e-Fim ANM2000 Broadband Access Network Management System
Operation Manual (Based on Windows) Version: F Code: MN000000050
FiberHome Telecommunication Technologies Co., Ltd. July 2010
Thank you for choosing our products.
We appreciate your business. Your satisfaction is our goal. We will provide you with comprehensive technical support and after-sales service. Please contact your local sales representative, service representative or distributor for any hel help p needed needed at a t the contact information information shown below. Fiberhome Telecommunication Technologies Co., Ltd.
Address: Address: No. 5 Dongxin Dongxin Rd., Hong Hongshan shan Dist., Dist., Wuha Wuhan, n, China China Zip code: 430073 Tel:
+86-27-87691549
Fax:
+86-27-87691755
Website: http://www.fiberhomegroup.com
All Rights Reserved
No part of this document (including the electronic version) may be reproduced or disseminated in any form or by any means without prior written permission of FiberHome Telecommunication Technologies Co., Ltd. (Hereinafter referred to as FiberHome) Information in this document is subject to change without notice.
Trademarks
TM
TM
TM
are trademarks of FiberHome Telecommunication Technologies Co., Ltd. All other trademarks mentioned in this document are the property of their respective owners.
Preface
This manual describes the ANM2000 common operations and maintenance methods for the purpose of helping users know the ANM2000 further and operate it well. Therefore prior to any installation and operation of the ANM2000, users are required to read through this manual.
Relevant Manuals Manual
Description
The ANM2000 is an integrated broadband access management platform developed by FiberHome, Access
which can perform the effective and unified
System
management of multiple types of broadband
Installation Manual (Based on Windows)
access equipment developed by FiberHome. This
e-Fim
ANM2000
Network
Broadband
Management
manual describes the installation methods of the ANM2000 with the version version Build05.07.05.02.
I
Version and Usage Version
Instruction
A
The initial version.
B
Modifying the networking mode and the connecting mode, the ANM2000 GUI operation, layered management, and views. Adding the networking and the connection, replacing all network
C
management system GUIs, and modifying the corresponding menu options. Adding the preparation knowledge, modifying the overview, overview, replacing all
D
network management system GUIs, and modifying the corresponding menu options. Modifying the management system example, the alarm example and the configuration example, replacing all network management system GUIs
E
and modifying the corresponding menu options. Adding new functions of the network management system, replacing all network management system GUIs and modifying the corresponding menu options. The version of the ANM2000 is: V3.0R2, Build: 05.07.04.42SP1.
F
Adding new functions of the network management system. The version of the ANM2000 is: V3.0R2, Build: 05.07.05.02.
Each type of equipment has its own characteristics in the ANM2000 operations, covered in the ANM2000 network management system operation manual of this type of equipment. Users can read both manuals for reference.
Intended Readers This manual is intended for the following readers:
Planning and designing engineers
Commissioning engineers
Operation and maintenance engineers
To utilize this manual, these prerequisite skills are necessary:
II
Data communication technology
Access network technology
Conventions Terminology conventions Table 1
Terminology erminolog y conventions conventi ons
Terminology
ANM2000
Meaning
FiberHome e-Fim ANM2000 Broadband Access Network Management System
Symbol conventions Table 2
Symbol conventions conventi ons
Symbol
Refer to
Meaning
Note
Important features or operation guide.
Caution
Warning
Possible injury to persons or systems, or cause traffic interruption or loss. May cause severe bodily injuries.
Network management operation conventions Table 3
Network management operations
Symbol and Operation
Meaning
Press multiple keys at the keyboard at the same time. For example, means pressing the following three keys at the same time: “Ctrl”, “Alt” and “A.”
Click
Press the left button of the mouse rapidly and then release it.
Right-click
Press the right button of the mouse rapidly and then release it.
Double-click
Press the left button of the mouse twice continuously and rapidly, rapidly, and then release it.
Drag
Press-and-hold one button of the mouse, and move the mouse.
Select
Click a certain menu item or configuration item to select it.
III
Operation Safety Rules
Network management computer should be placed away from direct sunlight, electromagnetic interference, heat source, humidity and dust, and with at least 8 cm distance from other objects in order to keep good ventilation. Use UPS power supply to avoid loss of network management data caused by accidental power failure. To shut down the network management computer, first exit the operation system normally and then shut off the power supply. The computer crust, UPS power supply and switch (or hub) should be connected to the protection ground. Do not visit Internet via network management computer. Otherwise, it may increase data flow in the net card and hence affects normal network management data transmission or results in other accidents.
WS/OS No access to Internet !
Figure 1
No access to Internet
V
Do not exit the network management system when it is working normally. To exit the network management system does not interrupt traffic in the network, but makes equipment out of control of the network management system. It is forbidden to use an unidentified NIC to back up data so as to avoid computer virus. Do not delete any file in the network management system randomly or copy any irrelevant file into the network management computer. Do not perform service configuration or expansion in service rush hours via network management system. Network management computer cannot be used for purposes other than network management. Do not modify network management computer’s protocol setting, computer name or LAN setting randomly. Otherwise, it may result in abnormal operation of network management system.
VI
No modification !
Figure 2 Not permitted permitted to to modify protocol setting randomly randomly (1)
VII
No modification !
Figure 3 Not permitted to modify protocol setting randomly (2)
No modification !
Figure 4 Not permitted to modify computer name randomly
VIII
No modification !
Figure 5 Not permitted to modify LAN setting randomly
IX
Contents
Preface .................................................................................................................... I Relevant Manuals .............................................................................. I Version and Usage ............................................................................ II Intended Readers ............................................................................. II Conventions ..................................................................................... III Operation Safety Rules .......................................................................................... V
Part 1 Technologies 1
2
Overview ...................................................................................................... 1-1 1.1
Brief Introduction ............................................................................ 1-2
1.2
Managed Equipment Types ........................................................... 1-2
1.3
Hardware Configuration ................................................................. 1-3
1.4
Software Architecture ..................................................................... 1-4
Networking and Connection ......................................................................... 2-1 2.1
Working Mode ................................................................................ 2-2
2.2
Connection Methods ...................................................................... 2-4
2.3 3
2.2.1
Connection Model ........................................................ 2-4
2.2.2
Connection Methods .................................................... 2-4
External Interfaces of the Server En d ................................... ......... 2-6
Management Functions ................................................................................ 3-1 3.1
Configuration Management ............................................................ 3-2 3.1.1
System Configuration ................................................... 3-2
3.1.2
Card Configuration ...................................... ................. 3-3
3.2
Fault Management ......................................................................... 3-4
3.3
Performance Management ............................................................. 3-7
3.4
Security Management .................................................................... 3-9
Part 2 Operations 4
System Management ................................................................................... 4-1 4.1
Entering / Exiting the Edit Mode ..................................................... 4-2
4.2
Saving the Configuration Data ............................ ........................... 4-2
4.3
Importing / Exporting the Configuration Data ........................ ......... 4-3 4.3.1
Importing the Configuration Data .............. ................... 4-3
4.3.2
Exporting the Configuration Data ................................. 4-6
4.4
Closing All Telnet Windows ............................... ............................. 4-6
4.5
Setting the Audio Function ............................................................. 4-7 4.5.1
Configuring the Audio Function .................................... 4-7
4.5.2
Disabling the Audio Function ...................................... 4-10
4.5.3
Enabling the Audio Function ............... ....................... 4-10
4.6
Viewing the System and Database Information ...... ..................... 4-10
4.7
Common Settings ........................................................................ 4-13 4.7.1
System Setting ........................................................... 4-13
4.7.2
Connection Setting ..................................................... 4-15
4.7.3
Service Setting ........................................................... 4-17
4.7.4
International Setting ................................................... 4-18
4.7.5
Telnet Proxy Enable ................................ ................... 4-19
4.7.6
Resources Statistics GUI Client ............. .................... 4-20
4.7.7
Client Setting .............................................................. 4-20
4.7.8
Database Setting ........................................................ 4-22
4.7.9
Polling Setting ........................................ .................... 4-23
4.7.10
Alarm Forward Setting ............................... ................ 4-24
4.7.11
Load Plug-in Setting ................................................... 4-25
4.7.12
Alarm Sets Setting .............................. ....................... 4-25
4.7.13
Telnet Proxy Server Setting ........................................ 4-26
4.8
Printing ......................................................................................... 4-27
4.9
Locking / Logging out / Exiting the Network Management System ..... ..................................................................................................... 4-30 4.9.1
Locking the Network Management System ................ 4-30
4.9.2
Logging out the Network Management System.......... 4-31
4.9.3 5
6
Exiting the Network Management System ............ ..... 4-32
Configuration Management .......................................................................... 5-1 5.1
Manager Configuration .................................................................. 5-3
5.2
EPON User Management .............................................................. 5-5
5.3
Home Gateway Setting ................................................................ 5-11
5.4
Timing Task Management ............................................................ 5-13 5.4.1
Adding the Configuration Comparison Task ............... 5-13
5.4.2
Adding the POTS Port Line Test Task ........................ 5-15
5.4.3
Adding the System Configuration Backup Task.......... 5-17
5.5
Signal Trace ................................................................................. 5-19
5.6
The 5116 Configuration Manager ................................................. 5-19
5.7
Configuration Manager ................................................................ 5-22
5.8
Historical Database Capacity Management .......... ....................... 5-23
5.9
Device Auto Discovery ................................................................. 5-25
5.10
History Event Query ..................................................................... 5-27
5.11
Upgrading the ONUs in Batches .................................................. 5-28
5.12
Upgrading the MSAN Line Card Software in Batches .................. 5-30
5.13
Backing up the System Configuration in Batches ........................ 5-31
5.14
Restoring the System Configuration in Batches ........................... 5-33
5.15
Backing up the System Software in Batches................................ 5-34
5.16
Upgrading the System Software in Batches ................................. 5-35
Alarm Management ...................................................................................... 6-1 6.1
Setting the Filtering Status of Alarms ............................................. 6-3 6.1.1
Setting the Filtering Status of All Alarms ....................... 6-3
6.1.2
Setting the Filtering Status of Alarms on an Object ...... 6-5
6.1.3
Setting the Filtering Status of Alarms on a Card or Port6-7
6.2
Viewing the Filtering Status of Alarms ............................................ 6-9
6.3
Defining Alarm Levels .................................................................. 6-10
6.4
6.3.1
Defining Global Alarm Levels .............................. ....... 6-10
6.3.2
