Professional Documents
Culture Documents
Operation Manual
Version 4.1.0
ZTE CORPORATION
ZTE Plaza, Keji Road South,
Hi-Tech Industrial Park,
Nanshan District, Shenzhen,
P. R. China
518057
Tel: (86) 755 26771900 800-9830-9830
Fax: (86) 755 26772236
URL: http://support.zte.com.cn
E-mail: doc@zte.com.cn
LEGAL INFORMATION
Copyright 2006 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided as is, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
Date
Revision No.
Serial No.
R1.0
Sjzl20061906
First edition
ZTE CORPORATION
Values Your Comments & Suggestions!
Your opinion is of great value and will help us improve the quality of our product
documentation and offer better services to our customers.
Please fax to (86) 755-26772236 or mail to Documentation R&D Department, ZTE
CORPORATION, ZTE Plaza, A Wing, Keji Road South, Hi-Tech Industrial Park,
Shenzhen, P. R. China 518057.
Thank you for your cooperation!
Document
Name
Product Version
V4.1.0
Document Revision
Number
R1.0
Fair
Average
Poor
Bad
N/A
Accessibility:
(Contents, Index, Headings, Numbering, Glossary)
Good
Fair
Average
Poor
Bad
N/A
Intelligibility:
(Language, Vocabulary, Readability & Clarity, Technical Accuracy, Content)
Good
Fair
Average
Poor
Bad
N/A
Please check the suggestions which you feel can improve this documentation:
Your
suggestions for
improvement of
this
documentation
Other suggestions
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
# Please feel free to write any comments on an attached sheet.
If you wish to be contacted regarding your comments, please complete the following:
Name
Company
Postcode
Address
Telephone
Contents
About this Manual ............................................................. i
Purpose ................................................................................ i
Intended Audience ................................................................. i
Prerequisite Skill and Knowledge .............................................. i
What Is in This Manual ........................................................... i
Related Documentation.......................................................... ii
Conventions ......................................................................... ii
How to Get in Touch............................................................. iii
Chapter 1.......................................................................... 1
Integrated Network Management System ..................... 1
System Overview.................................................................. 1
Starting NetNumen N31 Server and Client ................................ 6
Logging into NetNumen N31 ................................................... 8
Locking the Screen................................................................ 9
Settings....................................................................... 10
Overview ........................................................................... 10
Setting Window Styles ......................................................... 10
Setting the Period of Automatically Locking Screen .................. 11
Modifying the Password ....................................................... 12
Modifying Operator Information ............................................ 13
Setting Printing .................................................................. 14
Chapter 2........................................................................ 21
Overview ........................................................................... 21
Overview ...........................................................................23
Setting Operator Account Rules .............................................23
Viewing Operation Tree ........................................................26
Setting Security Event Rules ................................................. 28
Chapter 3........................................................................ 69
Overview ........................................................................... 69
Group Operations.......................................................... 75
Overview ........................................................................... 75
Creating a Group ................................................................ 75
Modifying a Group............................................................... 77
Deleting a Group................................................................. 78
Moving a Group .................................................................. 79
Setting Group Rules ............................................................ 80
Setting Group Members ....................................................... 81
Querying Group Attributes.................................................... 82
Exporting Group Info ........................................................... 83
Importing Group Info .......................................................... 84
Copying and Pasting Group .................................................. 85
NE Operations .............................................................. 86
Overview ........................................................................... 86
Creating an NE ................................................................... 86
Moving an NE ..................................................................... 88
Modifying an NE.................................................................. 88
Deleting an NE ................................................................... 89
Viewing the Distance between two NEs .................................. 90
Chapter 4......................................................................117
Overview ......................................................................... 117
Creating Policy.................................................................. 117
Modifying Policy ................................................................ 121
Querying Policy ................................................................. 122
Deleting Policy .................................................................. 123
Executing Policy ................................................................ 124
Chapter 5......................................................................125
Overview ......................................................................... 125
Chapter 8......................................................................201
Performance Management ..........................................201
Overview ......................................................................... 201
Intended Audience
This document is intended for operators who perform operation
activities on integrated network management system.
Chapter
Summary
Chapter 1 Integrated
Network Management
System
Chapter
Summary
Chapter 2 Security
Management
Chapter 3 Topology
Management
Chapter 4 Policy
Management
Chapter 5 Log
Management
Chapter 6 System
Management
Chapter 7 Fault
Management
Chapter 8 Performance
Management
Chapter 9 Command
Line Terminal
Related Documentation
The following documentation is related to this manual:
NetNumen
Integrated
Technical Manual
Network
Management
System
NetNumen
Integrated
Network
Installation Manual - Software
Management
System
Conventions
Typographical
Conventions
ii
Typeface
Meaning
Italics
Bold
Right-click
Typeface
Meaning
Constant width
Note:
Mouse
Operation
Conventions
Typeface
Meaning
Click
Right-click
Double-click
Documentation
Support
iii
iv
Chapter
Integrated Network
Management System
System Overview
Introduction
Functions and
Features
Command Line
Terminal
Single command
Batch command
Topology
Management
Security
Management
System
Management
Log
Management
log
Policy
Management
Fault
management
Features
Large-scale
Distributed
System
Integration
with Thirdparty
Applications
Remote
Management
Ability
(NMS)
can
be
High Reliability
Architecture
and
Networking
Client
Network
managemen
t server
NE
NE
Database
server
NE
NE
NE
NE
Networking
Mode
DATABASE
CLIENT
CLIENT
IP
IP
10Base-T
NE
NE
NE
NE
I-NMS system can adopt out-of-band networking mode or inband networking mode.
