On the computer of the T2000 client, double-click the T2000 Client icon on the desktop.
NOTE
The server mode of the user need to be set to SSL. The setting method is as follows:
l Setting the mode when creating a server: click , and the Setting window is displayed. Click New.
In the dialog box displayed, set Mode to Security(SSL).
l Modifying the mode for an existing server: click , and the Setting window is displayed. Click
Modify. Set Mode of the server to Security(SSL).
----End
Prerequisite
You must be an NM user with the "Security Maintainer" authority or higher.
Procedure
Step 1 Choose System > NMS Security Settings > ACL from the Main Menu. The ACL dialog
box is displayed.
Step 3 Set parameters of the IP address or network segment, and click OK.
----End
dictionary, which includes some common passwords that can be easily cracked. The user can
also re-define the weakness password dictionary as needed.
3.7.5 Modifying the T2000 User Validity
For security purpose, it is not recommended to set a normal T2000 user to be permanently valid.
However, for special users (such as super user and administrator) who always need to manage
the entire system, it is recommended to set these T2000 users to be permanently valid.
3.7.6 Modifying the T2000User Password Validity
To protect the T2000 from illegal logins, you need to periodically change the password of a
T2000 user. You can specify the validity period of passwords, so that the T2000 prompts you
to change the password on a regular basis. You can also set automatic password expiration
warning.
3.7.7 Setting the User Lockout Duration
If a T2000 user never logs in to the T2000 within a specified duration, the user will be locked
out.
3.7.8 Unlocking a T2000 User
To ensure network data security, you can manage users that have logged in to the T2000. You
can lock a user if the user fails to log in for three consecutive times. You can also unlock the
user if necessary.
3.7.9 Initializing the T2000 User Password
If you forget the password, or the password expires, ask the administrator to initialize the
password.
Prerequisite
You must be an NM user with the "Security Operator" authority or higher.
Context
The password template defines the following elements.
l Password composition: A password may be a combination of numerals, letters, and special
characters. The user can set the minimum number of characters for each type of
components.
l Password length: The user can set the maximum and minimum lengths for a password.
Note that the password minimum length cannot be smaller than the total of the minimum
number settings for the three types of characters.
l Password relation with the user name: The user can set the maximum length of repeated
character string between the password and the user name. In this way, user name and
password repetition can be avoided.
Procedure
Step 1 Choose System > NMS Security Settings > Security Policies from the Main Menu. The
Security Policies dialog box is displayed.
Step 2 Set the password length and modify the Minimum length of normal user password, Minimum
length of super user password, and Maximum password length according to requirements.
l By default, the Minimum length of normal user password is 8.
l By default, the Minimum length of super user password is 8.
l By default, the Maximum password length is 16.
Step 3 Set the minimum number of letters in a password and modify the Minimum letters in the
password according to requirements.
l When you click Cannot enter characters, the password cannot contain letters. In this case,
the Minimum letters in the password cannot be set.
l When the Minimum letters in the password is 0, it indicates that the number of letters in
the password is not restricted.
Step 4 Set the minimum number of upper case letters in a password and modify the Minimum
uppercase letters in the password according to requirements.
l When you click Cannot enter characters, the password cannot contain uppercase letters.
In this case, the Minimum uppercase letters in the password cannot be set.
l When the Minimum uppercase letters in the password is 0, it indicates that the number
of upper case letters in the password is not restricted.
Step 5 Set the minimum number of lower case letters in a password and modify the Minimum
lowercase letters in the password according to requirements.
l When you click Cannot enter characters, the password cannot contain lowercase letters.
In this case, the Minimum lowercase letters in the password cannot be set.
l When the Minimum lowercase letters in the password is 0, it indicates that the number of
lower case letters in the password is not restricted.
Step 6 Set the minimum number of numerals in a password and modify the Minimum numbers in the
password according to requirements.
l When you click Cannot enter characters, the password cannot contain numbers. In this
case, the Minimum numbers in the password cannot be set.
l When the Minimum numbers in the password is 0, it indicates that the number of numerals
in the password is not restricted.
Step 7 Set the minimum number of special characters in a password and modify the Minimum special
characters in the password according to requirements.
l When you click Cannot enter characters, the password cannot contain special characters.
In this case, the Minimum special characters in the password cannot be set.
l When the Minimum special characters in the password is 0, it indicates that the number
of special characters in the password is not restricted.
Step 8 Set the Same Adjacent Characters Allowed in Both User Name and Password.
NOTE
l If you click No requirement, the user name and password are not mutually restricted.
l If you click Cannot contain the full user name, the user name cannot be used as the password.
l If you click Cannot contain n characters, the password cannot contain the same n consecutive characters
in the user name when you set the password. "n" represents the number of characters.
Step 9 Optional: Set the The password cannot contain a word that has the same meaning of
password, The password cannot be a string of the related user name in reverse order, and
The password must meet the complexity requirements according to requirements.
Step 10 Click OK.
----End
Prerequisite
You must be an NM user with the "Security Operator" authority or higher.
Procedure
Step 1 Choose System > NMS Security Settings > Security Policies from the Main Menu. The
Security Policies dialog box is displayed.
Step 2 Set the password reuse frequency and modify the Number of old passwords that cannot be
repeated according to requirements.
NOTE
----End
Procedure
Step 1 On Windows, open the SecurityConfig.xml file in the %IMAPROOT%\client\style
\defaultstyle\conf\security path. Set the value of PARA name="POPUP_AGREEMENT" to
true.
NOTE
----End
Postrequisite
Restart the T2000 client to apply the settings.
Context
The following illustrates the operations on the UNIX platform. The operations on the Windows
platform are similar.
Procedure
Step 1 Create a temporary directory, for example, /tmp/client.
Step 2 Copy the imap.jar file from /client/lib (in the T2000 client installation directory) to /tmp/
client.
Step 5 Enter the contents of the password dictionary in the dict1.wrd file, one row for each character
string.
For example:
a
an
a lot of
Step 7 Open a terminal window, run the following commands to upgrade the imap.jar file.
# cd /tmp/client
# jar -uf imap.jar common/imap12/security/dict/dict1.wrd
NOTE
If the computer prompts that jar does not exist, install jdk.
Step 8 Replace the existing file with the updated imap.jar file.
----End
Postrequisite
Restart the T2000 client to apply the settings.
Prerequisite
You must be an NM user with the "Security Operator" authority or higher.
Context
CAUTION
Maintain the T2000 user validity on a regular basis so as to avoid misoperations or damage
caused by user account theft.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, double-click Users, and select a corresponding T2000 user.
Step 3 Click the General tab.
Step 4 Modify the following user validity parameters: Disable user account and Account validity
(days).
NOTE
l To set permanent validity for the T2000 user, check the Always valid check box on the right of the
Account validity(days) field. In this event, the Account validity(days) cannot be set.
l You cannot set Disable user account and Account validity(days) for user admin.
----End
Prerequisite
You must be an NM user with the "Security Operator" authority or higher.
Context
CAUTION
Maintain the T2000 user password validity on a regular basis so as to avoid misoperations or
damage caused by password thefts.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, double-click Users, and select a corresponding T2000 user.
NOTE
To set permanent validity for the T2000 user, check the Always valid check box on the right of the Password
validity(days) field. In this event, the Account validity(days) cannot be set.
----End
Prerequisite
l You must be an NM user with the "Security Operator" authority or higher.
l The T2000 user is already created.
Context
During T2000 user creation, the user can also set this parameter as needed. The description given
here is mainly for a created T2000 user.
NOTE
When the user account is locked out, it can only be unlocked by the T2000 administrator.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, double-click Users, and select a corresponding T2000 user.
Step 3 Click the General tab.
Step 4 Set the period of freezing the user account, and modify the value of Disable user account unused
for(days) according to requirements.
NOTE
l If you do not want to freeze the user account, check the Unrestricted check box on the right of the
Disable user account unused for(days) field. In this event, the Disable user account unused for
(days) cannot be set.
l You cannot set Disable user account unused for(days) for user admin.
----End
Prerequisite
When operating in SolarisSUSE Linux, you must log in as user t2000.
Context
There are two ways of unlocking a user, which are automatic unlocking and manual unlocking.
If you choose automatic unlocking, the user automatically changes to the unlocked state after a
specified locking duration. Manual unlocking means that an unlocked administrator unlocks the
locked user in the T2000.
To unlock the locked user "admin", switch to the Sysmonitor Client, and restart the security
process (EmfSecuDm).
Procedure
l Automatic unlocking
1. Choose System > NMS Security Settings > Security Policies from the Main Menu.
The Security Policies dialog box is displayed.
2. Click the Account Policy tab.
3. Modify the value of Auto unlocking time (minutes).
– By default, the value of Auto unlocking time (minutes) is 30. That is, the locking
duration of the user is 30 minutes.
– The minimum locking duration is 1 minutes. The maximum is 600 minutes.
4. Click OK.
After the specified locking duration, the locked user is automatically unlocked.
l Manual unlocking
NOTE
You must be an NM user with the "Security Operator" authority or higher.
1. Choose System > NMS User Management from the Main Menu.
2. In the Security Object pane, double-click User and select a locked T2000 user from
the T2000 user list.
3. Right-click the user and choose Unlock from the shortcut menu.
----End
Prerequisite
You must be an NM user with the "Security Maintainer" authority or higher.
Context
When initializing the password, enter a new password. The old password is not required.
However, the old password is required for changing password of the administrator. That is, the
password of the administrator cannot be initialized.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, double-click Users and select a corresponding user of the network
management system.
Step 3 Right-click the user and choose Set Password. The Set New Password dialog box is displayed.
Step 4 Enter a new password in the New Password field, and enter it again in the Confirm
Password field for confirmation.
----End
Prerequisite
You must be an NM user with the "Security Operator" authority or higher.
Context
When you assign authorities for users, it is recommended that you directly assign the authorities
to the user groups to which the users belong, to facilitate overall management.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, double-click User Groups, right-click and choose New User
Group from the shortcut menu. In the New User Group dialog box that is displayed, enter the
information of a new user group.
----End
Prerequisite
You must be an NM user with the "Security Maintainer" authority or higher.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, double-click User Groups, and select a T2000 user group.
Step 4 Optional: Select one or more desired T2000 users and click Delete.
Step 5 Click Add and the Add Users dialog box is displayed.
Step 6 Select one or more user groups that you want to add, and click OK.
----End
Prerequisite
l You must be an NMS user with the "Security Operator" authority or higher.
l You can set the managed domain of a user group only when you have the right to manage
all the user groups.
Context
l When the managed domain of a submap is assigned to a user group, the users in the group
can manage all the resources under the submap by default.
l You can manage the resources under a submap only when you have the right to the managed
domain of the submap.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, expand the User Groups node, and then select a user
group.
Step 3 Click the Managed Domain tab to view the managed domain of the user group.
Step 4 Click Modify. In the Modify User Group Managed Domain dialog box, modify the state of
the managed domain in the submap navigation tree.
Step 5 Click OK.
----End
Prerequisite
l You must be an NM user with the "Security Maintainer" authority or higher.
l The T2000 user group is already created.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, double-click User Groups, and select a T2000 user group.
Step 3 In the right-hand pane, click the Operation Rights tab.
Step 4 Optional: Select one or more desired operation authorities and click Delete.
Step 5 Click Add and the Add Rights dialog box is displayed.
Step 6 Select the type, operation object, subtype, and operation set.
NOTE
l When the type is Transport network NM management and Transport network network
management, the operation objects are transmission network and NM by default. Therefore, you need not
select the Operation Object.
l To search for an operation set, enter the name of the desired operation set in the Operation Set field, and
click Search. This operation applies to the query of multiple operation sets.
----End
Prerequisite
l You must be an NMS user with the "Security Operator" authority or higher.
l You can set a user group administrator only when you have the right to manage all the user
groups.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, expand the User Groups node, and then select a user
group.
----End
Prerequisite
You must be an NMS user with the "Security Operator" authority or higher.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, expand the User Groups node, and then select a user
group.
Step 3 on the right area, you can perform the following operations about the user group:
l Click the General tab. on the right list, modify the general properties of the user group, and
then click Apply.
l Click the Members tab to modify the members of the user group.
– Adding a user group member: At the bottom of the list box, click Add. In the Add
User dialog box, select a member you want to add to the group, and then click OK.
– Deleting a user group member: on the right list box, select a user you want to delete, and
then click Delete.
– Printing user group members: on the right list box, select Print. In the Print dialog box,
set print parameters, and then click Print.
– Saving user group members: on the right list box, select Save As. In the Save As dialog
box, specify File name, and then click OK.
l Click the Managed Domain tab. Click Modify. In the Modify User Group Managed
Domain dialog box, modify the status of the managed domain in the submap navigation tree,
and then click OK.
l Click the Operation Rights tab to modify the operation rights of the user group.
– Adding a right: At the bottom of the list box, click Add. In the Add Right dialog box,
select the right you want to add, and then click OK.
– Deleting a right: on the right list box, select the operation right you want to delete, and
then click Delete.
----End
Prerequisite
l You must be an NMS user with the "Security Maintainer" authority or higher.
l You can delete user groups only when you have the right to manage all user groups.
l You can delete the default group only when you have the global managed domain and the
right to delete user groups.
Context
After a user group is deleted, the users in this group do not have the rights of the group and do
not belong to the group.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, double-click the User Groups node. The table on the
right displays all the user groups.
Step 3 Select the user group you want to delete, and then click Delete.
----End
Context
3.9.1 Creating T2000 Users
For network maintenance purposes, you can create T2000 users and assign different authorities
to them. Apart from user admin, all the users to operate the T2000 need to create corresponding
accounts, that is, the T2000 user accounts, on the T2000.
3.9.2 Changing the User Group That an T2000 User Belongs To
You can modify the user group of an T2000 user so that the user can have the management rights
and operation rights of the user group.
3.9.3 Assigning a Managed Domain to a T2000 User
You can assign a managed domain to a user so that the user can have a managed domain besides
the managed domains of the user group. You can perform this operation when you want to assign
a managed domain to a specific user.
3.9.4 Assigning Operation Authorities for T2000 Users
You can create a T2000 user and assign authority to the user. In addition, you can specify the
equipment that the user is able to manage.
3.9.5 Setting the Access Control List of T2000 Users
After you create a T2000 user, you can specify a client IP address range for the user to prevent
unauthorized logins. In this way, the T2000 user can log in to the T2000 server only through
those clients within the specified IP address range. If the IP address range is not specified, the
T2000 user can log in to the T2000 server by using the clients of the local server.
3.9.6 Modifying the Properties of an T2000 User
You can modify the information on an T2000 user, including the general properties, user groups,
ACL, managed domain, and operation rights.
3.9.7 Changing the NM User Password
To ensure network security, change the password periodically and keep it safe. In this way,
misoperations and damage caused by password disclosure can be avoided.
3.9.8 Deleting an NM User
NM users who do not use the T2000 must be deleted to avoid misoperations or damage caused
by user account thefts. The T2000 automatically deletes NM users who are not logged in during
the recent six months.
3.9.9 Example: Creating a T2000 User
This section describes how to create a T2000 user and assign an authority to that user by means
of an example.
Prerequisite
You must be an NM user with the "Security Maintainer" authority or higher.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, double-click Users, right-click and choose New User from the
shortcut menu.
NOTE
If Must modify password is set to Yes, when a new user logs in for the first time, a prompt is displayed to ask
the user to change the initial password before the user logs in.
----End
Postrequisite
After a user is created, you need to set the following:
l Joining a user group. For details, see 3.9.2 Changing the User Group That an T2000
User Belongs To.
l Setting the management domain. For details, see 3.9.3 Assigning a Managed Domain to
a T2000 User.
l Setting the operation authority. For details, see 3.9.4 Assigning Operation Authorities
for T2000 Users.
l Setting the address access control list. For details, see 3.9.5 Setting the Access Control
List of T2000 Users.
Prerequisite
You must be an NMS user with the "Security Operator" authority or higher.
Context
You cannot set the user group that the admin user belongs to.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, expand the User node, and then select a user.
Step 4 Change the user group to which the NMS user belongs.
l Add the user group to which the NMS user belongs.
Click Add. Choose the user group to be added from the list, and then click OK.
l Delete the user group to which the NMS user belongs.
Choose the user group to be deleted, click Delete, and then click OK in the Confirm dialog
box.
----End
Prerequisite
You must be an NMS user with the "Security Operator" authority or higher.
Context
l If a user has the right to set the management domain, then the user can assign all
management domains to managed users, including management domains that the user does
not belong to.
l When the operation that a T2000 user performs involves the equipment that is beyond the
managed domain of the T2000 user, the operation fails. Therefore, when you assign a
managed domain to a T2000 user, you need to cover all the NEs involved in the operations
that the T2000 user needs to perform.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, expand the Users node. Select a user.
Step 3 Click the Managed Domain tab to view the managed domain of the user.
Step 4 Click Modify, and then modify the state of the managed domain in the submap navigation tree.
Prerequisite
You must be an NM user with the "Security Maintainer" authority or higher.
Context
The principle of assigning user authorities is as follows:
1. After you create a T2000 user, you assign the user with certain user authorities by adding
the user to a user group rather than assigning specific authorities for the user.
2. If the user authorities are limited, and the user cannot perform certain operations after the
user is added to a default user group, you can 3.8.1 Creating User Groups. After you add
authorities for this user group, assign the user to this new user group.
3. In practice, you may need to add or delete specific authorities for a user without creating
new user groups. In this case, follow the rules below.
l To modify specific authorities for a number of NEs, do not directly select these NEs.
3.11.1 Creating an Equipment Set for the NEs that require more authorities, and assign
authorities for the equipment set.
l To assign a number of operation authorities to a user, do not directly select all these
operation authorities. 3.10.2 Creating an Operation Set for these operations and assign
the operation set to the user.
l If you want to assign an authority or a few authority to a user, you can select the user
that you want to set the authority directly. In the right portion of the window, click the
Operation Level tab, and add the corresponding operation authority to the user.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, double-click Users and select a desired user.
Step 3 In the right-hand pane, click the Groups tab.
Step 4 Optional: Select a desired user group and click Delete.
Step 5 Click Add and the Add User Groups dialog box is displayed.
Step 6 Select a user group that you want to add, and click OK.
Step 7 In the right-hand pane, click the Operation Rights tab.
Step 8 Optional: Select a desired user operation rights and click Delete.
Step 9 Click Add and the Add Rights dialog box is displayed.
Step 10 Select a user group that you want to add, and click OK.
----End
Prerequisite
Only the admin user can set the user access control.
Context
l If you select Use System ACL, the T2000 user can log in to the clients corresponding to
all IP addresses or network segments in the list by default.
l If you select Use User ACL, you need to select an IP address or network segment of the
client that the T2000 user can log in to.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, double-click Users and select a desired user.
Step 7 Set parameters of the IP address or network segment, and click OK.
Step 8 Click Close to close the Set ACL dialog box.
Step 9 Optional: If Use User ACL is selected, you need to check the Access Allowed check box
corresponding to the IP address or network segment. Click Apply.
----End
Prerequisite
You must be an NMS user with the "Security Operator" authority or higher.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, expand the Users node, and then select a user.
Step 3 Click the General tab. In the right list, modify the general properties of the user, and then click
Apply.
Step 4 Click the Groups tab. At the bottom of the list box, click Add. In the Add User Group dialog
box, select a user group, and then click OK.
Step 5 Click the ACL Setting tab, choose Use User ACL. Choose the ACL, and then click Apply.
Step 6 Click the Managed Domain tab. Click Modify. In the Modify User Managed Domain dialog
box, modify the managed domain of the user. Click OK.
Step 7 Click the Operation Rights tab, and then modify the operation rights of the user.
l Add an operation right.
At the bottom of the list box, click Add. In the Add Rights dialog box, select a right you
want to add, and click OK.
l Delete an operation right.
In the right list box, select an operation right you want to delete, and then click Delete.
----End
Prerequisite
You must be an NM user with the "Security Operator" authority or higher.
Context
CAUTION
Periodically change the password to avoid misoperations or intended damage caused by
password disclosure.
Procedure
Step 1 Choose File > Change Password from the Main Menu. The Change Password dialog box is
displayed.
Step 2 Enter the old password in the Old PasswordCurrent Password field. Enter the new password
in the New Password field and then enter the new password again in the Confirm Password
field.
----End
Prerequisite
You must be an NM user with the "Security Maintainer" authority or higher.
Procedure
Step 1 Choose System > NM User Management from the Main Menu.
Step 3 Right-click an NM user and choose Delete from the shortcut menu.
----End
Prerequisite
l You must be an NM user with the "Security Maintainer" authority or higher.
l You must be the admin user to set user access control. You can only query the user access
control with NM administrator authority.
l The ES_NM_user1 equipment set must be created.
l The OS_NM_user1 operation set must be created.
l The SS subnet must be created.
Context
The T2000 administrator A is responsible for T2000 security management. After the T2000
installation and commissioning, a T2000 user NM_user1 needs to be created for the T2000
maintainer B. The specific requirement is as follows.
l T2000 user name: NM_user1
l T2000 user password: User1368
l The T2000 user NM_user1 belongs to the maintainer group.
l The T2000 user NM_user1 can manage all the equipment in only the SS subnet.
l Apart from the maintainer group authority, the T2000 user must also be assigned with the
OS_NM_user1 operation set authority, and allowed to operate on the ES_NM_user1
equipment set.
l NM_user1 is allowed to log in by using the clients within a specified IP address range,
which is given below.
– Start IP address: 192.168.0.1
– End IP address: 192.168.0.168
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 Create the T2000 user NM_user1.
1. In the Security Object area, double-click Users, right-click and choose New User from
the shortcut menu.
2. In the New User dialog box, complete the following information:
Name: NM_user1
Password: User1368
Confirm Password: User1368
3. Click OK.
In the right-hand user list, the newly created NM_user1 is displayed.
Step 3 Add the NM_user1 user to the maintainer group.
1. In the Security Object area, double-click Users and select the T2000 user NM_user1.
2. In the right-hand pane, click the Groups tab.
3. Click Add and the Add User Groups dialog box is displayed.
4. Select Maintainer Group and click OK. The newly added user group is displayed in the
user group list of the Groups tab.
2. Cancel the selection of Manage the entire network, and select the SS subnet of the root
Object Tree.
3. Click OK.
Step 5 Adjust authority for NM_user1 so that the user has OS_NM_user1 operation set authority on
the ES_NM_user1 equipment set.
1. Click the Operation Rights tab and click Add.
2. In the Add Rights dialog box, complete the following information:
Authority Type: Transmission Network NE Management
Operation Object: ES_NM_user1
Operation Set: OS_NM_user1
3. Click OK.
The added authorities are displayed in the authority list.
Step 6 Set the IP address range of clients from which NM_user1 is allowed to log in.
1. Click the ACL Setting tab.
2. Click Use User ACL.
3. Click Set ACL and the Set ACL dialog box is displayed.
4. Click Add and the Add dialog box is displayed..
5. Click Start IP address to end IP address and set the following parameters:
Start IP Address: 192.168.0.1
End IP Address: 192.168.0.168
----End
NOTE
l In the Transport network NM management, the NM maintainer operation set has the highest authority
and the NM monitor operation set has the lowest authority.
l In the Transport network network management, the network maintainer operation set has the highest
authority and the network monitor operation set has the lowest authority.
l In the Transport network NE management, the NE administrator operation set has the highest authority
and the NE monitor operation set has the lowest authority.
l Be default, an operation set of a higher authority contains all authority of an operation set of a lower authority.
For the default authority of each operation set, refer to "Default Operation Set List" in "Appendix" of the
T2000 help.
Prerequisite
You must be an NM user with the "Security Maintainer" authority or higher.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, right-click Operation Sets and choose New Operation Set from
the shortcut menu.
Step 3 In the New Operation Set dialog box displayed, enter the information of a new operation set.
Click Apply.
Step 4 Click the Members tab. Check the Add operations or Copy operation sets option button to
add members to the operation set.
----End
Prerequisite
l You must be an NMS user with the "Security Operator" authority or higher.
l Only the admin user can assign the security operation rights.
l Only the global group administrator can set user groups.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, expand the Users or User Groups node, and then select
a user or a user group.
Step 3 Click the Operation Rights tab, and then click Add.
Step 4 In the Add Rights dialog box, set All Operation Sets. In Subtype, select the operation set you
want to add, and then click OK.
NOTE
In the Security Object navigation tree, expand the Operation Sets node, and then select the added operation
set. Click the Applicable for tab. The service objects of the current operation set are displayed on the Applicable
for tab.
----End
Prerequisite
You must be an NMS user with the "Security Maintainer" authority or higher.
Context
If you delete a operation set, the operation set of a user or user group is also deleted.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, click the Operation Sets node. The table on the right
displays all the operation sets.
Step 3 Select the operation set that you want to delete, and then click Delete.
Step 4 In the Confirm dialog box, click OK.
----End
Prerequisite
You must be an NM user with the "Security Maintainer" authority or higher.
Procedure
Step 1 Choose System > NMS User Management from the Main Menu.
Step 2 In the Security Object area, click Device Sets, right-click and choose New Device Set from the
shortcut menu.
Step 3 In the New Device Set dialog box that is displayed, enter the information of a new equipment
set.
Step 4 Click the Members tab and add members for the equipment set.
----End
Prerequisite
You must be an NMS user with the "Security Operator" authority or higher.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, expand the Device Sets node, and then select a device
set.
----End
Prerequisite
You must be an NMS user with the "Security Operator" authority or higher.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, expand the Users or User Groups node, and then select
a user or user group.
Step 3 Click the Managed Domain tab, and then click Modify.
Step 4 In the Modify User Managed Domain or Modify User Group Managed Domain dialog box,
select the required device set, and then click OK.
NOTE
In the Security Object navigation tree, expand the Device Sets node, and then select the added device set. Click
the Applicable for tab.The service objects of the device set are displayed on the Applicable for tab.
----End
Prerequisite
You must be an NMS user with the "Security Maintainer" authority or higher.
Context
If you delete a device set, the device set of a user or user group is also deleted.
Procedure
Step 1 Choose System > NMS User Management from the main menu.
Step 2 In the Security Object navigation tree, expand the Device Sets node. The table on the right
displays all the device sets.
Step 3 Select the device set that you want to delete, and click Delete.
----End
Context
By using the T2000 you can perform the following T2000 login management tasks:
3.12.1 Locking the T2000 Client Screen
If you do not use the T2000 for a time period, you can lock out the client to ensure network
security. This function only locks out the client screen and does not affect the network.
3.12.2 Switching a Logged-In NM User
Different NM users have different authorities. You can log in as another user to perform
operations of different levels.
3.12.3 Forcing an NM User to Log Out of the T2000
For network security management, you can force a specified NM user to log out of the T2000
as required. In the single user mode, this function also forces all other users to log out of the
T2000. In addition, an NM user will be forced to log out by the T2000 after a long period of
time without any activities.
3.12.4 Switching to the Single User Mode
To avoid being affected by other NM users during a network expansion, you can switch to the
single user mode so that all other users are forced to log out.
3.12.5 Setting Automatical Log-In for T2000 Users
After setting the automatic login function, a NM user can log in to the T2000 next time by using
the specified user name and password. You can also set the display mode after you log in to the
T2000.
Procedure
Step 1 Choose File > Lock Terminal from the Main Menu.
The T2000 client is locked.
Step 2 If you want to unlock the client, press CTRL+ALT+U at the same time. Enter the password of
the current user or the password of user admin and click OK.
----End
Prerequisite
You have already logged in to the T2000.
Procedure
Step 1 Choose File > Logout from the Main Menu. The Confirm dialog box is displayed. Click OK.
Step 2 The Save coordinates dialog box is displayed. Click OK.
NOTE
This step is to executed when the view deploy is changed.
Step 3 Enter the user name and password in the Login dialog box.
----End
Prerequisite
You must be the admin user.
Procedure
Step 1 Choose System > NM User Management from the Main Menu.
Step 2 Choose Security Object > Users and click the Login User tab.
Step 3 Right-click an NM user and choose Force to Exit from the shortcut menu.
Step 4 Confirm dialog box is displayed. Click OK.
----End
Prerequisite
Only the admin user can enable single-user or multiple-user mode.
Context
In the single user mode, only user with "NM maintainer" authority or higher can log in to the
T2000.
Procedure
Step 1 In the multiple user mode, choose System > NMS Security Settings > Single User Mode from
the Main Menu.
Step 2 Click OK when the Confirm dialog box is displayed.
NOTE
To switch from the single user mode to the multiple user mode, set System > NMS Security Settings >
Single User Mode as unchecked.
----End
Procedure
Step 1 On the Main Menu, choose File > Preferences. In the Preferences dialog box, click the
Automatic Login tab.
Step 2 Select Log in automatically, and then enter the required user name and password.
NOTE
If Full Screen mode after login is selected, the Physical Diagram is fully displayed next time after you
log in to the T2000.
----End
Prerequisite
You must be an NM user with "NM maintainer" authority or higher.
Procedure
Step 1 Choose System > Remote Maintenance User Management from the Main Menu. The Remote
Maintenance User Management dialog box is displayed. Enable the remote maintenance user
and set its other parameters.
----End
Prerequisite
l You must be an NM user with "NM maintainer" authority or higher.
l The remote maintenance user must be enabled.
Procedure
Step 1 Choose System > Remote Maintenance User Management from the Main Menu. The Remote
Maintenance User Management dialog box is displayed.
Step 2 Set the Operation Authority. You can select Query or Configuration as needed.
----End
Prerequisite
l You must be an NM user with "NM maintainer" authority or higher.
l The remote maintenance user must be enabled.
Procedure
Step 1 Choose System > Remote Maintenance User Management from the Main Menu. The Remote
Maintenance User Management dialog box is displayed.
Step 2 Set Valid Forever or Not to No.
Step 3 Set Validity Period.
----End
Prerequisite
You must be an NM user with "NM maintainer" authority or higher.
Context
CAUTION
This operation may affect the communication between the T2000 and NEs.
l It is recommended to use Ethernet access for the LCT (T2000 LCT or Web LCT) in most
cases.
l If you use the LCT (T2000 LCT or Web LCT) to initialize NEs or perform download, use
Ethernet access.
Procedure
Step 1 In the NE Explorer, select an NE and choose Communication > Access Control from the
Function Tree.
Step 2 In the Ethernet Access Control area, click Refresh to query the Ethernet access enable status.
Step 3 Set The First Network Port as Enabled and click Apply. The Ethernet access function for the
NE is enabled.
NOTE
l If you want to disable this function, set The First Network Port as Disabled and click Apply.
l If the second network port exists, you can enable Ethernet access for the port. For OptiX OSN
equipment, the second network port is EXT port.
----End
Prerequisite
You must be an NM user with "NM maintainer" authority or higher.
Context
CAUTION
This operation may affect the communication between the T2000 and NEs.
Procedure
Step 1 In the NE Explorer, select an NE and choose Communication > Access Control from the
Function Tree.
Step 2 Check the Enable Serial Port Access check box. Click Refresh to query whether the current
NE allows serial port access.
Step 3 Check the Access NM check box. Click Apply to enable the serial access function of the NE.
NOTE
l If you want to disable this function, uncheck the Access NM check box. Click Apply.
l If you want to connect the serial port to command line, check the Access Command Line check box.
----End
Prerequisite
You must be an NM user with "NM maintainer" authority or higher.
Context
CAUTION
This operation may affect the communication between the T2000 and NEs.
Procedure
Step 1 In the NE Explorer, click an NE and choose Communication > Access Control from the
Function Tree.
Step 2 Select Enable OAM Access and click Apply. The OAM access of the NE is now enabled.
----End
Prerequisite
You must be an NM user with "NM maintainer" authority or higher.
Context
CAUTION
This operation may affect the communication between the T2000 and NEs.
l The COM port directly connects to the SCC board, improper usage may affect the normal
service handling on the NE, and the rate of the COM port is slow. Hence, it is recommended
to use Ethernet access for the LCT (T2000 LCT or Web LCT) in most cases.
l Use COM port access only when the Ethernet access fails, or the NE already connects to
the T2000, or certain lower layer commissioning commands need be run.
l For security measures, the COM port access is disabled by default after NE initialization
or downloading. If necessary, you can use the T2000 to temporarily enable COM access.
Procedure
Step 1 In the NE explorer, click an NE and choose Communication > Access Control from the
Function Tree.
Step 2 Select Enable COM Access and click Apply. The COM access of the NE is now enabled.
----End
Prerequisite
l You must log in to the T2000 as user admin
l Applies to the SDH and WDM equipment.
Context
CAUTION
This operation may affect the communication between the T2000 and NEs.
l When no T2000 user logs in to an NE and an LCT user requests to log in to the NE, the
NE does not refer to the LCT Access Control Switch parameter and allows the LCT access
directly.
l When a T2000 user has logged in to an NE and then an LCT user requests to log in to the
NE, the NE determines whether to allow the LCT user to log in according to the LCT
Access Control Switch parameter.
l When an LCT user has logged in to an NE and then a T2000 user requests to log in to the
NE, the login of the LCT user does not affect the login of the T2000 user, and the successful
login of the T2000 user does not affect the logged-in LCT user.
l When the LCT user and the T2000 user log in to the NE at the same time, set LCT Access
Control Switch to Disable Access. This does not affect the LCT user that is already logged
in.
Procedure
Step 1 In the NE Explorer, select an NE and choose Security > LCT Access Control from the Function
Tree.
Step 2 Click Query to query whether the current NE allows LCT access.
----End
3.15.1 ACL
Access control list (ACL) can be used for basic traffic filtering. ACL can be configured for all
the NEs to filter IP packets as they pass through an NE. ACL can prevent certain traffic from
entering or exiting a network.
3.15.2 Setting Basic ACL Rules
In the case of ordinary NEs that do not have high security requirements, you can set the basic
ACL rules. The basic ACL rules examine the source IP address of the packets. The basic ACL
rules do not use many system resources.
3.15.3 Setting the Advanced ACL Rules
In the case of NEs that have very high security requirements, you can set the advanced ACL
rules. The advanced ACL rule, examines the source and the sink IP address, the source and the
sink port number, and the protocol type. The implementation of advanced ACL rules use many
system resources. The advanced ACL rules have higher priority than the basic ACL rules.
3.15.1 ACL
Access control list (ACL) can be used for basic traffic filtering. ACL can be configured for all
the NEs to filter IP packets as they pass through an NE. ACL can prevent certain traffic from
entering or exiting a network.
Purpose
The most important reason to configure ACL is to provide security for the network. With proper
ACL rules, the entire network can be prevented from security threats. ACL can also provide the
basic flow control function.
Implementation
The ACL can control whether the IP packets are received or dropped by certain NEs. Every IP
packets is examined by the NEs according to predefined ACL rules. After the examination, the
NEs determine whether to receive or to drop this packet.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l It is applicable to the SDH and WDM equipment.
Procedure
Step 1 In the NE Explorer, select an NE and choose Security > ACL from the Function Tree.
Step 2 Click the Basic ACL tab. The basic ACL rule list is displayed.
NOTE
If the equipment only supports basic ACL settings, by clicking ACL from the Function Tree, you directly
access the list of the basic ACL rule.
Step 3 Click Query to load the basic ACL rules from the NE.
Step 5 Set the proper values for all the parameters according to the network requirements.
Step 6 Click Apply to apply the new configuration data to the NE.
A prompt appears indicating the operation was successful.
Step 8 Optional: Repeat Step 4 through Step 7 to set more basic ACL rules to this NE.
Step 9 Optional: Repeat Step 1 through Step 7 to set the basic ACL rules to other NEs.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Security > ACL from the Function Tree.
Step 2 Click the Advanced ACL tab. The advanced ACL rule list is displayed.
Step 3 Click Query to load the advanced ACL rules from the NE.
Step 5 Set proper values for all the parameters according to the network requirements.
Step 6 Click Apply to apply the new configuration data to the NE.
A prompt appears indicating the operation was successful.
Step 8 Optional: Repeat Step 4 through Step 7 to set more advanced ACL rules to this NE.
Step 9 Optional: Repeat Step 1 through Step 7 to set the advanced ACL rules to other NEs.
----End
By using the T2000 you can perform the following NE user management tasks:
3.16.1 Creating an NE User
To ensure NE data security, only the users with NE user authority can log in to the NEs. An NE
user is able to perform operations on the NEs according to the assigned authority. The T2000
administrator is advised to create NE users before configuring services.
3.16.2 Changing the NE User Password
To ensure network security, you are recommended to change the NE user password periodically.
3.16.3 Querying the NE User Information
By querying the additional information of an NE user, you can learn the basic information of
this user for the purpose of management or task allocation.
3.16.4 Querying NE Security Parameters
According to the default security settings, the NE is able to determine whether the NE user
password is valid and decide whether the login is allowed. The T2000 administrator needs to
know the NE security settings and modify the NE user password before it becomes invalid.
3.16.5 Deleting NE Users
To ensure NE and network security, you need to delete the NE users that are no longer used.
This prevents misoperations or damage caused by user account theft.
3.16.6 Querying NE User Groups
NE users of different levels are divided into different NE user groups. In this user interface, you
can query NE users included by various NE user groups of an NE.
Prerequisite
You must be an NM user with "NE administrator" authority or higher.
Context
The default NE user has the monitor level authority. To ensure NE data security, it is
recommended that you assign NE users with different authorities as required.
Procedure
Step 1 Choose System > NE Security Management > NE User Management from the Main Menu.
Step 2 In the NE list on the left, select one or more NEs and click .
Step 3 Click Add and the Add NE User dialog box is displayed.
NOTE
The NE user name must contain letters, or it can be a combination of letters, symbols and numerals. For
release 4.0 NEs, the NE user name contains at least 2, but not more than 8 characters. For release 5.0 NEs,
the NE user name contains at least 4, but not more than 16 characters.
Step 6 In the NE User Flag field, select a user type according to the type of the terminal through which
the user logs in to the NE.
Step 7 Enter the password in the New Password field and enter it again in the Confirm Password
field.
NOTE
For release 5.0 NEs, you also need to set the Whether the password is allowed to be modified
immediately parameter.
For release 5.0 NEs, you also need to set the For the OptiX Metro 500 equipment, you also need to set the
Login Allowed, Permanently Valid or not, Valid From and Valid Till.
The password is a string of 6-16 characters. It can consist of letters, symbols and numerals, and must contain
at least one letter and one numeral.
Step 8 In the NE Name field, select the NEs that this NE user is allowed to manage.
----End
Prerequisite
l You must be an NM user with "NE administrator" authority or higher.
l The NE user must be created.
Context
CAUTION
Change the password periodically for security purposes.
Procedure
Step 1 Choose System > NE Security Management > NE User Management from the Main Menu.
Step 2 In the Object Tree, select an NE that you want to query and click .
Step 3 Select an NE user whose password need to be modified from the NE user list and choose Set
Password . The Set Password of NE User dialog box is displayed. Enter the password in the
New Password field and enter the new password again in the Confirm Password field.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Choose System > NE Security Management > NE User Management from the Main Menu.
----End
Prerequisite
You must be an NM user with "NE administrator" authority or higher.
Applies to the release 5.0 NEs.
Context
The NE security parameters contain: Warning Screen Switching, Warning Screen
Information, Allowable Used Times for Outdated Password, Password Max. Valid Period
(day), Password Min. Valid Period (day), Password Uniqueness (Entries), Lock Testing
Time (minute) and Allowable Illegal Access Times.
Procedure
Step 1 In the NE Explorer, select an NE and choose Security > NE Security Parameters from the
Function Tree.
Step 2 Click Query to query the settings of NE security parameters.
----End
Prerequisite
l You must be an NM user with "NE administrator" authority or higher.
l The NE user must be created.
Procedure
Step 1 Choose System > NE Security Management > NE User Management from the Main Menu.
----End
Prerequisite
You must be an NM user with "NE administrator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Security > NE User Group Management from
the Function Tree.
Step 2 Click Query to query NE users included by various NE user groups of the NE.
----End
By using the T2000 you can perform the following NE login management tasks:
3.17.1 Locking Out NE Login
An NE user can lock out the NE, to deny login attempts from other users of the same level or
lower level. If there is an NE user of the same level or higher level logged in to the NE, the NE
user cannot lock out the NE. NE users of higher levels automatically unlock the NE login that
is locked by lower-level users.
3.17.2 Locking Out NE Settings
An NE user can lock out the settings of an NE, preventing other NE users of the same level or
higher level from performing any settings on the NE. If a user of the same level or higher level
has logged in to the NE, the NE user cannot lock out the NE settings. NE users of higher levels
automatically unlock the NE settings locked by lower-level users.
3.17.3 Switching a Logged-In NE User
During a new deployment, after the root NE user creates an NE, this user can create another NE
user. You can log in to the NE with the new NE user name.
3.17.4 Switching a DC User
By querying and switching a DC user on the T2000, you can log in to and manages an NE as a
new DC user.
3.17.5 Forcing an NE User to Log Out of the NE
When you want to log in to an NE as a user who has a higher level of authority, you can force
a lower-level NE user to log out of the NE. In this way, you can avoid an NE being configured
by multiple NE users at the same time, or prevent unauthorized logins by other NE users.
3.17.6 Setting NE Login Prompt Message
You can turn on the warning screen, and set the information displayed in the warning screen. If
you turn on the warning screen, after the T2000 logs in to an NE, the queried warning screen
information is displayed.
Prerequisite
l You must be an NM user with "NE administrator" authority or higher.
l The current NE user has the highest level among all login NE users.
l The NE must be a release 4.0 equipment.
Procedure
Step 1 Choose System > NE Security Management > NE Login Lock from the Main Menu.
Step 2 In the Object Tree, select an NE and click the double-right-arrow button (red).
Step 4 Optional: If the value of Login Lock Status is Not Locked out, select it and click Lock
Login or right-click it and choose Lock Login.
----End
Prerequisite
l You must be an NM user with "NE administrator" authority or higher.
l Applies to the release 4.0 NEs.
Procedure
Step 1 Choose System > NE Security Management > NE Setting Lock from the Main Menu.
Step 2 In the left pane, select an NE and click the double-right-arrow button (red).
Step 4 If the value of Set Lock Status is No, select it and click Lockout or right-click it and select
Lockout . The Set Lock Window dialog box is displayed.
Step 5 Check the Lock Permanently or Not check box to permanently lock the current NE settings or
enter the value of Lock Remaining Time(s) to temporarily lock the settings. Click OK.
----End
Prerequisite
l You must be an NM user with "NE administrator" authority or higher.
l The NE user must be created.
Background Information
An NE user cannot log in to or manage an NE at multiple clients at the same time. After you use
an NE user to log in to an NE through a T2000 server, if you use the same NE user to log in to
the same NE through another T2000 server, the NE user is forced to log out from the first
T2000 server.
Procedure
Step 1 Choose System > NE Security Management > NE Login Management from the Main Menu,
click the NE Login Management tab.
When this button is used for the first time, or the configuration data is changed, or the selected object on the
Object Tree on the left is changed, this button becomes red.
----End
Prerequisite
l You must be an NM user with "NE administrator" authority or higher.
l The DC user must be created.
