You are on page 1of 137

ZXWN MSCS

MSC Server

Alarm Management
Version 3.09.21

ZTE CORPORATION
NO. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: (86) 755 26771900
Fax: (86) 755 26770801
URL: http://ensupport.zte.com.cn
E-mail: support@zte.com.cn

LEGAL INFORMATION
Copyright 2010 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or distribution of
this document or any portion of this document, in any form by any means, without the prior written consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE CORPORATION
or of their respective owners.
This document is provided as is, and all express, implied, or statutory warranties, representations or conditions are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose, title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the use of or reliance on the
information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications covering the subject
matter of this document. Except as expressly provided in any written license between ZTE CORPORATION and its licensee,
the user of this document shall not acquire any license to the subject matter herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.

Revision History
Revision No.

Revision Date

Revision Reason

R1.0

Feb.28, 2010

First edition

Serial Number: SJ-20100211152857-011

Contents

About This Manual............................................. I


Declaration of RoHS Compliance ....................... I
Introduction to Alarms ......................................1
Common Alarm Terms ..................................................... 1
Alarm Management......................................................... 2
Alarm System ................................................................ 2
Structure Description .................................................. 2
Alarm and Warning Processing Mechanism ..................... 3
Alarm Information .......................................................... 5
Alarm Description ....................................................... 5
Relation between Alarms and Services........................... 5
Handling Measures ..................................................... 5
Relation between Alarms and Faults .............................. 6
Notification Information................................................... 6
Notification Information Description .............................. 6
Relation between Notifications and Services ................... 6
Relation between Notifications and Faults....................... 6

Alarm Monitoring ..............................................7


Alarm Monitoring Policy ................................................... 7
Alarm Monitoring ............................................................ 8
Alarm Monitoring Modes .............................................. 8
Background Monitoring Alarm....................................... 8
Alarm Box Monitoring Alarm......................................... 8
Short Message Monitoring Alarm..................................10
MMS and Email Alarm ................................................10

Alarm Settings ................................................ 11


Alarm Rule Settings .......................................................11
Alarm Rule Introduction..............................................11
Setting an Alarm Acknowledging Rule...........................13
Setting an Alarm Clearing Rule ....................................18
Setting an Alarm Forwarding Rule ................................22

Confidential and Proprietary Information of ZTE CORPORATION

ZXWN MSCS Alarm Management

Setting an Alarm Filtering Rule ....................................29


Setting an Alarm Delaying Rule ...................................33
Setting an Alarm Counting Rule ...................................37
Setting an Alarm Persisting Rule ..................................42
Setting an Alarm Merging Rule ....................................47
Setting an Alarm Restraining Rule ................................51
Setting a Notification Filtering Rule ..............................57
Regrading Alarm Severities .............................................60
Setting an Alarm Box .....................................................62
Preference Settings........................................................68
Setting Monitoring View..............................................68
Setting Alarm Sounds ................................................70
Setting Alarm Colors ..................................................71
Setting Forwarding Templates .....................................72

Alarm Operations ............................................ 75


Alarm Information Operations .........................................75
Viewing Composite Alarm Monitoring Chart ...................75
Monitoring Real-Time Alarms.......................................76
Monitoring Real-Time Notifications ...............................77
Synchronizing Alarm Information .................................78
Alarm Querying Operations .............................................80
Querying Current Alarms ............................................80
Querying History Alarms.............................................82
Querying Notifications ................................................84
Customizing Query ....................................................86
Alarm Record Operations ................................................90
Acknowledging an Alarm ............................................90
Unacknowledging an Alarm .........................................92
Clearing an Alarm......................................................94
Forwarding an Alarm ..................................................94
Locating an Alarm on the Rackchart .............................95
Viewing Detailed Alarm Information .............................96
Printing Alarm Information........................................ 100
Exporting Alarm Information ..................................... 102
Alarm Maintenance Suggestions .................................... 103
Adding Alarm Maintenance Suggestions ...................... 103
Modifying an Alarm Maintenance Suggestion ............... 105
Exporting an Alarm Maintenance Suggestion ............... 106
Importing an Alarm Maintenance Suggestion............... 107
Deleting an Alarm Maintenance Suggestion ................. 109

II

Confidential and Proprietary Information of ZTE CORPORATION

Alarm Rule Operations ................................................. 110


Disabling an Alarm Rule............................................ 110
Enabling an Alarm Rule ............................................ 111
Modifying an Alarm Rule ........................................... 111
Deleting an Alarm Rule............................................. 112
Refreshing an Alarm Rule ......................................... 113
Alarm Box Operations .................................................. 113
Setting Alarm Box Functions ..................................... 113
Viewing Alarm Statistics ........................................... 115
Setting the Broadcast Storm Threshold....................... 116
Setting the Sound Volume ........................................ 116
Setting Permanent Mute ........................................... 117
Acknowledging Alarms on a per-Group Basis ............... 117

Figure............................................................ 119
Table ............................................................. 123
Index ............................................................ 125

Confidential and Proprietary Information of ZTE CORPORATION

III

ZXWN MSCS Alarm Management

This page is intentionally blank.

IV

Confidential and Proprietary Information of ZTE CORPORATION

About This Manual


Purpose

At first, thank you for choosing ZXWN wireless core network system of ZTE Corporation!
ZXWN system is the 3G mobile communication system developed
based on the UMTS technology. ZXWN system boasts powerful
service processing capability in both CS domain and PS domain,
providing more abundant service contents. Comparing with the
GSM, ZXWN provides telecommunication services in wider range,
capable of transmitting sound, data, graphics and other multi-media services. In addition, ZXWN has higher speed and resource utilization rate. ZXWN wireless core network system supports both
2G and 3G subscriber access, and provides various services related with the 3G core network.
The ZXWN MSCS system is designed for the UMTS system at the
core network control level. It supports the GSM core network,
UMTS protocols in the R99/R4/R5 stage and relevant functions at
the same time, and provides the carriers with an overall solution
to the evolution from the GSM core network to the 3GPP R99 and
then to the 3GPP R5.
The ZXWN MSCS system completes the functions of the Mobile
Switching Center Server and the Visitor Location Register (VLR)
together, and provides the Service Switching Point (SSP) functions
of intelligent calls. The ZXWN MSCS system supports the MGCF
function, and the coexistence of the MGCF and GMSCS. It also can
smoothly upgrade to the MGCF.
This manual describes the concepts and operations of the ZXWN
MSCS alarm management and alarm monitoring.

Intended
Audience

Prerequisite Skill
and Knowledge

This manual is applied for:

Communication engineers who have mastered the communication principle of the mobile network

Engineers who know the basic structure, basic functions, and


technical indices of the ZXWN MSCS system

Engineers who need to know the use methods of ZXWN MSCS


alarm management tools.

To use this document effectively, users should have a general understanding of wireless telecommunications technology. Familiarity with the following is helpful:

ZTE Network Management System

TCP/IP protocol suite

Confidential and Proprietary Information of ZTE CORPORATION

ZXWN MSCS Alarm Management

What Is in This
Manual

FCC Compliance
Statement

This manual contains the following chapters:


Chapter

Summary

Chapter 1,
Introduction
to Alarms

Introduces the system architecture, alarm


mechanism and some basic alarm concepts about
the ZXWN MSCS

Chapter
2, Alarm
Monitoring

Introduces the alarm policy and methods of alarm


monitoring

Chapter 3,
Alarm Settings

Introduces the settings of alarm management,


including setting the alarm rule, redefining the alarm
level, setting the alarm sound and color, setting the
forwarding templates and the alarm box

Chapter
4, Alarm
Operations

Introduces the operations of the alarm management,


such as the alarm information, alarm records, alarm
processing, alarm rule and alarm box operations

This device complies with part 15 of the FCC Rules. Operation is


subject to the following two conditions.
1. This device may not cause harmful interference.
2. This device must accept any interference received, including
interference that may cause undesired operation.
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate
the equipment.

Conventions

ZTE documents employ the following typographical conventions.


Typeface

Meaning

Italics

References to other Manuals and documents.

Quotes

Links on screens.

Bold

Menus, menu options, function names, input fields,


radio button names, check boxes, drop-down lists,
dialog box names, window names.

CAPS

Keys on the keyboard and buttons on screens and


company name.
Note: Provides additional information about a certain
topic.
Checkpoint: Indicates that a particular step needs to
be checked before proceeding further.
Tip: Indicates a suggestion or hint to make things
easier or more productive for the reader.

Mouse operation conventions are listed as follows:

II

Confidential and Proprietary Information of ZTE CORPORATION

About This Manual

Typeface

Meaning

Click

Refers to clicking the primary mouse button (usually the


left mouse button) once.

Doubleclick

Refers to quickly clicking the primary mouse button


(usually the left mouse button) twice.

Right-click

Refers to clicking the secondary mouse button (usually


the right mouse button) once.

Confidential and Proprietary Information of ZTE CORPORATION

III

ZXWN MSCS Alarm Management

This page is intentionally blank.

IV

Confidential and Proprietary Information of ZTE CORPORATION

Declaration of RoHS
Compliance
To minimize the environmental impact and take more responsibility
to the earth we live, this document shall serve as formal declaration that ZXWN MSCS manufactured by ZTE CORPORATION are in
compliance with the Directive 2002/95/EC of the European Parliament - RoHS (Restriction of Hazardous Substances) with respect
to the following substances:

Lead (Pb)

Mercury (Hg)

Cadmium (Cd)

Hexavalent Chromium (Cr (VI))

PolyBrominated Biphenyls (PBBs)

PolyBrominated Diphenyl Ethers (PBDEs)

The ZXWN MSCS manufactured by ZTE CORPORATION meet


the requirements of EU 2002/95/EC; however, some assemblies
are customized to client specifications. Addition of specialized,
customer-specified materials or processes which do not meet the
requirements of EU 2002/95/EC may negate RoHS compliance of the
assembly. To guarantee compliance of the assembly, the need for
compliant product must be communicated to ZTE CORPORATION in
written form. This declaration is issued based on our current level
of knowledge. Since conditions of use are outside our control, ZTE
CORPORATION makes no warranties, express or implied, and assumes
no liability in connection with the use of this information.

Confidential and Proprietary Information of ZTE CORPORATION

ZXWN MSCS Alarm Management

This page is intentionally blank.

II

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Introduction to Alarms
Table of Contents
Common Alarm Terms .........................................................
Alarm Management.............................................................
Alarm System ....................................................................
Alarm Information ..............................................................
Notification Information.......................................................

1
2
2
5
6

Common Alarm Terms


Description

Every alarm term has its specific meaning. Knowing the alarm
terms preciously can help to correctly perform various operations
on the alarms.

Alarm

Alarms are various faults or alerting information that occurs during the running of the system. Operation and maintenance personnel should perform corresponding operations based on the specific
alarms.

Current Alarm

If the system generates an alarm and that alarm persists, then


this kind of alarm is called the current alarm.

History Alarm

If the system generated an alarm, but the fault has been eliminated later. This kind of alarm is called the history alarm.

Alarm Recovery

The alarm recovery information indicates that the system has been
faulty, but the fault has been eliminated at present.

Alarm Level

The alarm level indicates the severity of an alarm.

Alarm Code

It is an indicator to distinguish various alarms. Different alarms


correspond to different alarm codes.

Alarm Management System

The alarm management system is the system maintenance tool of


the OMM system. It performs the centralized monitoring on the
running condition of the whole system and collects the unexpected
information of the boards, links, databases and servers.

Notification

The notification information means the operation or unexpected


information that occurs and does not affect the system.

Alarm Filtering

It is used to filter a certain level or some types of alarm information


through certain settings.

Confidential and Proprietary Information of ZTE CORPORATION

ZXWN MSCS Alarm Management

Alarm Management
Definition

The alarm management function is a function group that manages the faults occurring to the network equipment managed by
the ZXWN OMM system during the system running. This function
group generally calls the managed faults as alarms.

Functions

The alarm management function enables users to monitor and


manage the faults and events in the whole network in a centralized
manner. Users can monitor and view the alarms in the network in
real time or even filter the unwanted alarms based on certain conditions. Alarms can be presented in a vivid manner to the network
maintenance staff, such as audible alarms, visual alarms and alarm
boxes.
After an alarm is generated, the user can perform such operations as acknowledging/unacknowledging it, clearing it, informing
someone through the Email or Short Messages (SM), and viewing its detailed information and related events. If the user has
summarized the processing methods of alarms and saved them
in the alarm processing suggestion library, the user can also view
the corresponding suggestions to shorten the time spent on troubleshooting when similar alarms occur next time.
The alarm management function is capable of monitoring and
managing alarms and notification messages in the network in a
centralized manner.

Alarm Categories

According to the severity, alarms fall into critical alarms, major


alarms, minor alarms and warnings.

According to the fault types, alarms fall into the processing


alarm, the QoS alarm, the environment alarm, the equipment
alarm, the communication alarm, and the network management system alarm.

According to the system types, alarms fall into the security


alarm, the alarm box and OMM communication link alarm,
the billing server alarm, the SORM server alarm, the foreground/background communication link alarm, the MP NE
Equipment Alarm, the system management alarm, the correlation alarm and the performance alarm.

Alarm System
Structure Description

Introduction

ZXWN MSCS has a relatively complete alarm system, including the


foreground alarm system, the OMM server alarm system, the OMM
client alarm system and the alarm box.