Defining Object Alarm Levels ............................. ........ 6-12
6.3.3
Defining Card / Port Alarm Levels .......................... .... 6-13
Viewing Custom Alarm Levels ...................................................... 6-14
6.5
Forwarding Alarms ....................................................................... 6-15
6.6
Managing Custom Alarms ............................................................ 6-17
6.7
Viewing Alarm Reports ................................................................. 6-18
6.8
Viewing Alarms ............................................................................ 6-19
6.9
7
8
6.8.1
Viewing Current Alarms .............................................. 6-19
6.8.2
Viewing History Alarms .............................. ................ 6-20
Viewing the Alarm Statistics ......................................... ................ 6-22 6.9.1
Viewing the Alarm Statistics Brief List ........................ 6-22
6.9.2
Viewing the History Alarm Statistics ........................... 6-23
Performance Management ........................................................................... 7-1 7.1
Setting the Performance Collection Scheme.................................. 7-2
7.2
Viewing Performance Data ............................................................ 7-5 7.2.1
Viewing Instant Performance Data ............................... 7-5
7.2.2
Viewing History Performance Data ........ ...................... 7-6
7.3
Comparing Performance Data ....................................................... 7-8
7.4
Viewing the History Performance Chart ....................... ................ 7-10
Statistics Management ................................................................................. 8-1 8.1
Equipment Statistics....................................................................... 8-2
8.2
System-Related Statistics .............................................................. 8-3
8.3
8.2.1
System Resource Statistics .......................................... 8-3
8.2.2
System Card Statistics ............................. .................... 8-4
8.2.3
System Port Statistics ....................... ........................... 8-5
ONU-Related Statistics .................................................................. 8-6 8.3.1
ONU Port Information Statistics.................................... 8-6
8.3.2
Viewing the ONU Subscriber Statistics Detailed List .... 8-7
8.3.3
ONU Equipment Statistics ............................................ 8-8
8.3.4
Viewing the ONU Resource Detailed List ..................... 8-9
8.3.5
Viewing the ONU Port Resource Statistics Detailed List ... ................................................................................... 8-10
8.4 9
MGC Resource Statistics ........................................ ..................... 8-11
Security Management .................................................................................. 9-1 9.1
Managing Users ............................................................................. 9-2
Adding New Users ............................... ........................ 9-2
9.1.2
Managing Operators .................................................... 9-4
9.1.3
Managing Online Users ................................................ 9-6
9.1.4
Modifying the Password of the Current User ................ 9-8
9.2
Sending Messages ........................................................................ 9-9
9.3
Managing Messages and Uploading Files ................... ................ 9-10
9.4
Managing the Authorization and Domain Division ........................ 9-13
9.5
10
9.1.1
9.4.1
Basic Knowledge of the Authorization and Domain
Division
................................................................................... 9-13
9.4.2
Managing the Authorization and Domain Division ...... 9-16
9.4.3
Managing the Command Authorization ...................... 9-18
Viewing Logs ................................................................................ 9-20 9.5.1
Viewing Command Logs ..................... ....................... 9-20
9.5.2
Viewing Login Logs ................................ .................... 9-22
Other Management Operations .................................................................. 10-1 10.1
Viewing the Command Manager / Command Bar ........................ 10-2 10.1.1
Viewing the Command Manager ................................ 10-2
10.1.2
Viewing the Command Bar ......................................... 10-3
10.2
Viewing the Airscape View ....................................... .................... 10-4
10.3
Searching Systems ...................................................................... 10-5
10.4
Querying the ONUs...................................................................... 10-6
10.5
Filtering Texts ............................................................................... 10-7
Part 3 Maintenance 11
Routine Maintenance ................................................................................. 11-1 11.1
11.2
11.3
Maintenance Requirements ................................... ...................... 11-2 11.1.1
Duty of Maintenance Staff .......................................... 11-2
11.1.2
Requirements of Maintenance Staff ........................... 11-2
Maintenance Precautions............................................................. 11-3 11.2.1
Precautions for Hardware Operations ........................ 11-3
11.2.2
Precautions for Software Operations .................... ..... 11-3
Daily Routine Maintenance ..................................... ..................... 11-4
11.3.1
Logging in the ANM2000 with a Low-level User Authority . ................................................................................... 11-5
11.4
11.5
11.6
12
Pinging the System ............................... ..................... 11-6
11.3.3
Viewing the Service Start State ............................... ... 11-7
11.3.4
Checking the Alarm ................................. ................... 11-8
11.3.5
Checking the Performance ......................................... 11-9
11.3.6
Querying the Message Record....... ............................ 11-9
11.3.7
Backing up the Real Time Data .................................11-11
Weekly Routine Maintenance .................................................... 11-12 11.4.1
Checking the Host Name and the IP Address .......... 11-12
11.4.2
Viewing the Size of System Files ............................ . 11-16
11.4.3
Viewing the Database Space ............... .................... 11-19
11.4.4
Checking Advanced Settings ................................... 11-20
11.4.5
Viewing the Management Configuration Program .... 11-22
Monthly Routine Maintenance .................................................... 11-23 11.5.1
Backing up Data ....................................................... 11-23
11.5.2
Checking the Physical Configuration ........................ 11-23
11.5.3
Collecting the Performance ...................................... 11-24
11.5.4
Checking the Working State of the Hardware........... 11-24
11.5.5
Checking the Database Connection ......................... 11-24
Quarterly Routine Maintenance ................................................. 11-25 11.6.1
Calibrating the ANM2000 Time.................... ............. 11-25
11.6.2
Changing the Login Password Periodically .............. 11-26
11.6.3
Checking the Remote Login ..................................... 11-28
11.6.4
Checking the ANM2000 Functions ........................... 11-41
Troubleshooting Principles and Flow.......................................................... 12-1 12.1
13
11.3.2
Basic Troubleshooting Principles ................................ ................. 12-2 12.1.1
Troubleshooting Principles .................................... ..... 12-2
12.1.2
Troubleshooting Precautions ...................................... 12-2
12.2
Troubleshooting Flow ................................................................... 12-3
12.3
Fault Data Collection .................................................................... 12-4
Start and Login Faults ................................................................................ 13-1
13.1
13.2
13.3
13.4
14
Failure to Start the Database ........................... ............................ 13-2 13.1.1
Fault Symptom ........................................................... 13-2
13.1.2
Cause and Handling Procedure 1 .............................. 13-2
13.1.3
Cause and Handling Procedure 2 .............................. 13-3
Failure to Log in the ANM2000..................................................... 13-6 13.2.1
Fault Symptom ........................................................... 13-6
13.2.2
Cause and Handling Procedure ................................. 13-6
Failure to Access the Server by the Client ................................... 13-6 13.3.1
Fault Symptom ........................................................... 13-6
13.3.2
Cause and Handling Procedure 1 ............................. . 13-7
13.3.3
Cause and Handling Procedure 2 .............................. 13-8
13.3.4
Cause and Handling Procedure 3 .............................. 13-8
13.3.5
Cause and Handling Procedure 4 .............................. 13-9
13.3.6
Cause and Handling Procedure 5 ............................ 13-10
Failure of the Remote Login ....................................................... 13-11 13.4.1
Fault Symptom ......................................................... 13-11
13.4.2
Cause and Handling Procedure 1 ............................ 13-12
13.4.3
Cause and Handling Procedure 2 ............................ 13-12
13.4.4
Cause and Handling Procedure 3 ............................ 13-13
ANM2000 GUI Operation Faults................................................................. 14-1 14.1
14.2
14.3
14.4
Failure of Importing the Configuration Data ............................... .. 14-2 14.1.1
Fault Symptom ........................................................... 14-2
14.1.2
Cause and Handling Procedure 1 .............................. 14-2
14.1.3
Cause and Handling Procedure 2 .............................. 14-2
Failure of Delivering Commands .................................................. 14-3 14.2.1
Fault Symptom 1 ........................................................ 14-3
14.2.2
Cause and Handling Procedure of Fault Symptom 1 . 14-3
14.2.3
Fault Symptom 2 ........................................................ 14-3
14.2.4
Cause and Handling Procedure of Fault Symptom 2 . 14-3
Failure of Obtaining the Service Version Information ................... 14-4 14.3.1
Fault Symptom ........................................................... 14-4
14.3.2
Cause and Handling Procedure ................................. 14-5
Failure of Normally Viewing Alarms........................... ................... 14-5
14.5
14.6
14.7
14.4.1
Fault Symptom ........................................................... 14-5
14.4.2
Cause and Handling Procedure ................................. 14-5
Failure of Normally Viewing Performance Data ........................... 14-6 14.5.1
Fault Symptom ........................................................... 14-6
14.5.2
Cause and Handling Procedure ................................. 14-6
Interruption of Services ................................................................ 14-6 14.6.1
Fault Symptom ........................................................... 14-6
14.6.2
Cause and Handling Procedure ................................. 14-6
Failure of Managing a System via the ANM2000 ......................... 14-7 14.7.1
Fault Symptom ........................................................... 14-7
14.7.2
Cause and Handling Procedure 1 ............................. . 14-7
14.7.3
Cause and Handling Procedure 2 .............................. 14-8
14.7.4
Cause and Handling Procedure 3 .............................. 14-8
14.7.5
Cause and Handling Procedure 4 .............................. 14-9
14.7.6
Cause and Handling Procedure 5 ............................ 14-10
14.7.7
Cause and Handling Procedure 6 ............................ 14-11
Part 4 Appendixes Appendix A Dual NIC Settings ........................... ............................................... A-1 A.1
Settings at the Server ..... ...............................................................A-2
A.2
Settings at the Client ...................................................................... A-4
Appendix B
System Backup and Import............................................................ B-1
B.1
Backing up the System ............................... ................................... B-1
B.2
Importing Image Files ....................................................................B-5
Appendix C
Abbreviations................................................................................ C-1
Figures
Figure 1-1
The ANM2000 software module architecture .............................. 1-4
Figure 2-1
An example of Client end-Server end mode application ............. 2-2
Figure 2-2
The networking model ................................................................. 2-4
Figure 2-3
The outband connection mode.................................................... 2-4
Figure 2-4
The inband connection mode ...................................................... 2-5
Figure 2-5
The external interfaces of the ANM2000 server .......................... 2-6
Figure 4-1
Relationships around the system management function ............. 4-1
Figure 4-2
The alert box of importing the configuration ................................ 4-4
Figure 4-3
The Choose Directory dialog box ................................................ 4-4
Figure 4-4
The Browse For Folder dialog box .............................................. 4-5
Figure 4-5
The Sound Config dialog box ...................................................... 4-8
Figure 4-6
The Open dialog box ................................................................... 4-9
Figure 4-7
The System And Database Information tab (1) ......................... 4-11
Figure 4-8
The System And Database Information tab (2) ......................... 4-12
Figure 4-9