Context
l A user cannot log in to the DC and the T2000 at the same time. As a result, if you switch
to a DC user that log in to the T2000 currently, an error occurs.
l One NE user cannot log in or manage an NE at multiple clients at the same time. If a user
already logs in to an NE and the same user tries to log in at another client, the client that
the user logged in earlier automatically exits.
Procedure
Step 1 Choose System > NE Security Management > NE Login Management from the Main Menu,
click the DC Login User Management tab.
When this button is used for the first time, or the configuration data is changed, or the selected object on the
Object Tree on the left is changed, this button becomes red.
----End
Prerequisite
l You must be an NM user with "NE administrator" authority or higher.
l The NE user must be created.
l The NE user must be logged in to the NE.
Procedure
Step 1 Choose System > NE Security Management > NE Login Management from the Main Menu.
Step 2 In the Object Tree, select an NE and click the double-right-arrow button (red).
Step 3 Select the NE entry. Click Logout or right-click it and choose Logout. A prompt is displayed
indicating that the operation is successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Security > NE Security Parameters from the
Function Tree.
Step 3 Select an NE, double-click Warning Screen Switching and choose whether to enable the
warning screen.
NOTE
l You can enter information in the Warning Screen Information field only when you set Warning
Screen Switching to Enabled.
l In the Warning Screen Information field, enter the information that contains a maximum of 1500
characters.
Step 5 Click Apply. A prompt is displayed indicating that the operation is successful. Click Close.
----End
4 Log Management
Log management includes the T2000 log management and NE log management. Querying and
saving the log information periodically helps network managers to detect illegal logins and
operations in time, and analyze faults.
You can view the T2000 security log periodically to find the insecure operations performed to
the T2000 in a timely manner. You can also check the T2000 security log to effectively ensure
the security of the T2000.
The T2000 operation log records user operations irrelevant to the security on the T2000. Viewing
the operation log helps you to learn the running information of the system.
According to preset filter criteria, you can learn the activity record of a user or client. For
example, you can view operations performed by a user in the system.
Table 4-2 provides the meaning of danger levels of operation log.
Context
By using the T2000, you can perform the following log management tasks:
4.2.1 Browsing Security Logs
You can query security logs to know the information about the security operations of the
T2000.
4.2.2 Periodically dump security logs
After the periodical dumping task is set, the T2000 can periodically dump the security logs. As
a result, logs are not lost.
4.2.3 Setting the Overflow Dump for Security Logs
The data amount in an security log keeps increasing as the system runs day by day. If the data
amount exceeds the maximum capacity, the new data overwrites the old data and thus causes
the data loss. To avoid the problem, you need to dump the security logs in time.
Prerequisite
You must be an NMS user with the "Security Watcher" authority or higher.
Procedure
Step 1 Choose System > Browse Log.
Step 2 In the Log Class navigation tree, select Security Logs. In the right pane, double-click a security
log to view its details.
----End
Reference Standard
The log does not record any abnormal, malicious, or illegal login.
Troubleshooting
If the log records illegal operations, you need to reset the operation authority and management
authority of the user. For details, refer to 3 Security Management
Prerequisite
You must log in to the T2000 as user admin.
Context
The scheduled time for a task is based on the server time.
Procedure
Step 1 Choose System > Database > Dump Settings from the Main Menu.
Step 3 In the Enable Dumping Periodically area, set the Periodic dump to Yes.
Step 4 Set the Dump interval (days) and period of saving the record.
----End
Result
Navigate to the directory that is indicated in Dumping to (path) and then view the dumped
security log files.
Prerequisite
You must be an NM user with the "Security Operator" authority or higher.
Procedure
Step 1 Choose System > Database > Dump Settings from the Main Menu. The Dump Settings dialog
box is displayed.
NOTE
If you specify a period in the Automatic Deletion of Dump Files area, the dumped files beyond the period
are automatically deleted.
Prerequisite
You must be an NMS user with the "Security Operator" authority or higher.
Procedure
Step 1 Choose System > Database > Dump Manually from the main menu.
----End
Result
Navigate to the directory that is indicated in the Dumping to (path) of the File group box, view
the dumped security log files.
Prerequisite
You must be an NMS user with the "Security Watcher" authority or higher.
Procedure
Step 1 Choose System > Browse Log.
Step 2 In the Log Class navigation tree, select Operation Logs. In the right pane, double-click a log
to view its details.
l Click Print. In the Range dialog box, set the start row and the end row. Then click OK.
l Click Save As. In the Save As dialog box, set the start row, end row, and file name. Then
click OK to save the logs to your local disk.
l Click Dump. In the Confirm dialog box, click OK. The operation logs are saved to the
server.
----End
Prerequisite
You must log in to the T2000 as user admin.
Context
The scheduled time for a task is based on the server time.
Procedure
Step 1 Choose System > Database > Dump Settings from the Main Menu.
Step 3 In the Enable Dumping Periodically area, set the Periodic dump to Yes.
Step 4 Set the Dump interval (days) and period of saving the record.
----End
Result
Navigate to the directory that is indicated in Dumping to (path) and then view the dumped
operation log files.
Prerequisite
You must be an NM user with the "Security Operator" authority or higher.
Procedure
Step 1 Choose System > Database > Dump Settings from the Main Menu. The Dump Settings dialog
box is displayed.
Step 4 Set the Dump percent of the database(%) parameter, which is 100 by default.
The system decides how many records to dump each time according to this value. For example,
when the number of the records exceeds 100000, a dump is performed for 100000 pieces of data
records.
Step 6 In Dumping to (Path), specify the directory to store the dumped file.
NOTE
If you specify a period in the Automatic Deletion of Dump Files area, the dumped files beyond the period
are automatically deleted.
----End
Prerequisite
You must be an NMS user with the "Security Operator" authority or higher.
Procedure
Step 1 Choose System > Database > Dump Manually from the main menu.
Step 3 In the Generation Time of Operation Logs group box, set the dump condition.
Step 4 In the Records That Meet The Dump Condition group box, click Query.
----End
Result
Navigate to the directory that is indicated in the Dumping to (path) of the File group box, view
the dumped operation log files.
Prerequisite
You must be an NM user with "NM maintainer" authority or higher.
Procedure
Step 1 Choose System > Log Forwarding Server from the Main Menu.
The Log Forwarding Server window is displayed.
Step 2 Click Refresh and view the parameters and status of the current log forwarding server.
Step 3 Click Add and the Create Log Forwarding Server window is displayed.
l You must configure the IP address and port of the master server.
l If you want to configure the slave server, you also need to configure the IP address and port of the slave
server.
----End
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l Applied to release 5.0 NEs only.
Context
You can view the NE security logs, but you cannot delete them.
Procedure
Step 1 In the NE Explorer, select an NE and choose Security > NE Security Log from the Function
Tree.
Step 2 Set the conditions for viewing the logs.
Step 3 Click Query.
----End
Definition
l Syslog Server is a workstation or a server that stores the syslog of the NEs in the network.
l Syslog GNE is an NE that receives the syslogs of other NEs and transmits all the syslogs
to the Syslog Server.
Networking Solution
For the security reasons, a transmission network must be connected to at least two syslog servers.
The NEs and syslog servers usually communicate by IP protocol. Among the NEs, many
protocols can be applied. For example, the NEs can communicate with each other through the
ECC protocol.
Case 1:
Core NEs communicating with each other using the IP protocol, and Different syslog servers
connected with different NEs. A typical type of network is shown in Figure 4-1.
NE1, NE2, NE3 and NE4 form an IP network. NE5, NE6, NE7 and NE8 form an ECC network.
NE2 and NE3 communicate with Syslog Server 1 and Syslog Server 2 through the IP protocol
separately. NE4 communicates with NE5 through the ECC channel.
In this situation, NE1, NE2, NE3 and NE4 can communicate with two different syslog servers
through the IP protocol directly. So, you only need to set the IP address and port number of the
syslog server for these NEs. The NE transmits the NE syslog to the syslog servers through the
IP protocol. You need not set the syslog GNE.
NE5, NE6, NE7 and NE8 cannot communicate with syslog servers directly. Their syslog is
transmitted to the syslog GNE through the ECC channel. Then, the syslog GNE transmits the
syslog to the syslog servers. So, you only need to set the syslog GNE for these NEs. For example,
NE2 may be the syslog GNE of NE5.
Case 2:
Core NEs communicating with each other using the IP protocol, and Different syslog servers
connected with the same NE. This type of network is similar to the one shown in Figure 4-1.
See Figure 4-2.
In this situation, NE1, NE2, NE3 and NE4 can also communicate with two different syslog
servers through the IP protocol. So, all the NE settings are exactly the same as the settings in
Table 4-3.
Case 3:
Core NEs communicating with each other using the ECC protocol, and Different syslog servers
connected with different NEs. A typical type of network is shown in Figure 4-3.
NE1, NE2, NE3 and NE4 form an ECC network. NE5, NE6, NE7 and NE8 form another ECC
network. NE2 and NE3 communicate with Syslog Server 1 and Syslog Server 2 separately
through the IP protocol. NE4 communicates with NE5 through the ECC channel.
In this situation, NE2 can only communicate with Syslog Server 1 directly. NE2 cannot
communicate with Syslog Server 2 directly. So, you need to set the IP address and port number
of Syslog Server 1 for NE2. Then, you need set the Syslog GNE which can transmit the syslogs
to Syslog Server 2. After that, NE2 can transmit the syslogs to Syslog Server 1 through the IP
protocol and Syslog Server 2 through the Syslog GNE. The setting of NE3 is similar to the setting
of NE2. You need to set the IP address and port number of Syslog Server 2, and then set the
Syslog GNE which can transmit the syslogs to Syslog Server 1.
All other NEs cannot communicate with two syslog servers directly. Their syslog is transmitted
to the syslog GNE through the ECC channel. Then, the syslog GNE transmits the syslog to the
syslog servers. So, you only need to set the syslog GNE for these GNEs. For example, NE2 and
NE3 may be the syslog GNEs of NE5. For details about the configurations, refer to Table 4-4.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The NE must be able to communicate with the syslog server directly.
Procedure
Step 1 In the NE Explorer, select an NE and choose Security > NE Syslog from the Function Tree.
Step 2 Click the Syslog Server tab. The list of syslog servers is displayed.
Step 3 Click Query to load the configuration data of the syslog server from the NE.
Step 4 Click New and the Add Syslog Server dialog box is displayed.
Step 5 Set the IP, Send Mode and Port based on the network settings.
Step 6 Click OK. A prompt is displayed indicating that the operation is successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Security > NE Syslog from the Function Tree.
Step 2 Click the Syslog GNE tab. The list of syslog GNEs is displayed.
Step 3 Click Query to load the syslog GNE configuration from the NE.
Step 4 Click New and the Object Select dialog box is displayed.
Step 6 Click OK. A prompt appears indicating the operation was successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Security > NE Syslog .
Step 2 Click Query to load the configuration data from the NE.
Step 3 Click New. The Add Basic Info dialog box is displayed.
Step 4 Choose proper Log Type and Log Severity based on the network requirements.
Step 5 Click OK. A prompt appears indicating the operation was successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Security > NE Syslog from the Function Tree.
Step 2 Click Query to load the configuration data from the NE.
Step 4 Click Apply. A prompt appears indicating the operation was successful.
----End
5 Topology Management
You can manage NEs and fibers through the T2000 after creating their topologies on the
T2000.
A link is a physical or logical connection between two topological objects in the Main Topology.
When configuring or managing the network by using the T2000, you need to create links between
different topological objects.
5.8 Browsing Fiber/Cable
Fibers/Cables are at the physical layer of a transmission network. This section describes how to
query the physical and engineering information of fibers/cables, and detailed information of
trails that the fibers/cables carry.
5.9 Creating a Topology Subnet
The subnet created here is based on a topological concept to facilitate management. In the case
of topology objects in the same network area or with similar attributes, you can allocate them
in one topology subnet.
5.10 Adjusting Topology Objects
You can modify the settings when creating the network topology by using the T2000. For
example, adjust the optical NE source, modify the status of the preconfigured NE and so on.
5.11 Deleting Topology Objects
When adjusting the network topology, generally, you need to delete some objects of the topology.
By creating topologies, the T2000 sets up the communication with physical equipment in the
network. When the NE data are uploaded to the T2000, the topology in the T2000 has the same
data as the physical equipment. After that, the NE and board configuration on the T2000 are
directly sent to physical NEs.
The T2000 is able to manage the following topologies, which are NE, board, port, channel, fiber,
virtual fiber, microwave link, subnet, Ethernet cable, serial port cable, and extended ECC. Based
on all these topologies, the T2000 can query the data or working status of corresponding objects
in the physical network. The subnet, Ethernet cable and serial port cable are only logical concepts
on the T2000, and cannot be managed physically through their topologies.
5.1.3 Optical NE
An optical NE represents a type of WDM equipment, such as an OTM. An optical NE can contain
one or more NEs. The concepts of optical NE are only for WDM equipment.
NE
An NE represents a WDM equipment subrack. There are several subrack types such as OptiX
BWS 1600G and OptiX Metro 6100. Applies to the WDM equipment.
Optical NE
An optical NE refers to the isolated physical entity that provides the NE functions in the optical
transmission network.
The T2000 manages the WDM equipment through different optical NEs. There are four types
of optical NEs. They are WDM_OTM, WDM_OLA, WDM_OADM and WDM_OEQ. Applies
to the WDM equipment. Each optical NE can contain multiple NEs.
GNE
The GNE communicates with the T2000 by using the communication protocol. The T2000
manages the network through GNEs.
Non-gateway NE
The non-gateway NE communicates with the GNE by using the ECC or the extended ECC.
The recommended number of non-gateway NEs (including non-gateway NEs that connects to
the GNE by using the extended ECC) that connect to each GNE is fewer than 50. Do not connect
more than 60 non-gateway NEs to a GNE.
NOTE
If the number of non-gateway NEs that connect to a GNE is more than 50, an alarm is reported on the
T2000.
5.1.5 Virtual NE
An virtual NE is an abstraction of an NE or a network that cannot be directly managed by the
T2000. Virtual NEs represent the topological relations between the equipment that the T2000
manages directly and the equipment the T2000 manages indirectly on the topology. If the
equipment that is not managed by the T2000 exists in the network and there are trails created
on the equipment, you can create a virtual NE on the T2000 to represent the equipment.
Different from actual NEs, a virtual NE does not need to be hardware-specific. It can be used to
represent any unknown equipment. On the T2000, it is usually used to simulate the equipment
that cannot be directly managed by the T2000, for example, the equipment that is not managed
by the T2000, such as the third-party equipment.
You can configure boards for a virtual NE on the T2000. The process of creating and deleting
a virtual NE is similar to that of an actual NE.
Virtual NEs are not restricted by the license. The license does not define the maximum number
of virtual NEs on the T2000.
Fiber
A fiber is used to connect the optical interfaces between different equipment and to provide a
transmission channel at the physical layer for service signals. According to the physical feature
of a fiber, the T2000 classifies the fiber as four types, which are G.652, G.653, G.654, and G.
655 fibers.
Radio Link
A radio link uses the microwave to connect different outdoor units of radio equipment.
Ethernet Cable
The Ethernet cable that the T2000 can manage is used to connect the communication interface
of the gateway NE and the T2000 server.
Virtual Fiber/Cable
Virtual fiber/cable is a logical concept. It may contains several physical fibers, radio links, or
even one or more complete networks.
Manage Manage
Manage NEs Manage links
subnets boards/ports
Create
Create NEs Add boards Create links
subnets
Configure the
Delete boards Delete fibers
NE data
Modify NE
IDs
Modify NE
names
Required
Delete NEs Optional
The landscape orientation of the configuration flow diagram shows the four main phases of
constructing the network topology. They are managing subnets, managing NEs, managing
boards or ports, and managing links.
The portrait orientation of the configuration flow chart shows the operation tasks and the
relations between the operation tasks in each phase.
Prerequisite
You must be an NM user with "NE administrator" authority or higher.
The T2000 must communicate properly with the GNE.
The NE Explorer instance of the NEs must be created.
Procedure
Step 1 Choose File > Search for NE from the Main Menu. The Search for NE window is displayed.
Step 2 Click Add and the Input Search Domain dialog box is displayed.
Step 3 Set Address type to IP Address Range of GNE, IP Address of GNE, or NSAP Address, and
enter Search Address, User Name, and Password. Then, click OK.
NOTE
You can repeat Steps 2 through 3 to add more search domains. You can delete the system default search
domain.
l If you use IP address to search for NEs:
l Usually, the broadcast function is disabled on the routers on a network, to avoid network broadcast
storm. Therefore, by using the IP Address Range of GNE method, only the NEs in the same
network segment can be searched out.
l To search the network segments across routers, the IP Address of GNE method is recommended.
Through a gateway NE, you can search out the NEs in the network segment of the gateway NE.
l If you use NSAP address, you can only select NSAP address.
NOTE
If you select all options in the Search for NE dialog box, you can search for NEs, create the NEs, and
upload the NE data at one time.
Step 6 Optional: If you select Search for NE only, you can select the NEs, which are not yet created,
in the Result list after the search for NEs is complete. Click Create and then the Create dialog
box is displayed. Enter User Name and Password in the Create dialog box, and then click
OK.
Step 7 Click Change NE ID. Then, the Change NE ID dialog box is displayed. Users can check against
the Bar Code List by the value of Bar Code, and then modify the NE Name, Extend NE ID,
Base NE ID, and IP Address fields accordingly.
NOTE
The Bar Code List is provided by the hardware installation personnel to the software commissioning personnel.
The list contains the bar codes of stations.
----End
Postrequisite
After an NE is created, if you fail to log in to the NE, possible causes are listed as follows:
l The password for the NE user is incorrect. Enter the correct password for the NE user.
l The NE user is invalid or the NE user is already logged in. Change to use a valid NE user.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The license must be installed and the license must support creating the NE of the type.
The NE Explorer instance of the NEs must be created.
Background Information
First create a GNE, and then create a non-gateway NE.
If the NE is not created properly or the communication between the NE and the T2000 is
abnormal, the NE is displayed in gray color.
Procedure
Step 1 Right-click in the blank space of the Main Topology and choose New > Device from the shortcut
menu. The Add Object dialog box is displayed.
Step 2 Select the NE type from the Object Type tree.
Step 3 Complete the following information: ID, Extended ID, Name and Remarks.
Step 4 To create a GNE, proceed to Step 5. To create a non-gateway NE, proceed to Step 6.
Step 5 Choose Gateway Type, Protocol and set the IP address and NSAP address.
NOTE
OptiX OSN 1800/3800/6800/8800 I do not support NSAP address setting.
1. Select Gateway from the Gateway Type drop-down list.
2. Select the Protocol type.
If the T2000 Do...
communicates with
NEs through
OSI protocol Select OSI from the Protocol drop-down list. Enter the
NSAP Address of the GNE.
NOTE
The NSAP address is a hexadecimal number that contains a maximum of 20 bytes. Its format is:
domain address+08003e+NE ID+NSEL.
The domain address that contains a maximum of 13 bytes is entered by the user. NSEL is the port
number of the network-level protocol, with a fixed value of 1d (one byte).
Step 6 Select Non-Gateway from the Gateway Type drop-down list. Select the GNE to which the NE
is associated to from the Affiliated Gateway drop-down list.
Step 7 In the case of a WDM NE, select the optical NE to which the WDM NE is associated.
Step 9 Optional: If you do not want to apply the NE configuration data in the T2000 to the NE, check
the NE Preconfiguration check box, and set NE Software Version.
NOTE
If you apply the configuration data of the preconfigured NE to the actual NE when the configuration data
on the preconfigured NE is inconsistent with that on the actual NE, the actual services will be affected.
Step 10 Click OK. Then, click in the blank space of the Main Topology and the NE icon appears in the
position where you clicked.
Step 11 Click OK. Then, click Open in the dialog box displayed.
----End
Result
After an NE is successfully created, the system automatically saves the information, such as the
IP address, NSAP address, subnet mask, and NE ID to the T2000 database.
Postrequisite
After an NE is created, if you fail to log in to the NE, possible causes are listed as follows:
l The communication between the T2000 and the NE is abnormal. Check the settings of
communication parameters, such as the IP address of the NE and NE ID.
l The password for the NE user is incorrect. Enter the correct password for the NE user.
l The NE user is invalid or the NE user is already logged in. Change to use a valid NE user.
Prerequisite
l You must be an NM user with "NM operator" authority or higher.
l The license must be installed and the license must support creating the NE of the type.
l Applies to the WDM equipment.
l Applies to Submarine Line Equipment.
Procedure
Step 1 Right-click in the blank space of the Main Topology and choose New > Device from the shortcut
menu.
Step 2 Select the optical NE type for the optical NE in the Add Object dialog box.
Step 3 In the General Attributes tab, set the attributes of the optical NE.
NOTE
An OEQ NE is an OLA NE that enables the equalization of optical power and dispersion. If an OLA NE
has the boards for dispersion compensation and power compensation, the OLA NE should be changed to
an OEQ NE.
Step 4 Click the Resource Division tab. Select NEs or boards from the Idle ONE and click .
Step 6 Click in the blank space of the Main Topology and the NE icon appears in the position where
you clicked.
----End
Prerequisite
l You must be an NM user with "NM operator" authority or higher.
l Applies to the SDH equipment.
Procedure
Step 1 Right-click the Main Topology and choose New > Device from the shortcut menu. The Add
Object dialog box is displayed.
Step 2 Choose NE > SDH Series > Virtual NE from the Object Tree.
Step 4 Click OK. Then click the Main Topology. The NE icon is displayed at the spot where you clicked
the mouse button.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The NE must be created successfully.
Procedure
Step 1 Select the NE whose data you need to configure.
NE to Be Configured Operation
NE to Be Configured Operation
Step 2 Select Manual Configuration and click Next. The Confirm dialog box is displayed, indicating
that manual configuration clears the data on the NE side.
Step 3 Click OK. The Confirm dialog box is displayed, indicating that manual configuration interrupts
the service on the NE.
Step 4 Click OK. The Set NE Attribute dialog box is displayed.
Step 5 Optional: If you need to modify the NE Attribute, set NE Name, Equipment Type, NE
Remarks, and Subrack Type.
Step 7 Optional: Click Query Logical Information to query the logical boards of the NE.
Step 8 Optional: Click Query Physical Information to query the physical boards of the NE.
NOTE
The Query Logical Information and Query Physical Information operations cannot be performed for
a preconfigured NE.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The type and NE software version of the source NE must be consistent with the type and software
version of the replicated NE.
Procedure
Step 1 Select the NE whose data you need to replicate.
NE to Be Configured Operation
Step 2 Select Copy NE Data and click Next. The NE Replication dialog box is displayed.
Step 3 Select the NE from the drop-down list and click Start. The Confirm dialog box is displayed,
indicating that the replication operation copies all the data of the source NE.
NOTE
After the NE data is replicated, only the data on the T2000 side is changed, but the data on the equipment
side is not changed.
Step 4 Click OK. The Confirm dialog box is displayed, indicating that the replication operation results
in the loss of the original data of the NE to which the data is copied.
Step 5 Click OK to start the replication. The Operation Result dialog box is displayed after a few
seconds.
Step 6 Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The NE must be created successfully.
Procedure
Step 1 Select the NE whose data you need to Replicate.
NE to Be Configured Operation
NE to Be Configured Operation
Step 2 Select Upload and click Next. The Confirm dialog box is displayed, indicating that the upload
may take a long time.
Step 3 Click OK to start the upload. The Operation Result dialog box is displayed when the uploading
is complete.
Step 4 Click Close.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The type and NE software version of the source NE must be the same as those of the
destination NE.
l Applies to the SDH equipment.
Context
A large amount of same NE data needs to be configured. In this case, NE data can be configured
in batches to simplify the operation. As a result, the working efficiency is improved. To configure
NE data in batches, copy the specified NE data to one or more NEs so that the data of the virtual
NEs is consistent with each other.
NOTE
l Duplicating the NE configuration data leads to the loss of the original data of the destination NE on
the T2000 side.
l Data duplication between the virtual NE and non-virtual NE is not supported.
Procedure
l Configure Data Separately:
1. On the Main Topology, double-click an empty NE to display the NE slot diagram.
2. Right-click the NE slot diagram and choose Add a New Board.
NOTE
Add a New Board is used to add the board type of the virtual NE. Then add the board according
to the board type.
3. After setting Name, Port Type, Level and Port Number for the board, click OK.
In this case, you can right-click the NE slot diagram to query the added board type.
4. Right-click the NE slot and choose the board type. Then add the board. After adding
the board, exit from the NE slot diagram.
l Configure Data in Batches:
1. Choose Configuration > Configuration Data Management from the Main Menu.
2. Select the source NE and the required virtual NE from the Object Tree, and then click
.
NOTE
The source NE refers to the virtual NE that is configured with the NE data. Its data needs to be
copied to other empty NEs.
3. Select the source NE from the NE list. Right-click it and choose Copy.
4. Select one or more destination NEs, right-click and choose Paste from the shortcut
menu.
A confirmation dialog box is displayed, indicating that duplicating the NE
configuration data leads to the loss of the original data of the destination NE on the
T2000 side.
5. Click OK to start the duplication. Wait for several seconds and the Operation
Result dialog box is displayed.
6. Click Close.
----End
Generally, the subrack where the optical amplifier board, optical supervisory channel (OSC)
board, and fiber interface unit (FIU) exist is selected as the master subrack.
The SCC boards that support master/slave subrack configuration on the OptiX BWS 1600G
include E4SCC and E4SCU. E4SCC is the SCC board on the master subrack and E4SCU is the
SCC board on the slave subrack. The master subrack can be cascaded to a maximum of 13 slave
subracks. The E4SCC board communicates with the other boards on the slave subrack through
the E4SCU board.
A subrack and other subracks can be cascaded through the ETHERNET2 interface on the subrack
or the ETH interface on the front panel of the E4SCC or E4SCU board on the subrack, but the
two interfaces are not connected directly and communication is unavailable. Therefore, when
the ETH interface of the local subrack is connected with the ETHERNET2 interface of the
downstream subrack and the ETHERNET2 interface of the local subrack is connected to the
ETH interface of the upstream subrack, the NE needs to transmit data between the ETH interface
and ETHERNET2 interface of the local subrack. In this way, the communication between the
master and slave subracks is realized.
NOTE
For details about the interfaces, refer to the OptiX BWS 1600G Backbone DWDM Optical Transmission
System Hardware Description.
During the process of cascading the master and slave subracks, the E4SCC board cannot be used
as the SCC board on a slave subrack. If there are multiple E4SCC boards on the NE that has the
master and slave subracks, an alarm that indicates a master subrack ID conflict is reported to the
user. The user removes the master subrack ID conflict by making the redundant master subrack
offline.
The master and slave subracks can be cascaded to form a star, chain, or ring network. The star
network, however, requires a HUB additionally. In addition, the slave subrack IDs cannot be
allocated in an order. Hence, the chain and ring networks are recommended, and the star network
is not recommended.
NOTE
l The allocated slave subrack ID is stable and does not change when the subrack connection changes.
l You can configure an interface manually. When the allocated slave subrack ID is incorrect, you can
correct the ID.
l The MAC addresses of the ETHERNET2 and ETH interfaces are unique.
l The ETHERNET1 interface on the subrack and the ETHERNET2 and ETH interfaces cannot be
connected to the same HUB.
l If the master and slave subracks are cascaded to form a ring, IDs are allocated to the slave
subrack that is connected to the ETHERNET2 interface on the master subrack and other
slave subracks one by one.
l When the ring is disconnected at a certain point, IDs are allocated one by one to the slave
subracks that are connected to the ETHERNET2 interface on the master subrack, and then
IDs are allocated one by one to the slave subracks that are connected to the ETH interface
on the master subrack.
l IDs are allocated one by one to new subracks according to the preceding rules.
l To ensure that the IDs of the master and slave subracks are stable, the master subrack saves
the IDs that are already allocated to subracks based on the MAC addresses of the
ETHERNET2 and ETH interfaces on the slave subracks. If an ID is allocated to a slave
subrack, after the slave subrack is online, the NE sends the corresponding ID to the slave
subrack instead of allocating a new ID.
allocates an ID to the slave subrack based on the MAC address of the request frame and notifies
the slave subrack of the ID. Then, the slave subrack checks the received ID. If this new ID is
different from the original ID, or the MAC address of the master subrack is changed (for example,
the slave subrack is connected to another master subrack), the slave subrack is reset and
negotiates with the master subrack about the ID. If the slave subrack ID repeats an existing slave
subrack ID, the master subrack allocates a new ID to the salve subrack and notifies the slave
subrack of the new ID.
When you replace the SCC board of the OptiX BWS 1600G,
l the MAC address changes after you replace the SCC board on the slave subrack. Hence,
the master subrack allocates a new ID to the slave subrack. The board configuration and
other configuration of the slave subrack are related to the slave subrack ID. If the slave
subrack ID changes after you replace the SCC board on the slave subrack, you need to
modify the slave subrack ID and reset the slave subrack, to ensure that the configuration
data of the slave subrack is consistent.
l you need to restore the configuration data of the original master subrack after you replace
the SCC board on the master subrack, to ensure that the IDs of all slave subracks remain
unchanged.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Applies to the OptiX OSN 6800 and OptiX OSN 8800 I.
Applies to the OptiX BWS 1600G.
Procedure
Step 1 On the Main Topology, double-click an optical NE and the NE Panel is displayed. In the left-
hand pane of the NE Panel, select the NE.
Step 2 In the Add Slave Subrack dialog box, set parameters and click OK.
NOTE
For the OptiX OSN 8800 I, you need to set the Service Type and Service Capacity for the subracks.
Step 3 The Operation Result dialog box is displayed telling you that the operation was successful.
Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 On the Main Topology, double-click an optical NE and the NE Panel is displayed. In the left-
hand pane of the NE Panel, select the NE.
Step 2 In the upper portion of the NE Panel, select the master or slave subrack for which you want to
modify the name, right-click, and choose Modify Subrack Name from the shortcut menu. The
Modify Subrack Name dialog box is displayed.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 On the Main Topology, double-click an optical NE and the NE Panel is displayed. In the left-
hand pane of the NE Panel, select the NE.
Step 2 In the upper portion of the NE Panel, select a slave subrack and query the status of the slave
subrack.
NOTE
Click the toolbar button to view legends to know the running status of the subrack.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
All boards in the slave subrack must be deleted.
Applies to the OptiX OSN 6800 and OptiX OSN 8800 I.
Applies to the OptiX BWS 1600G.
Procedure
Step 1 On the Main Topology, double-click an optical NE and the NE Panel is displayed. In the left-
hand pane of the NE Panel, select the NE.
Step 2 In the upper portion of the NE Panel, select the slave subrack to be deleted, right-click, and
choose Delete the Subrack from the shortcut menu.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The NE must be created.
l There must be idle slot on the NE Panel.
Context
The physical boards are the actual boards inserted in the subrack. A logical board refers to a
board that is created on the T2000. After a logical board is created, you can configure the relevant
services. If the corresponding physical board is online, the configured services can be available.
NOTE
The NE panel is able to indicate the mapping relation between slots that house processing boards and
interface boards. When you click a processing board that is paired with an interface board in the NE panel,
the ID of the slot that houses the mapping interface board is displayed in orange.
Procedure
Step 1 Open the NE Panel.
For the WDM equipment, double-click the icon of the optical NE. In the left pane of the NE
Panel, click the NE that you want to add the board.
Step 2 Right-click the selected idle slot. Select the board you want to add from the drop-down list.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l Applies to only MP1 boardCXP board.
Context
Hot swappable service sub-board interfaces are provided on the MP1 boardCXP board. When
different service sub-boards are inserted, the TDM E1, IMA E1, ML-PPP E1, ATM STM-N and
channelized STM-N signals can be assessed and processed.
Procedure
Step 1 Double-click an NE on the Main Topology and the NE Panel is displayed in the user interface.
Step 2 Select the desired processing board, right-click in the blank area that displays sub-boards, and
select the desired sub-board.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The board must be created on the preconfigured NE.
l Applies to the OpitX OSN 1500, OpitX OSN 2500, OpitX OSN 3500, OpitX OSN 7500
and OpitX OSN 9500.
Procedure
Step 1 Double-click the icon of the preconfigured NE in the Main Topology. The NE panel is displayed.
Step 2 Right-click the port to which you want to add a dynamic port and choose Add Port from the
shortcut menu. The Add Port dialog box is displayed.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l Applies to the OTU boards on the NG WDM equipment.
l The OTU boards not supported are as follows: LDGD, LDGS, LWX2, LWXD, LWXS,
TDG, TSXL, TQX, and TQS.
l There are client-side ports that are not added on the T2000.
Context
By default, each board is added with client side ports. To add ports, you need to delete the client
side ports that are added by default on the T2000.
Procedure
Step 1 On the Main Topology, double-click an optical NE, and the NE Panel is displayed.
Step 2 In the NE Panel, select a board, right-click, and choose Path View from the shortcut menu.
Step 3 In the Path View, right-click in the blank area and choose Add Port from the shortcut menu.
The Add Port dialog box is displayed.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The OTU boards must be applicable to the NG WDM equipment.
l The following OTU boards are supported: 2LDX, 12TMX, 12LOG, 12LOM, 12TQS,
11TOG, 12NQ2, 12ND2, and 13LSX.
l There must be line-side (WDM-side) ports that are not added to the board.
Background Information
By default, each board is added with line-side (WDM-side) ports. To add ports, you need to
delete the line-side (WDM-side) ports that are added by default on the T2000.
Procedure
Step 1 On the Main Topology, double-click an optical NE, and the NE Panel is displayed.
Step 2 In the NE Panel, select a board, right-click, and choose Path View from the shortcut menu.
Step 3 In the Path View, right-click in the blank area and choose Add Port from the shortcut menu.
The Add Port dialog box is displayed.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 On the Main Topology, double-click an NE.
Step 2 In the NE Panel, double-click the required board.
Step 3 In the Board View window, query the path status of a board.
NOTE
You can view the meanings of various icons and colors in the right pane of the channel view.
----End
NEs communicate with each other through fibers. After creating boards for each NE, you need
to create fibers for further configuration of services. In this situation, you can manually create
fibers one by one.
5.7.3 Creating Fibers for PTN Equipment Manually
NEs communicate with each other through fibers. After creating boards for each NE, you need
to create fibers for further configuration of services. In this situation, you can manually create
fibers one by one.
5.7.4 Creating Fibers in the Synchronization Mode
On the T2000, you can synchronize the fiber connection data of the T2000 with the internal fiber
connection data of the NEs.
5.7.5 Creating Fiber Connections in Graphic Mode
In graphic mode, you can create fiber connections on the Main Topology or the signal flow
diagram directly. This mode is applicable to the scenario where you create a large number of
fibers one by one.
5.7.6 Creating Fiber Connections in List Mode
In Fiber/Cable Management, you can manage the fiber connections between NEs and inside
NEs in a unified manner. Compared with the graphic mode, the creating fiber connections in the
list mode is not visual. Hence, the list mode is applicable to the scenario where you create a few
fiber connections only.
5.7.7 Creating Fibers Between an OTU Board and a Mux/Demux Board in Batches
To create a great number of fibers between an OTU board and a Mux/Demux board, you can
connect fibers in batches to improve the efficiency.
5.7.8 Automatically Creating Radio Links
Using the fiber/cable search function, you can know whether any radio links are connected at a
specified IF interface. This helps you quickly create radio links at the IF interface. For a newly
created network, you can search for all the IF interfaces networkwide to create radio links after
you complete the board configuration on the T2000. In this way, you can monitor the actual
working state of each radio link.
5.7.9 Manually Creating Radio Links
After you manually fill in the table, the T2000 can create radio links according to the
configuration information about the links. This operation is often used when actual radio link is
not formed.
5.7.10 Creating DCN Communication Cable
The T2000 can communicate with NEs through the Ethernet port or serial port. The NEs also
communicate with each other through the extended ECC. Depending on the communication
mode, different types of cables can be created on the T2000.
5.7.11 Creating Virtual Fibers
When the T2000 manages the SDH, PTN and WDM equipment at the same time, you can create
virtual fibers for SDH or PTN equipment with WDM equipment in between, to facilitate
administration.
5.7.12 Restoring the Fiber Connection
Due to misoperations or other causes, the fiber connection is deleted on the T2000. This does
not affect the service transport, but you need to restore the fiber connection quickly, to restore
the monitoring on the T2000.
5.7.13 Creating a Fiber/Cable Pipe
To manage certain fibers/cables as a pipe, you need to create a fiber/cable pipe.
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The optical interfaces of every NE must be connected using fibers.
l The boards of every NE must be created on the T2000.
Context
l If conflicting fibers are found during the creation, delete the conflicting fibers on the
T2000 before you start creating fibers.
l When a fiber between two SDH NEs passes through a WDM NE, if the normal fiber
between an SDH NE and a WDM NE has been created on the T2000, the fiber found by
the trail search function is created as a virtual fiber. If the WDM NE is not created on the
T2000, the fiber is created as a normal fiber.
l Fibers that connect two WDM NEs cannot be searched.
l When a fiber is created, it is usually bidirectional. But when the fiber is connected to the
ports of the REG functions or the SDH and WDM equipment, the fiber is unidirectional.
CAUTION
Fiber/Cable search may interrupt services. Exercise caution when performing this operation.
Procedure
Step 1 Choose File > Search for Fiber/Cable from the Main Menu.
Step 2 In the left pane select some ports from one or more NEs and click Search to search for the fibers
or cables. A progress bar is displayed showing the progress of the search.
NOTE
l If you check the Do not search for ports of created fibers on T2000 check box, the system only
searches for the ports that do not have fibers.
l To check if the created fiber is consistent with the actual fiber connection, leave the check box
unchecked.
l If you check the Do not search for ports of created fibers on T2000 check box, and if all the selected
ports have fibers created, the system displays a message indicating that the search field is null.
Step 3 A prompt is displayed indicating that the operation is successful. Click Close.
Step 4 To create fibers, select one or more fibers from the Newly Searched Fiber list and click Create
Fiber/Cable.
NOTE
l When one or more fibers are selected in the Newly Searched Fiber list, fibers that conflict with the
selected fibers, are shown in the Existing Conflicting Fiber list. If there is any conflicting fiber,
proceed to Step 5 and delete it before creating fibers.
l During fiber creation, if all the selected fibers are in the Already created state, the system displays
the message as follows: No fiber to create.
Step 5 To delete the conflicting fibers, from the Existing Conflicting Fiber list select one or more
fibers whose values are Yes for the Existing Conflicting link (Y/N) parameter in the
Misconnected Fiber list. Click Delete Fiber/Cable.
----End
Subsequent Handling
When the information about the fiber that is created through search is incomplete, you can
supplement the information about the fiber by modifying the fiber/cable information.
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The boards to be connected with fibers or cables must be created.
l You must create a REG before creating a fiber that passes the REG.
l The dynamic port must be created.
Background Information
When a fiber is created, it is usually bidirectional. But when the fiber is connected to the ports
of the REG functions or the SDH and WDM equipment, the fiber is unidirectional.
Procedure
Step 1 Right-click in the Main Topology and choose New > Link. The Add Object dialog box is
displayed.
Step 2 Choose Link > Fiber/Cable from the left pane.
Step 3 Click the button in Source NE. Select the source board and port in the Select the source end
of the link dialog box.
Step 4 Click OK and the cursor changes to a + sign.
Step 5 Click the sink NE of the fiber or cable on the Main Topology.
Step 6 Click the button in Sink NE. Select the sink board and port in the Select the sink end of the
link dialog box.
TIP
When selecting a wrong source or sink NE, right-click and click OK in the Object Selection dialog box
to exit.
Step 7 Click OK. Enter the information of the fiber or cable in the Create Fiber/Cable dialog box.
Step 8 Click OK. The created fiber or cable appears between the source and sink NEs on the Main
Topology.
Step 9 Select the fiber you create, right-click and choose Detect Link from the shortcut menu.
The Operation Result dialog box is displayed indicating the fiber connection information.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The boards to be connected with fibers or cables must be created.
Procedure
Step 1 Right-click in the Main Topology and choose New > Link. The Add Object dialog box is
displayed.
Step 3 Click the button in Source NE. Select the source board and port in the Select the source end
of the link dialog box.
Step 4 Click OK and the cursor changes to a + sign.
Step 5 Click the sink NE of the fiber or cable on the Main Topology.
Step 6 Click the button in Sink NE. Select the sink board and port in the Select the sink end of the
link dialog box.
TIP
When selecting a wrong source or sink NE, right-click and click OK in the Object Selection dialog box
to exit.
Step 7 Click OK. Enter the information of the fiber or cable in the Create Fiber/Cable dialog box.
NOTE
Automatically Allocate IP: When you create a fiber/cable, if both ends of the fiber/cable are the PTN
equipment, the system can automatically allocate IP addresses to microwave ports, Ethernet ports, and POS
ports. If this parameter is set to Yes, the system automatically allocates IP addresses to the ports on the two
ends of a fiber after the fiber is created. In this case, after the fiber is created, you can directly configure
the static tunnel as required without considering the port IP addresses. To configure the dynamic tunnel,
you need to configure the corresponding routing protocol.
Step 8 Click OK. The created fiber or cable appears between the source and sink NEs on the Main
Topology.
Step 9 Select the fiber you create, right-click and choose Detect Link from the shortcut menu.
The Operation Result dialog box is displayed indicating the fiber connection information.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Applies to OptiX OSN 3800, OptiX OSN 6800 and OptiX OSN 8800 I.
Context
Conflicting fibers refer to the fibers that are configured on the T2000 and NEs and that share
neither the same source or sink.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Fiber Synchronization from the
Function Tree.
Step 2 Click Synchronize, and the data of the internal fiber connections on the T2000 side and that on
the NE side are displayed.
NOTE
Synchronized Fiber: Indicates the fibers that exist on both the T2000 and NEs. In addition, the fiber data
on the T2000 is the same as the fiber data on NEs.
Uncreated Fiber in T2000: Indicates the fibers that exist on only NEs.
Uncreated Fiber in NE: Indicates the fibers that exist on only the T2000.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Optical NEs and NEs must be created.
l The line boards that have the ports at the same level must be created on the T2000 or the
physical boards must be installed correctly.
l Applies to WDM equipment.
l Applies to Submarine Line Equipment.
Procedure
l To create fiber connections inside an NE, do as follows:
1. Double-click an optical NE on the Main Topology. Click the Signal Flow Diagram
tab.
2. In the Signal Flow Diagram, right-click in the blank area and choose Create Fiber
from the shortcut menu. The cursor is displayed as "+".
3. Select the source board and port and click OK. The cursor is displayed as "+".
4. Select the sink board and port and click OK.
TIP
When a wrong source or sink board or port is selected, right-click to cancel the operation and
exit object selection.
5. In the Create Fiber/Cable dialog box, enter the attributes of the fiber.
6. Click OK.
l To creating fiber connections between NEs, do as follows:
NOTE
Creating fiber connections between NEs is performed on the Main Topology. Actually, the FIU fiber
connections between stations are created.
1. Click the shortcut icon on the Main Topology and the cursor is displayed as "+" .
2. Click the source NE of the fiber on the Main Topology.
3. Select the source board and source port in the Select the source end of the link dialog
box displayed.
4. Click OK.
The Main Topology is displayed and the cursor is displayed as "+" again.