System Structure

The alarm system diagram is shown in Figure 1. For detailed information, see Table 1.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 Introduction to Alarms

FIGURE 1 ALARM SYSTEM DIAGRAM

TABLE 1 COMPONENTS
Alarm System

Foreground Alarm
System

OMM Server Alarm


System

OMM Client Alarm


System

AND

FUNCTIONS INTRODUCTION
Function

Collects and processes foreground alarm


information;
Executes background man-machine commands
and return execution results
Processes, stores and forwards the information;
Controls the alarm box
Displays, searches and prints the alarm
information;
Displays rack charts;
Executes man-machine commands

Alarm Box

Receives the alarm information from the


background through the Ethernet interface.
The alarm box can prompt the fault during the
running of the system through such various
modes as sound, light, screen display, the SM
and file transfer

Alarm and Warning Processing


Mechanism
Definition

As the system maintenance tool, the alarm processing mechanism performs centralized monitoring on the running condition of
the ZXWN MSCS and collects the abnormal information of boards,
links, databases and servers in real time.

Confidential and Proprietary Information of ZTE CORPORATION

ZXWN MSCS Alarm Management

For some system performance data, such as the CPU occupancy,


the warning threshold can be set by setting the critical value.
When the onsite equipment just becomes abnormal but not
faulty, the monitoring tool sends abnormal warning information
out through the alarm box. In this way, the corresponding
maintenance personnel can know the system running condition in
time and eliminate the fault.
Processing flow

The flow of processing the alarm and the warning is shown in


Figure 2.
FIGURE 2 STRUCTURE

Flow Description

OF

WARNING SYSTEM

The OMM alarm management system sends the alarm (its level
can be set) and warning information to the alarm box. The MS
module of the alarm box converts the alarm into a SM, and then
transmits it to a series of MS numbers, including the MS module
of the alarm processing server, the local ZTE office personnel and
relative personnel of the carrier.
After receiving the alarm or warning SM, the alarm processing
server converts the SM into the alarm or warning information, and
generates an Email through the mail protocol and then sends it to
the personnel among the predefined Email list; or re-generates a
SM and then sends it to the personnel among the SM receiving list
predefined in the alarm processing server.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 Introduction to Alarms

Alarm Information
Alarm Description
Description

The alarm management system performs centralized monitoring


on the running condition of the ZXWN MSCS and collects the abnormal information of the boards, links, databases and servers in
real time. When the system is faulty or some indices exceed the
predefined threshold, the alarm management system will generate an alarm at once. The operation and maintenance personnel
can locate and eliminate the fault through the alarm information
to ensure the stable running of the system.

Alarm Level

The alarm information can be divided into four levels based on


severity.

Level-1: critical

Level-2: major

Level-3: minor

Level-4: warning.

Relation between Alarms and


Services
Description

The alarm system monitors the running condition of the whole system in real time. When some part of the system becomes abnormal, the alarm system will give an alarm. The alarm information
level indicates the alarm severity.

Relation

Among all kinds of alarm information, the service alarm information is the altering information generated for the service faults that
occurred or will occur, or the faults that affect the service during
the running of ZXWN MSCS. Usually, an alarm will exist for a period of time until the problem or the fault is handled.

Handling Measures
The handling measures for alarms of different levels are described
as follows.

When level-1 or level-2 alarms appear, the alarm system will


send the alarm information to the corresponding personnel
as soon as possible through the alarm box monitoring alarm,
SM monitoring alarm, Email monitoring alarm and background
monitoring alarm, so that the fault can be handled in time. For
those difficult to handle, notify the local ZTE office.

When level-3 or level-4 alarms appear, the maintenance personnel in the equipment room can handle the fault according

Confidential and Proprietary Information of ZTE CORPORATION

ZXWN MSCS Alarm Management

to the common processing methods after recording the problems and fault phenomena. If the fault cannot be eliminated,
contact the local ZTE office for technical support.

Relation between Alarms and Faults


The alarm information is the alerting information generated for
the problems or faults that occur during the running of the ZXWN
MSCS. The alarm management system should timely show the correct fault information to the administrator when the fault occurs.
Usually, an alarm will exist for a period of time until the problem
or the fault is handled.

Notification Information
Notification Information Description
The notification information indicates the operation or abnormal
information that has occurred, helping the maintenance personnel
grasp the running condition of each part of the system. The notification information has no level and does not affect the system.
The notification information is shown by the OMM system during
the daily operation of the ZXWN MSCS system to prompt the system running information required by the maintenance personnel.

Relation between Notifications and


Services
The notification information has no impact on the service.

Relation between Notifications and


Faults
The notification information refers to the operations or exceptions
that occurred during the running of the system, but had no impact
on the system and the service. The fault brings impact on the
system and service, which is required to be handled.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Alarm Monitoring
Table of Contents
Alarm Monitoring Policy ....................................................... 7
Alarm Monitoring ................................................................ 8

Alarm Monitoring Policy


Introduction

Principles

When the onsite equipment is faulty, or becomes abnormal, the


alarm management system sends out the alarm and warming information according to the alarm monitoring policies, which facilitates eliminating the fault and hidden trouble in time.
The alarm monitoring policies are described as follows.

Priority policy for important alarms


The alarm information is divided into four levels by severity.
The higher the level is, the more serious the alarm is. When
the alarms with different levels appear at the same time, the
highest-level alarm information must be sent first.

First time policy


The alarm has an impact on the service. The alarm must be
eliminated as soon as possible to quickly recover the system
to the normal status and relieve the impact on the service. So
the alarm information must be sent out as soon as possible.
Featured by using shorter transmission time, the alarm box can
send the alarm and warning information as soon as possible
through the sound and the short message.

Multi-receiver policy
Multiple persons can receive the alarm information by alarm
management server settings. In this way, it may reduce the
possibility of delaying handling the fault because one or several
persons did not receive the alarm information in time.

Multi-way policy
Using a single source to give an alarm will cause the alarm
information unreliable as this procedure can become faulty.
Adopting multi-way alarm monitoring policy can avoid this
case.

Confidential and Proprietary Information of ZTE CORPORATION

ZXWN MSCS Alarm Management

Alarm Monitoring
Alarm Monitoring Modes
Overview

Comparison

The alarm reports have the following forms.

Background monitoring alarm

Alarm box monitoring alarm

Short message monitoring alarm

Multimedia Messaging Service (MMS) and Email monitoring


alarm.

Alarm box monitoring alarm, short message monitoring alarm,


MMS monitoring alarm, and Email monitoring alarm must use the
alarm box to transfer the information, while the background monitoring alarm does not.
Besides monitoring alarms, the background monitoring alarm can
query the system performance, while the other modes can only
query the system alarm information.

Background Monitoring Alarm


Overview

The alarm system monitors the whole switch in real time. When
a certain part of the switch is faulty, the alarm service process of
the application server will send the message to the OMM server to
generate the alarm or warning information.

Functions

The performance, running conditions and alarm information of the


system can be viewed in detail through the background monitoring
alarm, which facilitates locating and eliminating faults to ensure
the stable running of the system.

Query Method

Log in the OMM system, and open the Fault Management window. Double-click the sub-item of Query in the Management
Tree.

Alarm Box Monitoring Alarm

Overview

The alarm box is connected with an alarm server through HUB or


a layer-2 switch. The alarm box presents different severities of
alarm data sent from the server in various ways, for example, on
the LCD screen, through indicators, and by generating sounds.

Functions

Alarm short message sending: The alarm server can be configured to interact with the in-built mobile phone module of
the alarm box, enabling the alarm box to send alarm short
messages to the specified mobile number of a maintainer. The
alarm box sends alarm short messages based on the severities
to CDMA or GSM subscribers (however, CDMA and GSM cannot
be supported simultaneously).

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Alarm Monitoring

Sound prompt: The in-built speaker produces voice or buzzer


alarms to prompt the received alarms and the alarm severities.

Alarm indicator: The four alarm severities are represented by


different colors, namely yellow, orange, blue, and red (listed
from high to low).

Alarm server indicator: The alarm box panel provides 10


alarm server indicators representing 10 group of alarm servers
(generally it is recommended that one indicator represent one
server). Each indicator shows the link status and the alarm
status for a specific group of server servers.

LCD display: The alarm information sent from the alarm server
is displayed on the LCD screen of the alarm box. Moreover, the
alarm box menu and keys on the panel are available to configure the working parameters, for example, the IP address, UDP
port, key tone control, and backlight control.

Remote deployment: An alarm server can be connected to both


local and remote alarm boxes. In the case of remote alarm
boxes, routing information should be configured in the alarm
box. Remote deployment allows more flexible usages of alarm
boxes. For example, the alarm box can be deployed in the
office rather than in the equipment room.

Multi-office-in-one: Up to 128 alarm servers can be configured


on an alarm box, and up to 10 groups of alarm servers can be
simultaneously connected to an alarm box. The alarm servers
may reside in different network segments, and therefore the
multi-office-in-one function is employed together with the remote access function.

Cross-VLAN alarming: The alarm box can be simultaneously


connected to alarm servers from different VLANs. In this scenario, a layer-2 switch rather than a layer-3 device is deployed
to achieve VLAN isolation, reducing the networking cost.

Broadcast storm detection and alarming: Thresholds can be


configured to detect the network status and avoid network congestion caused by data broadcasting.

Group-based alarm acknowledgement: Alarms can be acknowledged on a per-group basis as alarm servers can be
classified into groups, and each group of alarm servers is
represented by an alarm server indicator.

Alarm statistics query: The alarm box can show the statistics
of alarms reported by each alarm server on the LCD screen.

Permanent mute: Alarm prompts can be muted based on the


alarm severity.

Remote access: The alarm box supports Telnet-based remote


access. Users can telnet the alarm box to configure relevant
parameters by using man-machine commands. The alarm box
supports the configurations concerning alarm servers, routing,
VLAN, short message transfer, system time and so on.

Confidential and Proprietary Information of ZTE CORPORATION

ZXWN MSCS Alarm Management

Short Message Monitoring Alarm


Overview

The alarm management system sends the level-1 and level-2


alarm and warning information to the alarm box through the
alarm management system of the OMM equipment. After the MS
module of the alarm box converts the alarm information into the
short message, the alarm box can also send the short message
alarm to a series of specified MS numbers.

Functions

Through the short message monitoring alarm, the alarm box can
send the alarm or warning information to the specified MS in the
form of short message. The maintenance personnel, either from
local ZTE office or the operator, can know the system running conditions without being on the site.

MMS and Email Alarm


Due to the small size of the short message, usually only 340 bits,
the short message alarm often needs to be separated into parts
before being sent. The MMS can be adopted by performing the
background settings, which can transfer 50K data at one time. By
performing the background settings or modifying the configuration file, the MMS is applicable for sending the alarm information
and fault logs to the mailbox or the mobile phone of the specified
maintenance personnel through the Email server or the MMS center.

10

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Alarm Settings
Table of Contents
Alarm Rule Settings ...........................................................11
Regrading Alarm Severities .................................................60
Setting an Alarm Box .........................................................62
Preference Settings............................................................68

Alarm Rule Settings


Alarm Rule Introduction
Type

Valid Range

The alarm rule falls into the following types:

The alarm acknowledging rule

The alarm clearing rule

The alarm forwarding rule

The alarm filtering rule

The alarm delaying rule

The alarm counting rule

The alarm persisting rule

The alarm merging rule

The alarm restraining rule

The notification filtering rule

Rule setting can contain multiple rules. The range where a rule
takes effect varies with the type of the rule. It is called the valid
range of a rule, which is divided into following types:

Global validity
Once an alarm rule is set and activated, it is effective for all
alarms, events and notifications that conform to this rule,
which has no relationship with the one who makes it. Therefore, the alarms that all users saw are processed according to
this rule.

Forward validity

Confidential and Proprietary Information of ZTE CORPORATION

11

ZXWN MSCS Alarm Management

Once an alarm is set and activated, it is effective for all current


alarms, including the alarm that has been reported and that
will be reported in the future.

Backward validity
Once an alarm rule is set and activated, it is only effective
for the alarms that will be reported in the future, having no
influence on the alarm that has been reported.

Function

Table 2 describes the alarm rules supported by the OMM system.


TABLE 2 FUNCTIONS

ALARM RULES

Rule Name

Valid Range

Alarm
acknowledging
rule

Global validity;

Alarm clearing
rule

Alarm
forwarding rule

Alarm filtering
rule

Alarm delaying
rule

Alarm counting
rule

Alarm
persisting rule

Alarm merging
rule

12

OF

Backward
validity
Global validity;
Backward
validity
Global validity;
Backward
validity
Global validity;
Forward
validity
Global validity;
Backward
validity

Global validity;
Backward
validity

Global validity;
Backward
validity

Global validity;
Backward
validity

Function Description
Alarm auto confirm rules help
filter alarms reported by devices
and confirm those that meet the
conditions automatically.
Alarm auto clearing rules help filter
alarms reported by devices and
clear those that meet the conditions
automatically.
Auto forwarding rules allow you to
forward some specified alarms to
the persons who are responsible for
handling them via Email or SMS.
Filter alarms which meet conditions,
filtered alarms will not be show on
the screen.
Alarm delaying rules take effect
for only the short-lived alarms. If
an alarm is generated and then
recovered in a specific short period,
it will be discarded.
If the number of times which an
alarm occurs within a specified time
reaches the preset threshold, the
alarm counting rule will trigger a
new alarm.
Alarm persist rule will clock the
alarms which meet the special
condition. If their states are
unchanged for a period, then
the system will perform some
operation.
Alarm merge rule can merge
multiple alarms which have the
same reason and source, and
display only one alarm on the
NetNumen M30 window.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

Rule Name

Alarm
restraining rule

Notification
filtering rule

Valid Range
Global validity;
Backward
validity
Global validity;
Backward
validity

Function Description
Some alarms have relationships to
each other, for example, alarm A
depends on alarm B. By define a
alarm restrain rule you can restrain
alarm A and only show alarm B.
Filter notifications which meet
conditions, filtered notifications will
not be show on the screen.

Setting an Alarm Acknowledging Rule


Prerequisites

The user has logged in the OMM server normally.

