You are on page 1of 274

NetNumenN31

Integrated Network Management

Operation Manual
Version 4.1.0

ZTE CORPORATION
ZTE Plaza, Keji Road South,
Hi-Tech Industrial Park,
Nanshan District, Shenzhen,
P. R. China
518057
Tel: (86) 755 26771900 800-9830-9830
Fax: (86) 755 26772236
URL: http://support.zte.com.cn
E-mail: doc@zte.com.cn

LEGAL INFORMATION
Copyright 2006 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided as is, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.

Revision History
Date

Revision No.

Serial No.

Reason for Issue

Feb. 27, 2007

R1.0

Sjzl20061906

First edition

ZTE CORPORATION
Values Your Comments & Suggestions!
Your opinion is of great value and will help us improve the quality of our product
documentation and offer better services to our customers.
Please fax to (86) 755-26772236 or mail to Documentation R&D Department, ZTE
CORPORATION, ZTE Plaza, A Wing, Keji Road South, Hi-Tech Industrial Park,
Shenzhen, P. R. China 518057.
Thank you for your cooperation!
Document
Name

NetNumenN31 Integrated Network Management Operation Manual

Product Version

V4.1.0

Document Revision
Number

R1.0

Equipment Installation Date


Presentation:
(Introductions, Procedures, Illustrations, Completeness, Level of Detail, Organization,
Appearance)
Good
Your evaluation
of this
documentation

Fair

Average

Poor

Bad

N/A

Accessibility:
(Contents, Index, Headings, Numbering, Glossary)
Good

Fair

Average

Poor

Bad

N/A

Intelligibility:
(Language, Vocabulary, Readability & Clarity, Technical Accuracy, Content)
Good

Fair

Average

Poor

Bad

N/A

Please check the suggestions which you feel can improve this documentation:

Your
suggestions for
improvement of
this
documentation

Improve the overview/introduction

Make it more concise/brief

Improve the Contents

Add more step-by-step procedures/tutorials

Improve the organization

Add more troubleshooting information

Include more figures

Make it less technical

Add more examples

Add more/better quick reference aids

Add more detail

Improve the index

Other suggestions
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
# Please feel free to write any comments on an attached sheet.

If you wish to be contacted regarding your comments, please complete the following:
Name

Company

Postcode

Address

Telephone

E-mail

This page is intentionally blank.

Contents
About this Manual ............................................................. i
Purpose ................................................................................ i
Intended Audience ................................................................. i
Prerequisite Skill and Knowledge .............................................. i
What Is in This Manual ........................................................... i
Related Documentation.......................................................... ii
Conventions ......................................................................... ii
How to Get in Touch............................................................. iii

Chapter 1.......................................................................... 1
Integrated Network Management System ..................... 1
System Overview.................................................................. 1
Starting NetNumen N31 Server and Client ................................ 6
Logging into NetNumen N31 ................................................... 8
Locking the Screen................................................................ 9

Settings....................................................................... 10
Overview ........................................................................... 10
Setting Window Styles ......................................................... 10
Setting the Period of Automatically Locking Screen .................. 11
Modifying the Password ....................................................... 12
Modifying Operator Information ............................................ 13
Setting Printing .................................................................. 14

Setting Intergrated Application View ................................ 16


Showing/Hiding Tool Bar ...................................................... 16
Showing/Hiding Status Bar ................................................... 17
Showing/Hiding Message Area .............................................. 17
Logging Out of the Interface ................................................. 18
Exiting the System .............................................................. 18

Chapter 2........................................................................ 21
Overview ........................................................................... 21

Security Policy Management ........................................... 23

Overview ...........................................................................23
Setting Operator Account Rules .............................................23
Viewing Operation Tree ........................................................26
Setting Security Event Rules ................................................. 28

Role Management ......................................................... 29


Overview ...........................................................................29
Creating a Role ...................................................................29
Searching a Role .................................................................33
Refreshing Roles .................................................................34
Modifying a Role .................................................................35
Viewing a Role ....................................................................35
Deleting a Role ................................................................... 36
Duplicating a Role ...............................................................37
Viewing Assigned Roles ........................................................38

Role Set Management.................................................... 39


Overview ...........................................................................39
Creating a Role Set..............................................................39
Searching Role Set ..............................................................41
Refreshing Role Sets............................................................42
Modifying Role Set............................................................... 43
Viewing Role Set .................................................................43
Deleting Role Set ................................................................44
Duplicating a Role Set..........................................................44
Viewing Assigned Role Set ....................................................46

User Management ......................................................... 47


Overview ...........................................................................47
Creating a User ...................................................................47
Searching a User.................................................................53
Refreshing Users .................................................................54
Modifying User Information...................................................54
Viewing a User....................................................................56
Deleting a User ...................................................................56
Duplicating a User ...............................................................57
Viewing User Lockup Record .................................................58
Disconnecting User Forcefully................................................60
Viewing Access Rights .......................................................... 61

Department Management ............................................... 62


Overview ...........................................................................62
Creating a Department......................................................... 63

Searching a Department ...................................................... 64


Refreshing Departments ...................................................... 65
Modifying a Department....................................................... 66
Viewing a Department ......................................................... 66
Deleting a Department ........................................................ 67

Chapter 3........................................................................ 69
Overview ........................................................................... 69

Topology View Operations .............................................. 71


Overview ........................................................................... 71
Creating Logical View .......................................................... 71
Modifying Logical View ......................................................... 72
Deleting Logical View........................................................... 72
Configuring Map ................................................................. 73

Group Operations.......................................................... 75
Overview ........................................................................... 75
Creating a Group ................................................................ 75
Modifying a Group............................................................... 77
Deleting a Group................................................................. 78
Moving a Group .................................................................. 79
Setting Group Rules ............................................................ 80
Setting Group Members ....................................................... 81
Querying Group Attributes.................................................... 82
Exporting Group Info ........................................................... 83
Importing Group Info .......................................................... 84
Copying and Pasting Group .................................................. 85

NE Operations .............................................................. 86
Overview ........................................................................... 86
Creating an NE ................................................................... 86
Moving an NE ..................................................................... 88
Modifying an NE.................................................................. 88
Deleting an NE ................................................................... 89
Viewing the Distance between two NEs .................................. 90

Virtual Link Operations................................................... 91


Overview ........................................................................... 91
Creating Virtual Link............................................................ 91
Setting Members................................................................. 93
Modifying Virtual Link .......................................................... 95
Deleting Virtual Link ............................................................ 96

Querying Virtual Link Attributes............................................. 97


Customizing GUI Elements.................................................... 98
Setting Network Layout........................................................99
Setting Topology Filter Tree ................................................ 100

Expanding and Collapsing............................................. 101


Overview ......................................................................... 101
Expanding and Collapsing Topology Map ............................... 102
Expanding and Collapsing Node ........................................... 102
Showing Statistical Information ........................................... 102
Querying Alarm Messages................................................... 103
Going One Level Up ........................................................... 103

Auto Discovery Management......................................... 104


Overview ......................................................................... 104
Configuring Basic Parameters.............................................. 104
Configuring SNMP Protocol.................................................. 106
Configuring Network .......................................................... 108
Configuring Node .............................................................. 109
Configuring Filter .............................................................. 110

Polling Configuration.................................................... 111


Overview ......................................................................... 111
Adding Polling Configuration Parameters............................... 111
Modifying Polling Configuration Parameters ........................... 114
Deleting Polling Configuration Parameters ............................. 114
Updating Topology Data ..................................................... 115
Synchronizing Topology...................................................... 116

Chapter 4......................................................................117
Overview ......................................................................... 117
Creating Policy.................................................................. 117
Modifying Policy ................................................................ 121
Querying Policy ................................................................. 122
Deleting Policy .................................................................. 123
Executing Policy ................................................................ 124

Chapter 5......................................................................125
Overview ......................................................................... 125

Querying Logs ............................................................ 126


Overview ......................................................................... 126
Querying Operation Logs by Condition .................................. 126
Querying Security Logs by Condition .................................... 129

Querying System Logs by Condition..................................... 130


Querying All Logs.............................................................. 132
Sorting Log Records .......................................................... 133

Maintaining Logs ......................................................... 134


Overview ......................................................................... 134
Exporting Log Records ....................................................... 134
Printing Log Records.......................................................... 135
Deleting Logs ................................................................... 135

Chapter 6...................................................................... 137


Overview ......................................................................... 137

Maintaining Application Server ...................................... 138


Overview ......................................................................... 138
Refreshing the System Management View ............................ 138
Saving Position Information................................................ 139
Showing Device Information ............................................... 139
Viewing Application Server Performance ............................... 140
Configuring Performance Monitoring Parameters.................... 141
Viewing NetNumen Version Number..................................... 142
Viewing Directory Information ............................................ 143
Adding Directory Monitoring Task Information ....................... 144

Maintaining Database Server ........................................ 146


Overview ......................................................................... 146
Logging into Database ....................................................... 146
Logging out of Database .................................................... 147
Checking Database Resources............................................. 147
Configuring the Monitoring Parameters................................. 149
Operating Table Collection.................................................. 150

Chapter 7...................................................................... 155


Overview ......................................................................... 155

Monitoring in Real-time ................................................ 157


Overview ......................................................................... 157
Monitoring Real-time Current Alarms ................................... 157
Monitoring Real-time History Alarms .................................... 159
Monitoring Real-time Notification......................................... 160
Monitoring Real-time Event ................................................ 162
Synchronizing Alarms ........................................................ 163

Querying Alarms ......................................................... 165


Overview ......................................................................... 165

Querying Current Alarms .................................................... 165


Querying Historical Alarms.................................................. 169
Querying Notifications........................................................ 172
Querying Events................................................................ 175

Alarm Statistics Report Template................................... 178


Overview ......................................................................... 178
Viewing Average Period Statistics by Alarm Severity............... 178
Viewing Average Frequency Statistics by Alarm Severity ......... 182

Alarm Rule Management .............................................. 186


Overview ......................................................................... 186
Adding Management Rule ................................................... 186
Editing Management Rule ................................................... 190
Deleting Management Rule ................................................. 191
Enabling Management Rule ................................................. 191
Disabling Management Rule ................................................ 192

Alarm Maintenance Suggestions .................................... 192


Overview ......................................................................... 192
Adding Maintenance Suggestions ......................................... 193
Editing Maintenance Suggestions ......................................... 194
Deleting Maintenance Suggestions ....................................... 195
Importing Maintenance Suggestions..................................... 196
Exporting Maintenance Suggestions ..................................... 197

Severity and Color Settings .......................................... 198


Overview ......................................................................... 198
Setting Severity Conditions................................................. 198
Setting Sound and Colors ................................................... 199

Chapter 8......................................................................201
Performance Management ..........................................201
Overview ......................................................................... 201

Performance Statistics Task Management ....................... 202


Overview ......................................................................... 202
Creating Performance Task ................................................. 202
Activating Periodic Task...................................................... 205
Activating Timer Task ........................................................ 206
Suspending Performance Tasks ........................................... 208
Viewing Detailed Information .............................................. 208
Deleting Performance Task ................................................. 209
Refreshing Performance Task .............................................. 210

Performance Task Threshold Management ...................... 210


Overview ......................................................................... 210
Setting Threshold.............................................................. 210
Modifying Threshold .......................................................... 213
Deleting Threshold ............................................................ 214
Refreshing Threshold......................................................... 214
Activating Threshold.......................................................... 214
Deactivating Threshold ...................................................... 215
Monitoring Performance in Realtime..................................... 216

Performance Data Report Management .......................... 218


Overview ......................................................................... 218
Viewing Multi-IP Contrast Graph.......................................... 218
Viewing Multi-Instance Contrast Graph................................. 220
Viewing Trend Graph ......................................................... 222
Viewing Table................................................................... 224

Chapter 9...................................................................... 227


Overview ......................................................................... 227
Configuring Command Line Terminal (CLT) ........................... 228

Single Command Operations......................................... 229


Overview ......................................................................... 229
Entering Manual Commands ............................................... 229
Entering Commands in Graphics Mode ................................. 230
Switching from Manual Input to Graphics Input ..................... 232
Checking Syntax of Single Command ................................... 233
Executing a Single Command.............................................. 233

Batch Command Operations ......................................... 234


Overview ......................................................................... 234
Creating and Saving Batch Command Script ......................... 234
Checking Syntax of Batch Command Script........................... 235
Executing a Batch Command Script ..................................... 235
Opening a Batch Command Script ....................................... 236
Checking Syntax of Batch Command Script........................... 237
Modifying Batch Command Script ........................................ 238

Getting Help ............................................................... 239


Viewing Man-Machine Language (MML) Help ......................... 239
Viewing Inductive Help ...................................................... 240

Appendix A ................................................................... 241

What is NMS? ...............................................................241


Glossary........................................................................243
Abbreviations ...............................................................245
Figures..........................................................................247
Tables ...........................................................................255
Index ............................................................................257

About this Manual


Purpose
The NetNumen Integrated Network Management System adopts
an advanced NMS architecture and provides a complete set of
Java-based cross-platform network management tools, modules
and APIs. As NMS is a highly customized, carrier-class, crossplatform, it streamlines to support on-hand network
management solutions, which not only provides integrity but
also ensures fault tolerance. It can be easily integrated with
multiple third-party systems and provide a comprehensive
network management solution.

Intended Audience
This document is intended for operators who perform operation
activities on integrated network management system.

Prerequisite Skill and Knowledge


To use this document effectively, users should have a general
understanding of network types, topologies, protocols, operator
management, user privileges, securities and policies.

What Is in This Manual


This manual contains the following chapters:
TABLE 1 CHAPTER SUMM ARY

Chapter

Summary

Chapter 1 Integrated
Network Management
System

Introduces the overall operations for


adding, uploading, modifying and
removing the content.

Confidential and Proprietary Information of ZTE CORPORATION

NetNumenN31 Integrated Network Management Operation Manual

Chapter

Summary

Chapter 2 Security
Management

It provides security control for logging


onto the system by certain operators,
provides authentication and authorization

Chapter 3 Topology
Management

It provides steps to create NEs, links,


groups and assigns group rules

Chapter 4 Policy
Management

This chapter provides steps to create


policies and configures their attributes

Chapter 5 Log
Management

It is about log monitoring, querying and


deleting undesired logs generated by the
system

Chapter 6 System
Management

It provides steps regarding viewing


application server performance and
monitoring the database server

Chapter 7 Fault
Management

It is based on error messages in case of


any mistakes or any other reason, also
handles alarms generated by the system

Chapter 8 Performance
Management

Provides the service providers


information with detail.

Chapter 9 Command
Line Terminal

Provides steps to enter command line


scripts either in batch mode or single
command based.

Related Documentation
The following documentation is related to this manual:

NetNumen
Integrated
Technical Manual

Network

Management

System

NetNumen
Integrated
Network
Installation Manual - Software

Management

System

Conventions
Typographical
Conventions

ZTE documents employ the following typographical conventions.


TABLE 2 TYPOGRAPHICAL CONVENTIONS

ii

Typeface

Meaning

Italics

References to other manuals and documents.

Bold

Menus, menu options, function names, input


fields, radio button names, check boxes, dropdown lists, dialog box names, window names.

Right-click

Operation trees, items and lists.

Confidential and Proprietary Information of ZTE CORPORATION

About this Manual

Typeface

Meaning

Constant width

Text that you type, program code, files and


directory names, and function names.
Provides additional information about a certain
topic.

Note:

Mouse
Operation
Conventions

TABLE 3 MOUSE OPERATION CONVENTIONS

Typeface

Meaning

Click

Refers to clicking the primary mouse button (usually


the left mouse button) once.

Right-click

Refers to clicking the secondary mouse button


(usually the right mouse button) once.

Double-click

Refers to clicking the primary mouse button twice.

How to Get in Touch


The following sections provide information on how to obtain
support for the documentation and the software.
Customer
Support

Documentation
Support

If you have problems, questions, comments, or suggestions


regarding
your
product,
contact
us
by
e-mail
at
support@zte.com.cn. You can also call our customer support
center at (86) 755 26771900 and (86) 800-9830-9830.
ZTE welcomes your comments and suggestions on the quality
and usefulness of this document. For further questions,
comments, or suggestions on the documentation, you can
contact us by e-mail at doc@zte.com.cn; or you can fax your
comments and suggestions to (86) 755 26772236. You can also
browse our website at http://support.zte.com.cn, which contains
various interesting subjects like documentation, knowledge base,
forum and service request.

Confidential and Proprietary Information of ZTE CORPORATION

iii

NetNumenN31 Integrated Network Management Operation Manual

This page is intentionally blank.

iv

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Integrated Network
Management System
System Overview
Introduction

This chapter describes functions, features and network structure


of NetNumen N31 system.

Functions and
Features

Integrated Network Management System (I-NMS) is a highlycustomized,


carrier-class
and
cross-platform
internet
infrastructure management platform. It is designed with latest
internet technology in a bottom-to-top manner. It is a scalable
high-performance NMS provided to carriers. It can satisfy
requirements for the constant development of networks and for
supporting various operating systems and platforms.
The system meets various requirements of customers, which are
described as follows:

A telecommunication carrier and a manufacturer can


establish an element management system (EMS) and a
network management system (NMS);
A service provider can establish a network management and
operation support system;
An enterprise or an independent software developer can
work out an application program management solution.

System manages various IP devices in backbone layer,


convergence layer and access layer, including softswitch,
integrated access server, digital subscriber loop, Ethernet switch
and ADSL.
Layers

I-NMS system covers four layers of management layer:

Network element layer

Network element management layer

Network management layer

Confidential and Proprietary Information of ZTE CORPORATION

NetNumenN31 Integrated Network Management Operation Manual

Service management layer

This system provides friendly features and graphical operator


interface for simple and easy operations. It provides network
administrator with a functionally powerful operation and
management tool. This system allows displaying network view
and monitoring and managing multiple devices in the network
simultaneously, to guarantee reliable, safe and efficient
operation of the network.
Performance
Management

It manages various aspects of network management to maintain


performance of network at an acceptable level. For example
network throughput, operator response times, and line
utilization.

Command Line
Terminal

Command line terminal provides users with function of network


device management via command line interface (CLI). Command
line terminal concerns only with clients. No change is necessary
on original server. Following functions are included in command
line terminal interface:

Single command

Batch command

Man-machine command help, inductive help

Topology
Management

Topology management view consists of the default physical view


provided by the system and different logical views customized
by the operator.

Security
Management

Security management ensures authorized use of system.


Security management module of the system accomplishes
following functions:

System
Management

It introduces concept of operator and role. It provides


security control for system operators operations by
organizing relationships of users and roles.
It prevents illegal use of system by means of login
authentication.
It provides security control for system operators operations
through operation authentication method.

System management refers to management of databases and IP


addressing the devices in system.
Database management refers to viewing, backing up and
restoring database resources via DBMS in the system.
IP addressing device refers to network device a data network
that is identified through IP addressing, such as a database
server, an application server, a WEB server, a workstation, a PC,
a LAN switch, a router and a printer. With this system, operator
can configure these devices and monitor their information such
as performance and link states. In addition, alarm information
can be generated in case of anything abnormal.

Log
Management

Function of log management view has two aspects: recording


logs and managing logs. Logs in terms of their contents: are
operation log, security log and system log. Log management

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 Integrated Network Management System

function allows query, deletion and browse detailed


information, and setting of conditions for log filtration.

log

Policy
Management

Policy management offers policy creation, policy modification,


policy query and policy deletion, which facilitate operator to
manage policies.

Fault
management

Fault management is a function group that manages faults


occurring during system operation on various network devices
managed by this system. Through fault management function,
operator can centrally manage and monitor alarms, events and
notifications on the network.
It allows management of alarms directly issued by network
devices. It also manages alarms occurring to the system such as
performance alarm and system management alarm. It can
monitor and manage events and notifications on network.

Features

System has following features:

Modular and expandable, with easily loadable modules;

Simple, stable and robust, with operator friendly interfaces;

Capable of integrated management;

Large-scale
Distributed
System

Integration
with Thirdparty
Applications

Supporting seamless integration of local maintenance with


multi-level NMSs;

NetNumen Network Management System (NMS) has following


features of distributed systems:

Remote
Management
Ability

Providing a unified management framework for ZTE data


network products;

Load balancing: by allocating the loads to different PCs


averagely, we reach the goal of accomplishing highly
complicated calculation over very low-cost hosts.
High flexibility: new servers can be added while the system
is running as the number of customer accesses grows so that
nonstop system expansion is implemented.
Powerful fault tolerance: once one of the system servers fails
to work, the others can take over to ensure no interruption
of service.

NetNumen Network Management System


managed remotely as following ways:

(NMS)

can

be

Web-based network management capability is supported; via


a highly-reliable security control mechanism, users can
access the network management system anywhere via a
browser and perform remote network control.

System's modular structure makes it very convenient to add


new equipments and new services.

Standard CORBA and XML interfaces make integration into


3rd-party application systems possible. Between it and the

Confidential and Proprietary Information of ZTE CORPORATION

NetNumenN31 Integrated Network Management Operation Manual

service systems, not only data but also service sharing is


accomplished.

High Reliability

System is considered to be highly reliable as it possesses the


following qualities:

Architecture
and
Networking

With Java in use, the system can run on any hardware


platform and management of networks of different scale can
be done.

Both out-of-band and in-band management is supported. For


application environments that have requires high reliability,
out-band management mode is recommended. The out-ofband management channel supports double back-up.
The system adopts the CLUSTER structure and hot backup
policies.
The system provides perfect system management functions
and system operation.

Provides a high level of system security

Optimal access authority control is supported.

Log records are maintained reliably.

System is composed of three-layer architecture: database server,


NM server) and client. Overall the system architecture is shown
in Figure 1.
FIGURE 1 NETNUMEN NMS ARCHITECTURE

Client

Network
managemen
t server

NE

NE

Database
server

NE

NE

NE

NE

Network Management (NM) server is responsible for data


communication with management object, database server and
client, and processing of different types of information.
Components of the system communicate with each other using
TCP/IP. Protocols such as RMI, SNMP, CORBA and HTTP used at
high layers all run over TCP/IP.
Client is an NM operation terminal. An NM operator, after
passing security verification at any site, may access the NM
center via Internet or Intranet as a client, and perform NM
operations within its rights.
4

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 Integrated Network Management System

Networking
Mode

Networking of the system is shown in Figure 2.


FIGURE 2 NETWORKING
Network
management
server

DATABASE

CLIENT

CLIENT

IP

IP
10Base-T

NE

NE

NE

NE

I-NMS system can adopt out-of-band networking mode or inband networking mode.
In out-of-band networking mode, NE of the system is directly
accessed by IP network through Ethernet interface of front panel
of main control board on the NE. NM center is also accessed by
IP network in a similar manner. This allows direct IP
interworking between the system and NE. An advantage of outband networking mode is that NM channel and traffic channel
are completely independent, so that transmission of NM
information will not be interrupted even in case of traffic channel
failure. In addition, NEs are not related directly, so a failure of
one NE will not affect management of other NEs.
In in-band networking, an NE of the system is accessed to IP
network through its uplink interface, and NM center is also
accessed by IP network in a similar manner, so that direct IP
interworking and communication between system and an NE can
be performed through network interface. Advantages of in-band
networking mode are to transmit system information with traffic
channels without setting up a special NMS network, featuring
flexible and convenient networking.
Contents

This chapter includes the following topics:


TABLE TOPICS IN CHAPTER 1

Topic Title

Page No.

Starting NetNumen N31 Server and Client

Logging into NetNumen N31

Confidential and Proprietary Information of ZTE CORPORATION

NetNumenN31 Integrated Network Management Operation Manual

Topic Title

Page No.

Locking the Screen

Setting
Overview

10

Setting Window Styles

10

Setting the Period of Automatically Locking Screen

11

Modifying the Password

12

Modifying Operator Information

13

Setting Printing

14

Setting Intergrated Application View


Showing/Hiding Tool Bar

16

Showing/Hiding Status Bar

17

Showing/Hiding Message Area

17

Logging Out of the Interface

18

Exiting the System

18

END OF STEPS

Starting NetNumen N31 Server and


Client
Purpose
Prerequisites

Every client is required to login to the server to perform certain


operations; for this NetNumen server and client are started.
To start the server, meet the following requirements:

Install Microsoft Windows 2000 Server .

Install NetNumen N31 software package.

Steps

Database must be configured with the system to access the


server.

To start NetNumen N31 server, perform the following steps:


1. Double-click NetNumen N31 ftp server icon from desktop
to start FTP server.
2. There are two ways to start NetNumen N31 server, which are
as follows:
i.

Click Start > Programs


NetNumen N31 server.

>

NetNumen

N31

>

ii. Double-click NetNumen N31 server icon from desktop.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 Integrated Network Management System

FIGURE 3 SERVER STARTING WINDOW

Note: Operator needs to wait for a while to get the NM


server started.
Important! After the NM server has been started
successfully, the server starting window remains visible. In
this window, operator may view the process of the NM server
and alarm information.
3. There are two ways to start NetNumen N31 client, which are
as follows:
i.

Click Start > Programs


NetNumen N31 client.

>

NetNumen

N31

>

ii. Double-click NetNumen N31 client icon from desktop,


which displays Operator Login interface as shown in
Figure 4.
FIGURE 4 OPERATOR LOGIN

Confidential and Proprietary Information of ZTE CORPORATION

NetNumenN31 Integrated Network Management Operation Manual

Important! This interface is used to provide access to


NetNumen N31 server.
END OF STEPS

Logging into NetNumen N31


Purpose
Prerequisite

To access the system, an operator has to log into the system


with valid username, password and server address.
To log into the system, meet the following requirements:

Steps

Start NetNumen N31 server.


Start NetNumen N31 client, it displays Operator Login
Interface as shown in Figure 4.

To log into the system, perform the following steps:


1. On Operator Login interface, fill in the parameters as
displayed in Table 4.
TABLE 4 OPERATOR LOGIN P AR AMETERS

Parameters

Description

Input

Operator name

Operator needs to log into the


system to perform operations.
Every operator has different
rights to perform operations.

Admin

Password

It is used for operator


authentication.

Server Address

It is the address of NetNumen


server. It provides several
facilities depending upon the
operator requirements.

127.0.0.1

Note: Table 4 provides only a reference to operator; values


may vary according to deployed environment.
2. Click OK button to open NMS interface.
Result: Network Management System interface appears
as shown in Figure 5.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 Integrated Network Management System

FIGURE 5 NETWORK M AN AGEMENT SYSTEM

Note: Open Views menu from the main menu to view


different operating environments as shown in Figure 5.
END OF STEPS

Locking the Screen


Purpose

Prerequisites

Operator can set the locking time of screen if the system is in


idle state for a particular duration of time. After this operator
needs to re-log into the system.
To lock the screen, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To lock the screen, perform the following steps:


1. In the main window, choose System > Lock Screen.
Result: Screen Lockup Confirm dialogue box appears.
Click OK button. Main window and all opened application
windows are hidden.
FIGURE 6 LOCK SCREEN CONFIRM

Confidential and Proprietary Information of ZTE CORPORATION

NetNumenN31 Integrated Network Management Operation Manual

2. Operator Login interface appears again. Operator only


needs to enter correct password (which is required for the
successful login).
FIGURE 7 OPERATOR LOGIN (LOCK MODE)

Result: Screen lock is removed and the hidden application


windows appear.
END OF STEPS

Settings
Overview
This module provides operational steps to set window styles, set
the auto locking period, modify password, and operator
information, and set printing parameters.