The System And Database Information tab (3) ......................... 4-12
Figure 4-10
The System And Database Information tab (4) ......................... 4-13
Figure 4-11
A configuration instance of the Auto lock pane.......................... 4-14
Figure 4-12
A configuration instance of the RCF setting pane ..................... 4-16
Figure 4-13
A configuration instance of the Setting for Connection between Client and server pane ............................................................. 4-16
Figure 4-14
The dialog box of service setting ............................................... 4-17
Figure 4-15
The dialog box of Client setting ................................................. 4-21
Figure 4-16
The dialog box of database setting ........................................... 4-22
Figure 4-17
The dialog box of alarm forward setting .................................... 4-24
Figure 4-18
The dialog box of Telnet proxy server setting ............................ 4-27
Figure 4-19
The Page Setup dialog box ....................................................... 4-28
Figure 4-20
The print preview ...................................................................... 4-29
Figure 4-21
The Print dialog box .................................................................. 4-29
Figure 4-22
The ANM2000 User Login dialog box ....................................... 4-31
Figure 4-23
The exit alert box ...................................................................... 4-31
Figure 4-24
The ANM2000 User Login dialog box ....................................... 4-32
Figure 4-25
The exit alert box ...................................................................... 4-32
Figure 5-1
Relationships around the configuration management function.... 5-1
Figure 5-2
The Manager Configuration dialog box ....................................... 5-4
Figure 5-3
The EPON User Management window (1) .................................. 5-6
Figure 5-4
The New Add User target system S1 dialog box ......................... 5-6
Figure 5-5
The authorization dialog box ....................................................... 5-7
Figure 5-6
The EPON User Management window (2) .................................. 5-7
Figure 5-7
The authorization status of the network management system being different with that of the equipment............................................. 5-8
Figure 5-8
Deauthorizing the ONU ............................................................... 5-9
Figure 5-9
Performing the user data check again ........................................ 5-9
Figure 5-10
Authorizing the ONU again ....................................................... 5-10
Figure 5-11
The authorization status of the network management system being the same as that of the equipment ........................ ................... 5-10
Figure 5-12
The Home Gateway Setting window ......................................... 5-11
Figure 5-13
The dialog box to add rows ....................................................... 5-11
Figure 5-14
Inputting the MAC address ....................................................... 5-12
Figure 5-15
The execution results ................................................................ 5-12
Figure 5-16
The Timed task manage window............................................... 5-13
Figure 5-17
The CFG Compare Timed task dialog box ................................ 5-14
Figure 5-18
The POTSport in out line test dialog box (1) ............................. 5-15
Figure 5-19
The POTSport in out line test dialog box (2) ............................. 5-16
Figure 5-20
The System config backup task dialog box (1).......................... 5-17
Figure 5-21
The System config backup task dialog box (2).......................... 5-18
Figure 5-22
The Manage Configuration window (1) ..................................... 5-20
Figure 5-23
The Select config copy object dialog box .................................. 5-21
Figure 5-24
The object type dialog box ........................................................ 5-21
Figure 5-25
The execution result of the command ....................................... 5-22
Figure 5-26
The Manage Configuration window (2) ..................................... 5-22
Figure 5-27
The History Database Capacity Management window .............. 5-23
Figure 5-28
The Device Auto Discover tab ................................................... 5-26
Figure 5-29
The History Event Query dialog box ......................................... 5-27
Figure 5-30
The event query results ............................................................ 5-28
Figure 5-31
The Batches Upgrade ONU tab ................................................ 5-29
Figure 5-32
The MSAN line card Software Batch Upgrade tab .................... 5-31
Figure 5-33
The System Config Batches Backup tab ................................... 5-32
Figure 5-34
The System Config Batches Restore tab .................................. 5-34
Figure 5-35
The System Software Batches Backup tab ............................... 5-35
Figure 5-36
The System Software Batches Upgrade tab ............................. 5-36
Figure 6-1
The operation flow of the alarm management ............................. 6-1
Figure 6-2
The Alarm Shield Global Setting tab ........................................... 6-4
Figure 6-3
The Mask Time Section Set dialog box ....................................... 6-4
Figure 6-4
The Alarm Shield Object Setting tab ........................................... 6-6
Figure 6-5
The Shield Time Setting dialog box............................................. 6-6
Figure 6-6
The Alarm Shield Board/Port Setting tab .................................... 6-8
Figure 6-7
The Shield Time Setting dialog box............................................. 6-8
Figure 6-8
The Current Alarm Shield View tab ............................................. 6-9
Figure 6-9
The Global Alarm Level Definition tab ....................................... 6-11
Figure 6-10
The Global Alarm Level Definition tab ....................................... 6-12
Figure 6-11
The Alarm Level Board or Port Setting tab ................................ 6-13
Figure 6-12
The Alarm Level Setting View tab ............................................. 6-14
Figure 6-13
The Alarm Forward window (1) ................................................. 6-15
Figure 6-14
The Alarm Forward window (2) ................................................. 6-16
Figure 6-15
The md.ini window .................................................................... 6-16
Figure 6-16
The Custom alarm manage window.......................................... 6-17
Figure 6-17
The Alarm Notice pane.............................................................. 6-18
Figure 6-18
The Current alarm tab ............................................................... 6-20
Figure 6-19
The History alarm tab ................................................................ 6-21
Figure 6-20
The alarm statistics brief list ...................................................... 6-22
Figure 6-21
The Statistics parameter setting dialog box............................... 6-23
Figure 6-22
The History Alarm Statistics tab (1) ........................................... 6-24
Figure 6-23
The History Alarm Statistics tab (2) ........................................... 6-24
Figure 7-1
The operation flow of the performance management .................. 7-1
Figure 7-2 Figure 7-3
The Options For Performance Collection And Storage dialog box (1) ....................................................................................................7-3 The Options For Performance Collection And Storage dialog box (2)
....................................................................................................7-4
Figure 7-4
The Command Manager window ................................................ 7-4
Figure 7-5
The Instant Performance tab....................................................... 7-6
Figure 7-6
The History Performance tab ...................................................... 7-7
Figure 7-7
The Set History Performance Query Condition dialog box .......... 7-8
Figure 7-8
The Performance Compare dialog box ....................................... 7-9
Figure 7-9
The Performance Compare tab ................................................. 7-10
Figure 7-10
The Set History Performance Query Condition dialog box (1) .. 7-11
Figure 7-11
The Policy Edit dialog box (1) ................................................... 7-12
Figure 7-12
The Policy Edit dialog box (2) ................................................... 7-12
Figure 7-13
The Set History Performance Query Condition dialog box (2) .. 7-13
Figure 7-14
The History performance curve tab ........................................... 7-14
Figure 8-1
Relationships around the statistics management function .......... 8-1
Figure 8-2
The Device Statistic tab............................................................... 8-2
Figure 8-3
The System Resource Statistics tab ........................................... 8-3
Figure 8-4
The System Board Statistics tab ................................................. 8-4
Figure 8-5
The System Port Statistics tab .................................................... 8-5
Figure 8-6
The ONU Port information statistic dialog box ............................ 8-6
Figure 8-7
The ONU Port information statistic tab ........................................ 8-7
Figure 8-8
The ONU User Detail Information tab ......................................... 8-8
Figure 8-9
The ONU Device Statistics tab .................................................... 8-9
Figure 8-10
The ONU Resource Detailed Information tab............................ 8-10
Figure 8-11
The ONU Port Resource Detail Information tab ........................ 8-11
Figure 8-12
The MGC Resource Statistics tab ............................................. 8-12
Figure 9-1
Relationships between various security management functions . 9-1
Figure 9-2
The Add New User… dialog box ................................................. 9-4
Figure 9-3
The User Management tab ......................................................... 9-5
Figure 9-4
The User Property dialog box ..................................................... 9-6
Figure 9-5
The Online User Management tab .............................................. 9-7
Figure 9-6
The Change Current User’s Password dialog box ...................... 9-8
Figure 9-7
The Send Message window ........................................................ 9-9
Figure 9-8
The dialog box of receiving the message .................................. 9-10
Figure 9-9
The Message And Upload File Manager tab ............................. 9-11
Figure 9-10
The Message And Upload File Manager tab (2)........................ 9-11
Figure 9-11
The Select Upload File dialog box ............................................ 9-12
Figure 9-12
The Client end-Server end networking ...................................... 9-13
Figure 9-13
The Zone Right Setting window ................................................ 9-17
Figure 9-14
The Command Right Setting window ........................................ 9-19
Figure 9-15
The View The Command Log tab.............................................. 9-21
Figure 9-16
The Command Log Filter dialog box ......................................... 9-21
Figure 9-17
The filtering results of the View The Command Log tab ............ 9-22
Figure 9-18
The View The User Login Log tab ............................................. 9-23
Figure 9-19
The Login Filter dialog box ........................................................ 9-24
Figure 9-20
The filtering results of the View The User Login Log tab ........... 9-24
Figure 10-1
The Command Manager window .............................................. 10-2
Figure 10-2
The Command Bar pane ........................................................... 10-3
Figure 10-3
The Air Scape pane .................................................................. 10-4
Figure 10-4
The Search Object dialog box ................................................... 10-5
Figure 10-5
The ONU Search Setting: dialog box ........................................ 10-6
Figure 10-6
The Filter Text dialog box .......................................................... 10-7
Figure 10-7
Text filter results ........................................................................ 10-8
Figure 11-1
The ANM2000 User Login dialog box ....................................... 11-5
Figure 11-2
The ping window ....................................................................... 11-6
Figure 11-3
The Services window ................................................................ 11-7
Figure 11-4
The Event Viewer window (1) ................................................. 11-10
Figure 11-5
The Event Properties dialog box ..............................................11-11
Figure 11-6
The System Properties dialog box .......................................... 11-13
Figure 11-7
The Network and Sharing Center window ............................... 11-14
Figure 11-8
The Network Connections window .......................................... 11-14
Figure 11-9
The Local Connection Properties dialog box .......................... 11-15
Figure 11-10
The Internet Protocol Version 4 (TCP/IPv4) Properties dialog box .. ................................................................................................ 11-16
Figure 11-11
The Search Results window (1) .............................................. 11-17
Figure 11-12
The Search Results window (2) .............................................. 11-18
Figure 11-13
The ol_*** window (1) ............................................................. 11-19
Figure 11-14
The ol_*** window (2) ............................................................. 11-20
Figure 11-15
Viewing the database’s IP address ......................................... 11-21
Figure 11-16
The Manager Configuration dialog box ................................... 11-22
Figure 11-17
The User Management tab ..................................................... 11-26
Figure 11-18
The User Property dialog box ................................................. 11-27
Figure 11-19
