You are on page 1of 88

Copyright 2013. All rights reserved.

HighCapNMS

N7.0
Technical Description
Rev A.01
May 2013

HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 2 of 88
Table of Contents
1. HighCapNMS system overview ....................................................................... 5
1.1 HighCapNMS features overview .................................................................................... 6
1.1.1 Automatic discovery of network topology ....................................................................... 6
1.1.2 Global fault management ............................................................................................... 7
1.1.3 Network element configuration management ................................................................ 8
1.1.4 Network performance management ............................................................................... 9
1.1.5 End-to-End Ethernet services management ................................................................ 10
1.1.6 End-to-End TDM trail management ............................................................................. 11
1.1.7 Network security management .................................................................................... 12
1.1.8 System administration .................................................................................................. 13
2. System architecture ....................................................................................... 14
2.1 HighCapNMS server components ............................................................................... 14
2.1.1 MySQL database ......................................................................................................... 14
2.1.2 FTP/ TFTP server ........................................................................................................ 14
2.1.3 XML & HTTP proxy ...................................................................................................... 14
2.1.4 Server redundancy ....................................................................................................... 14
2.2 HighCapNMS Client GUI.............................................................................................. 14
2.2.1 Network topology maps................................................................................................ 15
2.2.2 Navigator panel topology tree ...................................................................................... 15
2.3 Management interfaces................................................................................................ 15
2.3.1 Northbound interfaces .................................................................................................. 15
2.3.2 CLI report interface ...................................................................................................... 16
2.3.3 SNMP southbound interface ........................................................................................ 16
3. HighCapNMS features .................................................................................... 17
3.1 GUI based network management ................................................................................ 17
3.1.1 Adding network elements to a network topology map ................................................. 17
3.1.2 Network auto discovery ................................................................................................ 17
3.1.3 Network rediscovery ..................................................................................................... 18
3.1.4 Grouping and linking network elements ....................................................................... 18
3.1.5 Network hierarchy and the Navigator topology tree ..................................................... 18
3.2 Fault and alarms management .................................................................................... 19
3.2.1 Network entity alarms ................................................................................................... 19
3.2.2 HighCapNMSs alarms interface .................................................................................. 19
3.2.3 Viewing top most alarm severity .................................................................................. 19
3.2.4 Viewing alarm history ................................................................................................... 19
3.2.5 Network management alarms ...................................................................................... 20
3.2.6 Alarm triggers ............................................................................................................... 20
3.3 Configuration management .......................................................................................... 20
3.3.1 Network element configuration backup & restore ........................................................ 20
3.3.2 Mass configuration broadcast ...................................................................................... 20
3.3.3 Mass software downloads ............................................................................................ 21
3.3.4 NMS client auto upgrade.............................................................................................. 21
3.4 Traffic services management ....................................................................................... 21
3.4.1 End-to-end Ethernet services management ................................................................ 21
3.4.1.1 GUI based service management ................................................................. 21
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 3 of 88
3.4.1.2 Wizard based provisioning .......................................................................... 22
3.4.1.3 xSTP status maps ........................................................................................ 22
3.4.1.4 Excluding Ethernet services from NMS management ................................. 22
3.4.2 End-to-end TDM trail management .............................................................................. 22
3.4.2.1 GUI based TDM trail management .............................................................. 22
3.4.2.2 Automatic provisioning of TDM trails ........................................................... 23
3.5 Connectivity Fault Management (CFM) ....................................................................... 23
3.6 Performance management .......................................................................................... 23
3.6.1 Inventory management ................................................................................................ 24
3.6.2 Performance monitoring ............................................................................................... 24
3.7 Security ........................................................................................................................ 24
3.7.1 User access control ...................................................................................................... 24
3.7.1.1 Personalize view per user ........................................................................... 24
3.7.1.2 Domain based group permissions and subnet based access rights ........... 25
3.7.1.3 Password security configuration .................................................................. 25
3.7.1.4 Single sign-on to EMS web clients .............................................................. 25
3.7.1.5 RADIUS remote user authentication ........................................................... 25
3.7.2 Audit logging ................................................................................................................ 26
3.7.2.1 Monitoring and managing connected NMS users ....................................... 26
3.7.2.2 User action log ............................................................................................. 26
3.8 System administration .................................................................................................. 26
3.8.1 Task scheduler ............................................................................................................. 26
3.8.2 Database management ................................................................................................ 27
3.8.3 Server redundancy and synchronization ...................................................................... 27
3.9 HighCapNMSs server redundancy .............................................................................. 27
3.9.1 HighCapNMSs redundant server configuration .......................................................... 27
3.9.2 The role of the secondary server ................................................................................. 28
3.9.3 Activation operations for a standby server ................................................................... 29
3.10 HighCapNMS northbound interface ............................................................................. 30
3.10.1 HighCapNMS northbound integration .......................................................................... 30
3.10.2 Northbound trap forwarding ......................................................................................... 30
3.10.3 Configuring northbound trap forwarding ...................................................................... 30
3.10.3.1 Enabling HighCapNMS for northbound trap forwarding .............................. 31
3.10.4 Scheduling reports for the northbound NMS................................................................ 31
3.10.5 Scheduling reports for the northbound NMS................................................................ 32
3.10.6 Northbound trap synchronization ................................................................................. 32
3.10.7 Northbound alarm synchronization .............................................................................. 32
3.10.8 Enabling network elements for northbound trap forwarding ........................................ 33
3.10.9 Northbound heartbeat trap mechanism ....................................................................... 35
3.11 Network management alarms ...................................................................................... 35
3.11.1.1 Management raise alarms ........................................................................... 36
3.11.1.2 Management clear alarms ........................................................................... 37
3.11.2 Ethernet service related alarms ................................................................................... 38
3.11.2.1 Service related network element alarms ..................................................... 38
3.11.2.2 Ethernet service related management alarms ............................................. 39
3.11.3 Trail alarms .................................................................................................................. 39
3.11.4 Configuring sound alarms ............................................................................................ 43
3.12 Command line interface (CLI) ...................................................................................... 44
3.12.1 CLI scheduling instructions .......................................................................................... 44
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 4 of 88
3.13 SNMP MIB support ...................................................................................................... 44
3.13.1 NMS current alarm table (nmsCurrentAlarmTable) ..................................................... 45
3.13.1.1 NMS current alarm table columns ............................................................... 45
3.13.1.2 IDU/ IDU-G current alarm mapping to the NMS current alarms .................. 46
3.13.2 NMS traps .................................................................................................................... 47
3.14 HighCapNMS predefined report types ......................................................................... 48
3.14.1 Performance monitoring reports .................................................................................. 48
3.14.1.1 Radio performance ...................................................................................... 48
3.14.1.2 Radio Ethernet performance ....................................................................... 51
3.14.1.3 Inventory reports .......................................................................................... 57
3.14.1.4 Logs ............................................................................................................. 72
3.14.1.5 Service lists .................................................................................................. 75
4. HighCapNMS Network Support ..................................................................... 78
4.1 Supported Network Elements ...................................................................................... 78
4.1.1 Evolution XPAND IP+ .................................................................................................. 78
4.1.2 AGG-Node-N ................................................................................................................ 78
4.1.3 AODC-C ....................................................................................................................... 78
4.1.4 HighCapRadio Multi-Rate family .................................................................................. 78
4.1.5 HighCapRadio 2000/4800 family ................................................................................. 79
4.1.6 3rd party supported elements ...................................................................................... 79
4.2 Supported protocols ..................................................................................................... 79
5. HighCapNMS license information ................................................................. 80
5.1 Introduction .................................................................................................................. 80
5.2 License requirements ................................................................................................... 80
5.3 License components .................................................................................................... 81
5.3.1 Redundancy server support ......................................................................................... 81
5.3.2 TDM trail license requirements .................................................................................... 81
5.3.3 Ethernet services license requirements ....................................................................... 81
5.4 Licensing MySQL ......................................................................................................... 82
5.5 Temporary demo license.............................................................................................. 82
5.6 Obtaining a permanent license .................................................................................... 82
5.7 License configuration recommendations ..................................................................... 83
5.8 License configuration examples ................................................................................... 83
5.9 HighCapNMS license request form .............................................................................. 84
6. Hardware capacity recommendations .......................................................... 86
6.1 Unix server capacity examples .................................................................................... 86
6.2 Windows server capacity recommendations................................................................ 87
Windows server capacity recommendations .......................................................................... 87
7. Compatibility matrix ....................................................................................... 88

HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 5 of 88
1. HighCapNMS system overview
HighCapNMS is a Network Management System (NMS) designed for managing
large scale wireless backhaul networks.
Optimized for centralized operation and maintenance of a complete network,
HighCapNMS offers users a comprehensive set of management functions to
simplify network management work.
HighCapNMSs client interface provides centralized, GUI based access to all
network management functionality.
End-to-end traffic service management
HighCapNMS includes a service management GUI for provisioning,
configuration, monitoring, and management of Ethernet services and TDM
trails. Service view provides Wizard based provisioning, service topology
maps, and GUI driven configuration of service paths.
Fault management
HighCapNMS enables global management of network entity alarms with
comprehensive alarm reporting. The alarms interface provides details of each
alarm, including the alarm type and severity, raise and clear time, probable
causes and corrective actions.
Additionally, all map entities, including network elements, links, TDM trails,
and Ethernet services, are color coded, with the color indicating the status of
the most severe current alarm.
Configuration management
HighCapNMS simplifies network elements configuration management, with
centralized configuration file backup and rollback. HighCapNMSs
configuration broadcast and software download utilities help the NMS user to
manage groups of network elements.
Performance management
Scheduled polling allows users to monitor network activity in real time and to
keep historical performance monitoring information for future usage. For a
more in-depth understanding of network performance, HighCapNMS Clients
reporting interface is designed to help users identify activity patterns and
anticipate problems before they occur.
Inventory and performance reports can be generated for the entire network,
or for a selected subnet, group, trail, or service. Inventory reports provide
information about HighCapRadio network element interfaces and links in the
system. Performance reports provide information about radio, interface, and
trail performance.
Network security
HighCapNMS is a secure system that enables administrators to control who
uses the system, and which parts of the system can be accessed. Security is
maintained by a combination of user access control features, audit logging,
and secured interfaces.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 6 of 88
Permissions are assigned to groups on a feature-by-feature basis. User access
rights determine which parts of the network a user can view, and which
operations users can perform for each subnet.
1.1 HighCapNMS features overview
1.1.1 Automatic discovery of network topology

Auto discovery of network entities, including network elements, subnets,
multi-line, multi radio, and protected links.
Flexible discovery scope configuration options.
Multi link map discovery and display.
Pre-scheduled network discovery at daily, weekly, and/or monthly
intervals.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 7 of 88
1.1.2 Global fault management

Comprehensive alarm interface, including dedicated management, trail,
and service alarms.
Alarm details include probable causes and suggestions for corrective
actions.
Graphic representation of alarm severity levels.
Alarm history and user action logs show performed on alarms.
Configurable alarm filtering.
Alarm synchronization toward southbound and northbound interfaces.
Alarm history including raise/clear time and actions performed on an
alarm.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 8 of 88
1.1.3 Network element configuration management

Global network element administration
Single sign-on with network element managers via HighCapNMS Client
topology maps, service maps, reports, or alarms.
Network elements configuration file backup & rollback
Mass configuration broadcasts
Batch software downloads
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 9 of 88
1.1.4 Network performance management

Generate reports performance and inventory reports for the entire
network or selected groups, subnets or specific network elements.
Sophisticated report filtering for customized views of network status and
performance data
Scheduled report generation via HighCapNMSs command line report
interface.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 10 of 88
1.1.5 End-to-End Ethernet services management

GUI based Ethernet service management,
Automatic, wizard based provisioning of Ethernet services.
Ethernet service topology maps.
Automatic discovery of all Ethernet service paths.
Multiple property based views.
View current Ethernet service related alarms.
xSTP status map.
Ability to exclude specified Ethernet services from NMS management
based on EVC ID or VLAN ID.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 11 of 88
1.1.6 End-to-End TDM trail management
GUI based TDM trail management.
Automated, wizard based TDM trail provisioning.
TDM trail topology maps.
Automatic discovery of primary and secondary TDM trails between two
end points.
TDM trail performance monitoring and reporting.
Manage trail protection, including ABR protection, protected SNCP links,
and dual ended protection.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 12 of 88
1.1.7 Network security management

Feature based permissions.
Subnet based access.
Password encryption and rules enforcing.
Passwords retry ceilings and timeout blocking.
Single sign on with network element managers.
Configure customizable network access.
External user authentication.
Secure authentication and security protocols for all management
interfaces.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 13 of 88
1.1.8 System administration