Setting Window Styles


Purpose
Prerequisites

Main window allows the operator to decide if the application


windows are displayed as a TAB page or in an individual window.
To set window styles, meet the following requirements:

10

NetNumen N31 server and client must be started before


performing any operation.
Log into NetNumen N31 system by referring to Logging into
NetNumen N31.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 Integrated Network Management System

Steps

To set NetNumen N31 main window style, perform the following


steps:
1. In the main window, choose System > Settings > Styles.
Result: Style Setting dialog box appears as shown in
Figure 8.
FIGURE 8 STYLE SETTINGS

Note: Select views from left pane to be displayed in an


individual window.
Indicates adding a selected subview
Indicates deleting a selected subview
Indicates adding all the subviews in the list
Indicates deleting all the subviews in the list
Note: These style settings are saved in the profile data, and
are valid after next login.
END OF STEPS

Setting the Period of Automatically


Locking Screen
Purpose

This provides the function to automatically lock the screen after


certain time.

Confidential and Proprietary Information of ZTE CORPORATION

11

NetNumenN31 Integrated Network Management Operation Manual

Prerequisites

To lock the
requirements:

Steps

screen

automatically,

meet

the

following

NetNumen N31 server and client must be started before


performing any operation.
Log into NetNumen N31 system by referring to Logging into
NetNumen N31.

To lock the screen automatically, perform the following steps:


1. In the main window, choose System > Settings > Auto
Screen Lock Setting, which displays Auto Screen Lock
Setting as shown in Figure 9.
FI G U R E 9 AU T O S C R E E N LO C K S E T TI N G

2. Enable input by clicking Enabled checkbox and enter time in


minutes as displayed in Figure 9.
3. Click OK button to save setting and close the dialog box.
END OF STEPS
Result

System screen is automatically locked after the time (minutes)


entered. Operator needs to input valid username and password
to unlock the system screen.

Modifying the Password


Purpose
Prerequisites

Operator can modify the password whenever required. This


procedure explains how to modify the password.
To modify the password, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Log into NetNumen N31 system by referring to Logging into
NetNumen N31.

To modify the password, perform the following steps:


1. In the main window, choose System > Settings > Modify
Password which opens Modify Operator Password dialog
box as shown in Figure 10.

12

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 Integrated Network Management System

FIGURE 10 MODIFY OPERATOR P ASSWORD

2. Fill in the parameters as explained in Table 5.


TABLE 5 MODIFY P ASSWORD P AR AMETERS

Parameters

Description

Input

Old password

Operator needs to enter this


password to verify.

admin

New password

This is new password that


operator needs to change.

nimda

Confirmed
password

Operator needs to re-enter the


new password to confirm.

nimda

3. Click OK button to confirm and save values.


Result: Confirm dialog box appears, click OK button.
END OF STEPS

Modifying Operator Information


Purpose
Prerequisites

Operator can modify information when required. This procedure


explains how to modify operator information.
To modify operator information, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To modify operator information, perform the following steps:


1. In the main window, choose System > Modify Operator
Information.

Confidential and Proprietary Information of ZTE CORPORATION

13

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 11 MODIFY OPERATOR INFORMATION

Note: These fields are self-explanatory; there is no need to


explain.
2. Fill in the parameters as displayed in Figure 11.
3. Click OK button to confirm and save values.
Result: Confirm dialog box appears, click OK button.
END OF STEPS

Setting Printing
Purpose

Prerequisites

Main interface that unifies the network management system


allows operators to set printing parameters. Operator can
choose page style as required.
To set the printing, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To set the printing, perform the following steps:


1. In the main window, choose System > Setting > Setup
page.
Note: There are three TAB pages displayed in Figure 12,
operator can select the required options.
2. Select printer from Name list of values, select print range,
and select print copies from Figure 12.

14

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 Integrated Network Management System

FIGURE 12 SETTING PRINT RANGE

3. Click Page Setup TAB page, select Paper to choose style


and choose Orientation from Figure 13.
FIGURE 13 PAGE SETUP

4. Click Advance TAB page and choose [Default setup],


[Typical setup] or [Simple setup] as required by the
operator.

Confidential and Proprietary Information of ZTE CORPORATION

15

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 14 ADVANCE SETTINGS

Note: Operator can click checkboxes on right pane to include


these options.
5. Click OK button to save settings.
END OF STEPS

Setting Intergrated
Application View
Showing/Hiding Tool Bar
Purpose
Prerequisites

Tool bar is added in the main window. Tool bar contains the
buttons to perform such operations with more convenience.
To show/hide tool bar, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To show/hide tool bar, perform the following steps:


1. In the main window, click System > Tool Bar to hide the
toolbar from the system interface.
Note: If checkbox is checked, message area is displayed
otherwise hidden. In the similar way, operator can enable
the toolbar.

16

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 Integrated Network Management System

END OF STEPS

Showing/Hiding Status Bar


Purpose
Prerequisites

Status bar is added in the main window to show the current


elements status and position of the system.
To show/hide status bar, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To show/hide status bar, perform the following steps:


1. In the main window, click System > Status Bar to hide the
status bar.
Note: If checkbox is checked, status bar is displayed
otherwise hidden. In the similar way, operator can enable
the status bar.
END OF STEPS

Showing/Hiding Message Area


Purpose

The message area is added in the main window. Prompt


messages and error messages such as initiated operations,
operation responses and received reports are displayed in this
area.
Operator can choose to display or hide the message area. In the
case when the message area is hidden, operational messages of
the application windows can still be written into it. By default,
the message area is visible.

Prerequisites

To show/hide message area, meet the following requirements:


NetNumen N31 server and client must be started before
performing any operation.

Steps

To show/hide message area, perform the following steps:


1. In the main window, click System > Message Area to hide
the message area.
Note: If checkbox is checked, message area is displayed
otherwise hidden. In the similar way, operator can enable
the message area.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

17

NetNumenN31 Integrated Network Management Operation Manual

Logging Out of the Interface


Purpose

Steps

Main window of the system offers the logout function. By


executing logout, user can be logout of system, and a login
dialog box is displayed for operator to re-log in. The operation
steps are as follows:
To log out of the system, perform the following steps:
1. In the main window click System > Logout, which displays
dialog box for confirming the logout as shown in Figure 15:
FIGURE 15 CONFIRM LOGOUT

2. Click OK button to confirm.


END OF STEPS

Exiting the System


Purpose
Steps

For exiting the system, the operation steps are as follows:


To exit the system, perform the following steps:
1. In the main window click System > Exit, which displays
dialog box confirming exit as shown in Figure 16:
FIGURE 16 EXITING THE SYSTEM

2. Click OK button to confirm exit.


END OF STEPS

18

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 1 Integrated Network Management System

This page is intentionally blank.

Confidential and Proprietary Information of ZTE CORPORATION

19

Chapter

Security Management
Overview
Introduction

The goal of security management is to control access to network


resources according to local guidelines so that the network
cannot be sabotaged and sensitive information cannot be
accessed by those without appropriate authorization. A security
management subsystem can monitor users logging into a
network resource and can refuse access to those who enter
inappropriate access codes.
Security management subsystems work by partitioning network
resources into authorized and unauthorized areas. Some users
can access to any network resource.
Security management helps to manage users and roles. It
provides security control when operators try to use security
management; via login authentication, it prevents illegal users
from entering the system; and via operation authentication, it
ensures high safety for operator's operations.

Contents

This chapter includes the following topics:


TABLE TOPICS IN CHAPTER 2

Topic Title

Page No.

Security Policy Management


Overview

23

Setting Operator Account Rules

23

Viewing Operation Tree

26

Setting Security Event Rules

28

Role Management
Overview

29

Creating a Role

29

Searching a Role

33

Confidential and Proprietary Information of ZTE CORPORATION

21

NetNumenN31 Integrated Network Management Operation Manual

Topic Title

Page No.

Refreshing Roles

34

Modifying a Role

35

Viewing a Role

35

Deleting a Role

36

Duplicating a Role

37

Viewing Assigned Roles

38

Role Set Management


Overview

39

Creating a Role Set

39

Searching Role Set

41

Refreshing Role Sets

42

Modifying Role Set

43

Viewing Role Set

43

Deleting Role Set

44

Duplicating a Role Set

44

Viewing Assigned Role Set

46

User Management
Overview

47

Creating a User

47

Searching a User

53

Refreshing Users

54

Modifying User Information

54

Viewing a User

56

Deleting a User

56

Duplicating a User

57

Viewing User Lockup Record

58

Disconnecting User Forcefully

60

Viewing Access Rights

61

Department Management

22

Overview

62

Creating a Department

63

Searching a Department

64

Refreshing Departments

65

Modifying a Department

66

Viewing a Department

66

Deleting a Department

67

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

Security Policy Management


Overview
Introduction

Security policy management sets operator password length,


locks up operator account rules, view access rights to assigned
users, view operation tree and sets conditions under which
security events are generated.

Setting Operator Account Rules


Purpose

Prerequisites

This procedure helps to specify operator password length,


password policy, account restriction and expired password
checking.
To set operator account rules, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Log into the system by referring to topic titled Logging into
NetNumen N31.

To set operator account rules, perform the following steps:


1. Click View > Security Management from the main menu.
2. There are two ways to enter View/Customize Operator
Account Rules interface, which are as follows:

Click Operation > Modify Operator Account Rule from


the menu.
Click Security policy management from left pane, rightclick operator account rule from right pane and click to
choose Customize user account rules.
Result: View/Customize Operator
interface appears as shown in Figure 17.

Account

Rules

Confidential and Proprietary Information of ZTE CORPORATION

23

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 17 VIEW/CUSTOMIZE OPERATOR ACCOUNT RULES

Example: Read Table 6 as a reference to enter parameter


values.
TABLE 6 SECURITY POLICY P AR AMETERS

Parameters

Description

Input

Min password
length

Minimum password
length that can be set for
operator account.

If password length is less


than this value, operator
is unable to login.

24

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

Parameters

Description

Input

Max password
length

Maximum password
length that can be set for
operator account.

20

If password length is
greater than this value,
operator is unable to
login.
Enable weak
password check

Weak password is easy to


break or hack, it must be
a strong password as a
combination of numbers
and alphabets. Select this
check box to enable weak
password checking while
creating operator
passwords

This parameter
can be set in
two steps:

Account
restriction
(This provides
the operator
account to be
locked after a
few wrong
password
entries.)

Set numeric
character in
Maximal
count
of
chars
in
password
to a certain
number for
example 3.

Select Unlock account


radio button to enable
locked account
Select Lock
permanently radio
button to lock operator
account permanently
Select Lock account
radio button to set
locking rules as:

Hint the
operator when

Click
Enable
weak
password
check
checkbox to
enable this
option.

account is locked
after a certain
number of wrong
entries

Choose Lock
account and
input:
3
24

account is unlocked
after certain
number of days

Indicates a hint to
operator before certain

Confidential and Proprietary Information of ZTE CORPORATION

25

NetNumenN31 Integrated Network Management Operation Manual

Parameters

Description

password
has days to
expire

days of password expiry

Input

Note: Table provides only a reference to operator; values


may vary according to environment deployed.
3. Click OK button after modifying required parameters and
click OK button.
END OF STEPS

Viewing Operation Tree


Purpose

Prerequisites

This procedure only provides a view of assigned access rights to


the users. All the operations related to Network Management
System (NMS) are displayed in this view.
To view operation tree, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view operation tree, perform the following steps:


1. Click View > Security management from the main menu.
2. There are two ways to enter Operation tree interface,
which are as follows:

Click Operation > View Operation Tree from the menu.


Click Security policy management from left pane and
right-click View operation tree from right pane and click to
choose View operation tree.
Result: View Operation Tree interface appears as shown
in Figure 18.

26

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

FIGURE 18 VIEW OPERATION TREE

3. Click a particular operation of left pane, which displays


related operation. Read following example as a reference.
Example: To view operations related to log management,
perform following steps:
i.

Click Log management to expand its options, which is


displayed in Figure 19.

FIGURE 19 OPERATION TREE LOG M ANAGEMENT

ii. Click Log Management to expand its options.


iii. Click Query Log. Right pane displays some description
related to operations displayed in operation tree on left
pane.
Result: Figure 20 displays description to Log Management
Operation.

Confidential and Proprietary Information of ZTE CORPORATION

27

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 20 OPERATION TREE OPERATION DESCRIPTION

4. Click Close button to close this view.


Note: View description of other operations, by performing
steps in the similar way.
END OF STEPS

Setting Security Event Rules


Purpose

Prerequisites

Security events are the events executed at the time of some


illegal operation. There are certain rules to set these events.
This procedure sets conditions under which security events are
generated.
To set security events, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To set security events, perform the following steps:


1. Click View > Security management from the main menu.
2. There are two ways to enter Security Event Rules interface,
which are as follows:

In the main menu, click Operation > Security Event Rule.


Click Security policy management from left pane and
right-click Set security events from right pane and click to
choose Customize security event rule.
Result: Security Event Rule interface is displayed as
shown in Figure 21.

28

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

FIGURE 21 SECURITY EVENT RULE

Important! There are three types of security event rules to


generate security event.
i.

Security
event
locked/unlocked.

generated

when

operator

is

ii. Security
event
disabled/enabled.

generated

when

operator

is

iii. Security event generated when authentication fails.


3. Click checkboxes to set security event rule as required.
4. Click OK button to save rules.
END OF STEPS

Role Management
Overview
Introduction

Rights consist of command sets and resources, which are the


privileges, assigned to users. A command set is a group of
commands. Resources are objects provided by other modules
that can be integrated in the security management.
When rights are assigned to a role, user can run the assigned
command on the assigned resource. A role is an allocation object
of operation rights in the network model.

Creating a Role
Purpose
Prerequisites

This section explains how to create a role and assign certain


operation rights to this role.
To create a role, meet the following requirements:

Confidential and Proprietary Information of ZTE CORPORATION

29

NetNumenN31 Integrated Network Management Operation Manual

NetNumen N31 server and client must be started before


performing any operation.
Steps

To create a role, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role management.
3. There are two ways to enter Create Role interface, which
are as follows:

Right-click Role management and click Create role.


Click Role management and in the main menu click
Operation > Create.
Important! Create Role Basic Information interface
appears as a result of steps 2 as shown in Figure 22.
FIGURE 22 CREATE ROLE BASIC INFORM ATION

Example: Fill in the parameter values as shown in Figure 22.


TABLE 7 ROLE BASIC INFORM ATION

30

Parameters

Description

Input

Role name

It must be entered when role is


created. Role name must be
unique. Operator can enter
alphanumeric value in the text
box.

newRole

Role
description

Description is supplementary
explanation of a role name. It
can also contain some useful

Created by
mani

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

Parameters

Description

Input

information related to role.


Lock the role

It is a checkbox to enable/disable role lock.

Note: Table 7 provides only a reference to operator; values


may vary according to environment deployed.
4. Click Access rights TAB page.
5. There are two ways to assign rights to operator:
f

Click Operator assignment list to select one option


from [Supervisor], [Operator], and [Maintenance
person] and [Administrator]. Choosing one option,
system sets the parameters from operation tree
automatically.
Click particular check box under the operation tree as
required for rights assignment.

Note: Operator can also assign the rights by following the


combination of above operations from step 5.
FIGURE 23 CREATE ROLE ACCESS RIGHTS

6. Choose resource by clicking Resource tree from right pane


of the interface shown in Figure 23.
7. Click Login address TAB page, which displays the interface
shown in Figure 24.

Confidential and Proprietary Information of ZTE CORPORATION

31

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 24 CREATE ROLE LOGIN ADDRESS

Note: IP segment is assigned to node for identification on


the network. The login address of a role is a list of IP address
segments. IP segment is used to assign IPs between
specified addresses.
8. Click Add, which displays dialog box as shown in Figure 25,
add IP address segment in IP format.
FIGURE 25 SETTING IP ADDRESS

Example: Fill in the parameters as shown in Table 8:

32

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

TABLE 8 SETTING IP RANGE P AR AMETERS

Parameters

Description

IP Plan(P)

Choose IP Plan(P) by clicking list of values.

Start IP

Enter start IP address in valid IP format.

End IP

Enter start IP address in valid IP format.

IP range
description

Any information related to certain IP range


setting.

9. Enter values in IP Plan(P), Start IP, End IP and IP range


description parameters, click OK button to save settings.
10. Click User TAB page, which displays interface as shown in
Figure 26.
FIGURE 26 CREATE ROLE OPERATOR

11. Click checkbox to select operator for role assignment.


12. Click OK button to save role attributes.
END OF STEPS

Searching a Role
Purpose

Prerequisites

To search for a particular role from a large number of roles, it is


necessary to have some search procedure. This procedure
provides steps to search for a particular role.
To search a role, meet the following requirements:

Confidential and Proprietary Information of ZTE CORPORATION

33

NetNumenN31 Integrated Network Management Operation Manual

NetNumen N31 server and client must be started before


performing any operation.
Steps

To search for a particular role, perform the following steps:


1. Click View > Security Management from the main menu.
2. In the main menu, click Find > Role, which displays an
interface as shown in Figure 27.
FIGURE 27 SEARCHING ROLE

3. Enter Role name in the text box and click Find button.
Note: Enable case
Sensitive checkbox.

sensitive

option

by

clicking

Case

Result: This displays existed roles list.


END OF STEPS

Refreshing Roles
Purpose
Prerequisites

Roles can be refreshed after making some modifications.


To refresh roles, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To refresh roles, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role management and click role name from right
pane.
3. There are three ways to enter refresh roles, which are as
follows:

34

In the main menu, click Operation > Refresh or press or


press <F4> key from KEYBOARD.

Right-click Role Management and click to choose Refresh.

Click

button from role management toolbar.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

END OF STEPS

Modifying a Role
Purpose
Prerequisites

Roles can be modified in case of any mistake or wrong


information entered.
To modify a role, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Roles to be modified must not be assigned to operator
already.

To modify a role, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role management and click role name from right
pane.
3. There are two ways to enter Modify Role interface , which
are as follows:

In the main menu, click Operation > Modify


Right-click role name and click Modify, which displays
Modify Role interface.
Note: Attributes can be modified by selecting different TAB
pages.

4. Click OK after modifying values to save and submit the


information.
END OF STEPS

Viewing a Role
Purpose
Prerequisites

Roles can be viewed to know some information related to that


role.
To view a role, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view a particular role, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role management and click role name from right
pane.
3. There are two ways to enter View Role interface, which are
as follows:

In the main menu, click Operation > View.

Confidential and Proprietary Information of ZTE CORPORATION

35

NetNumenN31 Integrated Network Management Operation Manual

Right-click role name and click View, which displays View


Role interface as shown in Figure 28.
FIGURE 28 VIEW ROLE

Note: Attributes can be viewed by selecting different TAB


pages.
4. Click OK after viewing to close dialog box.
END OF STEPS

Deleting a Role
Purpose

Prerequisites

There are some unwanted roles that need to be deleted due to


some reasons. This procedure describes how to delete provided
roles.
To delete a role, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Roles to be deleted must not be assigned to operator already
existing.

To delete a role, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role management and click role name from right
pane.
3. There are two ways to delete a role, which are as follows:

36

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

In the main menu, click Operation > Delete

Right-click role name and click Delete.

4. Delete Confirm dialog box appears, click Yes button to


delete otherwise click No to cancel delete operation.
END OF STEPS

Duplicating a Role
Purpose
Prerequisites

This procedure explains users how to duplicate a role as required.


Operator can obtain role attributes from previously created role.
To duplicate a role, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can create a duplicate role.

To duplicate a role, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role management and click role name from right
pane.
3. There are two ways to enter View Role interface, which are
as follows:

In the main menu, click Operation > Duplicate

Right-click role name and click Duplicate


Result: Create Duplicate Role interface appears as shown
in Figure 29.

Confidential and Proprietary Information of ZTE CORPORATION

37

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 29 CREATE DUPLICATE ROLE

Important! Enter the name of a new duplicating role. This


name must be unique.
4. Click TAB pages for rights assignment, login address and
operator and click OK button.
Notes:
f

Steps to duplicate a role are exactly the same as already


explained in topic titled Creating a Role above.
The duplicated role gets all the attributes from the role
already created. Refer to Creating a Role topic to follow
rest of the steps.

END OF STEPS

Viewing Assigned Roles


Purpose
Prerequisites

Assigned roles can be viewed to know some related information.


To view assigned roles, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view assigned roles, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role management and click role name from right
pane.

38

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

3. Right-click role name and click Assignment, which displays


Role Assignment interface.
4. Click Close after viewing to close dialog box.
END OF STEPS

Role Set Management


Overview
Introduction

A role set is a combination of multiple roles, and rights cannot


be assigned to it directly. It is used for role management and
assignment. Operator cannot delete a role set after assigning to
an operator.
A role set is a group of roles. The rights of a role set are the
combination of role rights.

Creating a Role Set


Purpose

Prerequisites

A role set is created to combine multiple roles in one place. It is


used for convenience of role management and assignment to
users.
To create a role set, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To create a role set, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role set management.
3. There are two ways to enter Create Role Set interface,
which are as follows:

Right-click Role set management and click Create role


set.
Click Role management and in the main menu click
Operation then click Create.
Result: Create Role Set interface appears as a result of
steps 2 as shown in Figure 30.

Confidential and Proprietary Information of ZTE CORPORATION

39

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 30 CREATE ROLE SET

Example: Fill in the values as shown in Table 9:


TABLE 9 CREATE ROLE SET P AR AMETERS

Parameters

Description

Input

Role set name

It must be entered when role set


is created. Role set name must be
unique. Operator can enter
alphanumeric value in the text
box.

RoleSet

Role set
description

Description is the supplementary


explanation of a role set. It can
also contain some useful
information related to role set.

Created by
mani

Lock the role


set

Click Lock the role set checkbox


to enable locking.

Checked

Note: Table 9 provides only a reference to operator; values


may vary according to environment deployed.
4. Click Assign a role TAB page. Following interface appears as
shown in Figure 31.

40

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

FIGURE 31 ROLE ASSIGNMENT

Indicates adding a selected role;


Indicates deleting a selected role;
Indicates adding all the roles in the list;
Indicates deleting all the roles in the list.
Note: These style settings are saved in the profile data, and
are valid after next login.
5. Select desired role from left pane and click
assigns all roles by single click.

button. This

6. Click OK button to save and submit roles assigned.


END OF STEPS

Searching Role Set


Purpose

Prerequisites

To search for a particular role set from a large number of role


sets, it is necessary to have some search procedure. This
procedure provides steps to search for a particular role set.
To search a role set, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To search for a particular role set, perform the following steps:

Confidential and Proprietary Information of ZTE CORPORATION

41

NetNumenN31 Integrated Network Management Operation Manual

1. Click View > Security Management from the main menu.


2. In the main menu, click Find > Role Set, which displays
Searching Role Set dialog box as shown in Figure 32.
FIGURE 32 SEARCHING ROLE SET

3. Enter Role set name in the text box and click Find button.
Note: Enable case
Sensitive checkbox.

sensitive

option

by

clicking

Case

Result: Existing role sets are displayed.


END OF STEPS

Refreshing Role Sets


Purpose
Prerequisites

Role sets can be refreshed after making some modifications.


To refresh role sets, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To refresh role sets, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role management and click role name from right
pane.
3. There are three ways to enter refresh role sets, which are as
follows:

In the main menu, click Operation > Refresh or press or


press <F4> key from KEYBOARD.

Right-click Role Management and click to choose Refresh.

Click

button from role management toolbar.

END OF STEPS

42

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

Modifying Role Set


Purpose
Prerequisites

Role set can be modified in case of any mistake or wrong


information entered.
To modify a role set, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Role set to be modified, must not be assigned to operator
already.

To modify a role set, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role set management and click role set name from
the right pane.
3. There are two ways to open Modify Role Set interface,
which are as follows:

In the main menu, click Operation > Modify.

Right-click role set name and click Modify.


Result: Modify Role Set interface appears.
Notes:
f
f

Operator cannot modify role set name.


Other attributes can be modified by selecting from
different TAB pages.

4. Click OK after modifying values to save and submit the


information.
END OF STEPS.

Viewing Role Set


Purpose
Prerequisites

Role set can be viewed to know some information related to that


role set.
To view a role set, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view a particular role set, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role set management and click role set name from
right pane.
3. There are two ways to enter View Role Set interface, which
are as follows:

Confidential and Proprietary Information of ZTE CORPORATION

43

NetNumenN31 Integrated Network Management Operation Manual

In the main menu, click Operation > View


Right-click role set name and click View, which displays
View Role Set interface.
Note: Operator can view all attributes by clicking different
TAB pages without modifying any values.

4. Click OK after viewing to close dialog box.


END OF STEPS

Deleting Role Set


Purpose

Prerequisites

There are some unwanted role sets that need to be deleted due
to some reasons. This procedure describes how to delete
provided role sets.
To delete a role set, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Role set to be deleted, must not be assigned to operator
already.

To delete a role set, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role set management and click role set name from
right pane.
3. There are two ways to delete a role set, which are as follows:

In the main menu, click Operation > Delete

Right-click role set name and click Delete.

4. Delete Confirm dialog box appears, click Yes button to


delete otherwise click No to cancel delete operation.
END OF STEPS

Duplicating a Role Set


Purpose

Prerequisites

This procedure explains users how to duplicate a role set as


required. Operator can obtain role attributes from previously
created role set.
To duplicate a role set, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can create a duplicate role set.

To duplicate a role set, perform the following steps:


1. Click View > Security Management from the main menu.

44

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

2. Click Role set management and click role name from right
pane.
3. There are two ways to create a duplicate role set, which are
as follows:

In the main menu, click Operation > Duplicate


Right-click role set name and click Duplicate, which displays
Create Duplicate Role Set interface as shown in Figure 33.
FIGURE 33 CREATE DUPLICATE ROLE SET

Note: Enter the name of a new duplicating role set. This


name must be unique. Click Lock the role set checkbox to
lock the particular role set.
4. Click Assign a role TAB page for roles assignment and click
to choose on right pane.

Confidential and Proprietary Information of ZTE CORPORATION

45

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 34 ROLE ASSIGNMENT

Indicates adding a selected role;


Indicates deleting a selected role;
Indicates adding all the roles in the list;
Indicates deleting all the roles in the list.
Note: These style settings are saved in the profile data, and
are valid after next login.
Notes:
f

Steps to duplicate a role set are exactly the same as


already explained in topic titled Creating a Role Set above.
The duplicated role set gets all the attributes from the
role set already created. Refer to Creating a Role Set
topic to follow rest of the steps.

END OF STEPS

Viewing Assigned Role Set


Purpose
Prerequisites

Assigned role sets can be viewed to know some related


information.
To view assigned role sets, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps
46

To view assigned role sets, perform the following steps:

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

1. Click View > Security Management from the main menu.


2. Click Role set management and click role set name from
right pane.
3. There are two ways to enter View Role Set interface, which
are as follows:

In the main menu, click Operation > View


Right-click role set name and click Assignment, which
displays Role Set Assignment interface.

4. Click Close after viewing to close dialog box.


END OF STEPS

User Management
Overview
Introduction

Users are the core of the security management sub-system.


Only authorized users by the security management system can
log into the NetNumen N31 system.
When a role is assigned to a user, the user has the right of this
role. Similarly, a role set is a combination of multiple roles.
When a role set is assigned to a user, this user has the rights of
this role set. A users right is the combination of rights of the
role and role set.

Creating a User
Purpose

Prerequisites

Users are created from security management system and also


roles are assigned to perform certain tasks. Role sets are also
assigned to users if there is more than one role to be assigned.
To create a user, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must be authorized to create another user.

To create a user, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click User management
management interface.

from

left

pane

of

security

3. There are two ways to open Create User interface, which


are as follows:

Confidential and Proprietary Information of ZTE CORPORATION

47

NetNumenN31 Integrated Network Management Operation Manual

Right-click User management and click Create user.