5. Click the sink NE of the fiber in the Main Topology.
6. Select the sink board and sink port in the Select the sink end of the link dialog box
displayed.
7. Click OK and enter the attributes of the fiber in the Create Fiber/Cable dialog box
displayed.
8. Click OK.
The created fiber is displayed between the source NE and the sink NE on the Main
Topology.
----End
Postrequisite
After you create fiber connections, you need to scan wavelengths to ensure that the fiber
connections are correct and the line communication is available.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Choose File > Fiber/Cable Management from the Main Menu.
Step 2 Click Create, and the Create Fibers in Batches dialog box is displayed.
Step 3 Click Select Object, select all the NEs you need to create fiber/cable in the dialog box.
Step 6 Set Direction, Source NE, Source Port, Sink NE and Sink Port.
You can create multiple fibers/cables and set parameters in step 5, click Apply.
Step 9 Click Cancel to complete the settings. The created fiber connections are displayed in the Fiber/
Cable Information list.
----End
Postrequisite
After you create fiber connections, you need to scan wavelengths to ensure that the fiber
connections are correct and the line communication is available.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l All OTU boards on a station must be configured with different wavelengths.
l The source end supports only the Mux/Demux board and add/drop multiplexing board.
l Creating intra-subrack fibers in batches is not supported.
Procedure
Step 1 Right-click in the Main Topology and choose New > Link. The Add Object dialog box is
displayed.
Step 2 Choose Link > Fiber/Cable from the Object Tree.
Step 3 Set Create Ways as batch ways.
Step 4 Select the source Slot Diagram and the corresponding ONE. Select the sink OTU Physical
Subrack and the corresponding ONE.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The IF board for each NE must be created on the T2000.
Context
The radio frequency wireless signals within the frequency range of 300 MHz to 300 GHz are
called radio signals. The links that transmit radio signals are called radio links.
Procedure
Step 1 Choose File > Search for Fiber/Cable from the Main Menu.
Step 2 In the left-hand pane, select IF interfaces for one or multiple radio NEs. Click Search. A progress
bar is displayed.
NOTE
l If you check the Do not search for ports of created fibers on T2000 check box, the system does not
search for the ports at which radio links are already created.
l If you need to check consistency between the created radio links and the actual radio links, do not check
this check box.
l If you check this check box and if all the selected ports radio links are created, a dialog box is displayed
after the search is complete, telling that the search domain is empty.
Step 3 After the search is complete, a dialog box is displayed, telling that the operation was successful.
Click Close.
Step 4 In the Newly Searched Fiber list, select one or multiple radio links. Click Create Fiber/
Cable.
NOTE
l When you select one or multiple radio links in the Newly Searched Fiber list, the radio links that
conflict with the selected ones are automatically displayed in the Existing Conflicting Fiber list. In
this case, refer to Step 5 to delete the conflicting radio links before the creation.
l During the creation of radio links, if the selected links are all in the Already created state, the system
prompts No fiber to create.
Step 5 In the Existing Conflicting Fiber list, select one or multiple conflicting radio links (the Conflict
with logical link (Y/N) value of which in the Misconnected Fiber list is displayed as Yes),
Click Delete Fiber/Cable.
----End
Subsequent Handling
When the information about the radio link that is created through search is incomplete, you can
supplement the information about the radio link by modifying the fiber/cable information.
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The boards to be connected with radio links must be created.
Context
Usually, the radio frequency wireless signal within the frequency range of 300 MHz to 300 GHz
is called a radio signal. The link that transmits radio signals is called a radio link.
Procedure
Step 1 Click the shortcut icon on the toolbar of the Main Topology and the cursor changes to a
+ sign.
Step 2 Click the source NE of the radio link on the Main Topology.
Step 3 Select the source board and port in the Select the source end of the link dialog box.
Step 5 Click the sink NE of the radio link on the Main Topology.
Step 6 Select the sink board and port in the Select the sink end of the link dialog box.
TIP
When selecting the wrong source or sink NE, right-click and click OK in the Object Selection dialog box
to exit.
Step 7 Click OK. Enter the information of the fiber or cable in the Create Microwave Link dialog
box.
Step 8 Click OK. The created radio link appears between the source and sink NEs on the Main
Topology.
----End
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Procedure
Step 1 Right-click in the blank space of the Main Topology and choose New > Link from the shortcut
menu.
Step 4 Click OK. The cable is displayed on the Main Topology between the T2000 and the GNE.
----End
Postrequisite
If the NEs at the two ends of the DCN communication cables do not belong to the same subnet,
you have to return to the upper-level view of the subnet to view the created DCN communication
cables.
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l You must create fiber connections according to the true fibers that connect the SDH and
WDM equipment.
l You must create fiber connections according to the true fibers that connect the PTN and
WDM equipment.
l The T2000 must manage the SDH, PTN and WDM equipment at the same time.
Context
l For SDH equipment, the virtual fibers ensure the independence of automatic fiber search
and SDH trail management. .
l For WDM equipment, when true fibers change into virtual fibers at the bearer layer,
wavelength management is not affected even if the true fibers are deleted
l The source and sink ports of the virtual fibers must be the SDH ports. On the source and
sink ports, there must be two physical fibers that are connected to the WDM equipment.
l The source and sink ports of the virtual fibers must be the PTN ports. On the source and
sink ports, there must be two physical fibers that are connected to the WDM equipment.
l The virtual fiber does not support the expansion function.
Procedure
Step 1 Right-click in the blank space of the Main Topology, and choose New > Link from the shortcut
menu.
Step 2 In the Add Object dialog box, choose Link > Virtual Fiber/Cable .
Step 3 Set the attributes of the fiber or cable in the right-hand list.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Context
NOTE
Except the method describes in this section, you can search out the actual fiber connections of the equipment
by using the fiber search function, and restore the fiber connection on the T2000. For details, see 5.7.1
Creating Fibers Automatically.
Procedure
Step 1 Choose System > Browse Log from the Main Menu.
Step 3 According to the operation user that deletes the fiber and the time, select the corresponding
operation log. Double click the operation log. The Log Details dialog box is displayed.
Step 5 According to the information of the source and sink, create the fiber again.
NOTE
----End
Prerequisite
You must be an NM user with "network operator" authority or higher.
Procedure
Step 1 Choose File > Fiber/Cable Pipe Management from the Main Menu.
Step 2 Click Create. In the Add Pipe window that is displayed, set Name, Memo, and Builder for the
fiber/cable pipe. Click OK.
Step 3 Optional: After you create a fiber/cable pipe, you can view the information about the new fiber/
cable pipe in the Pipe Information pane.
----End
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l The fiber/cable and fiber/cable pipe must be created.
Context
A fiber/cable pipe can contain multiple fibers/cables and a fiber/cable can belong to multiple
fiber/cable pipes. When the probability of the simultaneous interruption of fibers/cables almost
reaches 100%, you can add those fibers/cables into the same fiber/cable pipe.
Procedure
Step 1 Choose File > Fiber/Cable Pipe Management from the Main Menu.
Step 2 In the pipe list, select the fiber/cable pipe that you want to add the fiber/cable into and then click
Add Fiber/Cable.
Step 3 In the Fiber/Cable Management window, right-click the fiber/cable pipe to be added into the
fiber/cable pipe and then choose Add to Fiber/Cable Pipe from the shortcut menu.
NOTE
You can select multiple fibers/cables and then add them into a certain pipe at the same time.
Step 4 In the Pipe Information window displayed, select the pipe that you want to add the fiber/cable
into and then click OK.
NOTE
When selecting a pipe, you can set filter criteria to filter fiber/cable pipes. In the Pipe Information window,
click Filter. In the Filter Pipe window that is displayed, set the filter criteria and then click Filter.
Step 6 Optional: In the Fiber/Cable Pipe Management window, click the pipe where the fiber/cable
is added in the Pipe Information list and then you can view the information about the fiber/
cable in the Fiber/Cable Information pane.
Step 7 Optional: When the information about the fiber/cable pipe is changed, the platinum services
are affected. Therefore, you need to synchronize the platinum services. To synchronize platinum
services, click Synchronize Platinum Service. In the Operation Result dialog box displayed,
click Close.
NOTE
----End
You can query the information about the fiber/cable pipe to which a fiber/cable belongs for easy
management.
5.8.6 Querying the Physical Fiber Connection Between NEs
After physical fibers are connected between NEs, you need to manually create corresponding
fibers on the T2000 for management. If fibers are incorrectly created on the T2000, the fibers
on the T2000 are inconsistent with the physical fibers. At this time, you need to query the physical
fiber connections between NEs.
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Choose File > Fiber/Cable Management from the Main Menu.
The information of all fiber/cable is displayed in the pane on the right.
Step 2 Optional: In the Object Tree on the left, select the object about which you want to view the
relevant fiber/cable information, and click the object.
The detailed information of the fiber/cable is displayed in the pane on the right.
Step 3 Optional: Click Print. After setting the range in the window displayed, you can set parameter
for the printing in the Print dialog box.
Step 4 Optional: Click Save As. After setting the range in the window displayed, you can save the
information about the fiber/cable within the specified range as a file.
NOTE
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Choose File > Fiber/Cable Management from the Main Menu.
The information about all fiber/cables is displayed in the pane on the right.
Step 2 Right-click a fiber/cable in the pane and choose Browse Relevant Trails from the shortcut
menu.
Trails that the fiber/cable carries are displayed in the trail management window.
Step 3 Optional: Click Print. After setting the range in the window displayed, you can set parameter
for the printing in the Print dialog box.
Step 4 Optional: Click Save As. After setting the range in the window displayed, you can save the
information about the trail within the specified range as a file.
NOTE
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 On the Main Topology or a subnet topology, right-click a fiber/cable. Choose Query Relevant
Optical Power from the shortcut menu.
The Optical Power Management window is displayed.
Step 5 Click the Graphic tab. The optical power values of the source and sink of the fiber/cable are
displayed in the coordinates.
----End
Prerequisite
l You must be an NM user with "network monitor" authority or higher.
l A fiber/cable pipe must be created.
Procedure
Step 1 Choose File > Fiber/Cable Pipe Management from the Main Menu.
Step 2 In the Pipe Information pane, you can view the information about all fiber/cable pipes.
Step 3 Select a fiber/cable pipe and then you can view the information about the fibers/cables that are
contained in the pipe in the Fiber/Cable Information pane.
----End
Prerequisite
l You must be an NM user with "network monitor" authority or higher.
l The fiber/cable must be added into the fiber/cable pipe.
Context
A fiber/cable can belong to multiple fiber/cable pipes. Therefore, the information about all the
pipes to which the fiber/cable belongs are listed after the query.
Procedure
Step 1 Choose File > Fiber/Cable Management from the Main Menu.
Step 2 In the Fiber/Cable Information pane, right-click a fiber/cable, and then choose Query Fiber/
Cable Pipe from the shortcut menu.
Step 3 In the Pipe Information pane, the information about all the pipes to which the fiber/cable
belongs are displayed.
----End
on the T2000 are inconsistent with the physical fibers. At this time, you need to query the physical
fiber connections between NEs.
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l NEs cannot be ASON NEs, because physical fiber connections between ASON NEs cannot
be queried.
l The NEs to be queried cannot have the J0_MM alarms.
Context
You can modify the J0 byte of an optical interface to check whether the optical interface reports
the J0_MM alarm. In this way, you can query the physical fiber connections between NEs.
Procedure
Step 1 Choose File > Search for Fiber/Cable from the Main Menu.
Step 2 In the left pane select some ports from one or more NEs and unchecked the Do not search for
ports of created fibers on T2000 check box, click Search to search for the fibers or cables. A
progress bar is displayed showing the progress of the search.
Step 3 A prompt is displayed indicating that the operation is successful. Click Close.
NOTE
If fibers are connected properly, the Operation Result dialog box is displayed, indicating that the fibers
on the T2000 are consistent with the physical fibers between NEs.
Step 4 If fibers are connected improperly, in the Main Topology, you can locate the NEs that are
displayed in the Misconnected Fiber area. Then, navigate to the NE Explorers of the source
NE.
Step 5 In the NE Explorer, select the source board of the improperly connected fiber and then choose
Configuration > Overhead Management from the Function Tree. You can view the J0 byte
information of the board.
Step 6 You can modify the J0 byte of the optical interface of this board and then query the optical
interface of the opposite NE that reports the J0_MM alarm. In this way, you can query the
physical fiber connection between the two NEs and quickly modify the fiber information on the
T2000.
----End
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Background Information
A topology subnet is created only to simplify the user interface and has no impact on the NEs.
Procedure
Step 1 Right-click in the blank space of the Main Topology and choose New > Subnet from the shortcut
menu.
Step 2 Click the Properties tab in the Add Object dialog box. Enter the attributes of the subnet.
Step 3 Click the Select Objects tab. Select the created NEs or subnet from the Available Objects pane.
Click .
NOTE
l indicates that to select all the objects to be selected on the left to the selected objects on the right.
Step 4 Click OK. Click in the blank space of the Main Topology, the icon appears in the position
where you clicked.
----End
Prerequisite
l You must be an NM user with "NM maintainer" authority or higher.
l The deployment tool server is started.
Context
NOTE
The type of the new NE Explorer instance must be the same as that of the NE Explorer instance with
overloaded NEs.
Procedure
Step 1 Choose System > NE Deploy Management from the Main Menu. The NE Deploy
Management window is displayed.
Step 2 In the left-hand pane, select an NE Explorer instance, and click Migrate NE. The Migrate
NE dialog box is displayed.
Step 4 In the left-hand pane, select an NE that you want to move to the Sink NE Explorer, and click
Step 5 Optional: In the right-hand pane, select an NE that you want to move to the Source NE
Step 6 Click OK. The Operation Result dialog box is displayed indicating that the operation is
successful.
Step 7 Click Close.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The NE must be created.
Background Information
In the case of the equipment whose NE ID is set by DIP switch, T2000 supports the in-service
modification of the NE ID, but the new NE ID is not applied to the NE. You only need to set
the DIP switch to modify the NE ID manually on site. In this way, the T2000 can monitor the
NE again without recreating the NE and its network-layer data.
Precautions
CAUTION
l Inter-subrack wavelength protection.
l IPA function at the local NE and IPA functions of other NEs that involving the Raman board
of the local NE.
l ALC function.
l Fiber connections of the local NE and fiber connections of other NEs that involving the local
NE.
l APE/EAPE function of the local NE and APE/EAPE functions of other NEs that involving
the board of the local NE.
l Logical wavelength group where the OTU board of the local NE is located.
Before modifying the NE ID, delete the following configurations and reconfigure the following
items after the NE ID is modified:
l Inter-subrack wavelength protection.
l IPA function at the local NE and IPA functions of other NEs that involving the Raman board
of the local NE.
l Fiber connections of the local NE and fiber connections of other NEs that involving the local
NE.
l APE/EAPE function of the local NE and APE/EAPE functions of other NEs that involving
the board of the local NE.
l Logical wavelength group where the OTU board of the local NE is located.
Before modifying the NE ID, delete the following configurations and reconfigure the following
items after the NE ID is modified:
l All protection groups at the local NE.
l Fiber connections of the local NE and fiber connections of other NEs that involving the local
NE.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > NE Attribute from the Function
Tree.
Step 2 Click Modify NE ID, and the Modify NE ID dialog box is displayed.
Step 3 Enter the New ID and the New Extended ID. Click OK.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, click the NE and choose Configuration > NE Attribute from the Function
Tree.
Step 2 In the NE Attribute dialog box, enter a new NE name in Name. Click Apply. A prompt is
displayed indicating that the operation is successful.
NOTE
An NE name consists of up to 64 characters, including letters, symbols, and numerals, except the following
special characters | : * ? " < >.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Precautions
CAUTION
After you change the IP address, if the IP address of the NE and the IP address of the T2000
server are in the same network segment, the communication between the T2000 and the NE
remains normal. In this case, re-log in to the NE.
If the IP address of the NE and the IP address of the T2000 server are in different network
segments, the communication between the T2000 and the NE is interrupted. In this case, set a
new IP address for the computer where T2000 server is installed to restore the communication.
Ensure that this new IP address and the NE IP address are in the same network segment. Because
of the restriction of the SQL database, after you have changed the IP address of the computer,
you must shut down the T2000 client and server, restart the computer and then the T2000 client
and server.
Procedure
Step 1 In the NE Explorer, select an NE and choose Communication > Communication
Parameters from the Function Tree.
Step 2 Set the communication parameters of the NE, including the IP address, extended IP address,
gateway NE IP address, and subnet mask.
Step 3 Click Apply. Click OK in the two displayed Warning dialog boxes. Then click Close in the
displayed Operation Result dialog box.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Right-click an optical NE on the Main Topology and choose Attribute from the shortcut menu.
The NE Attribute dialog box is displayed.
An Optical NE name can contain a maximum of 64 letters, symbols, and numerals, but cannot contain the
following special characters: | : * ? " < >.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The optical NE or idle optical NE must have the resource.
Procedure
Step 1 Right-click an optical NE and choose Attribute from the shortcut menu. The NE Attribute
dialog box is displayed.
Step 2 Click the Resource Division tab. In the Available Boards pane, select the subrack or board
resource that you want to add and click to add it to the optical NE.
Step 3 In the Selected Board pane, select the subrack or board resource that you want to delete and
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The preconfigured NE must be created.
l Applies to the SDH, Metro WDM and LH WDM equipment.
Context
CAUTION
Downloading data of a preconfigured NE applies the NE settings on the T2000 to the physical
NE. If the data is incorrect, this may cause service interruption.
Procedure
Step 1 Choose Configuration > Configuration Data Management from the Main Menu. The
Configuration Data Management dialog box is displayed.
Step 3 Select all preconfigured NEs that you want to modify, right-click on the NE
Preconfiguration and choose No from the shortcut menu.
Step 4 Click Apply. A prompt appears asking you whether to download immediately. Click Yes. A
prompt appears telling you that the operation may affect the service.
Step 5 Click OK. A prompt appears telling you that the operation may affect the service.
Step 7 After the download is complete, a prompt appears telling you that the operation is successful.
Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Right-click the NM icon on the Main Topology and choose Attribute from the shortcut menu.
Step 2 In the NM Attribute dialog box, enter a new NM name. Click OK.
NOTE
The NM name can contain alphanumeric characters and symbols, but cannot contain the following special
characters: | : * ? " < >.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Applies to the N1SLQ1, N1SL1 and OU08 boards.
l The interface module on the board must be changed.
Context
CAUTION
Modifying the board port type interrupts all services on the port.
Procedure
Step 1 Double-click an NE on the Main Topology and the NE Panel is displayed.
Step 2 Right-click the board for which you want to modify the port type and choose Modify Port from
the shortcut menu. The Modify Port Level dialog box is displayed.
Step 3 Modify the port type.
Step 4 Click OK. The Confirm dialog box is displayed. Click OK.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
When adding a port, ensure that the port is not fully configured. (The port is fully configured by
default. Before you add a port, delete certain ports to ensure that the port to be added is not
configured.)
Context
The following equipment is supported: OptiX OSN 8800 I, OptiX OSN 6800, OptiX OSN 3800,
OptiX OSN 6800A, and OptiX OSN 3800A.
During the creation of OTU boards, the client-side port is added by default. The port type is the
client-side colorless optical port by default.
The LSXR and LSXL/LSXLR boards do not support this function.
Procedure
Step 1 Double-click the ONE on the Main Topology, select the NE to open the NE Panel.
Step 2 Right-click the board where the client-side port need be modified, and choose Path View from
the shortcut menu.
Step 3 Right-click the port for which you want to modify the port type and choose Modify Port from
the shortcut menu. The Modify Port dialog box is displayed. Set Type and click OK to apply
the configuration.
NOTE
If you need to modify Type to Line Side Color Optical Port, you must first delete the port, and then add
the port. Otherwise the port cannot be modified successfully.
Step 4 Optional: In Path View, right-click the desired client-side port, and click Delete Port. Then,
the client-side ports are updated.
Step 5 Optional: In Path View, right-click a blank space and select Add Port. In the Add Port dialog
box displayed, set the Type of the port. Click OK to apply the configuration.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Background Information
The following types of equipment are supported: OptiX OSN 8800 I, OptiX OSN 6800, OptiX
OSN 3800, OptiX OSN 6800A, and OptiX OSN 3800A.
The OTU board must be applicable to the equipment.
When the OTU board is created, the line-side (WDM-side) ports are added to the board by
default. The default port type is line-side (WDM-side) colored optical interface.
The following OTU boards are supported: 12LDX, 12TMX, 12LOG, 12LOM, 12TQS, 11TOG,
12NQ2, and 12ND2.
Procedure
Step 1 Double-click the ONE on the Main Topology, select the NE and open the NE Pannel.
Step 2 Right-click the board for which you want to change line-side (WDM-side) ports and choose
Path View from the shortcut menu.
Step 3 Right-click the port for which you want to modify the port type and choose Modify Port from
the shortcut menu. The Modify Port dialog box is displayed. Set Type and click OK to apply
the configuration.
Step 4 Optional: In Path View, right-click the line-side (WDM-side) ports that you want to delete,
and click Delete Port. The line-side (WDM-side) ports are deleted.
Step 5 Optional: In Path View, right-click a blank space and select Add Port. In the Add Port dialog
box displayed, set Type. Click OK to apply the configuration.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Procedure
Step 1 Choose File > Fiber/Cable Management from the Main Menu. The information of all fiber/
cable is displayed in the pane on the right.
1. In the Type column, right-click the value for a fiber and choose Modify Fiber/
Cable from the shortcut menu.
2. In the Modify Fiber/Cable dialog box displayed, select the actual type of the fiber
from the drop-down list and click OK. Click Close in the Operation Result dialog
box.
----End
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l A fiber/cable pipe must exist.
Procedure
Step 1 Choose File > Fiber/Cable Pipe Management from the Main Menu.
Step 2 In the pipe list in the Pipe Information pane, double-click Pipe Name and Pipe Memo of a
certain pipe. Then, you can modify the name and remarks of the pipe.
Step 3 After the modifications, click Apply.
Step 4 In the Operation Result dialog box that is displayed, click Close.
----End
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l The fiber/cable must be added into a certain fiber/cable pipe.
Procedure
Step 1 Choose File > Fiber/Cable Pipe Management from the Main Menu.
Step 2 In the Pipe Information list, select a pipe. Then, the fibers/cables contained in the pipe are
displayed in the Fiber/Cable Information pane.
Step 3 In the Fiber/Cable Information list, select the fiber/cable to be removed and then click Move
Fiber/Cable.
Step 4 Optional: When the information about the fiber/cable pipe is changed, the platinum services
are affected. Therefore, you need to synchronize the platinum services. To synchronize platinum
services, click Synchronize Platinum Service. In the Operation Result dialog box displayed,
click Close.
NOTE
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Procedure
Step 1 Choose File > Fiber/Cable Management from the Main Menu.
The information of all fiber/cable is displayed in the pane on the right.
Step 2 Right-click a fiber/cable and choose Name by Rule from the shortcut menu.
The value in the Name field automatically changes according to the configured naming rule.
----End
Prerequisite
You must be an NM user with the "Topo Operator" authority or higher.
Context
l You cannot paste the same device or subnet to the destination subnet.
l You can press and hold Shift to select two or more objects. You can copy and paste multiple
objects at a time.
Procedure
Step 1 In the topology view, go to the source subnet of the object that you want to copy. Click the
object.
Step 2 Choose Edit > Copy to copy the object to the clipboard.
Step 3 Go to the destination subnet, choose Paste to paste the object in the subnet.
----End
Prerequisite
You must be an NM user with the "Topo Operator" authority or higher.
Context
l When you cut and paste an object, the object is copied to the destination subnet and deleted
from the source subnet.
l You cannot paste the same device or subnet to the destination subnet.
Procedure
Step 1 In the topology view, go to the source subnet of the object that you want to move. Click the
object.
Step 2 Choose Edit > Cut to copy the object to the clipboard.
Step 3 Go to the destination subnet, choose Paste to paste the object in the subnet.
----End
Prerequisite
You must be an NM user with the "Topo Operator" authority or higher.
Context
After a subnet is deleted, the topological objects in the original subnet are moved to the upper-
level subnet that the original subnet belongs to.
Procedure
Step 1 Right-click the subnet on the Main Topology, and choose the Delete shortcut menu.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The fibers, trails, services and protection groups must be deleted.
Procedure
Step 1 Open the NE Panel.
For the SDH equipment, double-click the icon of the NE on the Main Topology.
For the PTN equipment, double-click the icon of the NE on the Main Topology.
For the RTN equipment, double-click the icon of the NE on the Main Topology.
For the WDM equipment, double-click the icon of the optical NE on the Main Topology. In the
left pane of the NE Panel, select the NE from which you want to delete the board.
Step 2 Right-click the board you want to delete and choose Delete from the shortcut menu.
NOTE
Certain boards, such as PIUAUX boards, cannot be deleted. The boards that can be deleted vary with
different types of equipment. For details, see the Hardware Description of each type of the equipment.
When you delete the board, the inactive single-station optical cross-connections are also deleted.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l Before deleting the sub-board, delete fibers connected to the sub-board, and make sure that
the sub-board is in the idle state.
Procedure
Step 1 Double-click an NE on the Main Topology and the NE Panel is displayed in the user interface.
Step 2 Select the sub-board to be deleted, right-click and choose Delete from the shortcut menu. A
dialog box is displayed. Click OK.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Procedure
Step 1 Choose File > Fiber/Cable Management from the Main Menu.
Step 2 Select the fiber you want to delete, right-click and choose Delete Fiber/Cable from the shortcut
menu. The Warning dialog box is displayed. Click OK to delete the fiber/cable.
CAUTION
The deletion of the fiber/cable will delete the related protection subnets, trails and user-defined
information. Exercise caution before you delete the fiber/cable. You can export the script of the
entire network first to avoid deletion by mistake.
----End
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l A fiber/cable pipe must exist.
Context
When a fiber/cable pipe is deleted, the fibers/cables that are contained in the pipe are not deleted.
Procedure
Step 1 Choose File > Fiber/Cable Pipe Management from the Main Menu.
Step 2 In the pipe information list, select the fiber/cable pipe to be deleted and then click Delete.
Step 3 Optional: When the information about the fiber/cable pipe is changed, the platinum services
are affected. Therefore, you need to synchronize the platinum services. To synchronize platinum
services, click Synchronize Platinum Service. In the Operation Result dialog box displayed,
click Close.
NOTE
----End
Prerequisite
You must be an NM user with "NM maintainer" authority or higher.
Context
When the NE is not logged in, you can delete the NE on the T2000.
CAUTION
If an NE is deleted, the links related to the NE are also deleted.
When a GNE is deleted, if no standby GNE is provided for the NEs that were originally managed
by the deleted GNE, the communication between those NEs and the T2000 is interrupted.
Procedure
l Delete a single SDH,PTN or RTN NE.
1. Right-click the NE on the Main Topology and choose Delete > Delete Device from
the shortcut menu. The Confirm dialog box is displayed.
2. Click Yes. The NE icon is deleted from the Main Topology.
l Delete a single WDM NE.
1. Double-click an optical NE on the Main Topology. Right-click the NE in the left pane
and choose Delete from the shortcut menu.
2. Click OK.
l Delete NEs in batches.
1. Choose Configuration > Configuration Data Management from the Main Menu.
The Configuration Data Management window is displayed.
2. In the left-hand pane, select multiple NEs and click . The Configuration Data
Management List pane displays the configuration data of all the selected NEs.
3. Select the NEs to be deleted, right-click and choose Delete from the shortcut menu.
The Delete the NE dialog box is displayed.
4. Click OK.
----End
Prerequisite
l You must be an NM user with "NM maintainer" authority or higher.
l Applies to the WDM equipment.
Procedure
Step 1 Right-click an optical NE on the Main Topology and choose Delete > Delete Device from the
shortcut menu. The Confirm dialog box is displayed.
Step 2 Click Yes. The optical NE is deleted from the Main Topology.
NOTE
All the NEs that are associated to this optical NE are moved to the Idle ONE.
----End
In a network that covers one or more time zones, you can configure time localization by using
the T2000 and on NEs for easier network maintenance.
All data in the T2000 and NEs are stored based on the UTC. The time on the T2000 client is
displayed in two modes, which are by client local time, and by server local time. The local time
displayed on the T2000 client varies with the different time display modes.
Time Zone
Time zone: The world is split into 24 time zones, each of which spans 15 longitudinal bands.
The time offset between adjacent time zones is one hour.
In the time localization policy, if you select the local time of the NE as the standard time, the
T2000 needs to transit the display time of the NE by converting UTC to the local time of the
time zone where the NE is located.
The time when data is generated in the T2000, is irrelevant to DST. But, when the T2000 transits
the display of history data, the T2000 may need to implement DST transition for some regions.
For example, the T2000 generated a time stamp "A" for an operation in June. The time stamp
"A" is held in the UTC format. Consider that the time zone observes DST and in June the time
stamp "A" is adjusted according to DST. When DST ends in October, the time stamp "A" cannot
be transited by simply adding or subtracting the time zone, without considering the DST.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Choose File > Preferences from the Main Menu. Click the Time tab.
Step 2 Select the desired option from the Time Format drop-down list.
Step 3 Click Apply.
Step 4 Click OK.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Choose File > Preferences from the Main Menu. Click the Time Mode tab.
Step 2 In the Time Localization Mode area, select the desired mode.
NOTE
l Use client local time: The local time of the T2000 client is the standard time displayed on the user
interface.
l Use server local time: The local time of the T2000 server is the standard time displayed on the user
interface.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Applies to the OptiX OSN 1500, OptiX OSN 2500, OptiX OSN 3500, OptiX OSN 7500 and
Metro 1000.
Procedure
Step 1 Choose System > NE Time Localization Management from the Main Menu.
Step 2 In the Object Tree, select an NE and click the double-right-arrow button (red).
Step 4 Double-click TimeZone and select a time zone from the drop-down list.
NOTE
l You can modify the NE time zone setting for many times according to the actual situation.
l The old time data in the NE may be incorrect. Hence, the correctness of the time displayed in the NE
cannot be guaranteed after the NE time zone is changed.
Step 5 Click Apply. A prompt is displayed indicating that the operation is successful. Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Applies to the OptiX OSN 1500, OptiX OSN 2500, OptiX OSN 3500, OptiX OSN 7500 and
Metro 1000.
Procedure
Step 1 Choose System > NE Time Localization Management from the Main Menu.
Step 2 In the Object Tree, select an NE and click the double-right-arrow button (red).
Step 3 Click Query to query the time zone for an NE.
Step 4 Double-click DST and select Enabled from the drop-down list.
Step 5 Set the DST attributes, including DST Rule, DST Offset, Start Time and Stop Time.
Step 6 Click Apply. A prompt is displayed indicating that the operation is successful. Click Close.
----End
7 Alarm Management
To ensure the normal running of the network, the network management and maintenance staff
should periodically check and monitor the network by taking appropriate alarm management
measures.
You can set alarm reversion so that the status of the alarms reported from this port is displayed
as "no alarm". In this way, these alarms can be suppressed.
7.9 Filtering Alarms Raised on T2000
You can filter unimportant T2000 alarms so that the T2000 does not monitor these alarms. This
operation helps fault location.
7.10 Filtering Alarms Raised on NE
After an NE reports an alarm to the T2000, the T2000 determines whether to display and save
the alarm according to the alarm filtering status. You can use this function to filter out the
negligible alarms when the T2000 manages multiple NEs.
7.11 Setting Automatic Alarm Reporting
If you set alarms on an NE to be automatically reported, once the alarm is raised on the NE, it
is automatically reported to the T2000. You can disable the automatic reporting for unimportant
alarms to reduce the impact on the T2000 performance. A large volume of alarm information
affects the performance of the T2000.
7.12 Setting the Types of Lower Order Services in the VC4 Path
The LP_UNEQ indication can be inserted for the port timeslots that are not configured with
lower order services, only after you set the TUG structure of the VC4 path in the transmit
direction.
7.13 Monitoring the Alarms and Performance of Lower Order Services in the VC4 Path
Set the TUG structure in the receiving direction of the VC4 path. By enabling the monitoring
of lower order alarms and setting the specific alarms to be monitored, you can monitor the
performance of the lower order services in the VC4 path of the network.
7.14 Setting the Insertion Mode for Channels Not Configured with Services
On the T2000, you can set the insertion mode of alarms in the channel according to the
networking and service requirements.
7.15 Setting Audible and Visual Alarm Notification
The T2000 can select different sounds and colors for the alarms and abnormal events of different
severities based on customized settings, to facilitate maintenance.
7.16 Setting Alarm Remote Notification
This function helps the maintenance engineer to learn the running status of the network at any
time. When the T2000 detects that an relevant alarm is raised, the alarm remote notification
function enables the T2000 to automatically send the alarm information to the preset receive
terminal. Currently, the T2000 can only forward the alarm information to users by way of short
message and EMAIL.
7.17 Modifying Alarm Severity
You can adjust the alarm severity of each NM alarm, NE alarm and board alarm. This facilitates
management and improves the efficiency of alarm monitoring.
7.18 Analyzing the Root Alarm of a Fault
Due to the hierarchical relation of the service signals, normally, when alarms occur on a higher
order signal, some derived alarms occur on the lower order signals that are demultiplexed from
higher order signals. As for the WDM trails, some alarms raised from the upstream equipment
can generate some other alarms on downstream equipment. The T2000 can analyze the alarm
events. It displays or reports the most critical root alarms, and suppresses the alarms derived
from the root alarms according to the alarm correlation. The T2000 supports both the alarm
correlation analysis and the automatic alarm correlation analysis when analyzing the root alarms.
7.19 Specifying the Port QoS Alarm
You can set the QoS for a port depending on whether there are services on the port or whether
the services are important. In this way, you can effectively manage alarms. You can set the QoS
by specifying the bit error alarm threshold and setting the port switching conditions.
7.20 Configuring Alarm Insertion
For convenient commissioning and maintenance, you can manually insert an alarm or a
maintenance signal that can causes an alarm into a port of a trail. Thus, you can check the
correctness, connectivity and transmission performance of the trail connection by querying
whether any alarm occurs at opposite ends (upstream or downstream).
7.21 Inserting a Maintenance Signal to the ODU Layer
The alarm insertion at the ODU layer includes the AIS insertion, CLK insertion and OCI
insertion. The alarm insertion at the ODU layer is for the purpose of commissioning and
maintenance.
7.22 Setting NE Alarm Attributes
NE alarm attributes include the storage mode, reversion mode, correlation suppression of the
alarm, and alarm delay. You can set NE alarm attributes to effectively decrease the occurrence
frequency of invalid alarms and to improve the efficiency of alarm monitoring.
7.23 Enabling the Alarm Monitoring for Lower Order Paths
If you enable the alarm monitoring function for the lower order paths when you configure lower
order services in a VC4 higher order path, you can monitor the alarms of an individual lower
order path.
7.24 Dumping Alarms
The alarm data should be dumped in time to avoid overflow of alarm data or damage. You can
either manually dump the alarm data or set the alarm dumping conditions so that the T2000
automatically dumps the data. There are two types of automatic dumping, which are overflow-
triggered dumping and scheduled dumping.
7.25 Deleting History Alarms
Deleting history alarms is to dump the history alarms from the database and save them as a file.
The deleted alarms are not displayed in the History Alarms window. For details, see 7.24.1
Dumping Alarms Manually.
7.26 Diagnosing Faults
The T2000 provides a wizard for fault diagnosis. In daily maintenance, the engineer can create
fault diagnosis rules. When an alarm is generated, the engineer can locate the fault by using the
fault diagnosis wizard.
7.27 Configuring the Suppression of Power Status Alarm
During the operation, if the cabinet is not configured with three subracks or if the two power
supplies are not accessed completely, the corresponding tributary power reports the power status
alarm. If you are sure that the current configuration is correct, suppress the power status alarm.
Current alarms and history alarms have the following four types: current NE alarms, history NE
alarms, current T2000 alarms and history T2000 alarms. The T2000 alarm includes the alarms
reported from NEs and the alarms generated by the T2000 itself.
7.1.12 Alarm Statistics
The alarm statistics are displayed in the tabular format according to the user-defined conditions.
This helps you to analyze the running status of the equipment.
7.1.13 Alarm Dumping
When the history alarm data in the T2000 database exceeds a certain amount, the T2000
operations will be affected, or even worse, the entire system could be down. The alarm dumping
function is used to save the history alarm data in the T2000 database to a specified directory as
a file. In this way, the T2000 performance is improved.
No
No
Yes
No
The EMS detects the EMS
Save the alarm data to the alarm, and saves it to the
EMS server EMS server.
Alarm
correlation analysis Yes
Set EMS alarm filter?
No
Set alarm No
notification?
Yes
Flow Chart
Figure 7-2 shows the alarm handling procedure.
Start
Receive an alarm
Fault
removal
Clear the alarm
Ye
s
Record the maintenance
experience
End
Procedure
The alarm handling procedure, as shown in Figure 7-2, is described inTable 7-1.
1 Receive an alarm When receiving an alarm, the administrator starts the alarm
handling procedure. To ensure that the operators can receive
notifications in time when a fault occurs, you need to set
alarm notification methods on the T2000.
2 View the alarm details This is where you start. View the alarm details, including
the alarm location information, alarm help, and alarm
maintenance experience.
3 Acknowledge the To avoid others handling the same alarm, you need to
alarm acknowledge it. When you acknowledge an alarm, it
indicates that the alarm is being processed.
4 Collect fault By locating an alarm, you can query the fault information
information and analyze the causes of the fault.
5 Analyze the causes of Analyze the causes of the fault according to the fault
the fault information.
6 Work out the fault Work out the fault handling scheme according to the alarm
handling scheme details, device manuals, network status, and maintenance
experience.
7 Carry out the fault Carry out the fault handling scheme to remove the fault.
handling scheme
8 Clear the alarm When the fault is removed, the alarm is cleared, and the
T2000 receives the cleared alarm.
9 Check the handling After the fault is removed, check the handling results.
results
10 Record the After you complete the fault handling, record the
maintenance maintenance experience.
experience
The alarm template is divided into two types: alarm browsing template and alarm attribute
template.
l Alarm browsing templates include the current alarm browsing template, the history alarm
browsing template, the event browsing template, and the alarm statistics template. Alarm
browsing templates combine a group of filter conditions that are used to browse the alarm
information or alarm statistics. Some common filter conditions used to browse the alarm
information and statistics are set in a template. As a result, when browsing alarm
information or alarm statistics in the future, you do not need to reset the filter conditions.
l Alarm attribute templates combine the attributes of the NE alarms, such as alarm level,
automatically reported alarm state, and masked alarm state. You can use the default
template of the system. You can also customize the alarm attribute template according to
the alarm monitoring policy. You can apply the alarm attribute template to the specified
NE. You can also simplify the operations of setting alarm attributes.
Alarm Viewing No
Alarm Acknowledgement No
Alarm Synchronization No
Alarm Check No
Alarm Refreshing No
Alarm Filtering No
Alarm Remarks No
Alarm Viewing
You can view the alarms of the equipment and services on the T2000 to learn the running status
of the network or the equipment.
l Viewing current alarms: You can view the networkwide current alarms of all the severity
levels.
l Viewing all current alarms of a specified severity level: By clicking the alarm icon on the
toolbar, you can conveniently view the networkwide critical, major or minor alarms.
l Viewing alarms of a specified NE or T2000: You can select an NE or a T2000 on the Main
TopologyNE List to view the current alarms of the selected object.
l Viewing current alarms of a trail: In the Trail View, you can quickly view the alarms of
the concerned trail or of the currently managed trail. This facilitates the maintenance.
l Viewing history alarms: By viewing all the history alarms recorded in the T2000, you can
know the faults that once occurred on the NEs and on the T2000. This helps in the long-
term performance analysis.
Alarm Acknowledgement
An acknowledged alarm indicates that this alarm has been handled by a user. The cleared alarms,
after being acknowledged, disappear from the current alarm browsing window, and are moved
to the history alarm library. An alarm can be acknowledged in the following two ways:
l Manual acknowledgement: You can select an alarm from the current alarm browsing
window to acknowledge it.
l Automatic acknowledgement: If you enable the automatic alarm acknowledgement, the
T2000 automatically acknowledges the alarms cleared before a specified time at 3:00 every
morning.
Alarm Synchronization
When the communication between the T2000 and equipment is interrupted and then restored,
or when the T2000 is restarted, you need to synchronize the alarm information to keep the
consistency of the alarm data. To synchronize the alarms, the T2000 compares the alarms in the
T2000 with the alarms in the NE. If the alarm data is inconsistent, the T2000 uploads the NE
alarm data to the T2000 database and overwrites the original information. The alarm
synchronization can be performed in the following two ways:
l Manual synchronization: You can specify an alarm in the current alarm browsing window
and synchronize it.
l Automatic synchronization: You can specify the trigger conditions for the automatic alarm
synchronization, such as when the T2000 starts, when the communication is restored from
an interruption, or when an LCT user logs out.
Alarm Check
The alarm check function is used to compare the clearance status of the current alarms on the
T2000 with the actual status of the alarms on the NE. If the alarm is already cleared on the NE,
the alarm is marked as cleared on the T2000.
Alarm Refreshing
When you refresh the alarms, the latest alarm information is obtained from the alarm database
of the T2000 and displayed on the T2000 client.
Alarm Deletion
When you delete an alarm, the alarm is cleared from the NE and the current alarm library of the
T2000. After that, the alarm is moved to the history alarm library.
Alarm Filtering
By setting the filter criteria, you can filter out the unconcerned alarms in the alarm browsing
window. The filter criteria include:
l Alarm Name
l Remarks
l Rising Time
l Cleared Time
l Alarm Status
l Severity
l Alarm Type
l Alarm Plane
Alarm Remarks
You can add remarks for the handled alarms. This is useful when you manage a large number
of alarms.
Table 7-3 lists the impacts of alarm setting operations on NEs and services.
Table 7-4 lists the impacts of alarm setting operations on alarms. You can refer to Alarm
Reporting Process.
Setting the Alarm Reversion l When you set the alarm reversion for a
port, the alarm status on this port is
opposite to the actual situation. That is,
alarms are not reported even if they exist.
l When you set the alarm reversion for a
port, the alarm status of the board does not
change, and the alarm indicator still
indicates the actual running status of the
equipment.
Non-revertive This is the normal alarm monitoring status, which is also the default
setting. If the Reversion Mode of the NE alarm is set to Non-
Revertive, the system returns an failure prompt when you attempt to
enable the alarm reversion for a port. This is because the alarm
reversion of a port cannot be enabled in the Non-Revertive mode.
Manual reversion When the Reversion Status of a port is set to Enabled, the status of
the alarms reported from the port immediately changes to the opposite
of the actual alarms regardless of the actual alarm status at the port.
To be specific, when there is an actual alarm, the alarm is not reported.
When there is not an actual alarm, the alarm is reported.
When the Reversion Status of a port is set to Disabled, the status of
the alarms reported from the port is kept consistent with the actual
alarm status regardless of the actual alarm status at the port.
CAUTION
l The alarm reversion is configured based on individual ports.
l When you set the alarm reversion for a port, the alarm status of the board does not change,
and the alarm indicator still indicates the actual running status of the equipment.
l You can obtain the actual alarm status by querying the alarm from the related board.
can effectively suppress correlative alarms, reduce the alarm count, and quickly locate faults.