Comprehensive server configuration options, including redundancy and
synchronization.
GUI or command line scheduling of recurring tasks.
Database backup, repair, & restore.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 14 of 88
2. System architecture
2.1 HighCapNMS server components
The HighCapNMS NMS system includes:
HighCapNMS framework - the foundation on which all HighCapNMS
applications and services run
The HighCapNMS server
HighCapNMS database - a centralized internal MySQL database
HighCapNMS Client application - HighCapRadios NMS GUI
2.1.1 MySQL database
HighCapNMS N7.0 works with embedded MySQL Enterprise Server 5.1. The
database is provided as part of the basic HighCapNMS installation. The MySQL
license must be purchased as part of the purchase order of the HighCapNMS
system from HighCapRadio.
2.1.2 FTP/ TFTP server
HighCapNMS uses an external FTP server to backup network element
configuration files and to manage software uploads and downloads. NMS users
can use the FTP server to download configuration files from the network
elements, or to upload software updates.
For Windows servers, HighCapNMS expects to find the FileZilla FTP client
installed in its default location (C:\ProgramFiles\FileZilla Server\)
For UNIX servers, HighCapNMS uses the Solaris FTP client, and doesnt
require FileZilla.
2.1.3 XML & HTTP proxy
HighCapNMS has an embedded XML & HTTP proxy that enables connection
between network elements and the HighCapNMS Client when direct
connection between is unavailable.
2.1.4 Server redundancy
HighCapNMS has built-in support for redundancy configuration. With two
HighCapNMS servers, one is configured as the primary server, with the
secondary server configured for standby mode.
2.2 HighCapNMS Client GUI
HighCapNMSs network management GUI, HighCapNMS Client, enables fast
and easy design of multi-layered network element maps, and helps manage
the network from the initial deployment stage through ongoing maintenance
and configuration procedures.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 15 of 88
With full support for todays mixed network topologies, HighCapNMSs
network management GUI enables maximum flexibility in network operation,
planning and design.
2.2.1 Network topology maps
The topology map shows both physical and logical links between network
entities. When there are multiple physical links between two network-
elements, HighCapNMS Client treats them all as separate links. Logical links
can be configured for Ethernet traffic.
Actions are performed on the current selection. For most operations,
actions will be applied to all the sub-elements that are included in the
selection.
The main window presents a map of the network topology, with a topology
tree in the Navigator panel on the left.
Alarm severity of map entities is represented by color.
Mouse over a network element to display its tooltip, with information
about the network element: its user defined name, its system name, IP, and
alarm severity.
Double clicking an icon opens the Element Manager of a single network
element.
Double clicking a group of network elements opens a map of the group.
2.2.2 Navigator panel topology tree
HighCapNMS Clients topology tree provides a logical view of network
topology. NMS users can drill down to see all the subnets in their view of
network, and all of the elements in each subnet.
2.3 Management interfaces
HighCapNMS supports three different management interfaces for network
management access:
Northbound interface (SNMP, NetAct ESYMAC)
Reports interface CLI reports interface
Southbound interface (SNMP, XML over HTTP)
2.3.1 Northbound interfaces
SNMP Interface toward OSS / Other NMS platforms
HighCapNMSs SNMP agent provides a system-wide active alarm table, which
the northbound OSSs can poll when needed.
HighCapNMS can be configured to forward network elements server
management traps to a predefined server IP address (OSS server).
Northbound alarm synchronization towards a higher level NMS / OSS is
available. An external OSS can poll the alarms counter and the current alarm
table through SNMP.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 16 of 88
NetAct ESYMAC
HighCapNMS supports the NSN open OAM interface for integration with OSS
level network management systems. Via this interface, faults, topology, and
performance data can be sent to the northbound OSS.
2.3.2 CLI report interface
HighCapNMS allows system administrators to perform many server related
tasks via the command line.
The CLI interface can be used to generate performance monitoring and
inventory data reports for higher level OSS usage. The CLI also allows access
to the HighCapNMS system for specific tasks, such as starting or stopping the
server, exporting and importing data, or scheduling recurring reports.
2.3.3 SNMP southbound interface
HighCapNMSs NMS supports monitoring and configuring of network elements
via the SNMP interface. In addition to logging alarms which have been
received through SNMP traps, HighCapNMS includes an alarm synchronization
mechanism that automatically creates and generates traps for alarms that
were sent by the network element but didn't reach the HighCapNMS server.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 17 of 88
3. HighCapNMS features
3.1 GUI based network management
HighCapNMSs client interface provides centralized, GUI based access to all
network management functionality.
View and manage network entity alarms.
Current alarm status is built into the topology GUI. All map entities are
color coded according to alarm severity. If there is more than one alarm
configured for a network entity, the map entity will display the color of the
most severe alarm.
Perform global configuration operations such as configuration broadcasts
and software downloads.
Monitor network element status and performance.
Define customized, feature based access to network elements.
Manage network traffic services.
Open network element EMS from HighCapNMS Client topology maps,
alarm lists, or reports to configure parameters for a selected network
element.
3.1.1 Adding network elements to a network topology map
There are three ways to add network elements to a network topology map:
Each method is appropriate for different stages of network management.
Using auto discovery
Auto discovery finds existing network elements, links, and alarms. As
HighCapNMS is designed to manage large networks, auto discovery is the
recommended way to initialize network topology maps.
Manually adding network elements
NMS users can manually add network elements to a group or subnet. This
is useful for adding specific units to a discovered topology, and for
designing changes to network topology.
Importing map data
NMS users can also import saved network topology. Note that importing
map data will overwrite any changes that were made after exporting the
map data.
3.1.2 Network auto discovery
The HighCapNMS Client provides auto discovery of network entities, including
network elements, subnets, multi-line, multi radio, and protected links. Auto
discovery can be performed on a timer, enabling users to schedule network
discovery for specific times on a regular daily, weekly, and/or monthly basis.
Users can define the range of the discovery scope according to IP range or
subnet, or a combination of both. HighCapNMS Client allows users to choose
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 18 of 88
between different protocols and authentication methods for each type of
discovery scope.
The auto discovery utility is able to identify any network entity with an IP
address, including third party elements and elements with floating IP
addresses.
3.1.3 Network rediscovery
When an element is first added to the map, HighCapNMS automatically reads
the elements static information.
There are a number of rediscovery options that will update the network
topology map with current data. Each discovery feature has a distinct purpose.
Users can perform a Discover node operation to re-discover the element's
properties. Discover node replaces existing information, including stored
reports, with the new data.
Users can perform a Poll node operation for a selection of discovered
network elements to retrieve current performance and availability status.
Users can also Refresh topology maps to display the most current data
from the server.
3.1.4 Grouping and linking network elements
Users can create an unlimited number of levels in the map by grouping
network elements. Groups that are added to the map will also be added to the
topology panel on the left.
Users can differentiate between groups by establishing logical naming
conventions, choosing the appropriate icon to represent each group, and by
defining group backgrounds.
Links in the map show how elements and groups are connected in the
network. Multiple link configurations, such as multi-radio links, aggregated
links, and 2+2 configurations, are represented by corresponding link types.
During the Auto discovery process, HighCapNMS also searches for
connectivity between elements. When connections are found, HighCapNMS
automatically identifies the type of link and adds links the connected elements
on the topology map.
If more than two elements are found to be linked, HighCapNMS automatically
creates a sub-group, and moves the linked elements to that sub-group.
If a user moves linked network elements or groups, the links between them
will be moved as well. If the elements have links to other elements that are not
to be moved, the links will be deleted instead.
3.1.5 Network hierarchy and the Navigator topology tree
HighCapNMS Client's Navigator panel displays a hierarchical view of network
topology. Network entities are automatically arranged on the topology tree
according to subnet. Users can drill down to see all the subnets in the network,
and all of the sub-elements of on that subnet.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 19 of 88
HighCapNMS operates in a hierarchical manner. Most operations apply to the
selected network elements, including all the sub-elements in the selection.
HighCapNMS supports up to seven levels of hierarchy.
3.2 Fault and alarms management
HighCapNMS enables global management of network entity alarms with
comprehensive alarm reporting.
3.2.1 Network entity alarms
Network operators can view current or historical alarms for a group, subnet,
network element, or for the entire network.
In terms of functionality, the alarm lists are similar to the network element
EMS reports. Users can view, filter, print, and save the current alarms, alarm
triggers, and the alarm history logs.
3.2.2 HighCapNMSs alarms interface
The alarms interface provides details of each alarm, including the alarm type
and severity, raise and clear time, probable causes, and corrective actions.
After viewing an alarms details, an NMS user may:
Acknowledge the alarm, or to perform a collective acknowledgement for a
selection of alarms.
Add a note to the alarm, without acknowledging the alarm.
Reset an acknowledged alarm to unacknowledged.
Set the alarm to hidden so that it will no longer appear in the alarm lists.
Users will be prompted to add a note about the hidden alarm.
Show hidden alarms, or remove hidden status from an alarm.
The acknowledge state of an alarm, alarm descriptions, and alarm messages
can all be used to help find the alarm when viewing the alarm or user actions
logs.
3.2.3 Viewing top most alarm severity
Additionally, all map entities, including network elements, links, trails, and
services, are color coded, with the color indicating the status of the top most
current alarm.
3.2.4 Viewing alarm history
The list of current alarms helps users to identify which items require
immediate action, for example, recurring events that may require preventative
measures.
Network administrators can specify how long to keep alarm log information,
with the exception of raised alarms which are kept in the alarm history log
until they are cleared.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 20 of 88
3.2.5 Network management alarms
Management alarms keep users informed about the state of their networks.
For example, network management alarms will forward a trap if the NMS
loses connectivity with a network element, if the network is unable to switch
to a standby server, if the server is running low on disk space, or if a license is
about to expire.
3.2.6 Alarm triggers
Alarm triggers and trap generation complement scheduled polling intervals,
providing real time alerts about loss of radio frames, surpassing capacity
thresholds and network element level issues that affect network services.
Trigger configuration allows users to define activation conditions and
activation operations for raising alarms.
Activation conditions can be based on alarm severity, alarm type, alarm
description, or acknowledged status.
For example, users can enable a Severity trigger by selecting one or
more alarm severities or activate a trigger when specific characters are
detected in the alarm text.
Activation operations include displaying messages, sound alarms, sending
email, forwarding traps, and customized executables.
3.3 Configuration management
HighCapNMS simplifies management of network elements by enabling global
administration of network element configuration.
HighCapNMS simplifies network elements configuration management, with
centralized configuration file backup and rollback. HighCapNMSs broadcast
configuration and software download utilities help the NMS user to manage
groups of network elements.
3.3.1 Network element configuration backup & restore
HighCapNMS reads network element configuration data during its user
defined polling intervals. Network element configuration data is stored in
configuration files on the NMS database.
Network administrators can use these files to restore network elements to the
latest functioned configuration.
3.3.2 Mass configuration broadcast
HighCapNMSs broadcast configuration and software download utilities help
the NMS user to manage groups of network elements.
HighCapNMSs broadcast configuration utility allows users to set attributes or
modify configuration parameters for selections of network elements
according to type of element, subnet, or other common feature.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 21 of 88
3.3.3 Mass software downloads
HighCapNMSs smart software download utility allows users to perform
simultaneous upgrades of multiple units. As with mass configuration
broadcast, if a selection includes sub-elements, the download will apply to all
the sub-elements as well.
HighCapNMS uses a customized version of its software download utility to
provide automatic client upgrades.
3.3.4 NMS client auto upgrade
When upgrading from N6.7 or higher, HighCapNMSs smart upgrade utility
will find all HighCapNMS Clients on the network, and will perform automatic
upgrades from the previous two releases, for clients running versions N6.7
and higher.
3.4 Traffic services management
HighCapNMS includes a service management GUI for provisioning,
configuration, monitoring and management of Ethernet service and TDM
trails. Service view provides Wizard based provisioning, service topology
maps, and GUI driven configuration of service paths and trails.
3.4.1 End-to-end Ethernet services management
Note that the IP tables for target service access points must be pre-configured
through the network element web EMS or CLI.
Ethernet level connectivity must be preconfigured manually; otherwise
HighCapNMS will not recognize the Ethernet ports neighbors. Additionally,
ports must be enabled and configured for all the network elements for the
target service.
HighCapNMSs end to end Ethernet service management is available for:
XPAND IP R1 release I6.3.2 and above
IDU-G and IDU-E release I6.7 and above
3.4.1.1 GUI based service management
The Ethernet services GUI simplifies configuration and management of
Ethernet service paths.
Service view provides GUI based access to all service attributes:
Provision and configure new Ethernet services.
Edit service access points and service network point parameters.
Repair services whose operational status is unknown, broken, or partially
configured.
Update service status.
Poll a service to update the service topology map with the current status
and alarms.
View and manage service related alarms for network elements along the
service path.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 22 of 88
View real time operational status of xSTP rings.
Remove services.
3.4.1.2 Wizard based provisioning
Wizard based provisioning wizard automates configuration of Ethernet
service paths.
The Ethernet services wizard automates provisioning of E-LINE and E-LAN
services. HighCapNMSs auto discovery searches for paths between two or
more selected service access point.
3.4.1.3 xSTP status maps
STP ensures a loop-free topology for any bridged LAN. Spanning Tree allows a
network design to include spare (redundant) links for automatic backup
paths, needed for cases in which an active link fails. The backup paths can be
included with no danger of bridge loops, or the need for manual
enabling/disabling of the backup links. Bridge loops must be avoided since
they result in network flooding.
Users can choose between the Fast Ring RSTP and the standard RSTP
protocols as defined in IEEE 802.1D.
RSTP and Ring RSTP algorithms are designed to create loop-free topologies in
any network design, which makes it sub-optimal to ring topologies.
3.4.1.4 Excluding Ethernet services from NMS management
HighCapNMS enables users to configure and maintain a list of services that
will not be managed inHighCapNMS. This enables users to prevent services
that do not need to be managed in HighCapNMS from taking up network
resources. For example, the network may include management services that
traverse a large number of network elements, some of which are not managed
byHighCapNMS. By adding these services to the Unmanaged EVCs list, users
can conserve network resources and simplify management of the services that
do need to be managed in HighCapNMS.
Users can add an Ethernet service to the Unmanaged EVCs list based on the
services VLAN ID or EVC ID.
3.4.2 End-to-end TDM trail management
HighCapNMSs end-to-end trail management allows comprehensive trail
definitions and configuration of trail properties and status information such as
alarms, operational status and performance monitoring.
3.4.2.1 GUI based TDM trail management
The TDM trail GUI simplifies configuration and management of TDM trails,
providing access to all trail parameters:
Add trail protection to an unprotected trail.
Manage trail protection by specifying which will be the primary trail and
which will be the secondary trail.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 23 of 88
Generate trail performance reports from the HighCapNMS Client GUI, or
schedule recurring reports using HighCapNMSs command line report
interface.
View trail related alarms.
Poll trails to update the trail map with current availability and alarm
status data.
3.4.2.2 Automatic provisioning of TDM trails
Wizard based provisioning wizard automates configuration of TDM trails.
HighCapNMSs auto discovery searches for the most efficient trail between
two selected end points.
HighCapNMS calculates the trail path using information from the network
elements. Links between network elements along the target trail must be
discovered and TDM enabled for the system to automatically provision a TDM
trail.
3.5 Connectivity Fault Management (CFM)
HighCapNMS supports CFM for IDU-G and IDU-E network elements that meet
the following requirements:
Network element must be running software version I6.9 or higher.
Network element must be configured to Metro Switch or Managed Switch
switching mode.
You can use HighCapNMS to configure Maintenance Associations (MAs) on
Ethernet services. HighCapNMS calculates the service points (SPs) on the
service that belong to network elements that are supported for CFM and meet
the other criteria membership in the MA, and creates the MA, creating the
necessary Maintenance End Points (MEPs) and Maintenance Intermediate
Points (MIPs) on the network elements.
MAs perform continuity checks at defined intervals by sending Continuity
Check Messages (CCMs). CCMs are heartbeat messages exchanged periodically
between all the MEPs in an Ethernet service. Each MEP sends out multicast
CCMs and receives CCMs from all the other MEPs in the service, known as peer
MEPs. This enables each MEP to discover its peer MEPs, and to verify
connectivity among them. MIPs also receive CCMs, which they use to build a
MAC learning database that is used when responding to a linktrace.
You can perform a loopback from any MEP on a defined MA. Loopbacks verify
connectivity between a MEP and all the other MEPs and MIPs on the MA.
3.6 Performance management
Scheduled polling allows users to store historical data and to monitor network
level activity in near real time.
HighCapNMS Client reporting interface is designed to help users identify
activity patterns and anticipate problems before they occur. Report specific
filters allow for customized report generation.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 24 of 88
Inventory and performance reports can be generated for the entire network,
or for a selected subnet, group, trail, or service.
In addition to the built-in reports, the Service view reporting interface
displays Ethernet service and TDM trail status information.
3.6.1 Inventory management
HighCapNMS retrieves inventory information from all managed network
elements. Inventory data is available to users via 14 built-in predefined
reports.
Inventory reports provide information about HighCapRadio interfaces and
links in the system.
3.6.2 Performance monitoring
Comprehensive PMs for network entities are available via the built in
Performance reports.
Performance reports provide information about radio, interface, and trail
performance.
3.7 Security
HighCapNMS is a secure system that enables administrators to control who
uses the system, and which parts of the system can be accessed.
Security is maintained by a combination of user access control features, audit
logging, and secured interfaces.
Permissions are assigned to groups on a feature by feature basis. User access
rights determine which parts of the network a user can view, and which
operations users can perform for each subnet.
3.7.1 User access control
User access configuration determines which parts of the network a user can
view, and which operations users can perform for each subnet.
In effect, user access rights create a personalized view of the network for each
user.
3.7.1.1 Personalize view per user
Network topology and service maps are saved in the database per user.
When network operators open their clients, they see only the map for the
network where theyve been granted access.
Discovery and configuration scope, alarm lists, traffic service management,
and reports are all limited to the IP range and subnets where users have
access rights.
For example, the list of current alarms that a network operator sees is actually
only a subset of the list of alarms that will be displayed to an Admin-Security
user who has access rights to the entire network.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 25 of 88
3.7.1.2 Domain based group permissions and subnet based access rights
The set of operations that network operator may perform within their allowed
subnets is further limited by the permissions that are defined for each group.
Users are assigned to one group per subnet; however, they may be assigned to
a different group with different permissions for each subnet.
Permissions are configured on a feature by feature basis for each group.
3.7.1.3 Password security configuration
Administrators can enforce password security by enabling minimum
password length, password complexity, and password aging.
By default, passwords must be at least eight characters long and must include
a mix of alphanumeric characters and case.
The default interval for password expiry is one month. New passwords cannot
repeat any of the previous five passwords.
Password compliance is enforced. HighCapNMS will not accept a user
password that does not meet all the configured restrictions.
Password rule settings can be modified by an Admin network administrator.
Passwords information is encrypted on the database.
3.7.1.4 Single sign-on to EMS web clients
HighCapNMS supports single sign-on with IDUWeb EMS.
User name and password for single sign-on are assigned to groups.
Login information to EMS users is assigned to groups that define which
operations users will be able to perform on managed network elements.
For single sign-on with network elements, users must be granted access rights
to the subnet where the network element is located, as a user of a group with
silent login privileges.
3.7.1.5 RADIUS remote user authentication
The RADIUS protocol provides centralized user management services.
HighCapNMS can be configured to function as a RADIUS client for user
authentication.
When RADIUS is enabled, a user attempting to log into the system is not
authenticated locally but rather, his or her credentials are sent to a centralized
standard RADIUS server which indicates to HighCapNMS whether the user is
known, and which privilege is to be given to the user.
RADIUS login works as follows:
If the Radius server is available, users will be authenticated by the RADIUS
server.
If the RADIUS server is not available, the user will be authenticated locally.
If the RADIUS server rejects the user, no further authentication will be
performed locally, and the user will not be able to log in.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 26 of 88
For the user with the user name admin, HighCapNMS enables you to
configure whether this user is authenticated locally or by RADIUS. If you
choose to authenticate the admin user locally, the admin user will always
be authenticated locally and not by RADIUS, even when the RADIUS server
is available.
In order to support privilege levels that are specific for HighCapNMS and for
HighCapRadio network elements, the vendor-specific field must be used.
HighCapRadios IANA number for this field is 2281.
The following RADIUS servers are supported:
FreeRADIUS
RADIUS on Windows Server (IAS)
Windows Server 2008
Windows Server 2003
Cisco ACS
3.7.2 Audit logging
3.7.2.1 Monitoring and managing connected NMS users
Admin users can view actions performed by connected users.
The connected users report displays the user name, the IP address of network
element on which an action is being performed, and the protocol used to
connect to the network element.
The network administrator can send messages or disconnect connected users.
3.7.2.2 User action log
HighCapNMS records all user actions performed over the past day. The log
records details about each operation performed by every system user.
The User action log displays the username, location, and details about the
operation that was performed.
When Web EMS is connected to the network elements via HighCapNMS, Web
EMS operations will be included in the user action log.
3.8 System administration
3.8.1 Task scheduler
HighCapNMSs task scheduler allows network administrators to set up
recurring tasks such as database checks and automatic database backup.
While HighCapNMSs command line interface only allows specific,
HighCapNMS supported executables, HighCapNMS Clients task schedule
allows users to set up customized executables as recurring tasks.
HighCapRadio recommends adding database and configuration backup as
daily tasks. Database backup and repair can also be performed using
HighCapNMSs command line interface.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 27 of 88
3.8.2 Database management
HighCapNMS stores performance monitoring data, network element
inventory, alarm and user action history, map topology, user definitions, and
configuration backups for all network entities.
The system is preconfigured with recommended but customizable - log
limits.
Polling data, alarm history and user action logs are stored for a user-
specified period of time in the server database.
Configuration backup saves the four most recent snapshots.
Network map topology, alarm triggers, and scheduled tasks are saved per
user.
3.8.3 Server redundancy and synchronization
HighCapNMS has built-in support for server redundancy.
When redundancy is enabled, network operators can configure redundancy
thresholds and synchronization options.
By default, data is synchronized from the primary to the secondary server. The
administrator can also set the synchronization for both ways, or disable it
altogether.
3.9 HighCapNMSs server redundancy
3.9.1 HighCapNMSs redundant server configuration
HighCapNMS has built-in support for redundancy configuration. This
configuration includes two HighCapNMS servers: a primary server, which is
generally active, and a secondary server, which is generally located at
a geographically remote site and is in standby mode.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 28 of 88
HighCapNMS redundancy schema