Context

Perform this procedure to set an alarm acknowledging rule to automatically acknowledge the matched alarms when the system reports or restores these alarms. In this way, the system reduces
the workload of network management personnel and enables them
to focus more on important alarms. The alarm acknowledgement
automatically sets the acknowledged status, time and acknowledgement information of alarms.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window, as shown in Figure 3.
FIGURE 3 ALARM MANAGEMENT WINDOW

2. Double-click Setting > Rule Setup in the Management Tree


to open the Rule Setup tab, as shown in Figure 4.

Confidential and Proprietary Information of ZTE CORPORATION

13

ZXWN MSCS Alarm Management

FIGURE 4 RULE SETUP

3. Perform one of the following steps to pop up the Alarm Acknowledging Rule dialog box, as shown in Figure 6. The
Basic tab is shown by default.

14

Click the
icon on the sub-toolbar pop up the New dialog
box, as shown in Figure 5. Select the Alarm Acknowledging Rule option button, and then click OK.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 5 SELECTING ALARM ACKNOWLEDGING RULE

Select the Alarm Acknowledging Rule from the Rule


Type pull-down list box on the sub-toolbar, and then click
the
icon.

Confidential and Proprietary Information of ZTE CORPORATION

15

ZXWN MSCS Alarm Management

FIGURE 6 ALARM ACKNOWLEDGING RULE BASIC TAB

4. Type parameters in the Name and Description text boxes,


and specify Rule State and Acknowledge.

The rule name is compulsory.


The Rule State contains two options, Enabled and Disabled. A rule in enabled status is valid.
The Acknowledge contains two options, While Reporting and While Restoring.

5. Select the Condition tab, as shown in Figure 7. Refer to Table


3 for detailed parameter description.

16

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 7 ALARM ACKNOWLEDGING RULE CONDITION TAB

TABLE 3 PARAMETER SETTINGS


Tab

OF THE

CONDITION TAB
Description

System Type

Including: alarm box link break alarm, bill


server alarm, correlation alarm, link alarm,
local and remote OMC linkdown alarm, NE
alarm, NE background alarm, OMS alarm and
performance QoS alarm.

Location

Selecting a system type when setting the


occurrence location of the alarm
Selecting a system type when setting the
occurrence location of the alarm

Alarm Code

After the system type is selected, the


Available Items column in the Alarm
Code tab will display all the alarm codes
corresponded by this system type.
This tab contains the Occurrence Time,
Alarm Type and Severity areas.

Time/Type/Severity

When the Occurrence Time is not


specified, it ranges from the time of the
first record being generated to that of the
last record being generated.

Confidential and Proprietary Information of ZTE CORPORATION

17

ZXWN MSCS Alarm Management

Tab

Other

Description

The Alarm Type includes Communication


Alarm, Environment Alarm, Equipment
Alarm, OMS alarm, Processing Alarm and
QoS Alarm.

The Severity includes Critical, Major,


Minor and Warning.

Type detailed description of the alarm

6. Click OK to complete setting the alarm acknowledging rule.


END OF STEPS
Result

A new Alarm Acknowledging Rule appears in the Rule Setup


tab.

Setting an Alarm Clearing Rule


Prerequisites

The user has logged in the OMM server normally.

Context

Perform this procedure to set an alarm clearing rule to automatically clear the matched alarms when they are reported. The system will automatically add the alarm clearing information, and directly changes the reported alarms to history alarms, and saves
in the data table of history alarms. In this way, the system may
not only record the alarms, but also reduce the number of current
alarms, facilitating the maintenance personnel to better focus on
important alarms.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to pop up the Alarm Clearing Rule dialog box, as shown in Figure 9. The Basic tab is
shown by default.

18

Click the
icon on the sub-toolbar to pop up the New dialog box, as shown in Figure 8. Select the Alarm Clearing
Rule option button, and then click OK.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 8 SELECTING ALARM CLEARING RULE

Select the Alarm Clearing Rule from the Rule Type pulldown list box on the sub-toolbar, and then click the
icon.

Confidential and Proprietary Information of ZTE CORPORATION

19

ZXWN MSCS Alarm Management

FIGURE 9 ALARM CLEARING RULE BASIC TAB

4. Type parameters in the Name and Description text boxes,


and specify Rule State.

The rule name is compulsory.


The Rule State contains two options, Enabled and Disabled. A rule in enabled status is valid.

5. Select the Condition tab, as shown in Figure 10. Refer to Table


4 for detailed parameter description.

20

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 10 ALARM CLEARING RULE CONDITION TAB

TABLE 4 PARAMETER SETTINGS


Tab

OF THE

CONDITION TAB
Description

System Type

Including: alarm box link break alarm, bill


server alarm, correlation alarm, link alarm,
local and remote OMC linkdown alarm, NE
alarm, NE background alarm, OMS alarm and
performance QoS alarm.

Location

Selecting a system type when setting the


occurrence location of the alarm
Selecting a system type when setting the
occurrence location of the alarm

Alarm Code

After the system type is selected, the


Available Items column in the Alarm
Code tab will display all the alarm codes
corresponded by this system type.
This tab contains the Occurrence Time,
Alarm Type and Severity areas.

Time/Type/Severity

When the Occurrence Time is not


specified, it ranges from the time of the
first record being generated to that of the
last record being generated.

Confidential and Proprietary Information of ZTE CORPORATION

21

ZXWN MSCS Alarm Management

Tab

Other

Description

The Alarm Type includes Communication


Alarm, Environment Alarm, Equipment
Alarm, OMS alarm, Processing Alarm and
QoS Alarm.

The Severity includes Critical, Major,


Minor and Warning.

Type detailed description of the alarm

6. Click OK to complete setting the alarm clearing rule.


END OF STEPS
Result

A new Alarm Clearing Rule appears in the Rule Setup tab.

Setting an Alarm Forwarding Rule


Prerequisites

Confirm that the user has logged in the OMM server normally.

Context

Perform this procedure to set an alarm forwarding rule so that


the system may send the matched alarm to specified personnel
through Email or SMS.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to pop up the Alarm Forwarding Rule dialog box, as shown in Figure 12. The Basic
tab is shown by default.

22

Click the
icon on the sub-toolbar to pop up the New
dialog box, as shown in Figure 11. Select the Alarm Forwarding Rule option button, and then click OK.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 11 SELECTING ALARM FORWARDING RULE

Select the Alarm Forwarding Rule from the Rule Type


pull-down list box on the sub-toolbar, and then click the
icon.

Confidential and Proprietary Information of ZTE CORPORATION

23

ZXWN MSCS Alarm Management

FIGURE 12 ALARM FORWARDING RULE BASIC TAB

4. Type parameters in the Name and Description text boxes,


and specify Rule State.

The rule name is compulsory.


The Rule State contains two options, Enabled and Disabled. A rule in enabled status is valid.

5. Select the Condition tab, as shown in Figure 13. Refer to Table


5 for detailed parameter description.

24

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 13 ALARM FORWARDING RULE CONDITION TAB

TABLE 5 PARAMETER SETTINGS


Tab

OF THE

CONDITION TAB
Description

System Type

Including: alarm box link break alarm, bill


server alarm, correlation alarm, link alarm,
local and remote OMC linkdown alarm, NE
alarm, NE background alarm, OMS alarm
and performance QoS alarm.

Location

Selecting a system type when setting the


occurrence location of the alarm
Selecting a system type when setting the
occurrence location of the alarm

Alarm Code

After the system type is selected, the


Available Items column in the Alarm
Code tab will display all the alarm codes
corresponded by this system type.
This tab contains the Occurrence Time,
Alarm Type and Severity areas.

Time/Type/Severity

When the Occurrence Time is not


specified, it ranges from the time of the
first record being generated to that of
the last record being generated.

Confidential and Proprietary Information of ZTE CORPORATION

25

ZXWN MSCS Alarm Management

Tab

Other

Description

The Alarm Type includes


Communication Alarm, Environment
Alarm, Equipment Alarm, OMS alarm,
Processing Alarm and QoS Alarm.

The Severity includes Critical, Major,


Minor and Warning.

Type detailed description of the alarm

6. Select the Action tab, as shown in Figure 14. Add the forwarded user(s) and set the forwarding cycle.
FIGURE 14 ALARMING FORWARDING RULE ACTION TAB

7. In the List of Forwarded-to Users area, click the Custom


button to pop up the Information of Forwarding User dialog
box. Enter parameters in Forwarding User, Email Address
and Phone Number text boxes, as shown in Figure 15.

26

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 15 ALARM FORWARDING RULE CUSTOMIZING FORWARDED


USER INFORMATION

Tip:
Click Select to add a user who already exists in the system to
the List of Forwarded-to Users.
8. Click OK to add the customized forwarded-to user to the List
of Forwarded-to Users, as shown in Figure 16.
FIGURE 16 ALARM FORWARDING RULE ADDING

FORWARDED USER

Confidential and Proprietary Information of ZTE CORPORATION

27

ZXWN MSCS Alarm Management

Note:
Set the forwarding cycle when there are several users in the
List of Forwarded-to Users. Once the forwarding cycle is
set, the system will report the matched alarm to the specified
personnel according to the settings.
9. Click OK to complete setting an alarm forwarding rule.
END OF STEPS
Result
Example

A new Alarm Forwarding Rule appears in the Rule Setup tab.


The method of setting the forwarding cycle is as follows:
1. Select the check box followed by Forward Cycle Setup. The
Forward Cycle, Begin Data and User Setup are activated,
as shown in Figure 17.
FIGURE 17 SETTING

THE

FORWARDING CYCLE

2. Click the button to set the forwarding cycle, ranging from 2


to 366 days.
3. Click the User Setup button to pop up the User Setup dialog
box, as shown in Figure 18. The left pane shows the days in
the forwarding cycle, while the right pane shows the user list.
Specify the user to receive the reported alarms every day in
the forwarding cycle.

28

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 18 FORWARDING CYCLE USER SETTINGS

4. Click OK to complete the user setup.

Setting an Alarm Filtering Rule


Prerequisites

The user has logged in the OMM server normally.

Context

An alarm filtering rule is used to filter the alarms during the alarm
collection. The selected alarms are neither saved in the database
nor displayed in the Realtime Current Alarms tab.

Steps

1. On the NetNumen M30 window, select Views > Fault Manbutton on the toolbar to open the
agement, or click the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to pop up the Alarm Filtering Rule dialog box, as shown in Figure 20. The Basic tab is
shown by default.

Click the
icon on the sub-toolbar to pop up the New dialog box, as shown in Figure 19. Select the Alarm Filtering
Rule option button, and then click OK.

Confidential and Proprietary Information of ZTE CORPORATION

29

ZXWN MSCS Alarm Management

FIGURE 19 SELECTING ALARM FILTERING RULE

30

Select the Alarm Filtering Rule from the Rule Type pulldown list box on the sub-toolbar, and then click the
icon.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 20 ALARM FILTERING RULE BASIC TAB

4. Type parameters in the Name and Description text boxes,


and specify Rule State and Filter Type.

The rule name is compulsory.


The Rule State contains two options, Enabled and Disabled. A rule in enabled status is valid.
The Filter Type contains two options, Display filtered
alarms and Storage filtered alarms.

Checkpoint:

The Display filtered alarms filtering refers that the system will not display the filtered alarm on the NetNumen
M30 window, but stores it in the database. You may set
this filter valid for all the users or only for its creator.
The Storage filtered alarms filtering refers that the system will neither display the filtered alarm on the NetNumen M30 window nor save it to the database.

5. Select the Condition tab, as shown in Figure 21. Refer to Table


6 for detailed parameter description.

Confidential and Proprietary Information of ZTE CORPORATION

31

ZXWN MSCS Alarm Management

FIGURE 21 ALARM FILTERING RULE CONDITION TAB

TABLE 6 PARAMETER SETTINGS

OF THE

Tab

CONDITION TAB
Description

System Type

Including: alarm box link break alarm, bill


server alarm, correlation alarm, link alarm,
local and remote OMC linkdown alarm, NE
alarm, NE background alarm, OMS alarm
and performance QoS alarm.

Location

Selecting a system type when setting the


occurrence location of the alarm
Selecting a system type when setting the
occurrence location of the alarm

Alarm Code

After the system type is selected, the


Available Items column in the Alarm
Code tab will display all the alarm codes
corresponded by this system type.
This tab contains the Occurrence Time,
Alarm Type and Severity areas.

Time/Type/Severity

32

When the Occurrence Time is not


specified, it ranges from the time of the
first record being generated to that of
the last record being generated.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

Tab

Other

Description

The Alarm Type includes


Communication Alarm, Environment
Alarm, Equipment Alarm, OMS alarm,
Processing Alarm and QoS Alarm.

The Severity includes Critical, Major,


Minor and Warning.

Type detailed description of the alarm

6. Click OK to complete setting an alarm filtering rule.


END OF STEPS
Result

A new Alarm Filtering Rule appears in the Rule Setup tab.

Setting an Alarm Delaying Rule


Prerequisites

The user has logged in the OMM server normally.

Context

The alarm delaying rule allows a user to defer showing some unimportant alarms. If the alarm is automatically recovered within the
specified period, it will not be displayed.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to pop up the Alarm Delaying Rule dialog box, as shown in Figure 23. The Basic tab
is shown by default.

Click the
icon on the sub-toolbar to pop up the New dialog box, as shown in Figure 22. Select the Alarm Delaying
Rule option button, and then click OK.

Confidential and Proprietary Information of ZTE CORPORATION

33

ZXWN MSCS Alarm Management

FIGURE 22 SELECTING ALARM DELAYING RULE

34

Select the Alarm Delaying Rule from the Rule Type pulldown list box on the sub-toolbar, and then click the
icon.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 23 ALARM DELAYING RULE BASIC TAB

4. Type parameters in the Name and Description text boxes,


specify Rule State and Delay Time, and set whether to record
the system log.

The rule name is compulsory.