The alarm correlation includes the NE alarm correlation and the T2000 alarm correlation.
NE Alarm Correlation
The NE alarm correlation rule is the alarm performance monitoring mechanism of the logical
function module of the SDH equipment. The rule is fixed and cannot be manually set. A good
understanding of the mechanism helps you improve the efficiency of analyzing and locating
faults during equipment maintenance.
Root alarm is directly caused by the abnormal events or faults in the network. An root alarm
always generate some other alarms of lower severity level. These alarms derived from the root
alarm are correlative alarms.
For example, if a fiber is cut off, the SPI functional module in the optical board detects the
occurrence of the R_LOS alarm (root alarm). This alarm in turn causes the RST functional
module in the regenerator section (RS) to generate alarms (correlative alarm) such as R-LOF,
R_OOF, B1_SD and B1_EXC. To avoid this problem, you can set correlation rules between the
previously mentioned alarms, and enable the alarm correlation suppression. In this way, the NE
reports only the root alarm, R_LOS.
Figure 7-3 shows the alarm flow of each function module of the SDH equipment in detail. In
this flow, you can view the relation between alarm maintenance signals generated by each
function module of the SDH equipment.
"1"
LOS/LOF
RS-TIM AIS
J0
BIP Err
B1
MS-AIS "1"
K2 AIS
MS-BIP Err
B2
MS-REI
M1
MS-REI
K2
AU-AIS "1"
AU-LOP
HP-SLM HP-UNEG "1"
C2
HP-TIM
J1 AIS
HP-BIP Err
B3
HP-RDI
G1
HP-RDI
G1
TU-AIS "1"
V1-V3 TU-LOP
LP-UNEQ "1"
V5
LP-TIM
J2
LP-BIP Err AIS
V5
LP-REI
V5
LP-RDI
V5 "1" AIS
LP-SIM
V5
CAUTION
l The alarm correlation rule is the basis for the alarm correlation analysis, and is thus closely
related to the analysis result. Be cautious when you set the alarm correlation rule.
l Usually, it is recommended that you use the default alarm correlation analysis rule.
l The alarm correlation suppression is set to disabled by default. To enable the alarm
correlation rules for alarm analysis, you need to manually enable the alarm correlation
suppression.
NE1, NE2 and NE3 form a non-protection (NP) chain with services running between each two
of them. If the fiber between NE1 and NE2 is broken, NE2 reports the R_LOS alarm. Meanwhile
NE2 and NE3 report a lot TU_AIS alarms. These TU_AIS alarms are, however, generated by
the R_LOS alarm on NE2. In this case, you can set alarm correlation rules for the R_LOS alarm
of NE2 to suppress the TU_AIS alarms of NE2 and NE3. This reduces the alarm amount and
eases the fault location.
The alarm correlation rule takes effect only in the following cases:
l Alarm 1 and alarm 2 are generated on the same object.
l Alarm 1 is generated at the upstream of alarm 2.
l Alarm 1 is generated at the opposite service end of alarm 2.
The alarm correlation rule can elevate the severity level of root alarms and correlative alarms
on condition that the alarms are generated in compliance with the alarm correlation rule. For
example, the severity level of TU_AIS is major. If you set the TU_AIS as the correlative alarm
of the R_LOS and elevate the severity level of the TU_AIS in an alarm correlation rule, the
TU_AIS is elevated to a critical alarm only when the TU_AIS is generated by R_LOS. If the
TU_AIS is not generated by R_LOS, it is still displayed as a major alarm on the T2000.
Alarm Color
The T2000 uses evident color changes on the GUI to help you quickly locate the alarmed
monitoring point.
l The alarm indicators on the toolbar display the number of all the uncleared critical, major
and minor alarms networkwide. When a new alarm is reported, the alarm indicator flashes
while the statistics on the indicator change. You can navigate to the alarm browsing window
by clicking the alarm indicator to view the networkwide alarms of this severity level.
l On the Main Topology, the colors of the NE and subnet icons are displayed according to
the alarm that is currently at the highest severity level. The frame outside the icon indicates
all the unacknowledged alarms.
l On the Main Topology, if a fiber is affected by an alarm, the fiber color varies with the
alarm that is currently at the highest severity level on the fiber.
l On the NE Panel, the board color varies with the alarm that is at the highest severity level
on the board.
l On the board view, the color of each channel varies with the alarm that is currently at the
highest severity level on the corresponding channel.
l On the Trail View, the alarmed trails are displayed in different colors.
By default, the T2000 displays critical alarms in red, major alarms in orange, minor alarms in
yellow, and warning alarms in purple. You can define different colors for the alarms at different
severity levels.
In the Browse Current Alarm window, if you select Display the Latest Alarms, the newly
reported alarms are automatically displayed in this window. If this option is not turned on, the
Refresh button flashes when a new alarm is reported. When you click the button, the alarm is
immediately displayed in this window.
Alarm Box
The T2000 client connects to the alarm box device commonly used in Huawei to provide audible
and visual alarms. You can determine the alarm severity according to the indicators and sounds
of the alarm box. When a new alarm is reported, the alarm box instantly beeps and flashes the
alarm indicator of the corresponding severity.
Sound Box
Connected to the a sound box, the T2000 client uses different sounds to indicate alarms at
different severity levels. When a new alarm is reported, the sound box immediately beeps. The
sound is muted when the alarm is acknowledged or when the preset duration for the sound to
persist elapses.
The alarm sound is realized at the T2000 client. You can set different sounds for alarms of
different severity levels.
l Send the alarm information through an email to the email box of the specified user.
l Send the alarm information through the mobile phone short message to the mobile phone
of the specified user.
You can take different measures for alarms of different severities. On the T2000, you can redefine
the severity level for an alarm as required. You need to adjust the severity for an alarm only
when the alarm has severer or less severe impacts than when it is at the original severity level.
Alarm Status
Based on whether an alarm is acknowledged or cleared, an alarm can be in the following status:
unacknowledged and uncleared, acknowledged and uncleared, unacknowledged and cleared,
acknowledeged and cleared. Figure 7-4 is a module about the alarm status conversion.
NE
Report alarm
Unacked&uncleared
Clear Unacked&cleared alarm
alarm
(current alarm)
(current alarm)
Acknowledge Acknowledge
NOTE
The acknowledged and cleared alarms are called history alarms. The alarms in other status (that is,
unacknowledged and uncleared, acknowledged and uncleared, unacknowledged and cleared) are called current
alarms.
l Alarm clearance:
When the factor that causes an alarm to disappear, the NE detects that the alarm is cleared.
In this case, the NE notifies the T2000 to refresh the alarm status, and at the same time
deletes the alarms in the alarm library of the SCC.
l Alarm acknowledgement:
The alarm acknowledgement function enables you to identify whether an alarm has been
handled. By viewing the alarm status, you can clearly differentiate between the handled
and not handled alarms, and then take different measures for them.
The alarms can be categorized into the following two types according to the generating location:
l NE alarms: alarms generated when the NE equipment is faulty.
l T2000 alarms: alarms generated when the T2000 environment or the connection between
the T2000 and NE is faulty.
The alarms can be categorized into the following six types according to the T2000 standards and
functions:
l Communication alarms: alarms related to NE communication, ECC communication, and
optical signal communication. For example, loss of NE communication and loss of signal.
l Processing alarms: alarms related to software processing and abnormal conditions. For
example, equipment bus collision and secondary path check failure.
l Equipment alarms: alarms related to equipment hardware. For example, laser failure and
optical port loopback.
l Service alarms: alarms related to the service status and QoS. For example, performance
threshold-crossing of the multiplex section, and excessive B2 bit errors.
l Environment alarms: alarms related to the power supply system and equipment room
environment (temperature, humidity, access control and so on). For example, the
temperature of the power module exceeds a certain threshold.
l Security alarms: alarms related to the security of T2000 and NEs. For example, an NE user
is not logged in.
The current NE alarms indicate the alarm data stored in the current alarm database of the system
control board on the NE. If the alarm suppression is set, the current alarms may not indicate the
actual condition.
The T2000 alarm refers to the alarm data stored in the current alarm library of the T2000. Whether
the current T2000 alarm is consistent with the current NE alarm depends on the following factors:
l Whether the automatic alarm reporting is configured
l Whether the alarm filtering is configured
l Whether the alarm synchronization or the alarm check is performed
Overflow Dumping
You can set the maximum storage capacity of the alarms using the T2000. The T2000
periodically checks the number of history alarms. Once the history alarm data exceeds the
capacity, the T2000 automatically dumps the data in the history alarm library to a file to relieve
the burden of the T2000 computer. This alarm dumping mode is known as the overflow dumping.
Usually, you do not need to manually configure the overflow dumping parameters. However,
on some occasions such as in a larger-scaled network, or when a large amount of alarms are
raised within a short period, you can set the upper threshold to two or three times the original
value. Before you do this, ensure that sufficient database and disk spaces are available.
Periodical Dumping
The T2000 automatically dumps the alarm data stored in the T2000 to a specified directory
according to the preset period. This alarm dumping mode is known as the periodical dumping.
In this mode, you can set the dumping period and save the alarm records in recent days. For
example, if you set the dumping period to five days, save the alarm records of the last day, and
enable the settings to take effect since January 1, the T2000 performs the dumping in January
5. The dumped history alarms are the alarms that are ended before January 4.
Immediate Dumping
The T2000 dumps the history alarm data in the T2000 database to a specified directory
immediately when an alarm is cleared. This mode is known as the immediate dumping. In this
mode, you can specify a stop time for the immediate dumping. All alarms cleared before this
time are dumped to the specified directory.
NOTE
l On UNIX, the dump files are usually saved to the /T2000/server/dump directory. You can manually back
up or delete these files.
l On Windows, the dump files are usually saved to the \T2000\server\dump directory. You can manually
back up or delete these files.
Prerequisite
You must be an NMS user with the "Fault Operator" authority or higher.
Context
l For each template type, up to 50 templates can be created.
l The Save button of the default template is disabled. In other words, the default template
cannot be modified.
l A template name cannot contain the special characters such as: ~ ` ! @ # $ % ^ * ( ) { } |
\ /.
Procedure
Step 1 In the alarm or event browse window, click Filter by Template, and then choose New.
Step 2 In the New Template dialog box, specify a template name. Click OK.
Step 3 In the New Template dialog box, on the Basic Settings and Alarm Source tabs, set the filter
conditions, and then click Save.
NOTE
l On the Basic Settings tab, in the Severity, Acknowledge Status, Clear Status, or Type group box, you
need to select at least one parameter. On the Alarm Source tab, you need to select at least one object or
type. Otherwise, the T2000 prompts that a certain parameter is not selected.
l The history alarm browse template does not contain the Ack Status or Clear Status parameter. The event
browse template does not contain the Ack Status, Clear Status, Cleared Time, or Duration parameter.
The GUI is similar to the following figure.
----End
Prerequisite
You must be an NMS user with the "Fault Operator" authority or higher.
Context
l The default alarm template cannot be exported.
l For security purposes, the exported template does not contain the resource condition you
choose, that is, it does not contain the specific device information.
Procedure
Step 1 Choose Fault > Import/Export Template.
Step 2 In the Import/Export template dialog box, export or import the alarm template.
l Export the template to a file.
1. Choose Export to file.
2. Click next to the File name text box. In the Save dialog box, set the destination
path and file name. Click Save.
3. Click OK.
4. In the Information dialog box, click OK.
l Import the template from a file.
1. Choose Import from file.
2. Click next to the File name text box. In the Open dialog box, choose the template
file, and then click Open.
3. Click OK.
4. In the Information dialog box, click OK.
----End
Context
l For each template type, up to 50 templates can be created.
l A template name cannot contain the special characters such as: ~ ` ! @ # $ % ^ * ( ) { } |
\ /.
l Usability is an index used to indicate the availability of a resource (such as a device) in a
period. The calculation formula is as follows:
Usability = (Statistical time range – Total alarm duration) / Statistical time range.
The total alarm duration (Time Length) does not contain the repeated duration. For
example, if alarm A lasts three minutes, alarm B lasts two minutes, and the two alarms
overlap for one minute, the total alarm duration is four minutes.
l When time is taken as the row name, the statistics range is specified as follows:
– When statistics is collected by month, the statistics time range does not exceed one year.
– When statistics is collected by day, the statistics time range does not exceed 90 days.
– When statistics is collected by hour, the statistics time range does not exceed 240 hours.
– When statistics is collected by time (five minutes), the statistics time range does not
exceed 24 hours.
l The parameters for statistics conditions are correlated. If you set a parameter to a specific
value, another parameter may cannot be set or cannot be set to a specific value. For example,
if you set Row heading to month, Anytime and Since cannot be set.
Procedure
Step 1 In the Alarm Statistics window, click Statistic by Template, and then select New.
Step 2 In the New Template dialog box, specify a template name. Click OK.
Step 3 In the New Template dialog box, configure appropriate settings, and then click Save. In the
New Template dialog box, on the Basic Settings and Alarm Source tabs, set the filter
conditions, and then click Save.
Step 4 In the Confirm dialog box, click Yes. In the Confirm dialog box, click Yes or No.
----End
Prerequisite
You must be an NMS user with the "Fault Operator" authority or higher.
Procedure
Step 1 In the Current Alarms, History Alarms, Events, or Alarm Statistics window, click Filter by
Template, and then choose Open .
NOTE
In the Alarm Statistics window, click Statistics by Template.
Step 2 In the Open dialog box, select a template that you want to set to the startup template. Click Set
Startup Template.
When you set the startup template for a window, and then choose the corresponding menu to
access the window, the alarm or event information is displayed according to the settings of the
template.
----End
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Context
l If the alarm attribute template is not created, the T2000 handles the alarms reported from
NEs according to the default alarm attribute template.
l If a template on one of the T2000 servers is customized, you are recommended to customize
the same template on other T2000 servers, to ensure that the alarms are consistently
monitored on each server.
l You can set different alarm management templates for different NEs.
Procedure
Step 1 Choose Fault > Settings > Alarm Attribute Template from the Main Menu.
Step 3 Select the desired alarm, and modify the Severity, Auto Reporting Status, and Status.
Step 4 Click Save to save your modifications, or click Save As and enter a template name to save it as
a new template.
NOTE
Step 5 Click Apply to. The Apply Alarm Attribute Template to NE dialog box is displayed.
Step 6 Select the alarm attributes to be applied and the target NE. Click OK.
After the alarm attribute template is applied to the NE, the T2000 automatically handles the alarms reported
from the NE according to the settings in the template.
----End
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Procedure
Step 1 Choose Fault > Synchronize Networkwide Alarms from the Main Menu.
A progress bar is displayed. After the operation is complete, a prompt is displayed indicating
that the operation is successful.
----End
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Procedure
Step 1 Select an NE on the Main Topology.
NOTE
If you select topology subnet form the Main Topology, it indicates that all NEs in that topology subnet are
selected.
Step 2 Right-click the selected NE and choose Synchronize Current Alarms from the shortcut menu.
The progress bar is displayed. After the operation is complete, a prompt is displayed indicating
that the operation is successful.
Step 3 Click Close.
----End
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Procedure
Step 1 Right-click the local NM icon on the Main Topology, and choose Synchronize Current
Alarms from the shortcut menu. Wait for the end of operation. The Operation Result dialog
box is displayed.
Step 2 Click Close.
----End
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Procedure
Step 1 Choose Fault > Settings > Auto Synchronization from the Main Menu.
Step 2 In the Auto Synchronization dialog box, set the alarm synchronization parameters.
l When Starting the NM indicates that the T2000 automatically synchronizes the alarms
with those on all the NEs when it is started.
l When communication is lost and recovers indicates that the T2000 automatically
synchronizes the alarms with those on a specific NE when it resumes the communication
with the NE.
l LCT User Logs Out indicates that the T2000 automatically synchronizes the alarms with
those on a specific NE when the LCT user logs out.
Step 3 Click OK.
----End
By viewing suppressed correlative alarms, you can know more information about the faults.
7.4.8 Viewing Current Alarms of a Fiber/Cable
The alarm generated on a fiber/cable is from the source or sink end of the fiber/cable, the trail
that the fiber/cable carries, or the fiber/cable itself. Viewing current alarms of a fiber/cable can
obtain the relevant fault information of the fiber/cable in time, to fast and accurately locate the
fault.
7.4.9 Viewing History Alarms of a Fiber/Cable
Viewing history alarms of a fiber/cable can know the long-term statuses of the fiber/cable during
network running. The history alarm information can be the reference when you maintain the
fiber/cable.
7.4.10 Brows Remote Notification Logs
You can brows remote notification logs on T2000.
7.4.11 Managing Networkwide SDH Alarm Trails in Real Time
The T2000 can manage the networkwide SDH alarm trails in real time. It manages all the SDH
trails that have current alarms. If an alarm ends, the related trail is automatically removed from
the user interface.
7.4.12 Managing Networkwide WDM Alarm Trails in Real Time
The T2000 can manage the networkwide WDM alarm trails in real time. It manages all the WDM
trails that have current alarms. If an alarm ends, the related trail is automatically removed from
the user interface.
7.4.13 Viewing Current Alarms of an SDH Trail
By viewing the current alarms of an SDH trail, you can know the running status of the services
carried on this trail. This helps during the network maintenance when you need to update the
alarm information and take proper measures on time. When you view the current alarms of an
SDH trail, you can perform other operations for these alarms at the same time. For example,
synchronize, refresh, check, acknowledge and filter alarms.
7.4.14 Viewing History Alarms of an SDH Trail
By viewing history alarms of an SDH trail, you can learn history faults of the trail for reference
of operation and maintenance.
7.4.15 Viewing Current Alarms of a WDM Trail
By querying current alarms of a WDM trail, you can learn about faults on this trail to perform
maintenance in a timely and effective manner.
7.4.16 Viewing History Alarms of a WDM Trail
By querying history alarms of a WDM trail, you can learn about history faults on this trail and
provide reference for maintenance of current faults.
7.4.17 Viewing Current Alarms of a Trunk Link
By viewing current alarms of a trunk link, you can query the running status of services that the
current trail carries. During the network maintenance, you need to update alarm information and
properly handle the alarms in time. When viewing the current alarms of the trunk link, you can
also synchronize, refresh, check, acknowledge and filter the alarms.
7.4.18 Viewing History Alarms of a Trunk Link
By viewing history alarms of a specified trunk link, you can learn history faults of the trail for
reference of operation and maintenance.
7.4.19 Viewing Current Alarms of an Ethernet Trail
By viewing current alarms of an Ethernet trail, you can query the running status of services that
the current trail carries. During the network maintenance, you need to update alarm information
and properly handle the alarms in time. When viewing the current alarms of the Ethernet trail,
you can also synchronize, refresh, check, acknowledge and filter the alarms.
7.4.20 Viewing History Alarms of an Ethernet Trail
By viewing history alarms of an Ethernet trail, you can learn history faults of the trail for
reference of the operation and maintenance.
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 In the topology view or the navigation tree, right-click the device that raises an alarm and choose
Browse Current Alarms.
Step 2 On the Current Alarms tab, view the information on the current alarm of the device.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
l Monitor alarms through the thumbnail of the alarm panel.
The thumbnail of the alarm panel consists of three color blocks and an event indicator at
the upper right corner of the client. Each color block represents an alarm severity. The
number on a color block represents the number of the current uncleared alarms of the
specific severity in the T2000. When a new alarm occurs, the corresponding color block
blinks to prompt you. You can check the thumbnail of the alarm panel for new alarms,
alarm severities, current alarm statistics, and new events.
You can click a color block on the thumbnail to view the details on the alarms of a specific
severity. If you move the cursor to the button that is at the upper right corner of the
client, the number of the new events is displayed. When a new event occurs, this button
turns red and blinks to prompt you. Click this button. Then an event browse window is
displayed.
l Monitor alarms through the alarm panel.
Choose Fault > Show Alarm Panel , or click on the toolbar to display the alarm
panel. You can add a current alarm browse template or an event browse template to the
alarm panel. The alarm panel displays alarms information based on the template.
When you monitor alarms through the alarm panel and you want to know the alarm details,
you can double-click an alarm or event template on the alarm panel to open the
corresponding alarm or event template window. Then you can query the alarm details.
----End
Prerequisite
To perform the browse operation, You must be an NM user with the "NM monitor" authority or
higher. To perform the acknowledgement or clearance operation, you must be an NM user with
the "NE operator" authority or higher.
Procedure
Step 1 Choose Fault > Browse Current Alarm from the Main Menu.
Step 2 In the Filter dialog box, set filter criteria and click OK. The current alarm viewing window is
displayed.
NOTE
l The default alarm viewing template chooses all current alarms. If you want to view the correlative alarms
caused by the current alarms, click Display correlative alarms.
l If you already set the startup template for the current alarms, the alarms that meet the startup template criteria
are directly displayed, without the displaying of the Filter dialog box.
Step 3 Optional: Right-click an alarm in the query result list, and you can perform the following
operations:
l Choose Correlative Alarms from the shortcut menu to query the correlative alarms.
l Choose Remark from the shortcut menu to set remarks for this alarm.
l Choose Acknowledge from the shortcut menu to acknowledge the alarm.
NOTE
l If the selected alarm is an unacknowledged and uncleared alarm, it changes to an acknowledged but
uncleared alarm.
l If the selected alarm is an unacknowledged but cleared alarm, the alarm changes to a history alarm.
l Choose Locating to Topo Object from the shortcut menu to locate the alarm to the
topological object where the alarm occurs.
l Choose Fault Diagnosis from the shortcut menu to locate and remove the fault using the
fault diagnosis wizard on the T2000.
l Choose Suppress from the shortcut menu to suppress the alarm.
Step 4 Optional: Select the Display latest alarms check box to view the real-time alarms reported.
Step 5 Optional: Select one or more alarms. Click Check to check the selected alarms.
NOTE
When you check the alarm, you are comparing one or more uncleared alarms on the T2000 with those on
the NE. If the alarm exists as a current alarm in the NE, it means that the alarm information remains
unchanged on the T2000. If the alarm does not exist in the NE, the alarm is cleared on the T2000.
Step 6 Optional: Select an alarm. Its details and handling suggestions are displayed in the table below.
Step 7 Optional: Select one or more NE alarms and click Delete. The Delete the Alarms dialog box
is displayed. Click Yes.
The progress bar about the alarm deletion is displayed.
For operations of backing up the T2000 data, see related sections in the OptiX iManager T2000 Administrator
Guide.
----End
Reference Standard
All current alarms are cleared.
Troubleshooting
If an NM alarm is reported, handle this alarm according to the repairing suggestion. For details,
press F1 to view "The T2000 Alarm References" of the Online Help.
Prerequisite
You must be an NM user with the "NE monitor" authority or higher.
Procedure
Step 1 Choose Fault > Browse History Alarm from the Main Menu.
Step 2 In the Filter dialog box, set filter criteria and click OK. The history alarm viewing window is
displayed.
NOTE
l All history alarms are selected in the default alarm browsing template.
l If you set the startup template of viewing history alarms, the Filter dialog box is not displayed. Alarms that
meet the startup template condition are displayed instead.
Step 3 Optional: Select an alarm. Its details and handling suggestions are displayed in the panes below.
----End
Postrequisite
If there is no relevant history alarm in the Browse History Alarm window, you can query the
alarm data of a specific time by accessing the directory of the dumped alarm data.
Prerequisite
You must be an NM user with the "NE monitor" authority or higher.
Procedure
Step 1 Choose Fault > Browse Event from the Main Menu.
Step 2 In the Filter dialog box, set filter criteria and click OK. The event viewing window is displayed.
NOTE
l All abnormal events are selected in the default event browsing template.
l If you set the startup template of viewing abnormal events, the Filter dialog box is not displayed. Alarms
that meet the startup template condition are displayed instead.
----End
Prerequisite
You must be an NM user with the "NE monitor" authority or higher.
Procedure
Step 1 Choose Fault > Alarms Statistics from the Main Menu.
Step 2 In the Statistical Condition dialog box, set the statistical conditions and click OK.
NOTE
----End
Prerequisite
l You must be an NM user with the "NE monitor" authority or higher.
l The alarm correlation rules must be created.
Procedure
Step 1 Choose Fault > Browse Current Alarms from the Main Menu.
Step 2 Select the alarm that you want, right-click and choose Correlative Alarms from the shortcut
menu.
Step 3 View the details about the alarms in the Correlative Alarms dialog box displayed.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Choose File > Fiber/Cable Management from the Main Menu.
Step 2 Right-click a fiber/cable in the pane and choose Browse Relevant Current Alarms from the
shortcut menu.
Current alarms generated on the fiber/cable are displayed in the Current Alarms window.
Step 3 To display the latest alarms, check the Display latest alarms check box in the lower left corner.
NOTE
The effect of checking the check box is equivalent to refreshing. When the check box is checked, the
Refresh button is grayed out.
Step 4 Optional: Select one or more alarms and click Check to check the selected alarms.
NOTE
Checking alarms is to compare one or more uncleared alarms on the T2000 with those on the NE. If an
alarm exists as a current alarm on the NE, the alarm information remains unchanged on the T2000. If the
alarm does not exist on the NE, the alarm is cleared on the T2000.
Step 5 Select an alarm, and the alarm details and alarm causes are displayed in the panes in the lower
area.
Step 6 Select one or more alarms and click Acknowledge. The Operation Result dialog box is
displayed.
Step 7 Click Close. The Ack User and Ack Time fields display the corresponding values of the selected
alarms.
NOTE
Acknowledged and cleared alarms automatically change to history alarms.
Step 8 Select one or more alarms and click Delete. In the Delete the Alarms dialog box, click Yes.
The progress bar of Delete Alarm is displayed.
Step 9 In the Operation Result dialog box, click Close.
Step 10 Optional: Click Print or Save As to export the alarm data.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Choose Trail > Fiber/Cable Management from the Main Menu.
Step 2 Right-click a fiber/cable in the pane and choose Browse Relevant Historical Alarms from the
shortcut menu.
History alarms generated on the fiber/cable are displayed in the History Alarms window.
Step 3 Optional: Select an alarm, and the alarm details and alarm causes are displayed in the panes in
the lower area.
Step 4 Optional: Click Print or Save As to export the alarm data.
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
Procedure
Step 1 Choose FaultBrows Remote Notification Logs from the Main Menu.
Step 2 Optional: Click Filter, the Filter dialog box is displayed.
Step 3 Optional: Set the related parameters.
----End
Prerequisite
l You must be an NM user with "network monitor" authority or higher.
l The license for trail management must be available.
Procedure
Step 1 Choose Trail > Alarm Affected SDH Trails from the Main Menu.
Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter
All. The trails are displayed in the list.
Step 3 Optional: To manage the trail alarms, select a trail, click Alarm, select Current Alarm or
History Alarm from the drop-down list, and manage the alarms in the corresponding window.
Step 4 Optional: To manage the trail performance, select a trail, click Performance, select Query
Performance or Performance Parameter from the drop-down list, and manage the
performance in the corresponding window.
----End
Prerequisite
l You must be an NM user with "network monitor" authority or higher.
l The license for trail management must be available.
Procedure
Step 1 Choose Trail > Alarm Affected WDM Trails from the Main Menu.
Step 2 Set the trail filter criteria and click Filter All.
Step 3 In the Alarm Affected WDM Trails window displayed, the alarm affected WDM trails that
meet the criteria are displayed.
Step 4 Optional: Right-click the title of a parameter column and set the trail attributes to be displayed.
Step 5 Choose Alarm. Select the corresponding command from the drop-down menu to query or set
the alarm data of each trail.
Step 6 Optional: To query the performance data of a trail, click Performance > Browse
Performance.
Step 7 Optional: To print the trail information, click Print. To save the trail information, click Save
As.
----End
Prerequisite
l To view the alarms, You must be an NM user with "network monitor" authority or
higher. To acknowledge, check, synchronize and delete alarms, You must be an NM user
with "network operator" authority or higher.
l The SDH trail must be created.
Procedure
Step 1 Choose Trail > SDH Trail Management from the Main Menu.
Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, select or enter parameters and
set filter criteria. Click Filter All.
NOTE
l Click Filter All to refresh and display all the qualified trails.
l Click Secondary Filter to filter the trails that are already displayed.
l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are
already displayed.
Step 3 Optional: Select a trail on which there are alarms. Then, right-click in the Transmission Media
Layer Route window and then choose Display Alarm. If the NEs have alarms, each of the NE
icons is indicated with a specific alarm color. When you hold the cursor on any one of the NE
icons, alarm information of the NE is displayed.
Step 4 Select one or more trails. Click the Alarm and select Current Alarm.
NOTE
Click an alarm. The details of the alarm and the recommended handling are displayed in the pane below.
Step 5 Optional: To display the latest alarms, check the Display latest alarms check box.
NOTE
The function of the checked check box is equivalent to the automatic refresh function. Thus, when the
check box is checked, the Refresh button is grayed out.
Step 6 Optional: To check the alarms, select one or more alarms. Right-click alarms and choose Check
Alarms.
NOTE
When you check the alarm, you are comparing one or more uncleared alarms on the T2000 with those on
the NE. If the alarm exists as a current alarm in the NE, it means that the alarm information remains
unchanged on the T2000. If the alarm does not exist in the NE, the alarm is cleared on the T2000.
Step 7 Optional: To acknowledge the alarms, select one or more alarms and click Acknowledge. In
the Acknowledge Alarms dialog box displayed, click Yes.
NOTE
Step 8 Optional: To delete the alarms, select one or more alarms and click Delete. In the Delete the
Alarms dialog box displayed, click Yes.
----End
Prerequisite
l You must be an NM user with "network monitor" authority or higher.
l The SDH trail must be created.
Procedure
Step 1 Choose Trail > SDH Trail Management from the Main Menu.
Step 2 In the Set Trail Browse Filter Condition dialog box displayed, set the filter criteria and click
Filter All. The trails are displayed in the list.
NOTE
l Click Filter All to refresh and display all the qualified trails.
l Click Secondary Filter to filter the trails that are already displayed.
l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are
already displayed.
----End
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Trail > WDM Trail Management from the Main Menu.
Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view
the desired trails in the trail list.
l If you need to filter all the trails, click Filter All.
l If you need to add to the list more trails that match the requirement, click Incremental
Filter.
l If you need to filter the trails in the list, click Secondary Filter.
Step 3 Select a desired trail, click Alarm, and choose Current Alarm from the drop-down menu.
The current alarms on this trail are displayed in the window.
Step 4 Perform maintenance according to the current alarms reported on this trail.
----End
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Trail > WDM Trail Management from the Main Menu.
Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view
the desired trails in the trail list.
l If you need to filter all the trails, click Filter All.
l If you need to add to the list more trails that match the requirement, click Incremental
Filter.
l If you need to filter the trails in the list, click Secondary Filter.
Step 3 Select a desired trail, click Alarm, and choose History Alarm from the drop-down menu.
The history alarms on this trail are displayed in the window.
Step 4 Learn about the history alarms reported on this trail to provide reference for maintenance of
current faults.
----End
Prerequisite
l The trunk link must be created.
l To view alarms, You must be an NM user with "network monitor" authority or higher. To
acknowledge, check, synchronize and delete alarms, You must be an NM user with
"network operator" authority or higher.
Procedure
Step 1 Choose Trail > Trunk Link > Trunk Link Management from the Main Menu.
Step 2 In the Set Trunk Link browse filtering conditions window, select or enter parameters and set
filter criteria. Click Filter All.
NOTE
l Filter All refreshes and displays all trails that meet the filter criteria.
l Secondary Filter performs filtering on the trails that are already displayed according to the filter
criteria.
l Incremental Filter does not refresh the trail information that is already displayed. This function
displays the updated filter result below the existing trail information.
Step 3 Select one or more trails. Click Alarm and select Current Alarm from the drop-down list. The
window that is displayed shows the current alarms of all severity levels.
Step 4 Optional: Select one or more alarms and choose Check from the shortcut menu to check the
selected alarms.
NOTE
Checking alarms is to compare one or more uncleared alarms on the T2000 with those on the NE. If an
alarm exists as a current alarm on the NE, the alarm information remains unchanged on the T2000. If the
alarm does not exist on the NE, the alarm is cleared on the T2000.
Step 5 Optional: Select an alarm. The detailed information and cause of the alarm are displayed in the
panes below.
Step 6 Optional: Select one or more alarms and click Acknowledge. The Acknowledge Alarms dialog
box is displayed. Click Yes. The Ack User, Ack Time and Ack Status fields display the
corresponding values of the selected alarms.
NOTE
----End
Prerequisite
l The trunk link must be created.
l You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Trail > Trunk Link > Trunk Link Management from the Main Menu.
Step 2 In the Set Trunk Link browse filtering conditions window, select or enter parameters and set
filter criteria. Click Filter All.
NOTE
l Filter All refreshes and displays all trails that meet the filter criteria.
l Secondary Filter performs filtering on the trails that are already displayed according to the filter
criteria.
l Incremental Filter does not refresh the trail information that is already displayed. This function
displays the updated filter result below the existing trail information.
Step 3 Select one or more trails. Click Alarm and select History Alarm from the drop-down list. In
the window displayed, view the details of the history alarms of the specified trail.
----End
Prerequisite
l The Ethernet trail must be created.
l To view alarms, You must be an NM user with "network monitor" authority or higher. To
acknowledge, check, synchronize and delete alarms, You must be an NM user with
"network operator" authority or higher.
Procedure
Step 1 Choose Trail > Ethernet Circuit > Ethernet Trail Management from the Main Menu.
Step 2 In the Set Trail Browse Filter Conditions window, select or enter parameters and set filter
criteria. Click Filter All.
NOTE
l Filter All refreshes and displays all trails that meet the filter criteria.
l Secondary Filter performs filtering on the trails that are already displayed according to the filter
criteria.
l Incremental Filter does not refresh the trail information that is already displayed. This function
displays the updated filter result below the existing trail information.
Step 3 Select one or more trails. Click Alarm and select Current Alarm from the drop-down list. The
window that is displayed shows the current alarms of all severity levels.
Step 4 Optional: Select one or more alarms and choose Check from the shortcut menu to check the
selected alarms.
NOTE
Checking alarms is to compare one or more uncleared alarms on the T2000 with those on the NE. If an
alarm exists as a current alarm on the NE, the alarm information remains unchanged on the T2000. If the
alarm does not exist on the NE, the alarm is cleared on the T2000.
Step 5 Optional: Select an alarm. The detailed information and cause of the alarm are displayed in the
panes below.
Step 6 Optional: Select one or more alarms and click Acknowledge. The Acknowledge Alarms dialog
box is displayed. Click Yes. The Ack User, Ack Time and Ack Status fields display the
corresponding values of the selected alarms.
NOTE
----End
Prerequisite
l The Ethernet trail must be created.
l You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Trail > Ethernet Circuit > Ethernet Trail Management from the Main Menu.
Step 2 In the Set Trail Browse Filter Conditions window, select or enter parameters and set filter
criteria. Click Filter All.
NOTE
l Filter All refreshes and displays all trails that meet the filter criteria.
l Secondary Filter performs filtering on the trails that are already displayed according to the filter
criteria.
l Incremental Filter does not refresh the trail information that is already displayed. This function
displays the updated filter result below the existing trail information.
Step 3 Select one or more trails. Click Alarm and select History Alarm from the drop-down list. In
the window displayed, view the details of the history alarms of the specified trail.
----End
By locating an alarm, you can find the topology object that raises the alarm. The position of the
object is focused in the topology view.
7.5.6 Querying Device Maintenance Information
You can query device maintenance information to obtain the information on the device location
and the maintenance personnel. You can then notify the maintenance personnel if a device is
faulty.
7.5.7 Deleting Alarms
Alarms may be missing due to some faults. For example, when the T2000 fails to communicate
with the device, the clearance alarms reported by the device may be missing. For maintenance
purposes, the T2000 allows you to delete the alarms manually.
7.5.8 Example of Alarm Handling
This section provides an example on how to handle the alarm of insufficient disk space. It shows
the procedure and method for handling alarms. It helps you to know the basic procedure and
operations of alarm handling.
Prerequisite
To perform the browse operation, you must be an NMS user with the "Fault Maintainer" authority
or higher. To perform the acknowledgement or clearance operation, you must be an NMS user
with the "Fault Operator" authority or higher.
Procedure
Step 1 Choose Fault > Browse Current Alarm from the main menu.
Step 2 In the Filter dialog box, set the filter conditions. Click OK.
NOTE
If the startup template for browsing the current alarms is set, the Filter dialog box is not displayed. The alarms
that meet the filter conditions are displayed.
Step 3 In the query result table, click a column heading to sort the results.
NOTE
l If you click Alarm Source or Alarm Source Type, the NEs are grouped by NE ID. If you click a different
field, the alarm records are sorted in alphabetical order.
l If you click , the fields are sorted in ascending order. If you click , the fields are sorted in descending
order. Switch between and to switch between the ascending and descending orders.
l Choose Locating to Topo Object to locate the topology object that raises the alarm.
Step 5 Optional: Choose Display latest alarms to query new alarms in real time.
NOTE
----End
Prerequisite
You must be an NMS user with the "Fault Watcher" authority or higher.
Procedure
Step 1 Choose Fault > Browse Current Alarm from the main menu.
Step 2 In the Filter dialog box, set the filter conditions. Click OK.
NOTE
If the startup template for browsing the current alarms is set, the Filter dialog box is not displayed. The alarms
that meet the filter conditions are displayed.
Step 3 Select an alarm in the alarm browse window, viewing the alarm details at the lower left part of
the alarm list.
----End
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Procedure
Step 1 Choose Fault > Browse Current Alarm from the Main Menu.
Step 2 In the Current Alarms window, select one or more alarms and click Check.
----End
Prerequisite
You must be an NMS user with the "Fault Operator" authority or higher.
Procedure
Step 1 Choose Fault > Browse Current Alarm.
Step 2 In the Filter dialog box, set the filter conditions. Click OK.
NOTE
If the startup template for browsing the current alarms is set, the Filter dialog box is not displayed. The alarms
that meet the filter conditions are displayed.
Step 3 In the Current Alarm window, right-click an alarm and choose Acknowledge .
----End
Result
l A progress bar indicates the progress if you acknowledge two or more alarms at a time.
l When the T2000 receives the command for acknowledging the alarm, the alarm status
becomes Ack. The T2000 records when the alarm is acknowledged and who performs this
task. It also refreshes the information in all the windows on the client and updates the data
of the alarm panel and alarm box.
l If an alarm is acknowledged and cleared, it is dumped to the history database.
Prerequisite
You must be an NMS user with the "Fault Watcher" authority or higher.
Context
l All the alarm browse windows provide the access of locating alarms.
l In the Root Alarms and Correlative Alarms dialog boxes, you can use the shortcut menu
to locate the topology object that generates the root or correlative alarm.
l You can position an alarm on a topology node or an object on the panel.
l If the object that raises the alarm is deleted, the Locating to Topo Object menu is disabled.
Procedure
Step 1 In the alarm browse window, right-click an alarm and choose Locating to Topo Object.
After the alarm is located, the object that raises the alarm is focused in the topology view.
----End
Prerequisite
You must be an NMS user with the "Fault Watcher" authority or higher.
Procedure
Step 1 In the alarm browse window, right-click an alarm and choose Locating to Topo Object.
The topology object that raises the alarm is focused.
Step 2 Choose System > Device Maintenance Info from the main menu.
Step 3 In the Device Maintenance Info window, double-click the records in the maintenance
information list or click Display to view the device maintenance information.
NOTE
If you do not select any device in the topology view and choose System > Device Maintenance
Information, the maintenance information on all the devices is displayed.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Context
You cannot roll back the operation of deleting an alarm.
Procedure
Step 1 In the Current Alarms window, select an alarm and click Delete.
----End
Result
The T2000 dumps the alarm to the history database and refreshes the information in all the
windows on the client and updates the data of the alarm panel and alarm box.
Background
The T2000 reports an alarm of insufficient disk space.
Operation Guide
Based on the Fault Handling Procedure, do as follows:
1. Receive the alarm notification.
On the client, choose Fault > Browse Current Alarm to open the current alarm window.
An uncleared hard disk alarm of the T2000 is found. The alarm indicates that the T2000
server has insufficient disk space.
2. View the alarm details.
Select this alarm record, and then browse the details and handling suggestions of the alarm
at the bottom of the browse window.
3. Acknowledge the alarm
To avoid others handling the same alarm, you need to acknowledge it. When you
acknowledge the alarm, it indicates that the alarm is being processed. Right-click the alarm
and choose Acknowledge.
4. Work out the alarm handling method.
According to the handling suggestion and operation status of the T2000, you can delete the
redundant files and back up the dump data on another disk to solve the problem of
insufficient disk space.
5. Remove the relevant fault.
Delete the redundant files of the T2000. Back up the dump files from $IMAPROOT/
server/dump to other disk. Then delete the source dump data. The T2000 server then
obtains more available disk space.
6. Check the handling results.
The alarm is dumped from the current alarm database to the history alarm database. In the
Current Alarms window, the alarm is disappeared. You can find the cleared alarm in the
History Alarms window.
The T2000 can acknowledge the cleared alarms immediately or periodically. Therefore, you do
not need to acknowledge the cleared alarms manually.
7.6.2 Setting Alarm Auto Synchronization
You can set alarm auto synchronization. After the T2000 resumes the communication with an
NE or is restarted, the T2000 automatically synchronizes the alarms with those on the NE. This
helps keep alarm data consistency between the T2000 and NEs.
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Context
l The auto acknowledgement applies to only the cleared alarms.
l The time acknowledgement starts at 01:00 every day.
Procedure
Step 1 Choose Fault > Settings > Auto Acknowledgement from the Main Menu.
Step 2 In the Auto Acknowledgement dialog box, set the auto acknowledgement.
l Set the immediate acknowledgement.
Select Acknowledge Immediately After an Alarm Is Cleared and specify the alarm
severity.
l Set the time acknowledgement.
Select Acknowledge in * Days After an Alarm Is Cleared and specify the time and the
alarm severity.
NOTE
The immediate acknowledgement applies to only the alarms that are cleared after the immediate
acknowledgement configuration, but it does not apply to those alarms that are cleared before the
configuration.
----End
Result
The alarms that match the preset conditions are automatically acknowledged. The user who
acknowledges the alarms is recorded as NMS.
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Procedure
Step 1 Choose Fault > Settings > Auto Synchronization from the Main Menu.
Step 2 In the Auto Synchronization dialog box, set the alarm synchronization parameters.
l When Starting the NM indicates that the T2000 automatically synchronizes the alarms
with those on all the NEs when it is started.
l When communication is lost and recovers indicates that the T2000 automatically
synchronizes the alarms with those on a specific NE when it resumes the communication
with the NE.
l LCT User Logs Out indicates that the T2000 automatically synchronizes the alarms with
those on a specific NE when the LCT user logs out.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, click an NE and choose Alarm > Alarm Suppression from the Function
Tree.
Step 2 Select an alarm that you want to suppress, and set the Status of the alarm as Suppressed.