The Network and Dial-up Connections window....................... 11-28
Figure 11-20
The New Connection Wizard dialog box (1) ............................ 11-29
Figure 11-21
The New Connection Wizard dialog box (2) ............................ 11-29
Figure 11-22
The New Connection Wizard dialog box (3) ............................ 11-30
Figure 11-23
The New Connection Wizard dialog box (4) ............................ 11-30
Figure 11-24
The New Connection Wizard dialog box (5) ............................ 11-31
Figure 11-25
The New Connection Wizard dialog box (6) ............................ 11-31
Figure 11-26
The New Connection Wizard dialog box (7) ............................ 11-32
Figure 11-27
The New Connection Wizard dialog box (8) ............................ 11-32
Figure 11-28
The System Properties dialog box .......................................... 11-33
Figure 11-29
The New Connection Wizard dialog box (1) ............................ 11-34
Figure 11-30
The New Connection Wizard dialog box (2) ............................ 11-35
Figure 11-31
The New Connection Wizard dialog box (3) ............................ 11-35
Figure 11-32
The New Connection Wizard dialog box (4) ............................ 11-36
Figure 11-33
The New Connection Wizard dialog box (5) ............................ 11-36
Figure 11-34
The New Connection Wizard dialog box (6) ............................ 11-37
Figure 11-35
The New Connection Wizard dialog box (7) ............................ 11-37
Figure 11-36
The New Connection Wizard dialog box (8) ............................ 11-38
Figure 11-37
The Connect ** dialog box ...................................................... 11-38
Figure 11-38
The Connecting ** alert box .................................................... 11-39
Figure 11-39
The Error Connecting ** alert box ........................................... 11-39
Figure 11-40
The Remote Desktop Connection window .............................. 11-40
Figure 11-41
The alert box indicating the successful remote login............... 11-40
Figure 11-42
The Remote Desktop Disconnected alert box......................... 11-41
Figure 12-1
The troubleshooting flow ........................................................... 12-3
Figure 13-1
The Services window ................................................................ 13-2
Figure 13-2
The Server Information tab ....................................................... 13-3
Figure 13-3
The Host Information tab........................................................... 13-4
Figure 13-4
The Environment tab ................................................................. 13-5
Figure 13-5
Setting the network card’s priority ............................................. 13-7
Figure 13-6
An example of checking the aems.ini file .................................. 13-9
Figure 13-7
The IBM Informix Setnet32 dialog box .................................... 13-10
Figure 13-8
The Remote Desktop Disconnected alert box ......................... 13-11
Figure 13-9
The System Properties dialog box .......................................... 13-13
Figure 13-10
The Remote Desktop Connection window .............................. 13-14
Figure 14-1
The Manager Configuration dialog box ..................................... 14-4
Figure 14-2
The window indicating failure of the ping operation .................. 14-8
Figure 14-3
The Manager Configuration dialog box ..................................... 14-9
Figure 14-4
The System Property dialog box ............................................. 14-10
Figure 14-5
An example of checking the aems.ini file ................................ 14-11
Figure A-1
The Manager Configuration dialog box ....................................... A-2
Figure A-2
The md.ini window (1) ................................................................. A-3
Figure A-3
The md.ini window (2) ................................................................. A-3
Figure A-4
The aems.ini window ..................................................................A-4
Figure A-5
The hosts window ....................................................................... A-4
Figure B-1
Selecting the backup area .......................................................... B-2
Figure B-2
The dialog box of selecting the local harddisk drive .................... B-2
Figure B-3
The dialog box of selecting local partition(s) ............................... B-2
Figure B-4
The dialog box of selecting the path ...........................................B-3
Figure B-5
The Compress Image dialog box ................................................ B-3
Figure B-6
Making image files ...................................................................... B-4
Figure B-7
The image making success alert box .......................................... B-5
Figure B-8
Importing files.............................................................................. B-5
Figure B-9
The dialog box of selecting the directory ..................................... B-6
Figure B-10
The dialog box of selecting the partition ...................................... B-6
Figure B-11
The Question dialog box ............................................................. B-7
Figure B-12
The Clone Complete Alert box .................................................... B-7
Tables
Table 1-1
Managed equipment types .......................................................... 1-2
Table 1-2
Hardware configuration ............................................................... 1-3
Table 4-1
The operation entry path of entering edit mode .......................... 4-2
Table 4-2
The operation entry path of saving the configuration data .......... 4-2
Table 4-3
The operation entry path of importing / exporting the configuration data ............................................................................................ 4-3
Table 4-4
The operation entry path of setting the audio function ................ 4-7
Table 4-5
The operation entry path of viewing the system and database information................................................................................ 4-11
Table 4-6
The system setting .................................................................... 4-14
Table 4-7
The connection setting .............................................................. 4-15
Table 4-8
The service setting .................................................................... 4-18
Table 4-9
The Client setting ...................................................................... 4-21
Table 4-10
The alarm sets setting ............................................................... 4-26
Table 4-11
The operation entry path of printing .......................................... 4-28
Table 4-12
The operation entry path of locking / logging out / exiting the network management system................................................... 4-30
Table 5-1
The operation entry path of configuring the manager ................. 5-3
Table 5-2
The operation entry path of managing the EPON subscriber ...... 5-5
Table 5-3
Functions of the main menu and toolbar icons in the Manage Configuration window ............................................................... 5-20
Table 5-4
The setting items of the History Database Capacity Management window ..................................................................................... 5-24
Table 5-5
The parameters in the Device Auto Discover tab ...................... 5-26
Table 5-6
The operation entry path of upgrading the ONUs in batches .... 5-29
Table 5-7
The operation entry path of upgrading the MSAN line card software in batches ................................................................................. 5-30
Table 5-8
The operation entry path of backing up the system configuration in batches ..................................................................................... 5-32
Table 5-9
The operation entry path of restoring the system configuration in batches ..................................................................................... 5-33
Table 5-10
The operation entry path of backing up the system software in batches ..................................................................................... 5-34
Table 5-11
The operation entry path of upgrading the system software in batches ..................................................................................... 5-36
Table 6-1
The operation entry path of setting the filtering status of all alarms . .................................................................................................... 6-3
Table 6-2
The operation entry path of setting the filtering status of alarms on an object ..................................................................................... 6-5
Table 6-3
The operation entry path of setting the filtering status of alarms on a card or port ................................................................................. 6-7
Table 6-4
The operation entry path of viewing the filtering status of alarms 6-9
Table 6-5
The operation entry path of defining global alarm levels ........... 6-11
Table 6-6
The operation entry path of defining object alarm levels ........... 6-12
Table 6-7
The operation entry path of defining card / port alarm levels .... 6-13
Table 6-8
The operation entry path of viewing custom alarm levels ......... 6-14
Table 6-9
The operation entry path of forwarding alarms.......................... 6-15
Table 6-10
The operation entry path of managing custom alarms .............. 6-17
Table 6-11
The operation entry path of viewing current alarms .................. 6-19
Table 6-12
The operation entry path of viewing history alarms ................... 6-21
Table 6-13
The operation entry path of viewing the alarm statistics............ 6-22
Table 7-1
The operation entry path of setting the performance collection scheme ....................................................................................... 7-2
Table 7-2
The operation entry path of viewing instant performance data.... 7-5
Table 7-3
The operation entry path of viewing history performance data .... 7-7
Table 7-4
The operation entry path of comparing performance data .......... 7-9
Table 7-5
The operation entry path of viewing the history performance chart.. .................................................................................................. 7-10
Table 8-1
The operation entry path of the equipment statistics ................... 8-2
Table 8-2
The operation entry path of the system resource statistics ......... 8-3
Table 8-3
The operation entry path of the system card statistics ................ 8-4
Table 8-4
The operation entry path of the system port statistics ................. 8-5
Table 8-5
The operation entry path of the ONU port information statistics.. 8-6
Table 8-6
The operation entry path of viewing the ONU subscriber statistics detailed list ................................................................................. 8-7
Table 8-7
The operation entry path of the ONU equipment statistics .......... 8-8
Table 8-8
The operation entry path of viewing the ONU resource detailed list .................................................................................................... 8-9
Table 8-9
The operation entry path of viewing the ONU port resource statistics detailed list ................................................................. 8-10
Table 8-10
The operation entry path of the MGC resource statistics .......... 8-11
Table 9-1
The operation entry path of adding new users ............................ 9-2
Table 9-2
The configuration items in the Add New User… dialog box “ ...... 9-3
Table 9-3
The operation entry path of managing operators ........................ 9-5
Table 9-4
The operation entry path of managing online users .................... 9-7
Table 9-5
The operation entry path of Modifying the password of the current user ............................................................................................ 9-8
Table 9-6
The operation entry path of sending messages .......................... 9-9
Table 9-7
The operation entry path of managing messages and uploading files ........................................................................................... 9-10
Table 9-8
The operation entry path of managing the authorization and domain division ..................................................................................... 9-16
Table 9-9
The operation entry path of managing the command authorization . .................................................................................................. 9-18
Table 9-10
The operation entry path of viewing command logs .................. 9-20
Table 9-11
The operation entry path of viewing login logs .......................... 9-22
Table 11-1
Daily maintenance items ........................................................... 11-4
Table 11-2
Weekly routine maintenance items ......................................... 11-12
Table 11-3
Monthly routine maintenance items ........................................ 11-23
Table 11-4
Quarterly routine maintenance items ...................................... 11-25
Table 12-1
Fault data collection .................................................................. 12-4
Table 13-1
Configuration items in the Server Information tab ..................... 13-4
Table 13-2
Configuration items in the Host Information tab ........................ 13-5
Table 13-3
Configuration items in the IBM Informix Setnet32 dialog box .. 13-11
Table B-1
Meanings of the three items in the Compress Image dialog box.B-4
e-Fim ANM2000 Broadband Access Network Management System Operation Manual (Based on Windows) Version: F Code: MN000000050
Part 1 Technologies
1
Overview
This chapter gives an overview of the ANM2000. It includes the following contents:
Brief introduction Managed equipment types Hardware configuration Software architecture
Version: F
1-1
Part 1
1.1
Technologies
1
Overview
Brief Introduction The ANM2000 is an integrated broadband access management platform developed by FiberHome. It can provide effective centralized management for various broadband access equipment types of FiberHome.