Click User management and in the main menu click
Operation > Create.
Result: Create User Basic User Information interface
appears as a result of steps 2 as shown in Figure 35.
FIGURE 35 CREATE USER BASIC USER INFORM ATION

Example: Fill in the parameter values as shown in Table 10:


TABLE 10 BASIC USER INFORM ATION P ARAMETERS

48

Parameters

Description

Input

User name

It must be entered when new


user is created. Operator name
must be unique.

noman

Full name

Operator can enter full name of


user to be created.

No Man
Chaud

User password

This password is used for user


authentication and is necessary
to log into the system.

Verify password

This password is verified for user


authentication and for checking
the validity to log into the
system. This must be the same
as entered in user password text
box.

User
descriptions

Any information related to user


can be entered in this text box.

Created by
mani

Account validity

It validates the account period,

Enter

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

Parameters

Description

Input

(days)

to check the expiry of account


for a certain number of days.

number of
days or
Click
Never
expire
checkbox.

Click Never expire checkbox to


enable never expiry of account.

Password
validity

It validates the password for a


certain period, to check
password expiry for a certain
number of days.
Click Never expire checkbox to
enable never expiry of password.

Authentication
mode

Operator needs to select from


[Password] or [Certificate] for
the account to be authenticated.

Enter
number of
days or
Click
Never
expire
checkbox.
Password

Authentication is performed by
from password by selecting
Password option.
Authenticates is performed by
digital signatures by selecting
Certificate.
User status

Click Disable checkbox to


disable account otherwise leave
it as unchecked.

Unchecked

Note: Table 10 provides only a reference to operator; values


may vary according to environment deployed.
4. Click Role TAB page to assign role and role sets to user, as
shown in Figure 36.

Confidential and Proprietary Information of ZTE CORPORATION

49

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 36 ASSIGNING ROLE AND ROLE SETS

Important!
f

When a role is assigned to a user, the user has the right


of this role. Similarly, a role set is a combination of
multiple roles.
When a role set is assigned to the user, this user has the
rights of this role set. Users right is the combination of
rights of the role and role set.

5. Click desired role or role set checkbox and click User


department TAB page.
Result: Step 4 displays Assigning Departments interface
as shown in Figure 37.

50

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

FIGURE 37 ASSIGNING DEPARTMENT

6. Click particular checkbox to select department and click


Login TAB page, which displays User Login Parameters as
shown in Figure 38.

Confidential and Proprietary Information of ZTE CORPORATION

51

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 38 USER LOGIN P ARAMETERS

Example: Fill in the parameter values as shown in Table 11:


TABLE 11 BASIC USER INFORM ATION P ARAMETERS

Parameters

Description

Input

Search days
(Max=1000)

Enter a numeric value to perform


query for checking user login
record.

Set work time

It sets the weekly work time [including


working hours] for a user.
Operator can set work time by selecting hours
and week day options as shown in Figure 38
and click OK button.

52

Lockup records

Click View user lockup records button to


display user lockup records.

Total of logins

Different clients can log in the


system with the same user name
at the same time. Operator can
set login limit. If the number of
clients exceeds the numeric limit,
the system refuses new client to
log in the system.
Select numeric value to set
number of logins for GUI.

10

Select numeric value to set


number of logins for TELNET.

10

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

Parameters

Set work time

Description

Input

Select numeric value to set


number of logins for WEB.

10

It sets the weekly work time [including


working hours] for a user.
Operator can set work time by selecting hours
and week day options as shown in Figure 39
and click OK button.

Note: Table 11 provides only a reference to operator; values


may vary according to environment deployed.
FIGURE 39 SETTING WORK TIME

7. Click OK button to save and submit this information.


END OF STEPS

Searching a User
Purpose

To search for a particular user from a large number of users, it is


necessary to have some query procedure. This procedure
provides steps to search for a particular user.

Prerequisites

To search for a particular user, meet the following requirements:


NetNumen N31 server and client must be started before
performing any operation.

Steps

To search for a particular user, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click User management
management interface.

from

left

pane

of

security

Confidential and Proprietary Information of ZTE CORPORATION

53

NetNumenN31 Integrated Network Management Operation Manual

3. In the main menu, click Find > User, which displays an


interface as shown in Figure 40.
FIGURE 40 FIND USER

4. Enter user name to search in User name text box and click
Find button from Figure 40.
Note: Enable case
Sensitive checkbox.

sensitive

option

by

clicking

Case

END OF STEPS

Refreshing Users
Purpose
Prerequisites

Users can be refreshed after making some modifications.


To refresh users, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To refresh users, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Role management and click role name from right
pane.
3. There are three ways to refresh users, which are as follows:

In the main menu, click Operation > Refresh or press or


press <F4> key from KEYBOARD.

Right-click Role Management and click to choose Refresh.

Click

button from role management toolbar.

END OF STEP

Modifying User Information


Purpose
54

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

User information can be modified in case of any mistake or


wrong information entered.
Prerequisites

To modify a user, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can modify user information.

To modify user information, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click User management
management interface.

from

left

pane

of

security

3. Click user name to modify that user from right pane.


4. There are two ways to open Modify User interface, which
are as follows:

In the main menu, click Operation > Modify.

Right-click user name and click Modify.


Result: Modify User Information interface appears as
shown in Figure 41.
FIGURE 41 MODIFY USER INFORM ATION

Note:
f

Other attributes can be modified by selecting from


different TAB pages.
Operator does not have rights to modify all the attributes
if the user is the system administrator.

Confidential and Proprietary Information of ZTE CORPORATION

55

NetNumenN31 Integrated Network Management Operation Manual

5. Click OK after modifying values to save and submit the


information.
END OF STEPS

Viewing a User
Purpose
Prerequisites

Users can be viewed to know some information related to that


user.
To view a user, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
In main menu, click View > Security Management.

To view a particular user, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click User management and click user name from right
pane.
3. There are two ways to enter View User interface, which are
as follows:

In the main menu, click Operation > View.


Right-click user name and click View, which displays View
User interface.
Note: View all attributes by clicking different TAB pages.
Operator does not have rights to view all attributes if the
user is system administrator.

4. Click OK after viewing to close dialog box.


END OF STEPS

Deleting a User
Purpose

Prerequisites

There are some unwanted users that need to be deleted due to


some reasons. This procedure describes how to delete provided
users.
To delete a user, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must be authorized to perform delete operation.

To delete a user, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click User management and click user name from right
pane.

56

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

3. There are two ways to delete a particular user, which are as


follows:

In the main menu, click Operation > Delete.

Right-click user name and click Delete.

4. Delete Confirm dialog box appears, click Yes button to


delete otherwise click No to cancel delete operation.
END OF STEPS

Duplicating a User
Purpose

Prerequisites

This procedure explains how to duplicate a user. Newly


duplicated user receives all attributes from previously created
user. Operator can also modify these attributes.
To duplicate a user, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can create a duplicated user.

To duplicate a user, perform the following requirements:


1. Click View > Security Management from the main menu.
2. Click User management
management interface.

from

left

pane

of

security

3. Click user name from right pane of Security Management


interface.
4. There are two ways to open Create Duplicate User
interface, which are as follows:

In the main menu, click Operation > Duplicate.


Right-click user name and click Duplicate, which displays
Create duplicate user interface as shown in Figure 42.

Confidential and Proprietary Information of ZTE CORPORATION

57

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 42 CREATE DUPLICATE OPERATOR

Note: Enter new duplicating user name. User name must


be unique.
5. Click OK button to save values and close dialog box.
Notes:
f

Steps to duplicate a user are exactly the same as already


explained in topic Creating a User above.
The duplicated user gets all the attributes from the user
already created. Refer to Creating a User topic to follow
rest of the steps.

END OF STEPS

Viewing User Lockup Record


Purpose

Prerequisites

This function enables an operator to view the locked users.


Locked users are unable to perform the operations on the
system.
To view user lockup record, meet the following requirements:

Steps
58

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can modify user information.

To view user lockup record, perform the following steps:

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

1. Click View > Security Management from the main menu.


2. Click User management
management interface.

from

left

pane

of

security

3. Click user name to modify that user from right pane.


4. There are two ways to open Modify User interface, which
are as follows:

In the main menu, click Operation > Modify.


Right-click user name and click Modify, which displays
Modify User Information interface as shown in Figure 43.
FIGURE 43 USER LOCKUP RECORD

5. Click Login TAB page and click View user lockup records,
which displays View User Lockup Records interface as
shown in Figure 44.

Confidential and Proprietary Information of ZTE CORPORATION

59

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 44 VIEW USER LOCKUP RECORDS

6. Click OK after modifying values to save and submit the


information.
Note: System displays if users are locked, otherwise there is
no record to display.
END OF STEPS

Disconnecting User Forcefully


Purpose
Prerequisites

This function allows an operator to disconnect a particular user


forcefully.
To disconnect a user, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To disconnect a user, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click User management and click Function > Login User
Management, which display Login User Management
interface as shown in Figure 45.

60

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

FIGURE 45 LOGIN USER MANAGEMENT

3. Right-click Login user and click to choose Disconnect


compulsarily.
4. Delete Confirm dialog box appears, click Yes button to
disconnect otherwise click No to cancel the operation.
Note: Local user cannot be deleted, operator must make
sure that the user is not local and must have rights to
perform the operation.
END OF STEPS

Viewing Access Rights


Purpose
Prerequisites

This procedure helps operator to view access rights granted to


user.
To view access rights, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.

To view access rights, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click User management and click user name from right
pane.
3. Right-click operator name and click Access right, which
displays Access Rights interface as shown in Figure 46.

Confidential and Proprietary Information of ZTE CORPORATION

61

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 46 ACCESS RIGHTS

Note: View access rights already granted. Operator cannot


modify access rights.
4. Click Close after viewing to close dialog box.
END OF STEPS

Department Management
Overview
Introduction

62

Department provides a simulation of administration


It is created for convenient management and
administration department. Operator can create
department as required, and can also modify
information.

Confidential and Proprietary Information of ZTE CORPORATION

department.
handling of
or delete a
department

Chapter 2 Integrated Network Management System

Creating a Department
Purpose
Prerequisites

Department is created for convenient management and handling


of operator information and rights assignment.
To create a new department, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To create a new department, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Department management from left pane.
3. There are two ways to open Create Department interface,
which are as follows:

Right-click Department management and click Create


department.
Click Department management and in the main menu
click Operation > Create.
Result: Create Department interface appears as a result of
steps 3 as shown in Figure 47.
FIGURE 47 CREATE DEPARTMENT BASIC INFORM ATION

Example: Table 12 provides description to role basic


information. Fill in the parameter values as follows:

Confidential and Proprietary Information of ZTE CORPORATION

63

NetNumenN31 Integrated Network Management Operation Manual

TABLE 12 BASIC DEPARTMENT INFORMATION

Parameters

Description

Input

Department
name

It must be entered when new


department is created.
Department name must be
unique.

ServiceDeptt

Department
description

Any information related to


department can be entered in
this text box.

Created by
mani

Note: Table 12 provides only a reference to operator; values


may vary according to environment deployed.
4. Click Superior department TAB page to select its superior
department as shown in Figure 48.
FIGURE 48 SETTING SUPERIOR DEPARTMENT

5. Click OK button to save and create this department.


END OF STEPS

Searching a Department
Purpose

Prerequisites
64

To search for a particular department from a large number of


departments, it is necessary to have some search procedure.
This procedure provides steps to search for a particular
department.
To search role set, meet the following requirements:

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

NetNumen N31 server and client must be started before


performing any operation.
Steps

To search for a particular role set, perform the following steps:


1. In the main menu, click Find > Find department, which
displays an interface as shown in Figure 49.
FIGURE 49 FIND DEPARTMENT

2. Enter Role set name in the text box and click Find button.
Note: Enable case
Sensitive checkbox.

sensitive

option

by

clicking

Case

END OF STEPS

Refreshing Departments
Purpose
Prerequisites

Department information can refreshed after making some


modifications.
To refresh departments, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To refresh departments, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Department management and click role name from
right pane.
3. There are three ways to refresh departments, which are as
follows:

In the main menu, click Operation > Refresh or press or


press <F4> key from KEYBOARD.
Right-click Department management and click to choose
Refresh.
Click

button from role management toolbar.

Confidential and Proprietary Information of ZTE CORPORATION

65

NetNumenN31 Integrated Network Management Operation Manual

END OF STEPS

Modifying a Department
Purpose
Prerequisites

Department information can be modified in case of any mistake


or wrong information entered.
To modify a department, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To modify a department, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Department management from left pane of Security
Management interface.
3. Click department name to modify that department from right
pane.
4. There are two ways to open Modify Operator interface,
which are as follows:

In the main menu, click Operation > Modify.

Right-click department name and click Modify.


Result: Modify Department Information appears as a
result of step 4.
Note:
f
f

Operator cannot modify department name.


Other attributes can be modified by selecting from
different TAB pages.

5. Click OK after modifying values to save and submit the


information.
END OF STEPS

Viewing a Department
Purpose

Prerequisites

Department can be viewed to know some information related to


that department. This topic provides only a view of department,
modifications are not allowed.
To view department
requirements:

information,

meet

the

following

NetNumen N31 server and client must be started before


performing any operation.
Steps

66

To view particular department information, perform the following


steps:

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 2 Integrated Network Management System

1. Click View > Security Management from the main menu.


2. Click Department management and click department
name from right pane.
3. There are two ways to enter View Department interface,
which are as follows:

In the main menu, click Operation > View.

Right-click department name and click View.


Result: View Department interface appears as shown in
Figure 50.

FIGURE 50 VIEW DEPARTMENT

4. Click Superior department TAB page to view details.


5. Click OK after viewing to close dialog box.
END OF STEPS

Deleting a Department
Purpose
Prerequisites

There are some unwanted departments that need to be deleted


due to some reasons.
To delete a department, meet the following requirements:

NetNumen N31 server and client must be started before


performing any operation.
Operator must be authorized to perform delete operation.

Confidential and Proprietary Information of ZTE CORPORATION

67

NetNumenN31 Integrated Network Management Operation Manual

Steps

To delete a department, perform the following steps:


1. Click View > Security Management from the main menu.
2. Click Department management and click department
name from right pane.
3. There are two ways to delete a particular operator, which are
as follows:

In the main menu, click Operation > Delete.

Right-click department name and click Delete.

4. Delete Confirm dialog box appears, click Yes button to


delete otherwise click No to cancel delete operation.
END OF STEPS

68

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Topology Management
Overview
Introduction

Contents

Topology management is a subsystem which is responsible for


connection between different NEs within a network. It creates
NEs and also creates links for connecting NEs. It adds groups
and set rules for different groups and group members.
This chapter includes the following topics:
TABLE TOPICS IN CHAPTER 3

Topic Title

Page No.

Overview

69

Topology View Operations


Overview

71

Modifying Logical View

72

Deleting Logical View

72

Configuring Map

73

Group Operations
Overview

75

Modifying a Group

77

Deleting a Group

78

Moving a Group

79

Setting Group Rules

80

Setting Group Members

81

Querying Group Attributes

82

Exporting Group Info

83

Importing Group Info

84

Copying and Pasting Group

85

NE Operations
Overview

86

Confidential and Proprietary Information of ZTE CORPORATION

69

NetNumenN31 Integrated Network Management Operation Manual

Topic Title

Page No.

Moving an NE

88

Modifying an NE

88

Deleting an NE

89

Virtual Link Operations


Overview

91

Setting Members

93

Modifying Virtual Link

95

Deleting Virtual Link

96

Querying Virtual Link Attributes

97

Viewing the Distance between two NEs

90

Customizing GUI Elements

98

Setting Network Layout

99

Setting Topology Filter Tree

100

Expanding and Collapsing


Overview

101

Expanding and Collapsing Node

102

Showing Statistical Information

102

Querying Alarm Messages

103

Going One Level Up

103

Auto Discovery Management


Overview

104

Configuring Basic Parameters

104

Configuring SNMP Protocol

106

Configuring Network

108

Configuring Node

109

Configuring Filter

110

Polling Configuration

70

Overview

111

Adding Polling Configuration Parameters

111

Modifying Polling Configuration Parameters

114

Deleting Polling Configuration Parameters

114

Updating Topology Data

115

Synchronizing Topology

116

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Topology View Operations


Overview
This module provides operational steps for creating, modifying,
deleting topology logical view and configuring topology map view.

Creating Logical View


Purpose
Prerequisites

Logical view provides only a view of topology management items


on left pane of the interface.
To create a logical view, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Log into the system by referring to topic titled Logging into
NetNumen N31.

To create a logical view, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click Topo > Create View to open Create View dialog box
as shown in Figure 51.
FIGURE 51 CREATE VIEW

3. Enter view name in the text box and enable Auto apply rule
option by clicking checkbox.
4. Click OK button to save entered values and create a logical
view.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

71

NetNumenN31 Integrated Network Management Operation Manual

Modifying Logical View


Purpose

Prerequisites

Logical view can be modified in case of any mistake or wrong


information entered. Operator can only modify logical view name
through this interface.
To modify logical view, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can perform modify operation.

To modify logical view, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click Topo > Modify View to open Create View dialog box
as shown in Figure 52.
FIGURE 52 MODIFY VIEW

3. Select view name from View name list of values.


4. Enter view name in the text box and click OK button to save
modified values.
END OF STEPS

Deleting Logical View


Purpose

Prerequisites

There are some unwanted views that need to be changed or


deleted due to some reasons. This procedure describes how to
delete provided views.
To delete a logical view, meet the following requirements:

72

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can delete a logical view.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Steps

To delete a logical view, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click Topo > Delete View to open Delete View dialog box
as shown in Figure 53.
FIGURE 53 DELETE VIEW

3. Select view name from list of values displayed in Figure 53


and click OK button.
4. Delete Confirm dialog box appears, click Yes button to
delete otherwise click No to cancel delete operation.
END OF STEPS

Configuring Map
Purpose

Prerequisites

Operator can configure different maps for different groups. This


procedure can set longitude and latitude accuracy upto 4
decimal places.
To configure map, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To configure map, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Right-click the topology views on right pane and choose
Configure Map to open Configuring Map dialog box as
shown in Figure 54.

Confidential and Proprietary Information of ZTE CORPORATION

73

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 54 CONFIGURING MAP

3. Click import button to select map file from the system.


Note: Operator can also enable Use default file option by
clicking checkbox. For other parameter values see Table 13:
TABLE 13 CONFIGURING MAP P AR AMETERS

74

Parameters

Description

Input

Start
longitude

It is a numeric value and


represents horizontal values.
Longitude start value must be set
between -180 and +180.

-180

End longitude

It is a numeric value and


represents horizontal values.
Longitude end value must be set
between -180 and +180.

180

Start latitude

It is a numeric value and


represents vertical values. Latitude
start value must be set between 90 and +90.

-90

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Parameters

Description

Input

End latitude

It is a numeric value and


represents vertical values. Latitude
end value must be set between 90 and +90.

90

Note: Table 13 provides only a reference to operator; values


may vary according to environment deployed.
4. Click OK button after entering values, and save settings.
END OF STEPS

Group Operations
Overview
Groups are created to manage alike NEs, links, and users.
Different groups are created for different users. In one group
configuration of NEs and links are the same.

Creating a Group
Purpose

Prerequisites

Groups are created to handle operators information easily.


Different groups can be created for different kind of users or for
different departments.
To create a group, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To create a group, perform the following steps:


1. Click View > Topology Management from the main menu.
2. There are two ways to create group, which are as follows:

Right-click topology root of logical view and select Create


Group from the menu.
Click Operation > Crete Group from the menu.
Note: Create Group dialogue box appears, as shown in
Figure 55.

Confidential and Proprietary Information of ZTE CORPORATION

75

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 55 CREATE GROUP

Example: Fill in the create group parameters as explained in


Table 14.
TABLE 14 CREATE GROUP P AR AMETERS

Parameters

Description

Input

Parent group

Operator needs to assign


parent group for new group.
Click Select button to select
parent group. It displays an
interface as shown in Figure
55.

10.41.42.245

Group name

It must be entered when group


is created. Group name must
be unique. Operator can enter
alphanumeric value in the text
box.

newGroup

Group type

Select group type from the list


of values. Different groups are
created based on different
types. Operator need to choose
from [Group], [District],
[ManufacturerGroup],
[DeviceTypeGroup],
[PrivateIPGroup],
[VersionGroup] and
[DeviceIdGroup].

Click to choose
Group as a
general group
type.

Group
description

Description is the
supplementary explanation of
a group name. It can also
contain some useful
information related to group.

Created by
mani

(It displays the


IP address of
node
selected.)

Note: Table 14 provides only a reference to operator; values


may vary according to environment deployed.

76

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

FIGURE 56 SELECT NODE

3. Click OK button to save entered values and create group.


END OF STEPS

Modifying a Group
Purpose

Prerequisites

Groups can be modified in case of any mistake or wrong


information entered. Operator cannot modify parent group;
other values can be modified.
To modify a group, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can perform modify operation.

To modify a group, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Right-click group name from left pane, choose Modify group
to open Modify Group dialog box as shown in Figure 57.

Confidential and Proprietary Information of ZTE CORPORATION

77

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 57 MODIFY GROUP

3. Click OK button after modifying values to save.


END OF STEPS

Deleting a Group
Purpose

Prerequisites

There are some unwanted groups that need to be deleted due to


some reasons. This procedure describes how to delete already
created groups.
To delete a group, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can delete a group.

To delete a group, perform the following steps:


1. Click View > Topology Management from the main menu.
2. There are two ways to delete a group, which are as follows:

Right-click the group name to be deleted in the topology


view.
Click Topo > Delete Group.

3. Delete Confirm dialog box appears, click Yes button to


delete otherwise click No to cancel delete operation.
END OF STEPS

78

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Moving a Group
Purpose

Prerequisites

Groups can be moved to other groups to set a new parent for


the particular group. Corresponding NEs are also moved with
groups. Groups only can be moved under local group node or
local server node.
To move a group, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To move a group, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click the group to be moved in the topology tree from the
left pane.
3. There are two ways to move a group, which are as follows:

Right-click the group name from the left pane and choose
Move Group and NE.
Click the group name from the left pane and click Operation
> Move Group and NE menu.
Result: Move Group interface appears as shown in Figure
58.

Confidential and Proprietary Information of ZTE CORPORATION

79

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 58 MOVE GROUP

4. Select desired option from Figure 58 and click OK button to


perform the move action.
END OF STEPS

Setting Group Rules


Purpose

Prerequisites

There are three group rules to be set for groups. These are IP
Address Rule, Device Type Rule and Location Rule. Each rule has
its own parameters to set.
To set group rule, meet the following requirements.
NetNumen N31 server and client must be started before
performing any operation.

Steps

To set group rule, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click a particular group name, for which rules are to be set.
3. There are two ways for setting group rules, which are as
follows:

80

In the main menu click Operation > Set rule.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Right-click group name and choose Set rule.


Result: Set Group Rules interface appears as shown in
Figure 59.
FIGURE 59 SET GROUP RULES

Example: Example is explained for IP Address Rule Setting;


rest of the rules can be followed in the similar way.
i.

Click Type list of values from right pane to select IP


Address Rule type.

ii. Enter IP Address in the space provided below. For


example 10.41.42.48 is a valid IP address format.
iii. Click Apply Condition button after entering values to
save settings.
iv. Click Close button.
Note:
f

Enter IP address in valid format. For multi IP address use


-, to specify range, use ; as separator.
Operator can click Not equals checkbox to enable unique
IP address input. This enables the system to not to
duplicate the IP address to avoid conflict.

END OF STEPS

Setting Group Members


Purpose
Prerequisites

Members can also be set within a group; this can be sub-group


or NEs depending upon the requirement.
To set group member, meet the following requirements:

Confidential and Proprietary Information of ZTE CORPORATION

81

NetNumenN31 Integrated Network Management Operation Manual

NetNumen N31 server and client must be started before


performing any operation.
Steps

To set group member, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click a particular group name, for which members are to be
set.
3. There are two ways for setting group members, which are as
follows:

In the main menu click Operation > Set member.

Right-click group name and choose Set member.


Result: Set Group Member interface appears as shown in
Figure 60.
FIGURE 60 SET GROUP MEMBER

4. Click Add button to open topology management tree.


5. Select an item to be set as its member, click OK button to
save settings.
END OF STEPS

Querying Group Attributes


Purpose

Prerequisites

82

To search for a particular group and its attributes from a large


list of groups, it is necessary to have some query procedure.
This procedure provides steps to search for a particular group.
To query group attributes, meet the following requirements:

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

NetNumen N31 server and client must be started before


performing any operation.
Steps

To query group attributes, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click a particular group name, which is to be copied.
3. There are two ways for importing group, which are as follows:

In the main
Attributes.

menu,

click

Operation

>

Show

Topo

Right-click group name and choose Show Topo Attributes.


Result: Show Topo Attributes appears as shown in Figure 61.
FIGURE 61 TOPO ATTRIBUTES

4. Click OK button to close dialog box.


END OF STEPS

Exporting Group Info


Purpose
Prerequisites

Groups can be exported in .xml file. Operator can save this file
anywhere on the system.
To export group information, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To export group information, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click a particular group name, which is to be exported.
3. There are two ways for setting group members, which are as
follows:

Confidential and Proprietary Information of ZTE CORPORATION

83

NetNumenN31 Integrated Network Management Operation Manual

In the main menu, click Operation > Export.

Right-click group name and choose Export.


Result: Export Group dialog box appears as shown in
Figure 62.
FIGURE 62 EXPORT GROUP

4. Choose desired directory to export


filename and click Save button.

*.xml

file,

enter

END OF STEPS

Importing Group Info


Purpose

Prerequisites

Groups can be imported from .xml file. Operator can import


already existing groups from other systems. It is a more
convenient way to add specified group information.
To import group information, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To import group information, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click a particular group name, which is to be imported.
3. There are two ways for importing group, which are as follows:

In the main menu, click Operation > Import.

Right-click group name and choose Import.


Result: Import Group dialog box appears as shown in
Figure 63.

84

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

FIGURE 63 IMPORT GROUP

4. Choose directory from where to import group information,


select .xml file to be imported, and click Open button.
END OF STEPS

Copying and Pasting Group


Purpose
Prerequisites

Groups can be copied from one group and pasted to another


node as required. It also copies the rules and properties of group.
To copy a group, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To copy a group, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click a particular group name, which is to be copied.
3. There are two ways for importing group, which are as follows:

In the main menu, click Operation > Copy Group.

Right-click group name and choose Copy Group.

4. Right-click the server from server root tree on left pane, and
click Paste Group.
Result: Group is copied to the server root.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

85

NetNumenN31 Integrated Network Management Operation Manual

NE Operations
Overview
Network Element (NE) is the component of a network, which is
used to provide particular service operations. This can be a
server or system providing service operations. These operations
are of different types; for example database services, short
messaging service (SMS) and multimedia messaging services
(MMS). NEs are the entities, which can be included in multiple
networks.

Creating an NE
Purpose

Prerequisites

Network Element (NE) is the component of a network, which is


used to provide particular service operations. This function
provides operational steps to create an NE.
To create an NE, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To create an NE, perform the following steps:


1. Click View > Topology Management from the main menu.
2. In the topology view on left pane, right-click a topology node
and click Create NE, which displays Create NE dialog box
as shown in Figure 64.

86

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

FIGURE 64 CREATE NE

Table 15 explains parameters displayed in Figure 64.


TABLE 15 CREATE NE P ARAMETERS

Parameters

Description

IN Media Server

It provides multimedia services.

IN IIS

It is IN internet information server used as


web server for publishing online websites.

IN Application
Server

It provides the services of web server to


server static or dynamic webpages. Provides
websites to retrieve data.

IN DB Server

It stores the customer information such as


code, number, money, charging plan and
free units.

IN Data
Warehouse
Server

It is to bring information together from


various sources and put them into a
conducive format used for decisions.

IN IMP

It is interface message processor and used


for coding and decoding of messages
between different IN nodes such as SCP and
SMP.