NOTE
l If you have already created an alarm attribute template, click Use Template to select the template, and
then set alarm suppression for the NE.
l To suppress alarms for multiple NEs, you can customize an alarm attribute template, and apply the
alarm attribute template to these NEs.
----End
Result
l After an alarm is suppressed, the NE does not monitor the alarm.
l After an alarm is suppressed, the T2000 does not clear the reported alarms, until an alarm
cleared notification is received.
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select a board and choose Alarm > Alarm Suppression from the Function
Tree.
Step 2 Select a port from the Monitored Object drop-down list in the right-hand pane.
NOTE
In the Monitored Object field, you can select the current board to include all ports of the board, or select
multiple individual ports at the same time.
Step 3 Set the Status of the alarms that need to be suppressed to Suppressed.
Click Apply and the Operation Result dialog box is displayed.
Step 4 Click Close.
NOTE
If you have already created an alarm template for a board, click Use Template to select a suitable template.
----End
Result
l After an alarm is suppressed, the board does not monitor the alarm.
l After an alarm is suppressed, the T2000 does not clear the reported alarms, until an alarm
cleared notification is received.
Prerequisite
l You must be an NM user with the "NE operator" authority or higher.
l Cross-connections must be created on the ATM board (For example: the AL1 board on the
4.0 equipment).
Procedure
Step 1 In the NE Explorer, select an ATM board and choose Alarm > ATM Connection Alarm
Suppression from the Function Tree.
Step 2 Click Query to query the alarm information from the NE.
Step 3 Click Select Connection. The Select Connection dialog box is displayed.
Step 4 In the Select Connection dialog box, select a connection and click OK.
Step 5 You can use any of the following ways to set alarm suppression:
l Click Default.
l Click Use Template. Select a template from the Select Template dialog box displayed,
and click OK.
l Set Status for each Event.
Step 6 Click Apply.
----End
Result
l After an alarm is suppressed, the board does not monitor the alarm.
l After an alarm is suppressed, the T2000 does not clear the reported alarms, until an alarm
cleared notification is received.
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Click the networkwide maintenance status icon on the toolbar, and the Networkwide
Maintenance Status dialog box is displayed.
Step 2 Choose Maintenance Status > Alarm Suppression and view the alarm suppression status for
a path.
NOTE
If the queried information is null, it indicates that the alarm suppression is not set for any path.
Step 3 Optional: To restore the suppression status to the default value, right-click and choose
Default from the shortcut menu. Click Apply. A prompt is displayed indicating that the operation
is successful. Click Close.
NOTE
You must be an NM user with "NE operator" authority or higher to set the alarm suppression status for a
path.
----End
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Context
If you set alarm reversion for a port, the status of all alarms on this port is displayed as "no alarm"
even though the alarms occur.
Procedure
Step 1 In the NE Explorer, select the NE and choose Alarm > NE Alarm Attribute from the Function
Tree.
Step 2 Set Reversion Mode to Automatic Reversion or Manual Reversion. Click Apply.
NOTE
After the port alarm is cleared, if you set the Reversion Mode to Automatic Reversion, the reversion
setting is automatically cancelled at the NE side. Thus, the alarm status returns to normal. If the reversion
mode is set to Manual Reversion, the alarm status can return to normal only after the alarm reversion
setting is manually cancelled. If the reversion mode is set to Non-Revertive, you cannot set alarm reversion
at the port.
Step 3 In the NE Explorer, select a board and choose Alarm > Alarm Reversion from the Function
Tree.
----End
Result
l When you set the alarm reversion for a port, the alarm status on this port is opposite to the
actual situation. That is, alarms are not reported even if they exist.
l When you set the alarm reversion for a port, the alarm status of the board does not change,
and the alarm indicator still indicates the actual running status of the equipment.
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l The trail must be activated.
Context
If you set alarm reversion for a trail, all alarms of this trail are reverted. You cannot set alarm
reversion for a single alarm of the trail.
Procedure
Step 1 Choose Trail > SDH Trail Management from the Main Menu.
Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter
All. The trails are displayed in the list.
NOTE
l Click Filter All to refresh and display all the qualified trails.
l Click Secondary Filter to filter the trails that are already displayed.
l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are
already displayed.
Step 3 Select one or more trails, click Alarm and select Alarm Reversion from the drop-down list.
NOTE
Step 4 In the Alarm Reversion dialog box displayed, set Reversion Status of the trail to Enabled.
Step 5 Click Apply. In the Operation Result dialog box displayed, click Close.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Click the networkwide maintenance status icon on the toolbar, and the Networkwide
Maintenance Status dialog box is displayed.
Step 2 Choose Maintenance Status > Alarm Reversion and view the alarm reversion status for a path.
NOTE
If the queried information is null, it indicates that the alarm reversion is not set for any port.
Step 3 Optional: Set the alarm reversion status and then click Apply. A prompt is displayed indicating
that the operation is successful. Click Close.
NOTE
l If the alarm reversion is set for a port, the alarm status of this port is opposite to the actual status. That
is, when an alarm exists, the status is displayed as normal. This setting helps filter out negligible alarms.
When alarm suppression is set for a LOS alarm of the port, you cannot set alarm reversion at the same
time.
l You must be an NM user with "NE operator" authority or higher to set the alarm reversion status for
a path.
----End
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Procedure
Step 1 Choose Fault > Settings > NMS Alarm/Event Filter from the Main Menu.
Step 2 Change the filter status of the T2000 alarms that you want to filter, click Apply.
----End
Prerequisite
You must be an NM user with the "NE monitor" authority or higher.
Context
Alarms are filtered based on their original properties (the properties before redefinition).
Therefore, if you set the redefinition and filter for an alarm, the filter settings take effect before
the redefinition settings take effect.
Procedure
Step 1 Choose Fault > Settings > NE Alarm/Event Filter from the Main Menu.
Step 2 Click New in the NE Alarm/Event Filter window. An alarm or event filter record is created.
Step 3 Double-click Filter Condition, and specify the filter condition in the Filter Condition dialog
box.
Step 4 Set Start Time, End Time, Alarm Duration (Second) and Remarks.
----End
Prerequisite
l You must be an NM user with the "NE maintainer" and "NM monitor" authority or higher.
l The alarm attribute template that has the alarm reporting status configured as required must
be customized first.
Procedure
Step 1 Choose Fault > Settings > Alarm Attribute Template from the Main Menu.
The Alarm Attribute Template window is displayed.
Step 2 Select the pre-customized template from the Template drop-down list and click Apply to. The
Apply Alarm Attribute Template to NE dialogue box is displayed.
NOTE
If the appropriate alarm attribute template is not available, you need to customize a template first.
Step 3 Check the Alarm Auto-Report check box in the Alarm Attribute pane.
Step 4 Select the NE you need from the List of Optional Objects, and move it to List of Selected
Objects. Click Apply.
Wait for a few seconds and the Operation Result dialog box is displayed.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.Y
l If you use the template to set the alarm suppression status, You must be an NM user with
"NM monitor" authority or higher.
Procedure
Step 1 In the NE Explorer, select a board and choose Alarm > Alarm Severity and Auto
Reporting from the Function Tree.
Step 2 Set the Auto Reporting Status for the alarms and click Apply. The Operation Result dialog
box is displayed.
NOTE
If you have already created an alarm attribute template, you can click Use Template to set the automatic
reporting status of the alarms.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l Applies to the N3SL64 and N4SL16 boards.
Context
When a third-party lower order service enters the local equipment through the VC4 path, you
can monitor the performance of this service. This helps you determine whether the performance
or alarms of this service are of the local equipment. By setting the TUG structure in the receiving
direction of the VC4 path, you can determine the class of the lower order service. If the class of
a third-party lower order service is already determined, you can enable the monitoring of lower
order alarms and set the specific alarms to be monitored, to monitor the performance of the
service.
VC4
Third-party
network
Configured Service
Unconfigured Service
Procedure
Step 1 In the NE Explorer, select a board and choose Configuration > Set TUG Structure from the
Function Tree.
Step 2 Set Direction to Send, and set TUG3-1 Structure Type, TUG3-2 Structure Type and TUG3-3
Structure Type to Not Configured, VC12 or VC3 as required.
Step 3 Click Apply. Then, in the Operation Result dialog box, click Close.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l Applies to the N3SL64 and N4SL16 boards.
Context
When a third-party lower order service enters the local equipment through the VC4 path, you
can monitor the performance of this service. This helps you determine whether the performance
or alarms of this service are of the local equipment. By setting the TUG structure in the receiving
direction of the VC4 path, you can determine the class of the lower order service. If the class of
a third-party lower order service is already determined, you can enable the monitoring of lower
order alarms and set the specific alarms to be monitored, to monitor the performance of the
service.
VC4
Third-party
network
Configured Service
Unconfigured Service
Procedure
Step 1 In the NE Explorer, select a board and choose Configuration > Set TUG Structure from the
Function Tree.
Step 2 Set Direction to Receive, and set TUG3-1 Structure Type, TUG3-2 Structure Type and
TUG3-3 Structure Type to Not Configured, VC12 or VC3 as required.
Step 3 Click Apply. Then, in the Operation Result dialog box, click Close.
Step 4 Select VC4 Path, right-click, and choose Lower Order Performance Management from the
shortcut menu. In the Lower Order Performance Management window, select Monitored
Object and set Monitor Status to Enabled.
Step 5 Click Apply. Then, in the Operation Result dialog box, click Close.
Step 7 In the NE Explorer, select a line board and choose Alarm > Lower Order Path Alarm from
the Function Tree.
Step 8 Select Level and double-click Type of Monitored Alarm to set the alarm monitoring type.
Click OK.
Step 9 Click Apply. Then, in the Operation Result dialog box, click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Alarm > NE Alarm Attribute from the Function
Tree.
Step 2 Set Insertion Mode to AIS Mode or UNEQ Mode as required.
NOTE
The default insertion mode is UNEQ Mode. In the case of hybrid networking with the third-party network, the
insertion mode can be set to AIS Mode or UNEQ Mode according to the requirements of the third-party network.
Step 3 Click Apply. Then, in the Operation Result dialog box, click Close.
----End
Prerequisite
l You must be an NMS user with the "Fault Watcher" authority or higher.
l When modifying the alarm sound settings, you need to stop the current alarm sound,
because you need to initialize the sound.
Context
l The alarm sound settings are effective for the only local client.
l You can click Restore Defaults to restore the alarm sound to the default values.
l Do not stop the sounds of all severities, because you may miss some critical or major alarms
and delay the alarm handling.
l The alarm prompt tone has a higher priority than the event prompt tone.
l Sound playing policy: If the alarm priority corresponding to the current alarm sound is
higher than that of the new one, no action needs to be taken. If the current alarm priority is
lower than or equal to the new alarm priority, stop the current alarm sound and play the
new alarm sound.
l When an alarm sound is reset, the sound is not played again according to the alarm statistics
but played when a new alarm is received.
l After an alarm sound is set, check whether the system is set to silent, if the sound is not
displayed when an alarm is generated.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 3 On the Sound tab, set the parameters for the sound corresponding to the related alarm severity.
NOTE
l If you set the playing duration to -1, the alarm sound will last until you stop the sound or clear the alarm.
l To set alarm sounds by alarm name, click Advanced. In the Advanced dialog box, on the Set by Name tab,
select alarms, select an audio file, and set the playing duration. Then click OK.
----End
Prerequisite
You must be an NMS user with the "Fault Watcher" authority or higher.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, click the Color tab.
Step 3 Set the colors for Critical Alarm, Major Alarm, Minor Alarm, and Warning as required.
Step 4 Click OK.
----End
Prerequisite
You must be an NMS user with the "Fault Watcher" authority or higher.
Context
The settings are effective for only the current client.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, click the Local Fault Settings tab.
Step 3 On the Local Fault Settings tab, set the display mode of the alarm panel.
NOTE
l Display alarm panel at startup: The alarm panel is displayed when the client is started.
l Display the alarm panel when a new alarm is reported: The client displays the alarm panel automatically
when receiving a new alarm.
----End
Prerequisite
You must be an NM user with the "NE monitor" authority or higher.
Context
l For the T2000 to control the alarm box, you need to correctly set the communication
parameters of the alarm box in the Communication Parameters tab.
l The alarm box beeps in two ways. In the case of a critical and major alarm, the alarm box
keeps beeping until it is manually stopped or until the alarm is cleared. In the case of a
minor and warning alarm, the alarm box beeps for a fixed time period (one minute) and
stops. It can also be manually stopped.
Procedure
Step 1 Choose Fault > Alarm Box from the Main Menu.
Step 2 Click the Communication Parameters tab and properly set the parameters.
Step 3 Click the Audio-Visual Indication tab. Enable or disable audible and visual indications for the
alarm of each severity level as required.
Step 4 Click OK.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Right-click an NE and choose Clear Alarm Indication from the shortcut menu.
The Operation Result dialog box is displayed.
Step 2 Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Applies to the OptiX OSN 9500.
Procedure
Step 1 In the NE Explorer, select an NE and choose Alarm > NE Alarm Attribute from the Function
Tree.
Step 2 Click Query to query the settings of audible and visual alarm notifications of the NE from the
NE side.
Step 3 Set Alarm light switch and Alarm sound switch of the NE:
l Double-click the Alarm light switch and Alarm sound switch lists respectively, and select
Disabled or Enabled from the drop-down list.
l If you want to set Alarm light switch and Alarm sound switch to Enabled, click
Default.
Step 4 Click Apply. The Confirm dialog box is displayed asking you whether to proceed.
Step 5 Click OK. A prompt is displayed indicating that the operation is successful.
----End
Prerequisite
l You must be an NM user with the "NE operator" authority or higher.
l You must be an NM user with "NM monitor" authority or higher.
Context
l You can set to forward alarms to an email box, a mobile phone, or both.
l You can also set to forward alarms to several email boxes or mobile phones.
Procedure
Step 1 Choose Fault > Settings > Remote Notification from the Main Menu.
Step 2 In the Remote Notification window, click New to add a new alarm notification.
Step 3 Set the Remote Notification Condition and select an alarm for which you want to set remote
notification.
NOTE
l The conditions in the Basic Settings and Alarm Source tabs work together. That is, an alarm can be
forwarded only when it meets the conditions specified in the Basic Settings and Alarm Source tabs.
l In the Basic Settings tab, the Alarm name, Severity, and Type also work together.
Step 4 Set parameters including the Email, Time Zone, and Remark.
NOTE
l You can set a mobile phone number, so that the alarm is also forwarded to the mobile phone.
l If you want to forward the alarm to several email boxes, separate email addresses by ;.
Step 5 Click Communication Settings to set the communication parameters of remote notification,
and click OK.
NOTE
After setting, click Test and select the test email address to check whether the communication is normal.
Step 6 Optional: Click Delay Settings to set the delay time of remote notification as required. This
avoids irrelevant alarm notification information.
----End
Prerequisite
l You must be an NM user with the "NE operator" authority or higher.
l You must be an NM user with "NM monitor" authority or higher.
Context
l You can set to forward alarms to an email box, a mobile phone, or both.
l You can also set to forward alarms to several mobile phones.
Procedure
Step 1 Choose Fault > Settings > Remote Notification from the Main Menu.
Step 2 In the Remote Notification window, click New to add a new alarm notification.
Step 3 Set the Remote Notification Condition and select an alarm for which you want to set remote
notification.
NOTE
l The conditions in the Basic Settings and Alarm Source tabs work together. That is, an alarm can be
forwarded only when it meets the conditions specified in the Basic Settings and Alarm Source tabs.
l In the Basic Settings tab, the Alarm name, Severity, and Type also work together.
Step 4 Set parameters including the Mobile Phone, Time Zone, and Remarks.
NOTE
l You can set the email address, so that the alarm is forwarded to the email box.
l If you want to forward the alarm to several mobile phones, separate the phone numbers by ;.
Step 5 Click Communication Settings to set the communication parameters of remote notification,
and click OK.
NOTE
After setting, click Test and select the test mobile phone to check whether the communication is normal.
Step 6 Click Delay Settings to set the delay time of remote notification as required. This avoids
irrelevant alarm notification information.
----End
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Procedure
Step 1 Choose Fault > Settings > Redefine Alarm/Event from the Main Menu.
Step 2 Click New to create an alarm redefinition.
Step 3 Double-click the Alarm/Event field. The Select Alarm/Event dialog box is displayed.
Step 4 Select a suitable T2000 alarm and click OK.
Step 5 Change the Severity for the T2000 alarm and click Apply.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l You must be an NM user with "NM monitor" authority or higher.
l The alarm attribute template that has the alarm severity configured as required must be
customized first.
Procedure
Step 1 Choose Fault > Settings > Alarm Attribute Template from the Main Menu. The Alarm
Attribute Template window is displayed.
Step 2 Select the pre-customized template from the Template drop-down list and click Apply to. The
Apply Alarm Attribute Template to NE dialogue box is displayed.
NOTE
If the appropriate alarm attribute template is not available, you need to customize a template first.
Step 3 Check the Alarm Severity check box in the Alarm Attribute pane.
Step 4 Select the NE you need from the List of Optional Objects, and move it to List of Selected
Objects. Click Apply. Wait for a few seconds and the Operation Result dialog box is displayed.
Step 5 Click Close.
----End
Prerequisite
You must be an NM user with the "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select a board and choose Alarm > Alarm Severity and Auto Reporting
from the Function Tree.
----End
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Procedure
Step 1 Choose Fault > Settings > Alarm Correlation Analysis from the Main Menu.
Step 3 Set the Alarm 1, Alarm 2, Conditions, and Action for the new rule.
Step 4 Select Enable Automatic Alarm Correlation Analysis and click Apply. The Operation
Result dialog box is displayed.
Step 5 Click Close.
Step 6 Optional: Choose Fault > Browse Current Alarm from the Main Menu. Right-click a root
alarm and choose Correlative Alarms from the shortcut menu to display the correlative alarms
suppressed by this root alarm.
----End
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Context
Note that this function filters out the correlative alarms. It cannot increase the severity levels of
the correlative alarms.
Procedure
Step 1 Choose Fault > Settings > Alarm Correlation Analysis from the Main Menu.
Step 3 Set the Alarm 1, Alarm 2, Conditions, and Action for the new rule.
Step 5 Choose Fault > Browse Current Alarm from the Main Menu.
Step 6 In the Filter dialog box, set filter criteria and click OK.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select a board and choose Alarm > QoS Alarm > Bit Error Alarm
Threshold from the Function Tree.
NOTE
You can set the bit error alarm thresholds for the ports that the trail traverses. In the trail management window,
select a trail, click Alarm and select Alarm Threshold from the drop-down list.
There are two types of bit error thresholds for the excessive bit error and signal degrade.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Applies to the equipment of SDH series equipment.
l Applies to the equipment of RTN series equipment.
l Applies to the equipment of PTN series equipment.
l Applies to the OptiX Metro 6100 of the WDM series.
Procedure
Step 1 In the NE Explorer, select a board and choose Alarm > QoS Alarm > AIS Insertion from the
Function Tree.
Step 2 Select Port/Path and set the event you concern to Enabled.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Applies to the SDH and RTN equipment. The PDH tributary board must be created.
Context
NOTE
This operation may affect services.
Procedure
Step 1 In the NE Explorer, select a board and choose Alarm > QoS Alarm > UNEQ Insertion
Switch from the Function Tree.
Step 2 Click Query to query the UNEQ insertion status of each Port/Path from the NE.
Step 3 Set the UNEQ insertion switch for each Port/Path as required.
NOTE
The UNEQ has the two switches, LOS and Path Not Used.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Context
This operation may affect services.
Procedure
Step 1 In the NE Explorer, select a board and choose Alarm > Alarm Insertion from the Function
Tree.
Step 3 Select an alarm whose Insertion Status is Not Inserting. Click Insert.
The information about the alarm inserted to the specified path is displayed in the Inserted Alarm
List pane.
Step 5 Optional: To stop the alarm insertion, select one or more alarms from the Inserted Alarm
List pane, and click Clear.
----End
Prerequisite
You must be an NM user with "network operator" authority or higher.
Procedure
Step 1 Choose Trail > SDH Trail Management from the Main Menu.
The Set Trail Browse Filter Condition dialog box is displayed.
Step 2 In the Set Trail Browse Filter Condition dialog box displayed, set the filter criteria and click
Filter All. The trails are displayed in the list.
NOTE
l Click Filter All to refresh and display all the qualified trails.
l Click Secondary Filter to filter the trails that are already displayed.
l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are
already displayed.
Step 3 Select a VC4 trail or VC4 server trail. Click Maintenance and choose Alarm Insertion from
the drop-down menu.
Step 4 In the Alarm Insertion dialog box displayed, set the value of AIS Alarm Insertion or RDI
Alarm Insertion to Insert.
Step 5 Click Apply. In the Operation Result dialog box displayed, click Close.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Click the networkwide maintenance status icon on the toolbar, and the Networkwide
Maintenance Status dialog box is displayed.
Step 2 Choose Maintenance Status > Alarm Insertion and view the alarm insertion status for a path.
NOTE
If the queried information is null, it indicates that the alarm insertion is not set for any path.
Step 3 Optional: Set the alarm insertion operation and then click Apply. A prompt is displayed
indicating that the operation is successful. Click Close.
CAUTION
Inserting alarm may interrupt the service.
NOTE
You must be an NM user with "NE operator" authority or higher to set the alarm insertion operation for a
path.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Applies to the WDM equipment.
Procedure
Step 1 In the NE Explorer, select a board and choose Configuration > WDM Interface from the
Function Tree.
Step 3 To query the details about the alarm inserted at the ODU layer from the NE, do as follows:
l Click Quick Query to query the information about the selected parameters from the NE.
l Click Query to query the information about all the parameters from the NE.
Step 4 Set AIS Insertion in the ODU Layer, LCK Insertion in the ODU Layer and OCI Insertion
in the ODU Layer as required.
----End
You can set NE alarm delay to effectively prevent alarms from being transiently reported or
misreported, thus reducing the impact imposed on equipment.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Context
You can set the saving mode for NE alarms to Wrap or Stop.
l Wrap: When the NE alarm register is full, the register discards the earliest alarms to save
the latest alarm information when new alarms are raised. This is the default mode, which
is also the most used one.
l Stop: When the NE alarm register is full, it does not accept any new alarms so that you
cannot be informed of the new alarms. Hence, usually this mode is not used.
Procedure
Step 1 In the NE Explorer, select an NE and choose Alarm > NE Alarm Attribute from the Function
Tree.
Step 2 Click Query to query the alarm saving mode of the NE from the NE.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Context
You can set the NE alarm correlation suppression to the following two status: Enabled and
Disabled.
l Enabled: When alarms are raised from an NE, the T2000 records only the root alarm while
suppresses the alarms generated by the root alarm.
l Disabled: When alarms are raised from an NE, the T2000 records all the alarms, including
the root alarm and correlative alarms. By default NEs use this mode.
Procedure
Step 1 In the NE Explorer, select an NE and choose Alarm > NE Alarm Attribute from the Function
Tree.
Step 2 Click Query to query the enabling status of the NE alarm correlation suppression from the NE.
Double-click the Correlation Analysis list and choose Enabled or Disabled from the drop-
down list.
l Double-click the Correlation Analysis list and choose Enabled or Disabled from the drop-
down list.
l To set Correlation Analysis to Disabled, you can click Default.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Alarm > NE Alarm Attribute from the Function
Tree.
Step 2 Click the Alarm Correlation Rules tab and query the NE alarm correlation rules from the NE.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Context
l Occurring Delay Time (s): Indicates the duration for the alarm monitoring to persist before
the NE reports a newly raised alarm.
l Clearing Delay Time (s): Indicates the duration for the alarm monitoring to persist before
the NE reports that the alarm is cleared.
Procedure
Step 1 In the NE Explorer, select an NE and choose Alarm > NE Alarm Attribute from the Function
Tree.
Step 2 Click Query to query the alarm delay status of the NE from the NE side.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The equipment type must be OptiX OSN 1500, OptiX OSN 2500, OptiX OSN 3500 or
OptiX OSN 7500.
l Lower order service (VC3 or VC12) must be configured on the line board.
Context
When you configure higher order pass-through cross-connections, if you enable the alarm
monitoring function for lower order paths without monitoring lower order services, the
performance is affected.
Procedure
Step 1 In the NE Explorer, select a line board and choose Alarm > Lower Order Path Alarm from
the Function Tree.
Step 2 Click Query to query the alarm monitoring status of the lower order paths from the NE.
Step 4 Set whether to monitor the alarms on the VC3-1, VC3-2 and VC3-3 path.
----End
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Procedure
Step 1 Choose System > Database > Dump Manually from the Main Menu.
Step 2 Select the Alarm Data and specify a suitable File type.
Step 3 Select the Start time and End time, and specify the alarm generation time.
----End
Result
The dumped alarms are saved as a file in the specified directory, but not displayed in the History
Alarms window. To view the dumped alarms, you can collect the dumped alarm data by using
the network management system maintenance tool and then open the collected data by using the
text editor.
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Context
You can use Overflow Dump or Periodic Dump to automatically dump the data.
l If you select the overflow dump mode, the T2000 automatically dumps some data to the
specified path when the data exceeds the threshold.
l If you select the periodic dump mode, the T2000 periodically dumps the data to the specified
path.
l Overflow dump and periodic dump can work together. In this case, the T2000 dumps the
data or log according to the settings of overflow dump and periodic dump.
Procedure
Step 1 Choose System > Database > Dump Settings from the Main Menu.
Step 2 Select the Alarm Data, and set the parameters of overflow dump or periodic dump.
Step 3 Set the Dump mode, File type, and Dump to (path).
NOTE
If you specify a period in the Automatic Deletion of Dump Files area, the dumped files beyond the period
are automatically deleted.
----End
Result
The dumped alarms are saved as a file in the specified directory, but not displayed in the History
Alarms window. To view the dumped alarms, you can collect the dumped alarm data by using
the network management system maintenance tool and then open the collected data by using the
text editor.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Context
Some common fault diagnosis rules are pre-set in the T2000, such as R_LOS, TU_AIS, HP_TIM
and B1_EXC.
Procedure
Step 1 Choose Fault > Settings > Set Fault Diagnosis Rules from the Main Menu.
Step 2 Right-click the Fault Diagnosis Rules and choose Add Rules from the shortcut menu. The
Create Fault Diagnosis Rules dialog box is displayed.
Step 3 Select an alarm for which you want to add the diagnosis rule and click OK. A new rule entry is
added.
Step 4 Right-click the new rule and choose Add Steps from the shortcut menu. The Create Diagnosis
Steps dialog box is displayed.
Step 5 Set the Alarm Causes, Diagnosis Method and Processing Method. Click OK.
Step 6 Click Apply.
Step 7 Optional: You can right-click a step entry and choose Modify from the shortcut menu to modify
the original contents as required.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The fault diagnosis rules must be created.
Context
l If the selected alarm does not have a relevant fault diagnosis rule, a message appears
indicating that the wizard cannot be started.
l If the fault diagnosis wizard is ever used, the handling method of the previous time is
prompted, and then you can click Diagnose Again to locate the fault.
Procedure
Step 1 Choose Fault > Browse Current Alarm from the Main Menu.
Step 2 In the Filter dialog box, set filter criteria and click OK.
Step 3 Right-click an alarm in the alarm list and choose Fault Diagnosis from the shortcut menu. The
Fault Diagnosis dialog box is displayed.
Step 4 Select the probable cause of the fault according to the actual situation. If you cannot decide
which cause is the most possible, then select the first cause.
Step 5 Click Next. The wizard displays the corresponding diagnosis method.
Step 6 Follow the diagnosis method to locate the fault. If successful, click Next to remove the fault by
following the suggestions in the handling method.
Step 7 If fault location fails, click Back to re-select a cause until you locate the fault successfully or
until you have tried all the causes.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
It is not applicable to the OLA subrack with independent power system.t is not applicable to the
OLA subrack with independent power system.
Context
CAUTION
If a subrack is to be added or the two power supplies are to be accessed completely in a future
expansion, cancel the suppression setting and ensure that the power status is under control.
Procedure
Step 1 In the NE Explorer, select the PMU board and choose Alarm > Alarm Suppression in the
Function Tree.
Step 2 Refer to Table 7-7. Select the power output to be enabled with alarm suppression from the drop-
down list of Monitored Object.
Step 4 In the Alarm Suppression, set Status of the Event that is POWERALM to Suppressed.
Step 5 Click Apply. A prompt appears to indicate that the operation was successful. Click Close.
----End
Parameters
Table 7-7 lists the power output parameters of the PMU board.
8 Performance Management
To ensure the normal functioning of the network, the network management and maintenance
personnel should periodically check and monitor the network by taking proper performance
management measures.
The performance is different from an alarm. When a performance event is reported, the service
is not interrupted. The transmission quality, however, is degraded compared to the normal
situation and the degradation is temporarily compensated by the error correction mechanism of
the equipment. As the degradation factors increases, the performance threshold crossing and
even an alarm may occur.
You can use the performance management function to detect the degrade trend and to handle
the trouble before the failure actually occurs.
Enable performance N
End
monitoring
Enable automatic N
End
reporting
Description
l Performance Monitoring
Performance monitoring is realized on the board. By default, the board performance
monitoring is enabled. For example, if 15-minute performance monitoring is set. Every
time when a period starts, the board finds a free performance register and clears the data.
Then, the board starts to count the performance events. When the monitoring period ends,
the performance data is updated to the register.
NOTE
The reporting of performance data shares DCC bandwidth with the reporting of normal NE
management information and the reporting of large performance data affects the network
communication. As a result, you are not recommended to modify the configuration of performance
reporting. By default, the performance monitoring can be available in the entire network but the
function of automatically reporting the performance events should be configured only at the ports
that have potential failure risks.
l Performance Threshold Reporting
If the T2000 detects the performance threshold crossing, it reports the problem as an
abnormal event of performance threshold crossing. The abnormal event of performance
threshold crossing is different from other abnormal events. The T2000 has special handling
and supports special setting of the abnormal event of performance threshold crossing. When
this abnormal event occurs, a dialog box is displayed on the T2000 asking you to take notice
of the event.
You can set the performance monitoring parameters described as follows on the T2000.
NE Time Synchronization
NE Time Synchronization is used to keep consistency between the NE time and the system time
of the T2000 server , the time of the network time protocol (NTP) server or the time of the
standard network time protocol (NTP) server. After the setting, the T2000 supports automatically
synchronizing the NE time periodically.
Performance Threshold
When an NE detects that a certain performance value is beyond the specified threshold, the NE
reports the corresponding performance threshold crossing event. The performance threshold can
divided into two types.
l Single threshold: When the performance count value reaches or exceeds the single
threshold, a performance threshold crossing event is generated on the NE. When the
performance count value is smaller than the single threshold, an event is generated on the
NE indicating that the performance threshold crossing ends.
l Double Thresholds: When the performance count value is beyond the range between the
upper and lower thresholds, a performance threshold crossing event is generated on the NE.
If the performance count value is in the range between the upper and lower thresholds, an
event is generated on the NE indicating that the performance threshold crossing ends.
NOTE
If you want to set a large number of performance threshold values, you can use the template that the
T2000 provides to customize the performance threshold values.
NOTE
If many performance events are generated in the network, you are recommended to disable this function.
If this function is enabled when there are many performance events, many dialog boxes are displayed asking
you to confirm, which may affect the normal operation.
Statistics Group
Statistics group information indicates the statistic value of every monitoring port on the
equipment. It collects statistics on the accumulated or incremental information after the statistics
group is created.
You can use the function of RMON statistics and management to monitor the using status of the
port and collect statistics on the faults occurs when the port is used.
History Group
After the RMON history group is configured, the port periodically collects the network statistics
information. The statistics information is temporarily saved for easy handling. You can view the
history groups to read the statistics information.
Alarm Group
You can set the alarm group to monitor the specified alarm variables such as port statistics data.
When the value of the monitored data is beyond the defined threshold, an alarm occurs. You can
handle the alarm based on the alarm definition.
RMON Setting
The RMON settings mainly refer to the settings of the collection period of the monitored object,
the monitoring period of each event and the threshold detection. By setting the RMON, you can
collect the history performance data of the monitored objects on the T2000. You can set the
RMON in batches by using the templates.
Threshold, also called tolerance, is the extreme value that supports the normal running of the
transport network. The performance threshold is used to check whether the equipment is
normally running. If a certain performance index exceeds the threshold, you need to notice the
performance degrade and handle it.
Normally, you need to leave some margin when setting the performance threshold to ensure that
you determine the problem beforehand.
8.1.6.1 Current Performance and History Performance
Performance data consists of current performance data and history performance data. You can
use the function of viewing performance data to know the running status of services in a specific
time.
Current Performance
Current performance means the data that is saved in the current performance register of an NE.
The current performance can be classified as 15-minute current and 24-hour current based on
the monitoring period. When the current performance is viewed, the T2000 queries the
performance data from the current performance register on the NE side.
History Performance
History performance means the performance data that the NE detects in a specific period in the
past. When the history performance data is queried, the system queries the performance data
from the NE side or from the NM side depending on the location in which the data is saved.
The ended current performance data is dumped to the history performance register of the NE.
The process for synchronizing the history performance data in the NE history performance
register to the database on the NM side is described as follows.
l After the automatic reporting of performance events is enabled on an NE, the NE
automatically reports the performance event every time the monitoring period of the current
performance ends. After the T2000 receives the event, it automatically saves the event to
the history performance database.
NOTE
Once the T2000 receives the performance event, it immediately gathers new current history data.
l When you query the NE history performance data on the T2000, the T2000 updates the
contents that are not wrapped in the NE history performance register to the database.
Work Principle
The performance index of the physical component on an NE develops according to its own
development trend if there are no external factors. The performance analysis function considers
this natural trend and at least five periods of history performance data to predict the trend of the
performance index.
Applied Scenario
If the fibers or services in a subnet of the network often become faulty, you can perform
performance analysis and think of solutions beforehand, such as replacing a board or fiber.
To know whether services in an SDH trail are normal, view the current performance data.
8.2.9 Viewing History Performance Data of an SDH Trail
To know whether services in an SDH trail are normal, view the history performance data.
8.2.10 Querying Current Performance of WDM Trails
You can find out the running status of the service carried by the WDM trails by querying the
performance data.
8.2.11 Browsing the History Performance of WDM Trails
By querying the history performance data of a WDM trail, you can learn about the running status
of the services carried on the trail in a specific period in the past.
8.2.12 Browsing the Performance of an Ethernet Trail
By browsing the performance of the Ethernet trail, you can learn about the running status of the
services in the existing trail.
8.2.13 Querying the NE Temperature
An NE can work in a normal state only at a proper temperature. When the working temperature
of the NE is too high due to the faulty board or fan, the NE cannot work in the normal state.
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l The service must be configured.
l The performance monitoring parameters must be set.
l The NE time must be synchronized with the time of the computer where the T2000 is
installed.
Procedure
Step 1 In the NE Explorer, select an NE, and navigate to the user interface of viewing the performance
data of boards or service objects in the following ways from the Function Tree.
Equipment Type Application Object Navigation Path
SDH, WDM and Submarine Physical port Select a desired board and
equipment choose Performance >
Current Performance from
the Function Tree.
Step 2 Complete the following information: Monitored Object Filter Condition, Monitor Period.
Select the performance event type in the Gauge field and the Count field.
Step 3 Optional: In the Display Options area, check Display Current Value, Display Maximum
and Minimum Values, Display Zero Data and Display Continuous Severely Errored
Seconds check boxes.
Step 4 Click Query to query the data from the NE.
Step 5 Optional: Click Reset to reset the performance register of the queried performance event.
NOTE
After the performance register is reset, the current performance data of this type is cleared. Then, a new
performance monitoring period is started.
----End
8.2.1.1 Viewing History Performance Data
The history performance data has 15-minute and 24-hour intervals. You can view the history
performance data to learn the running status of services in a specified 15-minute or 24-hour
period in the past.
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l The service must be configured.
l The performance monitoring parameters must be set.
Procedure
Step 1 In the NE Explorer, select an NE, and navigate to the user interface of viewing the performance
data of boards or service objects in the following ways from the Function Tree.
SDH, WDM and Submarine Physical port Select the related board, and
equipment then choose Performance >
History Performance .
Step 2 Complete the information: Monitored Object Filter Condition, Monitor Period, From/To,
Data Source and Performance Event Type.
Step 3 Select the Display Current Value or Display Maximum and Minimum Values in the Display
Options.
Step 4 Click Query and the information is shown in the lower pane.
----End
the prompt for new UAT events, query UAT events from an NE, and query UAT events from
the T2000.
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l The service must be configured.
l The performance monitoring parameters must be set.
Procedure
Step 1 In the NE Explorer, select an NE, and navigate to the user interface of viewing the performance
data of boards or service objects in the following ways from the Function Tree.
SDH, WDM and Submarine Physical port Select the related board, and
equipment then choose Performance >
UAT Event .
Step 2 Complete the following information: Monitored Object Filter Condition, start time, Data
Source, Functional Block Type and Display Options. Check the Prompt on New UAT Event
Reported check box. The information displayed according to your selection.
----End
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l The service must be configured.
l The performance monitoring parameters must be set.
Procedure
Step 1 In the NE Explorer, select an NE, and navigate to the user interface of viewing the performance
data of boards or service objects in the following ways from the Function Tree.
SDH, WDM and Submarine Physical port Select the related board, and
equipment then choose Performance >
UAT Event .
Step 2 Complete the information: Monitored Object Filter Condition, Monitor Period, Prompt on
New Threshold-Crossing, Performance Event Type, Display Options and start/end time. The
information displayed according to your selection.
----End
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l The Ethernet service must be configured.
l The performance monitoring parameters must be set.
l Applies to the ET1 board of the OptiX 2500+ (Metro3000). The interface board must be
configured.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Performance > IP Performance Real-
time Monitor from the Function Tree.
Step 3 Select a value from the Monitor Interval(s) and Display Number of Data Column drop-down
lists.
----End
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l The Ethernet service must be configured.
l The performance monitoring parameters must be set.
l Applies to the ET1 board of the OptiX 2500+ (Metro3000). The interface board must be
configured.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Performance > IP History
Performance from the Function Tree.
Step 2 Complete the information: Monitored Object, Query Period, and Time Range.
----End
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l The ATM service must be configured.
l The performance monitoring parameters must be set.
Procedure
Step 1 In the NE Explorer, select an ATM board and choose Performance > ATM Performance Real-
Time Monitor > Port Performance Data from the Function Tree.
Step 3 Complete the following information: Monitor Period, Monitor Interval(s) and Display
Number of Data Column.
Step 4 Click Start.
----End
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l The ATM service must be configured.
l The performance monitoring parameters must be set.
Procedure
Step 1 In the NE Explorer, select an ATM board and choose Performance > ATM History
Performance > Port Performance Data from the Function Tree.
Step 2 Complete the following information: Monitored Object, Query Period and time range.
Step 3 Click Query, and the information is displayed in the Query Result pane.
----End
Prerequisite
l You must be an NM user with "network monitor" authority or higher.
l The trail must be created.
Procedure
Step 1 Choose Trail > SDH Trail Management from the Main Menu.
Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter
All.
NOTE
l Click Filter All to refresh and display all the qualified trails.
l Click Secondary Filter to filter the trails that are already displayed.
l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are
already displayed.
Step 3 Select one or more trails. Click the Performance and select Query Performance.
Step 4 Click the 15-Minute Current Performance or 24-Hour Current Performance tab and view
the current performance of the trail.
Step 5 Optional: Click Filter. In the Filter dialog box, set the filter criteria and click OK. The qualified
performance events are displayed.
----End
Prerequisite
l You must be an NM user with "network monitor" authority or higher.
l The trail must be created.
Procedure
Step 1 Choose Trail > SDH Trail Management from the Main Menu.
Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter
All.
NOTE
l Click Filter All to refresh and display all the qualified trails.
l Click Secondary Filter to filter the trails that are already displayed.
l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are
already displayed.
Step 3 Select one or more trails. Click the Performance button and select Query Performance.
Step 4 Click the 15-Minute History Performance or 24-Hour History Performance tab and view
the history performance of the trail.
----End
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Trail > WDM Trail Management from the Main Menu.
Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view
the desired trails in the trail list.
l If you need to filter all the trails, click Filter All.
l If you need to add to the list more trails that match the requirement, click Incremental
Filter.
l If you need to filter the trails in the list, click Secondary Filter.
Step 3 Select a trail, click Performance and select Query Performance from the drop-down list.
Step 4 Click the 15-Minute Current Performance or 24-Hour Current Performance tab and query
the latest 15-minute or 24-hour performance data of the trail. Perform the maintenance operation
according to the current performance events.
----End
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Trail > WDM Trail Management from the Main Menu.
Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view
the desired trails in the trail list.
l If you need to filter all the trails, click Filter All.
l If you need to add to the list more trails that match the requirement, click Incremental
Filter.
l If you need to filter the trails in the list, click Secondary Filter.
Step 3 Select a desired trail, click Performance and select Query Performance from the drop-down
list.
Step 4 Click the 15-Minute History Performance or 24-Hour History Performance tab and view
the history performance data.
----End
Prerequisite
You must be an NM user with "network operator" authority or higher.
Procedure
Step 1 On the Main Menu, choose Trail > Ethernet Circuit > Ethernet Trail Management to display
the Set Trail Browse Filter Conditions dialog box.
Step 2 Select the filter conditions in the dialog box, and then click Filter All.
NOTE
l Click Filter All to refresh all the trails that meet the specified conditions.
l Click Secondary Filter to filter the displayed trails based on the filter conditions.
l Click Incremental Filter not to refresh the displayed trails. Instead, the new result is added to the end of
the displayed trails.
Step 3 Select one or more trails. Click Performance. The Monitor Ethernet Performance Window
is displayed. Then, the Filter dialog box is displayed.
Step 4 Optional: At the Alarm Group tab, set the information of the alarm group, including Port/Path,
alarm name, sampling interval(s), report mode, upper threshold, lower threshold and monitoring
status.
Step 5 Optional: At the History Control Group tab, Set the history table type. Browse the Ethernet
performance information, including monitored object, sampling period(s), number of items and
monitor status.
Step 6 Optional: At the History Group tab, set the Ethernet performance information, including port,
history table type, query conditions, display mode, browse the information of History Group.
Step 7 Optional: At the Statistics Group tab, set the Ethernet performance information, including
port, query conditions, display mode, browse the information of Statistics Group.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The service must be configured.
l The performance monitoring parameters must be set.
l The NE time must be synchronized with the time of the computer where the T2000 is
installed.
Procedure
Step 1 In the NE Explorer, select an NE, and navigate to the user interface of viewing the performance
data of boards or service objects in the following ways from the Function Tree.
SDH, WDM and Submarine Physical port Select a desired board and
equipment choose Performance >
Current Performance from
the Function Tree.
Step 2 Complete the following information: Monitored Object Filter Condition, Monitor Period.
Select the Working Temperature in the performance event type of the Gauge field.
Step 3 Optional: In the Display Options group box, check the Display Current Value or Display
Maximum and Minimum Values check box.
Step 4 Click Query to query the data from the NE.
Step 5 Optional: Click Reset to reset the performance register of the queried performance event.
NOTE
After the performance register is reset, the current performance data of this type is cleared. Then, a new
performance monitoring period is started.