The Rule State contains two options, Enabled and Disabled. A rule in enabled status is valid.
The Delay Time ranges from 10 to 1,800 seconds.
Select the check box followed by Log to system log when
alarms are affected by the rule to record it in the system log when an alarm is delayed to be displayed on the
NetNumen M30 window.

5. Select the Condition tab, as shown in Figure 24. Refer to Table


7 for detailed parameter description.

Confidential and Proprietary Information of ZTE CORPORATION

35

ZXWN MSCS Alarm Management

FIGURE 24 ALARM DELAYING RULE CONDITION TAB

TABLE 7 PARAMETER SETTINGS

OF THE

Tab

CONDITION TAB
Description

System Type

Including: alarm box link break alarm, bill


server alarm, correlation alarm, link alarm,
local and remote OMC linkdown alarm, NE
alarm, NE background alarm, OMS alarm
and performance QoS alarm.

Location

Selecting a system type when setting the


occurrence location of the alarm
Selecting a system type when setting the
occurrence location of the alarm

Alarm Code

After the system type is selected, the


Available Items column in the Alarm
Code tab will display all the alarm codes
corresponded by this system type.
This tab contains the Occurrence Time,
Alarm Type and Severity areas.

Time/Type/Severity

36

When the Occurrence Time is not


specified, it ranges from the time of the
first record being generated to that of
the last record being generated.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

Tab

Other

Description

The Alarm Type includes


Communication Alarm, Environment
Alarm, Equipment Alarm, OMS alarm,
Processing Alarm and QoS Alarm.

The Severity includes Critical, Major,


Minor and Warning.

Type detailed description of the alarm

6. Click OK to complete setting the alarm delaying rule.


END OF STEPS
Result

A new Alarm Delaying Rule appears in the Rule Setup tab.

Setting an Alarm Counting Rule


Prerequisites

The user has logged in the OMM server normally.

Context

The alarm counting rule allows the system to generate and report
a new alarm separately when the number of the same alarms excesses the threshold in a specified period.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to pop up the Alarm Counting Rule dialog box, as shown in Figure 26. The Basic tab is
shown by default.

Click the
icon on the sub-toolbar to pop up the New dialog box, as shown in Figure 25. Select the Alarm Counting
Rule option button, and then click OK.

Confidential and Proprietary Information of ZTE CORPORATION

37

ZXWN MSCS Alarm Management

FIGURE 25 SELECTING ALARM COUNTING RULE

38

Select the Alarm Counting Rule from the Rule Type pulldown list box on the sub-toolbar, and then click the
icon.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 26 ALARM COUNTING RULE BASIC TAB

4. Type parameters in the Name and Description text boxes,


specify Rule State, and select whether to record the system
log.

The rule name is compulsory.


The Rule State contains two options, Enabled and Disabled. A rule in enabled status is valid.

5. Select the Condition tab, as shown in Figure 27. Refer to Table


8 for detailed parameter description.

Confidential and Proprietary Information of ZTE CORPORATION

39

ZXWN MSCS Alarm Management

FIGURE 27 ALARM COUNTING RULE CONDITION TAB

TABLE 8 PARAMETER SETTINGS

OF THE

Tab

CONDITION TAB
Description

System Type

Including: alarm box link break alarm, bill


server alarm, correlation alarm, link alarm,
local and remote OMC linkdown alarm, NE
alarm, NE background alarm, OMS alarm
and performance QoS alarm.

Location

Selecting a system type when setting the


occurrence location of the alarm
Selecting a system type when setting the
occurrence location of the alarm

Alarm Code

After the system type is selected, the


Available Items column in the Alarm
Code tab will display all the alarm codes
corresponded by this system type.
This tab contains the Occurrence Time,
Alarm Type and Severity areas.

Time/Type/Severity

40

When the Occurrence Time is not


specified, it ranges from the time of the
first record being generated to that of
the last record being generated.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

Tab

Other

Description

The Alarm Type includes


Communication Alarm, Environment
Alarm, Equipment Alarm, OMS alarm,
Processing Alarm and QoS Alarm.

The Severity includes Critical, Major,


Minor and Warning.

Type detailed description of the alarm

6. Select the Action tab, as shown in Figure 28. Refer to Table 9


for detailed parameter description.
FIGURE 28 ALARMING COUNTING RULE ACTION TAB

TABLE 9 PARAMETER SETTINGS

OF THE

ACTION TAB

Parameter

Meaning

If in _ _ there are _ coincident alarms, then a new _


alarm will be generated automatically

Specify the duration for the rule to


take effect and the number of the
identical alarms. A new alarm with
specified severity is generated when
the specified number of identical
alarms is generated within the specified duration.

Confidential and Proprietary Information of ZTE CORPORATION

41

ZXWN MSCS Alarm Management

Parameter
New Alarm Information

Meaning
The description of the new generated
alarm

7. Click OK to complete setting the alarm counting rule.


END OF STEPS
Result

A new Alarm Counting Rule appears in the Rule Setup tab.

Setting an Alarm Persisting Rule


Prerequisites

The user has logged in the OMM server normally.

Context

When the duration of acknowledging an alarm or it being in the


active status exceeds that specified by the alarm persisting rule,
the alarm severity will be raised or a new alarm will be generated.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to pop up the Alarm Persisting Rule dialog box, as shown in Figure 30. The Basic tab
is shown by default.

42

Click the
icon on the sub-toolbar to pop up the New
dialog box, as shown in Figure 29. Select the Alarm Persisting Rule option button, and then click OK.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 29 SELECTING ALARM PERSISTING RULE

Select the Alarm Persisting Rule from the Rule Type


pull-down list box on the sub-toolbar, and then click the
icon.

Confidential and Proprietary Information of ZTE CORPORATION

43

ZXWN MSCS Alarm Management

FIGURE 30 ALARM PERSISTING RULE BASIC TAB

4. Type parameters in the Name and Description text boxes,


specify Rule State, and select whether to record the system
log.

The rule name is compulsory.


The Rule State contains two options, Enabled and Disabled. A rule in enabled status is valid.

5. Select the Condition tab, as shown in Figure 31. Refer to Table


10 for detailed parameter description.

44

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 31 ALARM PERSISTING RULE CONDITION TAB

TABLE 10 PARAMETER SETTINGS


Tab

OF THE

CONDITION TAB
Description

System Type

Including: alarm box link break alarm, bill


server alarm, correlation alarm, link alarm,
local and remote OMC linkdown alarm, NE
alarm, NE background alarm, OMS alarm
and performance QoS alarm.

Location

Selecting a system type when setting the


occurrence location of the alarm
Selecting a system type when setting the
occurrence location of the alarm

Alarm Code

After the system type is selected, the


Available Items column in the Alarm
Code tab will display all the alarm codes
corresponded by this system type.
This tab contains the Occurrence Time,
Alarm Type and Severity areas.

Time/Type/Severity

When the Occurrence Time is not


specified, it ranges from the time of the
first record being generated to that of
the last record being generated.

Confidential and Proprietary Information of ZTE CORPORATION

45

ZXWN MSCS Alarm Management

Tab

Other

Description

The Alarm Type includes


Communication Alarm, Environment
Alarm, Equipment Alarm, OMS alarm,
Processing Alarm and QoS Alarm.

The Severity includes Critical, Major,


Minor and Warning.

Type detailed description of the alarm

6. Select the Action tab, as shown in Figure 32. Refer to Table


11 for detailed parameter description.
FIGURE 32 ALARMING PERSISTING RULE ACTION TAB

TABLE 11 PARAMETER SETTINGS

OF THE

Parameter

46

ACTION TAB
Description

Persistence Time

The interval for an alarm persisting rule to


take effect

Persistence State

The persistence state of the alarm information, either unacknowledged state or active
state

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

Parameter

Description
When an alarm meets the conditions of the
persistence time and the state, the system
will automatically take an action, Raise
Severity or Generate New Alarm.

Raising severity means that the severity


of an alarm changes from the original
level to the specified one when the rule
takes effect.

Generating a new alarm means that the


system will generate a new alarm when
the rule takes effect.

Rule Action

7. Click OK to complete setting the alarm persisting rule.


END OF STEPS
Result

A new Alarm Persisting Rule appears in the Rule Setup tab.

Setting an Alarm Merging Rule


Prerequisites

The user has logged in the OMM server normally.

Context

The alarm merging rule allows the system to merge the same type
of alarms generated within a certain position range. The system
only reports one of them after merging.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to pop up the Alarm Merging Rule dialog box, as shown in Figure 34. The Basic tab is
shown by default.

Click the
icon on the sub-toolbar to pop up the New dialog box, as shown in Figure 33. Select the Alarm Merging
Rule option button, and then click OK.

Confidential and Proprietary Information of ZTE CORPORATION

47

ZXWN MSCS Alarm Management

FIGURE 33 SELECTING ALARM MERGING RULE

48

Select the Alarm Merging Rule from the Rule Type pulldown list box on the sub-toolbar, and then click the
icon.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 34 ALARM MERGING RULE BASIC TAB

4. Type parameters in the Name and Description text boxes,


specify Rule State, and select whether to record the system
log.

The rule name is compulsory.


The Rule State contains two options, Enabled and Disabled. A rule in enabled status is valid.
Select the check box followed by Log to system log when
alarms are affected by the rule to record it in the system
log when alarms are merged.

5. Select the Condition tab, as shown in Figure 35. Refer to Table


12 for detailed parameter description.

Confidential and Proprietary Information of ZTE CORPORATION

49

ZXWN MSCS Alarm Management

FIGURE 35 ALARM MERGING RULE CONDITION TAB

TABLE 12 PARAMETER SETTINGS

OF THE

Tab

CONDITION TAB
Description

System Type

Including: alarm box link break alarm, bill


server alarm, correlation alarm, link alarm,
local and remote OMC linkdown alarm, NE
alarm, NE background alarm, OMS alarm
and performance QoS alarm.

Location

Selecting a system type when setting the


occurrence location of the alarm
Selecting a system type when setting the
occurrence location of the alarm

Alarm Code

After the system type is selected, the


Available Items column in the Alarm
Code tab will display all the alarm codes
corresponded by this system type.
This tab contains the Occurrence Time,
Alarm Type and Severity areas.

Time/Type/Severity

50

When the Occurrence Time is not


specified, it ranges from the time of the
first record being generated to that of
the last record being generated.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

Tab

Other

Description

The Alarm Type includes


Communication Alarm, Environment
Alarm, Equipment Alarm, OMS alarm,
Processing Alarm and QoS Alarm.

The Severity includes Critical, Major,


Minor and Warning.

Fuzzy matching by character string.

6. Click OK to complete setting the alarm merging rule.


END OF STEPS
Result

A new Alarm Merging Rule appears in the Rule Setup tab.

Setting an Alarm Restraining Rule


Prerequisites

The user has logged in the OMM server normally.

Context

When the system generates a root alarm and a consequential


alarm concurrently, the alarm restraining rule allows the user to
set that the system only reports the root alarm, and to decide
whether the system reports the consequential alarm after the
root alarm is recovered according to the requirements.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to pop up the Alarm Restraining Rule dialog box, as shown in Figure 37. The Basic
tab is shown by default.

Click the
icon on the sub-toolbar to pop up the New
dialog box, as shown in Figure 36. Select the Alarm Restraining Rule option button, and then click OK.

Confidential and Proprietary Information of ZTE CORPORATION

51

ZXWN MSCS Alarm Management

FIGURE 36 SELECTING ALARM RESTRAINING RULE

52

Select the Alarm Restraining Rule from the Rule Type


pull-down list box on the sub-toolbar, and then click the
icon.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 37 ALARM RESTRAINING RULE BASIC TAB

4. Type parameters in the Name and Description text boxes,


specify Rule State, and select whether to record the system
log.

The rule name is compulsory.


The Rule State contains two options, Enabled and Disabled. A rule in enabled status is valid.
Select the check box followed by Log to system log when
alarms are affected by the rule to record it in the system
log when alarms are restrained.

5. Select the Condition tab, as shown in Figure 38.

Confidential and Proprietary Information of ZTE CORPORATION

53

ZXWN MSCS Alarm Management

FIGURE 38 ALARM RESTRAINING RULE CONDITION TAB

6. In the Root alarm area, click Setting to pop up the Root


Alarm dialog box, as shown in Figure 39. Specify the parameters as required. Refer to Table 13 for parameter descriptions.

54

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 39 ROOT ALARM DIALOG BOX

TABLE 13 PARAMETER DESCRIPTIONS - ROOT ALARM


Tab

Description

System Type

Including: alarm box link break alarm, bill


server alarm, correlation alarm, link alarm,
local and remote OMC linkdown alarm, NE
alarm, NE background alarm, OMS alarm and
performance QoS alarm.

Location

Setting the location of occurring the alarm after


selecting a system type in the System Type
tab
Setting the alarm code after selecting a
system type in the System Type tab

Alarm Code

The Available Items column displays


all the alarm codes corresponded by
the selected system type.

Other

It contains a Details area.

7. Click OK to return to the Alarm Restraining Rule dialog box.


8. In the Consequential alarm area, click New to pop up the
Consequential Alarm dialog box, as shown in Figure 40.
Specify the parameters as required. Refer to Table 14 for
parameter descriptions.

Confidential and Proprietary Information of ZTE CORPORATION

55

ZXWN MSCS Alarm Management

FIGURE 40 CONSEQUENTIAL ALARM DIALOG BOX

TABLE 14 PARAMETER DESCRIPTION - CONSEQUENTIAL ALARM


Tab

Description

System Type

Including: alarm box link break alarm, bill


server alarm, correlation alarm, link alarm, local and remote OMC linkdown alarm, NE alarm,
NE background alarm, OMS alarm and performance QoS alarm.

Location

Setting the location of occurring the alarm


after selecting a system type in the System
Type tab
Setting the alarm code after selecting a
system type in the System Type tab

Alarm Code

The Available Items column displays


all the alarm codes corresponded by
the selected system type.