Redundancy requires that databases in both servers remain synchronized:
topology changes, including adding and deleting network elements, must be
synchronized across both databases.
By default, data is synchronized from the primary to the secondary server. The
administrator can also set the synchronization for both ways, or disable it
altogether.
In a redundant server configuration, data that is imperative for the well
functioning of the servers, such as topology and security information, is
usually synchronized from the primary to the secondary server.
Administrators can also set synchronization to work in both directions, or
disable it altogether.
Topology data, trigger definitions, and security settings are included in the
synchronization.
Configuration settings may differ between servers and are not included in
the synchronization process.
3.9.2 The role of the secondary server
While a secondary server is on standby, its server duties are usually limited to
polling network elements. By default, a secondary server will poll only for
alarms, but network administrators can configure the secondary to poll also
for inventory information and PMs.
Administrators who are concerned about the toll of two servers polling the
network can also configure the secondary server to not do any polling at all.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 29 of 88
When a secondary server becomes active, it immediately takes over all the
defined tasks of the main server. It immediately begins polling the network,
activating triggers, and forwarding traps.
A secondary server takes over automatically when:
It loses connection with the main server.
The main server loses connection to HighCapNMS clients.
The network administrator forces the secondary server to be active mode.
A secondary server resumes standby mode when:
When the main server is active.
3.9.3 Activation operations for a standby server
If the main server is down, the standby server can be configured to
automatically take over.
The standby server becomes active when the main server crosses user
specified thresholds, or if it loses connectivity with the main server. When the
main server starts again after a failure, the secondary server returns to
standby mode.
Lost connectivity between the two servers could mean that the main server is
unavailable, but it could also create a situation where both will become active.
If the synchronization mode is both ways, when connectivity is restored, the
main server will get the current topology map from the standby server. When
the synchronization mode is from main to standby, no synchronization action
will be performed when the main server becomes active again.
In all cases, switching to the standby server raises an alarm, and gives users
the option to switch back to the primary server.
If no connection is detected between the main and standby servers for
more than the user defined loss of connectivity threshold:
It will raise the alarm No Connection with Standby Server
In Auto mode, the secondary (standby) server becomes active, and will:
Start sending traps and triggers.
Start accepting client connections.
Raise the management alarm No Connection with Main Server.
Start polling network elements.
When the connection is resumed and is stable:
The main server clears the No Connection with Standby Server alarm.
If in Auto mode, the secondary (standby) server will go to standby mode,
and will:
Clear the management alarm No Connection with Main Server
Notify about new client connections, and send the message Main
server (IP) is active to connected clients.
Stop sending traps and triggers.
Resume limited polling (by default, in standby mode, the secondary
server polls only alarms).
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 30 of 88
When a security file is updated, the standby server reloads the file, and
immediately begins to use it.
Network elements should be configured to send traps to both servers.
3.10 HighCapNMS northbound interface
HighCapNMS's flexible architecture allows it to be used either as a stand-alone
network management system or as a supporting component for an OSS with
an existing NMS.
3.10.1 HighCapNMS northbound integration
HighCapNMS supports all OSS for basic northbound communication, providing
a deeper level of integration with the NSN open OAM. Via this interface,
besides faults performance data is also sent to the northbound NSN Netact
OSS.
HighCapNMSs trap forwarding utility allows integration with OSS network
systems. HighCapNMS can forward SNMP traps that arrive from the devices to
one or more OSS network management systems.
HighCapNMS also includes an SNMP agent that provides a system-wide active
alarm table, which the northbound OSS can poll when needed.
3.10.2 Northbound trap forwarding
HighCapNMS can forward network element traps and events that arrive from
network devices to one or more OSS network management systems. In
addition, HighCapNMS also forwards management alarms, such as security,
license, and redundancy.
Trap forwarding is a two-step process: network elements send traps to the
trap forwarding utility. The trap forwarding utility forwards these traps to
HighCapNMS, encapsulates it, and sends it to the northbound traps
destination.
In the Internet protocol header, the sender IP of the forward trap will be the
HighCapNMS IP.
In the SNMP trap header, the agent address (agent-addr) will contain the
element IP address.
HighCapNMS forwards the same the SNMP version that it receives from the
elements: V1, V2c, V3.
3.10.3 Configuring northbound trap forwarding
Set trap forwarding parameters specific to the OSS network management
application.
To configure northbound trap forwarding settings:
1 Select Start > Programs > HighCapNMS > Trap forwarding config, or
select Settings > Trap forwarding options from the HighCapNMS Client
menu to open the HighCapNMS trap forwarding utility.
2 Select the NetAct Specific tab.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 31 of 88