1.2
Managed Equipment Types The equipment types able to be managed by the ANM2000 are listed in Table 1-1. Table 1-1
Managed equipment types
Equipment Type
Equipment Name
OLT
AN5116-02, AN5116-06, AN5116-06B, AN5516-01B AN5006-02, AN5006-03, AN5006-04, AN5006-05, AN5006-06, AN5006-07, AN5006-09, AN5006-10, AN5006-15, AN5006-16, AN5006-20;
ONU
AN5506-04, AN5506-06, AN5506-07, AN5506-09, AN5506-10; HG220
1-2
MSAN
AN3300-01, AN3300-02, AN3300-03, AN3300-C1
Service product
NP5500
Version: F
Part 1
Technologies
1.3
1
Hardware Configuration Table 1-2
Network Scale
200 to 500 OLTs, connected
with
the full-configuration ONUs 100 to 200 OLTs, connected
with
the full-configuration ONUs Less than 100 OLTs, connected with
the
full-configuration ONUs
Version: F
Overview
CPU
Hardware configuration
Clock
Rate
CPU Number
Intel® Xeon® processor X7460,
16G 4
Intel® Xeon®
X7350,
4
3 GHz
DDR3
(UDIMM), 1333MHZ
Intel® Xeon®
E5506,
(UDIMM),
8G
2.93 GHz
processor
DDR3
1333MHZ
2.66 GHz
processor
Memory
4G 2
DDR3
(UDIMM), 1333MHZ
Hard Disk
Monitor
2*300GB, SAS
NIC
Embedded
hot-swappable
19-inch
NC326i
PCI
hard disk,
flat colour
Express
bi-port
15000 rpm
GE server adaptor
2*146GB, SAS
Embedded
hot-swappable
19-inch
NC326i
PCI
hard
flat colour
Express
bi-port
disk,
15000 rpm
GE server adaptor Embedded
2*146GB, SAS hot-swappable
17-inch
hard
flat colour
disk,
15000 rpm
HP
NC107i PCI-Express bi-port GE server adaptor
1-3
Part 1
1.4
Technologies
1
Overview
Software Architecture The ANM2000 is based on the Windows XP professional SP2 or the Windows 2003 SP1 operating system and the Informix database. The software architecture of the ANM2000 is illustrated as Figure 1-1.
Client end
Database
Background processing service
Collection service
ANM2000
The managed equipment
Figure 1-1
1-4
The ANM2000 software module architecture
Version: F
2
Networking and Connection
This chapter introduces the operating modes, networking modes and connection methods of the ANM2000, including the following contents:
Working mode Connection methods External interfaces of the server end
Version: F
2-1
Part 1
2.1
Technologies
2
Networking and Connection
Working Mode At present, the ANM2000 uses the Client end-Server end working mode. When the network maintenance engineers are far from both the access equipment and the network management system server, this Client end-Server end working mode can be used to access the server via the Client end for achieving the purpose of managing the equipment. In this case, the ANM2000’s Client end and Sever end can be installed on one computer, as shown in Figure 2-1, or respectively on two computers. When both the Client end and server end are installed on a computer, this is also called a stand-alone mode.
Figure 2-1
2-2
An example of Client end-Server end mode application
Version: F
Part 1
Technologies
2
Networking and Connection
The Server end The ANM2000 (WS / OS), namely a Windows server, communicates with the managed system, collects various system data and saves these data to the database.
Meanwhile,
after
the
background
programme
of
the
network
management server processes these data, the server provides the equipment running status information and the equipment management information for the ANM2000’s Client ends.
The Client end The ANM2000 GUI, namely a Client end, shows the managed system to users in the GUI. Users can configure the access equipment conveniently. By observing the change on the color of the status indicator in the GUI, users can detect the performance changes of the managed system clearly and handle the alarm events.
Differences between the Server end and the Client end The Server end contains the manager module, the database interface module, the database service module, and the ANM2000 GUI; the Client end only contains the ANM2000 GUI (consistent with the network mana gement system server GUI). The equipment is connected with the server and managed by the server. The Client end can only manage the equipment indirectly by visiting the server, and it is incapable of the direct management over the equipment.
Version: F
2-3
Part 1
Technologies
2
2.2
Connection Methods
2.2.1
Connection Model
Networking and Connection
The network management server is connected to the managed system via the Ethernet interface, and the network manag ement client is connected to the network management server via the TCP / IP, as illustrated in Figure 2-2. The ANM2000 (WS / OS) server The managed system TCP / IP
Ethernet
TCP / IP
The ANM2000 GUI
The ANM2000 GUI
The background processing service
Database
The collection service The ANM2000 GUI
Client
Figure 2-2
2.2.2
The networking model
Connection Methods In the network, the access equipment is provided with the inband / outband connection modes by the ANM2000, described as fo llows.
Outband connection mode The outband connection mode means to transmit the management data and service data in two paths respectively; for example, on the AN5116-02, the network cable is connected to the equipment’s FE port on the GUP7 / GUPE7 card.
Figure 2-3 2-4
The outband connection mode Version: F
Part 1
Technologies
2
Networking and Connection
Note: Generally you only need to perform the connection in the previous figure via a twisted pair network cable; if you need to debug the equipment using a PC, you can connect the PC with the equipment via a serial port cable.
Inband connection mode The inband connection mode means to transmit the management data and the service data in one path; for example, on the AN5116-02, the network cable is connected to the equipment’s GE port on the GUP7 card.
Figure 2-4
The inband connection mode
Note: The ANM2000 can visit and manage the equipment via the TCP / IP protocol and the ATM channel.
Version: F
2-5
Part 1
2.3
Technologies
2
Networking and Connection
External Interfaces of the Server End The ANM2000’s Server end has three types of interfaces for external connection:
The communication interface: communicates with the access equipment, using private protocols or the SNMP.
The user interface: is used to connect the Client end and the network management server, using the TCP / IP.
The upper-layer network management system interface: is used to connect the network
management
system
server
and
the
upper-layer
network
management system. Currently the Web Service interface, the TL1 interface, and the CORBA interface are provided.
ANM2000 server
Private protocol, SNMP
Web Service interface, TL1 interface, CORBA interface
TCP / IP
Equipment
ANM2000 client
Figure 2-5
2-6
Upper-layer network management system
The external interfaces of the ANM2000 server
Version: F
3
Management Functions
This chapter describes the management functions of the ANM2000, including the following contents:
Configuration management Fault management Performance management Security management
Version: F
3-1
Part 1
Technologies
3.1
3
Management Functions
Configuration Management The powerful and flexible configuration function is one of the characteristics of the ANM2000. The ANM2000 supports the networks jointly consisting of various access equipment types and the networks with complex topological architectures. It has a clear and direct network architecture which can be modified conveniently, and the property of the network node is specifically described. Users can configure the physical and logical properties of the network equipment flexibly and conveniently in the ANM2000. The configuration management deals with the operations done to the access equipment, including: adding, deleting, modifying and testing the physical configuration, configurations of various system functions.
3.1.1
System Configuration The system configuration covers mainly the f ollowing functions:
System setting: through the system setting commands, the connection can be established between the network management system and the equipment. The system setting parameters include the system name, the management program, the IP address, the subnet mask, the equipment manufacturer name, the OLT system IP address, the username, the user password, etc.
Equipment configuration: delivers the equipment configuration parameters to the system. The parameters include the configurations of the module and its cards, number of ports on a card, port type, line type, line encoding, etc.
Time calibration: makes the managed equipment synchronous with the network management system.
Note: All the three commands mentioned previously are to initialize the system.
Service setting: sets the data service, the voice service, the IPTV service, the CATV service, etc.
3-2
Version: F
Part 1
Technologies
3.1.2
3
Management Functions
Card Configuration The ANM2000 can manage the following types of equipment: the AN5006-20, the AN3300, the AN5116-02, the AN5116-06, the AN5116-06A, the AN5116-06B, etc. Here we take the AN5116-02 as an example to introduce the card configuration functions of the ANM2000. Cards of the AN5116-02 include the EC2 card, the GSWC card, the AC16 card, the GUP7 card, etc. The configurations of various functions are done to the cards, including the following items:
Configuration of the EC2 card: the configuration parameters include the PON port bandwidth, the PON port switch, etc.