----End
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l The Ethernet service must be configured.
l The performance monitoring parameters must be set.
Procedure
Step 1 Select the NE in the NE Explorer. To display the performance browse interface for physical
ports or service objects, follow the listed entries in the Function Tree.
Equipment Type Application Object Entry
SDH, WDM and Submarine Physical port Select the board and choose
equipment Performance > RMON
Performance.
----End
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l The Ethernet service must be configured.
l The performance monitoring parameters must be set.
Procedure
Step 1 Select the NE in the NE Explorer. To display the performance browse interface for physical
ports or service objects, follow the listed entries in the Function Tree.
Equipment Type Application Object Entry
SDH, WDM and Submarine Physical port Select the board and choose
equipment Performance > RMON
Performance.
Step 4 Select the performance events. Set the Query Conditions and Display Mode.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l Applies to the N3SL64 and N4SL16 boards.
Context
When a third-party lower order service enters the local equipment through the VC4 path, you
can monitor the performance of this service. This helps you determine whether the performance
or alarms of this service are of the local equipment. By setting the TUG structure in the receiving
direction of the VC4 path, you can determine the class of the lower order service. If the class of
a third-party lower order service is already determined, you can enable the monitoring of lower
order alarms and set the specific alarms to be monitored, to monitor the performance of the
service.
VC4
Third-party
network
Configured Service
Unconfigured Service
Procedure
Step 1 In the NE Explorer, select a board and select Configuration > Set TUG Structure from the
Function Tree.
Step 2 Set Direction to Receive, and set TUG3-1 Structure Type, TUG3-2 Structure Type and
TUG3-3 Structure Type to Not Configured, VC12 or VC3 as required.
Step 3 Click Apply. Then, in the Operation Result dialog box, click Close.
Step 4 Select VC4 Path, right-click, and choose Lower Order Performance Management from the
shortcut menu. In the Lower Order Performance Management window, select Monitored
Object and set Monitor Status to Enabled.
Step 5 Click Apply. Then, in the Operation Result dialog box, click Close.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l Applies to the N3SL64 and N4SL16 boards.
Context
When a third-party lower order service enters the local equipment through the VC4 path, you
can monitor the performance of this service. This helps you determine whether the performance
or alarms of this service are of the local equipment. By setting the TUG structure in the receiving
direction of the VC4 path, you can determine the class of the lower order service. If the class of
a third-party lower order service is already determined, you can enable the monitoring of lower
order alarms and set the specific alarms to be monitored, to monitor the performance of the
service.
VC4
Third-party
network
Configured Service
Unconfigured Service
Procedure
Step 1 In the NE Explorer, select a board and select Configuration > Set TUG Structure from the
Function Tree.
Step 2 Set Direction to Receive, and set TUG3-1 Structure Type, TUG3-2 Structure Type and
TUG3-3 Structure Type to Not Configured, VC12 or VC3 as required.
Step 3 Click Apply. Then, in the Operation Result dialog box, click Close.
Step 4 Select VC4 Path, right-click, and choose Lower Order Performance Management from the
shortcut menu. In the Lower Order Performance Management window, click the
Performance Threshold-Crossing Setting tab.
Step 5 Double-click the parameter field, enter the threshold value.
Step 6 Click Apply. Then, in the Operation Result dialog box, click Close.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l Applies to the N3SL64 and N4SL16 boards.
Context
When a third-party lower order service enters the local equipment through the VC4 path, you
can monitor the performance of this service. This helps you determine whether the performance
or alarms of this service are of the local equipment. By setting the TUG structure in the receiving
direction of the VC4 path, you can determine the class of the lower order service. If the class of
a third-party lower order service is already determined, you can enable the monitoring of lower
order alarms and set the specific alarms to be monitored, to monitor the performance of the
service.
VC4
Third-party
network
Configured Service
Unconfigured Service
Procedure
Step 1 In the NE Explorer, select a board and select Configuration > Set TUG Structure from the
Function Tree.
Step 2 Set Direction to Receive, and set TUG3-1 Structure Type, TUG3-2 Structure Type and
TUG3-3 Structure Type to Not Configured, VC12 or VC3 as required.
Step 3 Click Apply. Then, in the Operation Result dialog box, click Close.
Step 4 Select VC4 Path, right-click, and choose Lower Order Performance Management from the
shortcut menu. In the Lower Order Performance Management window, click the
Performance Threshold-Crossing Setting tab.
Step 5 Set the Monitor Status and Threshold-Crossing Enable Status of a performance event.
Step 6 Click Apply. Then, in the Operation Result dialog box, click Close.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l Applies to the N3SL64 and N4SL16 boards.
Context
When a third-party lower order service enters the local equipment through the VC4 path, you
can monitor the performance of this service. This helps you determine whether the performance
or alarms of this service are of the local equipment. By setting the TUG structure in the receiving
direction of the VC4 path, you can determine the class of the lower order service. If the class of
a third-party lower order service is already determined, you can enable the monitoring of lower
order alarms and set the specific alarms to be monitored, to monitor the performance of the
service.
VC4
Third-party
network
Configured Service
Unconfigured Service
Procedure
Step 1 In the NE Explorer, select a board and select Configuration > Set TUG Structure from the
Function Tree.
Step 2 Set Direction to Receive, and set TUG3-1 Structure Type, TUG3-2 Structure Type and
TUG3-3 Structure Type to Not Configured, VC12 or VC3 as required.
Step 3 Click Apply. Then, in the Operation Result dialog box, click Close.
Step 4 Select VC4 Path, right-click, and choose Lower Order Performance Management from the
shortcut menu. In the Lower Order Performance Management window, click the Current
Performance tab.
Step 5 Select the Object, Monitor Period, and duration. Click Query to view the current lower order
performance data. In the Operation Result dialog box, click Close.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l Applies to the N3SL64 and N4SL16 boards.
Context
When a third-party lower order service enters the local equipment through the VC4 path, you
can monitor the performance of this service. This helps you determine whether the performance
or alarms of this service are of the local equipment. By setting the TUG structure in the receiving
direction of the VC4 path, you can determine the class of the lower order service. If the class of
a third-party lower order service is already determined, you can enable the monitoring of lower
order alarms and set the specific alarms to be monitored, to monitor the performance of the
service.
VC4
Third-party
network
Configured Service
Unconfigured Service
Procedure
Step 1 In the NE Explorer, select a board and select Configuration > Set TUG Structure from the
Function Tree.
Step 2 Set Direction to Receive, and set TUG3-1 Structure Type, TUG3-2 Structure Type and
TUG3-3 Structure Type to Not Configured, VC12 or VC3 as required.
Step 3 Click Apply. Then, in the Operation Result dialog box, click Close.
Step 4 Select VC4 Path, right-click, and choose Lower Order Performance Management from the
shortcut menu. In the Lower Order Performance Management window, click the History
Performance tab.
Step 5 Select the Object, Monitor Period, Data Source and duration. Click Query to view the history
lower order performance data. In the Operation Result dialog box, click Close.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
Context
When a third-party lower order service enters the local equipment through the VC4 path, you
can monitor the performance of this service. This helps you determine whether the performance
or alarms of this service are of the local equipment. By setting the TUG structure in the receiving
direction of the VC4 path, you can determine the class of the lower order service. If the class of
a third-party lower order service is already determined, you can enable the monitoring of lower
order alarms and set the specific alarms to be monitored, to monitor the performance of the
service.
VC4
Third-party
network
Configured Service
Unconfigured Service
Procedure
Step 1 In the NE Explorer, select a board and select Configuration > Set TUG Structure from the
Function Tree.
Step 2 Set Direction to Receive, and set TUG3-1 Structure Type, TUG3-2 Structure Type and
TUG3-3 Structure Type to Not Configured, VC12 or VC3 as required.
Step 3 Click Apply. Then, in the Operation Result dialog box, click Close.
Step 4 Select VC4 Path, right-click, and choose Lower Order Performance Management from the
shortcut menu. In the Lower Order Performance Management window, click the UAT tab.
Step 5 Select the Object, Options, Data Source and duration, and click Query to view the UAT
records.In the Operation Result dialog box, click Close.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l Applies to the N3SL64 and N4SL16 boards.
Context
When a third-party lower order service enters the local equipment through the VC4 path, you
can monitor the performance of this service. This helps you determine whether the performance
or alarms of this service are of the local equipment. By setting the TUG structure in the receiving
direction of the VC4 path, you can determine the class of the lower order service. If the class of
a third-party lower order service is already determined, you can enable the monitoring of lower
order alarms and set the specific alarms to be monitored, to monitor the performance of the
service.
VC4
Third-party
network
Configured Service
Unconfigured Service
Procedure
Step 1 In the NE Explorer, select a board and select Configuration > Set TUG Structure from the
Function Tree.
Step 2 Set Direction to Receive, and set TUG3-1 Structure Type, TUG3-2 Structure Type and
TUG3-3 Structure Type to Not Configured, VC12 or VC3 as required.
Step 3 Click Apply. Then, in the Operation Result dialog box, click Close.
Step 4 Select VC4 Path, right-click, and choose Lower Order Performance Management from the
shortcut menu. In the Lower Order Performance Management window, click the
Performance Threshold-Crossing Setting tab.
Step 5 Select the Object, Monitor Period, Options and duration. Click Query to view threshold
crossings. In the Operation Result dialog box, click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Choose Performance > Performance Threshold Template from the Main Menu.
Step 4 Save the template, you can choose one of the following methods:
l Click Save to save the modification.
l To save as a new template, click Save As and enter a template name.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select the NE. In the Function Tree, enter the performance browsing interface
of the board or service object in the following way.
Step 2 In the Monitor Object pane, select the desired board, port, and channel.
If you have already created a performance threshold template for the boards, click Use Template and select
the desired template. Click Open.
----End
You can set the monitoring status and the automatic reporting status of monitored objects. The
T2000 monitors the performance of all boards in the network, but the automatic reporting feature
is disabled by default. You can modify the value of the attribute according to the requirement.
8.7.5 Setting IP Performance Monitoring Parameters of a Board
By setting IP performance monitoring parameters properly and starting the IP performance
monitoring of a specified board, you can obtain the detailed IP performance record during the
running of the board.
8.7.6 Setting ATM Performance Monitoring Parameters of an ATM Board
By setting ATM performance monitoring parameters of an ATM board properly and starting the
performance monitoring for the ATM board, you can obtain the detailed performance record
during the running of the board. This facilitates the monitoring and analysis of the board running
status performed by maintenance personnel.
8.7.7 Setting Performance Monitoring Parameters of an SDH Trail
Performance monitoring keeps a detailed record of the performance of services over a trail,
helping the maintenance engineer to monitor and analyze the states of services.
8.7.8 Setting Performance Monitoring Parameters of an WDM Trail
Performance monitoring keeps a detailed record of the performance of services over a trail,
helping the maintenance engineer to monitor and analyze the states of services.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The NE time must be synchronized with the T2000 server time.
Procedure
Step 1 Choose Performance > NE Performance Monitoring Time from the Main Menu.
l The start time must be later than the current time of the network management system and the end time must
be later than the start time.
l If the end time is not set, this indicates that the performance monitoring starts from the start time and does
not stop.
Step 4 Click Apply and then click Close in the Operation Result dialog box.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The ET1 board has been configured. The interface board is already configured for the ET1 board
if required.
Procedure
Step 1 In the NE Explorer, select an NE and choose Performance > IP Performance Monitor
Period from the Function Tree to set the monitor period.
Step 4 In the NE Explorer, select an NE and choose Performance > IP Performance Monitor
Time from the Function Tree.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The ATM board must be installed.
NE time is synchronized with the T2000 server.
Procedure
Step 1 In the NE Explorer, select an NE and choose Performance > ATM Performance Monitor
Period from the Function Tree to set the monitor period.
Step 2 Click Apply. The Operation Result dialog box is displayed.
Step 3 Click Close.
Step 4 In the NE Explorer, select an NE and choose Performance > ATM Performance Monitor
Time from the Function Tree.
Step 5 Specify the Monitor Period and select the Enabled option button in the Set Monitor Time
box.
NOTE
Three options of monitor period are available. They are 15-minute, 24-hour, and custom period. To set the
custom period, refer to Steps 1 through 3.
Step 6 Set the Start Time and End Time fields and click Apply.
Step 7 The Operation Result dialog box is displayed indicating that the operation was successful.
Step 8 Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select a board and choose Performance > Performance Monitor Status
from the Function Tree.
Step 2 Select a condition from the Monitored Object Filter Condition drop-down list.
Step 3 Set the Monitor Status, 15-Minute Auto-Report and 24-Hour Auto-Report. Click Apply.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Applies to the ET1 board. The interface board is already configured for the ET1 board if
required.
Procedure
Step 1 In the NE Explorer, select a board and choose Performance > IP Performance Event Monitor
Status from the Function Tree.
Step 2 In the Monitored Object Filter Condition, set the monitor object.
Step 3 Set the Monitor Status, 30-Second Auto-Report, 30-Minute Auto-Report and Custom
Period Auto-Report fields.
Step 4 Click Apply. The Operation Result is displayed indicates that the operation was successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an ATM board and choose Performance > ATM Performance Event
Monitor Status from the Function Tree.
Step 2 Set the monitored object in the Monitored Object Filter Condition.
Step 3 Select a value in the 15-Minute Monitor, 24-Hour Monitor, Custom Period Monitor, 15-
Minute Auto-Report, 24-Hour Auto-Report and Custom Period Auto-Report fields.
----End
Prerequisite
You must be an NM user with "network operator" authority or higher.
Procedure
Step 1 Choose Trail > SDH Trail Management from the Main Menu.
Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter
All.
NOTE
l Click Filter All to refresh and display all the qualified trails.
l Click Secondary Filter to filter the trails that are already displayed.
l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are
already displayed.
Step 3 Select a trail. Click Performance and choose Performance Parameter from the drop-down
menu.
Step 4 In the Performance Parameter dialog box displayed, select an object, and set the monitoring
status and auto reporting status.
Step 5 Click Apply. In the Operation Result dialog box displayed, click Close.
----End
Prerequisite
You must be an NM user with "network operator" authority or higher.
Procedure
Step 1 Choose Trail > WDM Trail Management from the Main Menu.
Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter
All.
NOTE
l Click Filter All to refresh and display all the qualified trails.
l Click Secondary Filter to filter the trails that are already displayed.
l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are
already displayed.
Step 3 Select a trail. Click Performance and choose Performance Parameter from the drop-down
menu.
Step 4 In the Performance Parameter dialog box displayed, select an monitored object, and set the
monitor status and auto reporting status.
Step 5 Click Apply. In the Operation Result dialog box displayed, click Close.
----End
8.8.8 Setting the RMON Performance Monitoring Parameters for an Ethernet Port
By setting parameters of the RMON performance monitoring of Ethernet ports, you can set the
threshold and enable the reporting of the threshold-crossing events within a period.
8.8.9 Setting Automatic Reporting of RMON Performance Events
You can set automatic reporting of RMON performance events for a board.
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Context
The PTN equipment supports the RMON performance monitoring for the physical ports and
service objects. Hence, the PTN equipment also supports the customization of the RMON
performance attribute template for physical ports or service objects.
Procedure
Step 1 Select the NE in the NE Explorer. To display the performance browse interface for physical
ports or service objects, follow the listed entries in the Function Tree.
Physical port or sub-board Select the board and choose Performance >
RMON Performance.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Applies for PTN equipment.
Procedure
Step 1 Select the NE in the NE Explorer. To display the performance browse interface for physical
ports or service objects, follow the listed entries in the Function Tree.
Physical port or sub-board Select the board and choose Performance >
RMON Performance.
Step 3 Set the Threshold Detect state, Upper Threshold and Lower Threshold for related
performance events as required.
NOTE
l The threshold detect attribute cannot be set for all performance events. Whether the threshold detect
attribute can be set for all performance events depends on the equipment.
l According to the Threshold Detect status, a comparison is made between the performance event and
Upper Threshold or Lower Threshold to decide whether to report the performance event.
Step 4 Click Apply. A dialog box is displayed to show the operation result.
Step 5 Click Close.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Applies for PTN equipment.
Procedure
Step 1 Select the NE in the NE Explorer. Choose Performance > RMON History Control Group
from the Function Tree.
Step 2 Set parameters related to 30-Second, 30-Minute, Custom Period 1 and Custom Period 2.
NOTE
Step 3 Click Apply. A dialog box is displayed to show the operation result.
Step 4 Click Close.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Applies for PTN equipment.
Procedure
Step 1 Select the NE in the NE Explorer. To display the performance browse interface for physical
ports or service objects, follow the listed entries in the Function Tree.
Physical port or sub-board Select the board and choose Performance >
RMON Performance.
Step 3 Select the object from Object, set the monitor status, and enable or disable each collecting period.
NOTE
l Enable or disable the collecting period in the Object interface only after you enable the collecting
period in the RMON History Control Group interface.
l Select several objects, and right-click the monitor status or each collecting period to set the enable
status.
Step 4 Click Apply. A dialog box is displayed to show the operation result.
Step 5 Click Close.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Applies for PTN equipment.
Procedure
Step 1 Select the NE in the NE Explorer. To display the performance browse interface for physical
ports or service objects, follow the listed entries in the Function Tree.
Type (Example) Entry
Physical port or sub-board Select the board and choose Performance >
RMON Performance.
You can also select several performance events, and enable or disable the enable status for each monitor
period.
Step 4 Click Apply. A dialog box is displayed to show the operation result.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The Ethernet service must be configured.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Performance > RMON
Performance from the Function Tree.
Step 2 Click the Alarm Group tab.
Step 3 Set Upper Threshold, Lower Threshold, Report Mode and Monitor Status as required.
NOTE
If you set Monitor Status to Enabled, the NE monitors the performance indexes of the Ethernet port.
Step 4 Click Apply. A prompt is displayed indicating that the operation is successful.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The Ethernet service must be configured.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Performance > RMON
Performance from the Function Tree.
l If you set History Table Type to Custom Period, you can define the Sampling Period.
l If you set Monitor Status to Enabled, in History Group, you can query the corresponding port and
the performance of the history group in History Table Type.
Step 5 Click Apply. A prompt is displayed indicating that the operation is successful.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The service must be configured.
l The function of setting the RMON is applicable to the OptiX OSN 8800 I, and the OptiX
OSN 3800 and OptiX OSN 6800 of the V100R004C02 version or a later version
Procedure
Step 1 In the NE Explorer, select a board and choose Performance > RMON Performance from the
Function Tree.
Step 3 Select the port number of the board that you want to query.
Step 4 Click Query to query the current values of the performance events.
Step 5 Set values for the parameters as required. Click Apply. A prompt is displayed indicating that
the operation is successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select a board and choose Performance > Automatic RMON Performance
Data Reporting Settings from the Function Tree.
Step 2 Optional: Click Query to query the status of automatic reporting of performance events.
Step 3 Select a performance event, right-click and choose 15-Min Automatic Reporting Status from
the shortcut menu, to set the status of automatic reporting in the 15-minute interval.
Step 4 Select a performance event, right-click and choose 24-Hour Automatic Reporting Status from
the shortcut menu, to set the status of automatic reporting in the 24-hour interval.
Step 5 Click Apply. A prompt is displayed indicating that the operation is successful.
----End
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Procedure
Step 1 Choose System > Database > Dump Manually from the Main Menu.
Step 2 Choose the performance data that you want to dump from the list and set Deadline in Instant
Dump Conditions.
Step 3 Optional: Click Query to query Number of Records (Piece) and Record Size (kB) in Record
Suitable for Instant Dump Conditions.
Step 4 Click Dump and the Confirm dialog box is displayed. Click OK to dump the performance data.
Step 5 When the dumping is complete, the Operation Result dialog box is displayed indicating the
path of saving the performance data. Click Close.
----End
Result
The manually dumped performance data is saved as a file in the specified directory, but not
displayed in the History Performance Data window. To view the dumped performance data,
you can collect the dumped performance data by using the network management system
maintenance tool and then open the collected data by using the text editor.
NOTE
When the value of the performance data, including bit errors, is 0, services are normal and are not displayed
in the exported dumping data.
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Context
You can use Overflow Dump or Periodic Dump to automatically dump the data.
l If you select the overflow dump mode, the T2000 automatically dumps some data to the
specified path when the data exceeds the threshold.
l If you select the periodic dump mode, the T2000 periodically dumps the data to the specified
path.
l Overflow dump and periodic dump can work together. In this case, the T2000 dumps the
data or log according to the settings of overflow dump and periodic dump.
Procedure
Step 1 Choose System > Database > Dump Settings from the Main Menu.
Step 2 Choose the performance data from the list, and set parameters of the Dumping when
Overflow or the Dumping in Schedule.
Step 3 Set the path of saving the performance data in Dump To(Path).
Step 4 Click OK.
----End
Result
The automatically dumped performance data is saved as a file in the specified directory, but not
displayed in the History Performance Data window. To view the dumped performance data,
you can collect the dumped performance data by using the network management system
maintenance tool and then open the collected data by using the text editor.
NOTE
When the value of the performance data, including bit errors, is 0, services are normal and are not displayed
in the exported dumping data.
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Applies for PTN equipment.
Procedure
Step 1 Select the NE in the NE Explorer. To display the performance browse interface for physical
ports or service objects, follow the listed entries in the Function Tree.
Type (Example) Entry
Physical port or sub-board Select the board and choose Performance >
RMON Performance.
Step 3 Select the object from Object, set the monitor status, enable or disable each collecting period.
NOTE
l Enable or disable the collecting period in the Object interface only after you enable the collecting
period in the RMON History Control Group interface.
l Select several objects, right-click the monitor status or each collecting period to set the enable status.
Step 4 Click Apply. A dialog box is displayed to show the operation result.
Step 6 Select the performance event in Event and set the enable status for each monitor period.
TIP
You can also select several performance events and set the enable status for each monitor period.
Step 7 Click Apply. A dialog box is displayed to show the operation result.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The performance monitoring function of the NE must be enabled.
Context
l Since the performance data collection always involves large data volumes, it is
recommended that you perform the data collection once a week when the network traffic
is not heavy.
l The time difference between two tasks must be longer than the execution duration of the
previous task. (The time duration approximately equals 30 (s) x the number of boards
involved in the previous task.)
Procedure
Step 1 Choose System > Scheduled Task Management from the Main Menu.
Step 2 Click New and the Task Creation Wizard is displayed.
Step 3 Set the Please select task type to Performance Data Collection and enter the task name in the
Please enter task name field. Then, click Next.
Step 6 Set the Monitored Object Filter Condition, Monitor Period, and Performance Event
Type. Then, click Next.
NOTE
For the Performance Event Type, you can select items on the Gauge tab and/or Count tab.
Step 7 Optional: Check the Export File check box and select the type of the performance events that
you want to export from the Performance Event Type.
NOTE
l For the Performance Event Type, you can select items on the Gauge tab and/or Count tab.
l The Path displays the relative path in the /server/dump/PerfLog directory and cannot be modified.
l The file is exported in .txt format.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Choose Performance > History Performance Data Analysis from the Main Menu.
Step 2 In the Object Tree, select one module of a board and click .
Step 3 Complete the following information: Monitor Period, Display Mode and Time Range.
Step 4 Select Query from NE or Query from T2000.
Step 5 Click Query to query the data on the NE or that stored in the T2000.
----End
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l At least five days of performance data must be collected.
l The board must support the query of performance data.
Procedure
Step 1 Choose Performance > Medium-Term and Long-Term Performance Forecast from the
Main Menu.
Step 2 In the Object Tree, select one module of a board, and click .
Step 3 Complete the information: Category of Forecast Basis and Forecast Input Conditions.
Step 4 Click Forecast. The results are shown under Forecast Output Value and the corresponding
diagram is displayed.
----End
Context
Based on the type of the performance register, you can reset the following performance registers:
8.14.1 Resetting Board Performance Registers
After a network test is performed or a fault is rectified, you need to reset the performance register
to enter a new performance monitoring period. A performance register of the board stores
performance data including optical power and bit errors.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select a board and choose Performance > Reset Board Performance
Register from the Function Tree.
Step 2 Select the ports and registers that you want to reset and click Reset.
Step 3 Click Yes in the confirmation dialog box. A prompt appears indicating that the operation is
successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an ATM board and choose Performance > Reset ATM Performance
Register from the Function Tree.
Step 2 Select the ports and registers that you want to reset and click Reset.
Step 3 Click Yes in the confirmation dialog box. A prompt appears indicating that the operation is
successful.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The ET1 board must be configured.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Performance > Reset IP Performance
Register from the Function Tree.
Step 2 Select the ports and registers that you want to reset and click Reset.
Step 3 Click Yes in the confirmation dialog box. A prompt appears indicating that the operation is
successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Choose Configuration > Power Consumption Management from the Main Menu.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Applies to OptiX BWS 1600S.
The performance monitoring must be started
Procedure
Step 1 Choose Performance > Browse WDM Performancefrom the Main Menu. Click the Current
Performance Data tab.
Step 2 In the Object Tree, select one or more boards, and click the double-right-arrow button (red).
Step 3 Complete the following information: Monitored Object Filter Condition and Monitor
Period.
Step 4 Click the Count tab. In the Performance Event Type group box, check the Other Errors check
box.
Step 5 Optional: In the Display Options group box, check the Display Zero Data or Display
Consecutive Severely Errored Seconds check box.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Choose Performance > Browse WDM Performancefrom the Main Menu. Click the History
Performance Data tab.
Step 2 In the Object Tree, select one or more boards, and click the double-right-arrow button (red).
Step 3 Complete the following information: Monitored Object Filter Condition, Monitor Period,
From: To: and Data Source.
Step 4 Click the Count tab. In the Performance Event Type group box, check the Other Errors check
box.
Step 5 Optional: In the Display Options group box, check the Display Zero Data check box.
Step 6 Click Query. Click Close in the Operation Result dialog box.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Applies to OptiX BWS 1600S.
The performance monitoring must be started
Procedure
Step 1 In the NE Explore, select a board and choose Configuration > WDM Interface from the
Function Tree.
Step 2 Select the By Board/Port(Channel) option button. Select Channel from the drop-down list.
Step 3 Select the Basic Attributes tab.
Step 4 Click the Query.
Step 5 Double-click the Q Threshold and enter a proper value.
Step 6 Click Apply to confirm the settings.
----End
When you use multiple T2000s to manage NEs, and if a T2000 modifies an NE's configuration
data, the data in the other T2000s becomes inconsistent with the data in the NE. Incorrect
configuration data may lead to misjudgement or misoperation. For proper management of NEs,
the data in the NEs and the data in the T2000 should be consistent.
NE to operate according to the data in the T2000, you can download the data to the NE. After
the download, you need to perform a data consistency check.
Basic Concepts
In the data management of the transmission network, the following basic concepts, which should
be learned first, are involved.
l NE-side data. NE-side data is the NE data. It is saved in the DRDB database on the SCC
board of the NE.
l NM-side data. The NM-side data contains the data at the NE layer and the data at the
network layer. It is saved in the database of the NM.
– NE-layer data at the NM side. It is the data of each NE on the NM. The NE-layer data
at the NM side should be consistent with the NE-side data. To download the NE
configuration data is to issue the NE-layer data at the NM side to the NE. To upload the
NE configuration data is to upload the NE-side data to the NM to update the NE-layer
data at the NM side.
– Network-layer data at the T2000 side. It is the configuration data at the network layer
on the T2000. The network-layer data at the T2000 side contains the information about
fiber connections, protection subnets, and trails.
l The basic configuration data management functions include the uploading, downloading,
consistency check, synchronization, duplication, pre-configuration and the initialization of
the NE-layer data at the NM side.
– Uploading: In the case of uploading, the NE-side data is reported to the NM to overwrite
the NE-layer data at the NM side. The data that is present at the NM side but absent at
the NE side is not deleted.
– Downloading: In the case of downloading, the NE-layer data at the NM side is issued
to the NE to overwrite the data at the NE side.
– Consistency check: Check whether the NE-layer data at the NM side is consistent with
the NE-side data. If inconsistent, you need to synchronize or upload the NE
configuration data.
– Synchronization: Upload the inconsistent data (including the collision data, and the data
that is present at the NE side but absent at the NM side) to the NE layer at the NM side.
The data that is present both at the NM side and the NE side is not uploaded, and the
data that is present at the NM side but absent at the NE side is not deleted.
– Duplication: In the case of NEs that are of the same NE type and of the same NE software
version, if the configuration data of an NE to be configured is the same as that of an NE
already configured, you can configure the NE by duplicating the NE data. Duplicating
the NE data only changes the data at the T2000 side and does not affect the NE-side
data. To make the duplicated data take effect on the NE, you need to perform the
downloading operation.
– Pre-configuration: In the case of pre-configuration, the configuration data of an NE is
only saved on the NE layer at the NM side and does not affect the actual configuration
data of the NE. The pre-configuration function is generally used for the large-scale
service adjustment or expansion.
– Initialization of the NE-layer data at the NM side: The NE-layer data at the NM side is
cleared and the NE becomes unconfigured after the initialization.
l To back up and restore the NE data, refer to 11 Backing Up and Restoring the NE
Data.
l To back up and restore the T2000 data, refer to 10 Backing Up and Restoring T2000
Data.
NOTE
The RTN, PTN and NG WDM product series do not support preconfiguration and the downloading of
configuration data. Then, the T2000 provides a more reliable function, that is, the database package backup
and restoration function, to solve the data restoration problem. This is because:
l In the case of configuration data, the NE data is not complete. The complete data, however, can be
obtained by using the database package restoration function.
l During the downloading of configuration data, the T2000 needs to convert the configuration data to
the Qx interface information. Then, the data can be exchanged between the T2000 and the NE. Thus,
the efficiency is relatively low. In the database package restoration mode, databases are directly
downloaded to the NE, which ensures a high efficiency.
l On the T2000, only one set of configuration data can be saved, but the database package can have
many backup copies. You can select the backup package as needed.
Back up NE
data
NE Data Configuration
In the case of the initial configuration for a new equipment, neither the T2000 nor the NE has
the configuration data. Thus, engineers need to manually configure the data.
1. Use the T2000 to perform the NE configuration on site.
2. Back up the NE database to the SCC board.
3. In the NM center, create the NE and upload the NE configuration data.
4. Check whether the data on the T2000 is consistent with that on the NE.
If the pre-configuration is already performed on the T2000, download the configuration data to
the NE.
1. Use the pre-configuration function to complete the NE configuration.
2. Cancel the pre-configuration attribute of the NE and download the NE configuration data.
3. Check whether the data on the T2000 is consistent with that on the NE.
4. Back up the NE database to the SCC board.
CAUTION
Before downloading the data, verify the data in the lab environment to ensure that the data can
be normally downloaded.
Search trails
1. Upload the NE configuration data to form the NE-layer data at the NM side.
2. Create fibers and cables.
3. Based on the NE-layer data at the NM side and the fiber connection information, search
the protection subnets to form the protection subnet information in the network-layer data
at the NM side.
4. Based on the NE-layer data at the NM side, the fiber connection information and the
protection subnet information, search the paths to form the path information in the network-
layer data at the NM side.
Before the T2000 software upgrade, you must make sure that the data on the T2000 is consistent
with the that on the NE. The T2000 software upgrade is performed as follows:
1. Export the network-wide configuration files for the data restoration after the software
upgrade.
2. Upgrade the T2000 software.
3. Based on the configuration upgrade wizard, upload the NE configuration data. Import the
network-wide configuration files and search the protection subnets and trails again.
Routine Maintenance
In daily maintenance, back up the T2000 data periodically and clear unnecessary databases to
arrange the database space in time.
1. After the important configuration data changes, backup the T2000 database immediately.
2. Back up the T2000 database periodically in a monthly (recommended) manner.
3. To vacate the database space, perform the log dump periodically.
Troubleshooting
When the T2000 becomes abnormal due to the T2000 fault, computer hardware fault, or other
causes, restore the T2000 data in time.
Prerequisite
You must be an NM user with "NE and network operator" authority or higher.
Context
l Configuration data consistency check between the T2000 and NEs does not change the
configuration data in the NEs and in the T2000.
l To ensure that the T2000 properly manages the NEs, it is recommended that you run this
function on a monthly basis to keep the consistency of configuration data in NEs and the
T2000 server.
Procedure
Step 1 Select Configuration > Configuration Data Management from the Main Menu.
Step 2 Select one or more NEs in the left pane and click the double-right-arrow button (red).
Step 3 Select one or more NEs from the Configuration Data Management List.
Step 4 Click Consistency Check. Alternatively, right-click the NE and select Consistency Check
from the shortcut menu.
----End
Reference Standard
The result indicates a consistency in the configuration data between the NE and the T2000.
Troubleshooting
If the result indicates an inconsistency in the configuration data between the NE and the
T2000, you need to upload or download the data to achieve consistency.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The NE is in the unsynchronized state.
Context
l If the configuration data is not synchronous between the T2000 and the NE, the NE icon
has a sign.
l If another T2000 client modifies the NE data when the current T2000 client is uploading
or synchronizing data, asynchronous information will be displayed in the NE Config Sync
Info dialog box of the current T2000 client. In this case, the current T2000 client can
perform an upload or synchronization again to eliminate the asynchronous information.
Procedure
Step 1 Choose Configuration > Configuration Data Management from the Main Menu.
The Configuration Data Management window is displayed.
Step 2 In the Object Tree, select one or more NEs, and click . The NEs you select are shown
in the Configuration Data Management List.
Step 3 Select an NE that is in the Unsynchronized state, and then click Sync Info.
Step 4 In the NE Config Sync Info dialog box, click Query to view the details of the configuration
items.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Context
If the data in the T2000 is inconsistent with the data in the NE, the NE icon has the sign.
Procedure
l Method 1
1. Choose Configuration > Configuration Data Management from the Main Menu.
2. In the Object Tree, select an NE and click the double-right-arrow button (red).
3. In the configuration data management list, select one or more NEs that are in the
Unsynchronized state.
4. Click Synchronize or right-click and choose Synchronize from the shortcut menu.
5. Click OK. The T2000 begins to synchronize the data.
6. Click Close in the Operation Result dialog box.
l Method 2
1. On the Main Topology, select the NE that is marked with .
2. Right-click and choose Synchronize NE Data.
3. In the Confirm dialog box, click OK.
4. In the Synchronize dialog box, the T2000 begins to synchronize the data.
5. Click Close in the Operation Result dialog box.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Select Configuration > Configuration Data Management from the Main Menu.
Step 2 Select one or more NEs from the Object Tree and click the double-right-arrow button (red).
Step 3 Select one or more NEs from the Configuration Data Management List.
Step 4 Click Upload. Alternatively, right-click and select Upload from the shortcut menu.
----End
NE to operate according to the data in the T2000, you can download the data to the NE. After
the download, you need to perform a data consistency check.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Context
CAUTION
Downloading NE configuration data can interrupt the services.
l NG WDM and RTN series equipment does not support the downloading of configuration
data.
l When you download the NE configuration data from the T2000 to the NE, the T2000 first
initializes the NE, and then downloads the configuration data to the NE. If you cancel the
download before it is complete, the configuration data may be incomplete.
l The function of downloading configuration data is only used in the implement phase of a
project or for the recovery of NE service and core configuration data in case of emergency.
This function dose not support downloading of all configuration data of NEs. If you want
to restore all data of the NEs, you must use the Recover function in the Data Center.
Procedure
Step 1 Choose Configuration > Configuration Data Management from the Main Menu.
Step 2 In the Object Tree, select one or more NEs and click the double-right-arrow button (red).
Step 3 Select one or more NEs from the Configuration Data Management List.
Step 4 Click Download. Alternatively, right-click and choose Download from the shortcut menu.
Step 5 Click OK in the two Confirm dialog boxes.
Step 6 Click Close in the Operation Result dialog box.
----End
To ensure network data security, the T2000 provides the option of network data backup and
restoration functions.
When the T2000 database fails, you can restore the T2000 data from a remote server where the
T2000 data was backed up.
10.10 Viewing the Status of Databases
Using the System Monitor client, you can monitor the status of databases on the T2000 server.
10.11 Dumping the T2000 Log Data
To ensure that the system runs stably and efficiently, you need to dump the alarm and
performance data to another place when the data in the database reaches a certain amount. The
data can be manually and automatically dumped.
10.12 Clearing the T2000 Log Data
During the routine maintenance of the T2000, you can clear the unwanted log data to save spaces
for the computer.
10.13 Configuration Upgrade Wizard
By using the upgrade wizard, you can restore the T2000 data from the existing configuration
data scripts.
Dump
Dump is a method used to store the log information in databases as operating system files in text
format, to clear database space. The dumped objects are various types of logs, including alarm
events, abnormal events, operation logs and different types of performance events.
The T2000 provides three methods of dumping logs. The three methods are overflow dump,
scheduled dump and immediate dump.
l The overflow dump is performed when the logs in the databases reach the maximum storage
capacity. You can specify the number of logs to dump.
l The scheduled dump, which is the alternative method of overflow dump, is optional. You
can set whether to create a scheduled task, and if you create a scheduled task you can specify
the schedule time and duration.
l The immediate dump is also referred to as manual dump. This method is used to dump data
that was created on a specific date.
The three methods of dumping logs automatically delete the corresponding data in databases.
You can open a text file to view the log contents.
Backup
Back up is a method used to store important data to prevent the damage of the original data. You
can back up network configuration data, alarm data and performance data.
The T2000 provides the following schemes to backup the database:
l Backup of the MO data
l Backup of the T2000 databases
l Backup of the data by using scripts
For details on the differences between the three schemes, refer to the 10.3 Methods of Backing
Up and Restoring the T2000 Data.
In the case of the data being damaged, you can restore the data. To restore the damaged data,
you can restore the databases from the back up files and overwrite the existing database files.
The backup and restoration features are used for the purpose of network data security.
NE Port Naming File NEPort_extension This file contains the This file can be
ID-basic ID_NE naming information imported and
name.txt about every port on exported.
the NE.
In addition, the T2000 provides the script files in the .xml format for the network planning and
design, containing the networkwide configuration file, NE configuration file, network layer
information file, and ASON information file. The ASON information file can be imported and
exported, but other types of script files in the .xml format can be exported only.
Main Usage
The main usage of the script files is as follows:
l Realizing the upgrade of the configuration data with zero loss during the T2000 upgrade.
This is an important method for the T2000 upgrade. This is the main usage of the script
files.
l After the network data is modified, restoring the customized information of the T2000,
such as the trail name, fiber name, port name, and the customer information.
l By modifying the script files, realizing the division and combination of the T2000 data.
l By modifying the script files, realizing the import of the desired data only, such as the NE
list (with no configuration data), fiber connection, protection subnet, or trail.
l Supporting the simplified implementation of the project design.
Compatibility
l The scripts exported from the T2000 of a earlier version can be imported to the T2000 of
a later version. But an error may occur if the scripts exported from the T2000 of a later
version is imported to the T2000 of a earlier version. The T2000 of a earlier version does
not support the features and functions that are added and the parameters that are modified
in the T2000 of a later version. After the scripts are imported, an error message is displayed.
But this does not affect the import of other information.
l The scripts generated on Windows, on SUSE Linux and on Solaris are compatible.
Application
During the network adjustment, such as adding or deleting a node in the network, if the fiber
connection is deleted, the protection subnet and trail carried on the fiber are deleted from the
network layer of the T2000. After the network adjustment, if the source and sink ports of the
trail are not changed, you can find the trail again by performing the trail search. But the original
customized information of the trail, such as the trail name, customized information of the trail,
and remarks, cannot be restored through the search.
To restore the customized information of the trail, you need:
1. Before the network adjustment, export the network layer information file.
2. After the network adjustment, import the network layer information file.
NOTE
l When the source and sink ports of the trail are not changed after the network adjustment, you can use
the scripts to restore the customized information. Otherwise, you need restore the customized
information manually.
l When the network layer information file is imported after the network adjustment, errors may be
displayed for part of the data, because certain objects, such as NEs, boards, and optical ports, are
changed. This does not affect the restoration of the customized information.
NOTE
The following data is not backed up when you back up the T2000 database:
l The data that is not saved at the NE side, that is, the data that cannot be uploaded. For details, refer to
the appendix "Configuration Data Management Information List" of the online help.
l The custom options of the system.
NOTE
The data that cannot be backed up by way of MO backup is the same as that cannot be backed up by way
of T2000 database backup. The data contains:
l The data that is not saved at the NE side, that is, the data that cannot be uploaded. For details, refer to
the appendix "Configuration Data Management Information List" of the online help.
l The custom options of the system.
NOTE
l The data are exported from the T2000 database, containing the configuration data at the network and
NE layers on the T2000.
l The imported script files update the data on the T2000 only, with no impact on the data on the NEs.
Backup contents Backs up the Backs up only the Backs up only the
structure and data in all database configuration data on
contents of the tables, but not the the T2000.
T2000 database. structure of the
Backs up all data. database.
Version The data that is The data that is The data that is
compatibility backed up can be backed up can be backed up can be
restored on the restored on the restored on the
T2000 of the same T2000 of the same T2000 of different
version only. version only. versions.
Platform The data that is The data that is The data that is
compatibility backed up cannot be backed up cannot be backed up can be
restored on the restored on the restored on the
T2000 that is T2000 that is T2000 that is
installed on a installed on a installed on a
different platform. different platform. different platform.
Backup file size Large (The backup Medium(The backup Small (The backup
file is 100 MB-150 file is 50 MB-100 file is 50 MB-80 MB
MB after it is MB after it is and the backup file
automatically automatically cannot be
compressed by the compressed by the automatically
DM tool in the case DM tool in the case compressed.)
of 6000 equivalent of 6000 equivalent
NEs.) NEs.)
Table 10-3 Characteristics and application scenarios of three data maintenance methods
Method Characteristics Application Scenario
Backing up and restoring the Backs up all data in the The backup MO files
T2000 MO data T2000 database as an MO correspond to the specific
file. The data is in the txt versions and are not
format and the user who interchangeable.
knows the data structure of
the T2000 can understand the
contents of the MO file.
Backs up all data.
The processing speed is fast,
and the backup file is big.
Backing up and restoring all Backs up the structure and This requires a large storage
data in the T2000 databases contents of the T2000 medium space. If you want to
database. The data is in the back up the T2000 database
binary mode. in a scheduled manner, tapes
Backs up all data. are recommended.
The processing speed is fast,
and the backup file is big.
Backing up and restoring the Exports the configuration This method is usually used
T2000 network data in the T2000 to a txt file to upgrade the T2000 and to
configuration data by using that is similar to the MML back up and restore the basic
the script files format. This is done to save configuration data for a
data. You can directly single NE. This method also
understand the configuration restores the user-defined
contents of the txt file. data. The new T2000 version
Backs up only some of the is compatible with the scripts
data, including the basic of the old version.
configuration data, port
naming data and user-defined
data.
The processing speed is slow
and the backup file is very
small.