3 SNMP agent address Specify the IP address.
4 SNMP agent port number Specify the agent port.
5 NMS server ID Define a unique ID for the OSS NMS server.
Note: In the NMS server ID field, you may want to change the
value When multiple NMS servers are connected to the
same NSN server, make sure that each NMS server has a
unique ID.
6 Click Apply to save changes.
7 Click Close to exit the Trap forwarding config utility.
3.10.3.1 Enabling HighCapNMS for northbound trap forwarding
Northbound trap forwarding is configuring using HighCapNMSs trap
forwarding configuration utility.
To enable northbound forwarding, in the Trap Forwarding utility:
1 Set the Trap Forwarding mode to Regular.
2 Specify the host addresses of the target destinations.
3 Specify the listening port number for incoming traps.
To avoid multiple traps being sent to the northbound OSS, network elements
should only send traps to the HighCapNMS traps receiver.
Note that you can customize elements traps by setting the severity level for
sending traps and enabling or disabling heartbeat traps. You can also modify
the polling interval that HighCapNMS uses to poll network elements.
3.10.4 Scheduling reports for the northbound NMS
Report Information: Using the HighCapNMS CLI interface, you can generate
different reports, such as Current alarms, Alarm log, Performance
management, Inventory, and User actions. The reports can be forwarded to
the northbound OSS automatically and periodically (in accordance with user
preference) in plain text or CSV format.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 32 of 88
3.10.5 Scheduling reports for the northbound NMS
Using the HighCapNMS CLI interface, you can generate different reports, such
as Current alarms, Alarm log, Performance management, Inventory, and User
actions.
The reports can either collected or forwarded to the northbound OSS
automatically and periodically (in accordance with user preference), in plain
text or CSV format.
3.10.6 Northbound trap synchronization
When a trap detected from the network element was not received,
HighCapNMS will generate the trap for the network element and send it to the
northbound OSS.
When a trap detected from the network element was not received,
HighCapNMS will generate the trap for the network element and send it to the
northbound OSS. HighCapNMS will raise node down trap (nmsNodeDown
Alarm ID 63, trap ID 401) for the unreachable element. Upon resuming
connection, HighCapNMS will send a node up trap. (nmsNodeUp Alarm ID 63,
trap ID 501).
To enable alarm synchronization:
1 Enable trap forwarding of the nmsAlarmLastChange event.
Note: The nmsAlarmLastChange (1.3.6.1.4.1.2281.2.2.15.1.1) is a
counter that advances every change of the current alarm
table and compares it with the OSS alarms/traps counter.
2 Allow the OSS NMS access to the HighCapNMS alarm table.
Note: If the value is not the same, the OSS must poll the current
HighCapNMS alarm table, nmsCurrentAlarmTable (which
contains all IDU, x1500, HighCapNMS, and 3rd party current
alarms). This will synchronize all alarms in the current
alarm table.
3.10.7 Northbound alarm synchronization
For northbound interfaces, HighCapNMS provides an alarm synchronization
mechanism.
HighCapNMSs SNMP agent provides a system-wide active alarm table, which
the northbound OSSs can poll when needed. An external OSS can poll the
alarms counter and the current alarm table through SNMP.
To enable alarm synchronization, allow the OSS NMS access to the
HighCapNMS alarm table and enable trap forwarding of the
nmsAlarmLastChange event. The nmsAlarmLastChange
(1.3.6.1.4.1.2281.2.2.15.1.1) is a counter that advances every change of the
current alarm table and compares it with the OSS alarms/traps counter.
If the value is not the same, the OSS must poll the current HighCapNMS alarm
table, nmsCurrentAlarmTable (which contains all IDU, x1500, HighCapNMS,
and 3rd party current alarms). This will synchronize all alarms in the current
alarm table.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 33 of 88
3.10.8 Enabling network elements for northbound trap forwarding
HighCapRadio MIB objects to configure traps of network element of IDU
series.
genEquipTrapCfgMgrAdmin
Enables/ disables a specific manager. When disabled - will not send traps to
this trap manager.
genEquipTrapCfgMgrIP
Configures the managers IP address.
genEquipTrapCfgMgrPort
Configures the port that sends the trap for each manager.
genEquipTrapCfgMgrName
Configures the name of the manager that receives the traps.
genEquipTrapCfgMgrCommunity
Configures the trap manager community.
genEquipTrapCfgMgrSeverityFilter
Bit mask value for masking traps according to its severity.
genEquipTrapCfgMgrStatusChangeFilter
Enables or disables filtering alarms according to a change in the trap severity
filter.
genEquipTrapCfgMgrCLLI
Configures the Common Language Location Identifier (CLLI), a user input that
will be sent in a field in the trap varbind
genEquipTrapCfgMgrHeartbeatPeriod
Configures the minute interval between each heartbeat.

HighCapRadio MIB objects to configure traps of network element of 1500
series
gnAgnMgrId
This value indicates an index of a specific manager.

gnAgnMgrIP
This value indicates the managers IP address.
An IP address of all zeroes (0.0.0.0) will remove the entry.

gnAgnMgrAlarmGroupMask
bit mask .1 is 'send a trap' 0 is doesnt send any traps'.
The list of alarms from MSB to LSB is:
bit 1 = Power supply alarm
bit 2 = Cable alarm
bit 3 = Temperature alarm
bit 4 = External alarm
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 34 of 88
bit 5 = Radio alarm
bit 6 = Modem alarm
bit 7 = Line alarm
bit 8 = SDH alarm
bit 9 = BER alarm
bit 10 = System fault alarm
bit 11 = Maintenance alarm
If this field is 0, only standard traps will be sent to the manager

gnAgnMgrSeverityFilter
This is a bit mask value for masking traps according to their severity.
There is a bit for each severity. If the relevant bit is on (1), then the Agent will
send traps with this severity
The list of bits from LSB to MSB:
bit 1 (LSB) = Event.
bit 2 = Warning.
bit 3 = Minor.
bit 4 = Major.
bit 5 (MSB) = Critical.

gnAgnMgrTrapPort
The port for sending the trap for each manager (possible values: 70-65535)

gnGenCfgCLLI
Common Language Location Identifier (maximum length 30 characters).
This string is added as a field in the trap.

gnGenCfgHeartbeatPeriod
Configure the element to send heartbeat trap. The value is in minutes.
Setting the value to 0 disables this feature.