Configuration of the GSWC card: the configuration parameters include the office end VLAN information, the QinQ profile, the authentication mode, etc.
Configuration of the AC16 card: the configuration parameters include the voice uplink information, the NGN uplink subscriber information, the V5 information, etc.
Configuration of the GUP7 card: the configuration parameters include the uplink port information, the port mirroring, the port trunk, etc.
Version: F
3-3
Part 1
3.2
Technologies
3
Management Functions
Fault Management The fault management carries out the real time supervision on the abnormal operating status of the telecommunication network equipment and the network channels, including the following aspects:
Supervising, reporting and saving alarm signals
Diagnosing, locating and handling faults
Querying and filtering alarm information
Displaying alarms
The fault management enables users to make responses and decisions in a possibly short time and take measures to isolate and correct the faults, so as to resume the service influenced by the fault. Hereunder goes a brief introduction to the alarm level definition and main functions of the fault management.
Alarm supervision and alarm level definition The alarm supervision is to detect and report the abnormal events occurred in the network and their situations. In the course of the alarm supervision, users can specify which events and situations require automatically generated alarms and which events and situations need the prior request for the alarm report. The alarm level should be set according to the severity of a fault. Generally there are five alarm levels: the communication interruption alarm, the urgent alarm, the major alarm, the subordinate alarm, and the prompt alarm. Communication
interruption
alarm:
includes
the
card
communication
interruption and the system communication interruption.
Urgent alarm: refers to the alarm which causes the service interruption and needs immediate troubleshooting.
Major alarm: refers to the alarm which influences services and needs immediate troubleshooting.
Subordinate alarm: refers to the alarm which does not influence services but needs troubleshooting to avoid deterioration.
3-4
Version: F
Part 1
Technologies
3
Management Functions
Prompt alarm: refers to the alarm which does not influence the current services but has the possibility to influence services; users can decide whether to handle it or not on demand.
In accordance with various alarm levels, the network management system lights the alarm indicators of different colors and notifies users to handle faults in time.
Querying and displaying alarms Alarms are classified into the current alarm and the history alarm.
Current alarm: Refers to the alarm event that still exists currently on the managed NE and does not end or that has not been confirmed and eliminated by the administrator. The current alarm information is saved in the equipment, and is stored in the network management database via two modes: The equipment reports it to the network management system, and the network management system rolls the equipment. A current alarm can be queried directly, and it can also be filtered and displayed according to the alarm status, the time condition, and the alarm level.
History alarm: refers to the alarm that has ended and been confirmed on the managed NE. The history alarm data are stored in the database, and can be read according to the query conditions if needed.
Users can set the query schemes to display the alarm data, with the set contents as follows:
Query object: the query object to be selected includes the management domain, the system, the card, the module, and the port.
Version: F
Query time range: includes the beginning time and the ending time.
Alarm type: queries alarms based on alarm types.
Alarm level: queries alarms based on alarm levels.
Alarm name: queries alarms based on alarm names.
3-5
Part 1
Technologies
3
Management Functions
The ANM2000 displays the collected alarms in a visual form. The displayed contents include the items as follows:
The name of the supervised object (the management domain / system / card / module / port);
The alarm name;
The alarm type;
The beginning time and the ending time;
The confirming user and the confirmation information.
Capacity management The ANM2000 provides the history alarm capacity management function. The alarm capacity management function includes saving the history alarms and displaying the current database operating status.
Saving the history alarm data: limits the history data from occupying the network management system database resource, so as to increase the operation efficiency of the network management system. Users can set the saving threshold according to the number of records supported by the database. When records in the database exceed the saving threshold, the old data will be deleted from the database. The old data can be processed in two modes: to be saved to the harddisk, or be deleted directly. Users can also set the number of saved files.
Displaying the current database operating status: displays the use rate of the current database visually by a pie chart. In addition, users can clear all records in the database as required.
Report management The ANM2000 supports the function to export alarms, and can export the data of the current and history alarms in a *.html or *.excel file.
3-6
Version: F
Part 1
Technologies
3
Management Functions
Fault location In case of the network fault, analyze various alarm signals to locate the fault source exactly. This is the precondition to eliminate the fault. In the ANM2000, a layer-by-layer filtering mechanism is set to filter and analyze the alarms, so as to decrease the information redundancy, possibly narrow down the scope of fault causes and finally locate the fault exactly. The ANM2000 provides the accurate fault location function, capable of locating a fault to a specific system, module, card, port, etc. and revealing the fault information visually to users through the GUI.
3.3
Performance Management In the ANM2000, the performance management is of great importance because the access network is service- and user- oriented and has a high demand on the equipment performance. With careful designs, the ANM2000 can ensure the real time property of the instant performance collection, ensure the exhaustiveness and correctness of the data record on the history performance, and provide convenient and reliable interfaces for users to query performance data as well. The main purpose of the performance management is to collect the quality data on the actual running of the relevant equipment in the access network, form the statistical data used to monitor or adjust the status or efficiency of the system or equipment, and provide a basis of the assessment, analysis, forecast, and planning for management personnel. The detailed functions are as follows:
Performance data collection and saving
Performance data query and display
Capacity management and report management
Performance data collection and saving The ANM2000 provides the performance data collection and saving scheme. Users collect and save the related performance codes of their concerned objects to form the history performance data. The setting items include the performance collection options, the collection time, the collection type, and the performance code.
The performance collection option: the optional query objects include the system, the card, the module, and the port.
Version: F
3-7
Part 1
Technologies
3
Management Functions
The collection time: all time, the fixed time every day, and the given interval can be selected.
The collection type: the 15-minute performance and the 24-hour performance can be selected.
The performance code: a performance name can be selected.
Performance query and display According to whether the performance data have been stored in the database, the performance data are classified into the instant performance and the history performance in the ANM2000.
Instant performance: refers to the instant performance data saved in the equipment; and users can query the current 15-minute performance data and st
th
the latest 1 to 16 15-minute performance data.
History performance: according to the collected and saved performance data, the history performance data are classified into the 15-minute performance data and the 24-hour performance data.
Users can set the query schemes to display the history performance data, with the set contents as follows:
Query object: the query object to be selected includes the system, the card, the module, and the port.
Query time range: includes the beginning time and the ending time.
Query type: the 15-minute performance and the 24-hour performance can be selected.
Performance type: the performance type varies with the query object.
The ANM2000 displays the collected performance data in a visual form and analyses all performance data so as to determine the performance of the system. The displayed contents include the items as follows:
3-8
The name of the supervised object (the system / card / module / port);
The performance type;
The performance value;
The unit;
The beginning time and the ending time.
Version: F
Part 1
Technologies
3
Management Functions
Capacity management The ANM2000 provides the history performance capacity management function. The history performance capacity management function includes setting the history performance dump and displaying the current database operating status. The history performance capacity management function is similar to the history alarm capacity management function. Users can refer to Section 3.2 for the detailed description, and we will not go further on this issue here.
Report management The performance report management function is similar to the alarm report management function. Users can refer to Section 3.2 for the detailed description, and we will not go further on this issue here.
3.4
Security Management The security management is in charge of the security check of the operators who access to the network management system, so as to avoid the illegal access of unauthorized operators to the network resources and equipment. The security management relates to all management functions, and its main functions are as follows:
Management of the user level and authority
Access control
Data security
Management of the user level and authority To define the legal users, their authorities and management domains and restrict the cross-right operations, the authorities of different users are classified into five levels by the ANM2000. Different management authorities are given to users at different levels, and to a certain user, only the management range within his / her authority is open to him / her. The senior users are provided with all functions of the junior users. Administrator
Version: F
3-9
Part 1
Technologies
3
Management Functions
Has the highest level. In addition to all functions for the manager, the administrator is provided with the function of modifying the administrator configuration and creating, deleting and modifying users at all levels (including the user No., the staff number, the password, etc). Manager
Has the high-level authority only second to the administrator, with all authorities of the power user. The dedicated operations of the manager authorities are as follows:
Importing
the
system
configuration,
delivering
the
management
configuration, delivering the equipment configuration, and writing the equipment data;
Defining the alarm level, the performance collection scheme, the alarm filter, and the performance history filter;
Saving data into the database.
Power user The power user has a level with certain limits, provided with the authorities for the following operations:
Detecting the physical configuration;
Copying and pasting the object configuration;
Deleting nodes, and saving the system configuration into the database.
User
The user is provided with the operation authorities for limited functions, owning the authorities for the following operations:
Querying the instant performance and the history performance, managing the history performance report;
Querying the current alarm and the history alarm, managing the history alarm report;
3-10
Viewing the command manager.
Version: F
Part 1
Technologies
3
Management Functions
Guest
The guest is the system monitoring user with the lowest level. Users of this type can only monitor the properties such as the system alarm status and the user port status, and their access to data is commonly restricted only to the “read” operation. Their main authorities are as follows:
Viewing the alarm statistics, viewing the log, and viewing the alarm report information;
Querying the user port status, modifying the history alarm dump threshold, modifying the equipment attributes information;
Searching the system, restoring the card name, and the equipment statistic function.
Access control The access control relates to the user register and the login management, the management domain partition, the user command authority assignment, the access time limit, the remote access control, etc. It is for the purpose of restricting the access of illegal users to the network resources (including the network management system itself) or the cross-right access. User
register
and
login
management:
before
entering
the
network
management system, an operator should log in the system, input the username and password, and then enter after being confirmed by the system. The purpose of this action is to ensure that only the authorized operators can access the network management system.
Management domain partition: the managed equipment sets are classified into different domains as required. Operators are empowered according to the management domains, the management functions, etc. Only the authorized operators can access the designated domains. Domains can be added, modified, and deleted as required.
User command authority assignment: according to the assigned authority, a user can only perform the allowed operations on the equipment within his / her corresponding authorized management domain.