In out-of-band networking mode, NE of the system is directly
accessed by IP network through Ethernet interface of front panel
of main control board on the NE. NM center is also accessed by
IP network in a similar manner. This allows direct IP
interworking between the system and NE. An advantage of outband networking mode is that NM channel and traffic channel
are completely independent, so that transmission of NM
information will not be interrupted even in case of traffic channel
failure. In addition, NEs are not related directly, so a failure of
one NE will not affect management of other NEs.
In in-band networking, an NE of the system is accessed to IP
network through its uplink interface, and NM center is also
accessed by IP network in a similar manner, so that direct IP
interworking and communication between system and an NE can
be performed through network interface. Advantages of in-band
networking mode are to transmit system information with traffic
channels without setting up a special NMS network, featuring
flexible and convenient networking.
Contents
Topic Title
Page No.
Topic Title
Page No.
Setting
Overview
10
10
11
12
13
Setting Printing
14
16
17
17
18
18
END OF STEPS
Steps
>
NetNumen
N31
>
>
NetNumen
N31
>
Steps
Parameters
Description
Input
Operator name
Admin
Password
Server Address
127.0.0.1
Prerequisites
Steps
Settings
Overview
This module provides operational steps to set window styles, set
the auto locking period, modify password, and operator
information, and set printing parameters.
10
Steps
11
Prerequisites
To lock the
requirements:
Steps
screen
automatically,
meet
the
following
Steps
12
Parameters
Description
Input
Old password
admin
New password
nimda
Confirmed
password
nimda
Steps
13
Setting Printing
Purpose
Prerequisites
Steps
14
15
Setting Intergrated
Application View
Showing/Hiding Tool Bar
Purpose
Prerequisites
Tool bar is added in the main window. Tool bar contains the
buttons to perform such operations with more convenience.
To show/hide tool bar, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.
Steps
16
END OF STEPS
Steps
Prerequisites
Steps
17
Steps
18
19
Chapter
Security Management
Overview
Introduction
Contents
Topic Title
Page No.
23
23
26
28
Role Management
Overview
29
Creating a Role
29
Searching a Role
33
21
Topic Title
Page No.
Refreshing Roles
34
Modifying a Role
35
Viewing a Role
35
Deleting a Role
36
Duplicating a Role
37
38
39
39
41
42
43
43
44
44
46
User Management
Overview
47
Creating a User
47
Searching a User
53
Refreshing Users
54
54
Viewing a User
56
Deleting a User
56
Duplicating a User
57
58
60
61
Department Management
22
Overview
62
Creating a Department
63
Searching a Department
64
Refreshing Departments
65
Modifying a Department
66
Viewing a Department
66
Deleting a Department
67
Prerequisites
Steps
Account
Rules
23
Parameters
Description
Input
Min password
length
Minimum password
length that can be set for
operator account.
24
Parameters
Description
Input
Max password
length
Maximum password
length that can be set for
operator account.
20
If password length is
greater than this value,
operator is unable to
login.
Enable weak
password check
This parameter
can be set in
two steps:
Account
restriction
(This provides
the operator
account to be
locked after a
few wrong
password
entries.)
Set numeric
character in
Maximal
count
of
chars
in
password
to a certain
number for
example 3.
Hint the
operator when
Click
Enable
weak
password
check
checkbox to
enable this
option.
account is locked
after a certain
number of wrong
entries
Choose Lock
account and
input:
3
24
account is unlocked
after certain
number of days
Indicates a hint to
operator before certain
25
Parameters
Description
password
has days to
expire
Input
Prerequisites
Steps
26
27
Prerequisites
Steps
28
Security
event
locked/unlocked.
generated
when
operator
is
ii. Security
event
disabled/enabled.
generated
when
operator
is
Role Management
Overview
Introduction
Creating a Role
Purpose
Prerequisites
29
30
Parameters
Description
Input
Role name
newRole
Role
description
Description is supplementary
explanation of a role name. It
can also contain some useful
Created by
mani
Parameters
Description
Input
31
32
Parameters
Description
IP Plan(P)
Start IP
End IP
IP range
description
Searching a Role
Purpose
Prerequisites
33
3. Enter Role name in the text box and click Find button.
Note: Enable case
Sensitive checkbox.
sensitive
option
by
clicking
Case
Refreshing Roles
Purpose
Prerequisites
Steps
34
Click
END OF STEPS
Modifying a Role
Purpose
Prerequisites
Steps
Viewing a Role
Purpose
Prerequisites
Steps
35
Deleting a Role
Purpose
Prerequisites
Steps
36
Duplicating a Role
Purpose
Prerequisites
Steps
37
END OF STEPS
Steps
38
Prerequisites
Steps
39
Parameters
Description
Input
RoleSet
Role set
description
Created by
mani
Checked
40
button. This
Prerequisites
Steps
41
3. Enter Role set name in the text box and click Find button.
Note: Enable case
Sensitive checkbox.
sensitive
option
by
clicking
Case
Steps
Click
END OF STEPS
42
Steps
Steps
43
Prerequisites
There are some unwanted role sets that need to be deleted due
to some reasons. This procedure describes how to delete
provided role sets.
To delete a role set, meet the following requirements:
Steps
Prerequisites
Steps
44
2. Click Role set management and click role name from right
pane.
3. There are two ways to create a duplicate role set, which are
as follows:
45
END OF STEPS
Steps
46
User Management
Overview
Introduction
Creating a User
Purpose
Prerequisites
Steps
from
left
pane
of
security
47
48
Parameters
Description
Input
User name
noman
Full name
No Man
Chaud
User password
Verify password
User
descriptions
Created by
mani
Account validity
Enter
Parameters
Description
Input
(days)
number of
days or
Click
Never
expire
checkbox.