gnGenCfgTrapOption
This item defines various trap options. It is a bitmask: i.e., you can set multiple
options, by doing bitwise OR between their values.
Possible values are:
Standard traps include serial number.
If selected, the unit serial number is added only to the standard traps
such as "Link Down"
Not supported for the 1500P family.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 35 of 88
Use different trap ID for each alarm type.
This option normally should be set, otherwise, the traps are grouped
together, and sent with trap ID 1 to 8.
Send 'Cleared' traps with zero severity.
Otherwise they will be sent with the same severity as the "Raised" trap.
gnGenAddAlarmExtToTraps
If this entry enabled, extended information is added to each HighCapRadio
trap. Those additional parameters are added after the last parameter of the
trap, as defined in the MIB.
Note that HighCapNMS requires this option to be enabled.
3.10.9 Northbound heartbeat trap mechanism
HighCapNMS can be configured to forward heartbeat traps from network
elements to a northbound OSS.
When both IDU and HighCapNMS are configured to send heartbeat
traps to northbound.
1 IDU sends heartbeat traps with ID (specific trap) 1003 to HighCapNMS.
2 HighCapNMS receives the traps encapsulates it and sends it as is to
northbound.
3 Northbound receives heartbeat traps from HighCapNMS with agent
address of IDU and with ID 1003.
4 HighCapNMS sends heartbeat traps with ID (specific trap) 49 to
northbound.
5 Northbound receives heartbeat traps from HighCapNMS with ID 49.
Since HighCapNMS forwards traps to northbound without analyzing the trap
type, alarms will not be raised for missing or resumed heartbeats.
HighCapNMS is notified about unreachable network elements only if the
network element is still down during the next polling cycle.
The way to stop heartbeat trap forwarding is to either disable trap forwarding
from HighCapNMS or to disable forwarding of heartbeat traps from the
network elements.
3.11 Network management alarms
HighCapNMS generates several management alarms. Most of the alarms (in
the current alarms and alarm log) can be viewed by selecting the icon
representing the HighCapNMS server in HighCapNMS Client. The server icon
changes color in accordance with the top-most current management alarm
severity.
The only exception is the nmsNodeDown (unreachable element) and
nmsNodeUp (element is reachable) alarms, which are generated by the
HighCapNMS server according to the connectivity to the network element.
These alarms are raised on behalf of the network element itself (as if it was
sent by the element).
Note that all management alarms are forwarded to northbound systems (if
HighCapNMS is configured to forward alarms to the northbound OSS).
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 36 of 88
3.11.1.1 Management raise alarms
Alarm name Description ID Severity
nmsNodeDown Sent when the NMS loses
connection with a network element.
401 Node
down
nmsSecurityFailure Sent if a user fails three sequential
login attempts to the NMS system.
402 Event
nmsPrimaryServerConfigMismatch Sent when a secondary standby
server tries to connect to stand-alone
server.
403 Major
nmsSecondaryServerNotConnected Sent by a primary server when it
loses connection to the secondary
standby server.
404 Major
nmsLicenseExpiresInLessThanTwoWeeks Sent by a main server when license
file expires in less than two weeks.
405 Warning
nmsLicenseExpired Sent by a main server when the
license file has expired.
406 Major
nmsNetworkElementNumExceedsLimit Sent by a main server when the
number of network elements
exceeds the license limit.
407 Major
nmsFailedLoadingLicenseFile Sent by a main server when it fails to
load a license file.
408 Major
nmsTftpServerAlreadyRunning Sent when TFTP port is bound by
another process.
409 Major
userDisconnected Sent when a user is disconnected by
another user.
410 Event
nmsPrimaryServerVerMismatch Sent when a secondary standby
server tries to connect to a main
server with a different NMS version.
411 Major
nmsEsymacNotConnected Sent when the server cannot
communicate with ESYMAC
services.
412 Major
nmsPrimaryServerNotConnected Sent by a secondary standby server
when it loses connection to the
primary server.
413 Major
nmsEnabledFeatureSetNotLicensed Sent when an enabled feature set is
not licensed.
414 Major
nmsFreeDiskSpaceTooLow Sent when the free disk space on the
main disk is below the configured
threshold.
415 Major
nmsCpuLoadTooHigh Sent when average system load is
above the configured threshold.
416 Major
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 37 of 88
Alarm name Description ID Severity
nmsProtectionSwitchOccurred Sent when a protection switch occurs
between the main slots in a network
element
417 Major
nmsPrimaryAndSecondaryServersAreActive Sent by a primary server (Main) and
by the secondary server (Standby)
when both servers are in active
mode in case the percentage of
unreachable NE in the main server
crossed the configured threshold.
The trap description includes the
following format: 'Percentage of
unreachable elements in main server
is over threshold Raised'.
418 Major
nmsFloatingIpAdded Sent when a floating IP is added to a
network element.
The trap description includes the
main (non floating) IP of the network
element in the following format:
'Alarm from IP <IP>: Floating IP
added'.
419 Minor
nmsConfigurationChange Management trap: NMS
configuration change event:
For each configuration change, The
description of the event shall be the
same description that being logged in
the Users Action Log concatenated
with the three fields
- Application
- User name
- Connected From
- Description + Details (in { })
421 Warning
3.11.1.2 Management clear alarms
Alarm name Description ID
nmsNodeUp Sent when the NMS resumes connection with
a previously disconnected network element.
501
nmsPrimaryServerConfigOK Sent when a secondary standby server
connects to a main server
503
nmsSecondaryServerConnected Sent by a primary server when it reconnects
to the secondary standby server
504
nmsLicenseExpiresInMoreThanTwoWeeks Sent by a main server when license file
expires in more than two weeks.
505
nmsLicenseDoesNotExpire Sent by a main server when license file does
not expire.
506
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 38 of 88
Alarm name Description ID
nmsNetworkElementNumWithinLimit Sent by a main server when the number of
network elements is back within the license
limit.
507
nmsSuccededLoadingLicenseFile Sent by a main server after successfully
loading the license file.
508
nmsTftpServerStartRunning Sent when the TFTP server successfully
binds the TFTP port.
509
nmsPrimaryServerVerMismatchOK Sent when a secondary standby server
connects to a main server.
511
nmsEsymacConnected Sent when server can communicate with
ESYMAC services.
512
nmsPrimaryServerConnected Sent by a secondary standby server when it
reconnects to the primary server.
513
nmsLicenseConfigurationMismatchRemoved Sent when a license configuration mismatch
is resolved.
514
nmsFreeDiskSpaceOK Clears the free disk space alert. It is sent
when the free disk space of the main disk is
back above the configured threshold.
515
nmsCpuLoadOK Clears the high CPU load alert. It is sent
when the average system load is back to
below the configured threshold.
516
nmsPrimaryAndSecondaryServersAreNotActive Sent by a primary server (Main) and by the
secondary server (Standby) when both
servers are no longer both in active mode.
518
nmsFloatingIpCleared Clears the alert that was sent when a floating
IP was added to a network element.
519
3.11.2 Ethernet service related alarms
3.11.2.1 Service related network element alarms
Alarm description Alarm ID
Mute 410
FE Loss of carrier on port #n (n = 3,4,5,6,7) 401
Ethernet gigabit loss of carrier (port 1 or 2) 403
SFP is not inserted (port1 or 2) 404
SFP malfunction (port 1 or 2) 405
GBE TX mute override 406
Loss of frame on radio 603
IF loopback 1601
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 39 of 88
Alarm description Alarm ID
RF loopback 1722
ODU TX mute 1735
3.11.2.2 Ethernet service related management alarms
Alarm name Description ID
nmsNodeDown Sent when the NMS loses connection with a network element. 401
nmsNodeUp Sent when the NMS resumes connection with a previously
disconnected network element.
501
3.11.3 Trail alarms
Name ID Description Severity Origin Probable Cause Corrective Action
lvds-backplane-
error-main
728 Errors in TDM
backplane
channel for
slot # %1.
Major IDU Extension or main
unit equipment
failure.
Backplane failure.
Reinsert unit.
Power-cycle unit.
Replace unit.
Check backplane.
lvds-backplane-
error-extn
729 Errors in TDM
backplane
channel in
connection with
main.
Major IDU Extension or main
unit equipment
failure.
Backplane failure.
Reinsert unit.
Power-cycle unit.
Replace unit.
Check backplane.
lvds-db-error 730 Errors in TDM
channel in
connection with
T-card.
Major IDU IDU HW failure.
T-card HW failure.
Reinsert unit.
Power-cycle unit.
Replace T-card.
Replace IDU.
eeprom-
access-failure
2201 Error in TDM
drawer type
detection
Major IDU Inserted drawer
not supported.
Hardware error.
Make sure drawer is
properly inserted.
Power cycle the
system.
Replace drawer
bp-lof-alarm 2301 TDM backplane
LOF for slot
#%1.
Critical IDU Extension or main
unit equipment
failure.
Backplane failure.
Reinsert unit.
Power-cycle unit.
Check backplane.
idu-presence-
not-detected
2304 IDU #%1
presence not
detected.
Minor IDU IDU with TDM trails
mapped to it was
extracted from
shelf.
Insert IDU in shelf.
Delete relevant TDM
trails
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 40 of 88
Name ID Description Severity Origin Probable Cause Corrective Action
extension-bp-
lof
2402 TDM backplane
LOF in
connection with
main.
Critical IDU Extension or main
unit equipment
failure.
Backplane failure.
Re-insert unit.
Power-cycle unit.
Check backplane
failure-in-one-
or-more-tdm-
trails
2403 Failure in one
or more TDM
trails.
Warning IDU Network TDM trail
configuration error.
Signal failure in
TDM trail - this
may be due to
equipment failure
or AIS at the line
input.
Excessive BER in
TDM trail.
Signal degrade in
TDM trail.
Check TDM trails
status.
invalid-trail-
status-change
2406 Invalid trail
status change
%1 in trail %2.
Major IDU Trail end-point
failure detected for
one or more trails.
Trail end-point
failure cleared for
one or more trails.
Perform reset in
end-point IDU if
exists.
Replace end-point
IDU.
trail-excessive-
BER-change
2407 Trail excessive
BER status
change %1 in
trail %2.
Major IDU Trail excessive
BER detected for
one or more trails.
Trail excessive
BER cleared for
one or more trails.
Check links and
equipment alarms
along the TDM trail.
trail-id-
mismatch
2408 Trail ID
mismatch in at
least one trail.
Warning IDU Trail ID spelling
difference between
trail ends.
Network TDM trail
configuration error.
Errors in incoming
signal.
Check trail ID at
both ends of the
trail.
Check network trail
configuration.
Check trail
performance (BER)
along the trail path
and fix errored links
if needed.
trail-id-
mismatch-
change
2409 Trail ID
mismatch
status change
%1 in trail %2.
Warning IDU Trail ID mismatch
detected for one or
more trails.
Trail ID mismatch
cleared for one or
more trails.
Check trail ID at
both ends of the
trail.
Check network trail
configuration.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 41 of 88
Name ID Description Severity Origin Probable Cause Corrective Action
trail-protected-
forced-active
2410 Trail ID: %1,
path: %2 forced
active.
Warning IDU User command
force active.
Set force active to
"none" for this trail.
trail-protected-
switch
2411 Trail protection
switch
performed in
trail %1 due to
%2.
Warning IDU Signal failure along
the active trail's
path.
User issued force
active command to
stand-by path.
NA
trail-signal-
degrade-
change
2412 Trail signal
degrade status
change %1 in
trail %2.
Minor IDU Trail signal
degrade detected
for one or more
trails.
Trail signal
degrade cleared
for one or more
trails.
Check links and
equipment alarms
along the TDM trail.
trails-mapped-
to-inexistent-
interfaces
2413 Trails mapped
to inexistent
interfaces in
IDU #%1.
Warning IDU One or more
components were
extracted from the
system since trails
were defined.
Radio scripts have
been replaced by
narrower scripts
since trails were
defined.
Replace missing
components (IDUs,
T-cards).
Make sure radio
scripts support
required number of
E1/DS1 trails
through radio.
Delete relevant
trails.
trail-signal-
failure-change
2414 Trail signal
failure status
change %1 in
trail %2.
Warning IDU (1) Fade in a link
along the trail.
(2) Equipment
failure in a network
element along the
trail.
(3) Trail not
properly
provisioned along
the path.
Check links,
equipment alarms
and trail
configuration along
the TDM trail.
illegal-trail-
configuration
2415 Conflicting trails
are configured
in protected
IDUs %1 and
%2.
Warning IDU Protection was
enabled in pair of
IDUs between
which trails were
previously
configured.
Erase relevant trails.
Disable protection in
pair.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 42 of 88
Name ID Description Severity Origin Probable Cause Corrective Action
stm1-sync-
clock-signal-
failure
2613 STM-1 clock
source signal
failure.
Major IDU Clock source
configured from
wrong VC.
Radio LOF or
equipment failure
along the path of
the
synchronization
trail.
LOS or AIS at the
synchronization
source interface in
the far end of the
trail.
Make sure the
configured VC is the
end-point of the
synchronization trail.
Check status of
synchronization trail.
Check status of
clock source
interface.

HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 43 of 88
3.11.4 Configuring sound alarms
It is possible to configure a sound that will be played when triggered by an
alarm. The sound will be played continuously until the user acknowledges the
alarm.
In the HighCapNMS installation directory, an application called playsound
enables you to configure the sound to be played.
You can run playsound in a command window, using the format:
playsound <sound file name> <message to the user> <severity>
where:
<sound file name> is the name of the file that contains the sound. The value
can be a specific path, or a path relative to the HighCapNMS installation folder.
Several sound files were included with the HighCapNMS installation in the
sound directory in the installation folder.
<message to the user> is a text message that will be displayed for the user in a
window that opens.
<severity> is used to organize the playing of sounds, according to their
severity. If a sound with severity X is triggered by an alarm, and another sound
is triggered by an alarm with severity Y, if Y's severity is greater than that of X
(for example, Y is Major and X is Warning), Y will be played instead of the X. If
Y is not greater than X, X will be played.
PlaySound example
An example of the usage of the playsound application would be to define
different sounds for Major alarms and Critical alarms:
1 Create a trigger.
2 For Severity in the Activate conditions area, select Major.
3 In the Activation operation field, select Run Executable.
Path: playsound
Parameters: sound/bark.au %SEVERITY: %DESCR %#SEVERITY
Execute On: Connected clients
4 Create an additional trigger.
5 For Severity in the Activate conditions area, select Critical.
6 In the Activation operation area, select Run Executable
Path: playsound
Parameters: sound/bong.au %SEVERITY: %DESCR %#SEVERITY
Execute On: Connected clients
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 44 of 88
3.12 Command line interface (CLI)
The CLI executable is a part of the HighCapNMS installation (both client and
server) and therefore the CLI can be activated from any machine on which
HighCapNMS client or server is installed.
There are two common working modes.
CLI runs locally on the server.
The report file is saved in the server machine under a known FTP
directory. Assuming the FTP server is enabled on the HighCapNMS
server machine, a remote machine should fetch the file using an
FTP/SFTP client.
Advantage: The file can be copied via a known protocol (FTP/SFTP)
which is sometimes the only option when dealing with firewalls.
CLI runs on a remote machine
CLI runs as a remote client towards the server. The report is saved on
the remote machine and there is no need for FTP.
Advantages: No need for FTP, the client application copies the file.
3.12.1 CLI scheduling instructions
For Windows, create a batch file containing the desired CLI command.
Schedule it via the Windows scheduler.
For Solaris, create a shell script containing the desired CLI command.
Schedule it via the UNIX crontab application.
3.13 SNMP MIB support
HighCapRadio NMS-MIB functionalities
HighCapNMS supports HighCapRadios proprietary NMS-MIB.
The main functionality of the MIB for HighCapNMS is the current alarm
table.
HighCapNMS MIB uses the current alarm as defined in the HighCapRadio
MIB.
The current alarm table includes:
NMS server alarms
All network element alarms, including alarms for the IDU and the x1500.
In addition to the current alarms there are two scalars:
nmsAlarmLastChange (1.3.6.1.4.1.2281.2.2.15.1.1 ) a counter that
advance every change of the current alarm table.
nmsMostSevereAlarm (1.3.6.1.4.1.2281.2.2.15.1.3( - the most severe alarm
within the current alarm table.
Note the following:
Only SNMP V.1 is supported.
The default Server SNMP port number is 1610 (configurable).
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 45 of 88
The community string for Read only is public.
There are no write permissions for the MIB.
3.13.1 NMS current alarm table (nmsCurrentAlarmTable)
3.13.1.1 NMS current alarm table columns
nmsCurrentAlarmCounter - A running counter of open alarm, the counter
is incremented on every new RAISED trap. It is cleared after reset.
nmsIpAddress The IP address of the NE that the alarm is raised upon. It
could be the NMS servers IP for NMS alarms, or a NE IP for any NE alarm.
nmsCurrentAlarmSeverity The severity of the alarm. The following
severities can be for the alarms
event (1)
warning (3)
minor (7)
major (15)
critical (31)
node down (63) - this is for unreachable NEs raised by the NMS server
only.
nmsCurrentAlarmId - Alarm Identifier (contains alarm type and interface).
Same AlarmId for raise and clear alarms.
nmsCurrentAlarmIfIndex- Interface Index where the alarm occurred,
alarms that are not associated with specific interface will have the
following value (for example, for the x1500):
For IDC related alarms the value is: 65001
For drawer1 related alarms the value is: 65003
For drawer2 related alarms the value is: 65004
If Alarm's origin is bigger than 256, it will be 65000 + the origin
nmsCurrentAlarmOrigin- The origin drawer of the alarm (if applicable,
otherwise it will be idc(2)) other possible values are based on
gnAgnCurrentAlarmOrigin:
Interfaces(1), idc(2), drawer1(3), drawer2(4), unknown(5),
tIdc1(257), tIdc2(258), tIdc3(259), tIdc4(260), tIdc5(261), tIdc6(262),
tIdc7(263), tIdc8(264), tIdc9(265), tDrawer1(513), tDrawer2(514),
tDrawer3(515), tDrawer4(516), tDrawer5(517), tDrawer6(518),
tDrawer7(519), tDrawer8(520), tDrawer9(521), tDrawer10(522),
tDrawer11(523), tDrawer12(524), tDrawer13(525), tDrawer14(526),
tDrawer15(527), tXC1(769), tXC2(770), tXC3(771), tXC4(772),
tXC5(773), tXC6(774)
nmsCurrentAlarmUnit- The unit of the alarm, possible values are:
idc(2), odu(3), mux(4), modem(5), drawer(6), unknown(7), xc(9)
ODU (101)
nmsCurrentAlarmTrapID- The trap ID of the RAISED trap that was sent
when this alarm was raised.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 46 of 88
nmsCurrentAlarmTimeT Timestamp of this alarm, this number is the
seconds from midnight 1.1.1970
nmsCurrentAlarmText- The alarm display text (same as the text in the sent
trap).
3.13.1.2 IDU/ IDU-G current alarm mapping to the NMS current alarms
Var-bind mapping IDU to NMS current alarms
IDU trap
Var-
Bind/Current
Alarm Column
IDU Var-Bind NMS Var-Bind Comments
Trap var-bind &
current alarm
column
genEquipCurrentAlarmCounter nmsCurrentAlarmCounter No mapping.
The NMS counter is
different from the
NE counter.
Trap var-bind &
current alarm
column
genEquipCurrentAlarmRaisedTimeT nmsCurrentAlarmTimeT Mapping 1:1
Trap var-bind &
current alarm
column
genEquipCurrentAlarmId nmsCurrentAlarmId Mapping 1:1
Trap var-bind &
current alarm
column
genEquipCurrentAlarmInstance NA No mapping
Trap var-bind &
current alarm
column
genEquipCurrentAlarmSeverity nmsCurrentAlarmSeverity Mapping 1:1
Trap var-bind &
current alarm
column
genEquipCurrentAlarmIfIndex nmsCurrentAlarmIfIndex Mapping 1:1
Trap var-bind &
current alarm
column
genEquipCurrentAlarmModule nmsCurrentAlarmUnit Mapping
IDU : 101
ODU : 3 (odu)
Trap var-bind &
current alarm
column
genEquipCurrentAlarmDesc nmsCurrentAlarmText Mapping 1:1
Trap var-bind only genEquipMostSevereAlarm NA No mapping
Trap var-bind only genEquipNetworkAgentIp nmsIpAddress Mapping 1:1
Trap var-bind &
current alarm
column
genEquipCurrentAlarmState NA No mapping (no
need, as only the
raised traps will be
in the table)
Trap var-bind only genEquipTrapCfgMgrCLLI NA No mapping
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 47 of 88
IDU trap
Var-
Bind/Current
Alarm Column
IDU Var-Bind NMS Var-Bind Comments
Trap id NA nmsCurrentAlarmTrapID The trap ID of the
alarm (SNMP v.1)
Current alarm
column only
genEquipCurrentAlarmName
(the parameter and entity in the CLI)
for example 'radio/framer/radio-lof')
NA No mapping
Trap var-bind &
current alarm
column
genEquipCurrentAlarmSlotId nmsCurrentAlarmSlotId 1000 SA IDU
1001 IDU-G slot 1
1002 IDU-G slot 2
1003 IDU-G slot 3
1004 IDU-G slot 4
1005 IDU-G slot 5
1006 IDU-G slot 6
Current alarm
column only
genEquipCurrentAlarmProbableCau
se
nmsCurrentAlarmProbableCaus
e
Alarm Probable
Cause
Current alarm
column only
genEquipCurrentAlarmCorrectiveAct
ions
nmsCurrentAlarmCorrectiveActio
ns
Alarm Corrective
Actions
3.13.2 NMS traps
The list of NMS traps are defined in HighCapRadio NMS MIB, and in the alarm
chapter.
NMS traps are sent with the following var-binds
gnGenCfgTrapSeverity: Severity of the trap (nmsCurrentAlarmSeverity)
gnGenCfgAlarmText: Alarm text (nmsCurrentAlarmText)
gnGenCfgCLLI: Fixed empty string will be sent ("") - not supported
gnAgnCurrentAlarmOrigin: 400 (fixed number) will be sent - not supported
gnAgnCurrentAlarmUnit: 400 (fixed number) will be sent - not supported
gnAgnCurrentAlarmTimeT: Timestamp of this alarm, nmsCurrentAlarmTimeT will be
sent.
gnAgnCurrentAlarmID: For event - 0 (integer), for alarm it will be equal to the trap ID
of the raise alarm (400+).Trap-ids starting from 500 are
always clearing raise alarms starting in 400. There is a
difference of 100 between raise and clear alarms, for
example, Trap 401 is a raise alarm, while 501 is the clear
alarm for it.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 48 of 88
3.14 HighCapNMS predefined report types
3.14.1 Performance monitoring reports
3.14.1.1 Radio performance
Radio channels

HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 49 of 88
Radio MRMC performance

Radio MSE performance

HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 50 of 88
Radio RSL performance

Radio TSL performance

HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 51 of 88
Radio XPI performance

3.14.1.2 Radio Ethernet performance
The Radio Ethernet performance report displays Ethernet service
performance parameters.
Frame error rate

HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 52 of 88
Frame Error Rate (%) is the number of received error frames measured
by the radio Ethernet port, relative to all frames received by the radio
Ethernet port.
Integrity indicates whether the values received at that time and date are
reliable.
An x in the column indicates that the values are not reliable due to a
possible power surge or power failure that occurred at that time.
Throughput

The Throughput parameters displays radio Ethernet throughput statistics
(excluding TDM traffic), measured on the radio port.
Peak Throughput (bps) is the maximum throughput measured during
the last interval.
Average Throughput (bps) is the average throughput measured during
the last interval.
Throughput Exceed (Seconds) is the number of seconds the throughput
exceeded the threshold (configured in the field below the table) during the
last interval.
Integrity indicates whether the values received at that time and date are
reliable.
An x in the column indicates that the values are not reliable due to a
possible power surge or power failure that occurred at that time.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 53 of 88
Capacity

The Capacity parameters displays statistics of the Ethernet capacity (including
Ethernet data and overhead bytes) measured on the radio port.
Peak Capacity (bps) is the maximum capacity measured during the last
interval.
Average Capacity (bps) is the average capacity measured during the last
interval.
Capacity Exceed (Seconds) is the number of seconds the throughput
exceeded the threshold (configured in the field below the table) during the
last interval.
Integrity indicates whether the values received at that time and date are
reliable.
An x in the column indicates that the values are not reliable due to a
possible power surge or power failure that occurred at that time.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 54 of 88
Utilization

The Utilization parameters display statistics of Ethernet utilization (%)
measured on the radio port.
Ethernet utilization is a measurement of actual Ethernet throughput, relative
to the potential Ethernet throughput of the radio (excluding TDM channels).
The Utilization threshold percentage is the utilization threshold percentage
which was specified in the radio unit. Ethernet utilization during the last
interval is displayed as one of five bins: 0-20%, 20-40%, 40-60%, 60-80%, 80-
100%.
Range of Peak Utilization (%) is the maximum utilization measured
during the last interval.
Range of Average Utilization (%) is the average utilization measured
during the last interval.
Utilization Exceed (Seconds) is the number of seconds the value
exceeded the threshold during the last interval.
Integrity indicates whether the values received at that time and date are
reliable.
An x in the column indicates that the values are not reliable due to a
possible power surge or power failure that occurred at that time.

HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 55 of 88
Interface performance reports
The Interface performance report shows performance measurements for line
(E1 / DS1/ STM-1 / OC-3) interfaces.

Date records the time that the data was polled.
UAS is the Unavailable Seconds value of the current interval. The value can
be between 0 and 900 seconds (15 minutes).
ES is the number of seconds during which errors occurred.
SES is the number of severely errored seconds. . Sever errors lasting
longer than 10 seconds are recorded as Unavailable Seconds (UAS).
BBE is the number of background block errors.
The Integrity column indicates whether the values received at that time
and date are reliable.
An x in the column indicates that the values are not reliable due to a
possible power surge or power failure that occurred at that time.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 56 of 88
TDM trail performance report
The TDM trail performance reports shows Bit Error Rate (BER)
measurements for a trail. If TDM trail path protection is enabled, the system
performs measurement on both the primary and secondary paths.

Date records the time that the data was polled.
UAS is the Unavailable Seconds value of the current interval. The value can
be between 0 and 900 seconds (15 minutes).
ES is the number of seconds during which errors occurred.
SES is the number of severely errored seconds. . Sever errors lasting
longer than 10 seconds are recorded as Unavailable Seconds (UAS).
BBE is the number of background block errors.
Number of switches indicates the number of protected switches.
Active path count indicates the number of active paths.
The Integrity column indicates whether the values received at that time
and date are reliable.
An x in the column indicates that the values are not reliable due to a
possible power surge or power failure that occurred at that time.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 57 of 88
3.14.1.3 Inventory reports
In-band reports
In-band management uses the network management software to send
management packets through the same network it is managing.

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
In-band status indicates the management type, either In-band or Out-of-
band.
Element type indicates the type of network element.
Channel indicates user channel availability.
TTL displays the Reply TTL hop number
Subnet address displays the IP address of the subnet.
Subnet mask Displays the subnet mask string describing the network
and host addresses.
Network ID shows the TCP/IP address used to identify the subnet.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 58 of 88
Interface reports
The Interface report presents data polled from network interfaces.

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
Slot displays the number of enabled interfaces out of the total number of
interfaces.
Interfaces indicates the names of available interfaces.
Wayside interface reports if the connector type is RJ-45.
Wayside admin indicates whether the wayside channel is enabled or
disabled.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 59 of 88
Available interfaces report
The Available interfaces report presents the location and availability of
network element radio interfaces.

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
Product type indicates the network element type.
Is radio interface available indicates whether or not radio interface is
available. A radio interface is considered disabled if
The Radio Admin state is set to Disable
A reset was performed, and the operational state is Down.
The local-remote status is unavailable for the interface.
A radio interface is considered enabled if
The RadioAdmin state was set to Disable, but no reset was performed.
Is non-radio interface available indicates availability of non-radio
interface.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 60 of 88
Interface availability reports

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
Slot label Displays the name of the slot unit across the radio link.
Radio Displays the number of enabled radio interfaces out of the total
number available.
E1/DS1 Displays the number of enabled E1 and DS1 interfaces out of the
total number available.
STM-1 / OC-3 Displays the number of enabled STM-1 and OC-3
interfaces out of the total number available.
Optical GE Indicates the number of enabled optical GE interfaces out of
the total number available.
Electrical GE Indicates the number of enabled electrical GE interfaces
out of the total number available.
Combo GE Indicates the number of enabled combo GE interfaces out of
the total number available.
FE Indicates the number of enabled FE ports out of the total number
available.
PWE3 GE Indicates the number of enabled PWE3 GE ports out of the
total number available.
Clock interface Indicates the number of enabled clock interfaces out of
the total number available.
UC Indicates the number of enabled UC interfaces out of the total number
available.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 61 of 88
EoW Indicates the number of Engineering Order Wire (EoW) interfaces
out of the total number available.
WS Indicates the number of enabled wayside Ethernet interfaces out of
the total number available.
Licensing reports
The Licensing report provides data about which licenses are enabled for each
network element.

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
License type indicates the license type.
License code displays license validity code.
Demo admin indicates if the demo license is enabled or disabled.
License per usage indicates the capacity of the license feature.
Demo timer indicates the remaining validity period of the license for
trial or demo licenses.
Feature indicates which feature set is enabled by the license.
License indicates the license status.
Usage configuration indicates if the feature is allowed or not allowed
for the given license.
License model indicates the license model for allowed features.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 62 of 88
Link reports
The Link report provides data about links, such as transmit and receive
frequencies and slot number locations.

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
Transmit frequency indicates the transmit frequency for that end of the
link.
Receive frequency indicates the receive frequency for that end of the
link.
ATPC indicates whether the link is using Ad hoc TCP.
Link reports are unavailable for disabled radio interfaces.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 63 of 88
Neighbors reports
The Neighbors report provides data about the IP addresses of the units on a
link.