IN SCP

This is IN service control point and is used


for processing service logic program (SLP)
and providing IN service data.

IN VC

It is IN voucher card used in IN platform.


IMP in VC cooperate with each other.

IN CDR Server

It provides the calling data records for


charging management of customers. It gets
CDRs from SCP via FTP server and sends to
charging server.

Confidential and Proprietary Information of ZTE CORPORATION

87

NetNumenN31 Integrated Network Management Operation Manual

Parameters

Description

IN WEB Server

A program that processes document


requests; it also has a database, which is a
repository of data and content.

IN Compound
Device

It is the device that compounds other


several devices such as SCP/SMP,
SCP/SMP/VC.

IN-SIUModule

This is subscriber identification unit module,


which contains information of subscribers.

IN WAP GW

It is IN wireless application protocol


gateway.

OCS

It is online charging system.

Note: Table 15 provides only a reference to operator; values


may vary according to environment deployed.
3. Select a particular NE Type from left pane to be selected as
NE, and click Create button.
Example: Clicking IN WAP GW shows parameters on right
side of the interface. Enter parameter values and click
Create button.
END OF STEPS

Moving an NE
Purpose
Prerequisites

This function allows operator to move NEs from their own place
to other NEs. This procedure describes how to move existing NEs.
To move an NE, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must be authorized to perform move operation.

To move an NE, perform the following steps:


1. Click View > Topology Management from the main menu.
2. In the topology view, drag an NE icon to another NE icon
with mouse.
3. Drag and Drop Confirm dialog box appears, click OK
button to move otherwise click No to cancel the operation.
END OF STEPS

Modifying an NE
Purpose

88

NEs can be modified in case of any mistake or wrong information


entered. Parent, Name and Type columns cannot be modified.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Prerequisites

To modify an NE, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can perform modify operation.

To modify an NE, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Right-click NE name from left pane, choose Modify NE to
open Modify Group dialog box as shown in Figure 65.
FIGURE 65 MODIFY NE

3. Click OK button after modifying information to save.


END OF STEPS

Deleting an NE
Purpose

Prerequisites

There are some unwanted NEs that need to be deleted due to


some reasons. This procedure describes how to delete provided
NEs.
To delete an NE, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must be authorized to perform delete operation.

To delete an NE, perform the following steps:


1. Click View > Topology Management from the main menu.

Confidential and Proprietary Information of ZTE CORPORATION

89

NetNumenN31 Integrated Network Management Operation Manual

2. There are two ways to delete a particular user, which are as


follows:

In the main menu, click Topo > Delete.

Right-click NE name and click Delete.

Click

button from topology management toolbar.

3. Delete Confirm dialog box appears, click Yes button to


delete otherwise click No to cancel delete operation.
END OF STEPS

Viewing the Distance between two


NEs
Purpose
Prerequisites

This function allows operator to view the distance between


different NEs. The distance is displayed in kilometers.
To view the distance, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view the distance, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click and drag mouse to select two NEs on left pane, and
right-click to choose Measure Distance which displays
Measure Distance interface as shown in Figure 66.
FIGURE 66 MEASURE DISTANCE

3. Click OK button to close the dialog box.


END OF STEPS

90

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Virtual Link Operations


Overview
Links are created to connect different NEs within a network. This
module provides operational steps to create, set members,
modify, delete, and query.

Creating Virtual Link


Purpose

Prerequisites

Virtual link is used to connect different NEs within a network.


These links can be displayed in the topology management
interface.
To create a virtual link, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To create a virtual link, perform the following steps:


1. Click View > Topology Management from the main menu.
2. In the topology view on left pane, right-click a topology node
and click Create Virtual Link, which displays Create
Virtual Link dialog box as shown in Figure 67.

Confidential and Proprietary Information of ZTE CORPORATION

91

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 67 CREATE VIRTUAL LINK

Example: Fill in the create group parameters as explained in


Table 16.
TABLE 16 CREATE VIRTUAL LINK P ARAMETERS

92

Parameters

Description

Input

Parent Link

It selects the parent link under


which a new virtual link is created.
Click Select button to select the
parent link. Link tree is displayed;
click a particular link to select.

All Links

Name

Name used for link identification. Operator


cannot enter name as this option is disabled.

Alias

It is also name of the link.


Operator can name a link for
easiness. It must be unique.

newLink

Link Type

It provides options to select Virtual


Link or Physical link. Operator
cannot choose this option as it is
disabled.

Virtual
Link

From NE

It is used to select the start NE


from which the link starts. Click
Select button for selecting
starting NE.

newVNE

From Port

It is used to select the start NE


port number from which the link
starts. Click Select button for
selecting starting NE port number.

21099

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Parameters

Description

Input

To NE

It is used to select the ending NE


at which the link ends. Click To
button for selecting starting NE.

newVNE

To Port

It is used to select the ending NE


port at which the link ends. Click
To button for selecting ending NE
port number.

21099

Description

Description is the supplementary


explanation of a link. It can also
contain some useful information
related to link.

Created by
mani

Note: Table 16 provides only a reference to operator; values


may vary according to environment deployed.
3. Click OK button after entering values, which creates a new
virtual link.
END OF STEPS

Setting Members
Purpose

Prerequisites

This function provides operator an option to set members of


under a particular link. The member must be a link to be set as
members.
To set member, meet the following requirement:

Steps

NetNumen N31 server and client must be started before


performing any operation.

Only authorized operators can set members.

Parent link must be created prior to setting members.

To set member, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Right-click to choose Expand deeply to display all the nodes,
links and NEs as shown in Figure 68.

Confidential and Proprietary Information of ZTE CORPORATION

93

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 68 VIEW NODES

3. Click a particular link to set members, as link appears with


green line, which displays Set Member interface as shown in
Figure 69.
FIGURE 69 SET MEMBER

4. Click Add button, which displays Select Member interface


as shown in Figure 70.

94

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

FIGURE 70 SELECT MEMBER

5. Click a desired link to choose as member and click OK button


to save.
END OF STEPS

Modifying Virtual Link


Purpose

Prerequisites

Virtual link can be modified in case of any mistake or wrong


information entered. Operator can modify Alias, From Port, To
Port and Description parameters from Modify Virtual Link
interface shown in Figure 71.
To modify a virtual link, meet the following requirement:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can perform modify operation.

To modify a virtual link, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Right-click link name from left pane, choose Modify Virtual
link to open Modify Virtual Link dialog box as shown in
Figure 71.

Confidential and Proprietary Information of ZTE CORPORATION

95

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 71 MODIFY VIRTUAL LINK

3. Click OK button after modifying values and close dialog box.


END OF STEPS

Deleting Virtual Link


Purpose

Prerequisites

There are some unwanted links that need to be deleted due to


some reasons. This procedure describes how to delete a
particular link.
To delete a virtual link, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Only authorized operators can delete a virtual link.

To delete a particular link, perform the following steps:


1. Click View > Topology Management from the main menu.
2. There are two ways to delete a virtual link, which are as
follows:

Right-click the link name to be deleted in the topology view


and choose Delete Virtual Link.
Click the link name on left pane, and click Topo > Delete
Virtual Link.

3. Delete Confirm dialog box appears, click Yes button to


delete otherwise click No to cancel delete operation.

96

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

END OF STEPS

Querying Virtual Link Attributes


Purpose

Operator can only view the attributes of a virtual link. Attributes


values cannot be modified in this interface while performing this
function.

Prerequisites

To view virtual link attributes, meet the following requirements:


NetNumen N31 server and client must be started before
performing any operation.

Steps

To view a virtual link attributes, perform the following steps:


1. Click View > Topology Management from the main menu.
2. There are two ways to view link attributes, which are as
follows:

Right-click the link name to be viewed in the topology view


and choose Show Topo Attributes.
Click the link name on left pane, and click Topo > Show
Topo Attributes.
Result: View Virtual Link Attributes dialog box appears
as shown in Figure 72.
FIGURE 72 VIEW VIRTUAL LINK ATTRIBUTES

3. Click OK button to close dialog box.


END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

97

NetNumenN31 Integrated Network Management Operation Manual

Customizing GUI Elements


Purpose

Prerequisites

GUI elements have such representation in the system map. In


the view tree elements are represented differently and in the
map they are represented differently to avoid confusion amongst
each other.
To customize GUI elements, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To customize GUI elements, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click Topo > Customize GUI element, which displays
Customize GUI Element interface as shown in Figure 73.
FIGURE 73 CUSTOMIZE GUI ELEMENT

Table 17 provides description to customizing GUI elements.


TABLE 17 CUSTOMIZE GUI ELEMENT DESCRIPTION

98

Parameters

Description

Customize type
image

This option provides the element


representation in view tree and map.

Customize link
facade

This option provides a distinct representation


of links.

Customize state
image

This option provides the active state of


elements with images.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Customize state
color

This option provides the state of element with


colors.

Other

This option provides the topology configuration


with colors and font size.

3. Choose a particular option from left pane to customize GUI


elements.
4. Click OK button to save changes and close the interface.
END OF STEPS

Setting Network Layout


Purpose

Prerequisites

There are different ways to represent a network layout for


example hierarchical layout, tree layout and radial layout. This
procedure explains to set the network in different ways.
To set network layout, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To set network layout, perform the following steps:


1. Click
button from Topology Management Toolbar as
shown in Figure 74.
FIGURE 74 TOPOLOGY MANAGEMENT TOOLBAR

Result: Network Layout Setting interface appears as


shown in Figure 75.

Confidential and Proprietary Information of ZTE CORPORATION

99

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 75 NETWORK LAYOUT SETTINGS

2. Choose a particular network layout setting displayed on left


pane and click Apply button to save and apply changes.
3. Click OK button to close the dialog box.
END OF STEPS

Setting Topology Filter Tree


Purpose

Prerequisites

Operator can set topology filter tree as desired. Choosing a


particular option provides a physical view of the element. If
operator selects a checkbox to uncheck, then system does not
display the physical view of a particular element.
To set topology filter tree, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To set topology filter, perform the following steps:


button from Topology Management Toolbar as
1. Click
shown in Figure 74.
Result: Topology Management Filter interface appears as
shown in Figure 76.

100

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

FIGURE 76 TOPOLOGY MANAGEMENT FILTER

Note: Operator can select different options displayed in


Figure 76 as checkboxes. Choosing a particular option
provides the physical view of the element.
2. Click desired checkbox to look at the physical view of
element.
END OF STEPS

Expanding and Collapsing


Overview
Expanding provides an overall view of all the elements contained
in topology tree. Collapsing is opposite operation, which hides
the view of topology elements.

Confidential and Proprietary Information of ZTE CORPORATION

101

NetNumenN31 Integrated Network Management Operation Manual

Expanding and Collapsing Topology


Map
Purpose

It is to expand the topology map as needed. Collapse is the


opposite operation.

Prerequisites

To expand and collapse topology map, meet the following


requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To expand and collapse topology map, perform the following


steps:
1. Right-click the topology map and from the pop-up menu
chooses to click Expand One Layer. Device information
under the NEs appears.
2. Choose to click Expand Deeply.
3. Select Collapse Deeply to go back to the initial state.
END OF STEPS

Expanding and Collapsing Node


Purpose
Prerequisites

It is to expand the NEs as needed. Collapse is the opposite


operation.
To expand and collapse NEs, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To expand and collapse NEs, perform the following steps:


1. Right-click the desired NE to expand and click to choose
Expand.
Note: Unlike the expansion on the topology map, node
expansion is for only the selected node.
2. Select Collapse to go back to the initial state.
END OF STEPS

Showing Statistical Information


Purpose
Prerequisites

To show statistical information related to particular group.


To show statistical information, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

102

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Steps

To show statistical information, perform the following steps:


1. There are two ways to show alarm messages, which are as
follows:
i.

Right-click a group name from the topology tree and click


to choose Show Statistical Info from the pop-up menu.

ii. Select Operation > Show Statistical Info.


Result: Following interface appears as shown in Figure 77.
FIGURE 77 STATISTICAL INFORMATION

2. Click OK button to close the dialog box.


END OF STEPS

Querying Alarm Messages


Purpose
Prerequisites

Operator can view alarm messages if alarm messages exist in


the system.
To show alarm messages, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To show alarm messages, perform the following steps:


1. Place the cursor on the NE whose alarm messages operator
wishes to view.
Result: Tool tip displays a pop up, displaying the alarm
messages. Operator can view the color of NE is changed in
case of some errors occur.
END OF STEPS

Going One Level Up


Purpose

In the topology map, this function takes the operator to one


level up in view tree.

Confidential and Proprietary Information of ZTE CORPORATION

103

NetNumenN31 Integrated Network Management Operation Manual

Prerequisites

To go one level up, meet the following requirements:


NetNumen N31 server and client must be started before
performing any operation.

Steps

To go one level up, perform the following steps:


1. Right-click the desired NE to expand and click to choose One
Level Up.
Result: Elements in the topology map go to one level up in
the hierarchy.
END OF STEPS

Auto Discovery Management


Overview
Introduction

Discover Configuration is a service executed in the background


helping to discover and configure the devices over the IP
network. Two device types are included: SNMP-supported and
IP-supported devices. In addition via SNMP, the specific type
and attributes of each device are identified so that the
warehousing of only desired nodes after being filtered becomes
available. Discover Configuration provides a very friendly manmachine interface, and this allows users to configure the
parameters easily and conveniently.

Configuring Basic Parameters


Purpose

Prerequisites

It is to configure the basic parameters of discovery configuration,


such as to enable discovery configuration and setting the
discovery interval.
To configure basic parameters, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To configure basic parameters, perform the following steps:


1. In the main menu, click Topo > Discover Configuration,
which displays Basic Parameters Setting interface as
shown in Figure 78. General TAB page displays the basic
parameter configuration.

104

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

FIGURE 78 BASIC P AR AMETERS SETTING

2. Click checkboxes displayed on interface shown in Figure 78


to enable the options. Read Table 18 as a reference.
TABLE 18 CONFIGURE BASIC P AR AMETERS

Parameters

Description

Input

Enable/Disable
Discovery

Any configuration item has


default value, it can disable
option.

Checkbox
is
unchecked

Any configuration item has


maximum and minimum value.
Rediscover
Discovered

It is used for existing nodes.


Possible values are true or false,
default value is true. If it is set
as false, node sweep-discovery
finding and fine-discovery found,
fine-discovery process disable
refund this node, otherwise finediscovery process finds it again.

Checkbox
is checked

Enable Raw
ICMP

It is used to visit RawSocket.


Possible values are true or false,
default value is true. It needs
system user right. Otherwise
ICMP protocol throws exception.

Checkbox
is checked

Enable/Disable
Sweep

Possible values are true or false,


default value is false.

Checkbox
is
unchecked

Enable/Disable
Prediscovery

Possible values are true or false,


default value is false.

Checkbox
is
unchecked

Confidential and Proprietary Information of ZTE CORPORATION

105

NetNumenN31 Integrated Network Management Operation Manual

Parameters

Description

Input

Enable/Disable
Local Net

Used to enable or disable local


network. Possible values are true
or false, default value is false.

Checkbox
is
unchecked

Discovery
interval
(minute)

The value can be greater than or


equal to 30 minutes, smaller
than 1 month and the default
value is 120 minutes.

120

Discovery
Thread

It is to set fine-discovery threads


number. The value can be
greater than or equal to 1,
smaller than 5 and the default
value is 2.

Higher is the thread number,


faster is the discovery speed.
To have a good performance, set
less value.

Note: Table 18 provides only a reference to operator; values


may vary according to environment deployed.
END OF STEPS

Configuring SNMP Protocol


Purpose

Prerequisites

Discover configuration needs to discover SNMP-supported nodes


by pinging them. SNMP parameters are to be configured on this
page.
To configure SNMP protocol, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To configure SNMP protocol, perform the following steps:


1. In the main menu, click Topo > Discover Configuration,
which displays Basic Parameters Setting interface as
shown in Figure 78.
2. Click SNMP TAB page to display SNMP Configuration
interface as shown in Figure 79.

106

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

FIGURE 79 SNMP CONFIGURATION

3. Read Table 19 as a reference to fill-in the parameter values.


TABLE 19 CONFIGURE SNMP P AR AMETERS

Parameters

Description

Input

SNMP Timeout

To set the SNMP response timeout


in seconds. The default value is 5
seconds.

SNMP Retries

To set the SNMP retries number.


The default value is 0.

SNMP Port

Specify the ports while trying to


communicate to the SNMP agents
on each node. Multiple ports can
be specified either as spaceseparated values or as a range of
values. Example: 161 8001-8005
9099, default value is 161.

161

SNMP Order

Specify the versions order while


trying to discovery SNMP nodes,
Possible values are v1, v2 or v3.
Multiple versions can be specified
either as space-separated values,
default versions order are v1 v2.

v2 v1

SNMP
Community

Specify the communities order


while trying to discovery SNMP
nodes. Multiple communities can
be specified either as spaceseparated values.

Public

Default community is public.

Confidential and Proprietary Information of ZTE CORPORATION

107

NetNumenN31 Integrated Network Management Operation Manual

Parameters

Description

Input

SNMP Write
Community

Specify the community while trying


to SNMP SET. Writeable
community can be specified only
one. Default value is private.

Private

SNMPV3

Specify the SNMP V3 parameters while trying to


discovery SNMP V3 nodes.

Note: Table 19 provides only a reference to operator; values


may vary according to environment deployed.
4. Fill in the parameters to add SNMPV3 users and click Add
button on left side.
Note: Operator can modify and delete the added SNMPV3
user as required.
END OF STEPS

Configuring Network
Purpose
Prerequisites

It is to configure parameters for the network.


To configure network, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To configure network, perform the following steps:


1. In the main menu, click Topo > Discover Configuration,
which displays Basic Parameters Setting interface as
shown in Figure 78.
2. Click Network TAB page to display SNMP Configuration
interface as shown in Figure 80.

108

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

FIGURE 80 NETWORK CONFIGURATION

3. Click Enable/Disable Discovery to enable/disable


Whole and Is Part radio button options.

IS

Note: Checking Enable/Disable Discovery enables both


options and operator can choose one of them.
Example: Choosing Is Whole option enables operator to
enter IP and Netmask while choosing Is Part enables
operator to enter Start IP and End IP parameters as well.
4. Click Add button after filling in the parameters.
Note: Operator can modify and delete the added network
configuration as required.
END OF STEPS

Configuring Node
Purpose
Prerequisites

This function configures node parameters.


To configure node parameters, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To configure node parameters, perform the following steps:


1. In the main menu, click Topo > Discover Configuration,
which displays Basic Parameters Setting interface as
shown in Figure 78.
2. Click Node TAB page to display Node Configuration
interface as shown in Figure 81.

Confidential and Proprietary Information of ZTE CORPORATION

109

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 81 NODE CONFIGURATION

3. Click Node IsDiscover checkbox to enable/disable.


4. Enter parameter values for Node IP and Node Netmask.
5. Click SNMP Version to choose from list of values. Choosing
v1 and v2c selects SNMP Port and SNMP Community by
itself while choosing v3 enables the operator to enter SNMP
Port, SNMP Community, SNMPV3 UserName and
SNMPV3 ContextName parameter values. Click Add button
to add node configuration.
Note: Operator can modify and delete the added node
configuration as required.
END OF STEPS

Configuring Filter
Purpose

Prerequisites

Discover Configuration can have the discovered nodes filtered


according to its defined filtering conditions, including filter-in and
filter-out.
To configure filter, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To configure filter, perform the following steps:


1. In the main menu, click Topo > Discover Configuration,
which displays Basic Parameters Setting interface as
shown in Figure 78.
2. Click Filter TAB page to display Filter Configuration
interface as shown in Figure 82.

110

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

FIGURE 82 FILTER CONFIGURATION

3. Click IsDiscover checkbox to enable/disable.


4. Click Filter Attribute to choose from list of values.
5. Enter Filter Content as chosen from Filter Attribute list of
values.
Note: Operator can modify and delete the added filter
configuration as required.
END OF STEPS

Polling Configuration
Overview
Introduction

It is used to make sure that the link is established or broken and


messages are sent from OMC to other nodes.

Adding Polling Configuration


Parameters
Purpose

This function configures the polling parameters. NEs can be


configured to ensure reliable link establishment. It shows a
message when links are broken at any time. All NEs can be
polled by adding polling configuration parameters.

Confidential and Proprietary Information of ZTE CORPORATION

111

NetNumenN31 Integrated Network Management Operation Manual

Prerequisites

To add polling configuration parameters, meet the following


parameters:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To add polling configuration parameters, perform the following


steps:
1. In the main menu, click Topo > Poll Configuration, which
displays Add Polling Parameter Setting interface as
shown in Figure 83.
FIGURE 83 CONFIGURE POLLING P AR AMETERS

2. Click Poll Enable checkbox to enable polling.


3. Fill in the parameters displayed on lower pane of the
interface and click Add button. Read Table 20 as a reference
to polling configuration parameters.
TABLE 20 POLLING CONFIGURATION P ARAMETERS

112

Parameters

Description

Input

ne type

Type of network element that


allows polling.

Null
setting
indicates all
types.
This
parameter is
set only when
the moc is
SnmpNode.

moc

Information model.

Moc of IN
devices is
SNMPNode.

interval
(minute)

Time interval between polling


of two NEs network elements
in unit of minutes.

retry

Provides polling retry time as


many times as entered in this
text box.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Parameters

Description

Input

threshold

If the number of failed


pollings reaches the alarm
threshold, an alarm is
reported to the alarm
module.

timeout (sec)

This is detection operation


timeout, in seconds.

usertester

Polling implementation class


corresponds to moc, which is
a fully restricted name of
implementation class.

Self-defined
implementation
class can be
set for
different moc.
If set as blank
it uses default
class.

useralarmer

Alarm generation class


corresponds to moc, which is
a fully restricted name of
implementation class.

Self-defined
implementation
class can be
set for
different mocs.
If set as blank
it uses default
class.

usergetter

Get polling object class


corresponding to moc, a fully
restricted name of
implementation class.

Self-defined
implementation
class can be
set for
different mocs.
If set as blank
it uses default
class.

usersetter

Polling object setting class


corresponds to moc, which is
a fully restricted name of
implementation class.

Self-defined
implementation
class can be
set for
different mocs.
If set as blank
it uses default
class.

Topic

Any important information related to the alarm,


which is to be sent.

extended
Snmp Node

Whether moc is extended


from the SnmpNode class of
the platform.

True/Falseot
mandatory.
The default
value is False.

Note: Table 20 provides only a reference to operator; values


may vary according to environment deployed.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

113

NetNumenN31 Integrated Network Management Operation Manual

Modifying Polling Configuration


Parameters
Purpose

This function allows an operator to modify polling configuration


parameters in case of any mistake or some other requirement.

Prerequisites

To modify polling configuration parameters, meet the following


parameters:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To modify polling
following steps:

configuration

parameters,

perform

the

1. In the main menu, click Topo > Poll Configuration, which


displays Add Polling Configuration Parameter interface
as shown in Figure 84.
FIGURE 84 ADD POLLING CONFIGURATION P AR AMETERS

2. Fill in the parameters displayed on lower pane of the


interface and click Modify button. Read Table 20 for
reference as explained earlier.
END OF STEPS

Deleting Polling Configuration


Parameters
Purpose

There are some unwanted polling configurations that need to be


deleted. This procedure describes how to delete provided roles.

Prerequisites

To delete polling configuration parameters, meet the following


parameters:
NetNumen N31 server and client must be started before
performing any operation.

114

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 3 Integrated Network Management System

Steps

To delete polling configuration parameters, perform the following


steps:
1. In the main menu, click Topo > Poll Configuration, which
displays Add Polling Parameter Setting interface as
shown in Figure 85.
FIGURE 85 CONFIGURE POLLING P AR AMETERS

2. Select polling record from the interface and click Delete


button.
3. Delete Confirm dialog box appears, click Yes button to
delete otherwise click No to cancel delete operation.
END OF STEPS

Updating Topology Data


Purpose
Prerequisites

Topology data can be updated by refreshing after making some


modifications.
To update topology data, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To update topology data roles, perform the following steps:


1. Click View > Topology Management from the main menu.
2. There are three ways to enter update topology data, which
are as follows:

In the main menu, click Operation > Refresh or press or


press <F4> key from KEYBOARD.

Right-click Role Management and click to choose Refresh.

Click

button from topology management toolbar.

END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

115

NetNumenN31 Integrated Network Management Operation Manual

Synchronizing Topology
Purpose

Prerequisites

It helps keeping topology data on the server consistent with


those on the collecting sources. Topology data is automatically
refreshed after the successful synchronization.
To synchronize topology, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To synchronize topology, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click
Topo
>
Synchronize
topology
to
open
Synchronization Confirm dialog box as shown in Figure 86.
FIGURE 86 SYNCHRONIZATION CONFIRM

3. Click OK button to confirm synchronization.


END OF STEPS

116

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Policy Management
Overview
Introduction

Contents

A policy comprises two parts: policy actions and policy


conditions. Policy actions are based on policy conditions. Policy
actions are the operations taken when the policy conditions are
satisfied. When creating a policy, choose the desired condition to
configure all attributes of the policy templates. Policy actions are
based on certain conditions.
This chapter includes the following topics:
TABLE TOPICS IN CHAPTER 4

Topic Title

Page No.

Overview

117

Creating Policy

117

Modifying Policy

121

Querying Policy

122

Deleting Policy

123

Executing Policy

124

Creating Policy
Purpose

Policy is a kind of predefined procedure in the network


management system, which specifies the performance of
network management system under specific conditions.
Policy is composed of policy condition and policy action. The
policy action is the operation performed when the selected policy
condition is satisfied. When creating policy, select required
condition template, action template, and assign values of all
attributes of policy template. At the same time it gives a name
to the policy and specifies the current state of policy.

Prerequisites

To create a policy, meet the following requirements:

Confidential and Proprietary Information of ZTE CORPORATION

117

NetNumenN31 Integrated Network Management Operation Manual

Steps

NetNumen N31 server and client must be started before


performing any operation.
Log into the system by referring to topic titled Logging into
NetNumen N31.

To create a policy, perform the following steps:


1. In main menu, click View > Policy Management.

In the main menu, click Operation > Create Policy.


Result: Create Policy dialog box appears as shown in
Figure 87.
Note: Creating a new policy requires the following three
steps:
f

Entering basic information

Entering condition templet parameters

Entering action templet parameters.

FIGURE 87 BASIC INFORMATION

Example: Table 21 provides description to creating policy


parameters. Fill in the parameters as follows:
TABLE 21 CREATE POLICY P AR AMETERS

Parameters

Description

Input

Policy name

It must be entered when new


policy is created. Policy name
must be unique.

Backup

Policy status

Operator needs to select from


one option from [Activate] and
[Suspend].

Activate

Activate option activates the


policy at an instant of time.
Suspend option stops the policy
from activation.
Policy condition

118

Operator needs to select one


option Condition Templet.

Confidential and Proprietary Information of ZTE CORPORATION

Condition
Templet

Chapter 4 Integrated Network Management System

Parameters

Description

Input

Policy action

Operator needs to select one


option from [Execute CLI
script file], [Backup and
Delete Log Policy],
[Database Backup Policy]
and [Alarm Backup and
Delete Policy].

Backup and
Delete Log
Policy

These options are obvious as


their name represents the task
to be performed as policy
action.