Password
validity
Authentication
mode
Enter
number of
days or
Click
Never
expire
checkbox.
Password
Authentication is performed by
from password by selecting
Password option.
Authenticates is performed by
digital signatures by selecting
Certificate.
User status
Unchecked
49
Important!
f
50
51
Parameters
Description
Input
Search days
(Max=1000)
52
Lockup records
Total of logins
10
10
Parameters
Description
Input
10
Searching a User
Purpose
Prerequisites
Steps
from
left
pane
of
security
53
4. Enter user name to search in User name text box and click
Find button from Figure 40.
Note: Enable case
Sensitive checkbox.
sensitive
option
by
clicking
Case
END OF STEPS
Refreshing Users
Purpose
Prerequisites
Steps
Click
END OF STEP
Steps
from
left
pane
of
security
Note:
f
55
Viewing a User
Purpose
Prerequisites
Steps
Deleting a User
Purpose
Prerequisites
Steps
56
Duplicating a User
Purpose
Prerequisites
Steps
from
left
pane
of
security
57
END OF STEPS
Prerequisites
Steps
58
from
left
pane
of
security
5. Click Login TAB page and click View user lockup records,
which displays View User Lockup Records interface as
shown in Figure 44.
59
Steps
60
Steps
61
Department Management
Overview
Introduction
62
department.
handling of
or delete a
department
Creating a Department
Purpose
Prerequisites
Steps
63
Parameters
Description
Input
Department
name
ServiceDeptt
Department
description
Created by
mani
Searching a Department
Purpose
Prerequisites
64
2. Enter Role set name in the text box and click Find button.
Note: Enable case
Sensitive checkbox.
sensitive
option
by
clicking
Case
END OF STEPS
Refreshing Departments
Purpose
Prerequisites
Steps
65
END OF STEPS
Modifying a Department
Purpose
Prerequisites
Steps
Viewing a Department
Purpose
Prerequisites
information,
meet
the
following
66
Deleting a Department
Purpose
Prerequisites
67
Steps
68
Chapter
Topology Management
Overview
Introduction
Contents
Topic Title
Page No.
Overview
69
71
72
72
Configuring Map
73
Group Operations
Overview
75
Modifying a Group
77
Deleting a Group
78
Moving a Group
79
80
81
82
83
84
85
NE Operations
Overview
86
69
Topic Title
Page No.
Moving an NE
88
Modifying an NE
88
Deleting an NE
89
91
Setting Members
93
95
96
97
90
98
99
100
101
102
102
103
103
104
104
106
Configuring Network
108
Configuring Node
109
Configuring Filter
110
Polling Configuration
70
Overview
111
111
114
114
115
Synchronizing Topology
116
Steps
3. Enter view name in the text box and enable Auto apply rule
option by clicking checkbox.
4. Click OK button to save entered values and create a logical
view.
END OF STEPS
71
Prerequisites
Steps
Prerequisites
72
Steps
Configuring Map
Purpose
Prerequisites
Steps
73
74
Parameters
Description
Input
Start
longitude
-180
End longitude
180
Start latitude
-90
Parameters
Description
Input
End latitude
90
Group Operations
Overview
Groups are created to manage alike NEs, links, and users.
Different groups are created for different users. In one group
configuration of NEs and links are the same.
Creating a Group
Purpose
Prerequisites
Steps
75
Parameters
Description
Input
Parent group
10.41.42.245
Group name
newGroup
Group type
Click to choose
Group as a
general group
type.
Group
description
Description is the
supplementary explanation of
a group name. It can also
contain some useful
information related to group.
Created by
mani
76
Modifying a Group
Purpose
Prerequisites
Steps
77
Deleting a Group
Purpose
Prerequisites
Steps
78
Moving a Group
Purpose
Prerequisites
Steps
Right-click the group name from the left pane and choose
Move Group and NE.
Click the group name from the left pane and click Operation
> Move Group and NE menu.
Result: Move Group interface appears as shown in Figure
58.
79
Prerequisites
There are three group rules to be set for groups. These are IP
Address Rule, Device Type Rule and Location Rule. Each rule has
its own parameters to set.
To set group rule, meet the following requirements.
NetNumen N31 server and client must be started before
performing any operation.
Steps
80
END OF STEPS
81
Prerequisites
82
In the main
Attributes.
menu,
click
Operation
>
Show
Topo
Groups can be exported in .xml file. Operator can save this file
anywhere on the system.
To export group information, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.
Steps
83
*.xml
file,
enter
END OF STEPS
Prerequisites
Steps
84
Steps
4. Right-click the server from server root tree on left pane, and
click Paste Group.
Result: Group is copied to the server root.
END OF STEPS
85
NE Operations
Overview
Network Element (NE) is the component of a network, which is
used to provide particular service operations. This can be a
server or system providing service operations. These operations
are of different types; for example database services, short
messaging service (SMS) and multimedia messaging services
(MMS). NEs are the entities, which can be included in multiple
networks.
Creating an NE
Purpose
Prerequisites
Steps
86
FIGURE 64 CREATE NE
Parameters
Description
IN Media Server
IN IIS
IN Application
Server
IN DB Server
IN Data
Warehouse
Server
IN IMP
IN SCP
IN VC
IN CDR Server
87
Parameters
Description
IN WEB Server
IN Compound
Device
IN-SIUModule
IN WAP GW
OCS
Moving an NE
Purpose
Prerequisites
This function allows operator to move NEs from their own place
to other NEs. This procedure describes how to move existing NEs.