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
Interface indicates the interface type and the port number.
Neighbor IP address indicates the IP address of the neighboring
interface.
Neighbor name indicates the system name for the neighboring interface
slot.
Neighbor interface indicates the interface type and the port number for
the neighboring interface.
Neighbor slot number indicates the slot number of the neighboring
interface, or the two slot numbers for a protected unit.
Config manually indicates whether the link can be configured manually.
This option is currently unavailable for Ethernet link types.
Neighbor reports are unavailable for disabled radio interfaces.
Network element reports
The Network element report provides status information and data about
indoor units.
IP address - displays the IP address of the network element.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 64 of 88
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Status indicates the availability of the network element: reachable,
unreachable, or uninvestigated.
Last reachable indicates the last reachable date and time of the network
element.
Applicable only for network elements with a status state of Reachable
or Unreachable.
Name indicates the network elements User defined name.
System name indicates the system name of the network element.
System contact indicates the network user responsible for the network
element.
System location indicates the physical location of the network element.
Product type indicates the type of network element.
Network element visibility reports
The Network element visibility report provides detailed information about the
current availability and status of indoor units.

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot Number If the NE is an IDU R1, or an NE that is not part of the IDU
series, the slot number will be N/A.
Slot Label The user-configured slot label. If no slot label has been
configured, this field is empty.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 65 of 88
Slot Status Indicates the availability of the network element in the slot:
reachable, unreachable, or uninvestigated.
Product type indicates the type of network element.
System name indicates the system name of the network element.
System location indicates the physical location of the network element.
Protection reports
The Protection report provides data about protected configurations in the
network.
Note that for protected IDU-G series network elements HighCapNMS presents
alarms and report data for the IP address of the active slot. Only protected
slots are included in the protection reports.

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
IP displays either:
The IP address of the network elements Slot 1, which acts as the
primary IP address for a protected unit.
The floating IP address for the network element, if it is using floating IP
instead of a permanent IP address.
Mate IP displays the IP address of the secondary slot.
Slot number indicates the slot number of the interface.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 66 of 88
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
For slots enabled with 2+2, protection, the slot number will be the slot
of the primary slot (Slot 1, 3, or 5).
Type indicates the type of protection: 1+1 HSB, 2+2 HSB, or 2+0 HSB
(Multi radio with line protection).
Mode indicates the admin state of the protection, either Active or Standby.
Radio reports
Radio reports display inventory information of outdoor units.


IP address - displays the IP address of the network element.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 67 of 88
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
ODU type displays the product type of the ODU.
Modem type indicates the type of modem in use.
Transmit frequency (MHz) indicates the transmit frequency measured
during the interval.
Receive frequency (MHz) indicates the receive frequency measured
during the interval.
Min transmit frequency (MHz) indicates the minimum received level
measured during the interval.
Max transmit frequency (MHz) indicates the maximum received level
measured during the interval.
Channel spacing (MHz) indicates the allocated bandwidth for the RF
channel
Transmit level indicates the average transmit level for the measured
interval.
ATPC indicates the Automatic Transmit Power Control status (enabled or
disabled).
ATPC reference level indicates the Received Signal Level value.
Link ID displays the link ID.
Admin state reports whether the radio interface is Enabled or Disabled.
Operational status indicates whether the radio is operational.
MultiRadio admin indicates the status of the multi- radio unit (enabled
or disabled).
Serial number reports
The Serial numbers report shows the serial number for each network element.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 68 of 88

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
Slot indicates the name of the slot across the unit.
Type indicates the unit type: IDU or RFU.
Serial# indicates the device ID.
Part# indicates the part number of the interface.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 69 of 88
Slot population reports
The Slot population report shows the IP address of each slot's IDU and its
availability.

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Name indicates the slots system name.
Slot 1-6 indicates the availability status for each slot in the shelf.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 70 of 88
Versions reports
The Versions report provides data about which software and firmware
versions are installed on network elements.
Double-clicking a line in a versions report opens a page with additional
information about the version type.

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
Slot indicates the name of the main slot.
Type indicates the product type.
Version indicates the installed software version on the unit.
Post reset version indicates the updated version after a software
upgrade.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 71 of 88
xSTP reports
The xSTP report provides data about active and inactive xSTP paths.

IP address - displays the IP address of the network element.
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
Admin state indicates if the port is Enabled or Disabled.
Bridge ID indicates the MAC address of the bridge in the active IDU.
Is edge indicates whether the port is a service access point on the ring,
or is functioning as one of the ring edges.
Operational state indicates if the ports operational status is active (UP)
or inactive (DOWN).
Port number indicates which port has been enabled for RSTP traffic.
Bridge priority indicates the specific (ACM?) priority for this interface.
Designated path cost indicates the path cost for this port. The lower the
value the more likely that port is used.
Role indicates the role of the bridge: Root or Designated.
Root ID - The MAC address of the root bridge.
Root Path Cost - The cost of the path from the active IDU to the root
bridge.
State indicates whether the port state is Disable, Forwarding, Learning,
or Blocking.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 72 of 88
xSTP protocol indicates which STP protocol is in use: standard RSTP or
Ring RSTP. If RSTP has been configured but disabled, the xSTP protocol
status will be Disabled.
3.14.1.4 Logs
Alarm log

IP indicates the IP address of the unit where the alarm was raised
Slot number indicates the slot number where the alarm was raised.
Name indicates the system name of the unit where the alarm was raised.
Severity indicates the severity of the alarm.
Ack indicates whether the alarm has been acknowledged: True or False.
Time indicates the raise time of the alarm.
Status indicates the status of the alarm: Raised or Cleared.
Module indicates the type of interface where the alarm was raised.
Description provides a one sentence summary of the alarm. Details
about each alarm, including its probable causes and suggested corrected
actions, are available in a separate window.
Alarm severity
Alarm severity is classified into seven categories.
Alarm severity is represented in the client GUI by colors that correspond
to the alarm severity classes. The color of a map entity indicates its most
severe alarm:
Severity Clear Event Warning Minor Major Critical Node down
Weight 0 1 3 7 15 31 63
Color Green Blue Yellow Orange Dark orange Red Grey
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 73 of 88
User actions log

Action time indicates the date and time of the logged user action.
Application indicates the application where the action was performed.
User name indicates the username of the user who performed the
action.
Connected from indicates the IP address of the user who performed the
action.
Description describes the feature set of the logged action, using the
system command name to describe which action was performed. For
example, Topology, add network element. When available, the log will
add details about the action. Using Add network element as an example,
logged details could include the type of network element that was added
and its IP address.
List of optional user actions for the users actions log report
Operation area Details
Alarms Acknowledge
Alarms Delete alarm from current alarm
Alarms Delete alarm from current alarm
Alarms Delete Alarms
Alarms Hide
Alarms Note
Alarms Show
Configuration Broadcast Run
Configuration Download Run
Connected Users Disconnect User
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 74 of 88
Operation area Details
Connected Users Display Message
Discover Node Run
Dynamic Security Configuration
Edit EVC Configuration
Import Data Run
Login Login HighCapNMS Client
Network Auto Discovery Discover
Topology Remove NE
Run Scheduled Task Run
Software Download Data
Software Download Delete
Software Download Scheduled
Software Download Status
Topology Add Group Element
Topology Add Link
Topology Add Network Element
Topology Add Symbol
Topology Add Text
Topology Configure Group
Topology Configure Link
Topology Configure Network Element
Topology Configure Symbol
Topology Configure Text
Topology Delete Link
Topology Delete Topology Element
Topology Move Element
Topology Relocate Topology Element
Trail Advanced Trail Configuration
Trail Create Trail
Trail Delete Trail
Trail East West Validation
Trail Edit Trail
Trail Fix Trail
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 75 of 88
Operation area Details
Trail LoopBack
Trail Switch Trail Active Path
Triggers Configuration
Logout Logout HighCapNMS Client
3.14.1.5 Service lists
Trail lists
Trail ID and Trail description are trail identifiers.
Most severe alarm indicates the severity level of the most severe alarm
on the trail.
Admin state indicates whether the selected trail is Operational or
Reserved.
Operational state indicates whether the trails operational status is
Operational or Reserved.
ACM priority indicates High or Low priority for which trails will be
dropped first from radio links when bandwidth is reduced.
Type indicates the type of trail protection. Protected trails allow traffic
from two different paths, with different methods of allocating bandwidth.
Dual ended protected trails have three end points, with outgoing traffic is
split between two alternative endpoints.
Unprotected indicates a point-to-point trail.
Protected 1+1 indicates permanent use of bandwidth for both paths.
In a protected 1+1 configuration, instead of a single IP address for both
units, the node has two IP addresses, those of each of the main units.
The IP address of the active main unit is used to manage the node.
Protected ABR indicates protection with dynamic allocation of
bandwidth.
Protected ABR is a unique network level method of dynamic
capacity allocation for TDM and Ethernet flows. By using the
bidirectional capabilities of the ring, TDM-based information is
transmitted in one direction and unused protection capacity is
allocated for Ethernet traffic, making better use of bandwidth and
effectively doubling the capacity of wireless rings.
Protected 1+1 DE indicates dual ended protection with permanent
allocation of bandwidth.
Protected ABR DE indicates dual ended protection with dynamic
allocation of bandwidth.
End point parameters
IP address - displays the IP address of the network element.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 76 of 88
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and it should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
Slot indicates the name of the main slot.
EVC lists
EVC ID and EVC description display are service identifiers.
Transport VLAN type indicates whether the transport VLAN is configured
with C-VLAN or S-VLAN.
EVC type: E-LINE or E-LAN
E-LINE indicates a service with only two Service Access Points (SAPs).
E-LAN indicates a service with more than two SAPs.
Admin state indicates whether the service is Enabled or Disabled.
Operational state can be:
Unknown The operational state will be changed to Unknown if any of
the network elements along the service become unreachable by the
NMS.
Up The service operational state will be Up if there is a connection
between the SAP, all service ports are Enabled (admin state) and UP
(operational state), and the VLAN is configured correctly for all the
ports along the service.
Up unprotected When there is more than one path available between
two SAPs and the service is configured on an RSTP ring, the
Operational state of the service will be Unknown when there is only
one path available for the service.
Down If the operational state of any of the service ports is Down and
causes a lack of connection between two or more SAPs, the operational
state of the service will also be down.
Partially down In an E-LAN service, if there is no connection between
a pair of 2 SAPs, but some of the SAPs are still connected, the
operational state of the service will be Partially down.
Broken service If the NMS finds the same service ID in two subnets
that are not connected, the operational state of the service will be
Broken service.
Partially configured A service can be set to only Partially configured if
the Service succeeded, but with specific fail points.
SAP parameters
IP address - displays the IP address of the network element.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 77 of 88
The IP address of the shelf is the address of the main unit in it. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the
main units) and should be managed via the active unit. However, if a
floating IP address is used, the shelf should be managed via the floating
IP address.
Slot number indicates the slot number of the interface.
IDUs in such a shelf get each a slot ID indicating their position: slot 1
is the lowest IDU and 6 is the highest
Name indicates the slots system name.
Slot indicates the name of the main slot.
VLAN encapsulation type can be C-VID or Untagged for Managed
switches, and All-to-one or S-VID for Metro switches.
Filtering the Ethernet Service (EVC) and TDM Trail lists
Users can filter the lists of Ethernet services and TDM trails according to any
of the EVC or trail properties. Filters can be used to identify list entries that
either match, or do not match, the filter criteria.
Users can configure which columns are displayed in these lists. By default, all
columns appear except the Description column. The list can be filtered
according to the Description, as well as any of the other columns, even if the
Description column is not displayed.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 78 of 88
4. HighCapNMS Network Support
4.1 Supported Network Elements
4.1.1 Evolution XPAND IP+
Series
HW
version
Marketing version Software version
NMS support
level
Min Max Min Max
XPAND IP+ R1 I6.0 I6.3.2 1.4.5.2*
2.7.12

2.9.26

XPAND IP+ R2 I6.5ca1 I7.0 3.0.97*
6.6.0.0.1.40
7.0.0.0.0.15
XPAND IP+ R3 I6.7 I7.0 6.7.0.0.0.93 7.0.0.0.0.15
4.1.2 AGG-Node-N
Marketing
version
Software version Remarks
7.0 7.0.0.0.0.76
4.1.3 AODC-C
Marketing
version
Software version Remarks
7.0 7.0.0.0.0

4.1.4 HighCapRadio Multi-Rate family
Product
Marketing
version
Software version
1500
1528
1500A I5.28
1500AL I-528f
1528A
1500P (I5, S5,
G5)
4.95 4.95s19
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 79 of 88
Product
Marketing
version
Software version
1500P (I5, S5,
S5 Quad G5)
5.10 5.10n1
1500R S6.0 SFD_6.00c3.sfd
1500R S6.5 SFD_6.50e2.sfd
1500R S6.6 SFD_6.60c3.sfd
1500R Quad S6.6 SFD_6.60c3.sfd
3200T T5.0 SFD_5.00a71a
640P
4.1.5 HighCapRadio 2000/4800 family
Product
Marketing
version
Software version
FA2000 2.5 2.5.00_b2650
FA4800 1.9.35 1.9.35_b1845
4.1.6 3rd party supported elements
Manufacturer Product Software version
ECI BG-20B V12.0.45
Telco T-Marc 3208SH 2.4.R3.1.1