Suggestion
When you back up the T2000 database, do as follows:
l Before backing up the data, upload the NE data, and perform the search of the protection
subnets and trails.
l When you install the T2000 for the first time, back up the T2000 databases. Back up the
T2000 databases once, if you do not expand the databases. If the hard disk is large (if the
available space exceeds 10 GB), you can back up the T2000 databases on a quarterly basis.
l During the daily maintenance of the T2000, it is recommended that you back up the T2000
databases. Whenever there is a change in the service configuration data, ensure that you
immediately back up the T2000 databases. You can also set up a scheduled task to back up
the T2000 databases on a monthly basis.
l To avoid a situation in which data occupies too much disk space, clean the data that is
previously backed up, on a regular basis.
l You must shut down the T2000 server firstly and then restore the T2000 MO data or restore
T2000 databases.
l You need to back up the deployment information of the network management system by
using the network management system maintenance suite immediately after you back up
the database, MO data or modify the deployment.
You can set a scheduled backup task for the database so that the T2000 automatically backs up
the T2000 database at a scheduled time. This facilitates the operation and the maintenance.
10.4.3 Immediately Backing Up All Data in the T2000 Database
To quickly restore the database in the event of a failure, back up the T2000 database by using
the database management tool.
10.4.4 Periodically Backing Up All Data in the T2000 Database
Using the Database Management Tool, you can back up the T2000 database in a scheduled
manner, so that the T2000 database can be safely and quickly restored in the case of a database
failure.
10.4.5 Immediately Backing Up the T2000 Data by Script
Before upgrading the T2000, you must export the data from the database to script files and save
these files.
10.4.6 Periodically Backing Up the T2000 Data by Script
During the routine maintenance, you can use the scheduled task function to periodically export
the network configuration data to script files. In this way, the data can be migrated smoothly
when you upgrade the T2000 software. This way of backup reduces the maintenance cost as no
human intervention is required.
Prerequisite
l On Windows, the current user must have the administrator authority of the operating
system. The database server must also be started.
l Make sure the current user is root and the Sybase database must be started.
l You must be an NM user with "NM maintainer" authority or higher.
l The network management system maintenance suite server must be started.
Context
CAUTION
l In the case of a distributed system, back up T2000 M0 data only on the Master server.
l This operation backs up both the MO data and T2000 deployment information.
To back up the MO data periodically by using the command line, run the following commands
as user root:
# cd /T2000/server/database
# ./backupmo.sh
Procedure
l Follow the steps below to back up the MO data using the T2000 client.
1. Choose System > Database > Database Backup from the Main Menu.
2. Select the data source MO, set a backup directory for the server, and click Backup.
The T2000 starts to back up the database. A progress bar is displayed showing the
status of the operation.
NOTE
By self-defining a backup directory, you can avoid the impacts on the backup data that may be
caused when you reinstall the system or format disk C. In this way, the maintainability of the
system is improved.
Make sure that no space, punctuation or non-English character exists in the path.
l Use the T2000database management tool to back up the T2000 MO data.
NOTE
To back up the MO data by using the command line, run the following commands on the active
server:
# cd /T2000/server/database
# ./backupmo.sh
By self-defining a backup directory, you can avoid the impacts on the backup data that may be
caused when you reinstall the system or format disk C. In this way, the maintainability of the
system is improved.
Make sure that no space, punctuation or non-English character exists in the path.
The database file is backed up in the default directory.
l On Solaris, the default directory is /T2000/server/database/dbbackup.
----End
Prerequisite
l On Windows, the current user must have the administrator authority of the operating
system. The database server must also be started.
l Make sure the current user is root and the Sybase database must be started.
l You must be an NM user with "NM maintainer" authority or higher.
l The network management system maintenance suite server must be started.
Context
CAUTION
l In the case of a distributed system, back up T2000 M0 data only on the Master server.
l This operation backs up both the MO data and T2000 deployment information.
l To back up the MO data periodically by using the command line, run the following
commands as user root:
# cd /T2000/server/database
# ./configTask.sh
Procedure
Step 1 Choose System > Schedule Task Management from the Main Menu.
Step 3 Select Database Backup in the Select task type field and enter the task name. Click Next.
Step 4 Select the data source MO, set a backup directory for the server, and click Next.
NOTE
By self-defining a backup directory, you can avoid the impacts on the backup data that may be caused
when you reinstall the system or format disk C. In this way, the maintainability of the system is improved.
Make sure that no space, punctuation or non-English character exists in the path.
Step 7 Click Finish. The system backs up the T2000 database according to the time settings.
Step 8 If the T2000 server uses the Windows XP SP2 operating system, you also need to configure the
scheduled task that was created. For details, refer to 10.5.5 Configuring a Scheduled Task.
----End
Prerequisite
l On Windows, the current user must have the administrator authority of the operating
system. The database server must also be started.
l Make sure the current user is root and the Sybase database must be started.
l You must be an NM user with "NM maintainer" authority or higher.
l The network management system maintenance suite server must be started.
Context
CAUTION
l In the case of a distributed system, back up T2000 database only on the Master server.
l This operation backs up both the database and T2000 deployment information.
On UNIX, to back up the T2000 database by using the command line, run the following
commands on the active server:
# cd /T2000/server/database
# ./backupdatabase.sh
Procedure
Step 1 Start the Database Management Tool.
NOTE
On SolarisSUSE Linux, open a terminal window and run the following commands to tart the Database
Management Tool.
# cd /T2000/server/database
# ./T2000DM.sh
On Windows, open the Resource Browser. In the \T2000\server\database directory, run T2000DM.exe.
----End
Prerequisite
l On UNIX, the current user is root and the Sybase database must be started.
l On Windows, the current user must have the administrator authority of the operating
system. The MS SQL database server must also be started.
Context
NOTE
l In the case of a distributed system, back up T2000 M0 data only on the Master server.
l This operation backs up both the MO data and T2000 deployment information.
To back up the T2000 database periodically by using the command line, run the following
commands:
% su
Password: Password_of_user_root
# cd /T2000/server/database
# ./configTask.sh
Follow the prompts.
Procedure
Step 1 Start the Database Management Tool.
NOTE
On SolarisSUSE Linux, open a terminal window and run the following commands to tart the Database
Management Tool.
# cd /T2000/server/database
# ./T2000DM.sh
On Windows, open the Resource Browser. In the \T2000\server\database directory, run T2000DM.exe.
Step 6 Select Database in the Backup Type pane, and then set other relevant attributes for the task.
NOTE
The interval of different scheduled tasks must be set above 20 minute.
Step 7 Click Configure, and a dialog box is displayed prompting you to enter the administrator
password.
Step 8 Enter the administrator password and click OK. A prompt appears telling you that the scheduled
task was successfully created. Click OK.
Step 9 If the T2000 server uses the Windows XP SP2 operating system, you also need to configure the
scheduled task that was created. For details, refer to 10.5.5 Configuring a Scheduled Task.
----End
Prerequisite
l You must be an NM user with "NM maintainer" authority or higher.
l Before you export the script files, you must check the consistency of the configuration data
to ensure that the configuration data in the T2000 is consistent with that in the NE.
Procedure
Step 1 Choose System > Import/Export Script File from the Main Menu.
Step 2 Select a file format. Then select a script file type from the Script File Type field.
NOTE
l To export the networkwide script file, select Networkwide Configuration File. Export the following
files to a specified directory: NWCfg_NM Name.txt, NWNeList_NM Name.txt, NEPort_Port ID-Basic
ID_NE Name.txt, and NEData_Extended ID-Basic ID_NE Name.txt.
l The following script types are available for the export: Networkwide Configuration File, NE Port
Naming File, NE Configuration File, NE List File, NM Computer Information File, Service
Actualization Script, Network Layer Information File, Network Modeling and Design
Information File, and CEAS. For details, see 10.2 Script Files.
Step 3 Select the NE for which you want to export script files from the Export NE List.
NOTE
Specify the NE only when you export the NE Configuration File, NE List File, NE Port Naming File,
Networkwide Configuration File and CEAS.
Step 4 Click Create File Directory to create a directory where the exported script files are to be saved.
The script file is saved on the T2000 server. On Windows, the backup directory is \T2000\server\script.
On UNIX, the backup directory is /T2000/server/script. You can create a new directory under it.
----End
Prerequisite
You must be an NM user with "NM maintainer" authority or higher.
Context
NOTE
l For scheduled tasks of different types, the running time cannot be the same, and the involved NEs cannot
be the same. Otherwise, the tasks may fail as a result of the resource conflict.
l The start time difference between each two scheduled tasks must be greater than the maximum running time
of the tasks.
Procedure
Step 1 Choose System > Schedule Task Management from the Main Menu.
Step 2 Click New, and the Task Creation Wizard dialog box is displayed.
NOTE
If you have not define a scheduled task, a prompt is displayed.
Step 3 Select Export Script File as the task type, and enter the name of this scheduled task. Click
Next.
Step 4 Select a script type and an NE list for the export. Click Next.
Step 5 Select a running period for the scheduled task. Click Next.
NOTE
It is recommended that you set the running period to Weekly.
Step 6 Specify the start data and time, and then select the daily running time.
Step 7 Click Finish. The created scheduled task is displayed in the Scheduled Task Management
window.
----End
Prerequisite
l On SolarisSUSE Linux, the current user is root and the Sybase database must be started.
l On Windows, the current user must have the administrator authority of the operating
system. The MS SQL database server must also be started.
l The FTP server program must be running on the remote server, and the relevant port must
be enabled.
l The current user must have the write authority in a remote FTP server.
Context
CAUTION
l In the case of a distributed system, back up T2000 M0 data only on the Master server.
l This operation backs up both the MO data and T2000 deployment information.
Procedure
Step 1 Start the Database Management Tool.
NOTE
On SolarisSUSE Linux, open a terminal window and run the following commands to tart the Database
Management Tool.
# cd /T2000/server/database
# ./T2000DM.sh
On Windows, open the Resource Browser. In the \T2000\server\database directory, run T2000DM.exe.
Step 5 Enter the IP Address of Data Backup Server, Port, User Name and Password. Click
Login.
Step 6 Under the Select path area, click to specify the backup path on the remote server.
NOTE
Make sure that no space, punctuation or non-English character exists in the path.
Step 7 Under the Select type area, check the Back Up MO check box, and set other attributes for the
task.
----End
Prerequisite
l On Solaris, the current user is root and the Sybase database must be started.
l On SUSE Linux, the current user is root and the Sybase database must be started.
l On Windows, the current user must have the administrator authority of the operating
system. The MS SQL database server must also be started.
l The FTP server program must be running on the remote server, and the relevant port must
be enabled.
l The current user must have the write authority in a remote FTP server.
Context
NOTE
l In the case of a distributed system, back up T2000 M0 data only on the Master server.
l This operation backs up both the MO data and T2000 deployment information.
l On Solaris, to back up the T2000 MO data periodically by using the command line, run the
following commands as user t2000:
% su
Password: Password_of_user_root
# cd /T2000/server/database
# ./configTask.sh
Procedure
Step 1 Start the Database Management Tool.
NOTE
On SolarisSUSE Linux, open a terminal window and run the following commands to tart the Database
Management Tool.
# cd /T2000/server/database
# ./T2000DM.sh
On Windows, open the Resource Browser. In the \T2000\server\database directory, run T2000DM.exe.
Step 5 Enter the IP Address of Data Backup Server, Port, User Name and Password. Click
Login.
Step 6 Select MO in the Backup Type pane, and then set other relevant attributes for the task.
NOTE
The interval of different scheduled tasks must be set above 20 minute.
Step 7 Click Configure, and a dialog box is displayed prompting you to enter the administrator
password.
Step 8 Enter the administrator password and click OK. A prompt appears telling you that the scheduled
task was successfully created. Click OK.
Step 9 If the T2000 server uses the Windows XP SP2 operating system, you also need to configure the
scheduled task that was created. For details, refer to 10.5.5 Configuring a Scheduled Task.
----End
Prerequisite
l On SolarisSUSE Linux, the current user is root and the Sybase database must be started.
l On Windows, the current user must have the administrator authority of the operating
system. The MS SQL database server must also be started.
l The FTP server program must be running on the remote server, and the relevant port must
be enabled.
l The current user must have the write authority in a remote FTP server.
Context
CAUTION
l In the case of a distributed system, back up T2000 database only on the Master server.
l This operation backs up both the database and T2000 deployment information.
Procedure
Step 1 Start the Database Management Tool.
NOTE
On SolarisSUSE Linux, open a terminal window and run the following commands to tart the Database
Management Tool.
# cd /T2000/server/database
# ./T2000DM.sh
On Windows, open the Resource Browser. In the \T2000\server\database directory, run T2000DM.exe.
Step 5 Enter the IP Address of Data Backup Server, Port, User Name and Password. Click
Login.
Step 6 Under the Select path area, click to specify the backup path on the remote server.
NOTE
Make sure that no space, punctuation or non-English character exists in the path.
Step 7 Under the Select type area, check the Backup the database check box, and set other attributes
for the task.
----End
Prerequisite
l On Solaris, the current user is root and the Sybase database must be started.
l On SUSE Linux, the current user is root and the Sybase database must be started.
l On Windows, the current user must have the administrator authority of the operating
system. The MS SQL database server must also be started.
l The FTP server program must be running on the remote server, and the relevant port must
be enabled.
l The current user must have the write authority in a remote FTP server.
Context
NOTE
l In the case of a distributed system, back up T2000 M0 data only on the Master server.
l This operation backs up both the MO data and T2000 deployment information.
To back up the T2000 database periodically by using the command line, run the following
commands:
% su
Password: Password_of_user_root
# cd /T2000/server/database
# ./configTask.sh
Follow the prompts.
Procedure
Step 1 Start the Database Management Tool.
NOTE
On SolarisSUSE Linux, open a terminal window and run the following commands to tart the Database
Management Tool.
# cd /T2000/server/database
# ./T2000DM.sh
On Windows, open the Resource Browser. In the \T2000\server\database directory, run T2000DM.exe.
Step 5 Enter the IP Address of Data Backup Server, Port, User Name and Password. Click
Login.
Step 6 Select Database in the Backup Type pane, and then set other relevant attributes for the task.
NOTE
The interval of different scheduled tasks must be set above 20 minute.
Step 7 Click Configure, and a dialog box is displayed prompting you to enter the administrator
password.
Step 8 Enter the administrator password and click OK. A prompt appears telling you that the scheduled
task was successfully created. Click OK.
Step 9 If the T2000 server uses the Windows XP SP2 operating system, you also need to configure the
scheduled task that was created. For details, refer to 10.5.5 Configuring a Scheduled Task.
----End
Prerequisite
The scheduled task must be created.
Context
This section describes how to configure a scheduled task on Windows XP SP2. To perform the
configuration on other Windows operating systems, refer to this section.
Procedure
Step 1 On the desktop of the Windows XP SP2, choose Start > Control Panel > Scheduled Tasks.
Step 2 Right-click the scheduled task that was created by using the Database Management Tool, and
choose Properties from the shortcut menu.
Step 3 In the Run as field, enter the full name of user administrator, in the format of "computer name
\administrator user name".
Step 4 Click Set password, and enter the password for user administrator. Click OK.
Step 5 Click OK.
----End
Prerequisite
l The T2000 server applications must be closed.
l On Solaris, the current user is root and the Sybase database must be started.
l On SUSE Linux, the current user is root and the Sybase database must be started.
l On Windows, the current user must have the "system administrator" authority and the MS
SQL Server database must be started.
Context
CAUTION
This operation clears all data in the T2000 database. Thus, make sure that you back up the T2000
database and the deployment information of the network management system before this
operation.
NOTE
In a distributed system, initialize T2000 database on the Master server.
Procedure
Step 1 Start the Database Management Tool.
NOTE
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l You must log in to the NE as an NE user with "system level" authority.
Context
CAUTION
After initializing the NE configuration data in the T2000, if you download the data to the NE
from the T2000, the NE loses all data, and the services in the NE are interrupted. But, if you do
not perform the download operation, the data in the NE and services are not affected.
Procedure
Step 1 Choose Configuration > Configuration Data Management from the Main Menu.
Step 2 In the Object Tree, select NEs and click the double-right-arrow button (red).
Step 4 Click Initialize NM Side Data. Alternatively, right-click the NE and choose Initializing NM
Side Data from the shortcut menu.
Step 6 A prompt is displayed indicating that the operation is successful. Click Close. The initialized
NE is shown in the Unconfigured state.
----End
Prerequisite
l The deployment information about the network management system that matches the MO
data of the T2000 is restored. For details, see Restoring the Data of the Network
Management System.
Context
CAUTION
The T2000 version and deployment information (containing the number and names of instances)
of the MO data that is used for restoration must be consistent with the T2000 version and
deployment information of the MO data to be restored.
NOTE
In a distributed system, restore T2000 data on the Master server.
To restore the MO data by using the command line, run the following commands:
# cd /T2000/server/database
# ./restoremo.sh
Procedure
Step 1 Start the Database Management Tool.
NOTE
On SolarisSUSE Linux, open a terminal window and run the following commands to tart the Database
Management Tool.
# cd /T2000/server/database
# ./T2000DM.sh
On Windows, open the Resource Browser. In the \T2000\server\database directory, run T2000DM.exe.
Step 5 Select the MO data that is used for restoration. Click Restore to restore the T2000 MO data.
When restoring the MO data, the database management tool first checks whether the current
T2000 deployment information is the same as the T2000 deployment information in the backup
file package. If the information is the same, click OK in the Confirm to Restore MO dialog
box to begin to restore the T2000 MO data.
CAUTION
If the information is different, restore the data by following the instructions in the prompts.
1. In the Confirm to Restore MO dialog box, click OK.
2. A Confirm to Restore MO dialog box is displayed indicating that the MO to be restored is
not consistent with the current deployment. The deployment info will be restored automatic
and the restoration can not be rollbacked. Are you sure to continue? In the Confirm to
Restore MO dialog box, click OK to begin to restore the T2000 deployment information.
3. After you restore the information, a message is displayed indicating that the T2000
information is restored. In addition, you are prompted to start and shut down the T2000 and
click OK to continue to restore the MO data.
4. Start and then shut down the T2000. For details, refer to Starting and Shutting Down the
T2000.
5. Click OK to restore the T2000 MO data.
Step 6 Click OK in the prompt dialog box to return to the database management tool interface.
----End
Prerequisite
l The deployment information about the network management system that matches the
database data of the T2000 is restored. For details, see Restoring the Data of the Network
Management System.
l The T2000 database must be backed up.
l The T2000 server must be shut down.
l On UNIX, the Sybase database must be started and the current user is root.
l On Windows, the MS SQL server database must be started and the current user must have
the administrator authority of the operating system.
Context
CAUTION
The T2000 version and deployment information (containing the number and names of instances)
of the T2000 database that is used for restoration must be consistent with the T2000 version and
deployment information of the T2000 database to be restored.
NOTE
In a distributed system, restore T2000 data on the Master server.
To restore the T2000 database by using command line, run the following commands:
# cd /T2000/server/database
# ./restoredatabase.sh
Procedure
Step 1 Start the Database Management Tool.
NOTE
On SolarisSUSE Linux, open a terminal window and run the following commands to tart the Database
Management Tool.
# cd /T2000/server/database
# ./T2000DM.sh
On Windows, open the Resource Browser. In the \T2000\server\database directory, run T2000DM.exe.
Step 4 Click Restore Database. Select the database that is used for restoration.
Step 5 Click Restore to start restoring the T2000 database.
When restoring the database, the database management tool first checks whether the current
T2000 deployment information is the same as the T2000 deployment information in the backup
file package. If the information is the same, click OK in the Confirm to Restore Database
dialog box to begin to restore the T2000 database.
CAUTION
If the information is different, restore the data by following the instructions in the prompts.
1. In the Confirm to Restore Database dialog box, click OK.
2. A Confirm to Restore Database dialog box is displayed indicating that the database to be
restored is not consistent with the current deployment. The deployment info will be restored
automatic. Are you sure to continue? In the Confirm to Restore Database dialog box, click
OK to begin to restore the T2000 deployment information and the database.
----End
Prerequisite
l You must be an NM user with "NM maintainer" authority or higher.
l You must have the license for the T2000 script import.
Context
CAUTION
Before importing the script file, you need to back up the T2000 database or the T2000 MO data,
and then initialize the T2000 database. Import the networkwide configuration script file. You
can restore the data from a backup file if you failed to import the script file.
Procedure
Step 1 Choose System > Import/Export Script File from the Main Menu.
Step 3 Select the file format and select the script file type from the Script File Type field.
NOTE
Service Actualization Script and NM Computer Information File are not supported.
Step 4 In the Operation Directory List, select the directory where the script file is to be imported is
located.
Step 5 Select the script file to import from the Import File List.
Step 6 In the Import Subnet List, select the sunbets to be imported. All subnets are required to be
selected.
Step 7 Click Apply. The system prompts you twice that the import of the configuration script will result
in data inconsistency between the T2000 and the NE.
Step 8 Click OK. A progress bar appears showing the status of the import.
NOTE
The script file is saved on the T2000 server. On Windows, the backup directory is \T2000\server\script.
On UNIX, the backup directory is /T2000/server/script.
----End
Prerequisite
l The T2000 MO data must be backed up.
l The T2000 server program must be shut down.
l On Solaris, the Sybase database must be started and the current user is root.
l On SUSE Linux, the Sybase database must be started and the current user is root.
l On Windows, the MS SQL server database must be started and the current user must have
the administrator authority of the operating system.
l The T2000 database must be initialized. Start the T2000 server program and then shut it
down.
l The FTP server program must be running on the remote server, and the relevant port must
be enabled.
Context
CAUTION
The T2000 version and deployment information (containing the number and names of instances)
of the MO data that is used for restoration must be consistent with the T2000 version and
deployment information of the MO data to be restored.
NOTE
In a distributed system, restore T2000 data on the Master server.
Procedure
Step 1 Start the Database Management Tool.
NOTE
On SolarisSUSE Linux, open a terminal window and run the following commands to tart the Database
Management Tool.
# cd /T2000/server/database
# ./T2000DM.sh
On Windows, open the Resource Browser. In the \T2000\server\database directory, run T2000DM.exe.
Step 5 Enter the IP Address of Data Backup Server, Port, User Name and Password, and then click
Login.
Step 7 Click in the Select Path pane, and the Select path dialog box is displayed. Select the
backup MO data on the remote server as required.
Step 8 Under the Select type area, check the Restore MO check box.
CAUTION
If the information is different, restore the data by following the instructions in the prompts.
1. In the Confirm to Restore MO dialog box, click OK.
2. A Confirm to Restore MO dialog box is displayed indicating that the MO to be restored is
not consistent with the current deployment. The deployment info will be restored automatic
and the restoration can not be rollbacked. Are you sure to continue? In the Confirm to
Restore MO dialog box, click OK to begin to restore the T2000 deployment information.
3. After you restore the information, a message is displayed indicating that the T2000
information is restored. In addition, you are prompted to start and shut down the T2000 and
click OK to continue to restore the MO data.
4. Start and then shut down the T2000. For details, refer to Starting and Shutting Down the
T2000.
5. Click OK to restore the T2000 MO data.
----End
Prerequisite
l The T2000 database must be backed up.
l The T2000 server program must be shut down.
l On Solaris, the Sybase database must be started and the current user is root.
l On SUSE Linux, the Sybase database must be started and the current user is root.
l On Windows, the MS SQL server database must be started and the current user must have
the administrator authority of the operating system.
l The FTP server program must be running on the remote server, and the relevant port must
be enabled.
Context
CAUTION
The T2000 version and deployment information (containing the number and names of instances)
of the T2000 database that is used for restoration must be consistent with the T2000 version and
deployment information of the T2000 database to be restored.
NOTE
In a distributed system, restore T2000 data on the Master server.
Procedure
Step 1 Start the Database Management Tool.
NOTE
On SolarisSUSE Linux, open a terminal window and run the following commands to tart the Database
Management Tool.
# cd /T2000/server/database
# ./T2000DM.sh
On Windows, open the Resource Browser. In the \T2000\server\database directory, run T2000DM.exe.
Step 5 Enter the IP Address of Data Backup Server, Port, User Name and Password, and then click
Login.
Step 7 Click in the Select Path pane, and the Select path dialog box is displayed. Select the
backup database on the remote server as required.
Step 8 Under the Select type area, check the Restore the Database check box.
CAUTION
If the information is different, restore the data by following the instructions in the prompts.
1. In the Confirm to Restore Database dialog box, click OK.
2. A Confirm to Restore Database dialog box is displayed indicating that the database to be
restored is not consistent with the current deployment. The deployment info will be restored
automatic. Are you sure to continue? In the Confirm to Restore Database dialog box, click
OK to begin to restore the T2000 deployment information and the database.
----End
Prerequisite
The System Monitor client must be started on the T2000 server.
Context
NOTE
To view the status of the databases by command line, run the following command as user sybase:
$ /opt/sybase/ASE-12_5/install/showserver
if the dataserver and the backupserver are running, the status of databases is normal.
Procedure
Step 1 Switch to the System Monitor client user interface.
Step 2 Click the Database tab and view the status of all the databases.
Step 3 In the Database List, select one or more entries, right-click and choose Refresh to refresh the
status of the selected database(s).
NOTE
When the database utilization exceeds the preset alarm threshold, the System Monitor server sends an alarm
to the T2000 server. At the same time, the corresponding records in the System Monitor client are displayed
in red.
----End
easily. The number of records in the databases is reduced, and the running speed of the system
is increased.
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Procedure
Step 1 Choose System > Database > Dump Manually from the Main Menu.
Step 2 Select the Alarm Data and specify a suitable File type.
Step 3 Select the Start time and End time, and specify the alarm generation time.
----End
Result
The dumped alarms are saved as a file in the specified directory, but not displayed in the History
Alarms window. To view the dumped alarms, you can collect the dumped alarm data by using
the network management system maintenance tool and then open the collected data by using the
text editor.
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Context
You can use Overflow Dump or Periodic Dump to automatically dump the data.
l If you select the overflow dump mode, the T2000 automatically dumps some data to the
specified path when the data exceeds the threshold.
l If you select the periodic dump mode, the T2000 periodically dumps the data to the specified
path.
l Overflow dump and periodic dump can work together. In this case, the T2000 dumps the
data or log according to the settings of overflow dump and periodic dump.
Procedure
Step 1 Choose System > Database > Dump Settings from the Main Menu.
Step 2 Select the Alarm Data, and set the parameters of overflow dump or periodic dump.
Step 3 Set the Dump mode, File type, and Dump to (path).
NOTE
If you specify a period in the Automatic Deletion of Dump Files area, the dumped files beyond the period
are automatically deleted.
----End
Result
The dumped alarms are saved as a file in the specified directory, but not displayed in the History
Alarms window. To view the dumped alarms, you can collect the dumped alarm data by using
the network management system maintenance tool and then open the collected data by using the
text editor.
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Procedure
Step 1 Choose System > Database > Dump Manually from the Main Menu.
Step 2 Choose the performance data that you want to dump from the list and set Deadline in Instant
Dump Conditions.
Step 3 Optional: Click Query to query Number of Records (Piece) and Record Size (kB) in Record
Suitable for Instant Dump Conditions.
Step 4 Click Dump and the Confirm dialog box is displayed. Click OK to dump the performance data.
Step 5 When the dumping is complete, the Operation Result dialog box is displayed indicating the
path of saving the performance data. Click Close.
----End
Result
The manually dumped performance data is saved as a file in the specified directory, but not
displayed in the History Performance Data window. To view the dumped performance data,
you can collect the dumped performance data by using the network management system
maintenance tool and then open the collected data by using the text editor.
NOTE
When the value of the performance data, including bit errors, is 0, services are normal and are not displayed
in the exported dumping data.
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Context
You can use Overflow Dump or Periodic Dump to automatically dump the data.
l If you select the overflow dump mode, the T2000 automatically dumps some data to the
specified path when the data exceeds the threshold.
l If you select the periodic dump mode, the T2000 periodically dumps the data to the specified
path.
l Overflow dump and periodic dump can work together. In this case, the T2000 dumps the
data or log according to the settings of overflow dump and periodic dump.
Procedure
Step 1 Choose System > Database > Dump Settings from the Main Menu.
Step 2 Choose the performance data from the list, and set parameters of the Dumping when
Overflow or the Dumping in Schedule.
Step 3 Set the path of saving the performance data in Dump To(Path).
----End
Result
The automatically dumped performance data is saved as a file in the specified directory, but not
displayed in the History Performance Data window. To view the dumped performance data,
you can collect the dumped performance data by using the network management system
maintenance tool and then open the collected data by using the text editor.
NOTE
When the value of the performance data, including bit errors, is 0, services are normal and are not displayed
in the exported dumping data.
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Context
CAUTION
Clearing the T2000 log data will directly delete the log data from the database. This affects the
fault location in future. You are recommended to clear the database space by dumping.
Procedure
l Clear Automatically dumped log data.
1. Choose System > Database > Dump Settings from the Main Menu.
2. In the Dump Settings window, Click Delete All Dump Files.
----End
Prerequisite
You must log in to the T2000 as user admin
Context
When configuration data is being uploaded from the NE, ensure that the communication between
the T2000 and the NE is normal.
Procedure
Step 1 Choose System > Configuration Upgrade Wizard from the Main Menu. The Upgrade Wizard
1 of 9: Import NE list file dialog box is displayed.
Step 2 Optional: Select a directory that contains the NE list file and click Import to import the NE list
file.
Step 4 Optional: Click Upload to upload the configuration data of the selected NE. The uploading
progress is displayed in the Upload dialog box.
Step 5 Click Next to go to Upgrade Wizard 3 of 9: Import Inactive Cross-Connection.
Step 6 Optional: Click Import Inactive Cross-Connection. The Import NE list file dialog box is
displayed. Import the inactive cross-connections of the selected NE.
Step 7 Click Next to go to Upgrade Wizard 4 of 9: Search Ason Trail.
Step 8 Optional: Click Search to search for Ason trails from the network layer in the T2000.
Step 9 Click Next to go to Upgrade Wizard 5 of 9: Import networkwide configuration file.
Step 10 Optional: Select a directory that contains the networkwide configuration file and click
Import to import the networkwide configuration file.
Step 11 Click Next to go to Upgrade Wizard 6 of 9: Search Ethernet Trail.
Step 12 Optional: Click Search to search for Ethernet trails from the network layer in the T2000.
Step 13 Click Next to go to Upgrade Wizard 7 of 9: Search WDM Trail.
Step 14 Optional: Click Search to search for WDM trails from the network layer in the T2000.
Step 15 Click Next to go to Upgrade Wizard 8 of 9: Import Customer Data.
Step 16 Optional: Click Import to import customer data.
Step 17 Click Next to go to Upgrade Wizard 9 of 9: View upgrade report.
Step 18 View the result of the upgrade and make sure that the upgrade is successful.
Step 19 Click Finish to exit the wizard.
----End
For the security of the NE data, you can back up and restore the NE data.
Back up/Restore the NE database to/from an Backs up the NE data in the DRDB database
SCC board of the SCC board to the flash database, when
the SCC board does not have a CF card.
During the restoration, after a warm reset or
a cold reset on the SCC board, the SCC board
reads the configuration from the flash
database and issues the configuration to other
boards.
Back up/Restore the NE database to/from a Backs up the NE data in the DRDB database
CF card of the SCC board to the CF card, when the
SCC board has a CF card.
During the restoration, the database is
restored from the CF card to the DRDB
database of the SCC board. After a warm reset
or cold reset on the SCC board, the memory
database on the SCC board is updated. Then,
after the warm resets on other boards, the NE
memory data is issued to the boards.
Back up/Restore the NE data to/from an NMS Stores the data in the computer where the
server NMS server resides.
During restoration, you can select the backup
file in the directory where the NE data is
saved.
Back up/Restore the NE data to/from an NMS Stores the data in the computer where the
client NMS client resides.
During restoration, you can select the backup
file in the directory where the NE data is
saved.
NE Database
The NE configuration data is saved in the NE database. There are three types of NE databases
as follows:
l MDB: Memory database. The data in a MDB database is changed when the configuration
information is changed. The data is lost when the SCC board is reset or a power failure
occurs.
l DRDB: Dynamic random database. The data that is verified is automatically saved in the
DRDB database.
l FDB: Flash database. There are the FDB0 and FDB1 databases. The data need to be copied
to the database manually and can be saved permanently.
When the NE configuration data is issued to the SCC board, it is saved in the MDB database. If
the verification is successful, the SCC board automatically copies the contents in the MDB
database to the DRDB database and issues the verified configuration data to the boards. You
need to manually copy the DRDB database to the FDB database, as a backup of the DRDB
database. When the NE is restarted after a power failure, the SCC board checks whether there
is configuration data in the DRDB database. If yes, the data are restored from the DRDB
database. If the data in the DRDB database is damaged, the data is restored from the FDB0 and
FDB1 databases.
NE Configuration Data
The NE configuration data refers to the information in the DRDB database of the NE, such as
the board configuration, clock configuration and protection relations of the NE. It is the
instruction file of the NE and the key for the NE to perform normally in the entire network.
NE Database Package
The NE database package is a package that contains all database files on an NE and a file list
that defines and manages those files.
The NE database package and NE configuration data are the same data on the NE in different
releases. You can perform the NE database package backup and restoration on the release 5.00.06
NE or the NE of later release.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must log in to the NE as an NE user with system level authority.
Procedure
Step 1 In the Main Menu, choose Configuration > Configuration Data Management.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must log in to the NE as an NE user with system level authority.
Applies to the SDH equipment that supports the packet feature.
Procedure
Step 1 Choose Configuration > Configuration Data Management from the Main Menu.
Step 2 In the Object Tree on the left, select an NE or multiple NEs and click .
Step 3 In Configuration Data Management List, select an NE or multiple NEs.
Step 4 Choose Back Up NE Data > Forcibly Back Up to Standby SCC Board.
Step 5 In the confirmation dialog box, click OK.
Step 6 The Operation Result dialog box is displayed. After the backup is successful, click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
It is suitable for OptiX OSN 1500, OptiX OSN 2000, OptiX OSN 2500, OptiX OSN 3500, OptiX
OSN 7500, OptiX OSN 9500.
Procedure
Step 1 In the Main Menu, choose Configuration > Configuration Data Management.
Step 6 The Operation Result dialog box is displayed. After the backup is successful, click Close.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Log in to the NE as an NE user with "System Level" authority.
l The SCC board must be configured with the CF card.
Procedure
Step 1 Choose Configuration > Configuration Data Management from the Main Menu.
Step 2 In the Object Tree on the left, select an NE and click the double-right-arrow button (red).
Step 3 Select one or more NEs in the Configuration Data Management List.
Step 4 Choose Back Up NE Data > Automatically Back Up to CF Card. The Automatically Back
Up NE Data to CF Card window is displayed. Set the Automatic Backup Enabling Status
and Automatic Backup Period(min).
NOTE
Before the setting, you can click Query to query the current status of the automatic backup of NE data to
a CF card.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l You must have logged in to the NE as an NE user with "System Level" authority.
l The SCC board must be configured with the CF card.
Procedure
Step 1 Choose Configuration > Configuration Data Management from the Main Menu.
Step 3 Select one or more NEs in the Configuration Data Management List.
Step 4 Click Back Up NE Data and then choose Manually Back Up Database to CF Card.
----End
Prerequisite
The FTP/TFTP/SFTP server is configured and the FTP/TFTP/SFTP service is started.
Background Information
l The backup operation can be performed only for multiple devices of the same type.
l When you select the device type in the device tree, all the devices and the device type
versions related to the device type are displayed in the Device View table.
l The files backed up from the server can be viewed in the Backup Information tab.
Procedure
Step 1 On the Main Topology, choose Data Center > Device Operation from the main menu. The
Device View table is displayed.
Step 2 In the Device View table, right-click the device(s) whose data you want to back up.
NOTE
The Backup Information tab is unavailable when multiple devices are selected.
Step 4 Select the NMS Server or NMS Client option button to back up the data of the selected device.
NOTE
By default, the NMS Server option button is selected. If the NMS Server option button is selected, the
data of the selected device is stored on the NMS server.
Step 5 Optional: If the NMS Client option button is selected, click to select the location where
the device data needs to be backed up.
Step 6 Click Start to start the backup operation for the selected device(s).
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l You must log in to the NE as an NE user with system level authority.
l The NE data from DRDB database must be backed up to the flash database on the SCC
board.
Procedure
Step 1 Double-click an NE or ONE on the Main Topology and the NE Panel is displayed.
Step 2 Right-click the active SCC board, choose Warm Reset or Cold Reset or SCC Reset.
NOTE
l The reset modes for different SCC board are different. You need to choose the reset mode as required.
l When you choose Cold Reset or SCC Reset, the Warning dialog box is displayed. Click OK to start
the reset.
----End
Prerequisite
l You must be an NM user with "NE or network operator" authority or higher.
l You must log in to the NE as an NE user with system level authority.
l The SCC card must have a CF card and the NE data in the DRDB database must be backed
up to the CF card.
Procedure
Step 1 Choose Configuration > Configuration Data Management from the Main Menu.
Step 4 Click Restore NE Database. The Confirm dialog box is displayed, indicating that the
restoration of the NE database may lead to service interruption.
----End
Postrequisite
After the NE database is restored, the database on the CF card is restored to the DRDB database
of the SCC board, but not issued to the boards. If you want to restore the configuration data of
the boards, you need to perform a warm reset on the SCC board. Then, perform warm resets on
other boards. During the reset of the boards, the NE issues the configuration data to the boards
again.
Prerequisite
l The FTP/TFTP/SFTP server is configured and the FTP/TFTP/SFTP service is started.
l To restore the device data from the NMS client, the SFTP server must be configured, and
the SFTP service must be started.
Background Information
l You cannot restore device data for multiple devices of different device types.
l When you select the device type in the device tree, all the device information related to the
device type is displayed in the Device View table.
Procedure
Step 1 On the Main Topology, choose Data Center > Device Operation from the main menu. The
Device View table is displayed.
Step 2 In the Device View table, right-click the device(s) whose data you want to restore.
Step 3 Select Recover... to open the Recover dialog box.
Step 4 Select the backup file to be restored from the File Name drop-down list. If the backup files are
not listed in the File Name drop-down list, select Browse... to select the backup file to be restored
in the Select File dialog box, as shown below.
Step 5 Select the NMS Server or NMS Client option button to restore the backup file for the selected
device(s). By default, the NMS Server option button is selected.
l If the NMS Server option button is selected, select the backup file to be restored from the
NMS Server. The selected backup file path is displayed in the Select File dialog box.
l If the NMS Client option button is selected, click to select the backup file to be
restored from the NMS client. The selected backup file path is displayed in the following
Selected File dialog box.
Step 6 Click OK.
The selected backup file path from the NMS Server or NMS Client is displayed in the File
Name drop-down list.
Step 7 Click Start and the Operation Confirmation dialog box is displayed. Click Yes to start the
restoration operation.
----End
Result
After you restore the device data, right-click the device in the Device View table, and choose
Activation Database... from the shortcut menu. The Activation Database dialog box is
displayed. Click Start to activate the device database.
NOTE
If you do not activate the software within five minutes after the restoration is successfully complete, the
T2000 automatically rolls back the software and cancels the restoration operation.
12 Viewing Reports
The reports provide information regarding the network parameters and running status. From the
viewpoint of the entire network, the reports include the networking diagram and the timeslot
allocation diagram. From the viewpoint of the NEs and the boards, the reports include NE and
board information reports. All these reports help during network maintenance.
Reports are classified into two types, which are equipment configuration reports and service
configuration reports.
l The equipment configuration report provides the equipment hardware configuration
information. You can refer to this information at the initial stage of network construction.
l The service configuration report provides the service configuration information. You can
refer to this information during the network maintenance.
After a report is generated, it can be filtered, viewed, printed or saved as a file. The file could
be in text format, html format or Excel spread sheet format. In the T2000 user interface, almost
all the data in the form of a list can be exported to a report and printed.
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
Procedure
Step 1 Choose Report > Networking Diagram from the Main Menu. View the information in the
generated networking diagram.
Step 2 In the Object Tree, select the NEs that you want to display in the networking diagram and click
the double-right-arrow button (red).
Step 3 Optional: In the networking diagram, right-click and choose Customize from the shortcut menu.
The Customize dialog box is displayed. Select the parameters that you want to display in the
networking diagram, and click OK.
Step 4 Optional: In the networking diagram, right-click and choose Add Comments from the shortcut
menu to add comments to an object in the diagram.
NOTE
l After you add comments, you can use the mouse to drag the comments to the position around the
corresponding NE or subnet.
l If you want to modify comments, double-click the comments and then modify them in the Edit
Comments dialog box.
l If you want to delete comments, right-click the comments and choose Delete Comments from the
shortcut menu.
Step 5 Optional: In the networking diagram, right-click and choose Font Size from the shortcut menu
to select a proper font size.
Step 6 Optional: In the networking diagram, right-click and choose Zoom In, Zoom Out and
Restore to set the display size of the networking diagram.
Step 7 Optional: In the networking diagram, right-click and choose Page to set the page size for the
networking diagram.
NOTE
After the networking diagram is generated, some objects and information may be overlapped. In this case,
use the mouse to drag them to proper positions.
Step 8 Optional: In the networking diagram, right-click and choose Print to print the networking
diagram or choose Save As to export the networking diagram.
----End
Result
l In the Save As field, enter the directory where you want to save reports.
l After the networking diagram is saved, you can view the saved report in the directory that
is indicated in the Save As
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
Procedure
Step 1 Choose Report > Clock Tracing Diagram from the Main Menu. View the information in the
generated clock tracing diagram.
Step 2 Optional: In the clock tracing diagram, right-click and choose Zoom In, Zoom Out and
Restore from the shortcut menu to set the display size of the diagram.
Step 3 Optional: In the clock tracing diagram, right-click and choose Add Comments from the
shortcut menu to add comments to an object in the diagram.
NOTE
l After you add comments, use the mouse to drag the comments to the position around the corresponding
NE or subnet.
l If you want to modify the comments, double-click the comments and modify them in the Edit
Comments dialog box.
l If you want to delete the comments, right-click the comments and choose Delete Comments from the
shortcut menu.
Step 4 Optional: In the clock tracing diagram, right-click and choose Customize from the shortcut
menu to select the parameters that you want to display in the clock tracing diagram.
Step 5 Optional: In the clock tracing diagram, right-click and choose Page from the shortcut menu to
set the page size of the diagram.
Step 6 Optional: In the clock tracing diagram, right-click and choose Font Size from the shortcut menu
to select the appropriate font size.
Step 7 Optional: In the clock tracing diagram, right-click and choose Print or Save As to output the
report.
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
The protection subnet must be created.
Context
The T2000 exports the timeslot assignment diagram in SVG format. To view or print the
diagram, install the SVG Viewer. On Windows, refer to client\SVG\PC\pcreadme.txt on how
to install the SVG Viewer; On UNIX, refer to client/SVG/Unix/unixreadme.txt. The
installation process takes five minutes or less.
Procedure
Step 1 Choose Report > Timeslot Allocation Diagram from the Main Menu.
Step 2 Select a protection subnet in the Generate Timeslot Allocation Diagram dialog box. Click
Start. The T2000 generates the timeslot allocation diagram of this protection subnet and save
it in the client\report directory.
NOTE
On UNIX, the timeslot allocation diagram that the T2000 automatically creates is saved in the client/
report directory.
Step 3 Navigate to the client\report directory, double-click the SVG file to view the timeslot allocation
diagram. If there are more than three NEs in a protection subnet, use the Alt key to view all NEs
in the diagram.