To move an NE, meet the following requirements:
Steps
Modifying an NE
Purpose
88
Prerequisites
Steps
Deleting an NE
Purpose
Prerequisites
Steps
89
Click
Steps
90
Prerequisites
Steps
91
92
Parameters
Description
Input
Parent Link
All Links
Name
Alias
newLink
Link Type
Virtual
Link
From NE
newVNE
From Port
21099
Parameters
Description
Input
To NE
newVNE
To Port
21099
Description
Created by
mani
Setting Members
Purpose
Prerequisites
Steps
93
94
Prerequisites
Steps
95
Prerequisites
Steps
96
END OF STEPS
Prerequisites
Steps
97
Prerequisites
Steps
98
Parameters
Description
Customize type
image
Customize link
facade
Customize state
image
Customize state
color
Other
Prerequisites
Steps
99
Prerequisites
Steps
100
101
Prerequisites
Steps
Steps
102
Steps
Steps
103
Prerequisites
Steps
Prerequisites
Steps
104
Parameters
Description
Input
Enable/Disable
Discovery
Checkbox
is
unchecked
Checkbox
is checked
Enable Raw
ICMP
Checkbox
is checked
Enable/Disable
Sweep
Checkbox
is
unchecked
Enable/Disable
Prediscovery
Checkbox
is
unchecked
105
Parameters
Description
Input
Enable/Disable
Local Net
Checkbox
is
unchecked
Discovery
interval
(minute)
120
Discovery
Thread
Prerequisites
Steps
106
Parameters
Description
Input
SNMP Timeout
SNMP Retries
SNMP Port
161
SNMP Order
v2 v1
SNMP
Community
Public
107
Parameters
Description
Input
SNMP Write
Community
Private
SNMPV3
Configuring Network
Purpose
Prerequisites
Steps
108
IS
Configuring Node
Purpose
Prerequisites
Steps
109
Configuring Filter
Purpose
Prerequisites
Steps
110
Polling Configuration
Overview
Introduction
111
Prerequisites
Steps
112
Parameters
Description
Input
ne type
Null
setting
indicates all
types.
This
parameter is
set only when
the moc is
SnmpNode.
moc
Information model.
Moc of IN
devices is
SNMPNode.
interval
(minute)
retry
Parameters
Description
Input
threshold
timeout (sec)
usertester
Self-defined
implementation
class can be
set for
different moc.
If set as blank
it uses default
class.
useralarmer
Self-defined
implementation
class can be
set for
different mocs.
If set as blank
it uses default
class.
usergetter
Self-defined
implementation
class can be
set for
different mocs.
If set as blank
it uses default
class.
usersetter
Self-defined
implementation
class can be
set for
different mocs.
If set as blank
it uses default
class.
Topic
extended
Snmp Node
True/Falseot
mandatory.
The default
value is False.
113
Prerequisites
Steps
To modify polling
following steps:
configuration
parameters,
perform
the
Prerequisites
114
Steps
Steps
Click
END OF STEPS
115
Synchronizing Topology
Purpose
Prerequisites
Steps
116
Chapter
Policy Management
Overview
Introduction
Contents
Topic Title
Page No.
Overview
117
Creating Policy
117
Modifying Policy
121
Querying Policy
122
Deleting Policy
123
Executing Policy
124
Creating Policy
Purpose
Prerequisites
117
Steps
Parameters
Description
Input
Policy name
Backup
Policy status
Activate
118
Condition
Templet
Parameters
Description
Input
Policy action
Backup and
Delete Log
Policy
Note:
f
the
policy
119
120
Modifying Policy
Purpose
Prerequisites
Steps
121
Querying Policy
Purpose
Prerequisites
Steps
122
sensitive
option
by
clicking
Case
END OF STEPS
Deleting Policy
Purpose
Prerequisites
Steps
123
Executing Policy
Purpose
Prerequisites
Steps
124
Chapter
Log Management
Overview
Introduction
Log recording,
Log management.
Operation logs,
Security logs,
System logs.
Topic Title
Page No.
Overview
125
Querying Logs
Overview
126
126
129
130
132
133
Maintaining Logs
Overview
134
134
135
Deleting Logs
135
125
Querying Logs
Overview
This module provides operational steps to query operation,
security and system logs by specifying conditions. It also
includes querying all logs without specifying any condition.
Prerequisites
Steps
126
Parameters
Description
Input
User name
Admin
Operation
result
Successful
operation
Command
function
127
Parameters
Description
Operation
resource
Input
Server
From
2006-9-17
9:53:14
To
2006-9-18
9:53:14
Connection
mode
TELNET
IMPORTANT
END OF STEPS
128
Prerequisites
Steps
Parameters
Description
Input
User name
Admin
All
Log name
129
Parameters
Description
Input
Connection
mode
TELNET
2006-9-17
9:53:14
To
2006-9-18
9:53:14
Description
END OF STEPS
Prerequisites
Steps
130
Parameters
Description
Input
Rank
IMPORTANT
All
Log
Management
2006-9-17
9:53:14
To
2006-9-18
9:53:14
131
Parameters
Description
Input
Description
END OF STEPS
Prerequisites
To search for all logs, this procedure provides certain steps. This
procedure does not need to specify conditions. It shows all the
logs existing in the system.
To query all logs, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.
Steps
END OF STEPS
Prerequisites
While browsing the log records, operator can have them sorted
in ascending or descending order with reference to specific field
or fields.
To sort log records, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.
Steps
and
END OF STEPS
133
Maintaining Logs
Overview
This module provides operational steps for exporting, printing
and deleted unwanted logs.