Note: Table 21 provides only a reference to operator; values


may vary according to environment deployed.
2. Click Next button to set policy period as shown in Figure 88
to fill-in condition templet parameters.
FIGURE 88 SPECIFY CONDITION TEMPLET

Note:
f

Specifying Execution Mode as Once executes the policy


at a specified time for once.
Specifying Period option sets Execution Mode of the
policy to perform an action at a particular time
periodically for example once a day. Operator can choose
Execution mode to specify policy execution time as
shown in Figure 89.
Click start instantly checkbox enables
execution at once at the specified time.

the

Confidential and Proprietary Information of ZTE CORPORATION

policy

119

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 89 SPECIFY CONDITION TEMPLET

3. Click Next button to specify CLI script file for execution.


FIGURE 90 SPECIFY ACTION TEMPLET

4. Click Select button and select location of CLI file.


5. Click Finish button after step 4 to create policy.
Note: Go back to previous step by clicking Back button.
END OF STEPS

120

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Integrated Network Management System

Modifying Policy
Purpose

Prerequisites

Policies can be modified whenever needed depending upon the


mistakes or any other new requirements. Operator can modify
the status of certain policy by activating or suspending it.
To modify a policy, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Only an authorized operator can modify policy.

To modify a policy, perform the following steps:


1. In main menu, click View > Policy Management.
2. Click policy name from right pane
3. There are two ways to perform enter modify operation, which
are as follows:

In the main menu, click Operation > Modify.


Right-click policy name and click Modify, which displays
Modify Policy Details interface as shown in Figure 91.
FIGURE 91 MODIFY POLICY DETAILS

Note: Operator can modify policy status by clicking Policy


status list of values.
4. Click Next button to modify execution period of certain
policy, which displays Modify Policy Period interface as
shown in Figure 92.

Confidential and Proprietary Information of ZTE CORPORATION

121

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 92 MODIFY POLICY PERIOD

5. Click to choose Execute Mode.


6. Click a particular option from Period Customize frame.
Example: Operators has options to select period from [Once
a day], [Once a week], [Once a month], [Once a year]
and [Others] radio buttons.
f

Click Others radio button and select date by clicking


Start from list of values and enter Day(s), Hour(s),
Minute(s), Second(s).

7. Click Next button after modifying values to save and submit


the information.
Note: While modifying the policy, policy condition template
attribute, or a policy action template attribute operator must
pay attention to the validity of the attribute values;
otherwise, a warning dialog box appears.
END OF STEPS

Querying Policy
Purpose

Prerequisites

To search for a particular policy from a large number of policy


lists, it is necessary to have some query procedure. This
procedure provides steps to search for a particular policy.
To search for a policy, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To search for a particular policy, perform the following steps:


1. In main menu, click View > Policy Management.

122

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 4 Integrated Network Management System

2. There are two ways to perform query operation, which are as


follows:

In the main menu, click Find > Find Policy.


Right-click Policy List and click Find, which displays Find
Policy interface as shown in Figure 93.
FIGURE 93 FIND POLICY

3. Enter policy name to search in Policy name text box and


click Find button from Figure 93.
Note: Enable case
Sensitive checkbox.

sensitive

option

by

clicking

Case

END OF STEPS

Deleting Policy
Purpose
Prerequisites

There are some unwanted policies that need to be deleted due


to some reasons.
To delete a policy, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must be authorized to perform delete operation.

To delete a policy, perform the following steps:


1. Click View > Policy Management from the main menu.
2. Click policy name from right pane.
3. There are two ways to delete a particular operator, which are
as follows:

In the main menu, click Operation > Delete.

Right-click department name and click Delete.

4. Delete Confirm dialog box appears, click Yes button to


delete otherwise click No to cancel delete operation.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

123

NetNumenN31 Integrated Network Management Operation Manual

Executing Policy
Purpose

Prerequisites

Some policies need to be executed instantly as required.


Therefore this topic provides steps to execute a policy at some
time.
To executer an instant policy, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must be authorized to perform execute operation.

To execute a policy, perform the following steps:


1. Click View > Policy Management from the main menu.
2. Click policy name from right pane.
3. There are two ways to excute a particular policy, which are
as follows:

In the main menu, click Operation > Execure instantly.

Right-click role set name and click Execure instantly.


Result: Execute Confirm dialog box appears.

4. Click Yes button to execute otherwise click No to cancel the


operation.
END OF STEPS

124

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Log Management
Overview
Introduction

Log Management has two functions:

Log recording,

Log management.

In terms of contents, logs fall into 3 categories:

Operation logs,

Security logs,

System logs.

Log management enables log query, deletion, backup, details


browsing, log filtering condition setting & viewing.
Contents

This chapter includes the following topics:


TABLE TOPICS IN CHAPTER 5

Topic Title

Page No.

Overview

125

Querying Logs
Overview

126

Querying Operation Logs by Condition

126

Querying Security Logs by Condition

129

Querying System Logs by Condition

130

Querying All Logs

132

Sorting Log Records

133

Maintaining Logs
Overview

134

Exporting Log Records

134

Printing Log Records

135

Deleting Logs

135

Confidential and Proprietary Information of ZTE CORPORATION

125

NetNumenN31 Integrated Network Management Operation Manual

Querying Logs
Overview
This module provides operational steps to query operation,
security and system logs by specifying conditions. It also
includes querying all logs without specifying any condition.

Querying Operation Logs by


Condition
Purpose

Prerequisites

To search for a particular log record from a large number of


records, it is necessary to have some query procedure. This
allows operators to view operation logs by operator name, time
range, and connection mode.
To query operation logs, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Log into the system by referring to topic titled Logging into
NetNumen N31.

To query operation logs, perform the following steps:


1. In the main menu, click View > Log Management.
2. Click Browse > Query Current Log to open Query
Operation Log interface as shown in Figure 94.

126

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 5 Integrated Network Management System

FIGURE 94 QUERY OPERATION LOG

Example: Fill in the parameters from Query Operation Log


interface as explained in Table 22.
TABLE 22 QUERY OPERATION LOG P AR AMETERS

Parameters

Description

Input

User name

Operator needs to select a user


which is authorized to operate the
system.

Admin

Operation
result

It provides different options such


as Successful operation, Failed
operation and Unfinished
operation. Select one option.

Successful
operation

Selecting All option displays logs


of all operations including
successful, failed and unfinished
operation.
Operation
set

It allows to select All operation set or operator


can customize by clicking Select button on right.
In customize option; operation can select multiple
operation sets for example topology
management, log management, security
management.
Selecting All option displays operations logs
related to all operation sets.

Command
function

It provides different query options to be executed


at the time of query. It is disabled, and operation
cannot enter this value.

Confidential and Proprietary Information of ZTE CORPORATION

127

NetNumenN31 Integrated Network Management Operation Manual

Parameters

Description

Operation
resource

It allows an operator to select All


operation set. Choosing
Customized resource enables
the Select button.

Input

Click Select button on right to


select customized resource.
In customize option; click
checkbox to select desired option.

Server

From

It provides operation start time.


Time is enabled by selecting The
first event on right.

2006-9-17
9:53:14

To

It provides operation start time. It


is enabled by selecting The last
event on right.

2006-9-18
9:53:14

Connection
mode

It is the mode in which operator


logs onto the system. Select one
option from [GUI], [TELNET],
[NDF], [CORBA], [WEB] and
[SNMP].

TELNET

Selecting All option displays


operations logs related to all
connection modes.
Rank

Operations are classified as in


terms of importance. Select an
option from [VERY IMPORTANT],
[IMPORTANT], [NOTICE],
[NORMAL]

IMPORTANT

Selecting All option displays


operations logs related to all
ranks.
Description

Any information related to these parameters.

Note: Table 22 provides only a reference to operator; values


may vary according to environment deployed.
3. Click OK to save parameters and view Operation Log
Result as shown in Figure 95.
FIGURE 95 OPERATION LOGS RESULT

END OF STEPS

128

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 5 Integrated Network Management System

Querying Security Logs by Condition


Purpose

Prerequisites

To search for a particular log record from a large number of


records, it is necessary to have some query procedure. This
allows operators to view security logs by operator name, log
name, time range, and connection mode.
To query security logs, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To query security logs, perform the following steps:


1. In the main menu, click View > Log Management.
2. Click Browse > Query Current Log to open Query
Operation Log interface as shown in Figure 96.
FIGURE 96 QUERY SECURITY LOG

Example: Fill in the parameters from Query Security Log


interface as explained in Table 23.
TABLE 23 QUERY SECURITY LOG P AR AMETERS

Parameters

Description

Input

User name

Operator needs to select an


operator which is authorized to
operate the system.

Admin

It provides different options for


example All, logged in successfully
and logout.

All

Log name

Selecting All option displays logs


of all operations including logged in
successfully and logout.

Confidential and Proprietary Information of ZTE CORPORATION

129

NetNumenN31 Integrated Network Management Operation Manual

Parameters

Description

Input

Connection
mode

It is the mode in which operator


logs onto the system. Select one
option from [GUI], [TELNET],
[NDF], [CORBA], [WEB] and
[SNMP].

TELNET

Selecting All option displays


operations logs related to all
connection modes.
From

It provides operation start time.


Time is enabled by selecting
Operation Start Time on right.

2006-9-17
9:53:14

To

It provides operation start time. It


is enabled by selecting Operation
End Time on right.

2006-9-18
9:53:14

Description

Any information related to these parameters.

Note: Table 23 provides only a reference to operator; values


may vary according to environment deployed.
3. Click OK to save parameters and view Security Log Result
as shown in Figure 97.
FIGURE 97 SECURITY LOG RESULT

END OF STEPS

Querying System Logs by Condition


Purpose

Prerequisites

To search for a particular log record from a large number of


records, it is necessary to have some query procedure. This
allows operators to view query logs by rank, log name, source
and time range.
To query system logs, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To query system logs, perform the following steps:


1. In the main menu, click View > Log Management.
2. Click Browse > Query Current Log to open Query
Operation Log interface as shown in Figure 98.

130

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 5 Integrated Network Management System

FIGURE 98 QUERY SYSTEM LOG

Example: Fill in the parameters from Query System Log


interface as explained in Table 24.
TABLE 24 QUERY SYSTEM LOG P AR AMETERS

Parameters

Description

Input

Rank

Operations are classified as in


terms of importance. Select an
option from [VERY IMPORTANT],
[IMPORTANT], [NOTICE],
[NORMAL]

IMPORTANT

Selecting All option displays


operations logs related to all
ranks.
Log name

It provides different options for


example All, logged in successfully
and logout.

All

Selecting All option displays logs


of all operations including logged
in successfully and logout.
Source

It provides log results related to


different operation sources. Select
one option from [Fault
Management], [Log Management]
and [PM].

Log
Management

Selecting All option displays


operations logs related to all
sources.
From

It provides operation start time.


Time is enabled by selecting
Operation Start Time on right.

2006-9-17
9:53:14

To

It provides operation start time. It


is enabled by selecting Operation
End Time on right.

2006-9-18
9:53:14

Confidential and Proprietary Information of ZTE CORPORATION

131

NetNumenN31 Integrated Network Management Operation Manual

Parameters

Description

Input

Description

Any information related to these parameters.

Note: Table 24 provides only a reference to operator; values


may vary according to environment deployed.
3. Click OK to save parameters and view System Log Result
as shown in Figure 99.
FIGURE 99 SYSTEM LOGS RESULT

END OF STEPS

Querying All Logs


Purpose

Prerequisites

To search for all logs, this procedure provides certain steps. This
procedure does not need to specify conditions. It shows all the
logs existing in the system.
To query all logs, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To query all logs, perform the following steps:


1. In the main menu, click View > Log Management.
2. Right-click Operation Log and click to choose Query All
Operation Logs to open All Operation Logs interface as
shown in Figure 100.
FIGURE 100 ALL OPERATION LOGS

Note: Operator can view all security and system logs by


performing operations in the similar way.
132

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 5 Integrated Network Management System

END OF STEPS

Sorting Log Records


Purpose

Prerequisites

While browsing the log records, operator can have them sorted
in ascending or descending order with reference to specific field
or fields.
To sort log records, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To sort log records, perform the following steps:


1. In the log record list click a field. On left side of field name,
the ascending or descending marks (
respectively) appear as shown in Figure 101.

and

FIGURE 101 SORTED LOG RECORDS IN DESCENDING ORDER (ONE


COLUMN)

2. Combined column sorting is also supported, that is, users


can have the log records sorted firstly in descending order by
one column and then by column B, as shown in Figure 102.
FIGURE 102 COMBINED COLUMN SORTING

END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

133

NetNumenN31 Integrated Network Management Operation Manual

Maintaining Logs
Overview
This module provides operational steps for exporting, printing
and deleted unwanted logs.

Exporting Log Records


Purpose
Prerequisites

Logs are saved for viewing in future. These logs can be exported
to file excel, xml, pdf, txt and cvs formats.
To export log records, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To export log records, perform the following steps:


1. In the main menu, click View > Log Management.
2. Click Option > Export Current Found Result Log to open
Export Logs interface as shown in Figure 103.
FIGURE 103 EXPORT LOGS

3. Select file type and enter file name in the above interface,
and click OK button.
Note: Operator can select any path for the file to be
exported.
END OF STEPS

134

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 5 Integrated Network Management System

Printing Log Records


Purpose
Prerequisites

Logs can be printed for viewing in future.


To print log records, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To export log records, perform the following steps:


1. In the main menu, click View > Log Management.
2. Click Option > Print Current Found Result to open Print
Logs interface as shown in Figure 104.
FIGURE 104 PRINT LOGS

3. Select Print range, Copies and click Print button to start


printing.
END OF STEPS

Deleting Logs
Purpose

Prerequisites

There are some unwanted logs that need to be deleted due to


some reasons. Operator can delete all records of current logs,
found logs and selected records of current logs. Operator can
delete operation logs, security logs, and system logs by
performing these operations in the similar way.
To delete logs, meet the following requirements:

Confidential and Proprietary Information of ZTE CORPORATION

135

NetNumenN31 Integrated Network Management Operation Manual

Steps

NetNumen N31 server and client must be started before


performing any operation.

Operator must be authorized to perform delete operation.

Perform query log operations to display list of logs.

To delete all current logs, select records displayed after


performing query operations and perform following steps:
1. Click Delete > Delete All Records of Current Log.
2. Delete Confirm dialog box appears, click Yes button to
delete otherwise click No to cancel delete operation.
To delete found records, select records displayed
performing query operations and perform following steps:

after

1. Click Delete > Delete All Current Found Result.


2. Delete Confirm dialog box appears, click Yes button to
delete otherwise click No to cancel delete operation.
To delete selected records of current logs, follow steps from the
topic titled Querying Logs and perform following steps.
1. Select desired records to delete from the list displayed.
2. Click Delete > Delete Selected Records of Current Log.
3. Delete Confirm dialog box appears, click Yes button to
delete otherwise click No to cancel delete operation.
END OF STEPS

136

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

System Management
Overview
Introduction

System management is responsible for managing the application


server and database for example viewing application server
performance and monitoring the database server performance.
This also includes daily maintenance tasks.
The managing person needs to supervise and control the actual
movement circumstance of system, adjusting the application
server, ensuring the best system performance. The system
management provides the managing person to support and
manage the system for running all the applications.

Contents

This chapter includes the following topics:


TABLE TOPICS IN CHAPTER 6

Topic Title

Page No.

Overview

137

Maintaining Application Server


Overview

138

Saving Position Information

139

Showing Device Information

139

Viewing Application Server Performance

140

Configuring Performance Monitoring Parameters

141

Viewing NetNumen Version

142

Viewing Directory Information

143

Adding Directory Monitoring Task Information

144

Maintaining Database Server


Overview

146

Logging out of Database

147

Checking Database Resources

147

Confidential and Proprietary Information of ZTE CORPORATION

137

NetNumenN31 Integrated Network Management Operation Manual

Topic Title

Page No.

Configuring the Monitoring Parameters

149

Operating Table Collection

150

Maintaining Application
Server
Overview
This module provides operational steps for maintaining
application server. It includes operations such as refreshing the
system management view, saving position information, showing
device information, viewing application server performance,
configuring performance monitoring parameters, viewing
NetNumen version number, viewing directory information, and
adding directory monitoring task.

Refreshing the System Management


View
Purpose

This function allows the operator to keep the displayed devices


and their physical location information on the client consistent
with the server. It refreshes the position of devices existing in
the system management tree.

Prerequisites

To refresh the system management view, meet the following


requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Log into the system by referring to topic titled Logging into
NetNumen N31.

To refresh the system management view, perform the following


steps:
1. In the main menu, click View > System Management.
2. Click System Management > Refresh.
END OF STEPS

138

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 6 Integrated Network Management System

Saving Position Information


Purpose

Prerequisites

This function saves the new position information of the device to


the server when an IP device has been moved; otherwise the
device moves back to the original position after refreshing.
To save position information, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To save position information, perform the following steps:


1. In the main menu, click View > System Management.
2. Click Operation > Save Device Position.
END OF STEPS

Showing Device Information


Purpose

This function shows details of a device, such as device name,


host and device type.

Prerequisites

To show device in information, meet the following requirements:


NetNumen N31 server and client must be started before
performing any operation.

Steps

To show device information, perform the following steps:


1. In the main menu, click View > System Management.
2. Click Operation > Show Device Information, which
displays Device Information interface as shown in Figure
105.
FIGURE 105 DEVICE INFORM ATION

3. Click OK button to close the dialog box.


END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

139

NetNumenN31 Integrated Network Management Operation Manual

Viewing Application Server


Performance
Purpose

To view the application server performance and memory utilized


by the system. It also shows the CPU usage by the system.

Prerequisites

To view application server performance, meet the following


requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view application server, perform the following steps:


1. In the main menu, click View > System Management.
2. Click Application Server > Server Performance to open
View Server Performance interface as shown in Figure 106.
FIGURE 106 VIEW APPLICATION SERVER PERFORM ANCE

END OF STEPS

140

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 6 Integrated Network Management System

Configuring Performance Monitoring


Parameters
Purpose

Performance can be monitored on the basis of certain


parameters. These parameters set the threshold of the
parameters in that once usage exceeds the threshold, the
system gives the alarm. Operator can specify RAM, CPU and HD
usage as well as free space.

1Prerequisites

To configure performance monitoring parameters, meet the


following parameters:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To configure performance monitoring parameters, perform the


following steps:
1. In the main menu, click View > System Management.
2. Click Application Server > Performance monitoring
setup to open Configure Server Performance interface as
shown in Figure 107.
FIGURE 107 CONFIGURE SERVER PERFORM ANCE

3. Click Monitor flag radio button to enable all options.


4. Increase CPU and RAM usage by clicking and dragging the
pointer towards right.
5. Increase HD usage by clicking and dragging the pointer
towards right.
6. Enter numeric value in free space is less than size text
box.

Confidential and Proprietary Information of ZTE CORPORATION

141

NetNumenN31 Integrated Network Management Operation Manual

7. Enter numeric value in Log Table space is greater than


text box and click Save to save configuration and close
dialog box.
END OF STEPS

Viewing NetNumen Version Number


Purpose

Prerequisites

This function provides version information of all systems and


interfaces incorporated into the NetNumen Network Management
System.
To check system version, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To check system version, perform the following steps:


1. In the main menu, click View > System Management.
2. Click ApplicationServer > Version, which displays Version
Information interface as shown in Figure 108.
FIGURE 108 VERSION INFORM ATION

3. Click Close button to close the dialog box.


END OF STEPS

142

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 6 Integrated Network Management System

Viewing Directory Information


Purpose

Prerequisites

This function allows operators to monitor application server's


directory capacity, specifically, to clear the dynamic files
periodically in order to ensure proper use of the server's hard
disk space. Directories can be viewed to know some information.
To view directory information, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view directory information, perform the following steps:


1. In the main menu, click View > System Management.
2. Click Application Server > Directory monitoring setup
to open Directory Monitoring interface as shown in Figure
109.
FIGURE 109 DIRECTORY MONITORING

Note: There are two directories displayed in the above


interface as shown in Figure 109.
3. Double-click task name from the list to view task details as
shown in Figure 110.

Confidential and Proprietary Information of ZTE CORPORATION

143

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 110 DIRECTORY MONITORING TASK DETAILS

4. Click TAB pages to view other details.


5. Click Exit button to close dialog box.
END OF STEPS

Adding Directory Monitoring Task


Information
Purpose

This procedure allows operators to add application server's


directory capacity and cleanup policy, in order to ensure proper
use of the server's hard disk space.

Prerequisites

To add directory monitoring task information, meet the following


requirement:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must have rights to perform add operations.

To add directory monitoring task information, perform the


following steps:
1. In the main menu, click View > System Management.
2. Right-click a directory task from right pane and choose Add
to open Add Directory Monitoring Task Information as
shown in Figure 111.

144

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 6 Integrated Network Management System

FIGURE 111 DIRECTORY MONITORING TASK INFORM ATION

3. Enter task name in Task name text box.


4. Enter directory name by clicking Choose button on right,
enter file type, threshold in the specified text boxes.
5. Enter Clearup Setup details by specifying time and size.
6. Click Period information TAB page, which is shown as
Figure 112.
FIGURE 112 PERIOD INFORM ATION

7. Specify interval and duration, click OK button to save values


and close dialog box.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

145

NetNumenN31 Integrated Network Management Operation Manual

Maintaining Database Server


Overview
This module is related to database server. It provides logging
into/out of the database, checking database resources,
configuring monitoring parameters and operating table collection
operations.

Logging into Database


Purpose
Prerequisites

To log onto a particular database.


To log onto a database, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.

Operator must have logged into the system.

Operator must have rights to log into the database.

To log onto database, perform the following steps:


1. In the main menu, click View > System Management.
2. Click Database Server > Database Login to open
Database Login interface as shown in Figure 113.
FIGURE 113 DAT AB ASE LOGIN

3. Enter User name, Password and click OK button to log into


the system.
Note:
Password is privacy protected. If errors occur during login,
select the entered password and press DEL key to delete the
wrong password.

146

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 6 Integrated Network Management System

END OF STEPS

Logging out of Database


Purpose
Prerequisites

To log out of the database.


To log out of the database, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must have logged onto the system.

To log out of the database, perform the following steps:


1. In the main menu, click View > System Management.
2. Click Database Server > Database Logout.
END OF STEPS

Checking Database Resources


Purpose

Prerequisites

To view database information regarding database name,


database size, unassigned size, reserved size, data size, index
size, unused size and left percent tables information. Operator
can also see process information contained in the database.
To check database resources, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.

Operator must have logged onto the system.

Operator must have rights to log onto the database.

To check database resources, perform the following steps:


1. In the main menu, click View > System Management.
2. Click Database Server > View Database Resources(X)
to open View Database Resources Details interface as
shown in Figure 114.

Confidential and Proprietary Information of ZTE CORPORATION

147

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 114 VIEW DAT AB ASE RESOURCES DETAILS

3. Change page by clicking Table Information TAB page on


top, which displays Table Name, Record No., Reserved Size,
Data Size, Index Size and Unused Size columns as shown in
Figure 115.
FIGURE 115 TABLE INFORM ATION

4. Change page by clicking Process Information TAB page on


top, which displays process ID, User, Database, Status, Host,
Program and Login Time columns as shown in Figure 116.

148

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 6 Integrated Network Management System

FIGURE 116 PROCESS INFORM ATION

5. Click OK button to close the window.


END OF STEPS

Configuring the Monitoring


Parameters
Purpose

Prerequisites

This function is used to monitor the hard disk space used by the
database. It sets hard disk space for maximum limit and alarms
when certain threshold is reached.
To monitor database, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.

Operator must have logged onto the system.

Operator must have rights to log onto the database.

To monitor database, perform the following steps:


1. In the main menu, click View > System Management.
2. Click Database Server > Database Monitoring Setup to
open Monitor Database Details interface as shown in
Figure 117.

Confidential and Proprietary Information of ZTE CORPORATION

149

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 117 MONITOR DATAB ASE DETAILS

3. Enable Database monitoring setup(F) by clicking radio


button.
4. Increase monitoring period by clicking and dragging pointer
towards right.
5. Enter a numeric value in If HD usage exceeds text box to
specify maximum usage of hard disk drive.
6. In the table, specify free space type by clicking Type list of
values from [NO], [Absolute], and [Percentage].
Specifying absolute lets an operator enter a numeral while
specifying percentage lets an operator enter percentage of
free space.
7. Double-click Threshold column
representing database free space.

and

enter

numeral

8. Specify alarm level by clicking Alarm level list of values


from [Critical], [Major], [Minor], and [Warning].
9. Click Save button to save and close dialog box.
END OF STEPS

Operating Table Collection


Purpose

Prerequisites

150

Table collection is the collection of several tables. Operator can


define multiple tables correlated in one table collection. When an
operation on a certain table collection is performed it is
performed over all the tables. For example backup and delete
logs are maintained in LOG_CMD_TABLE, LOF_SYS_TABLE and
LOG_SCRT_TABLE.
To operate table collection, meet the following requirements:

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 6 Integrated Network Management System

Steps

NetNumen N31 server and client must be started before


performing any operation.

Operator must have logged onto the system.

Operator must have logged onto the database server.

To operate table collection, perform the following steps:


1. Click Database Server > Table Collection Operations
from the main menu, which displays Table Collection
Operations interface as shown in Figure 118.
FIGURE 118 TABLE COLLECTION OPERATIONS

2. Right-click the blank space and click to choose Add from pop
up menu to add table collection information, which displays
an interface shown in Figure 119.
FIGURE 119 BASIC INFORMATION

3. Operator can see Basic Information, Operation and


Periodic TAB pages displayed in Figure 119. Perform the
operations as follows:
i.

Select particular table.

Confidential and Proprietary Information of ZTE CORPORATION

151

NetNumenN31 Integrated Network Management Operation Manual

ii. Enter task name in Operation TAB page, click to choose


from Action checkboxes as shown in Figure 120.
FIGURE 120 OPERATION

iii. Click to choose from Store type radio button options,


and click Choose button to enter storage path.
iv. Fill in export parameters to enter filter conditions. Select
filter time from Time Filter list of values, and enter
ATime, BTime and CTime parameter values depending
upon the requirements.
v. Click Periodic TAB page to choose interval type and
duration as shown in Figure 121.

152

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 6 Integrated Network Management System

FIGURE 121 PERIOD

vi. Enter interval type and duration on Periodic TAB page.


Note: In duration, operator can choose finish time and task
repeat time.
4. Click OK button to save settings and close the interface.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

153

NetNumenN31 Integrated Network Management Operation Manual

This page is intentionally blank.

154

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Fault Management
Overview
Introduction

Fault management is a function group that manages the faults


occurring during system operation on various network devices
managed by the NetNumen N31 system. All faults managed by
the function group are called alarms.
Alarms in fault management fall into two categories:

Device alarms
Background
alarms

Device alarms

Background alarms

These are the alarms generated by network devices.


These alarms refer to the system alarms created when preset
operating parameter thresholds are reached, such as
performance alarms and system management alarms. Fault
management helps to monitor and manage events and
notifications in the network.
Via fault management, faults and events over the network can
be supervised and managed centrally. Users can monitor the
alarms over the network in a real-time manner and whenever
needed. It can also filter unimportant events according to certain
conditions. Alarms are presented in the form of sounds and
lights the network operating personnel. When an alarm is
generated, operators are able to acknowledge/unacknowledged,
clear, notify it to related persons via emails or SMS. Operators
can also view alarm details and other related events.

Contents

This chapter includes the following topics:


TABLE TOPICS IN CHAPTER 7

Topic Title

Page No.

Overview

155

Monitoring in
Overview

157

Confidential and Proprietary Information of ZTE CORPORATION

155

NetNumenN31 Integrated Network Management Operation Manual

Topic Title

Page No.