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
Procedure
Step 1 Choose Report > NE Information Report from the Main Menu.
Step 2 In the Object Tree, select one or more NEs and click the double-right-arrow button (red). The
information of the selected NEs is displayed on the right.
Step 3 Click Query to query the information from the NE.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
The subrack information must be modified according to the actual situations. In addition, the
cabinet and equipment room information must be created.
Procedure
Step 1 Choose Report > Physical Location Information Report from the Main Menu.
Step 2 Click the Equipment Room, Cabinet or Subrack tab to view the information.
Step 3 Optional: Click Print or Save As to output the report.
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
Procedure
Step 1 Choose Report > Equivalent NE Statistics Report from the Main Menu.
Step 2 Click Query, view the Equivalent NE Statistics Report.
Step 3 Optional: Click Print or Save As to output the report.
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
The configured service must form the trail on the T2000 by using the trail search.
Procedure
Step 1 Choose Report > Port Resource Report from the Main Menu.
Step 2 In the Object Tree, select one or more NEs and click the double-right-arrow button (red). In the
right-hand pane, view the generated report.
Step 3 Optional: Click Alarm Threshold Set. In the Alarm Threshold Set dialog box, you can set
parameters as required.
NOTE
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
The board software (of the board that you want to query) supports querying of the board version
information.
Procedure
Step 1 Choose Report > Board Information Report from the Main Menu.
Step 3 In the Object Tree, select one or more NEs or a or more board on the NE and click the double-
right-arrow button (red). You can view the generated report in the right-hand pane.
Step 4 Click Query to query the information from the NE.
NOTE
Enter the information in the Remarks field and click Apply to save the information.
----End
Result
NOTE
If the number of the queried boards is different from the number of actual boards, you can upload the NE
data and then query the boards again.
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
The board must be installed.
The board software (of the board that you want to query) supports querying of the board version
information.
Procedure
Step 1 Choose Report > Board Information Report from the Main Menu.
Step 3 In the Object Tree, select one or more NEs or boards and click the double-right-arrow button
(red). You can view the generated report in the right-hand pane.
Step 4 Click Query to query the information from the NE.
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
Procedure
Step 1 Choose Report > Board Information Report from the Main Menu.
Step 2 Click the Board Count Report tab.
Step 3 In the Object Tree, select one or more NEs and click the double-right-arrow button (red). You
can view the generated report in the right-hand pane.
NOTE
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
The board software (of the board that you want to query) supports querying of the board version
information.
Procedure
Step 1 Choose Report > Board Manufacturer Information Report from the Main Menu.
Step 2 In the Object Tree, select one or more NEs and click the double-right-arrow button (red). You
can view the generated report in the right-hand pane.
Step 3 Click Query to query the information from the NE.
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
The board software (of the board that you want to query) supports querying of the board version
information.
Background Information
The boards that do not occupy slot numbers mainly include the backplane, fan board, and power
supply board. In the common manufacturer information report, the slot number is displayed as
0.
Procedure
Step 1 Choose Report > Board Manufacturer Information Report from the Main Menu. Click the
Common Manufacturer Information tab.
Step 2 Select one or more NEs from the left-hand Object Tree, and click the double-right-arrow button
(red). You can view the generated common manufacturer information report in the right-hand
pane.
Step 3 Click Query to query the actual common manufacturer information from the NE.
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
Procedure
Step 1 Choose Report > WDM NE Master/Slave Subrack Info Report from the Main Menu.
Step 2 In the left-hand Object Tree, select an NE and click . In the right-hand pane, you can
view the generated WDM NE master/slave subrack information report.
Step 3 Click Query to query the actual WDM NE master/slave subrack information from the NE.
Step 4 Optional: Click Print to print the report or click Save As to export the report.
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
Lower order cross-connections must be created.
Procedure
Step 1 Choose Report > Lower Order Cross-Connections Statistic Report from the Main Menu.
Step 2 In the Object Tree on the left, select one or more NEs and click the double-right-arrow button
(red). On the right, you can view the lower order cross-connection statistics report of the selected
NE queried from the T2000.
NOTE
l Only NEs that support lower order cross-connection querying are displayed in the Object Tree.
l There are alerts of different levels that correspond to different thresholds of used lower order cross-
connections. The default levels of alerts are as follows:
l 90% to 100%: urgent alert. The corresponding information in the report is in red.
l 70% to 89%: emergency alert. The corresponding information in the report is in orange.
l 60% to 69%: attention alert. The corresponding information in the report is in yellow.
l Less than 60%: normal. The corresponding information in the report is in the normal color.
l Click Alarm Threshold Set to set the alert thresholds. You must be an NM user with "NM operator"
authority or higher.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l A WDM protection group must be created.
Context
You can query the basic information and switching status of a WDM protection group from the
T2000 in the WDM protection group switching status report. You can also print the report or
save it as a file. The navigation path for an external switching is not provided.
Procedure
Step 1 Choose Report > WDM Protection Group Switching State Report from the Main Menu.
Step 2 In the Object Tree on the left, select one or more NEs and click the double-right-arrow button
(red). On the right, you can view the WDM protection group switching status report of the
selected NE queried from the T2000.
Step 3 Click Query to refresh the switching status of the protection groups from the NE.
----End
Prerequisite
You must be an NM user with "NM monitor" authority or higher.
Context
Menu item names displayed on the T2000 vary with different licenses.
Procedure
Step 1 Choose Report > Fiber Cable/Radio Link Occupancy Resources from the Main Menu.
Choose Statistics by Affiliated Subnet or Statistics by Protection Subnet tab.
Step 2 Select a subnet from the Object Tree, and then click the double-right-arrow button (red). The
occupancy of the relevant fiber/cable resource is displayed on the right side.
NOTE
Click Alarm Threshold Set, you can view or modify the threshold value. If the fiber cable/radio link
resource occupancy reaches a specified threshold, a pre-alarm at different levels is generated.
----End
13 Appendix
The remote maintenance terminal serves as the access client, and the T2000 server serves as the
access server. The remote maintenance process is as follows:
Prerequisite
You must be an NM user with "NM maintainer" authority or higher.
Procedure
Step 1 Choose System > Remote Maintenance User Management from the Main Menu. The Remote
Maintenance User Management dialog box is displayed. Enable the remote maintenance user
and set its other parameters.
Prerequisite
l The communication between the remote maintenance terminal and the T2000server must
be set up.
l The remote maintenance user must be enabled.
Context
To ensure network security, set the remote maintenance user to Disabled when the remote
maintenance is complete.
Procedure
Step 1 On the remote maintenance terminal, run the T2000\cmdclient\bin\cmdClient.bat file (for
Windows) or the /T2000/cmdclient/bin/cmdClient.sh file (for UNIX).
Step 2 To log in to the T2000, enter the password of the remote maintenance user and the IP address
of the T2000server. After successful login, the NEs managed by the T2000server are displayed
in the object list (the gateway NEs of all subnets are displayed by default).
NOTE
The IP address must be followed by the port number 9801, which cannot be changed or omitted.
Step 3 Click the gateway NE to display all NEs in the subnet and double-click an NE to log in.
Step 4 Enter the command in the input box (this tool supports all host commands for the maintained
equipment), and click Send to issue the command to the NE.
Step 5 When the remote maintenance is complete, select Remote Maintenance Report > Create to
create a remote maintenance report.
NOTE
l In Windows, the remote maintenance report is saved to the T2000\cmdclient\report directory of the
T2000 client.
l In UNIX, the remote maintenance report is saved to the T2000/cmdclient/report directory of the
T2000 client.
----End
protection subnets
section parameter
protection subnet
Create protection
Delete protection
Check protection
Check multiplex
Deactivate trail
Create/Modify/
Duplicate trail
Delete SNCP
Search for trail
Duplicate trail
Export script
Duplicate NE
Import script
Consistency
Delete fiber
T2000 data
Delete trail
Search for
Download
Delete all
View trail
Activate/
Initialize
Set trail
Upload
Step 1
subnet
subnet
check
subnet
node
data
Search for
trail
View trail
Activate/
Deactivate trail
Create/Modify/
Duplicate trail
Delete trail
Duplicate
trail Step 1
Delete fiber
Create protection
subnet
Delete protection
subnet
Delete all
protection subnets
Search for
protection subnet
Download
Upload
Consistency
check
Initialize
T2000 data
Duplicate NE
data
Import script
Export script
Set trail
Delete SNCP
node
Check protection
subnet
Check multiplex
section parameter
Compatible Mutually
exclusive
Figure 13-3 Mutual exclusion list for multiclient operations on ASON SDH trails
Figure 13-4 Mutual exclusion list for multiclient operations on ASON WDM trails
Example
The "script import" and "upload" operations are mutually exclusive. If "script import" is being
performed on one client, "upload" cannot be performed on another client.
By Order
The timeslot numbering by order is shown in Figure 13-5.
NOTE
Huawei uses the by order mode.
The calculation formula for VC12 numbering by order is as follows: VC12 number = TUG3
number + (TUG2 number - 1) x 3 + (TU12 number - 1) x 21
Interleaved
The timeslot numbering in the interleaved mode is shown in Figure 13-6.
The calculation formula for VC12 numbering in the interleaved mode is as follows: VC12
number = (TUG3 number - 1) x 21 + (TUG2 number - 1) x 3 + TU12 number
Virtual NE Virtual NE ID N N N N
Basic (Extension ID + NE ID)
Configurati
on Virtual NE Name N N N N
Boards Installed in an N N N Y
Virtual NE
NE NE Name Y Y Y N
Attributes
NE Location N N N N
NE Remarks Y Y N Y
SDH Timeslot Y Y Y Y
Configuration Mode
(Huawei Mode/Lucent
Mode)
Temperature Upper Y Y Y Y
Limit
Temperature Lower Y Y Y Y
Limit
Common Overvoltage Y Y Y Y
Serious Undervoltage Y Y Y Y
Common Undervoltage Y Y Y Y
Use or Not Y Y Y Y
Working Mode Y Y Y Y
Corresponding Input Y Y Y Y
Alarm Mode Y Y Y Y
CAU Interface N Y N N
FAN Interface N N N N
Auxiliary OHP Y Y Y Y
Attributes
F1 Data Port Y Y Y Y
Conference Call Y Y Y Y
COMM Y Y Y Y
Subnet Number Y Y Y Y
Supported by the
Optical Interface
Save Board N N N N
Configuration
NE Auto Release Y N N N
Syslog N N N N
Path impedance N N N N
Service selection Y Y Y Y
Retiming mode Y Y Y Y
CRC4 Y Y Y Y
E1 frame structure Y Y Y Y
T1 frame structure Y Y Y Y
Output tunable Y Y Y Y
wavelength
J2 byte to be transmitted Y Y Y Y
J2 byte to be received Y Y Y Y
J2 byte received N N N N
Path name N N N N
VC4 loopback Y N N N
Laser-in-position status N N N N
VC3 loopback Y N N N
VC12 loopback Y N N N
DCC/GCC mode Y Y Y Y
APId value to be Y Y Y Y
transmitted at source
Regenerato J0 to be transmitted Y Y Y Y
r Section
Overhead J0 to be received Y Y Y Y
J0 received N N N N
C2 to be received (VC4 Y Y Y Y
path)
C2 to be transmitted (VC4 Y Y Y Y
path)
J1 to be transmitted (VC3 Y Y Y Y
path)
J1 to be received (VC3 Y Y Y Y
path)
C2 to be received (VC3 Y Y Y Y
path)
C2 to be transmitted (VC3 Y Y Y Y
path)
J1 to be received (PDH Y Y Y Y
Board)
J1 to be transmitted (PDH Y Y Y Y
Board)
Lower J2 to be transmitted Y Y Y Y
Order Path
Overhead J2 to be received Y Y Y Y
J2 received N N N N
V5 to be sent N N N N
V5 to be received N N N N
V5 received N N N N
VC12 path V5 to be Y Y Y Y
transmitted (EFGS)
VC12 path V5 to be Y Y Y Y
received (EFGS)
Phase-locked source Y Y Y Y
output by external clock
Clock subnet Y Y Y Y
Clock ID status Y Y Y Y
2M phase-locked source Y Y Y Y
priority list
Clock binding Y Y Y Y
Frame overhead N N N N
information management
PRBS test N N N N
Multi-trail protection Y Y Y Y
group
Multi-trail protection N N N N
group
Revertive mode Y Y Y Y
Monitoring condition Y Y Y Y
Service group Y Y Y Y
Service type Y Y Y Y
Current status N N N N
Service group N N N N
Service type N N N N
Current status N N N N
Revertive mode Y Y N Y
Monitoring condition Y Y N Y
Type Y Y Y Y
STM level Y Y Y Y
Topology type Y Y Y Y
Fiber/Cable number Y Y Y Y
Service direction Y Y Y Y
Node type Y Y Y Y
Protection type Y Y Y Y
Slot mapping Y Y Y Y
MS local node ID Y Y Y Y
MS west node ID Y Y Y Y
MS east node ID Y Y Y Y
MS max. node ID Y Y Y Y
MS switching revertive Y Y Y Y
time
MS SD enabled flag Y Y Y Y
MS suppression enable Y Y Y Y
flag
Configure MS N Y N N
suppression on all spans
Type N N N N
STM level N N N N
Topology type N N N N
Fiber/Cable number N N N N
Service direction N N N N
Node type N N N N
Protection type N N N N
Slot mapping N N N N
MS protection group N N N N
protocol type
MS local node ID N N N N
MS west node ID N N N N
MS east node ID N N N N
MS switching revertive N N N N
time
MS SD enabled flag N N N N
Revertive mode Y Y Y Y
Switching mode Y Y Y Y
Slot mapping Y Y Y Y
MS switching revertive Y Y Y Y
time
MS SD enabled flag Y Y Y Y
Standby board Y Y Y Y
Level Y Y Y Y
Protection type Y Y Y Y
Revertive time Y Y Y Y
Protection unit ID Y Y Y Y
Switching status/Lock N N N N
status
Hold-off time Y Y Y Y
Switching status/Lockout N N N N
status
NE Time NE Y Y N N
Localizatio
n Time zone Y Y N N
Manageme Daylight saving time Y Y N N
nt
Daylight saving time rule Y Y N N
Start time Y Y N N
End time Y Y N N
IF port loopback Y N N N
SNCTP Group ID Y Y Y Y
Group
Slot mapping information Y Y Y Y
of working channel
Revertive mode of a Y Y Y Y
protection group
IF 1+1 protection Y Y Y Y
protection
group
N+1 protection Y Y Y Y
V-UNI group Y N Y Y
Service QoS Y N Y Y
Ethernet OAM Y N Y Y
Management of basic Y N Y Y
ports
Management of link Y N Y Y
aggregation group
OAM management of Y N Y Y
ports
Static Tunnel Y N Y Y
Basic management of Y N Y Y
MPLS
Tunnel OAM Y N Y Y
PW management Y N Y Y
QinQ Link Y N Y Y
Overhead Y N Y Y
Ethernet E-LAN/E-LINE/E- Y N Y Y
service AGGR
MLPPP Y N Y Y
PW PW management Y N Y Y
manageme
nt
IP Tunnel IP Tunnel Y N Y Y
TPS TPS Y N Y Y
Usage Usage Y N Y Y
Board Auto-Negotiation of Y Y Y Y
parameter the LDG Board
Monitor Wavelength Y Y Y Y
Monitoring Channel Y N N N
Board Monitor
Channel Wavelength
Board Receiving/ Y N N N
Transmitting
Attributes
Board Cross- Y N N N
connection loopback
Optical booster Y N N N
amplifier board gain
Laser status Y N N N
Optical interface Y Y Y Y
attenuation rate
Input power N N N N
Output power N N N N
Synthesized input N N N N
optical power loss of
threshold
Synthesized output N N N N
optical power loss of
threshold
OTU Working Y Y Y Y
Wavelength
OTU planning Y Y Y Y
wavelength
OADM add/Drop Y N N N
wavelength
Working Waveband of Y N N N
Optical Layer Board
Working Waveband Y N N N
Parity of Optical Layer
Board
Automatic Laser Y N N N
Shutdown
Current working Y Y Y Y
waveband
Whether VOA is Y N N N
available in the board
Service type Y Y Y Y
Whether FEC is Y Y Y Y
allowed
Enable wavelength Y Y Y Y
identification
Received wavelength Y N N N
identification
Identification for Y Y Y Y
wavelength to be
received
Nominal Gain Y Y N Y
Client-side Service Y Y Y Y
Protocol
Service Type to Be Y Y Y Y
Sent
Single Path Y Y Y Y
Attenuation Rate
Adjustment
Wavelength ID Y N N N
Received
Wavelength ID to Be Y Y Y Y
Received
Service Rate Y Y Y Y
Guaranteed Bandwidth Y Y Y Y
for Client GE Services
Enable LPT Y Y Y Y
Add/Drop Band Y N N N
Number
Board Working Y N N N
Frequency
STAT Byte to Be Y Y Y Y
Transmitted at ODU
Layer
PT Byte to Be Y Y Y Y
Transmitted at ODU
Layer
IAE Byte to Be N N N N
Transmitted at OTU
Layer
Monitoring Y N N N
Wavelength Band
Type
Input Status N N N N
Output Status N N N N
Maximum Output Y N N N
Optical Power of the
Pump
Minimum Output Y N N N
Optical Power of the
Pump
Enable Wavelength Y Y Y Y
Flag
Upper Threshold of N N N N
Tunable Wavelength
Lower Threshold of N N N N
Tunable Wavelength
Guaranteed Bandwidth Y Y Y Y
for Client GE Services
Whether Wavelength N N N N
Type Adjustable
Whether Extended Y N N N
Wavelength Supported
Planned Wavelength Y Y Y Y
Type
ODU1 Channel Y N N N
Loopback
ODU2 Channel Y N N N
Loopback
ODU3 Channel Y N N N
Loopback
FEC Mode Y Y Y Y
FE Transparent Y Y Y Y
Transmission
Enable an Ethernet Y Y Y Y
Port
Working Mode of an Y Y Y Y
Ethernet Port
Optical Amplifier N N N N
Board Inclination
FC Distance N N N N
Expansion
Forced Transmitted Y Y Y Y
Power
J0 Byte to Be Received Y Y Y Y
WDM J0 Byte to Be Y Y Y Y
Received Mode
J0 Byte Received Y N N N
WDM Received J0 Y N N N
Byte Mode
J0 Byte to Be Y Y Y Y
Transmitted
WDM J0 Byte to Be Y Y Y Y
Transmitted Mode
PRBS Test on an Y N Y N
Auxiliary Board
TTI Identifier to Be Y Y Y Y
Transmitted at OTS
Layer
TTI Identifier to Be Y Y Y Y
Received at OTS Layer
TTI Identifier N N N N
Received at OTS Layer
FC internal operation Y Y Y N
mode
Overhead PT byte to be Y Y Y Y
in OPU transmitted in the OPU
layer
PT byte received N N N N
TTI to be Received Y Y Y Y
TTI Received N N N N
IAE Byte to be N N N N
Received
STAT byte to be Y Y Y Y
transmitted in the ODU
layer
1-byte J0 received N N N N
64-byte J0 to be Y Y Y Y
received
64-byte J0 received N N N N
WTR Y Y Y Y
SSM Protocol Y Y Y Y
Clock Source Y Y Y Y
Attributes
Lock Status Y Y Y Y
External Source S1 Y Y Y Y
Timeslot
Configuration of S1 Y Y Y Y
Byte
Clock Source ID Y Y Y Y
WTR Status N N N N
Clock Transparent N N N N
Transmission
Configuration
Clock Transparent N N N N
Transmission
Protection Group
Revertive Time Y Y Y Y
Active Path N N N N
Switching Status N N N N
Channel Hold-off Y Y Y Y
Time
Switching Status N N N N
Channel Hold-off Y Y Y Y
Time
WTR Time Y Y Y Y
SD Switching Enabled Y Y Y Y
Flag
Parameter Check Y N N N
Consistency Flag
Protection Priorities Y Y Y Y
Detection Board Y Y Y N
Control Y Y Y N
Implementation Board
Raman Amplifier Y Y Y N
Auxiliary Raman Y Y Y N
Board
IPA Status Y Y Y N
Restart Mode Y Y Y N
Off Period Y Y Y N
On Period Y Y Y N
Testing Period Y Y Y N
Start Latency Y Y N N
Security Control Y Y Y N
Switch
Detection Board Y Y Y Y
Treshold
Raman Amplifer Y Y Y Y
Threshold
Subrack (NE) ID of N N N N
Power Monitoring Unit
Power Regulating Y Y Y N
Subrack of Odd
Wavelength
Power Regulating Y Y Y N
Subrack of Even
Wavelength
Monitoring Subrack of Y Y Y N
Transmit End
Monitoring Subrack of Y Y Y N
Receive End
Power Unbalance Y Y N N
Threshold
Wavelength Enabling Y Y N N
Flag
Node Type Y Y Y N
Node ID Y Y Y N
Variable Optical Y Y Y N
Attenuation Unit
Upstream Supervisory Y Y Y N
Channel
Downstream Y Y Y N
Supervisory Channel
Node ID of the Y Y Y N
Reference Node
Working Mode Y Y Y N
Reference Unit Y Y Y N
Abnormal Power Y Y Y N
Detection Threshold
Single-Wavelength Y Y Y N
ASE Noise
Compensation
Auto Adjustment Y Y Y N
Switch
1600G Link ID Y Y Y N
ALC
Node ID Y Y Y N
Direction Y Y Y N
Band Type Y Y Y N
Node Number Y Y Y N
Monitored NE N N N N
Working Mode Y Y Y N
Variable Optical Y Y Y N
Attenuation Unit
Node ID of the Y Y Y N
Reference Node
Reference Unit Y Y Y N
Abnormal Power Y Y Y N
Detection Threshold
Single-Wavelength Y Y Y N
ASE Noise
Compensation
Auto Adjustment Y Y Y N
Switch
West Supervisory Y Y Y N
Channel
East Supervisory Y Y Y N
Channel
Automatic WDM N N N N
Power Shutdown
PRBS test N N N N
Wavelengt Group ID Y Y Y Y
h
Protection Protection Type Y Y Y Y
Group Revertive Mode Y Y Y Y
Revertive Time Y Y Y Y
Remain Revertive N N N N
Time
Switching Mode Y Y Y Y
Switching Time Y Y Y Y
Active Path Y Y Y Y
Enable SD Y Y Y Y
Slot Mapping Y Y Y Y
Board Mapping Y Y Y Y
SD Event Y Y Y Y
Channel Hold-off Y Y Y Y
Time
WXCP Protection Y Y Y Y
Group Board Mapping
SD Enabling Flag Y Y Y Y
SD Trigger Condition Y Y Y Y
Current Status N N N N
Trail Status N N N N
Wavelength Protection Y N Y N
Group Status
Wavelength Blocking Y Y Y N
Monitor Unit
Optical Power Y Y Y N
Equalization Monitor
Unit
OTU Mapping Y Y Y N
OTU Dependent Y Y Y N
Optical Attenuator
Unit
Wavelength Pass- Y Y Y N
through/Blocking Flag
Optical Power Y Y Y N
Equalization Enable
Flag
Optical Power Y Y Y N
Equalization Monitor
Threshold
Standard Optical Y Y Y N
Power Offset
DPPS Protection Y Y Y Y
Group Revertive Mode
Channel Hold-off Y Y Y Y
Time
Optical Cross- Y Y Y Y
Connection ID, Parent
ID
Source/Sink Slot of Y Y Y Y
Optical Cross-
Connection
Source/Sink Y Y Y Y
Wavelength of Optical
Cross-Connection
Source/Sink Y Y Y Y
Waveband of Optical
Cross-Connection
Optical Cross- Y Y Y Y
Connection Type
Power Equalization Y Y Y N
Monitoring Unit
OTU Mapping Y Y Y N
Optical Attenuation Y Y Y N
Unit Related to OTU
Wavelength Pass- Y Y Y N
Through/Blocking
Flag
Power Equalization Y Y Y N
Enabling
Power Equalization Y Y Y N
Detection Threshold
Wavelengt Wavelength Y Y Y N
h Lockout monitoring object
Wavelength Y Y Y N
monitoring object
Wavelength Y N N N
Add Mapping N N N N
Delete Mapping N N N N
Calculate OTU N N N N
Apply N N N N
OTU Y Y Y Y
Optimum Value N N N N
Scanning
E1 Cross- E1 Cross-Connection Y Y Y Y
Connectio
n
Manageme Subrack ID Y N Y Y
nt of
Master and Subrack Name Y N Y Y
Slave
Subracks
TCM Object N N N N
Overhead
Layer N N N N
Source mode Y Y Y Y
Sink mode Y Y Y Y
TTI to be transmitted Y Y Y Y
TTI to be Received Y Y Y Y
Received TTI N N N N
DEG threshold Y Y Y Y
LCK insertion Y Y Y Y
Remaining time to N N N N
restore
Delay time Y Y Y Y
Switching Status Y Y Y Y
SD Switching Enabled Y Y Y Y
Flag
Status of parameter Y N N N
consistency check
Status of redundant Y Y Y Y
service access
Protection Priorities Y Y Y Y
Board Auto-Negotiation of N N N N
parameter the LDG Board
Monitor Wavelength Y N N N
Monitoring Channel N N N N
Board Monitor
Channel Wavelength
Board Receiving/ N N N N
Transmitting
Attributes
Board Cross- N N N N
connection loopback
Optical booster N N N N
amplifier board gain
Laser status Y N N Y
Optical interface N N N N
attenuation rate
Input power N N Y Y
Output power N N Y Y
Input status N N N N
Output status N N N N
Lower threshold of Y N Y Y
input optical power
Upper threshold of Y N Y Y
input optical power
Synthesized input Y N Y Y
optical power loss of
threshold
Synthesized output Y N Y Y
optical power loss of
threshold
Automatic laser N N N N
shutdown
OTU working Y N Y Y
wavelength
OADM Add/Drop Y N N N
Wavelength
OTU/OADM Y N Y Y
Waveband Type
Working Waveband of Y N N N
Optical Layer Board
Working Waveband Y N N N
Parity of Optical Layer
Board
Whether VOA is N N N N
available in the board
Service type N N N N
Whether FEC is N N N N
allowed
Wavelength ID N N N N
Nominal Gain N N N N
Client-side Service N N N N
Protocol
Service Type to Be N N N N
Sent
Single Path N N N N
Attenuation Rate
Adjustment
WDM ID Received N N N N
WDM ID to Be N N N N
Received
Service rate N N N N
Guaranteed Bandwidth N N N N
for Client GE Services
TTI to be Received N N N N
TTI Received N N N N
IAE Byte to be N N N N
Received
STAT byte to be N N N N
received in the ODU
layer
1-byte J0 received N N N N
64-byte J0 to be N N N N
received
64-byte J0 received N N N N
Enable S1 Byte N N N N
Protocol
Clock Source N N N N
Attributes
Lock Status N N N N
External Source S1 N N N N
Timeslot
Manual Configuration N N N N
of S1 Byte
Clock Source ID N N N N
WTR Status N N N N
Clock Transparent N N N N
Transmission
Configuration
Clock Transparent N N N N
Transmission
Protection Group
RAMAN Amplifier Y N Y N
Enable Flag Y N Y N
Restart Mode Y N Y N
Off Period Y N Y N
On Period Y N Y N
Testing Period Y N Y N
Start Latency Y N N N
Security Control Y N Y N
Switch
IPA Auxiliary Y N Y N
Detection Interface
Subrack (NE) ID of Y N Y N
Power Monitoring Unit
Power Regulating Y N Y N
Subrack of Odd
Wavelength
Power Regulating Y N Y N
Subrack of Even
Wavelength
Monitoring Subrack at Y N Y N
Transmit End
Monitoring Subrack at Y N Y N
Receive End
Power Unequalization Y N N N
Threshold
Wavelength Enabling Y N N N
Flag
NGWDM Link ID Y N Y N
ALC
Subrack ID Y N N N
Variable attenuation
unit
Adjacent Node in Y N Y N
Upstream Direction
Adjacent Node in Y N Y N
Downstream Direction
Reference Unit Y N Y N
Line Attenuation Y N Y N
Exception Detection
Threshold
Node Gain Y N Y N
Compensation Offset
Automatic Adjustment Y N Y N
Switch
Automatic WDM N N N N
Power Shutdown
Port Group ID Y N Y Y
Protection
Group Protection Type Y N Y Y
Slot Mapping Y N Y Y
Revertive Mode Y N Y Y
Enable SD Y N Y Y
Working Channel Y N Y Y
Hold-off Time
Protection Channel Y N Y Y
Hold-off Time
Channel Hold-off Y N Y Y
Time Dectection
Optical Cross- Y N Y Y
Connection ID, Parent
ID
Source/Sink Slot of Y N Y Y
Optical Cross-
Connection
Source/Sink Y N Y Y
Wavelength of Optical
Cross-Connection
Source/Sink Y N Y Y
Waveband of Optical
Cross-Connection
Optical Cross- Y N Y Y
Connection Type
Power Equalization N N N N
Monitoring Unit
OTU Mapping N N N N
Optical Attenuation N N N N
Unit Related to OTU
Wavelength Pass- N N N N
Through/Blocking
Flag
Power Equalization N N N N
Enabling
Power Equalization N N N N
Detection Threshold
Electrical Cross-connection Y N Y Y
Cross- Level
Connection
Manageme Service Type Y N Y Y
nt Direction Y N Y Y
Source Channel Y N Y Y
Sink Channel Y N Y Y
Activation Status Y N Y Y
Protection Type Y N Y Y
Level Y N Y Y
Revertive Mode Y N Y Y
WTR Time Y N Y Y
Working Channel Y N Y Y
Hold-off Time
Protection Channel Y N Y Y
Hold-off Time
Enable SD Y N Y Y
SD Trigger Condition Y N Y Y
ODUk Level Y N N Y
SPRing
Single WTR Y N N Y
Station SD Enabling Flag Y N N Y
Configurati
on Whether Management Y N N Y
Node or Not
Protection Unit Y N N Y
Path Mapping Y N N Y
Span ID Y N N Y
Hold-Off Time Y N N Y
ASON Cross-connection Y N N N
electrical Level
cross-
connection Service Type Y N N N
manageme Direction Y N N N
nt
Source Channel Y N N N
Sink Channel Y N N N
Activation Status Y N N N
Service source Y N N N
Level Y N N N
Revertive mode Y N N N
WTR Y N N N
SD enabling flag Y N N N
SD triggering Y N N N
condition
Service Source Y N N N
Master/ Subrack ID Y N Y Y
Slave
subrack Subrack name Y N Y Y
manageme
nt
Retiming mode Y Y Y Y
J2 byte to be transmitted Y Y Y Y
J2 byte to be received Y Y Y Y
J2 byte received N N N N
Path name N N N N
VC4 loopback Y N N N
APId value to be Y Y Y Y
transmitted at source
PRBS test N N N N
SNCTP Group ID Y Y Y Y
Group
Slot mapping information Y Y Y Y
of working channel
Revertive mode of a Y Y Y Y
protection group
IF 1+1 protection Y Y Y Y
protection
group N+1 protection Y Y Y Y
Service QoS Y N Y Y
Ethernet OAM Y N Y Y
Management of basic Y N Y Y
ports
Management of link Y N Y Y
aggregation group
OAM management of Y N Y Y
ports
Static Tunnel Y N Y Y
Basic management of Y N Y Y
MPLS
Tunnel OAM Y N Y Y
PW management Y N Y Y
QinQ Link Y N Y Y
Overhead Y N Y Y
Auto-Negotiation Enabled Y Y Y Y
Optical Interface Y N N N
Loopback
Data Encapsulation Y Y Y Y
Protocol
Optical Interface Y N N N
Loopback
Laser State N N N N
User ID Y Y Y Y
Flow Control Y Y Y Y
Port Enable Y Y Y Y
Working Mode Y Y Y Y
Binding Path Y Y Y Y
Encapsulation Protocol Y Y Y Y
Enable PPT Y Y Y Y
Scramble Y Y Y Y
CRC retrieve Y Y Y Y
Enable LPT Y Y Y Y
Port Encapsulation Y Y Y Y
Method (CCC/Martini)
Stack VLAN ID Y Y Y Y
LAPS/HDLC/GFP Y Y Y Y
Encapsulation parameters
Point-to-Point Attribute of Y Y Y Y
Port
Broadcast Message Y Y Y Y
Suppression
Link Aggregation Y Y Y Y
Configuration
Default VLAN ID Y Y Y Y
MAC Loopback Y N N N
Phy Loopback Y N N N
Laser Switch Y N N N
Default Forwarding Y Y Y Y
Priority
Non-Auto-Negotiation Y Y Y Y
Mode
Enable/Disable Broadcast Y Y Y Y
Packet Suppression
Broadcast Packet Y Y Y Y
Suppression Threshold
Auto-Negotiation Flow Y Y Y Y
Control Attribute
Port Type Y Y Y Y
Encapsulation Format of P Y Y Y Y
Port
Entrance Detection Y Y Y Y
Enable QinQ Y Y Y Y
Default QinQ ID Y Y Y Y
QinQ Priorities Y Y Y Y
Traffic Threshold Y Y Y Y
Tag Y Y Y Y
Loopback Detect Y Y Y Y
Port Blocking Y Y Y Y
Port Mirroring N N N N
TAG TAG Y Y Y Y
Attributes
Default VLAN ID Y Y Y Y
VLAN Priority Y Y Y Y
Entry Detection Y Y Y Y
Encapsulation Protocol Y Y Y Y
Scramble Y Y Y Y
CRC Reverse Y Y Y Y
Extended Header Y Y Y Y
Selection
Enable LCAS Y Y Y Y
Enabling QinQ Y Y Y Y
Default QID Y Y Y Y
QinQ Priority Y Y Y Y
QQTAG Attributes Y Y Y Y
Forwarding Priority Y Y Y Y
Port Priority Y Y Y Y
(ATTR_ETHOVERSDH_
MAC_PRIMODE)
Port Priority Y Y Y Y
(ATTR_ETHOVERSDH_
VCG_PRIMODE)
HO Procedure Timer Y Y Y Y
Duration
LCAS Mode Y Y Y Y
Port MAC-Address N N N N
Port MAC-Address N N N N
Working Mode Y Y Y Y
Non-Autonegotiation Y Y Y Y
Mode
Non-Autonegotiation Y Y Y Y
Flow Control Attributes
Query Configuration of Y N N N
VLAN Filtering Table
Query Configuration of Y N N N
TOS
Query Multicast Y N N N
Addresses of VLAN
Configuration of VLAN N Y N N
Filtering Table
VLAN Table N N Y Y
LPT Data N N N Y
Ethernet Port N N Y N
Activate or Not N N Y N
LPT Direction N N Y N
VLAN Unicast Y Y Y Y
Aging Time Y Y Y Y
COS Information Y Y Y Y
Flow Information Y Y Y Y
Shaping Parameters N N Y Y
Node Name N N Y Y
WTR Time N N Y Y
Restoration Time N N Y Y
Point-to-Point Attribute Y Y Y Y
Bridge Running N N N N
Information
Aging Time Y Y Y Y
VB VB Configuration and Y Y Y Y
Manageme Name
nt
Disabled MAC Address in N N N N
VB
VB Mounting Y Y Y Y
Ethernet EPL/EVPL/Transit Y Y Y Y
Service Service Configuration
EPLn/EVPLn Service Y Y Y Y
Configuration
VLAN Switch Y Y Y Y
Configuration
VLANSNCP Y Y Y Y
Configuration
VLANSNCP Switching N N N N
Status
Flow Classification Y Y Y Y
Other Attributes N N N N
Management of Bridge
VC VCTRUNCK Bandwidth Y Y Y Y
TRUNK Binding
RPR Protectiong N N N N
Switching Information
Node Number Y Y Y Y
Node Name Y Y Y Y
Query Topology N N N N
Information
RPR Node ID Y Y Y Y
RPR Enabled Y Y Y Y
Link Group ID N N Y N
Main Port N N Y N
Query Protection Y N N N
Switching Revertive Mode
of Inter-Board LAG Group
LAG Record N N N Y
LAG Record N N Y N
Query LB Timeout Y N N N
Query LT Timeout Y N N N
Query CC Activation Y N N N
Status
Create (Add) MP N Y N N
Set LB Timeout N Y N N
Set LT Timeout N Y N N
ID of Last Opposite MP N N Y Y
Tested
Type of Service N N Y Y
Maintained by MP
Service ID N N Y Y
Port ID N N Y Y
Port Type N N Y Y
VLAN ID N N Y Y
MP Level (0-7) N N Y Y
MP Type N N Y Y
MP Direction N N Y Y
CC Sending Period N N Y Y
LB Timeout N N Y Y
LT Timeout N N Y Y
CC Activation Status N N Y Y
Unidirectional Operation Y Y Y Y
Enable Response to Y Y Y Y
Remote Loopback
Loopback State N N N N
Remote Unidirectional N N N N
Operation
LB Timeout Y Y Y Y
LT Timeout Y Y Y Y
Multicast CC Sending Y Y Y Y
Period
Activation Status of Y Y Y Y
Multicast CC monitoring
Three Counters N N N N
Ingress lable Y Y Y Y
Egress Port Y Y Y Y
Egress label Y Y Y Y
Next hop Y Y Y Y
ARP IP Address Y Y Y Y
MAC Address Y Y Y Y
Number of VPC N N N N
Configured Currently
Number of VCC N N N N
Configured Currently
Activated Status Y N N N
UPC/NPC Enable/ Y Y Y Y
Disable
Loopback Y N N N
VC VCTRUNCK Bandwidth Y Y Y Y
TRUNK Binding
Managem
ent
Port Name N N N N
Laser Switch N N N N
Activated Status of CC Y Y Y Y
NE LLID Y Y Y Y
J0 Byte Received N N N N
J1 Byte to Be Sent Y Y Y Y
J1 Byte to Be Received Y Y Y Y
J1 Byte Received N N N N
C2 Byte to Be Received Y Y Y Y
C2 Byte to Be Sent Y Y Y Y
C2 Byte Received N N N N
Data
Functio Downloa Consistenc Replicatio
n List Function Upload d y Check n
Consiste Data
Function Uplo Downl ncy Replicati
List Function ad oad Check on
SHDSL version N N N N
Manufacturer directory N N N N
Manufacturer issue N N N N
Consiste Data
Function Uplo Downl ncy Replicati
List Function ad oad Check on
Version of manufacturer N N N N
software
Unit identifier N N N N
Manufacturer ID N N N N
Manufacturer type N N N N
Port loopback N N N N
Port impedance N N N N
Alarm Severity Y N N N
manageme
nt Automatic report of Y N N N
alarms
Alarm Suppression Y N N N
Alarm reversion Y N N N
Settings of NE alarm Y N N N
attributes
Alarm insertion Y N N N
Settings of alarm Y N N N
diagnosis rules
Settings of alarm Y N N N
performance dump
conditions
Performance threshold Y N N N
Data
Function Downlo Consisten Replicati
List Function Upload ad cy Check on
IP performance Y N N N
monitoring time
ATM performance Y N N N
monitoring time
Performance threshold Y N N N
template
Standards Followed
ITU-T G.707 Network node interface for the synchronous
digital hierarchy (SDH)
ITU-T G.774 (01, 02, 03, 04) Synchronous Digital Hierarchy (SDH)
management information model for the NE
view
A Glossary
1+1 optical path protection At the place where the signals are input, the
same channel of optical signals are input to
two boards or ports of the WDM equipment
through two fibers. The two boards or ports
are backed up mutually. When a fault occurs
to the working path, the input end of the
WDM equipment switches to the protection
path. If the working path recovers, the input
end of the WDM equipment switch back to
the working path.
Alarm delay time Alarm delay includes start delay and end
delay. An alarm is not regarded as being
generated until the NE has been detecting it
for a period of time, and this period of time is
the alarm start delay time. An alarm is not
regarded as being cleared until the NE has
been detecting the ending of it for a period of
time, and this period of time is the alarm end
delay time. Setting the delay time can avoid
the generation of unnecessary alarms due to
misreport or jitter.
Alarm reversion For the port that has already been configured
but has no service, this function can be used
to avoid generating relevant alarm
information, thus preventing alarm
interference.
Bit error alarm threshold When the bit error reaches a specific limit, the
equipment will report an alarm. This limit is
the bit error alarm threshold. The threshold
can be divided into crossing threshold and
defect threshold.
Data interface service The service that uses the F1 byte in an SDH
frame or some undefined bytes to transmit
information such as call charge, network
management system information and power
supply monitoring.
Network layer data on the T2000 The network configuration data that is saved
in T2000 databases and is the data source for
the network function of the T2000. The
network layer data on the T2000 includes
three parts: fiber connection data, protection
subnetwork and SDH NNI data and trail
information.
SDH-ASON Trail A trail that spans both the SDH and ASON
domains.
Serial port extended ECC The ECC channel realized by means of serial
port.
Service clock working route The route of a service clock from the source
to the sink in a WDM system. The working
route can be in the form of point-to-point or
broadcast (That is, an input clock source
corresponds to multiple output clock
sources).
Traffic frame discard flag It is the traffic frame discard control. Two
options are provided: enable and disable. It
indicates the means by which the NE discards
cells when the network is congested. When
the frame discard mark is closed, the cells will
be discarded at the cell level; when it is
opened, they will be discarded at the frame
level. Here, "frame" refers to the AAL
protocol data unit.
Trail consistency check Check whether the circuit route and the
activation status of the NM side and NE side
are the same, clear the superfluous MOs and
combine some of the circuits. During network
expansion, such an operation as adding fibers
to the SDH NNI or configuring/deleting
services through the configuration layer will
result in circuit inconsistency.
Transmission media layer route The route that consists of the physical media
(such as fibers and NEs)that a trail passes
through.
User group User set refers to the set of NMS users with
the same management authorities. The
default user group includes: system
administrator, system maintainer, system
operator and system supervisor. The
attributes of user set include name and
detailed description.
VC4 server trail The path rate of the VC4 server trail is
150.336 Mbit/s. The VC4 server trail
provides transparent channels (that is, circuit
group) for circuit-layer network nodes (for
example, a switch) in a path-layer network,
and acts as the basic unit of inter-office
communication path. When the VC4 server
trail is configured, only the higher order
cross-connection of VC4 is generated in the
intermediate NE, but no cross-connection is
generated at the two ends, that is, no service
is added/dropped. Therefore, the VC4 server
trail is not a traditional service. It is only the
basis for VC3 and VC12 trail creation.
Wavelength protection group The important data that is used to describe the
wavelength protection structure. The
wavelength path protection can only work
with the correct configuration of the
wavelength protection group.
GE Gigabit Ethernet
HA High-Availability
ID Identification/Identity
IP Internet Protocol
Mgr Manager
MO Managed Object
MODEM Modulator-Demodulator
MON MONitor
MS Multiplex Section
NE Network Element
NM Network Management
OA Optical Amplifier
OD Optical Demultiplexing
OM Optical Multiplexing
PC Personal Computer
PE Provider Edge
PP Path Protection
RS Regenerator Section
SD Signal Degradation
SF Signal Failure
TE Traffic Engineering
TU Tributary Unit
VB Virtual Bridge
WTR Wait-to-Restore