Logs are saved for viewing in future. These logs can be exported
to file excel, xml, pdf, txt and cvs formats.
To export log records, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.
Steps
3. Select file type and enter file name in the above interface,
and click OK button.
Note: Operator can select any path for the file to be
exported.
END OF STEPS
134
Steps
Deleting Logs
Purpose
Prerequisites
135
Steps
after
136
Chapter
System Management
Overview
Introduction
Contents
Topic Title
Page No.
Overview
137
138
139
139
140
141
142
143
144
146
147
147
137
Topic Title
Page No.
149
150
Maintaining Application
Server
Overview
This module provides operational steps for maintaining
application server. It includes operations such as refreshing the
system management view, saving position information, showing
device information, viewing application server performance,
configuring performance monitoring parameters, viewing
NetNumen version number, viewing directory information, and
adding directory monitoring task.
Prerequisites
Steps
138
Prerequisites
Steps
Prerequisites
Steps
139
Prerequisites
Steps
END OF STEPS
140
1Prerequisites
Steps
141
Prerequisites
Steps
142
Prerequisites
Steps
143
Prerequisites
Steps
144
145
Steps
146
END OF STEPS
Steps
Prerequisites
Steps
147
148
Prerequisites
This function is used to monitor the hard disk space used by the
database. It sets hard disk space for maximum limit and alarms
when certain threshold is reached.
To monitor database, meet the following requirements:
Steps
149
and
enter
numeral
Prerequisites
150
Steps
2. Right-click the blank space and click to choose Add from pop
up menu to add table collection information, which displays
an interface shown in Figure 119.
FIGURE 119 BASIC INFORMATION
151
152
153
154
Chapter
Fault Management
Overview
Introduction
Device alarms
Background
alarms
Device alarms
Background alarms
Contents
Topic Title
Page No.
Overview
155
Monitoring in
Overview
157
155
Topic Title
Page No.
157
159
160
162
Synchronizing Alarms
163
Querying Alarms
Overview
165
165
169
Querying Notifications
172
Querying Events
175
178
178
182
186
186
190
191
191
192
192
193
194
195
196
197
156
Overview
198
198
199
Monitoring in Real-time
Overview
This module provides operational steps for monitoring real-time
current and history alarms, notifications, and events.
Prerequisites
Steps
Note:
i.
157
Note:
i.
T AB L E 2 5 B UT T O N S F O R AL AR M M O N I T O RI N G
Interface Element
Count button
Customize
Columns button
158
Description
Is used to count all the current alarms and make
statistics of alarms of all levels.
Is used to customize the alarm display columns.
Interface Element
Description
Export button
Print button
Alarm Sound
Setup button
Full Screen
Lock Table
button
END OF STEPS
Prerequisites
history
alarms,
meet
the
following
Note:
i.
159
Interface Element
Description
Is used to count all the history alarms and make
statistics of alarms of all levels.
Count button
Customize
Columns button
Export button
Print button
Remove
data button
all
Lock Table
button
END OF STEPS
160
To monitor real-time
requirements:
notification,
meet
the
following
Note:
i.
Interface Element
Count button
Customize
Columns button
Description
Is used to count all the current notifications and
make statistics of notifications of all levels.
Is used to customize the notification display
columns.
161
Interface Element
Description
Export button
Print button
Remove
Data button
Lock
All
Table
button
END OF STEPS
Prerequisites
Steps
Interface Element
Count button
Customize
Columns button
162
Description
Is used to count all the events and make event
statistics of all levels.
Is used to customize the event display columns.
Interface Element
Description
Export button
Print button
Remove
Data button
Lock
button
All
Table
END OF STEPS
Synchronizing Alarms
Purpose
Prerequisites
Steps
163
164
Querying Alarms
Overview
This module provides operational steps for querying current and
history alarms, notifications, and events.
165
Steps
166
Click
button on Current Alarms Toolbar to display Query
Current Alarms interface as shown in Figure 134.
167
Click
button on Current Alarms Toolbar to display
Query Current Alarms interface as shown in Figure 136.
FIGURE 136 QUERY CURRENT AL ARMS
f
f
END OF STEPS
Prerequisites
Historical alarms are the old alarms, which occurred earlier for
some errors and now the system has no error. Operators are
able to make a query of historical alarms by conditions such as
by location, time, alarm types, alarm system type and alarm
causes.
To query historical alarms, meet the following requirements:
NetNumen N31 server and client must be started before
performing any operation.
Steps
Click
button to display Query Current Alarms interface
as shown in Figure 138.
169
170
Click
button on Historical Alarms Toolbar to display
Query Historical Alarms interface as shown in Figure 141.
FIGURE 140 QUERY HISTORICAL AL ARM S
f
f
171
Querying Notifications
Purpose
Prerequisites
Steps
displays
172
Click
button to display Query Notifications interface as
shown in Figure 142.
173
Click
button on Notifications Toolbar to display Query
Notifications interface as shown in Figure 144.
FIGURE 144 QUERY NOTIFICATIONS
f
f
174
END OF STEPS
Querying Events
Purpose
Prerequisites
Steps
Click
button to display Query Events interface as shown
in Figure 146.
175
176
Click
button on Events Toolbar to display Query
Events interface as shown in Figure 148.
FIGURE 148 QUERY EVENTS
f
f
177
Prerequisites
Steps
178
179
180
FI G U R E 1 5 2 V I E W I N G AV E R AG E P E R I O D S T AT I S T I C S B Y AL AR M
SEVERITY
181
END OF STEPS
Prerequisites
Steps
182
3. Click
button on report template toolbar, which displays
Search Template dialog box as shown in Figure 155.