Other

It contains a Details area.

9. Click OK to return to the Alarm Restraining Rule dialog box.


10. Click OK to complete setting the alarm restraining rule.
END OF STEPS
Result

56

A new Alarm Restraining Rule appears in the Rule Setup tab.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

Setting a Notification Filtering Rule


Prerequisites

The user has logged in the OMM server normally.

Context

The notification filtering rule is used to filter notifications during the


collection. The system will not display the selected notifications in
the Realtime Notification tab, but save them to the database.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to pop up the Notification
Filtering Rule dialog box, as shown in Figure 42. The Basic
tab is shown by default.

Click the
icon on the sub-toolbar to pop up the New
dialog box, as shown in Figure 41. Select the Notification
Filtering Rule option button, and then click OK.
FIGURE 41 SELECTING NOTIFICATION FILTERING RULE

Select the Notification Filtering Rule from the Rule


Type pull-down list box on the sub-toolbar, and then click
the
icon.

Confidential and Proprietary Information of ZTE CORPORATION

57

ZXWN MSCS Alarm Management

FIGURE 42 NOTIFICATION FILTERING RULE BASIC TAB

4. Type parameters in the Name and Description text boxes,


and specify Rule State and Filter Type.

The rule name is compulsory.


The Rule State contains two options, Enabled and Disabled. A rule in enabled status is valid.
The Filter Type contains two options, Display filtered
notifications and Storage filtered notifications.

Tip:

The Display filtered notifications filtering refers that the


system will not display the filtered notification on the NetNumen M30 window, but stores it in the database. You
may set this filter valid for all the users or only for its creator.
The Storage filtered notifications filtering refers that the
system will neither display the filtered notification on the
NetNumen M30 window nor save it to the database.

5. Select the Condition tab, as shown in Figure 43. Refer to Table


15 for detailed parameter description.

58

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 43 NOTIFICATION FILTERING RULE CONDITION TAB

TABLE 15 PARAMETER SETTINGS


Tab

OF THE

CONDITION TAB

Description

System Type

The system type is background device alarm


and NE Alarm.

Location

Setting the location of occurring notifications


after selecting the system type
Setting the notification code after selecting
the system type

Notification Code

The Available Items column will display all


the notification codes corresponded by the
selected system type.
This tab contains the Occurrence Time
area and the Details area. When the time
of occurring notifications is not specified, it
ranges from the time of the first record to
that of the last record.

Other

6. Click OK to complete setting the notification filtering rule.


END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

59

ZXWN MSCS Alarm Management

Result

A new Notification Filtering Rule appears in the Rule Setup


tab.

Regrading Alarm Severities


Prerequisites

The user has logged in the OMM server normally.

Context

Each alarm corresponds to an alarm severity. Alarms are divided


into the four levels based on the severity: critical alarms, major alarms, minor alarms and warning. The default severity has
been set for each alarm during the system initialization. Perform
this procedure to modify the alarm severity as required during the
running of the system.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Double-click Setting > Severity Regrading Setup in the
Management Tree to open the Severity Regrading Setup
tab, as shown in Figure 44.
FIGURE 44 SEVERITY REGRADING SETUP

3. After the System Type is selected, all the alarms with this system type will be displayed in the Severity Regrading Setup
tab automatically, as shown in Figure 45.

60

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 45 ALARM LIST

4. Click the alarm item whose severity is to be redefined. Select a


new severity from the New Severity pull-down list. After the
alarm severity is changed, the system automatically shows a
check mark in the Modified column, as shown in Figure 46.
FIGURE 46 ALARM SEVERITY LIST

5. Click the
icon on the toolbar to save the modification on
the server. At this time, the mark on the Modified column is
cleared automatically, as shown in Figure 47.

Confidential and Proprietary Information of ZTE CORPORATION

61

ZXWN MSCS Alarm Management

FIGURE 47 COMPLETING SEVERITY REGRADE

END OF STEPS
Result

Regrade the alarm severities successfully.

Setting an Alarm Box


Prerequisites

The user has logged in the OMM server normally.

Context

Perform this procedure so that the system can normally report the
alarm information to the alarm box.

Steps

1. On the NetNumen M30 window, select Views > Fault Manbutton on the toolbar to open the
agement, or click the
Fault Management window.
2. Double-click Setting > Alarm Box Setup in the Management Tree to open the Alarm Box Setup tab, as shown in
Figure 48.
FIGURE 48 ALARM BOX SETUP

62

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

3. Click the
icon on the tab to pop up the Alarm Box Detail
dialog box, as shown in Figure 49. Refer to Table 16 for details
of the alarm box settings.
FIGURE 49 ALARM BOX DETAIL-BASIC

TABLE 16 ALARM BOX INFORMATION PARAMETERS


Parameter

Description

Alarm Box Name

The name of the alarm box, which is required

Alarm Box
scription

The description of the alarm box. Type the


parameter as required

Initial State

De-

Selects the initial state of the alarm box,


either Enabled or Disabled. When Enable is
selected, the alarm box works normally

Confidential and Proprietary Information of ZTE CORPORATION

63

ZXWN MSCS Alarm Management

Parameter

Description

Alarm Box IP

The alarm boxs IP address that is in the same


network section with the OMM server, which
must be typed

Server Port

The port number for the alarm box to


communicate with the server is 6700

Display Alarm Severity

Controls the alarm severity displayed on the


alarm box, which is divided into five types:
none, warning and above, minor and above,
major and above and critical.

Speak Alarm Severity

Sets that the alarm box gives sound


corresponding to a certain level and above
among all levels in the current alarm pool,
including none, warning and above, minor and
above, major and above and critical.

4. Click the Condition tab, as shown in Figure 50.

64

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 50 ALARM BOX DETAIL-CONDITION

5. Choose an alarm level in theAlarm Severities Sent to Alarm


Box Click New button to pup up the Alarm Box Rule dialog
box, as shown in Figure 51.

Confidential and Proprietary Information of ZTE CORPORATION

65

ZXWN MSCS Alarm Management

FIGURE 51 DETAILS

OF

ALARM BOX RULE

6. Type parameters in the Name and Description text boxes,


and specify parameters in each tab. Refer to Table 17 for detailed parameter descriptions of each tab.
TABLE 17 PARAMETER DESCRIPTION
Tab

OF

ALARM BOX RULE

Description

System Type

Including: alarm box link break alarm, bill server


alarm, correlation alarm, link alarm, local and
remote OMC linkdown alarm, NE alarm, NE
background alarm, OMS alarm and performance
QoS alarm.

Location

Setting the location of occurring the alarm after


selecting a system type in the System Type tab
Setting the notification code after selecting the
system type

Alarm Code

The Available Items column will display all the


alarm codes corresponded by the selected system
type.
This tab contains three parts: occurrence time,
alarm type, and details.

Other

66

When the Occurrence Time is not specified,


it ranges from the time of the first record to
that of the last record.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

Tab

Description

The Alarm Type includes Communication


Alarm, Environment Alarm, Equipment Alarm,
OMS alarm, Processing Alarm and QoS Alarm

7. Click OK to completing setting the alarm box rule. The system


will add a record in the list, as shown in Figure 52.
FIGURE 52 ADD

RECORD

8. Click OK in the Alarm Box Detail dialog box. The system


adds an alarm box record in the Alarm Box Setup tab.
9. Click the
icon in the Alarm Box Setup tab. The Confirm
dialog box pops up, click OK to activate the alarm box.
END OF STEPS
Result

Add and acviate the alarm box successfully .

Confidential and Proprietary Information of ZTE CORPORATION

67

ZXWN MSCS Alarm Management

Preference Settings
Setting Monitoring View
Prerequisites

The user has logged in the OMM server normally.

Context

Perform this procedure to set whether to show the monitoring


chart, monitoring table, or nothing in the monitoring area when
the Fault Management window is opened.

Steps

1. On the NetNumen M30 window, select Views > Fault Manbutton on the toolbar to open the
agement, or click the
Fault Management window.
2. On the Fault Management window, select Operation >
Preferences to pop up the Preferences dialog box, as shown
in Figure 53. The Monitoring View Setup tab is shown by
default.

68

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

FIGURE 53 PREFERENCES MONITORING VIEW SETUP

3. In the Set the default monitoring view when opening


Fault Management area, set the tab shown when the Fault
Management window is opened, including the following
options:

Do not show any monitoring view

Show the composite monitoring view

Show the realtime alarm monitor

Show the monitoring table.

4. In the Set the number of alarm monitoring chart and the


condition of the monitoring area, set the number of the
alarm monitoring charts to be displayed and the monitoring
conditions of the charts.
5. Click OK to complete setting the monitoring view.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

69

ZXWN MSCS Alarm Management

Result

Set the monitoring view successfully.

Setting Alarm Sounds


Prerequisites

The user has logged in the OMM server normally.

Confirm that the sound file exists. The default format is *.wav.

Context

Perform this procedure to specify the alarm sound for each alarm
severity that is given on the OMM client. By default, the sound
mode is set as silence.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. On the Fault Management window, click Operation > Preferences to pop up the Preferences dialog box.
3. Select the Alarm Sound Setup tab.
4. Select the sound mode from the Sound Mode pull-down list
in each alarm severity area. There are two sound modes continuous sound and short beeps. At this time, the Play, Select
and Default buttons are enabled, as shown in Figure 54.
FIGURE 54 PREFERENCES - ALARM SOUND SETUP

70

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

5. Click Select button to select a sound file, and click Play button
to play it.
6. Click OK to complete the settings.
END OF STEPS
Result

Set alarm sounds successfully.

Setting Alarm Colors


Prerequisites

The user has logged in the OMM server normally.

Context

Perform this procedure to specify the color of each alarm severity displayed on the OMM client for distinguishing different alarm
severities.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. On the Fault Management window, click Operation > Preferences to pop up the Preferences dialog box.
3. Select the Alarm Color Setup tab, as shown in Figure 55.

Confidential and Proprietary Information of ZTE CORPORATION

71

ZXWN MSCS Alarm Management

FIGURE 55 PREFERENCES - ALARM COLOR SETUP

4. In Alarm Color Setup tab, set the color for different alarm
severities.
5. Click OK to save the color parameters.
END OF STEPS
Result

Set alarm colors successfully.

Setting Forwarding Templates


Prerequisites
Context

72

The user has logged in the OMM server normally.


Perform this procedure to set the format of the forwarded short
message and E-mail, facilitating the system to send the alarm in-

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Alarm Settings

formation to specified handset or mailbox through short messages


or E-mails.
Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. On the Fault Management window, select Operation >
Preferences to pop up the Preferences dialog box.
3. Select the Forward Template Setup tab, as shown in Figure
56. In this tab, the forwarding templates of the short message, E-mail subject, and E-mail contents can be checked and
restored.
FIGURE 56 PREFERENCES, FORWARD TEMPLATE SETUP

4. In the Setup the forwarding subject template of the mail


area, type [ to select required parameters from the pop-up
choice box, as shown in Figure 57.

Confidential and Proprietary Information of ZTE CORPORATION

73

ZXWN MSCS Alarm Management

FIGURE 57 SETTING EMAIL FORWARDING SUBJECT TEMPLATE

Tip:
The operation to set the forwarding template of the handset
short message and the forwarding content template of the mail
are similar to this operation.
5. Click OK to save the forwarding template parameters.
END OF STEPS
Result

74

Set forwarding templates successfully.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Alarm Operations
Table of Contents
Alarm Information Operations .............................................75
Alarm Querying Operations .................................................80
Alarm Record Operations ....................................................90
Alarm Maintenance Suggestions ........................................ 103
Alarm Rule Operations ..................................................... 110
Alarm Box Operations ...................................................... 113

Alarm Information
Operations
Viewing Composite Alarm Monitoring
Chart
Prerequisites

The user has logged in the OMM server normally.

Context

Perform this procedure to monitor the current alarms and notifications of the system to know the running status of the network.
The composite alarm monitoring reflects the unprocessed alarms
in the system in broken line charts or bar charts.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Perform one of the following steps to pop up the Composite
Alarm Monitor tab, as shown in Figure 58.

Double-click Monitor > Composite Alarm Monitor in the


Management Tree.
Select Quick Navigation > Fault Management > Composite Alarm Monitor.

The Composite Alarm Monitor tab is divided into two panes.


The upper pane shows the Monitoring Chart of current
alarms, while the bottom pane shows the list of Realtime
Current Alarms, Realtime History Alarms and Realtime
Notification Monitor in different tabs.

Confidential and Proprietary Information of ZTE CORPORATION

75

ZXWN MSCS Alarm Management

FIGURE 58 COMPOSITE ALARM MONITORING TAB

Tip:
Perform one of the following steps to view the alarm monitoring
chart independently.

Double-click Monitor > Alarm Chart Monitor in the


Management Tree.
Select Quick Navigation > Fault Management > Alarm
Chart Monitor.

END OF STEPS
Result

View the composite alarm monitoring chart successfully.

Monitoring Real-Time Alarms


Prerequisites

76

The user has logged in the OMM server normally.

Context

The real-time alarm monitor is responsible for monitoring the


alarms (including current and history alarms) in real time.
Monitoring current alarms in real time may obtain the alarm
information of the equipment and network in the earliest time.
Monitoring history alarms in real time reflects the conditions of
alarms being processed or restored in the system.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

2. Perform one of the following steps to pop up the Realtime


Alarm Monitor tab, as shown in Figure 59. This tab is displayed in two panes. The current alarms are monitored in real
time in the upper pane; while the history alarms are monitored
in real time in the lower pane.

Double-click Monitor > Realtime Alarm Monitor in the


Management Tree.
Select Quick Navigation > Fault Management > Realtime Alarm Monitor.

FIGURE 59 REAL-TIME ALARM MONITOR

END OF STEPS
Result

Monitor realtime and history alarms successfully on Realtime


Alarm Monitor tab.