Access time limit: a user’s access time can also be set as required. For example, only allows operators to access the network management system within the designated time range.
Access point limit: the system can restrict the client IP addresses of the user login to refuse the access of illegal clients.
Version: F
3-11
Part 1
Technologies
3
Online
user
management:
the
ANM2000
Management Functions
supports
the
online
user
management function.
Data security The security mechanism in the ANM2000 can meet the data security guarantee requirements effectively, and offer data the completeness and confidentiality and security management measures of the database.
Data completeness: ensures that the data reach and only reach the destination and guarantees that the data are transmitted without distortion or loss on one hand, and ensures that the corresponding data are saved and can be restored when necessary on the other.
Data
confidentiality: prevents unauthorized operators from getting the
transmission data of the communication and protects the transmission data from leakage.
Database security management: provides the guarantee for the network management system security. The data or files in the database can be backed up totally or partially into the external storage device.
3-12
Version: F
e-Fim ANM2000 Broadband Access Network Management System Operation Manual (Based on Windows) Version: F Code: MN000000050
Part 2 Operations
4
System Management
The system management means the operations relevant to the basic functions of the ANM2000. The relationships between the system management functions, sub-functions, and operations are shown in Figure 4-1.
Enter / exit edit mode
Import configuration data
Import / export configuration data
Export configuration data
Save configuration data Configure audio function
View system and database information
System managem ent
Set audio function
Disable audio function
Lock / log out / exit network management system
Print
Lock network management system Log out network management system Exit network management system
Close all Telnet windows
Figure 4-1
Relationships around the system management function
This chapter includes the following contents:
Entering / exiting the edit mode Saving the configuration data Importing / exporting the configuration data Closing all Telnet windows Setting the audio function Viewing the system and database Information Common settings Printing Locking / logging out / exiting the network management system
Version: F
4-1
Part 2
4.1
Operations
4
System Management
Entering / Exiting the Edit Mode If you need to perform the basic configuration operations such as adding or deleting management domains / systems / modules / cards, importing the configuration data, and saving the configurations, you must enter the edit mode first. Table 4-1
The operation entry path of entering edit mode
Operation Item
Entering mode
the
Operation Entry Path
edit
System
→
Edit Mode in the main menu
in the toolbar
After entering the edit mode via the paths listed in Table 4-1, if you want to exit the edit mode, you only need to click System
→
Edit Mode in the main menu or
in the toolbar again.
4.2
Saving the Configuration Data After finishing the configuration operations, you usually need to save the configuration data in the database. Table 4-2
The operation entry path of saving the configuration data
Operation Item
Saving
Operation Entry Path
the
configuration data
System
→
Save To Database in the main menu
in the toolbar
Note: After saving the configuration data successfully, the ANM2000 will exit the edit mode automatically.
4-2
Version: F
Part 2
Operations
4.3
4
System Management
Importing / Exporting the Configuration Data You can export the current data of the ANM2000 to the local network management computer for backing up the data, and also can import the local backup data to the ANM2000. Table 4-3
The operation entry path of importing / exporting the configuration data
Operation Item
Importing
Operation Entry Path
the
configuration data Exporting
the
configuration data
4.3.1
System
→
Import Configuration in the main menu
System
→
Export Configuration in the main menu
Importing the Configuration Data
Purpose This operation is used to import the configuration files in the network management computer to the ANM2000.
Background information After the configuration data are imported, the current configured data in the ANM2000 will be overwritten.
Prerequisite
Version: F
The system is in the edit mode.
The configuration files to be imported are saved in one same folder.
4-3
Part 2
Operations
4
System Management
Operation steps Step 1: Open the alert box of importing the configuration as shown in Figure 4-2 via the paths listed in Table 4-3.
Figure 4-2
The alert box of importing the configuration
Step 2: Click Yes in this alert box to open the Choose Directory dialog box, as shown in Figure 4-3.
Figure 4-3
4-4
The Choose Directory dialog box
Version: F
Part 2
Operations
4
Step 3: Click
System Management
in this dialog box to open the Browse For Folder dialog box, as
shown in Figure 4-4.
Figure 4-4
The Browse For Folder dialog box
Step 4: Select the folder to be imported in this dialog box and click OK to exit the Browse For Folder dialog box, and return to the Choose Directory dialog box. Step 5: Click OK in the Choose Directory dialog box.
Version: F
4-5
Part 2
Operations
4.3.2
4
System Management
Exporting the Configuration Data
Purpose This operation is used to export the current configuration data in the ANM2000 and save them in the *.xml format in the dedicated position of the network management computer.
Operation steps Step 1: Open the Choose Directory dialog box as shown in Figure 4-3 via the paths listed in Table 4-3.
Step 2: Click
in this dialog box to open the Browse Folder dialog box, as
shown in Figure 4-4. Step 3: Select the object folder in this dialog box and click OK to exit the Browse Folder dialog box and return to the Choose Directory dialog box. Step 4: Click OK in the Choose Directory dialog box.
4.4
Closing All Telnet Windows When you want to close multiple opened Telnet windows in the ANM2000 at one time, please click System
4-6
→
Close All Telnet Windows in the main menu.
Version: F
Part 2
Operations
4.5
4
Setting the Audio Function Table 4-4
The operation entry path of setting the audio function
Operation Item
Configuring
Operation Entry Path
the
audio function Disabling the audio function
Enabling the audio function
4.5.1
System Management
System
→
Sound Configuration in the main menu
System
→
Close Sound in the main menu
in the toolbar System
→
Open Sound in the main menu
in the toolbar
Configuring the Audio Function
Purpose The ANM2000 provides abundant audio functions, prompting you the occurring of a corresponding operation event or to conduct the next operation. You can also define your custom audio functions on demand.
Version: F
4-7
Part 2
Operations
4
System Management
Operation steps Step 1: Open the Sound Config dialog box via the paths listed in Table 4-4, as shown in Figure 4-5.
Figure 4-5
The Sound Config dialog box
After you select a certain event, the system will display the path including its audio file. Step 2: Click Test at the right side of a certain event to listen to the current audio function for test.
4-8
Version: F
Part 2
Operations
4
System Management
Step 3: To change the audio function file corresponding to the occurring of a certain event, click this event and then Browse to open the Open dialog box as shown in Figure 4-6; then select the object audio function file and click Open.
Figure 4-6
The Open dialog box
Step 4: Select OK to save the audio function. Step 5: Click Return Default Setting to make the audio functions of all events return to the default settings; then click OK to save the settings.
Version: F
4-9
Part 2
Operations
4.5.2
4
System Management
Disabling the Audio Function If you do not need the audio function, you can disable it via the paths listed in Table 4-4.
After the audio function is disabled successfully,
in the toolbar will change to
; at the same time, the submenu option Close Sound under System in the main menu will change to Open sound.
4.5.3
Enabling the Audio Function After the audio function is disabled, if you want to resume the aud io function again, you can enable it via the paths listed in Table 4-4.
After the audio function is enabled successfully,
in the toolbar will change to
; at the same time, the submenu option Open Sound under System in the main menu will change to Close Sound.
4.6
Viewing the System and Database Information
Purpose To make users view the information of the system and the database easily, the ANM2000 provides the system and database viewing function; at the same time, it adds the report and chart display function of the background server.
4-10
Version: F
Part 2
Operations
4
System Management
Operation steps Table 4-5
The operation entry path of viewing the system and database information
Operation Item
Viewing
the
and
Operation Entry Path
system database
information
System
→
System And Database Information (W) in the main
menu Admin Tool
→
System And Database Information (W) in the
Admin Tool tab
Step 1: Open the System And Database Information tab via the paths listed in Table 4-5, and the System Information page will be displayed by default. In this page, users can view the information of the current system, such as PC Name, IP Address, OS Information, CPU Type, Memory and Process. See Figure 4-7.
Figure 4-7
The System And Database Information tab (1)
You can right-click the blank and select Refresh in the shortcut menu to refresh the procedure status. Step 2: Click Server System Information Report to enter the Server System Information Report tab. In this tab, right-click any position, and select Set Query Condition to open the Server System Information Condition Set dialog box.
Version: F
4-11
Part 2
Operations
4
System Management
Step 3: Set the query condition on demand, and then click OK. In this case, you can view the information of the current background server, such as Item Name, CPU Percentage, and Memory Percentage. See Figure 4-8.
Figure 4-8
The System And Database Information tab (2)
Step 4: Click Server System Information Chart to enter the Server System Information Chart tab. In this tab, you can view the chart information of the current background server. See Figure 4-9.
Figure 4-9
4-12
The System And Database Information tab (3)
Version: F
Part 2
Operations
4
System Management
Step 5: Click Database Information to enter the Database Information tab. In this tab, you can view the information of the current database, such as the capacity and use percentage. See Figure 4-10.
Figure 4-10
4.7
The System And Database Information tab (4)
Common Settings Users can set the common parameters of the ANM2000 GUI and its background based on the actual situation of the office end in which the ANM2000 locates, for the effective network management.
4.7.1
System Setting
Purpose You can use the system setting function to make the ANM2000 regularly refresh the online user list and automatically lock the Client end after no operation within the set time to ensure the network security.
Version: F
4-13
Part 2
Operations
4
System Management
Operation steps Step 1: Select System Step 2: Select GUI
→
→
Option in the main menu to open the Option dialog box.
System in the object tree.
Step 3: Refer to the settings listed in Table 4-6 on demand. Table 4-6
The system setting
Parameter
Instruction
Auto refresh
Refresh
online
user
The automatic refresh time in the Online User Management tab.
every:
Select this item: if there is not any operation on a Client end within the time set in the Lock System wait for: item, Enable auto lock system
the system will lock the Client end automatically; if the Client end does not log in the ANM2000 again within the time
Auto lock
set in the Logout when system locked item, the system will log out automatically. Lock System wait for:
The waiting time of system automatic lock
Logout
The automatic logout time after the
locked
when
system
system locked
Step 4: Click the OK button. Step 5: Restart the Client end to make th e configuration valid.