FIGURE 155 SEARCH TEMPLATE
183
184
FI G U R E 1 5 7 V I E W I N G AV E R AG E P E R I O D S T AT I S T I C S B Y AL AR M
SEVERITY
185
END OF STEPS
186
Prerequisites
To set alarm
requirements:
Steps
management
rules,
meet
the
following
3. Select Rule Type from the drop down list as shown in Figure
159 for example Alarm Acknowledging Rule.
button on the toolbar, which displays Add Rule
4. Click
interface as shown in Figure 160.
187
188
Note: Operator can select other rule options from Figure 159,
which are explained in the following Table 29.
T AB L E 2 9 AL AR M M AN AG E M E N T R U L E
Rules
Description
Alarm
Acknowledging
Rule
Alarm Clearing
Rule
Alarm Counting
Rule
Alarm Delaying
Rule
Alarm
Discarding Rule
Alarm
Forwarding
Rule
Alarm Merging
Rule
Alarm
Persisting Rule
Alarm
Restraining
Rule
Alarm Operator
Filtering Rule
Event
Discarding Rule
Notification
Discarding Rule
END OF STEPS
189
Steps
190
Prerequisites
Steps
Click
191
Steps
Prerequisites
Steps
Alarm Maintenance
Suggestions
Overview
NetNumen system provides operators with solutions by solving
frequently occurred problems. This system provides operators
with adding, editing, deleting, importing, and exporting
maintenance suggestions in order to quickly handle the system
alarms.
192
Prerequisites
To set maintenance
requirements:
suggestions,
meet
the
following
button
3. In the Maintenance Suggestion Toolbar, click
to open Add Maintenance Suggestion interface as shown
in Figure 164.
193
Prerequisites
Steps
194
Prerequisites
Steps
Click
195
END OF STEPS
Prerequisites
To import maintenance
requirements:
Steps
suggestions,
meet
the
following
196
END OF STEPS
Prerequisites
Steps
suggestions,
meet
the
following
197
Prerequisites
Steps
198
END OF STEPS
Prerequisites
Steps
199
200
Chapter
Performance Management
Overview
Introduction
Contents
Topic Title
Page
No.
202
202
205
206
208
208
209
210
210
Setting Threshold
210
Modifying Threshold
213
Deleting Threshold
214
Refreshing Threshold
214
Activating Threshold
214
201
Topic Title
Page
No.
Deactivating Threshold
215
216
218
218
220
222
Viewing Table
224
Steps
202
203
4. Click
System
Performance
and
ZXINDESysPerf
checkboxes, and click Next button. This displays the last
step of creating performance task as shown in Figure 175.
Operator can view details of performance by clicking Detail
button.
FIGURE 175 CHOOSE INDEX
204
END OF STEPS
Steps
3. Select task type from Task Type list of values, and click
Next(N) button, which displays Select Task Time interface
as shown in Figure 177.
205
4. Click Start Date to select task Start Times and End Times,
and click Finish(F) button to save settings. The task is
ready for execution at the specified times.
END OF STEPS
Steps
206
3. Select task type from Task Type list of values, and click
Next(N) button, which displays Select Task Time interface
as shown in Figure 179.
FIGURE 179 SELECT TASK TIME
4. Click Start Time to select task start time, and click Finish(F)
button to save settings.
END OF STEPS
207
Steps
and
scheduled
before
task
from
the
list
displayed
in
Performance
3. Click OK to confirm.
END OF STEPS
Steps
208
2. Select
task
from
the
list
displayed
in
Performance
to
delete
an
unnecessary
Steps
operator
209
END OF STEPS
Setting Threshold
Purpose
Prerequisites
Steps
210
Parameters
Description
Device type
Device name
Performance
group
Variable
Variable index
211
Parameters
Description
High
threshold
value
High
threshold
times
High
threshold
severity
High
threshold
type
Low threshold
value
Low threshold
times
Low threshold
severity
Status
END OF STEPS
212
Modifying Threshold
Purpose
Prerequisites
This function allows the user to modify his set thresholds in real
time.
To modify threshold, meet the following requirements:
Steps
213
Deleting Threshold
Purpose
Prerequisites
Steps
Refreshing Threshold
Purpose
Prerequisites
This function provides the refresh between the server and client.
All new changes are updated after performing this function.
To refresh threshold, meet the following requirements:
Steps
END OF STEPS
Activating Threshold
Purpose
Prerequisites
214
Steps
END OF STEPS
Deactivating Threshold
Purpose
Prerequisites
Steps
215
END OF STEPS.
Prerequisites
Steps
performance,
meet
the
following
Note:
i.
The tool bar on the top of the right pane defines some
operations, such as switching between graphs of different
types, saving graphs, and clearing graphs. See Figure
190.
217
Prerequisites
Steps
contrast
graph,
meet
the
following
218
219
Note:
i.
The tool bar on the top of the right pane defines some
operations, such as switching between graphs of different
types, saving graphs, and clearing graphs. See Figure
193.
Prerequisites
220
Steps
221
Note:
i.
The tool bar on the top of the right pane defines some
operations, such as switching between graphs of different
types, saving graphs, and clearing graphs. See Figure
196.
Prerequisites
Steps
222
223
Note:
i.
The tool bar on the top of the right pane defines some
operations, such as switching between graphs of different
types, saving graphs, and clearing graphs. See Figure
199.
Viewing Table
Purpose
Prerequisites
Steps
224
225
Note:
i.
The tool bar on the top of the right pane defines some
operations, such as switching between graphs of different
types, saving graphs, and clearing graphs. See Figure
202.