Monitoring Real-Time Notifications


Prerequisites

The user has logged in the OMM server normally.

Context

The real-time notification monitor is responsible for monitoring the


notifications in real time. Monitoring the notifications in real time
may obtain the notification messages of the equipment and the
network in the earliest time.

Steps

1. On the NetNumen M30 window, select Views > Fault Manbutton on the toolbar to open the
agement, or click the
Fault Management window.
2. Perform one of the following steps to pop up the Realtime
Notification Monitor tab, as shown in Figure 60.

Double-click Monitor > Realtime Notification Monitor


in the Management Tree.
Click Quick Navigation > Fault Management > Realtime Notifications.

Confidential and Proprietary Information of ZTE CORPORATION

77

ZXWN MSCS Alarm Management

FIGURE 60 REAL-TIME NOTIFICATION MONITOR

END OF STEPS
Result

Monitor realtime and history notifications successfully on Realtime Notification Monitor tab.

Synchronizing Alarm Information


Prerequisites

Context

The user has logged in the OMM server normally.

The communication between the OMM server and the equipment is normal.

The alarm synchronization function is to synchronize the NE


alarms. Users may select the system type and the NE location
information to be synchronized.
When the alarm data of the OMM system are possibly inconsistent
with those of the foreground equipment, manually synchronize
the alarm data of the foreground equipment to the OMM server
through this function.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. On the Fault Management window, select Operation >
Alarm Synchronization to pop up the Alarm Synchronization dialog box, as shown in Figure 61. Set the conditions of
alarm synchronization.

78

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

FIGURE 61 ALARM SYNCHRONIZATION

3. Click Select to pop up the System Type dialog box. Select


the system type to be synchronized, as shown in Figure 62.

Selecting the Bill Server Alarm radio box means synchronizing the alarms on the billing server.
Selecting the NE Alarm radio box means synchronizing the
alarms on the foreground NE equipment.

Confidential and Proprietary Information of ZTE CORPORATION

79

ZXWN MSCS Alarm Management

FIGURE 62 SYSTEM TYPE

4. Click OK. The system synchronizes the alarm data of the specified location. The alerting box pops up when the synchronization is successful.
END OF STEPS
Result

Synchronize the alarm information successfully.

Alarm Querying Operations


Querying Current Alarms
Prerequisites

The user has logged in the OMM server normally.

The communication between the OMM server and the equipment is normal.

Context

Perform this procedure to query the current alarms according to


certain conditions. Users may query the current alarm data according to conditions such as the specified location, time, alarm
severity, alarm type, status and alarm causes.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Perform one of the following steps to open the querying tab,
as shown in Figure 63. View all the current alarms.

80

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

Double-click Query > Query Current Alarms > All Current Alarms in the Management Tree.
In the Management Tree, right-click the All Current
Alarms node, and then select Execute from the short-cut
menu.

FIGURE 63 ALL CURRENT ALARMS TAB

3. Perform one of the following steps to pop up the Query Current Alarm dialog box, as shown in Figure 64. Set the querying conditions as required.

Click

icon on the toolbar of the All Current Alarms tab.

In the Management Tree, right-click the All Current


Alarms node, and then select Edit from the short-cut
menu.

Confidential and Proprietary Information of ZTE CORPORATION

81

ZXWN MSCS Alarm Management

FIGURE 64 CURRENT ALARM QUERY CONDITION

4. Click OK. A querying progress indicator automatically appears


at the bottom right corner of the window. After the process
indicator disappears, all the alarms meeting the conditions are
shown in the right pane.

Tip:
If the queried result does not meet the requirements, click the
button to set the querying conditions again.
END OF STEPS
Result

Query the current alarms successfully.

Querying History Alarms


Prerequisites

Context

82

The user has logged in the OMM server normally.

The communication between the OMM server and the equipment is normal.

Perform this procedure to query history alarms according to certain conditions. Users may query history alarms according to conditions such as specified location, time, alarm severity, alarm type,
status and alarm causes.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Perform one of the following steps to open the corresponding
querying tab.
If

Then

If you want to query history


alarms in one day

Perform one of the following


steps to open the querying
tab.

If you want to query history


alarms in three days

Double-click Query >


Query History Alarms
> History Alarms
in One Day in the
Management Tree.
In the Management
Tree, right-click the
History Alarms in One
Day node, and then
select Execute from the
shortcut menu.

Perform one of the following


steps to open the querying
tab.

Double-click Query >


Query History Alarms
> History Alarms in
Three Days in the
Management Tree.
In the Management
Tree, right-click the
History Alarms in
Three Days node, and
then select Execute from
the shortcut menu.

3. Perform one of the following steps to pop up the Query History Alarm dialog box, as shown in Figure 65. Set the querying conditions as required.

Click

icon on the toolbar.

In the Management Tree, right-click the History Alarms


in One Day node (or History Alarms in Three Days
node), and then select Edit from the shortcut menu.

Confidential and Proprietary Information of ZTE CORPORATION

83

ZXWN MSCS Alarm Management

FIGURE 65 HISTORY ALARM QUERY CONDITION

4. Click OK. A querying progress indicator automatically appears


at the bottom right corner of the window. After the process
indicator disappears, all the alarms meeting the conditions are
shown in the right pane.

Tip:
If the queried result does not meet the requirements, click the
button to set the querying conditions again.
END OF STEPS
Result

Querying the history alarms successfully.

Querying Notifications
Prerequisites

Context

84

The user has logged in the OMM server normally.

The communication between the OMM server and the equipment is normal.

Perform this procedure to query the notifications according to certain conditions. Users may set specific positions, time, causes, description, and system types to query expected notifications based
on these conditions.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Perform one of the following steps to open the corresponding
querying tab.
If

Then

If you want to query


notifications in one day

Perform one of the following


steps to open the querying
tab.

If you want to query


notifications in three days

Double-click Query >


Query Notifications >
Notifications in One
Day in the Management
Tree.
In the Management
Tree, right-click the
Notifications in One
Day node, and then
select Execute from the
shortcut menu.

Perform one of the following


steps to open the querying
tab.

Double-click Query >


Query Notifications
> Notifications in
Three Days in the
Management Tree.
In the Management
Tree, right-click the
Notifications in Three
Days node, and then
select Execute from the
shortcut menu.

3. Perform one of the following steps to pop up the Query Notification dialog box, as shown in Figure 66. Set the querying
conditions as required.

Click

icon on the toolbar.

In the Management Tree, right-click the Notifications


in One Day node (or Notifications in Three Days node),
and then select Edit from the shortcut menu.

Confidential and Proprietary Information of ZTE CORPORATION

85

ZXWN MSCS Alarm Management

FIGURE 66 NOTIFICATION QUERY CONDITION

4. Click OK. A querying progress indicator automatically appears


at the bottom right corner of the window. After the process indicator disappears, all the notifications meeting the conditions
are shown in the right pane.

Tip:
If the queried result does not meet the requirements, click the
button to set the querying conditions again.
END OF STEPS
Result

Query the notifications successfully.

Customizing Query
Prerequisites

Context

86

The user has logged in the OMM server normally.

The communication between the OMM server and the equipment is normal.

Perform this procedure to customize the query of current alarms,


history alarms, and notifications. Users may set customized
querying conditions, such as specific positions, time, causes,

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

description and system types, and implement the query based on


these conditions.
Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. In the Management Tree, right-click Query > Custom
Query, and select the required querying conditions from the
shortcut menu, including New Current Alarm Query, New
History Alarm Query and New Notification Query. The
New Query dialog box pops up, as shown in Figure 67.
FIGURE 67 NEW QUERY DIALOG BOX

3. Type the query name, and click OK to pop up the corresponding


querying condition setting dialog box, as show in Figure 68. Set
the conditions as required.

Confidential and Proprietary Information of ZTE CORPORATION

87

ZXWN MSCS Alarm Management

FIGURE 68 QUERY CURRENT ALARM

4. Click OK. The system automatically generates a node named


with this query name under the Custom Query node, as show
in Figure 69.
FIGURE 69 CUSTOMIZED NODE

88

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

5. Double-click the new generated node. The alarms or notifications meeting the querying conditions are shown in the right
pane, as show in Figure 70.
FIGURE 70 CURRENT ALARM

Tip:
If the queried result does not meet the requirements, click the
button to set the querying conditions again.
END OF STEPS
Result

Query the alarms or notifications successfully.

Confidential and Proprietary Information of ZTE CORPORATION

89

ZXWN MSCS Alarm Management

Alarm Record Operations


Acknowledging an Alarm
Prerequisites

Confirm that the queried alarm information is the one to be acknowledged.

Context

Perform this procedure to change the status of an alarm from


the unacknowledged status to the acknowledged status, indicating that the maintenance personnel have known this alarm and
started to process it.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Perform one of the following steps to open the querying tab.

Double-click Query > Query Current Alarms > All Current Alarms in the Management Tree.
In the Management Tree, right-click the All Current
Alarms node, and then select Execute from the shortcut
menu.

3. In the alarm list, right-click the alarm to be acknowledged, select Acknowledge from the shortcut menu, as show in Figure
71.

90

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

FIGURE 71 ACKNOWLEDGING ALARMS

4. Type the acknowledging information in the popup Acknowledge Alarm dialog box based on the actual alarm processing,
as shown in Figure 72.
FIGURE 72 ACKNOWLEDGING ALARM

Confidential and Proprietary Information of ZTE CORPORATION

91

ZXWN MSCS Alarm Management

5. Click OK to acknowledge the alarm.


END OF STEPS
Result

The status of this alarm changes from the unacknowledged status


to the acknowledged status.

Unacknowledging an Alarm
Prerequisites

Confirm that the queried alarm information is the one to be unacknowledged.

Context

Perform this procedure to change the status of an alarm from the


acknowledged status to the unacknowledged status. This operation can only be performed on the alarm information that has been
acknowledged.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Perform one of the following steps to open the querying tab.

Double-click Query > Query Current Alarms > All Current Alarms in the Management Tree.
In the Management Tree, right-click the All Current
Alarms node, and then select Execute from the shortcut
menu.

3. In the alarm list, right-click the alarm to be unacknowledged,


select Unacknowledged from the shortcut menu, as shown
in Figure 73.

92

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

FIGURE 73 UNACKNOWLEGDING ALARM

4. Type the information in the popup Unacknowledge Alarm


dialog box based on the actual alarm processing, as shown in
Figure 74.
FIGURE 74 UNACKNOWLEDGING ALARM

Confidential and Proprietary Information of ZTE CORPORATION

93

ZXWN MSCS Alarm Management

5. Click OK to complete the operation.


END OF STEPS
Result

The status of this alarm changes from the acknowledged status to


the unacknowledged status.

Clearing an Alarm
Prerequisites

The user has logged in the OMM server normally.

Context

Perform this procedure to clear current alarm. The cleared alarm


is automatically shown in the Realtime History Alarms pane of
the Composite Alarm Monitor tab. Users may query it by performing history alarm query.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Perform one of the following steps to open the querying tab.

Double-click Monitor > Composite Alarm Monitor in the


Management Tree.
Select Quick Navigation > Fault Management > Composite Alarm Monitor.

3. In the Realtime Current Alarms pane of the Composite


Alarm Monitor tab, right-click the alarm to be cleared, and
select Clear from the shortcut menu.
4. The Confirm dialog box pops up. Click OK to clear the alarm.
The cleared alarm is automatically shown in the Realtime History Alarms pane.
END OF STEPS
Result

The alarm message is cleared and displays in the Realtime History Alarms pane.

Postrequisite

Refer to Querying History Alarms for the procedure of querying the


history alarm information.

Forwarding an Alarm
Prerequisites

94

Confirm that the user has logged in the OMM server normally.

Confirm that the ZXWN OMM server connects with the SC and
the E-mail server normally.

Context

Perform this procedure to forward an alarm to other specified administrators by sending a short message or Email, facilitating the
administrators to handle the alarm in the earliest time.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

2. Perform one of the following steps to open the querying tab.


Double-click Query > Query Current Alarms > All Current
Alarms in the Management Tree.
In the Management Tree, right-click the All Current Alarms
node, and then select Execute from the shortcut menu.
3. In the current alarm list, right-click the alarm to be forwarded,
and select Forward from the shortcut menu.
4. The Forwarding Setup dialog box pops up, as shown in Figure
75. Type Forwarded-to Email Address and Forwarded-to
Phone Number of the personnel to process the alarm. You
may select to forward this alarm information by E-mail or by
SMS.

When selecting the Forwarded-to Email Address check


box, type Email contents in the Forward by Email tab.
When selecting the Forwarded-to Phone Number check
box, type short message contents in the Forward by SMS
tab.

FIGURE 75 FORWARDING SETUP

5. Click OK to forward the alarm to specified personnel.


END OF STEPS
Result

The alarm message is successfully forwarded to specified personnel .

Locating an Alarm on the Rackchart


Prerequisites

Confirm that the user has logged in the OMM server normally.

Confidential and Proprietary Information of ZTE CORPORATION

95

ZXWN MSCS Alarm Management

Context

Perform this procedure to locate the selected alarm on the board


that generates this alarm.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Perform one of the following steps to open the querying tab.

Double-click Query > Query Current Alarms > All Current Alarms in the Management Tree.
In the Management Tree, right-click the All Current
Alarms node, and then select Execute from the shortcut
menu.

3. In the current alarm list, right-click the alarm to be forwarded,


and select Go to Rackchart from the shortcut menu, as shown
in Figure 76. The Rackchart Management window pops up,
and the board generating this alarm is selected.
FIGURE 76 GO

TO

RACKCHART

4. Click
on the upper right corner to close the current tab and
return to the All Current Alarms tab.
END OF STEPS
Result

Locate an alarm message on the rackchart successfully.

Viewing Detailed Alarm Information


Prerequisites

96

Confirm that the user has logged in the OMM server normally.