Monitoring Real-time Current Alarms

157

Monitoring Real-time History Alarms

159

Monitoring Real-time Notification

160

Monitoring Real-time Event

162

Synchronizing Alarms

163

Querying Alarms
Overview

165

Querying Current Alarms

165

Querying Historical Alarms

169

Querying Notifications

172

Querying Events

175

Alarm Statistics Report Template


Overview

178

Viewing Average Period Statistics by Alarm Severity

178

Viewing Average Frequency Statistics by Alarm


Severity

182

Alarm Rule Management


Overview

186

Adding Management Rule

186

Editing Management Rule

190

Deleting Management Rule

191

Enabling Management Rule

191

Disabling Management Rule

192

Alarm Maintenance Suggestions


Overview

192

Adding Maintenance Suggestions

193

Editing Maintenance Suggestions

194

Deleting Maintenance Suggestions

195

Importing Maintenance Suggestions

196

Exporting Maintenance Suggestions

197

Severity and Color Settings

156

Overview

198

Setting Severity Conditions

198

Setting Sound and Colors

199

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

Monitoring in Real-time
Overview
This module provides operational steps for monitoring real-time
current and history alarms, notifications, and events.

Monitoring Real-time Current Alarms


Purpose

In Real-time Alarm interface, system alarms can be monitored in


a real-time manner.
NetNumen N31 system supports monitoring of current system
alarm status to provide information regarding network operating
status. It reports faults by alarms early as possible once a
problem occurs in the system. Real-time alarm monitoring
reflects that the alarms are not handled in the system in real
time.

Prerequisites

To monitor real-time alarm, meet the following requirements:


NetNumen N31 server and client must be started before
performing any operation.

Steps

To monitor real-time alarm, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click Query > Real-time Alarm Monitor which displays
Real-time Alarm Monitoring interface on right as shown in
Figure 122.
FIGURE 122 REAL-TIME ALARM MONITORING

Note:
i.

Upper part shows the real-time current alarms that have


been set earlier.

ii. View alarm details by right-clicking the particular alarm


record.
iii. Lower part shows real-time historical alarms.

Confidential and Proprietary Information of ZTE CORPORATION

157

NetNumenN31 Integrated Network Management Operation Manual

3. Right-click the particular alarm and click Details to display


Alarm Details interface as shown in Figure 123.
FIGURE 123 ALARM DETAILS

Note:
i.

Click Acknowledge button to send an acknowledgement


to network operating personnel in case the fault has been
solved.

ii. Click Clear(E) button in case the error is solved. This


function clears the alarm from the system.
iii. Click Forward button to send it to the concerned
network operator.
Table 25 shows descriptions of the buttons displayed on the
interface shown in Figure 124.
FIGURE 124 REAL-TIME ALARM MONITOR TOOLBAR

T AB L E 2 5 B UT T O N S F O R AL AR M M O N I T O RI N G

Interface Element
Count button
Customize
Columns button

158

Description
Is used to count all the current alarms and make
statistics of alarms of all levels.
Is used to customize the alarm display columns.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

Interface Element

Description

Export button

Is used to export all data of the current alarms


into a file.

Print button

Is used to print all data of the current alarms.

Alarm Sound
Setup button

Full Screen
Lock Table
button

This button provides error differentiation as the


errors can be of [Critical], [Major], [Minor] or
[Warning]. Operator can choose from [None],
[Continuous sound] and [Short beeps].
Is used to enable full screen view to show alarm
information.
Is used to lock the table.

END OF STEPS

Monitoring Real-time History Alarms


Purpose

Prerequisites

In Real-time Alarm interface, system alarms can be monitored in


a real-time manner. This interface shows history of previous
alarms that have been handled and cleared already.
To monitor real-time
requirements:

history

alarms,

meet

the

following

NetNumen N31 server and client must be started before


performing any operation.
Steps

To monitor real-time history alarms, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click Query > Real-time Alarm Monitor which displays
Real-time History Alarm Monitoring interface on lower
right pane as shown in Figure 125.
FIGURE 125 REAL-TIME HISTORY AL ARM MONITORING

Note:
i.

View alarm details by right-clicking the particular alarm


record.

ii. Lower part shows real-time history alarms.

Confidential and Proprietary Information of ZTE CORPORATION

159

NetNumenN31 Integrated Network Management Operation Manual

iii. No records are displayed in case if there are no history


alarms.
3. Right-click the particular alarm and click View details to
display Alarm Details interface.
Note: Use the following options whenever needed.
i.

Click Next button to view other real-time alarm details.

ii. Click Acknowledge button to send an acknowledgement


to network operating personnel in case the fault has been
solved.
iii. Click Clear(E) button in case the error is solved. This
function clears the alarm from the system.
iv. Click Forward button to send it to the concerned
network operator.
Table 26 shows descriptions of the buttons displayed on the
interface shown in Figure 124.
FIGURE 126 REAL-TIME ALARM MONITOR TOOLBAR

TABLE 26 BUTTONS FOR HISTORY AL ARM MONITORING

Interface Element

Description
Is used to count all the history alarms and make
statistics of alarms of all levels.

Count button
Customize
Columns button

Is used to customize the alarm display columns.

Export button

Is used to export all data of the history alarms


into a file.

Print button

Is used to print all data of the history alarms.

Remove
data button

all

Lock Table
button

This button removes all data existed for the


history alarms.
Is used to lock the table.

END OF STEPS

Monitoring Real-time Notification


Purpose

160

System allows operator to monitor the notifications so that


network's operating conditions can be learnt timely. In real-time

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

notification interface, problems to be handled of system devices


during their running will be presented in a real-time manner.
Prerequisites

To monitor real-time
requirements:

notification,

meet

the

following

NetNumen N31 server and client must be started before


performing any operation.
Steps

To monitor real-time notifications, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click Query > Real-time Notification Monitor which
displays Real-time Notification Monitoring interface on
right as shown in Figure 127.
FIGURE 127 QUERY CONDITION SETTING

Note:
i.

Upper part shows the real-time notifications that have


been set earlier.

ii. View notification details by right-clicking the particular


notification record.
FIGURE 128 REAL-TIME NOTIFICATION MONITORING TOOLBAR

Table 27 shows descriptions of the buttons displayed on the


interface shown in Figure 128.
TABLE 27 BUTTONS FOR NOTIFICATION MONITORING

Interface Element
Count button
Customize
Columns button

Description
Is used to count all the current notifications and
make statistics of notifications of all levels.
Is used to customize the notification display
columns.

Confidential and Proprietary Information of ZTE CORPORATION

161

NetNumenN31 Integrated Network Management Operation Manual

Interface Element

Description

Export button

Is used to export all notification data into a file.

Print button

Is used to print all data of the current notification.

Remove
Data button
Lock

All

Table

button

This button removes all data existed for the


current notifications.
Is used to lock the table.

END OF STEPS

Monitoring Real-time Event


Purpose

Prerequisites

System allows operator to monitor the events so that network's


operating conditions can be learnt timely. In real-time event
interface operating conditions of system devices will be
presented in a real-time manner.
To monitor real-time event, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To monitor real-time event, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click Query > Real-time Event Monitor which displays
Real-time Event Monitoring interface on right as shown in
Figure 129.
FIGURE 129 REAL-TIME EVENT MONITORING

FIGURE 130 EVENT MONITORING TOOLBAR

TABLE 28 BUTTONS FOR EVENT MONITORING

Interface Element
Count button
Customize
Columns button

162

Description
Is used to count all the events and make event
statistics of all levels.
Is used to customize the event display columns.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

Interface Element

Description

Export button

Is used to export all event information into a file.

Print button

Is used to print all events information.

Remove
Data button
Lock
button

All

Table

This button removes all data existed for the


current events.
Is used to lock the table.

END OF STEPS

Synchronizing Alarms
Purpose

Alarm Synchronization synchronizes the alarms with the system.


Operators can specify the position information of NEs to be
synchronized.
When operators find that the UMS's alarm data is not consistent
with those on the network devices, use this function to let
alarms synchronize with systems.

Prerequisites

To synchronize alarms, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
NE must be added in topology management, refer to topic
titled.

To synchronize alarms, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click Query > Alarm Synchronization, which displays
Alarm Synchronization interface as shown in Figure 131.

Confidential and Proprietary Information of ZTE CORPORATION

163

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 131 AL ARM SYNCHRONIZATION

3. Click checkboxes to select from left pane, and click


corresponding radio button options on right pane, to specify
the conditions.
Example: Read this example as a reference.
f

Click System Type checkbox, which displays radio


options as radio buttons.
Click the desired radio button to select the parameter for
example EPM.

4. Select location checkbox on left pane and choose location on


right pane as shown in Figure 132.

164

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

FIGURE 132 LOCATION

5. Enter RACK, SHELF and BOARD parameter values as


numbers in the text boxes displayed in Figure 132.
6. Click OK button to save and close the dialog box.
Result: This function synchronizes the alarms with the
specified system for alarm activation.
END OF STEPS

Querying Alarms
Overview
This module provides operational steps for querying current and
history alarms, notifications, and events.

Querying Current Alarms


Purpose

Current alarms are the alarms that occur at current time.


Operators are able to make a query of current alarms by

Confidential and Proprietary Information of ZTE CORPORATION

165

NetNumenN31 Integrated Network Management Operation Manual

conditions such as by location, time, alarm types, alarm system


type and alarm causes.
Prerequisites

To query current alarms, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Log onto the system by referring to topic titled Logging into
NetNumen N31.

To query current alarms, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click Query > View Current Alarms, which displays
Current Alarms Toolbar as shown in Figure 133.
3. There are two ways to perform query current alarms
operation, which are as follows:
FIGURE 133 CURRENT AL ARMS TOOLBAR

166

Click
button on Current Alarms Toolbar to display Query
Current Alarms interface as shown in Figure 134.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

FIGURE 134 QUERY CURRENT AL ARMS

Click checkboxes to select from left pane, and click


corresponding checkbox options on right pane, to specify
the conditions for query.

Example: Read this example as a reference.


f

Click Severity checkbox, which displays four options as


checkboxes Critical, Major, Minor and Warning.
Click the desired checkbox to select the parameter for
example Minor.
Click OK button to save the parameters and display
query result as shown in Figure 135.

FIGURE 135 CURRENT AL ARMS

Confidential and Proprietary Information of ZTE CORPORATION

167

NetNumenN31 Integrated Network Management Operation Manual

Click
button on Current Alarms Toolbar to display
Query Current Alarms interface as shown in Figure 136.
FIGURE 136 QUERY CURRENT AL ARMS

f
f

Enter Query Name and Description parameter values.


Click checkboxes to select from left pane, and click
corresponding checkbox options on right pane, to specify
the conditions for query.

Example: Read this example as a reference.


f

Click Severity checkbox, which displays four options as


checkboxes Critical, Major, Minor and Warning.
Click the desired checkbox to select the parameter for
example Minor.
Click Apply button to save the parameters and display
query result as shown in Figure 136.

Note: Operation ii can store the queries for later use.


168

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

END OF STEPS

Querying Historical Alarms


Purpose

Prerequisites

Historical alarms are the old alarms, which occurred earlier for
some errors and now the system has no error. Operators are
able to make a query of historical alarms by conditions such as
by location, time, alarm types, alarm system type and alarm
causes.
To query historical alarms, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To query historical alarms, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click Query > View Historical Alarms, which displays
Historical Alarms Toolbar as shown in Figure 137.
3. There are two ways to perform query historical alarms
operation, which are as follows:
FIGURE 137 HISTORICAL ALARMS TOOLBAR

Click
button to display Query Current Alarms interface
as shown in Figure 138.

Confidential and Proprietary Information of ZTE CORPORATION

169

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 138 QUERY CURRENT AL ARMS

4. Click checkboxes to select from left pane, and click


corresponding checkbox options on right pane, to specify the
conditions for query.
Example: Read this example as a reference.
f

170

Click System Type checkbox, which displays four options


as checkboxes Correlation alarm, Link Alarm,
Security Alarm and System Management.
Click the desired checkbox to select the parameter for
example Link Alarm.
Click OK button to save the parameters and display
query result as shown in Figure 139.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

FIGURE 139 HISTORICAL ALARMS

Click
button on Historical Alarms Toolbar to display
Query Historical Alarms interface as shown in Figure 141.
FIGURE 140 QUERY HISTORICAL AL ARM S

f
f

Enter Query Name and Description parameter values.


Click checkboxes to select from left pane, and click
corresponding checkbox options on right pane, to specify
the conditions for query.

Example: Read this example as a reference.


f

Click Severity checkbox, which displays four options as


checkboxes Critical, Major, Minor and Warning.

Confidential and Proprietary Information of ZTE CORPORATION

171

NetNumenN31 Integrated Network Management Operation Manual

Click the desired checkbox to select the parameter for


example Minor.
Click Apply button to save the parameters and display
query result as shown in Figure 141.

Note: Operation ii can store the queries for later use.


END OF STEPS

Querying Notifications
Purpose

Prerequisites

System supports query of notifications by certain conditions


displayed in Figure 142. Notification query function is thus used
to implement this purpose.
To query notifications, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To query notifications, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click Query > View Notifications, which
Notifications Toolbar as shown in Figure 141.

displays

3. There are two ways to perform query notifications, which are


as follows:
FIGURE 141 NOTIFICATIONS TOOLBAR

172

Click
button to display Query Notifications interface as
shown in Figure 142.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

FIGURE 142 QUERY NOTIFICATIONS

Click checkboxes to select from left pane, and click


corresponding checkbox options on right pane, to specify
the conditions for query.

Example: Read this example as a reference.


f

Click System Type checkbox, which displays several


options as checkboxes.
Click the desired checkbox to select the parameter for
example IN SMP.
Click OK button to save the parameters and display
query result as shown in Figure 143.

FIGURE 143 NOTIFICATIONS

Confidential and Proprietary Information of ZTE CORPORATION

173

NetNumenN31 Integrated Network Management Operation Manual

Click
button on Notifications Toolbar to display Query
Notifications interface as shown in Figure 144.
FIGURE 144 QUERY NOTIFICATIONS

f
f

Enter Query Name and Description parameter values.


Click checkboxes to select from left pane, and click
corresponding checkbox options on right pane, to specify
the conditions for query.

Example: Read this example as a reference.


f

Click System type checkbox, which displays several


options as checkboxes displayed on right pane.
Click the desired checkbox to select the parameter for
example EPM
Click Apply button to save the parameters and display
query result as shown in Figure 144.

Note: Operation ii can store the queries for later use.

174

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

END OF STEPS

Querying Events
Purpose

Prerequisites

System supports query of events by certain conditions as


displayed in Figure 146. Event query function is thus used to
implement this purpose
To query events, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To query events, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click Query > View Events, which displays Events
Toolbar as shown in Figure 145.
3. There are two ways to perform query events, which are as
follows:
FIGURE 145 EVENTS TOOLBAR

Click
button to display Query Events interface as shown
in Figure 146.

Confidential and Proprietary Information of ZTE CORPORATION

175

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 146 QUERY EVENTS

Click checkboxes to select from left pane, and click


corresponding checkbox options on right pane, to specify
the conditions for query.

Example: Read this example as a reference.


f

176

Click System Type checkbox, which displays several


options as checkboxes.
Click the desired checkbox to select the parameter for
example IN IMP.
Click OK button to save the parameters and display
Notifications as shown in Figure 147.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

FIGURE 147 EVENTS

Click
button on Events Toolbar to display Query
Events interface as shown in Figure 148.
FIGURE 148 QUERY EVENTS

f
f

Enter Query Name and Description parameter values.


Click checkboxes to select from left pane, and click
corresponding checkbox options on right pane, to specify
the conditions for query.

Example: Read this example as a reference.


f

Click System type checkbox, which displays several


options as checkboxes displayed on right pane.

Confidential and Proprietary Information of ZTE CORPORATION

177

NetNumenN31 Integrated Network Management Operation Manual

Click the desired checkbox to select the parameter for


example IN IMP.
Click Apply button to save the parameters and display
query result as shown in Figure 148.

Note: Operation ii can store the queries for later use.


END OF STEPS

Alarm Statistics Report


Template
Overview
This module provides operational steps for viewing alarm
statistics of average period and frequency by alarm severity.

Viewing Average Period Statistics by


Alarm Severity
Purpose

This function allows an operator to view alarm statistics of


average period by alarm severity.

Prerequisites

To view average period statistics by alarm severity, meet the


following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view average period statistics by alarm severity, perform the


following steps:
1. Click View > Fault Management from the main menu.
2. Click Query > Alarm Statistics, which displays Report
Templates interface as shown in Figure 149.

178

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

FIGURE 149 REPORT TEMPLATES

button on report template toolbar, which displays


3. Click
Search Template dialog box as shown in Figure 150.
FIGURE 150 SEARCH TEMPLATE

4. Choose the system by clicking desired checkboxes and click


OK button. Clicking all the checkboxes displays the interface
as shown in Figure 151, which are the templates.

Confidential and Proprietary Information of ZTE CORPORATION

179

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 151 TEMPLATES

5. Choose desired template by clicking list or report templates.


6. Click
button on Alarms Statistics Toolbar to enter
average period statistics by alarm severity parameters as
shown in Figure 152.

180

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

FI G U R E 1 5 2 V I E W I N G AV E R AG E P E R I O D S T AT I S T I C S B Y AL AR M
SEVERITY

7. Select severity by clicking Severity checkbox on left pane,


select desired options from right pane and click OK button.
This displays interface shown in Figure 153.

Confidential and Proprietary Information of ZTE CORPORATION

181

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 153 AVER AGE PERIOD STAT. BY AL ARM SEVERITY

END OF STEPS

Viewing Average Frequency


Statistics by Alarm Severity
Purpose

This function allows an operator to view alarm statistics of


average frequency by alarm severity.

Prerequisites

To view average frequency statistics by alarm severity, meet the


following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view average frequency statistics by alarm severity, perform


the following steps:
1. Click View > Fault Management from the main menu.
2. Click Query > Alarm Statistics, which displays Report
Templates interface as shown in Figure 154.
FIGURE 154 REPORT TEMPLATES

182

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

3. Click
button on report template toolbar, which displays
Search Template dialog box as shown in Figure 155.
FIGURE 155 SEARCH TEMPLATE

4. Choose the system by clicking desired checkboxes and click


OK button. Clicking all the checkboxes displays the interface
as shown in Figure 156, which are the templates.

Confidential and Proprietary Information of ZTE CORPORATION

183

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 156 TEMPLATES

5. Choose desired template by clicking list or report templates.


6. Click
button on Alarms Statistics Toolbar to enter
average period statistics by alarm severity parameters as
shown in Figure 157.

184

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

FI G U R E 1 5 7 V I E W I N G AV E R AG E P E R I O D S T AT I S T I C S B Y AL AR M
SEVERITY

7. Select severity by clicking Severity checkbox on left pane,


select desired options from right pane and click OK button.
This displays interface shown in Figure 158.

Confidential and Proprietary Information of ZTE CORPORATION

185

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 158 AVER AGE PERIOD STAT. BY AL ARM SEVERITY

END OF STEPS

Alarm Rule Management


Overview
Fault management system has several user-defined rules based
on which many alarm operations and executions are carried out.
This module provides operators with adding, editing, deleting,
enabling, and disabling functions.

Adding Management Rule


Purpose

Alarm management module has many operator-defined rules,


and many alarm operations and handling are done in compliance
with these rules. It provides add, delete, modify and query
functions.
Alarm rules are as follows:

186

Alarm acknowledging rule

Alarm clearing Rule

Alarm counting rule

Alarm delaying rule

Alarm discarding rule

Alarm forwarding rule

Alarm global filtering rule

Alarm merging rule

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

Prerequisites

Alarm persisting rule

Alarm restraining rule

Alarm operator filtering rule

Event discarding rule

Notification discarding rule

To set alarm
requirements:

Steps

management

rules,

meet

the

following

NetNumen N31 server and client must be started before


performing any operation.
Alarms must be added.

To set alarm management rules, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click Setting > Management Rule Setting, which displays
Management Setting Rule Toolbar as shown in Figure
159.
FIGURE 159 MANAGEMENT SETTING RULE

3. Select Rule Type from the drop down list as shown in Figure
159 for example Alarm Acknowledging Rule.
button on the toolbar, which displays Add Rule
4. Click
interface as shown in Figure 160.

Confidential and Proprietary Information of ZTE CORPORATION

187

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 160 ADD RULE

5. Enter Rule Name and Description parameter values in the


textboxes.
6. Click checkboxes to select from left pane, and click
corresponding checkbox options on right pane, to specify the
conditions for query.
Example: Read this example as a reference.
f

Click System Type checkbox, which displays four options


as checkboxes Correlation alarm, Link Alarm,
Security Alarm and System Management.
Click the desired checkbox to select the parameter for
example Link Alarm.

7. Click OK button to save the parameters and display result as


shown in Figure 161.

188

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

FIGURE 161 MANAGEMENT RULE SETTING

Note: Operator can select other rule options from Figure 159,
which are explained in the following Table 29.
T AB L E 2 9 AL AR M M AN AG E M E N T R U L E

Rules

Description

Alarm
Acknowledging
Rule

If the system receives alarm correctly then it


automatically been set to real-time alarm
monitor and system acknowledge that the
alarm is received.

Alarm Clearing
Rule

Alarms are deleted from the historical alarms.

Alarm Counting
Rule

Alarms are counted for a specified duration of


time.

Alarm Delaying
Rule

Some system for example SCP sends alarm in


case of any problem to NMS but if the problem
is within a certain time limit then alarm will
not be displayed and if solved then it displays
the alarm in current alarm monitor.

Alarm
Discarding Rule

If alarm is set, system does not delete the


alarm and also does not shown on NMS but
stores in the database.

Alarm
Forwarding
Rule

Alarm information is sent via emails or SMS to


operators.

Alarm Merging
Rule

Multiple alarms can be merged into one alarm.

Alarm
Persisting Rule

Alarms can remain active for certain period of


time.

Alarm
Restraining
Rule

If system has some problem, then it shows the


root alarm not the child alarm.

Alarm Operator
Filtering Rule

Alarms are filtered with respect to specified


operator.

Event
Discarding Rule

If event is set, system does not delete the


event and also does not shown on NMS but
stores in the database.

Notification
Discarding Rule

If notification is set, system does not delete


the notification and also does not shown on
NMS but stores in the database.

END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

189

NetNumenN31 Integrated Network Management Operation Manual

Editing Management Rule


Purpose
Prerequisites

Management rule information can be edited in case of any


mistake or wrong information entered.
To edit a management rule, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must have rights to perform edit operation.

To edit a management rule, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Right-click Management rule on right pane and choose
Edit, which displays Edit Management Rule interface as
shown in Figure 162.
FIGURE 162 EDIT MAN AGEMENT RULE

190

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

3. Click checkboxes to select from left pane, and click


corresponding checkbox options on right pane, to specify the
conditions for query.
Example: Read this example as a reference to perform edit
operation.
f

Click System Type checkbox, which displays four options


as checkboxes Correlation alarm, Link Alarm,
Security Alarm and System Management.
Click the desired checkbox to select the parameter for
example System Management.

4. Click OK button to save the parameters and close dialog box.


END OF STEPS

Deleting Management Rule


Purpose

Prerequisites

There are some unwanted rules that need to be deleted due to


some reasons. Operator can delete all records of management
rules.
To delete management rule, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must have rights to perform edit operation.

To delete management rule, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click rule name from right pane.
3. There are two ways to delete a particular operator, which are
as follows:

Right-click mangement rule on right pane, click Delete.

Click

button on management setting rule toolbar.

4. Delete Confirm dialog box appears, click Yes button to


delete otherwise click No to cancel delete operation.
END OF STEPS

Enabling Management Rule


Purpose
Prerequisites

Rules can be enabled for performing some action. Only


authorized operator can disable management rules.
To enable management rule, meet the following requirements:

NetNumen N31 server and client must be started before


performing any operation.

Confidential and Proprietary Information of ZTE CORPORATION

191

NetNumenN31 Integrated Network Management Operation Manual

Steps

Operator must have rights to disable management rules.

To enable management rule, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click rule name from right pane.
3. Click

button on management setting rule toolbar.

4. Enable confirm dialog box appears, click OK button to enable


otherwise click Cancel to cancel delete operation.
END OF STEPS.

Disabling Management Rule


Purpose

Prerequisites

There are some unwanted rules that need to be disabled after


performing some action. Rules cannot be assigned when
disabled. Only authorized operator can disable management
rules.
To disable management rule, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must have rights to disable management rules.

To disable management rule, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click rule name from right pane.
3. Click

button on management setting rule toolbar.

4. Disable confirm dialog box appears, click Yes button to


delete otherwise click No to cancel delete operation.
END OF STEPS

Alarm Maintenance
Suggestions
Overview
NetNumen system provides operators with solutions by solving
frequently occurred problems. This system provides operators
with adding, editing, deleting, importing, and exporting
maintenance suggestions in order to quickly handle the system
alarms.
192

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

Adding Maintenance Suggestions


Purpose

NetNumen N31 allows operators to summarize experiences on


solving frequently-occurred problems. Operators are provided
with import, export, browsing and modification of alarm
maintenance suggestions in order to quickly handle the system
alarms.
On the basis of long-term network operation, operator can sum
up some experience about how to deal with problems that occur
frequently, and the experience may serve as references for
handling similar problems in future. These summaries of
handling experience are alarm handling suggestions.

Prerequisites

To set maintenance
requirements:

suggestions,

meet

the

following

NetNumen N31 server and client must be started before


performing any operation.
Steps

To set maintenance suggestions, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Select System Type from the drop down list on the
Severity Management Toolbar as shown in Figure 163.
FIGURE 163 SEVERITY MANAGEMENT TOOLBAR

button
3. In the Maintenance Suggestion Toolbar, click
to open Add Maintenance Suggestion interface as shown
in Figure 164.

Confidential and Proprietary Information of ZTE CORPORATION

193

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 164 ADD MAINTENANCE SUGGESTIONS

4. Click Select button on right of Description text box, which


selects Alarm Code as well.
5. Click Select button on right of Reason Description text box,
which selects Alarm Reason as well.
6. Click Apply button to save changes and OK button to close
dialog box.
END OF STEPS

Editing Maintenance Suggestions


Purpose

Maintenance suggestion information can be edited in case of any


mistake or wrong information entered.

Prerequisites

To edit maintenance suggestion information, meet the following


requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must have rights to perform edit operation.

To edit maintenance suggestion, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Right-click Management rule on right pane and choose
Edit, which displays Edit Maintenance Suggestion
Information interface as shown in Figure 165.

194

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

FIGURE 165 EDIT MAINTENANCE SUGGESTION INFORM ATION

Note: Only customized suggestion can be edited. Other


values cannot be edited. In this text box operator can enter
some important text related to the maintenance suggestion.
3. Click OK button after editing information to save the
parameters and close dialog box.
END OF STEPS

Deleting Maintenance Suggestions


Purpose

Prerequisites

There are some unwanted rules that need to be deleted due to


some reasons. Operator can delete all records of management
rules.
To delete management rule, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Operator must have rights to perform edit operation.

To delete management rule, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click maintenance suggestion name from right pane.
3. There are two ways to delete a particular operator, which are
as follows:

Right-click mangement rule on right pane, click Delete.

Click

button on management setting rule toolbar.

4. Delete Confirm dialog box appears, click Yes button to


delete otherwise click No to cancel delete operation.

Confidential and Proprietary Information of ZTE CORPORATION

195

NetNumenN31 Integrated Network Management Operation Manual

END OF STEPS

Importing Maintenance Suggestions


Purpose

There are some suggestion saved earlier, which can be imported.


These suggestions replace the current existing suggestion.
System supports importing of alarm maintenance suggestions in
the specified file format. Import operations have alarm
maintenance suggestions saved in file imported into current
system. Supported alarm maintenance suggestion file must be
an excel and cvs file.

Prerequisites

To import maintenance
requirements:

Steps

suggestions,

meet

the

following

NetNumen N31 server and client must be started before


performing any operation.

Old maintenance rule must be saved as backup.

Operator must have rights to perform edit operation.

To import maintenance suggestions, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click maintenance suggestion name from right pane.
3. Click

button on maintenance setting toolbar.