226
Chapter
Single Command
Batch Command(s)
Topic Title
Page No.
Overview
227
228
229
230
232
233
233
235
235
236
237
238
227
Topic Title
Page No.
240
Steps
228
Parameters
Description
Abandon
execution
Dont abandon
execution
Prerequisites
Steps
229
Prerequisites
Steps
230
231
Prerequisites
Steps
232
END OF STEPS
Prerequisites
Steps
Steps
233
Steps
234
Prerequisites
Steps
Prerequisites
235
Steps
END OF STEPS
Steps
236
3. Select the path where script file is already saved and select
file type from Files of Type.
4. Click Open button.
END OF STEPS
Steps
237
Prerequisites
Steps
3. Modify command script and click File > Save Script, which
Save Batch Command Script dialog box as shown in Figure
214.
238
Getting Help
Viewing Man-Machine Language
(MML) Help
Purpose
Prerequisites
Steps
239
Steps
240
Appendix
What is NMS?
NetNumen N31 integrated network management system is a
highly-customized, carrier-class and cross-platform Internet
infrastructure management platform designed with the latest
internet technology in a bottom-to-top manner. It is a scalable
high-performance Network Management System (NMS) provided
to carriers. It can satisfy the requirements for the constant
development of networks and for supporting various operating
systems and platform.
241
242
Glossary
SNMP
SNMP stands for simple network management protocol. SNMP
allows diverse network objects to participate in global network
management architecture. Network managing systems can poll
network entities implementing SNMP for information relevant to
a particular network management implementation. Network
management systems learn of problems by receiving traps or
change notices from network devices implementing SNMP.
SMTP
SMTP stands for simple mail transfer protocol, which is a mail
service modeled on the FTP file transfer service. SMTP transfers
mail messages between systems and provides notification
regarding incoming mail.
HTTP
HTTP stands for hypertext transfer protocol is an applicationlevel protocol with the lightness and speed necessary for
distributed, collaborative, hypermedia information systems.
Messages are passed in a format similar to that used by Internet
Mail and the Multipurpose Internet Mail Extensions (MIME).
FTP
FTP stands for file transfer protocol, which provides the basic
elements of file sharing between hosts. FTP uses TCP to create a
virtual connection for control information and then creates a
separate TCP connection for data transfers. The control
connection uses an image of the TELNET protocol to exchange
commands and messages between hosts.
TCP/IP
TCP stands for transmission control protocol. TCP provides a
reliable stream delivery and virtual connection service to
applications through the use of sequenced acknowledgment with
retransmission of packets when necessary. IP stands for internet
protocol, which is the routing layer datagram service of the
TCP/IP suite. All other protocols within the TCP/IP suite, except
Address Resolution Protocol (ARP) and Address Resolution
Protocol (RARP), use IP to route frames from host to host. The
IP frame header contains routing information and control
information associated with datagram delivery.
243
244
Abbreviations
Abbreviation
Full Name
CDR
CLI
CLT
CORBA
CPU
DB
Database
DBMS
FTP
GRP
Group
GUI
HDD
HTTP
IIS
IMP
I-NMS
LAN
MML
NE
Network Element
NE
NMS
OCS
OMS
PC
Personal Computer
QoS
Quality of Service
RAM
SCP
SCP
SIU
SMP
245
246
Abbreviation
Full Name
SMP
SMTP
SNMP
TCP/IP
TXT
Text
VC
Voucher Card
WAP
XML
Figures
Figure 1 NetNumen NMS Architecture ...................................4
Figure 2 Networking...........................................................5
Figure 3 Server Starting Window .........................................7
Figure 4 Operator Login......................................................7
Figure 5 Network Management System .................................9
Figure 6 Lock Screen Confirm..............................................9
Figure 7 Operator Login (Lock Mode).................................. 10
Figure 8 Style Settings ..................................................... 11
Figure 9 Auto Screen Lock Setting ..................................... 12
Figure 10 Modify Operator Password ................................... 13
Figure 11 Modify Operator Information ............................... 14
Figure 12 Setting Print Range............................................ 15
Figure 13 Page Setup ....................................................... 15
Figure 14 Advance Settings............................................... 16
Figure 15 Confirm Logout ................................................. 18
Figure 16 Exiting The System ............................................ 18
Figure 17 View/Customize Operator Account Rules ............... 24
Figure 18 View Operation Tree .......................................... 27
Figure 19 Operation Tree Log Management....................... 27
Figure 20 Operation Tree Operation Description ................ 28
Figure 21 Security Event Rule ........................................... 29
Figure 22 Create Role Basic Information........................... 30
Figure 23 Create Role Access Rights ................................ 31
Figure 24 Create Role Login Address................................ 32
Figure 25 Setting IP Address ............................................. 32
Figure 26 Create Role Operator....................................... 33
Figure 27 Searching Role .................................................. 34
Figure 28 View Role ......................................................... 36
Figure 29 Create Duplicate Role......................................... 38
Figure 30 Create Role Set ................................................. 40
Figure 31 Role Assignment................................................ 41
247
248
Figures
249
250
Figures
251
252
Figures
253
254
Tables
Table 1 Chapter Summary ...................................................i
Table 2 Typographical Conventions ...................................... ii
Table 3 Mouse Operation Conventions ................................. iii
Table 4 Operator Login Parameters ......................................8
Table 5 Modify Password Parameters .................................. 13
Table 6 Security Policy Parameters..................................... 24
Table 7 Role Basic Information .......................................... 30
Table 8 Setting IP Range Parameters.................................. 33
Table 9 Create Role Set Parameters ................................... 40
Table 10 Basic User Information Parameters........................ 48
Table 11 Basic User Information Parameters........................ 52
Table 12 Basic Department Information .............................. 64
Table 13 Configuring Map Parameters................................. 74
Table 14 Create Group Parameters..................................... 76
Table 15 Create NE Parameters ......................................... 87
Table 16 Create Virtual Link Parameters ............................. 92
Table 17 Customize GUI Element Description....................... 98
Table 18 Configure Basic Parameters................................ 105
Table 19 Configure SNMP Parameters ............................... 107
Table 20 Polling Configuration Parameters......................... 112
Table 21 Create Policy Parameters ................................... 118
Table 22 Query Operation Log Parameters ........................ 127
Table 23 Query Security Log Parameters........................... 129
Table 24 Query System Log Parameters............................ 131
Table 25 Buttons for Alarm Monitoring.............................. 158
Table 26 Buttons for History Alarm Monitoring .................... 160
Table 27 Buttons for Notification Monitoring ...................... 161
Table 28 Buttons for Event Monitoring .............................. 162
Table 29 Alarm Management Rule .................................... 189
255
256
Index
A
abbreviations.................... 259
Access..............22, 31, 61, 62
Acknowledging.................. 197
Activate ........................... 122
Adding 145, 152, 164, 194, 201
Assigning ..................... 50, 51
Authentication .................... 49
B
Backup ..................... 122, 123
Batch .... 2, 239, 240, 246, 247,
248, 249, 250
F
Fault ..............................