Confirm that the queried alarm information is the one to be


viewed.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

Context

Perform this procedure to view detailed information of alarms and


corresponding maintenance suggestions, facilitating maintenance
personnel to locate and handle faults in the earliest time.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. In the alarm list, double-click the alarm to be viewed to pop up
the Details dialog box, as shown in Figure 77. Refer to Table
18 for parameter descriptions.
FIGURE 77 DETAILS

OF AN

ALARM

TABLE 18 PARAMETER DESCRIPTIONS

FOR

ALARM INFORMATION

Parameter

Description

Example

Alarm Severity

Alarm level

Major

Occurrence time

The happen time of an


alarm

2009-12-22
08:32:02

Location

The location that


generates the alarm

Bureau=31,Rack=
1,Shelf=2,Slot=3,
CPU=1

Alarm code

Brief description and


alarm code of an alarm

Trunk error(519)

Confidential and Proprietary Information of ZTE CORPORATION

97

ZXWN MSCS Alarm Management

Parameter

Description

Example
i.

Probable cause

The probable cause of


the alarm

The receiving
cable of
local trunk
equipment
is faulty.
The cable is
disconnected,
or cable
connector is
broken.

ii. The
transmitting
cable of
opposite trunk
equipment
is faulty.
The cable is
disconnected,
or cable
connector is
broken.
iii. Trunk
transmission
line is faulty.
The local
DDF and
equipment are
not properly
connected.
iv. Operation of
LOS insertion
is operated at
opposite trunk
equipment.
Manual
inset alarm
operation is
performed
in diagnostic
test.(519)

98

Alarm type

Alarm type

Communication
alarm

Acknowledgment
Status

Acknowledged/unacknowledged status of the


alarm

Unacknowledged

(Un)acknowledge
Operator

The operator to acknowledge/unacknowledge


this alarm

(Un)acknowledge
System

The OMM system to


acknowledge/unacknowledge this alarm

(Un)acknowledge
Information

The information typed


when this alarm is
acknowledged

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

Parameter

Description

Example

(Un)acknowledge
Time

The time of this alarm


being acknowledged/unacknowledged

Last update time

System type

The system type that the


alarm belongs to

NE Alarm
4294967327

Original ID
Node No.

The OMM node number


that generates the alarm

100001

ID

System ID

1261503574128

Comment
information

Details

Detailed information
related to this alarm

Error type=2(Signal loss of trunk of


E1)

NE type

The NE generating this


alarm

Other information

Trunk number=8;

3. Select the Maintenance Suggestion tab to display the maintenance suggestions of the alarm, as shown in Figure 78.

Confidential and Proprietary Information of ZTE CORPORATION

99

ZXWN MSCS Alarm Management

FIGURE 78 MAINTENANCE SUGGESTION

4. Click Close to close the dialog box.


END OF STEPS
Result

Views alarm information details and maintenance suggestion successfully.

Printing Alarm Information


Prerequisites

100

Confirm that the user has logged in the OMM server normally.

Confirm that the queried alarm information is the one to be


printed.

Confirm that the printer is connected and set correctly.

Context

Perform this procedure to print the alarm data shown in the Fault
Management window opened by the current user, and to set some
items, such as the print range, copies, page setup and appearance
before printing, to satisfy the requirements of the printing effect.

Steps

1. On the alarm list area, click the


icon on the toolbar. The
Print Setup dialog box pops up, as shown in Figure 79.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

FIGURE 79 PRINT SETUP - GENERAL

2. On the General tab, configure the general information of the


print setup.
3. Select the Page Setup tab to set the page parameters, as
shown in Figure 80.
FIGURE 80 PRINT SETUP - PAGE SETUP

4. Select the Advance tab to set the parameters as required, as


show in Figure 81.

Confidential and Proprietary Information of ZTE CORPORATION

101

ZXWN MSCS Alarm Management

FIGURE 81 PRINT SETUP - ADVANCE

5. When settings are finished, click Print to start printing the


alarm list. Click Preview All to preview the printing effect.
END OF STEPS
Result

Print alarm information successfully.

Exporting Alarm Information


Prerequisites

102

Confirm that the user has logged in the OMM server normally.

Confirm that the queried alarm information is the one to be


exported.

Context

Perform this procedure to export all the alarm data shown on the
alarm area opened by the current user to a file, whose format may
be text, EXCEL, PDF, HTML and CSV.

Steps

1. On the alarm list area, click the


on the toolbar to pop up the
Save dialog box. Set Save In, File Name and Files of Type,
as shown in Figure 82.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

FIGURE 82 SAVE DIALOG BOX

2. Click Save to export the data of the selected alarm list to the
specified file in the specified path.
END OF STEPS
Result

Export the data of the selected alarm list successfully.

Alarm Maintenance
Suggestions
Adding Alarm Maintenance
Suggestions
Prerequisites
Context

Confirm that the user has logged in the OMM server normally.
Based on the long-term running of the network, the maintenance
experience on common problems may be summarized as the reference for solving similar problems in the future. The summary
of such maintenance experience is the customized alarm maintenance suggestion.
Perform this procedure to add a new suggestion of processing one
type of alarms based on the actual operations.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. On the Fault Management window, double-click Setting >
Maintenance Suggestion Setup in the Management Tree

Confidential and Proprietary Information of ZTE CORPORATION

103

ZXWN MSCS Alarm Management

to pop up the Maintenance Suggestion Setup tab, as shown


in Figure 83.
FIGURE 83 MAINTENANCE SUGGESTION SETUP

3. On the Maintenance Suggestion Setup tab, from the System Type pull-down list box, select the alarm type to be set,
including All System Type, Alarm Box Link Break Alarm,
Background Device Alarm, Bill Server Alarm, Correlation Alarm, Link Alarm, Local and Remote OMC Linkdown
Alarm, NE Alarm, NE Background Alarm, OMS Alarm and
Performance QoS Alarm.
4. Click the
icon on the toolbar to pop up the Maintenance
suggestion dialog box, as shown in Figure 84.

104

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

FIGURE 84 MAINTENANCE SUGGESTION

5. Click Select to set Alarm Code and Probable Cause. After


the Probable Cause is set, the system automatically shows
its default suggestion in the Default Suggestions text box.
If you want to change the default one, type your suggestions
in the Customized Suggestions text box.
6. Click OK to finish the setting of the alarm maintenance suggestion.
END OF STEPS
Result

Add alarm maintenance suggestions successfully.

Modifying an Alarm Maintenance


Suggestion
Prerequisites

Confirm that the user has logged in the OMM server normally.

Context

Perform this procedure to improve the established suggestions


based on the actual operations. The modified alarm maintenance
suggestion will be shown in the Customized Suggestions text
box, which will not replace the default suggestion.

Steps

1. On the NetNumen M30 window, select Views > Fault Manbutton on the toolbar to open the
agement, or click the
Fault Management window.
2. On the Fault Management window, double-click Setting >
Maintenance Suggestion Setup in the Management Tree
to pop up the Maintenance Suggestion Setup tab.

Confidential and Proprietary Information of ZTE CORPORATION

105

ZXWN MSCS Alarm Management

3. On the Maintenance Suggestion Setup tab, from the System Type pull-down list, select the alarm type to be modified.
4. On the suggestion list area, perform one of the following steps
to edit a maintenance suggestion.

Right-click the suggestion to be modified, and select Modify from the shortcut menu.
Select the suggestion to be modified, and click
sub-toolbar.

on the

Double-click the suggestion to be modified.

5. The Maintenance Suggestion dialog box pops up, as shown


in Figure 85. Type the modified suggestion in the Customized
Suggestions text box.
FIGURE 85 MODIFYING

AN

ALARM MAINTENANCE SUGGESTION

6. Click OK to finish the modification of the alarm maintenance


suggestion.
END OF STEPS
Result

Modify an alarm maintenance suggestion successfully.

Exporting an Alarm Maintenance


Suggestion
Prerequisites

106

Confirm that the user has logged in the OMM server normally.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

Context

The ZXWN OMM system allows the user to export alarm maintenance suggestions in the system to a file. It supports exporting
alarm data to a CSV, text, EXCEL, PDF or HTML file.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. On the Fault Management window, double-click Setting >
Maintenance Suggestion Setup in the Management Tree
to pop up the Maintenance Suggestion Setup tab.
3. Click the
icon on the sub-toolbar to pop up the Save dialog
box. Select the proper path and the file name, as shown in
Figure 86.
FIGURE 86 SAVING DIALOG BOX

4. Click Save to export the selected alarm maintenance suggestions.


END OF STEPS
Result

Export an alarm maintenance suggestion successfully.

Importing an Alarm Maintenance


Suggestion
Prerequisites
Context

Confirm that the user has logged in the OMM server normally.
The ZXWN OMM system supports importing the alarm maintenance suggestion file with specified format. The import operation
is used to import the alarm maintenance suggestions defined in
the file into this system. It is required that the imported file is an
xls file (EXCEL file).

Confidential and Proprietary Information of ZTE CORPORATION

107

ZXWN MSCS Alarm Management

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. On the Fault Management window, double-click Setting >
Maintenance Suggestion Setup in the Management Tree
to pop up the Maintenance Suggestion Setup tab.
3. Click the
icon on the sub-toolbar to pop up the Confirm
dialog box, prompting that the old customized maintenance
suggestion will be overwritten, as shown in Figure 87.
FIGURE 87 CONFIRMATION

4. Click OK to pop up the Open dialog box. Select the file to be


imported, as shown in Figure 88.
FIGURE 88 DATA IMPORT

5. Click Open to import the specified file containing alarm maintenance suggestions.

108

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

Caution:
The file to be imported must have a correct internal format.
Otherwise, it cannot be imported. Refer to the exported file
for the correct internal format.
END OF STEPS
Result

Import an alarm maintenance suggestion successfully.

Deleting an Alarm Maintenance


Suggestion
Prerequisites

Confirm that the user has logged in the OMM server normally.

Context

Perform this procedure to delete one or more existing maintenance


suggestions.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. On the Fault Management window, double-click Setting >
Maintenance Suggestion Setup in the Management Tree
to pop up the Maintenance Suggestion Setup tab.
3. On the Maintenance Suggestion Setup tab, from the System Type pull-down list box, select the alarm type to be set.
4. From the suggestion list shown on the Maintenance Suggestion Setup tab, perform one of the following steps to delete a
suggestion.

Right-click the alarm maintenance suggestion to be


deleted, and select Delete from the shortcut menu.
Select the alarm maintenance suggestion to be deleted,
icon on the sub-toolbar.
and then click

5. The Confirm dialog box pops up. Click OK to complete the


operation.
END OF STEPS
Result

Delete an alarm maintenance suggestion successfully.

Confidential and Proprietary Information of ZTE CORPORATION

109

ZXWN MSCS Alarm Management

Alarm Rule Operations


Disabling an Alarm Rule
Prerequisites

Confirm that the user has logged in the OMM server normally.

Confirm that the rule is enabled.

Context

Perform this procedure to change a rule from the enabled status


to the disabled status. A disabled alarm rule has no function.

Steps

1. On the NetNumen M30 window, select Views > Fault Manbutton on the toolbar to open the
agement, or click the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab, as shown in Figure 89.
FIGURE 89 RULE SETUP

3. Perform one of the following steps to disable a rule.

Select the rule to be disabled, and click


toolbar.

icon on the sub-

Right-click the rule to be disabled, and select Disable from


the shortcut menu.

4. The Confirm dialog box pops up. Click OK to complete the


operation.
END OF STEPS
Result

110

Disable an alarm rule successfully.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

Enabling an Alarm Rule


Prerequisites

Confirm that the user has logged in the OMM server normally.

Confirm that the rule is in the deactivated status.

Context

Perform this procedure to change a rule from the disabled status


to the enabled status.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to enable a rule.

Select the rule to be enabled, and click


toolbar.

icon on the sub-

Right-click the rule to be enabled, and select Enable from


the shortcut menu.

4. The Confirm dialog box pops up. Click OK to complete the


operation.
END OF STEPS
Result

Enable an alarm rule successfully.

Modifying an Alarm Rule


Prerequisites

Confirm that the user has logged in the OMM server normally.

Confirm that the rule is in the deactivated status.

Context

Perform this procedure to modify all the information of an existing


rule except its name.

Steps

1. On the NetNumen M30 window, select Views > Fault Manbutton on the toolbar to open the
agement, or click the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to modify a rule.

Select the rule to be modified, and click


sub-toolbar.

icon on the

Right-click the rule to be modified, and select Modify from


the shortcut menu.

4. The dialog box of the selected alarm rule pops up, as shown in
Figure 90. Modify this rule as required.

Confidential and Proprietary Information of ZTE CORPORATION

111

ZXWN MSCS Alarm Management

FIGURE 90 MODIFYING

AN

ALARM RULE

5. Click OK to complete the operation.


END OF STEPS
Result

Modify an alarm rule successfully.

Deleting an Alarm Rule


Prerequisites

Confirm that the user has logged in the OMM server normally.

Confirm that this rule will not be used any longer.

Context

Perform this procedure to delete the rule that will not be used any
longer. You may delete the enabled and disabled alarm rule.

Steps

1. On the NetNumen M30 window, select Views > Fault Manbutton on the toolbar to open the
agement, or click the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Perform one of the following steps to delete a rule.

112

Select the rule to be deleted, and click


toolbar.

Confidential and Proprietary Information of ZTE CORPORATION

icon on the sub-

Chapter 4 Alarm Operations

Right-click the rule to be deleted, and select Delete from


the shortcut menu.

4. The Confirm dialog box pops up. Click OK to complete the


operation.
END OF STEPS
Result

Delete an alarm rule successfully.

Refreshing an Alarm Rule


Prerequisites

Confirm that the user has logged in the OMM server normally.