4. Import Suggestions dialog box appears as shown in Figure


166.
FIGURE 166 IMPORT SUGGESTIONS

5. Open desired directory to select file to import and click Open


button.

196

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

END OF STEPS

Exporting Maintenance Suggestions


Purpose

Prerequisites

There are some suggestion, which can be exported as backup.


System supports exporting of alarm maintenance suggestions in
the specified file format. Supported alarm maintenance
suggestion files must be an excel, pdf, html or cvs file.
To export maintenance
requirements:

Steps

suggestions,

meet

the

following

NetNumen N31 server and client must be started before


performing any operation.
Operator must have rights to perform edit operation.

To export maintenance suggestions, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click maintenance suggestion name from right pane.
3. Click

button on maintenance setting toolbar.

4. Export Suggestions dialog box appears as shown in Figure


167.
FIGURE 167 EXPORT SUGGESTIONS

5. Open desired directory to save file to export and click Save


button.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

197

NetNumenN31 Integrated Network Management Operation Manual

Severity and Color Settings


Overview
This module provides operational steps for setting severity
conditions, colors and sounds.

Setting Severity Conditions


Purpose

Prerequisites

These are the conditions to specify the strength of error for


example critical, major, minor or warning. System provides
operator to set the severity conditions for alarms by performing
this procedure.
To set severity conditions, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To set severity conditions, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Select System Type from the drop down list on the
Severity Management Toolbar as shown in Figure 168.
FIGURE 168 SEVERITY MANAGEMENT TOOLBAR

Result Alarm Severity Conditions are displayed as


shown in Figure 169 as in New Severity column.
FIGURE 169 ALARM SEVERITY CONDITIONS

3. Click to choose severity condition from New Severity list of


values from [Critical], [Major], [Minor] and [Warning]
options depending on the error type.

198

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 7 Integrated Network Management System

END OF STEPS

Setting Sound and Colors


Purpose

Prerequisites

Alarm data can be presented in an operator-friendly interface.


Operator can configure colors and sounds for different alarm
levels as required.
To set sound and colors, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To set sound and colors, perform the following steps:


1. Click View > Fault Management from the main menu.
2. Click Sound/Color Setting from the menu to open Sound
and Color Setting interface as shown in Figure 170.
FIGURE 170 SOUND SETTING

Note: There are four severity levels of each alarm; operator


needs to choose sound and color for each one of them to
differentiate. Operator can also test the sound by clicking
Play button.
3. Select sound from the drop down list provided as shown in
Figure 170.
4. Click Alarm Color Setup TAB page to open interface shown
in Figure 171.

Confidential and Proprietary Information of ZTE CORPORATION

199

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 171 COLOR SETTING

5. Choose color for each severity level and click OK button to


save settings for future use.
END OF STEPS

200

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Performance Management
Overview
Introduction

Contents

Various aspects of performance management are maintained in


this topic. This is used to monitor the system service
performance
as
well
as
internet-work
performance.
Performance management aims at different devices, processes
procedures and creates operation interface interactive and
unified with external. Meanwhile, performance management is
provided with many functions which supply the convenience for
device applications.
This chapter includes the following topics:
TABLE TOPICS IN CHAPTER 8

Topic Title

Page
No.

Performance Statistics Task Management


Overview

202

Creating Performance Task

202

Activating Periodic Task

205

Activating Timer Task

206

Suspending Performance Tasks

208

Viewing Detailed Information

208

Deleting Performance Task

209

Refreshing Performance Task

210

Performance Task Threshold Management


Overview

210

Setting Threshold

210

Modifying Threshold

213

Deleting Threshold

214

Refreshing Threshold

214

Activating Threshold

214

Confidential and Proprietary Information of ZTE CORPORATION

201

NetNumenN31 Integrated Network Management Operation Manual

Topic Title

Page
No.

Deactivating Threshold

215

Monitoring Performance in Realtime

216

Performance Data Report Management


Overview

218

Viewing Multi-IP Contrast Graph

218

Viewing Multi-Instance Contrast Graph

220

Viewing Trend Graph

222

Viewing Table

224

Performance Statistics Task


Management
Overview
Introduction

Aiming at devices of various types, performance management


provides a unified processing flow and a unified operation
window for interaction purpose. Meanwhile, a great number of
performance management functions are supplied, making it
convenient for equipment usage.

Creating Performance Task


Purpose
Prerequisites

This allows an operator to add a statistical task to a performance


group.
To create performance task, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To create performance task, perform the following steps:


1. In the topology view, right-click an NE > Performance
Management > History Performance > Performance
Stat, which displays an interface as shown in Figure 172.

202

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

FIGURE 172 PERFORM ANCE M AN AGEMENT

2. There are two ways to create performance task, which are as


follows:

Right-click performance task on right pane, and click to


choose Create Task.
Click

button from performance management toolbar.

Result: Select Device interface is displayed as shown in


Figure 173.
FIGURE 173 SELECT DEVICE

3. Select device from Device Type list of values, and click


Next button. This shows Select Performance Condition
interface as shown in Figure 174.

Confidential and Proprietary Information of ZTE CORPORATION

203

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 174 SELECT PERFORM ANCE CONDITION

4. Click
System
Performance
and
ZXINDESysPerf
checkboxes, and click Next button. This displays the last
step of creating performance task as shown in Figure 175.
Operator can view details of performance by clicking Detail
button.
FIGURE 175 CHOOSE INDEX

5. Select index, if any, by clicking Sel button and click Finish


button.
Note: An index, compulsory for operations, identifies an
instance of an object. Some of the objects have only one
instance in which case, the selection of index is unnecessary.

204

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

END OF STEPS

Activating Periodic Task


Purpose
Prerequisites

This operation allows an operator to set periodic tasks activated


for execution.
To activate periodic task, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Task must already be created before performing scheduling
operation.

To activate periodic task, perform the following steps:


1. In the topology view, right-click an NE > Performance
Management > History Performance > Performance
Stat, which displays an interface as shown in Figure 172.
2. Click
button, which displays Select Task Type interface
ash shown in Figure 176.
FIGURE 176 SELECT TASK TYPE

3. Select task type from Task Type list of values, and click
Next(N) button, which displays Select Task Time interface
as shown in Figure 177.

Confidential and Proprietary Information of ZTE CORPORATION

205

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 177 SELECT TASK TIME

4. Click Start Date to select task Start Times and End Times,
and click Finish(F) button to save settings. The task is
ready for execution at the specified times.
END OF STEPS

Activating Timer Task


Purpose
Prerequisites

This operation allows an operator to set timer tasks activated for


execution.
To activate timer task, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Task must already be created before performing scheduling
operation.

To activate timer task, perform the following steps:


1. In the topology view, right-click an NE > Performance
Management > History Performance > Performance
Stat, which displays an interface as shown in Figure 172.
2. Click
button, which displays Select Task Type interface
ash shown in Figure 178.

206

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

FIGURE 178 SELECT TASK TYPE

3. Select task type from Task Type list of values, and click
Next(N) button, which displays Select Task Time interface
as shown in Figure 179.
FIGURE 179 SELECT TASK TIME

4. Click Start Time to select task start time, and click Finish(F)
button to save settings.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

207

NetNumenN31 Integrated Network Management Operation Manual

Suspending Performance Tasks


Purpose
Prerequisites

Suspend task allows an operator to have this tasks stopped from


execution.
To suspend performance task, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Task must already be created
performing scheduling operation.

and

scheduled

before

To suspend performance task, perform the following steps:


1. In the topology view, right-click an NE > Performance
Management > History Performance > Performance
Stat, which displays an interface as shown in Figure 172.
2. Select

task

from

the

list

displayed

in

Performance

Management interface and click


button. If the task is
already scheduled, only then it can be suspended. This
shown Suspend Confirm dialog box as shown in Figure 180.
FIGURE 180 SUSPEND CONFIRM

3. Click OK to confirm.
END OF STEPS

Viewing Detailed Information


Purpose
Prerequisites

This function allows an operator to view attributes and states of


tasks. This provides history of task scheduling and suspension.
To view detailed information, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view detailed information, perform the following steps:


1. In the topology view, right-click an NE > Performance
Management > History Performance > Performance
Stat, which displays an interface as shown in Figure 172.

208

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

2. Select

task

from

the

list

displayed

in

Performance

Management interface and click


button. This displays
task detailed information as shown in Figure 181.
FIGURE 181 TASK DETAILS

3. Click OK to close dialog box.


END OF STEPS

Deleting Performance Task


Purpose
Prerequisites

This function allows


performance task.

to

delete

an

unnecessary

To delete performance task, meet the following requirements:

Steps

operator

NetNumen N31 server and client must be started before


performing any operation.
Operator must have rights to perform delete operation.

To delete performance task, perform the following steps:


1. There are two ways to delete threshold, which are as follows:

Right-click performance task on right pane, and click to


choose Delete Threshold.
Click

button from performance management toolbar.

2. Delete Confirm dialog box appears, click OK to confirm.


END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

209

NetNumenN31 Integrated Network Management Operation Manual

Refreshing Performance Task


Purpose
Prerequisites
Steps

This function updates the changes made to the performance


tasks.
To refresh performance task, meet the following requirements:
To refresh performance task, perform the following steps:

Right-click performance task on right pane, and click to


choose Refresh Threshold.
Click

button from performance management toolbar.

END OF STEPS

Performance Task Threshold


Management
Overview
Introduction

Threshold Management includes: performance threshold query


and setup. All thresholds are returned when a threshold query is
made. Operators can re-set the thresholds. By comparing the
thresholds with the values obtained, it generates alarm
messages and sends to the alarm module if the values have
exceeded the thresholds.

Setting Threshold
Purpose

Prerequisites

Thresholds are critical values set by users. These values specify


when alarms are given and what level the alarms are. Dynamic
threshold setup is provided.
To set threshold, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
NE must be added before setting threshold.

To set threshold, perform the following steps:


1. In the topology view, right-click an NE > Performance
Management > History Performance > Performance
Stat, which displays an interface as shown in Figure 182.
2. Click Threshold Management TAB page from the interface
provided as Figure 182.

210

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

FIGURE 182 STATISTICS PERFORM ANCE

button on performance management toolbar, which


3. Click
displays Threshold Parameters as shown in Figure 183.
FIGURE 183 THRESHOLD PARAMETERS

Note: On left pane of the interface, Device Type, Device


List and Groups are displayed; operator is allowed to
choose these options as required. Read Table 30 as a
reference.
4. Enter parameter values for High Threshold and Low
Threshold and click OK button.
TABLE 30 THRESHOLD P ARAMETERS

Parameters

Description

Device type

This represents the device type that is


integrated into the system.

Device name

Represents the device name.

Performance
group

Represents the system performance.

Variable

This represents different parameters related to


the system usage in terms of memory and CPU
usage.

Variable index

It shows the system performance in percent


use.

Confidential and Proprietary Information of ZTE CORPORATION

211

NetNumenN31 Integrated Network Management Operation Manual

Parameters

Description

High
threshold
value

Each variable has two thresholds: higher


threshold and lower threshold. This refers to the
higher one.

High
threshold
times

This is numeric value representing the number


of times the high threshold value occurs.

High
threshold
severity

It is the threshold level for that alarms are


generated.

High
threshold
type

Type of the threshold alarm generated. This


decides the mode of threshold alarm generation:
higher than the threshold, lower than the
threshold, no alarm. Two alarm types
correspond respectively to the higher and lower
thresholds.

Low threshold
value

This is the minimum tolerable value for


measuring performance.

Low threshold
times

This is a numeric value representing the number


of times the low threshold value occurs.

Low threshold
severity

It is the threshold level for that alarms are


generated.

Status

This represents the status of current threshold


setting. If it is active status is true otherwise
false.

Result: Figure 184 is displayed as the result of setting


threshold function.
FIGURE 184 THRESHOLD RECORDS

END OF STEPS

212

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

Modifying Threshold
Purpose
Prerequisites

This function allows the user to modify his set thresholds in real
time.
To modify threshold, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
NE must be added before setting threshold.

To modify threshold, perform the following steps:


1. There are two ways to modify threshold, which are as follows:

Right-click threshold record on right pane, and click to


choose Modify Threshold.
Click

button from threshold management toolbar.

Result: Modify Threshold interface is displayed as shown


in Figure 185.
FIGURE 185 MODIFY THRESHOLD

Note: Description to Modify Threshold items is the same


as explained earlier in Table 30.
2. Modify parameters as required and click OK button.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

213

NetNumenN31 Integrated Network Management Operation Manual

Deleting Threshold
Purpose
Prerequisites

Provides this function to delete threshold defined by an operator.


To delete a particular threshold, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
NE must be added before setting threshold.

To delete the threshold, perform the following steps:


1. There are two ways to delete threshold, which are as follows:

Right-click threshold record on right pane, and click to


choose Delete Threshold.
Click

button from threshold management toolbar.

2. Delete Confirm dialog box appears, click OK to confirm.


END OF STEPS

Refreshing Threshold
Purpose
Prerequisites

This function provides the refresh between the server and client.
All new changes are updated after performing this function.
To refresh threshold, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
NE must be added before setting threshold.

1. There are two ways to delete threshold, which are as follows:

Right-click threshold record on right pane, and click to


choose Refresh Threshold.
Click

button from threshold management toolbar.

END OF STEPS

Activating Threshold
Purpose

Prerequisites

This function allows an operator to decide whether or not an


alarm is given when a threshold is exceeded. It is used to
activate threshold setting of a particular system.
To activate threshold, meet the following requirements:

214

NetNumen N31 server and client must be started before


performing any operation.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

Steps

NE must be added before setting threshold.

To activate threshold, perform the following steps:


1. There are two ways to activate threshold, which are as
follows:

Right-click threshold record on right pane, and click to


choose Activate Threshold.
Click

button from threshold management toolbar.

2. Activate Confirm dialog box appears as shown in Figure


186, click OK to continue.
FIGURE 186 ACTIVATE CONFIRM

END OF STEPS

Deactivating Threshold
Purpose

Prerequisites

This function allows an operator to decide whether or not an


alarm is given when a threshold is exceeded. It is used to
deactivate threshold setting of a particular system.
To deactivate threshold, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
NE must be added before setting threshold.

To deactivate threshold, perform the following steps:


1. There are two ways to deactivate threshold, which are as
follows:

Right-click threshold record on right pane, and click to


choose Deactivate Threshold.
Click

button from threshold management toolbar.

2. Deactivate Confirm dialog box appears as shown in Figure


187, click OK to continue.

Confidential and Proprietary Information of ZTE CORPORATION

215

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 187 DEACTIVATE CONFIRM

END OF STEPS.

Monitoring Performance in Realtime


Purpose

Prerequisites

The current performance sub-module collects data of


performance variables in real time, and displays the values of
the performance variables in the form of graphs. Operator can
also save data through the module.
To monitor real-time
requirements:

Steps

performance,

meet

the

following

NetNumen N31 server and client must be started before


performing any operation.
Data must exist to view graphical representation.

To monitor real-time performance, perform the following steps:


1. Click View > Topology Management from the main menu.
2. In the topology view, right-click an NE > Performance
Management > Current Performance which displays an
interface as shown in Figure 188.
FIGURE 188 REAL-TIME PERFORM ANCE

3. Select a property in the property pane on the left, such as


Device Type, Device List, Groups, Index List and
216

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

Variables. Select Trend Graph from Graph Type list of


values. Device Type list of values contains several devices;
operator can select different devices to monitor real-time
performance analysis.
4. Click Add button to draw table, which is displayed in Figure
189.
FIGURE 189 REAL-TIME PERFORM ANCE

Note:
i.

The tool bar on the top of the right pane defines some
operations, such as switching between graphs of different
types, saving graphs, and clearing graphs. See Figure
190.

FIGURE 190 HISTORY PERFORMANCE TOOLBAR

ii. Operator can add up to four devices at a time for


comparison.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

217

NetNumenN31 Integrated Network Management Operation Manual

Performance Data Report


Management
Overview
Introduction

This section shows the system performance in terms of graphs.


These graphs can be of different type depending upon the
requirements. These graphs are used for the analysis of system
performances and comparison. Operator can know the
performance indices of the devices

Viewing Multi-IP Contrast Graph


Purpose

Prerequisites

The multi-IP contrast graph provides the comparative analysis of


the values of a performance variable instance for multiple IP
addresses. It shows the difference between the same
performance variable values of different devices so that operator
can know the performance indices of the devices. Operator can
monitor four devices at the most at a time.
To view multi-IP
requirements:

Steps

contrast

graph,

meet

the

following

NetNumen N31 server and client must be started before


performing any operation.
Data must exist to view graphical representation.

To view multi-IP contrast graph, perform the following steps:


1. Click View > Topology Management from the main menu.
2. In the topology view, right-click an NE > Performance
Management > History Performance > Performance
Analysis which displays History Performance interface as
shown in Figure 191.

218

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

FIGURE 191 HISTORY PERFORMANCE

3. Select a property in the property pane on the left, such as


Device Type, Device List, Groups, Index List and
Variables.
4. Select Multi-IP Contrast Graph by clicking Graph Type list of
values from left pane of the interface displayed in Figure 191.
Operator must add the device type as many times as new
graph is created.
5. Select date range setting from lower right frame as shown in
Figure 191. Operator can choose from [Daily], [Weekly],
[Monthly] and [Annual] options.
6. Click to choose from [Select] or [Define] radio button.
Choosing Define enables operator to define start and end
time.
7. Click Add button to draw graph, which is displayed in Figure
191.

Confidential and Proprietary Information of ZTE CORPORATION

219

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 192 MULTI-IP CONTRAST GRAPH

Note:
i.

The tool bar on the top of the right pane defines some
operations, such as switching between graphs of different
types, saving graphs, and clearing graphs. See Figure
193.

FIGURE 193 HISTORY PERFORMANCE TOOLBAR

ii. Operator can add up to four devices at a time for


comparison.
END OF STEPS

Viewing Multi-Instance Contrast


Graph
Purpose

The multi-instance contrast graph provides the comparative


analysis of the values of various instances for a performance
variable of an IP address. It shows the difference between the
different performance variable instance values so that operator
can know the performance indices of different instances.

Prerequisites

To view multi-instance contrast graph, meet the following


requirements:

220

NetNumen N31 server and client must be started before


performing any operation.
Data must exist to view graphical representation.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

Steps

To view multi-instance contrast graph, perform the following


steps:
1. Click View > Topology Management from the main menu.
2. In the topology view, right-click an NE > Performance
Management > History Performance > Performance
Analysis which displays an interface as shown in Figure 194.
FIGURE 194 HISTORY PERFORMANCE

3. Select a property in the property pane on the left, such as


Device Type, Device List, Groups, Index List and
Variables.
4. Select type by clicking Graph Type list of values from left
pane of the interface displayed in Figure 194. Operator must
add the index as many times as new graph is created.
5. Select date range setting from lower right frame as shown in
Figure 194. Operator can choose from [Daily], [Weekly],
[Monthly] and [Annual] options.
6. Click to choose from [Select] or [Define] radio button.
Choosing Define enables operator to define start and end
time.
7. Click Add button to draw graph, which is displayed in Figure
194.

Confidential and Proprietary Information of ZTE CORPORATION

221

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 195 TREND GRAPH

Note:
i.

The tool bar on the top of the right pane defines some
operations, such as switching between graphs of different
types, saving graphs, and clearing graphs. See Figure
196.

FIGURE 196 HISTORY PERFORMANCE TOOLBAR

ii. Operator can add up to four devices at a time for


comparison.
END OF STEPS

Viewing Trend Graph


Purpose

The trend graph provides an analysis of the values of a single


instance of a performance variable. It shows the trend
comparison of the instance values of the performance variable
so that operator can know the variation of the performance
indices of the instance. Operator can monitor four devices at the
most at a time.

Prerequisites

To view trend graph contrast graph, meet the following


requirements:

Steps
222

NetNumen N31 server and client must be started before


performing any operation.
Data must exist to view graphical representation.

To view trend graph, perform the following steps:

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

1. Click View > Topology Management from the main menu.


2. In the topology view, right-click an NE > Performance
Management > History Performance > Performance
Analysis which displays an interface as shown in Figure 197.
FIGURE 197 HISTORY PERFORMANCE

3. Select a property in the property pane on the left, such as


Device Type, Device List, Groups, Index List and
Variables.
4. Select Trend Graph by clicking Graph Type list of values
from left pane of the interface displayed in Figure 197.
5. Select date range setting from lower right frame as shown in
Figure 197. Operator can choose from [Daily], [Weekly],
[Monthly] and [Annual] options.
6. Click to choose from [Select] or [Define] radio button.
Choosing Define enables operator to define start and end
time.
7. Click Add button to draw graph, which is displayed in Figure
197.

Confidential and Proprietary Information of ZTE CORPORATION

223

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 198 MULTI-INSTANCE CONTRAST GRAPH

Note:
i.

The tool bar on the top of the right pane defines some
operations, such as switching between graphs of different
types, saving graphs, and clearing graphs. See Figure
199.

FIGURE 199 HISTORY PERFORMANCE TOOLBAR

ii. Operator can add up to four devices at a time for


comparison.
END OF STEPS

Viewing Table
Purpose

Prerequisites

This function provides the comparative analysis of the values of


various instances for a performance variable of an IP address. It
shows the difference between the different performance variable
instance values in the form of table.
To view table, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Data must exist to view graphical representation.

To view table, perform the following steps:


1. Click View > Topology Management from the main menu.

224

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 8 Performance Management

2. In the topology view, right-click an NE > Performance


Management > History Performance > Performance
Analysis which displays an interface as shown in Figure 200.
FIGURE 200 HISTORY PERFORMANCE

3. Select a property in the property pane on the left, such as


Device Type, Device List, Groups, Index List and
Variables.
4. Select Table by clicking Graph Type list of values from left
pane of the interface displayed in Figure 200.
5. Select date range setting from lower right frame as shown in
Figure 200. Operator can choose from [Daily], [Weekly],
[Monthly] and [Annual] options.
6. Click to choose from [Select] or [Define] radio button.
Choosing Define enables operator to define start and end
time.
7. Click Add button to draw table, which is displayed in Figure
200.

Confidential and Proprietary Information of ZTE CORPORATION

225

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 201 TABLE

Note:
i.

The tool bar on the top of the right pane defines some
operations, such as switching between graphs of different
types, saving graphs, and clearing graphs. See Figure
202.

FIGURE 202 HISTORY PERFORMANCE TOOLBAR

ii. Operator can add up to four devices at a time for


comparison.
END OF STEPS

226

Confidential and Proprietary Information of ZTE CORPORATION

Chapter

Command Line Terminal


Overview
Introduction

Command line terminal is an interface which provides a


command prompt to accept single commands and executes.
There are two types of commands

Single Command

Batch Command(s)

Single commands are executed one after another by executing


one command at the same time.
Batch Command(s) can be set of commands to be executed for
later requirements. User can create a command script file and
execute. Furthermore, it also can accept commands in graphics
mode.
Contents

This chapter includes the following topics:


TABLE TOPICS IN CHAPTER 9

Topic Title

Page No.

Overview

227

Configuring Command Line Terminal (CLT)

228

Single Command Operations


Overview

229

Entering Commands in Graphics Mode

230

Switching from Manual Input to Graphics Input

232

Checking Syntax of Single Command

233

Executing a Single Command

233

Checking Syntax of Batch Command Script

235

Executing a Batch Command Script

235

Opening a Batch Command Script

236

Checking Syntax of Batch Command Script

237

Modifying Batch Command Script

238

Confidential and Proprietary Information of ZTE CORPORATION

227

NetNumenN31 Integrated Network Management Operation Manual

Topic Title

Page No.

Viewing Inductive Help

240

Configuring Command Line Terminal


(CLT)
Purpose
Prerequisites

This function allows operator to configure Command Line


Terminal (CLT) buffer size and execution waiting time.
To configure CLT, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To configure CLT buffer, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click Command > Setup from the menu to open Buffer
Configuration dialog box as shown in Figure 203.
FIGURE 203 BUFFER CONFIGURATION

3. Enter a numeric value History buffer size and


Asynchronous waiting time (second) text boxes to set
buffer size as required. For example default values are 100
and 60 for History buffer size and Asynchronous waiting
time (second) respectively.
4. Select radio button from Whether abandon executing
scripts when error occurred. Read Table 31 as a reference.
TABLE 31 CREATE VIRTUAL LINK P ARAMETERS

228

Parameters

Description

Abandon
execution

It abandons the execution of script


commands when certain error occurs.

Dont abandon
execution

It does not abandon the execution of script


commands when certain error occurs.

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 9 Performance Management

5. Click OK button to save and close the dialog box.


END OF STEPS

Single Command Operations


Overview
Single commands are the manual and graphic commands. These
commands are created for execution at the same time.

Entering Manual Commands


Purpose

Prerequisites

In this mode, operator needs to enter man-machine commands


manually. It accepts manual commands to be executed on lower
right pane.
To enter commands manually, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To enter commands manually, perform the following steps:


1. Click View > Command Line Terminal from the main
menu, which displays Command Line interface as shown in
Figure 204.

Confidential and Proprietary Information of ZTE CORPORATION

229

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 204 MANUAL INPUT

2. Enter command in the lower pane at the command line


interface.
END OF STEPS

Entering Commands in Graphics


Mode
Purpose

In this mode, there is no need to type commands. The interface


allows operator to enter man-machine commands in graphics
input mode.

Prerequisites

To enter commands in graphics mode, meet the following


requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To enter commands in graphics mode, perform the following


steps:
1. Click View > Command Line Terminal from the main
menu.
2. Click Command > Setup from the menu which displays
Graphics Input interface as shown in Figure 205.

230

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 9 Performance Management

FIGURE 205 GRAPHICS INPUT

Note: The above interface shows commands to be executed


on left pane, and parameters to be selected for providing
conditions on right pane. Operator needs to enter desired
values in those parameters.
Example:
i.

Select Log Management > Query Log > Query


detailed information from left pane.

ii. Enter Log ID on right pane.


iii. Click OK button to save, which displays the command in
the command prompt as shown in Figure 206.
FIGURE 206 COMM AND PROMPT

Note: Other command entering procedures can also be


performed in the similar way. Read above example to follow
the procedure.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

231

NetNumenN31 Integrated Network Management Operation Manual

Switching from Manual Input to


Graphics Input
Purpose

This function allows user to switch from manual input to graphics


input of commands to provide more interactivity.

Prerequisites

To switch manual input to graphics input, meet the following


requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To switch manual input to graphics input, perform the following


steps:
1. Click View > Topology Management from the main menu.
2. Write a command on lower right pane and right-click to
choose Switch Manual to Graphics Input, which displays
the interface as shown in Figure 207.
FIGURE 207 SWITCH M ANUAL TO GR APHICS INPUT

3. Choose a graphic input from left pane, which displays


corresponding command parameters on right pane within a
frame. Read the following example as reference.
Example:
i.

Click Log Management > Query Log > Query


detailed information of a system log record from left
pane, and click OK button. This displays the command
keywords in the manual input area.

button from the toolbar displayed on top to


ii. Click
execute the command.
Result: Results are displayed in the upper right pane.

232

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 9 Performance Management

END OF STEPS

Checking Syntax of Single


Command
Purpose

This function allows an operator to perform syntax check of the


single command for the currently opened TAB page.

Prerequisites

To check syntax of a single command, meet the following


requirements:

Steps

To check syntax of a single command, perform the following


steps:
1. Click View > Command Line Terminal from the main
menu.
2. Enter command in the command prompt as shown in Figure
208.
FIGURE 208 COMM AND PROMPT

3. Click Command > Check Syntax from the menu, which


displays errors in the upper pane of the interface.
Result: Syntax check results are displayed in the upper right
pane. If errors occur during the checkup, it stops and gives
the corresponding error messages.
END OF STEPS

Executing a Single Command


Purpose
Prerequisites

This function allows operator to get the last row of man-machine


commands in the single command input area and execute it.
To execute a single command, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To execute a single command, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Enter command in the command prompt as shown in Figure
209.