Filtering...........................
Find ..........34, 41, 54, 65,
Forwarding ......................
See
197
127
197
Clearing........................... 197
Clearup .......................... 153
Command line terminal .. 2, 239
Configuring71, 75, 76, 145, 149,
239, 240
Connection................ 134, 135
Copying ....................... 71, 87
Correlation ....... 178, 196, 199
Counting.......................... 197
Creating 21, 22, 29, 38, 39, 46,
47, 58, 62, 73, 77, 88, 93,
121, 122, 240, 246, 250
D
Database. 2, 6, 123, 145, 154,
155, 156, 157, 158
Delaying .......................... 197
delete36, 37, 38, 43, 44, 56, 57,
60, 61, 62, 67, 68, 74, 75,
80, 90, 91, 92, 98, 99, 116,
117, 127, 142, 143, 154,
194, 197, 199, 200, 203
Deleting.22, 36, 43, 56, 60, 67,
71, 72, 74, 80, 90, 91, 98,
121, 127, 132, 142, 164,
199, 203
department . 50, 51, 62, 63, 64,
65, 66, 67, 68, 125, 127
Directory Monitoring145, 151,
152, 153
Disabling ........... 164, 199, 200
Discarding........................ 197
Duplicating... 22, 37, 44, 57, 58
L
latitude ........................76, 77
Layout .............. 100, 101, 102
Link 72, 93, 94, 95, 96, 97, 98,
99, 115, 178, 196, 199, 240
Log .. ii, 2, 6, 8, 10, 12, 23, 27,
73, 122, 123, 131, 132, 133,
134, 135, 136, 137, 138,
140, 141, 142, 146, 147,
148, 149, 150, 151, 152,
154, 155, 157, 174, 243,
244, 252
Logging ............. 145, 154, 155
Log-on6, 8, 10, 12, 23, 73, 122,
132, 146, 174
longitude ......................75, 76
M
Merging........................... 197
Modify . 12, 13, 14, 23, 26, 35,
42, 55, 59, 66, 74, 79, 80,
91, 92, 95, 96, 97, 98, 115,
125
Modifying. 6, 12, 13, 21, 22, 23,
35, 42, 55, 58, 66, 71, 72,
74, 79, 90, 97, 121, 125
monitor2, 3, 21, 151, 157, 165,
167, 168, 169, 170, 197
Monitoring ................ 164, 170
N
Notification . 168, 169, 195, 197
257
O
Operator . 6, 7, 8, 9, 10, 12, 13,
14, 21, 22, 23, 24, 30, 31,
33, 35, 36, 37, 38, 40, 42,
43, 44, 47, 48, 49, 50, 51,
52, 53, 54, 55, 56, 57, 58,
59, 60, 61, 62, 66, 67, 74,
75, 76, 78, 79, 80, 85, 86,
90, 91, 94, 95, 96, 97, 98,
99, 102, 103, 115, 122, 123,
127, 128, 133, 135, 141,
142, 149, 152, 154, 155,
157, 159, 197, 198, 199,
200, 202, 203, 204, 205,
207, 243
P
parameters.......................... 8
Password ..... 8, 12, 13, 49, 154
Period information..........153
Persisting .........................197
Policyii, 3, 21, 23, 24, 121, 122,
123, 125, 126, 127, 128
process ............................145
Q
Querying ... 22, 53, 71, 84, 121,
126, 131, 132, 134, 136,
143, 164, 173, 177, 180,
183
R
Rank ........................134, 137
Restraining .......................197
258
S
search ...33, 34, 41, 53, 54, 64,
84, 126, 127, 132, 135, 136,
138
Searching21, 22, 33, 34, 41, 64,
65
security .ii, 2, 4, 21, 23, 28, 29,
47, 54, 55, 57, 59, 133, 135
Setting ..................... 164, 207
Severity.................... 164, 206
Sound ...................... 164, 207
Source............................. 137
Synchronization ..118, 171, 172
V
validity ................. 48, 49, 126
Viewing .21, 22, 26, 34, 35, 38,
42, 43, 46, 54, 56, 61, 65,
66, 72, 99, 145, 148, 151,
164, 206, 240, 244, 251,
252
................................. 121