Context

When several clients log in the server at the same time, and if
one user has set an alarm rule on one client, other clients possibly
do not display the changes of rules at once for network factors.
These clients need to get the rules again from the server to view
the latest status of rules.

Steps

1. On the NetNumen M30 window, select Views > Fault Management, or click the
button on the toolbar to open the
Fault Management window.
2. Double-click Setting > Rule Setup in the Management Tree
to open the Rule Setup tab.
3. Click the

icon on the sub-toolbar to refresh the rule list.

END OF STEPS
Result

Refresh an alarm rule successfully.

Alarm Box Operations


Setting Alarm Box Functions
Prerequisites

The alarm box is connected to the alarm server.

Basic configurations are already performed on the alarm box.

Context

The alarm box prompts faults or other information of the current


network in different ways such as sound, light, LCD display and
short messages.

Steps

1. On the alarm box panel, press Menu. The main menu appears
on the LCD screen.
Figure 91 shows the structure of the alarm box menu.

Confidential and Proprietary Information of ZTE CORPORATION

113

ZXWN MSCS Alarm Management

FIGURE 91 ALARM BOX MENU

2. Navigate to the alarm box parameters that you need to modify


according the preceding menu.
Table 19 lists the common operations.
TABLE 19 COMMON OPERATIONS
No.

Operations

Reference

Viewing alarm statistics

Viewing Alarm Statistics

Setting the broadcast storm


threshold

Setting the Broadcast


Storm Threshold

Setting the sound volume

Setting the Sound Volume

Setting permanent mute

Setting Permanent Mute

Acknowledging alarms on a
per-group basis

Acknowledging Alarms on a
per-Group Basis

3. Press OK to validate the new settings.


END OF STEPS

114

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

Viewing Alarm Statistics


Prerequisites

The alarm box is connected to the alarm server.

Basic configurations are already performed on the alarm box.

Context

The alarm box can make statistics of received alarms and display
the statistics on the LCD screen.

Steps

1. On the alarm box panel, press Menu. The main menu appears
on the LCD screen.
2. Select Statistics Query and press OK to view the latest alarm
statistics.
If no statistics is generated, the system prompts No Statistics
Data!

Push C to Return!

Figure 92 shows an example of the alarm statistics.


FIGURE 92 ALARM STATISTICS EXAMPLE

Note:
The number besides the
icon denotes how many alarm
servers are now connected to the alarm box.
3. Press
or
servers.

to view the alarm statistics of different alarm

END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

115

ZXWN MSCS Alarm Management

Setting the Broadcast Storm


Threshold
Prerequisites

The alarm box is connected to the alarm server.

Basic configurations are already performed on the alarm box.

Context

Broadcast storm detection judges whether the received broadcast


packets exceed the threshold. The sampling value is generated per
second. If five consecutive sampling values exceed the specified
threshold, the alarm box considers that a broadcast storm occurs
in the network. In the case of a broadcast storm, the alarm box
generates a sound or light alarm and stops receiving broadcast
packets accordingly. After a period of time, the alarm box resumes
receiving the broadcast packets. If 30 consecutive sampling values are all lower than the threshold, the alarm box considers that
the network operates properly.

Steps

1. On the alarm box panel, press Menu. The main menu appears
on the LCD screen.
2. Select Parameter Set > NetStorm Gate. The broadcast
storm threshold page appears, showing the default threshold
200.
3. Set the broadcast storm threshold according to the actual situation.
i.

Move the cursor to the threshold field to be modified by


pressing or .

ii. Press

or

to modify the field.

4. Press OK to validate the new settings.


END OF STEPS

Setting the Sound Volume


Prerequisites

The alarm box is connected to the alarm server.

Basic configurations are already performed on the alarm box.

Context

The alarm box can generate voice prompts or buzzer sounds to


alert users to handle received alarms. The alarm severities requiring sound prompts can be specified on the alarm server.

Steps

1. On the alarm box panel, press Menu. The main menu appears
on the LCD screen.
2. Select Parameter Set > Volume Control. The sound volume
control page appears, showing the current volume.
3. Press

or

to increase or decrease the sound volume.

4. Press OK to validate the new settings.


END OF STEPS

116

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Alarm Operations

Setting Permanent Mute


Prerequisites

Context

The alarm box is connected to the alarm server.

Basic configurations are already performed on the alarm box.

The alarm box supports alarm-severity-based permanent mute.


Alarms are classified into four severities, namely SERIOUS, MAJOR, MINOR, and WARNING (from Severity 1 to Severity 4). If
an alarm severity is specified, alarms of this severity and lower
severities are all muted. For example, if Severity 3 is specified,
the alarm box mutes the alarms of Severity 3 and 4.

Note:
If you specify Severity 1, the alarm box will not generate any sound
for alarms of any severity and the alarm sound icon on the LCD
screen will be changed into .
Steps

1. On the alarm box panel, press Menu. The main menu appears
on the LCD screen.
2. Select Parameter Set > P mute Set. The permanent mute
setting page appears, showing the current muted alarm severity. 0 indicates no settings.
or

3. Press

to modify the alarm severity.

4. Press OK to validate the new settings.


END OF STEPS

Acknowledging Alarms on a
per-Group Basis
Prerequisites

Context

The alarm box is connected to the alarm server.

Basic configurations are already performed on the alarm box.

The alarm box supports alarm acknowledgement on a per-group


basis. Alarms from the alarm servers of the same group can be
acknowledged in batches. The alarm box can be connected to 10
groups of alarm servers, and each group consists of one or more
alarm servers that share the same alarm server indicator.

Note:
When you see indicators blinking or hear the alarm sounds, you
can also press the ACK key on alarm box panel to acknowledge
the alarms.

Confidential and Proprietary Information of ZTE CORPORATION

117

ZXWN MSCS Alarm Management

Steps

1. On the alarm box panel, press Menu. The main menu appears
on the LCD screen.
2. Select Parameter Set > Alarm Group Affirm. The groupbased alarm acknowledgement page appears, showing the current group ID.
3. Press

or

to modify the group ID.

4. Press OK to acknowledge the alarms reported by the servers


of the specified group.
END OF STEPS

118

Confidential and Proprietary Information of ZTE CORPORATION

Figure

Figure 1 Alarm System Diagram ........................................... 3


Figure 2 Structure of Warning System ................................... 4
Figure 3 Alarm Management Window ...................................13
Figure 4 Rule Setup ...........................................................14
Figure 5 Selecting Alarm Acknowledging Rule ........................15
Figure 6 Alarm Acknowledging Rule Basic Tab .....................16
Figure 7 Alarm Acknowledging Rule Condition Tab ...............17
Figure 8 Selecting Alarm Clearing Rule .................................19
Figure 9 Alarm Clearing Rule Basic Tab ..............................20
Figure 10 Alarm Clearing Rule Condition Tab.......................21
Figure 11 Selecting Alarm Forwarding Rule ...........................23
Figure 12 Alarm Forwarding Rule Basic Tab.........................24
Figure 13 Alarm Forwarding Rule Condition Tab...................25
Figure 14 Alarming Forwarding Rule Action Tab ...................26
Figure 15 Alarm Forwarding Rule Customizing Forwarded
User Information ...............................................27
Figure 16 Alarm Forwarding Rule Adding a Forwarded User...27
Figure 17 Setting the Forwarding Cycle.................................28
Figure 18 Forwarding Cycle User Settings...........................29
Figure 19 Selecting Alarm Filtering Rule................................30
Figure 20 Alarm Filtering Rule Basic Tab.............................31
Figure 21 Alarm Filtering Rule Condition Tab .......................32
Figure 22 Selecting Alarm Delaying Rule ...............................34
Figure 23 Alarm Delaying Rule Basic Tab ............................35
Figure 24 Alarm Delaying Rule Condition Tab ......................36
Figure 25 Selecting Alarm Counting Rule ..............................38
Figure 26 Alarm Counting Rule Basic Tab............................39
Figure 27 Alarm Counting Rule Condition Tab......................40
Figure 28 Alarming Counting Rule Action Tab ......................41
Figure 29 Selecting Alarm Persisting Rule..............................43
Figure 30 Alarm Persisting Rule Basic Tab...........................44
Figure 31 Alarm Persisting Rule Condition Tab.....................45
Figure 32 Alarming Persisting Rule Action Tab .....................46
Figure 33 Selecting Alarm Merging Rule................................48

Confidential and Proprietary Information of ZTE CORPORATION

119

ZXWN MSCS Alarm Management

Figure 34 Alarm Merging Rule Basic Tab .............................49


Figure 35 Alarm Merging Rule Condition Tab .......................50
Figure 36 Selecting Alarm Restraining Rule ...........................52
Figure 37 Alarm Restraining Rule Basic Tab ........................53
Figure 38 Alarm Restraining Rule Condition Tab...................54
Figure 39 Root Alarm Dialog Box .........................................55
Figure 40 Consequential Alarm Dialog Box ............................56
Figure 41 Selecting Notification Filtering Rule ........................57
Figure 42 Notification Filtering Rule Basic Tab .....................58
Figure 43 Notification Filtering Rule Condition Tab ...............59
Figure 44 Severity Regrading Setup .....................................60
Figure 45 Alarm List...........................................................61
Figure 46 Alarm Severity List ..............................................61
Figure 47 Completing Severity Regrade ................................62
Figure 48 Alarm Box Setup .................................................62
Figure 49 Alarm Box Detail-Basic .........................................63
Figure 50 Alarm Box Detail-Condition ...................................65
Figure 51 Details of Alarm Box Rule .....................................66
Figure 52 Add a Record ......................................................67
Figure 53 Preferences Monitoring View Setup......................69
Figure 54 Preferences - Alarm Sound Setup ..........................70
Figure 55 Preferences - Alarm Color Setup ............................72
Figure 56 Preferences, Forward Template Setup.....................73
Figure 57 Setting Email Forwarding Subject Template .............74
Figure 58 Composite Alarm Monitoring Tab............................76
Figure 59 Real-Time Alarm Monitor ......................................77
Figure 60 Real-Time Notification Monitor...............................78
Figure 61 Alarm Synchronization .........................................79
Figure 62 System Type .......................................................80
Figure 63 All Current Alarms Tab .........................................81
Figure 64 Current Alarm Query Condition..............................82
Figure 65 History Alarm Query Condition ..............................84
Figure 66 Notification Query Condition..................................86
Figure 67 New Query Dialog Box .........................................87
Figure 68 Query Current Alarm............................................88
Figure 69 Customized Node ................................................88
Figure 70 Current Alarm .....................................................89
Figure 71 Acknowledging Alarms .........................................91
Figure 72 Acknowledging Alarm...........................................91
Figure 73 Unacknowlegding Alarm .......................................93

120

Confidential and Proprietary Information of ZTE CORPORATION

Figures

Figure 74 Unacknowledging Alarm .......................................93


Figure 75 Forwarding Setup ................................................95
Figure 76 Go to Rackchart ..................................................96
Figure 77 Details of an Alarm ..............................................97
Figure 78 Maintenance Suggestion ..................................... 100
Figure 79 Print Setup - General ......................................... 101
Figure 80 Print Setup - Page Setup .................................... 101
Figure 81 Print Setup - Advance ........................................ 102
Figure 82 Save Dialog Box ................................................ 103
Figure 83 Maintenance Suggestion Setup............................ 104
Figure 84 Maintenance Suggestion ..................................... 105
Figure 85 Modifying an Alarm Maintenance Suggestion ......... 106
Figure 86 Saving Dialog Box ............................................. 107
Figure 87 Confirmation..................................................... 108
Figure 88 Data Import...................................................... 108
Figure 89 Rule Setup ....................................................... 110
Figure 90 Modifying an Alarm Rule ..................................... 112
Figure 91 Alarm Box Menu ................................................ 114
Figure 92 Alarm Statistics Example .................................... 115

Confidential and Proprietary Information of ZTE CORPORATION

121

ZXWN MSCS Alarm Management

This page is intentionally blank.

122

Confidential and Proprietary Information of ZTE CORPORATION

Table

Table 1 Components and Functions Introduction ..................... 3


Table 2 Functions of Alarm Rules .........................................12
Table 3 Parameter Settings of the Condition Tab ....................17
Table 4 Parameter Settings of the Condition Tab ....................21
Table 5 Parameter Settings of the Condition Tab ....................25
Table 6 Parameter Settings of the Condition Tab ....................32
Table 7 Parameter Settings of the Condition Tab ....................36
Table 8 Parameter Settings of the Condition Tab ....................40
Table 9 Parameter Settings of the Action Tab .........................41
Table 10 Parameter Settings of the Condition Tab...................45
Table 11 Parameter Settings of the Action Tab .......................46
Table 12 Parameter Settings of the Condition Tab...................50
Table 13 Parameter Descriptions - Root Alarm .......................55
Table 14 Parameter Description - Consequential Alarm............56
Table 15 Parameter Settings of the Condition Tab...................59
Table 16 Alarm Box Information Parameters ..........................63
Table 17 Parameter Description of Alarm Box Rule .................66
Table 18 Parameter Descriptions for Alarm Information...........97
Table 19 Common Operations............................................ 114

Confidential and Proprietary Information of ZTE CORPORATION

123

ZXWN MSCS Alarm Management

This page is intentionally blank.

124

Confidential and Proprietary Information of ZTE CORPORATION

Index
A
Acknowledged status ......... 90
Alarm code .........................1
Alarm level .........................1
Alarm maintenance
suggestion .................... 105
Alarm management .............2
Alarm management
system .............................1
Alarm monitoring policy........7
Alarm recovery ...................1
Alarm rule ...................... 110
Alarm synchronization........ 78
Alarm term .........................1

C
Current alarm .....................1

H
History alarm ......................1

M
Maintenance experience............................. 103

N
Notification .........................1

U
Unacknowledged status ...... 90

Confidential and Proprietary Information of ZTE CORPORATION

125

You might also like