Confidential and Proprietary Information of ZTE CORPORATION

233

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 209 COMM AND PROMPT

3. Click Command > Execute.


Result: The execution result is displayed in the output area.
If errors occur during the execution, it stops and gives the
corresponding error messages.
Note: If there are more than one pages of result, use
browsing buttons in the toolbar for viewing.
END OF STEPS

Batch Command Operations


Overview
Batch commands can be created to be executed at any time.
These commands can be saved as script in a file.

Creating and Saving Batch


Command Script
Purpose
Prerequisites

This function allows operator to create a new batch command


script. It also saves the batch command script.
To create a batch command, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To create a bath command, perform the following steps:


1. Click View > Command Line Terminal from the main
menu.
2. Click File > New from the menu, which displays an empty
space to write script of batch command.
3. Enter commands by typing in the empty space.
4. Click File > Save Script, which opens Save Batch
Command Script dialog box as shown in Figure 210.

234

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 9 Performance Management

FIGURE 210 S AVE B ATCH COMM AND SCRIPT

5. Select directory and file type, enter filename to save


command script and click Save button.
END OF STEPS

Checking Syntax of Batch Command


Script
Purpose

This function allows an operator to perform syntax check on the


batch command scripts for the currently opened TAB page.

Prerequisites

To check syntax of batch command, meet the following


requirements:

Steps

To check syntax of batch command, perform the following steps:


1. Click View > Command Line Terminal from the main
menu.
2. Click Command > Check Syntax from the menu, which
displays errors in the upper pane of the interface.
Result: Syntax check results are displayed in the upper right
pane. If errors occur during the checkup, it stops and gives
the corresponding error messages.
END OF STEPS

Executing a Batch Command Script


Purpose

This function allows operator to run the batch command scripts.

Prerequisites

To execute a batch command, meet the following requirements:

Confidential and Proprietary Information of ZTE CORPORATION

235

NetNumenN31 Integrated Network Management Operation Manual

Steps

NetNumen N31 server and client must be started before


performing any operation.
Commands must be created and saved before performing
batch operation.

To execute a batch command, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Follow Batch Command Operations topics to create script.
3. Click Command > Execute from the menu, which displays
the result as shown in Figure 211.
FIGURE 211 BATCH COMMAND RESULT

END OF STEPS

Opening a Batch Command Script


Purpose
Prerequisites

This function allows operator to open a batch command script


file and displays it in a new TAB page.
To open a batch command, meet the following requirements:

Steps

NetNumen N31 server and client must be started before


performing any operation.
Command script must already be created and saved.

To open a batch command, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click File > Open Script from the menu, which displays an
Script Open dialog box as shown in Figure 212.

236

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 9 Performance Management

FIGURE 212 SCRIPT OPEN

3. Select the path where script file is already saved and select
file type from Files of Type.
4. Click Open button.
END OF STEPS

Checking Syntax of Batch Command


Script
Purpose
Prerequisites

This function allows operator to perform syntax check of current


batch command scripts.
To check the syntax error, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To check the syntax error, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Open batch command script by performing operations from
the topic titled Opening a Batch Command Script.
3. Click Command > Syntax Check.
Note: Syntax check results will be displayed in the output
area. If errors occur during the checkup, it stops and gives
the corresponding error messages.
Syntax of a single command can also be checked in the
similar way.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION

237

NetNumenN31 Integrated Network Management Operation Manual

Modifying Batch Command Script


Purpose

Prerequisites

This function allows operator to modify an already created batch


command. A batch script can have more than one command in
one script.
To modify a batch command, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To modify a bath command, perform the following steps:


1. Click View > Command Line Terminal from the main
menu.
2. Click File > Open from the menu, which displays already
created batch command.
FIGURE 213 OPEN BATCH COMM AND

3. Modify command script and click File > Save Script, which
Save Batch Command Script dialog box as shown in Figure
214.

238

Confidential and Proprietary Information of ZTE CORPORATION

Chapter 9 Performance Management

FIGURE 214 S AVE B ATCH COMM AND

4. Select directory and file type and click Save button.


END OF STEPS

Getting Help
Viewing Man-Machine Language
(MML) Help
Purpose

This function is used to display help information of a configured


man-machine command.

Prerequisites

To view Man-Machine Language (MML) help, meet the following


requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view MML help, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Click Command > MML Help from the menu, which displays
the following interface as shown in Figure 215.

Confidential and Proprietary Information of ZTE CORPORATION

239

NetNumenN31 Integrated Network Management Operation Manual

FIGURE 215 VIEW MML HELP

3. Choose a man-machine command from left pane, which


displays corresponding help information on right pane.
Note: In the similar way each man-machine command help
information can be viewed. Read the following example as
reference.
Example:
Click Log Management > Query Log > Query detailed
information of a system log record from left pane, which
displays the MML help information on right pane of the
interface shown in Figure 215.
END OF STEPS

Viewing Inductive Help


Purpose
Prerequisites

This function is used to seek help related to a particular


command while writing manual command.
To view inductive help, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.

Steps

To view inductive help, perform the following steps:


1. Click View > Topology Management from the main menu.
2. Select command keyword during typing a command and click
<F4> button from the keyboard, which displays the help
related to that command.
END OF STEPS

240

Confidential and Proprietary Information of ZTE CORPORATION

Appendix

What is NMS?
NetNumen N31 integrated network management system is a
highly-customized, carrier-class and cross-platform Internet
infrastructure management platform designed with the latest
internet technology in a bottom-to-top manner. It is a scalable
high-performance Network Management System (NMS) provided
to carriers. It can satisfy the requirements for the constant
development of networks and for supporting various operating
systems and platform.

Confidential and Proprietary Information of ZTE CORPORATION

241

NetNumenN31 Integrated Network Management Operation Manual

This page is intentionally blank.

242

Confidential and Proprietary Information of ZTE CORPORATION

Glossary
SNMP
SNMP stands for simple network management protocol. SNMP
allows diverse network objects to participate in global network
management architecture. Network managing systems can poll
network entities implementing SNMP for information relevant to
a particular network management implementation. Network
management systems learn of problems by receiving traps or
change notices from network devices implementing SNMP.
SMTP
SMTP stands for simple mail transfer protocol, which is a mail
service modeled on the FTP file transfer service. SMTP transfers
mail messages between systems and provides notification
regarding incoming mail.
HTTP
HTTP stands for hypertext transfer protocol is an applicationlevel protocol with the lightness and speed necessary for
distributed, collaborative, hypermedia information systems.
Messages are passed in a format similar to that used by Internet
Mail and the Multipurpose Internet Mail Extensions (MIME).
FTP
FTP stands for file transfer protocol, which provides the basic
elements of file sharing between hosts. FTP uses TCP to create a
virtual connection for control information and then creates a
separate TCP connection for data transfers. The control
connection uses an image of the TELNET protocol to exchange
commands and messages between hosts.
TCP/IP
TCP stands for transmission control protocol. TCP provides a
reliable stream delivery and virtual connection service to
applications through the use of sequenced acknowledgment with
retransmission of packets when necessary. IP stands for internet
protocol, which is the routing layer datagram service of the
TCP/IP suite. All other protocols within the TCP/IP suite, except
Address Resolution Protocol (ARP) and Address Resolution
Protocol (RARP), use IP to route frames from host to host. The
IP frame header contains routing information and control
information associated with datagram delivery.

Confidential and Proprietary Information of ZTE CORPORATION

243

NetNumenN31 Integrated Network Management Operation Manual

This page is intentionally blank.

244

Confidential and Proprietary Information of ZTE CORPORATION

Abbreviations
Abbreviation

Full Name

CDR

Calling Data Record

CLI

Command Line Interface

CLT

Command Line Terminal

CORBA

Common Object Request Broker


Architecture

CPU

Central Processing Unit

DB

Database

DBMS

Database Management System

FTP

File Transfer Protocol

GRP

Group

GUI

Graphical User Interface

HDD

Hard Disk Drive

HTTP

Hypertext Transfer Protocol

IIS

Internet Information Server

IMP

Interface Message Processor

I-NMS

Integrated Network Management System

LAN

Local Area Network

MML

Man Machine Language

NE

Network Element

NE

Network Element/ Network Equipment

NMS

Network Management System

OCS

Online Charging System

OMS

Operation Maintenance System

PC

Personal Computer

QoS

Quality of Service

RAM

Random Access Memory

SCP

Service Control Point

SCP

Service Control Point

SIU

Subscriber Identification Unit

SMP

Service Management Point


Confidential and Proprietary Information of ZTE CORPORATION

245

NetNumenN31 Integrated Network Management Operation Manual

246

Abbreviation

Full Name

SMP

Service Management Point

SMTP

Simple Mail Transfer Protocol

SNMP

Simple Network Management Protocol

TCP/IP

Transmission Control Protocol/Internet


Protocol

TXT

Text

VC

Voucher Card

WAP

Wireless Application Protocol

XML

Extensible Markup Language

Confidential and Proprietary Information of ZTE CORPORATION

Figures
Figure 1 NetNumen NMS Architecture ...................................4
Figure 2 Networking...........................................................5
Figure 3 Server Starting Window .........................................7
Figure 4 Operator Login......................................................7
Figure 5 Network Management System .................................9
Figure 6 Lock Screen Confirm..............................................9
Figure 7 Operator Login (Lock Mode).................................. 10
Figure 8 Style Settings ..................................................... 11
Figure 9 Auto Screen Lock Setting ..................................... 12
Figure 10 Modify Operator Password ................................... 13
Figure 11 Modify Operator Information ............................... 14
Figure 12 Setting Print Range............................................ 15
Figure 13 Page Setup ....................................................... 15
Figure 14 Advance Settings............................................... 16
Figure 15 Confirm Logout ................................................. 18
Figure 16 Exiting The System ............................................ 18
Figure 17 View/Customize Operator Account Rules ............... 24
Figure 18 View Operation Tree .......................................... 27
Figure 19 Operation Tree Log Management....................... 27
Figure 20 Operation Tree Operation Description ................ 28
Figure 21 Security Event Rule ........................................... 29
Figure 22 Create Role Basic Information........................... 30
Figure 23 Create Role Access Rights ................................ 31
Figure 24 Create Role Login Address................................ 32
Figure 25 Setting IP Address ............................................. 32
Figure 26 Create Role Operator....................................... 33
Figure 27 Searching Role .................................................. 34
Figure 28 View Role ......................................................... 36
Figure 29 Create Duplicate Role......................................... 38
Figure 30 Create Role Set ................................................. 40
Figure 31 Role Assignment................................................ 41

Confidential and Proprietary Information of ZTE CORPORATION

247

NetNumenN31 Integrated Network Management Operation Manual

Figure 32 Searching Role Set ............................................ 42


Figure 33 Create Duplicate Role Set ................................... 45
Figure 34 Role Assignment ............................................... 46
Figure 35 Create User Basic User Information ................... 48
Figure 36 Assigning Role And Role Sets .............................. 50
Figure 37 Assigning Department ........................................ 51
Figure 38 User Login Parameters ....................................... 52
Figure 39 Setting Work Time............................................. 53
Figure 40 Find User ......................................................... 54
Figure 41 Modify User Information ..................................... 55
Figure 42 Create Duplicate Operator .................................. 58
Figure 43 User Lockup Record ........................................... 59
Figure 44 View User Lockup Records .................................. 60
Figure 45 Login User Management ..................................... 61
Figure 46 Access Rights.................................................... 62
Figure 47 Create Department Basic Information ................ 63
Figure 48 Setting Superior Department............................... 64
Figure 49 Find Department ............................................... 65
Figure 50 View Department............................................... 67
Figure 51 Create View ...................................................... 71
Figure 52 Modify View ...................................................... 72
Figure 53 Delete View ...................................................... 73
Figure 54 Configuring Map ................................................ 74
Figure 55 Create Group .................................................... 76
Figure 56 Select Node ...................................................... 77
Figure 57 Modify Group .................................................... 78
Figure 58 Move Group ...................................................... 80
Figure 59 Set Group Rules ................................................ 81
Figure 60 Set Group Member ............................................ 82
Figure 61 Topo Attributes ................................................. 83
Figure 62 Export Group .................................................... 84
Figure 63 Import Group.................................................... 85
Figure 64 Create NE......................................................... 87
Figure 65 Modify NE......................................................... 89
Figure 66 Measure Distance .............................................. 90
Figure 67 Create Virtual Link ............................................. 92

248

Confidential and Proprietary Information of ZTE CORPORATION

Figures

Figure 68 View Nodes....................................................... 94


Figure 69 Set Member ...................................................... 94
Figure 70 Select Member .................................................. 95
Figure 71 Modify Virtual Link ............................................. 96
Figure 72 View Virtual Link Attributes ................................. 97
Figure 73 Customize GUI Element...................................... 98
Figure 74 Topology Management Toolbar ............................ 99
Figure 75 Network Layout Settings................................... 100
Figure 76 Topology Management Filter ............................. 101
Figure 77 Statistical Information ...................................... 103
Figure 78 Basic Parameters Setting .................................. 105
Figure 79 SNMP Configuration ......................................... 107
Figure 80 Network Configuration...................................... 109
Figure 81 Node Configuration .......................................... 110
Figure 82 Filter Configuration .......................................... 111
Figure 83 Configure Polling Parameters.............................. 112
Figure 84 Add Polling Configuration Parameters .................. 114
Figure 85 Configure Polling Parameters.............................. 115
Figure 86 Synchronization Confirm................................... 116
Figure 87 Basic Information ............................................ 118
Figure 88 Specify Condition Templet ................................ 119
Figure 89 Specify Condition Templet ................................ 120
Figure 90 Specify Action Templet ..................................... 120
Figure 91 Modify Policy Details ........................................ 121
Figure 92 Modify Policy Period .......................................... 122
Figure 93 Find Policy ...................................................... 123
Figure 94 Query Operation Log ........................................ 127
Figure 95 Operation Logs Result ...................................... 128
Figure 96 Query Security Log .......................................... 129
Figure 97 Security Log Result .......................................... 130
Figure 98 Query System Log ........................................... 131
Figure 99 System Logs Result ......................................... 132
Figure 100 All Operation Logs.......................................... 132
Figure 101 Sorted Log Records in Descending Order (One
Column)........................................................................ 133
Figure 102 Combined Column Sorting............................... 133
Figure 103 Export Logs .................................................. 134

Confidential and Proprietary Information of ZTE CORPORATION

249

NetNumenN31 Integrated Network Management Operation Manual

Figure 104 Print Logs ..................................................... 135


Figure 105 Device Information ........................................ 139
Figure 106 View Application Server Performance ................ 140
Figure 107 Configure Server Performance ......................... 141
Figure 108 Version Information ....................................... 142
Figure 109 Directory Monitoring....................................... 143
Figure 110 Directory Monitoring Task Details ..................... 144
Figure 111 Directory Monitoring Task Information .............. 145
Figure 112 Period Information ......................................... 145
Figure 113 Database Login ............................................. 146
Figure 114 View Database Resources Details ..................... 148
Figure 115 Table Information .......................................... 148
Figure 116 Process Information ....................................... 149
Figure 117 Monitor Database Details ................................ 150
Figure 118 Table Collection Operations ............................. 151
Figure 119 Basic Information .......................................... 151
Figure 120 Operation ..................................................... 152
Figure 121 Period .......................................................... 153
Figure 122 Real-time Alarm Monitoring ............................. 157
Figure 123 Alarm Details ................................................ 158
Figure 124 Real-time Alarm Monitor Toolbar ...................... 158
Figure 125 Real-time History Alarm Monitoring .................. 159
Figure 126 Real-time Alarm Monitor Toolbar ...................... 160
Figure 127 Query Condition Setting.................................. 161
Figure 128 Real-time Notification Monitoring Toolbar .......... 161
Figure 129 Real-time Event Monitoring ............................. 162
Figure 130 Event Monitoring Toolbar ................................. 162
Figure 131 Alarm Synchronization.................................... 164
Figure 132 Location ....................................................... 165
Figure 133 Current Alarms Toolbar................................... 166
Figure 134 Query Current Alarms..................................... 167
Figure 135 Current Alarms.............................................. 167
Figure 136 Query Current Alarms..................................... 168
Figure 137 Historical Alarms Toolbar ................................ 169
Figure 138 Query Current Alarms..................................... 170
Figure 139 Historical Alarms ........................................... 171

250

Confidential and Proprietary Information of ZTE CORPORATION

Figures

Figure 140 Query Historical Alarms .................................. 171


Figure 141 Notifications Toolbar....................................... 172
Figure 142 Query Notifications ........................................ 173
Figure 143 Notifications.................................................. 173
Figure 144 Query Notifications ........................................ 174
Figure 145 Events Toolbar .............................................. 175
Figure 146 Query Events ................................................ 176
Figure 147 Events ......................................................... 177
Figure 148 Query Events ................................................ 177
Figure 149 Report Templates .......................................... 179
Figure 150 Search Template............................................ 179
Figure 151 Templates .................................................... 180
Figure 152 Viewing Average Period Statistics by Alarm Severity
................................................................................... 181
Figure 153 Average Period Stat. by Alarm Severity............. 182
Figure 154 Report Templates .......................................... 182
Figure 155 Search Template............................................ 183
Figure 156 Templates .................................................... 184
Figure 157 Viewing Average Period Statistics by Alarm Severity
................................................................................... 185
Figure 158 Average Period Stat. by Alarm Severity............. 186
Figure 159 Management Setting Rule ............................... 187
Figure 160 Add Rule ...................................................... 188
Figure 161 Management Rule Setting ............................... 189
Figure 162 Edit Management Rule.................................... 190
Figure 163 Severity Management Toolbar ......................... 193
Figure 164 Add Maintenance Suggestions.......................... 194
Figure 165 Edit Maintenance Suggestion Information .......... 195
Figure 166 Import Suggestions........................................ 196
Figure 167 Export Suggestions ........................................ 197
Figure 168 Severity Management Toolbar ......................... 198
Figure 169 Alarm Severity Conditions ............................... 198
Figure 170 Sound Setting ............................................... 199
Figure 171 Color Setting................................................. 200
Figure 172 Performance Management............................... 203
Figure 173 Select Device ................................................ 203
Figure 174 Select Performance Condition .......................... 204

Confidential and Proprietary Information of ZTE CORPORATION

251

NetNumenN31 Integrated Network Management Operation Manual

Figure 175 Choose Index ................................................ 204


Figure 176 Select Task Type ........................................... 205
Figure 177 Select Task Time ........................................... 206
Figure 178 Select Task Type ........................................... 207
Figure 179 Select Task Time ........................................... 207
Figure 180 Suspend Confirm ........................................... 208
Figure 181 Task Details .................................................. 209
Figure 182 Statistics Performance .................................... 211
Figure 183 Threshold Parameters..................................... 211
Figure 184 Threshold Records ......................................... 212
Figure 185 Modify Threshold ........................................... 213
Figure 186 Activate Confirm............................................ 215
Figure 187 Deactivate Confirm ........................................ 216
Figure 188 Real-time Performance ................................... 216
Figure 189 Real-time Performance ................................... 217
Figure 190 History Performance Toolbar ........................... 217
Figure 191 History Performance....................................... 219
Figure 192 Multi-IP Contrast Graph .................................. 220
Figure 193 History Performance Toolbar ........................... 220
Figure 194 History Performance....................................... 221
Figure 195 Trend Graph ................................................. 222
Figure 196 History Performance Toolbar ........................... 222
Figure 197 History Performance....................................... 223
Figure 198 Multi-Instance Contrast Graph ......................... 224
Figure 199 History Performance Toolbar ........................... 224
Figure 200 History Performance....................................... 225
Figure 201 Table ........................................................... 226
Figure 202 History Performance Toolbar ........................... 226
Figure 203 Buffer Configuration ....................................... 228
Figure 204 Manual Input ................................................ 230
Figure 205 Graphics Input .............................................. 231
Figure 206 Command Prompt .......................................... 231
Figure 207 Switch Manual to Graphics Input ...................... 232
Figure 208 Command Prompt .......................................... 233
Figure 209 Command Prompt .......................................... 234
Figure 210 Save Batch Command Script ........................... 235

252

Confidential and Proprietary Information of ZTE CORPORATION

Figures

Figure 211 Batch Command Result................................... 236


Figure 212 Script Open................................................... 237
Figure 213 Open Batch Command .................................... 238
Figure 214 Save Batch Command .................................... 239
Figure 215 View MML Help .............................................. 240

Confidential and Proprietary Information of ZTE CORPORATION

253

NetNumenN31 Integrated Network Management Operation Manual

This page is intentionally blank.

254

Confidential and Proprietary Information of ZTE CORPORATION

Tables
Table 1 Chapter Summary ...................................................i
Table 2 Typographical Conventions ...................................... ii
Table 3 Mouse Operation Conventions ................................. iii
Table 4 Operator Login Parameters ......................................8
Table 5 Modify Password Parameters .................................. 13
Table 6 Security Policy Parameters..................................... 24
Table 7 Role Basic Information .......................................... 30
Table 8 Setting IP Range Parameters.................................. 33
Table 9 Create Role Set Parameters ................................... 40
Table 10 Basic User Information Parameters........................ 48
Table 11 Basic User Information Parameters........................ 52
Table 12 Basic Department Information .............................. 64
Table 13 Configuring Map Parameters................................. 74
Table 14 Create Group Parameters..................................... 76
Table 15 Create NE Parameters ......................................... 87
Table 16 Create Virtual Link Parameters ............................. 92
Table 17 Customize GUI Element Description....................... 98
Table 18 Configure Basic Parameters................................ 105
Table 19 Configure SNMP Parameters ............................... 107
Table 20 Polling Configuration Parameters......................... 112
Table 21 Create Policy Parameters ................................... 118
Table 22 Query Operation Log Parameters ........................ 127
Table 23 Query Security Log Parameters........................... 129
Table 24 Query System Log Parameters............................ 131
Table 25 Buttons for Alarm Monitoring.............................. 158
Table 26 Buttons for History Alarm Monitoring .................... 160
Table 27 Buttons for Notification Monitoring ...................... 161
Table 28 Buttons for Event Monitoring .............................. 162
Table 29 Alarm Management Rule .................................... 189

Confidential and Proprietary Information of ZTE CORPORATION

255

NetNumenN31 Integrated Network Management Operation Manual

Table 30 Threshold Parameters ....................................... 211


Table 31 Create Virtual Link Parameters ........................... 228

256

Confidential and Proprietary Information of ZTE CORPORATION

Index
A
abbreviations.................... 259
Access..............22, 31, 61, 62
Acknowledging.................. 197
Activate ........................... 122
Adding 145, 152, 164, 194, 201
Assigning ..................... 50, 51
Authentication .................... 49

B
Backup ..................... 122, 123
Batch .... 2, 239, 240, 246, 247,
248, 249, 250

Event21, 28, 29, 170, 180, 183,


195, 197
Executing .. 121, 128, 239, 245,
247
Exporting71, 85, 131, 140, 141,
164, 205

F
Fault ..............................
Filtering...........................
Find ..........34, 41, 54, 65,
Forwarding ......................

See
197
127
197

Historical ......... 164, 177, 179

Clearing........................... 197
Clearup .......................... 153
Command line terminal .. 2, 239
Configuring71, 75, 76, 145, 149,
239, 240
Connection................ 134, 135
Copying ....................... 71, 87
Correlation ....... 178, 196, 199
Counting.......................... 197
Creating 21, 22, 29, 38, 39, 46,
47, 58, 62, 73, 77, 88, 93,
121, 122, 240, 246, 250

D
Database. 2, 6, 123, 145, 154,
155, 156, 157, 158
Delaying .......................... 197
delete36, 37, 38, 43, 44, 56, 57,
60, 61, 62, 67, 68, 74, 75,
80, 90, 91, 92, 98, 99, 116,
117, 127, 142, 143, 154,
194, 197, 199, 200, 203
Deleting.22, 36, 43, 56, 60, 67,
71, 72, 74, 80, 90, 91, 98,
121, 127, 132, 142, 164,
199, 203
department . 50, 51, 62, 63, 64,
65, 66, 67, 68, 125, 127
Directory Monitoring145, 151,
152, 153
Disabling ........... 164, 199, 200
Discarding........................ 197
Duplicating... 22, 37, 44, 57, 58

Importing ...... 71, 86, 164, 204

L
latitude ........................76, 77
Layout .............. 100, 101, 102
Link 72, 93, 94, 95, 96, 97, 98,
99, 115, 178, 196, 199, 240
Log .. ii, 2, 6, 8, 10, 12, 23, 27,
73, 122, 123, 131, 132, 133,
134, 135, 136, 137, 138,
140, 141, 142, 146, 147,
148, 149, 150, 151, 152,
154, 155, 157, 174, 243,
244, 252
Logging ............. 145, 154, 155
Log-on6, 8, 10, 12, 23, 73, 122,
132, 146, 174
longitude ......................75, 76

M
Merging........................... 197
Modify . 12, 13, 14, 23, 26, 35,
42, 55, 59, 66, 74, 79, 80,
91, 92, 95, 96, 97, 98, 115,
125
Modifying. 6, 12, 13, 21, 22, 23,
35, 42, 55, 58, 66, 71, 72,
74, 79, 90, 97, 121, 125
monitor2, 3, 21, 151, 157, 165,
167, 168, 169, 170, 197
Monitoring ................ 164, 170

N
Notification . 168, 169, 195, 197

Editing............... 164, 198, 202

Confidential and Proprietary Information of ZTE CORPORATION

257

NetNumenN31 Integrated Network Management Operation Manual

O
Operator . 6, 7, 8, 9, 10, 12, 13,
14, 21, 22, 23, 24, 30, 31,
33, 35, 36, 37, 38, 40, 42,
43, 44, 47, 48, 49, 50, 51,
52, 53, 54, 55, 56, 57, 58,
59, 60, 61, 62, 66, 67, 74,
75, 76, 78, 79, 80, 85, 86,
90, 91, 94, 95, 96, 97, 98,
99, 102, 103, 115, 122, 123,
127, 128, 133, 135, 141,
142, 149, 152, 154, 155,
157, 159, 197, 198, 199,
200, 202, 203, 204, 205,
207, 243

P
parameters.......................... 8
Password ..... 8, 12, 13, 49, 154
Period information..........153
Persisting .........................197
Policyii, 3, 21, 23, 24, 121, 122,
123, 125, 126, 127, 128
process ............................145

Q
Querying ... 22, 53, 71, 84, 121,
126, 131, 132, 134, 136,
143, 164, 173, 177, 180,
183

R
Rank ........................134, 137
Restraining .......................197

258

Confidential and Proprietary Information of ZTE CORPORATION

Rights ...............29, 31, 61, 62


Role 21, 22, 29, 30, 31, 32, 33,
34, 35, 36, 37, 38, 39, 40,
41, 42, 43, 44, 45, 46, 47,
49, 50, 54, 65, 117
Role Set22, 38, 39, 40, 41, 42,
43, 44, 45, 46, 47
rule................................. 198

S
search ...33, 34, 41, 53, 54, 64,
84, 126, 127, 132, 135, 136,
138
Searching21, 22, 33, 34, 41, 64,
65
security .ii, 2, 4, 21, 23, 28, 29,
47, 54, 55, 57, 59, 133, 135
Setting ..................... 164, 207
Severity.................... 164, 206
Sound ...................... 164, 207
Source............................. 137
Synchronization ..118, 171, 172

V
validity ................. 48, 49, 126
Viewing .21, 22, 26, 34, 35, 38,
42, 43, 46, 54, 56, 61, 65,
66, 72, 99, 145, 148, 151,
164, 206, 240, 244, 251,
252

................................. 121

You might also like