4.2 Supported protocols
SNMP V1 / V2C / V3
CLI / SSH-2
HTTP / HTTPS
FTP / SFTP
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 80 of 88
5. HighCapNMS license information
5.1 Introduction
Licensed based scalability allows you to add features and capacity as needed.
When the user installs the HighCapNMS server for the first time, it is installed
with a demo license that will enable 30 days of work with all features
enabled, and no limitation on the number of managed NEs.
To manage more than 20 NEs, an additional license should be purchased from
HighCapRadio.
HighCapNMS software is available on a CD that will be delivered to the client,
or downloaded via HighCapRadio's customer support FTP.
A network element is counted according to the number of IDUs.
For example:
IDU-G with 6 slots is counted as 6 in the license.
3200T is counted as one IDU in the license.
5.2 License requirements
Description Model #
Quantity per
server
Quantity for redundant servers
solution
HighCapNMS Software
+ License for 20 network
elements
HighCapNMS NMS 1 2
License for 21-100
network elements, per
NE
PV_21-100_NE 80 160
License for 101-500
network elements: per
NE
PV_101-500_NE 30 60
License for redundant
HighCapNMS support
PV_Redundant_Support 1 2
TDM trails PV_TDM_Provisioning 1 2
Ethernet services PV_Ethernet_Provisioning 1 2
mySQL Enterprise
Server 5.1
MySQL-License-PV 1 2
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 81 of 88
5.3 License components
HighCapNMS uses a capacity based licensing system.
The built-in license can manage up to 20 elements. Additional licenses can be
purchased to align with the size and needs of network. Customers should
purchase the HighCapNMS software and the appropriate license based on the
number of managed network elements (number of IDUs).
The following license components are limited, based on the purchase order.
Feature Description
Managed network element limit Limits the number of managed elements (number IDUs). There is
no limit on the number of groups or symbols the user can add.
Feature set and enabled features Limits the features enabled by HighCapNMS. Two feature sets
are currently defined (default is Pro):
Pro All features are enabled, except the following which require a
specific license.
Enabled features Specific proposal for the following features that require a specific
license:
NSN NetAct interface
Redundant server support
End to end TDM trails provisioning
Ethernet services
Expiry date No expiry (permanent license), or expiry date of license (for
trials/demos)
5.3.1 Redundancy server support
Redundancy servers requires the same license including Redundancy in both
primary and secondary server.
5.3.2 TDM trail license requirements
The TDM service requires an additional license. When the license isnt
detected, users will not be able to create new TDM trails, view or edit TDM
trail lists, modify trail properties, or access TDM trail performance reports. In
addition, in the absence of a valid TDM trail license, trail alarms will not be
raised.
5.3.3 Ethernet services license requirements
Ethernet services require an additional license. When the license is not
detected, users will not be able to create new EVC, view or edit EVC, modify
EVC properties, or access EVCs. The Ethernet services license also includes the
ability to work with CFM.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 82 of 88
5.4 Licensing MySQL
MySQL is provided as part of the HighCapNMS installation package, but comes
with its own license, which must be purchased separately.
HighCapRadio HighCapNMS SW uses internal MySQL SW database. The
following Item should be purchased on every new server HW.
Marketing model Item description Part number
MYSQL-LICENSE MySQL software License for Windows/Unix
platform.
SL-0003-X
You must update your HighCapNMS dealer or distributer with details
of every upgraded server:
Customer details: Final customer, integrator, country, and region.
Server details: operating system and serial number.
License details: Host ID and maximum network elements included in the
license.
General details: Installed by, installation date, and any additional notes.
5.5 Temporary demo license
When the user installs the HighCapNMS server for the first time, it is installed
with a demo license that will enable 30 days of work with all features
enabled, and no limitation on the number of managed NEs.
HighCapNMS will provide 14 days of notification before the license expires.
The notification will appear upon each login to remind the customer to contact
HighCapRadio to obtain a permanent license.
If a permanent license was not obtained within 30 days, the demo license will
expire and the user will no longer be able to log in. An error message will
advise the customer to contact HighCapRadio to obtain a permanent license.
The demo license will be activated once per station. Uninstalling and
reinstalling the HighCapNMS software will not grant a new demo license.
5.6 Obtaining a permanent license
To obtain a permanent HighCapNMS license:
1 Install HighCapNMS and restart the machine.
2 Start HighCapNMS Client and select Help > About.
3 Write down the Host ID number.
4 Contact HighCapRadio Networks customer support to report the Host ID
number and request your license file.
5 Activate the new license
Copy the license file that you receive from customer support to the
HighCapNMS/config directory
- Windows: \HighCapNMS\config
- Solaris: /opt/HighCapNMS/config
6 Restart the server.
7 Start HighCapNMS Client.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 83 of 88
8 Select Help > About to confirm the updated license information.
A permanent HighCapNMS license will be issued when the relevant order is
processed by HighCapRadio, after HighCapNMS is installed on the customer
station.
Once an order is placed and processed, the customer must send the
"HighCapNMS License Request Form" to HighCapRadio Customer Support,
with all the relevant information.
HighCapRadio Customer Support will verify that the necessary information
was provided, and that the order was properly made. The license will then be
generated and emailed to the customer, together with license installation
instructions.
An invoice will be issued when the license is generated.
5.7 License configuration recommendations
HighCapNMS software can be purchased from HighCapRadio. The basic
software item consists a built-in license for 20 network elements (NEs),
meaning it can manage up to 20 managed elements.
To manage more than 20 NEs, additional licenses should be purchased from
HighCapRadio.
Customers should purchase the HighCapNMS software and the appropriate
license based on the number of managed network elements (the number of
IDUs).
It is possible (and preferable) to order from HighCapRadio the NMS servers
including the HighCapNMS/HCR NMS SW installation as a package.
Description Model # Part #
HighCapNMS Software (Win/Unix+ License for 20 NEs HighCapNMS NMS SP-0028-x*
License for 21-100 NEs: per NE PV_21-100_NE SR-0038-0
License for 101-500 NEs: per NE PV_101-500_NE SR-0039-0
License for 501-1000 NEs: per NE PV_501-1000_NE SR-0040-0
License for 1001 or more NEs: per NE PV_>1000_NE SR-0041-0
SP-0028-x- whereby "x" represents the latest released version of HighCapNMS
5.8 License configuration examples
Management of 130 NEs
Description Model # Quantity
HighCapNMS Software + License for 20
NEs
HighCapNMS NMS 1
License for 21-100 NEs: per NE PV_21-100_NE 80
License for 101-500 NEs: per NE PV_101-500_NE 30
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 84 of 88
Upgrade of existing license from 60 NEs to 130 NEs
Description Model # Quantity
License for 21-100 NEs: per NE PV_21-100_NE 40
License for 101-500 NEs: per NE PV_101-500_NE 30
Management of 130 NEs, redundant servers configuration
Description Model #
Quantity per
server
Quantity for
redundant
servers solution
HighCapNMS
Software + License for
20 NEs
HighCapNMS NMS 1 2
License for 21-100
NEs: per NE
PV_21-100_NE 80 160
License for 101-500
NEs: per NE
PV_101-500_NE 30 60
License for redundant
HighCapNMS support
PV_Redundant_Support 1 2
5.9 HighCapNMS license request form
Please fill in this form and email it to support@HighCapRadio.com.
Field
Company Name
HighCapRadio Order #
Host ID
User Name
(full name of primary customer contact)

Email Address
(email address of the primary contact to
which the license file will be sent)

Managed NEs Limit
(according to the order placed)

Feature Set - Pro
Enabled Features
(according to the order placed)
- NSN NetAct interface
- Redundancy server
- HighCapNMS software, upgrade only
- End to End TDM trail provisioning
Expiration Date
(relevant for demo/trials only)
- Permanent license (no expiry)
- Expiration date:
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 85 of 88
Field
Remarks
(additional information or special
request)

* Managed NEs limit means the total number of IDUs in the system.
For example an IDU-G Node with 6 IDUs is counted as 6 managed elements,
while 3200T is counted as one IDU.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 86 of 88
6. Hardware capacity recommendations
Number of managed
network elements
Number of parallel
connected clients
Server (Processor) Memory Hard drive
Up to 5,000 network
elements
Up to 10 NMS Clients Oracle T3 (SPARC) /
Dell PowerEdge T110 II
(Win2008 Server)
8G 300 GB
Up to 7,000 network
elements
Up to 20 NMS Clients Oracle T3 (SPARC) 16G 600 GB
Up to 7,000 network
elements
Up to 40 NMS Clients Oracle T3 (SPARC) 32G 600 GB

6.1 Unix server capacity examples
UNIX servers are supplied with HighCapNMS NMS already installed.
HighCapNMS supports Solaris 10 operation system for Oracle T3 servers.
HighCapRadio doesnt support UNIX servers that were not purchased through
HighCapRadio and were not installed by HighCapRadio.
All NMS software licenses and MySQL database software should be purchased
separately.
Oracle server hardware is delivered with one year basic warranty.
HP server hardware is delivered with three years basic warranty.
Annual warranty extensions are available.
Number of
managed
network
elements
Number of
parallel
connected
clients
Server Memory Hard drive Marketing Model
Up to 5,000
network
elements
Up to 10 NMS
clients
Oracle T3 8G 300 GB HighCap-SW&HW,Med,Solaris
Up to 7,000
network
elements
Up to 20 NMS
clients
Oracle T3 16G 600 GB HighCap-SW&HW,High,Solaris
Up to 7,000
network
elements
Up to 40 NMS
clients
Oracle T3 32G 600 GB HighCap-SW&HW,UltraHigh,Solaris

HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 87 of 88
UNIX Server, Network Elements <5,000, up to 10 clients
Marketing model Item description
HighCap-SW&HW,Med,Solaris
Oracle T3-1 HW, Solaris OS with basic HighCap Radio SW license (20
NEs).
Supported configuration - up to 5K NEs and up to 10 clients

UNIX Server, Network Elements <7,000, up to 20 clients
Marketing model Item description
HighCap-SW&HW,High,Solaris
Oracle T3-1 HW, Solaris OS with basic HighCap Radio SW license (20
NEs).
Supported configuration - up to 7K NEs and up to 20 clients

UNIX server, network elements <7,000, up to 40 clients
Marketing model Item description
HighCap-SW&HW,UltraHigh,Solaris
Oracle T3-1 HW, Solaris OS with basic HighCap Radio SW license (20
NEs).
Supported configuration - up to 7K NEs and up to 40 clients

6.2 Windows server capacity recommendations
Windows server capacity recommendations
Unlike UNIX servers, Windows PCs can be purchased separately from the with
HighCapNMS software. Installation can be done by the customer.
All NMS software licenses and MySQL database software should be purchased
separately.
Windows Server, Network Elements <5,000, up to 10 clients
Marketing model Item description
PV-Win-HW-Medium
Dell T110 II HW, Windows 2008 server OS
Supported configuration - up to 5K NEs and up to 10 clients
Windows PC, Network Elements <600, up to 3 clients
HighCapNMS can be installed on any up to date Windows PC with minimum
requirements of 2GB memory. Maximum of 2-3 parallel NMS clients usage is
recommended with this basic configuration.
HighCapNMS

N7.0 Technical Description


HighCapRadio Proprietary and Confidential Page 88 of 88
7. Compatibility matrix

IDU Version HighCapNMS Version
2.35w 6.01e N6.1g N6.5r N6.6.0.0.1 N6.6.0.0.2 N6.6.0.1.2 N6.6.1.5.1 N6.7.0.2.0 N6.8.0.1.0 N6.9.0.1.1 N7.0.0.1.0
Evolution
METRO
10B00 N N N N N N N N N Y Y Y
Evolution
XPAND
10B00 N N N N N N N N N Y Y Y
Evolution
XPAND IP
R4B00 N N N N N N N N N Y Y Y
R6A00 N N N N N N N N N N N Y
AGG-NODE-N
1RU
7.0.0.0.0.76 N N N N N N N N N N N Y
AGG-NODE-N
1RU
T7.2.0.0.0.30 N N N N N N N N N N N Y
AGG-NODE-N
2RU
7.0.0.0.0.76 N N N N N N N N N N N Y
AGG-NODE-N
2RU
T7.2.0.0.0.30 N N N N N N N N N N N Y
AODC-C 7.0.0.0.0 N N N N N N N N N N N Y

You might also like