Configuration instance Figure 4-11 gives a configuration instance of the Auto lock pane: if there is not any operation on the current Client end within 10 minutes, the system will automatically lock the Client end; if the Client end does not log in the ANM2000 again after being locked within 4294967295 minutes, the system will log out automatically.
Figure 4-11 4-14
A configuration instance of the Auto lock pane Version: F
Part 2
Operations
4.7.2
4
System Management
Connection Setting
Purpose You can use the connection setting function to set the RCF call and connection timeout values, and the checking connection interval and the allowing interruption time values of the connection between the Client and Server ends, to ensure the high-effective RCF connection and GUI background connection.
Background information If no special needs, we recommend that you do not modify the parameters of this connection setting.
Operation steps Step 1: Select System Step 2: Select GUI
→
→
Option in the main menu to open the Option dialog box.
Connection in the object tree.
Step 3: Refer to the settings listed in Table 4-7 on demand. Table 4-7
The connection setting
Parameter
Instruction
The timeout value of establishing the RCF connection wait for:
connection between the GUI and the background
RCF setting RCF Call wait for:
The timeout value of executing operations Check whether the connection between
Check connection every: Setting
intervals which are set in this item.
for
Connection between and server
the GUI and the background is normal at
If Client
Reboot Client if Interrupt for:
the
interruption
time
of
the
communication between the GUI and the background is less than this set time, it indicates that the communication between the GUI and the background is normal.
Step 4: Click the OK button. Step 5: Restart the Client end to make th e configuration valid.
Version: F
4-15
Part 2
Operations
4
System Management
Configuration instance 1 Figure 4-12 gives a configuration instance of the RCF setting pane: in the process of establishing connection between the Client end and the background, if the response time exceeds 10 seconds, it indicates that the connection establishment fails; when users call the background functions via the Client end and the response time from the background exceeds 360 seconds, it indicates that the connection timed out.
Figure 4-12
A configuration instance of the RCF setting pane
Configuration instance 2 Figure 4-13 gives a configuration instance of the Setting for Connection between Client and server pane: the system will check whether the connection between the GUI and the background is normal every 20 seconds; when the interruption time of the communication between the GUI and the background is 0 second, it indicates that the communication between the GUI and the background is normal.
Figure 4-13
A configuration instance of the Setting for Connection between Client and
server pane
4-16
Version: F
Part 2
Operations
4.7.3
4
System Management
Service Setting
Purpose You can use the service setting function to set the time interval of getting the MCU card’s status and the time interval of refreshing current alarms, to more timely display the key information that you concern about.
Operation steps Step 1: Select System Step 2: Select GUI
→
→
Option in the main menu to open the Option dialog box.
Service in the object tree on the left of the pane, to open the
dialog box as shown in Figure 4-14.
Figure 4-14
Version: F
The dialog box of service setting
4-17
Part 2
Operations
4
System Management
Step 3: Refer to the settings listed in Table 4-8 on demand. Table 4-8
The service setting
Parameter
Instruction
Get MCU board status every:
Refresh current alarm every:
Get the MCU card’s status at intervals which is set in this item. Refresh the Current Alarm GUI at intervals which is set in this item.
Step 4: Click the OK button. Step 5: Restart the Client end to make th e configuration valid.
4.7.4
International Setting
Purpose You can use the international setting function to switch the languages (i.e. Chinese and English) displayed in the GUI, so as to meet your requirement on multiple languages displayed in the GUI.
Operation steps Step 1: Select System Step 2: Select GUI
→
→
Option in the main menu to open the Option dialog box.
International setting in the object tree.
Step 3: Click the drop-down list of the Language: item to select your preferred language. Step 4: Click the OK button. Step 5: Restart the Client end to make the configuration valid.
4-18
Version: F
Part 2
Operations
4.7.5
4
System Management
Telnet Proxy Enable
Purpose After enabling the Telnet proxy service, you can access the equipment on the Client end via the proxy server.
Background information
In the project application, a firewall is usually set between the ANM2000 Client end and the equipment for the network security reasons, so the Client end cannot access the equipment in the Telnet mode directly. In this case, you can set up a secure third-party server as a proxy server to access the equipment via the proxy server.
This setting pane is for you to enable the Telnet proxy Client end. To use the Telnet proxy function, you also need to install the Telnet proxy Server end on the third-party server and configure the related parameters, referring to Step 5: Restart the Client end to make the configuration valid .
Set the Telnet proxy Sever.
Operation steps Step 1: Select System Step 2: Select GUI
→
→
Option in the main menu to open the Option dialog box.
Telnet Proxy Enable in the object tree.
Step 3: Select the Telnet Proxy Enable item and set the Telnet Proxy Program Path: item. Step 4: Click the OK button. Step 5: Restart the Client end to make the configuration valid.
Version: F
4-19
Part 2
Operations
4.7.6
4
System Management
Resources Statistics GUI Client
Purpose You can set the ONU Device Statistic GUI by horizontal or vertical display based on ONU types, so as to match your usage better.
Operation steps Step 1: Select System Step 2: Select GUI
→
→
Option in the main menu to open the Option dialog box.
Resources Statistics GUI Client in the object tree.
Step 3: Select Horizontal Display by ONU Type or Vertical Display by ONU Type on demand. Step 4: Click the OK button. Step 5: Restart the Client end to make the configuration valid.
Note: Click Statistic ONU Device Statistic in the main menu to open the ONU Device Statistic tab. And then you can switch the ONU type display mode, using the shortcut menu. →
4.7.7
Client Setting
Purpose You can set the related characteristics for the Client, including the time of forbidding to login after the forced disconnection and the auto unlock time after the login locked, to ensure the operation security of network.
Operation steps Step 1: Select System
4-20
→
Option in the main menu to open the Option dialog box.
Version: F
Part 2
Operations
4
Step 2: Select Server
→
System Management
Client in the object tree, to open the dialog box as shown
in Figure 4-15.
Figure 4-15
The dialog box of Client setting
Step 3: Refer to the settings listed in Table 4-9 on demand. Table 4-9
The Client setting
Parameter
Instruction
If an administrator forces other users offline, the forced Forbid to login for:
offline users cannot log in the ANM2000 within the set time of this item. If a user uses the wrong password to log in the ANM2000
Auto unlock time after lock
three times in succession, the user will be locked. The
when login:
locked user will be unlocked automatically after the period of time set in this item. If you select this item, the Configuration main menu will
Display [OLT manage] item on
display the OLT Register Management option; if not, the
config menu
OLT Register Management option will not in the Configuration main menu.
If you select this item, then you can delete the command Delete Command Log Enable
log through the shortcut menu in the View The Command Log window; if not, the delete option in the shortcut menu
is grayed (unusable). Pre-deploy
Version: F
N/A
4-21
Part 2
Operations
4
System Management
Step 4: Click the OK button. Step 5: Restart the Client end to make th e configuration valid.
4.7.8
Database Setting
Purpose You need to regularly update the database user name and password to guarantee the security of the database. After finishing this modification on the database, you also need to modify the related parameters of the ANM2000 at the same time, in order to ensure that the ANM2000 can successfully access the database.
Operation steps Step 1: Select System
→
Option in the main menu to open the Option dialog box.
Step 2: Select Server
→
Database in the object tree, to open the dialog box as
shown in Figure 4-16.
Figure 4-16
The dialog box of database setting
Step 3: Set each item on demand.
4-22
Version: F
Part 2
Operations
4
System Management
Note: If you modify the setting of the EMS ANServer bind IP item or the Bind to port item, then the Client end originally connected to this server IP will be disconnected. Step 4: Click the OK button. Step 5: Restart the Client end to make th e configuration valid.
4.7.9
Polling Setting
Purpose You can use the polling setting function to set the period and time interval of alarm polling and status lamp polling, to meet your special requirement on the polling time.
Background information If no special needs, we recommend that you do not modify the parameters of this polling setting.
Operation steps Step 1: Select System Step 2: Select Server
→
→
Option in the main menu to open the Option dialog box.
Polling in the object tree.
Step 3: Set each item on demand. Among them:
The polling period: refers to the time interval between two polling operations.
The polling interval: refers to the time interval of polling different devices in one polling operation.
Step 4: Click the OK button. Step 5: Restart the Client end to make th e configuration valid.
Version: F
4-23
Part 2
Operations
4.7.10
4
System Management
Alarm Forward Setting
Purpose You can use the alarm forward setting function to set the related parameters of sending E-Mail in the alarm forward, such as E-Mail server and Send mail address.
Operation steps Step 1: Select System Step 2: Select Server
→
→
Option in the main menu to open the Option dialog box.
Alarm Forward in the object tree.
Step 3: Select the Forward alarm check box on demand and set each item, as shown in Figure 4-17.
Figure 4-17
The dialog box of alarm forward setting
Step 4: Click the OK button. Step 5: Restart the Client end to make th e configuration valid.
4-24
Version: F
Part 2
Operations
4.7.11
4
System Management
Load Plug-in Setting
Purpose When using the CORBA interface to connect the third-party software, you need to load the CORBA interface.
Operation steps Step 1: Select System
→
Step 2: Select Server
→
Option in the main menu to open the Option dialog box.
Load Plug-in in the object tree.
Step 3: Select the Load CORBA-Interface check box on demand. Step 4: Click the OK button. Step 5: Restart the Client end to make the configuration valid.
4.7.12
Alarm Sets Setting
Purpose You can set the fixed time or the automatic confirmation mode for confirming the ended alarms, to improve the efficiency of alarm confirmation.
Operation steps Step 1: Select System Step 2: Select Server
→
→
Version: F
Option in the main menu to open the Option dialog box.
Alarm sets in the object tree.
4-25
Part 2
Operations
4
System Management
Step 3: Set each parameter related to the alarm automatic confirmation on demand, referring to the settings listed in Table 4-10. Table 4-10
The alarm sets setting
Parameter
Instruction
When you select Fixed time and set the time, the ANM2000 will confirm the ended alarms automatically in
Fixed time
the set time. When you select Confirm when alarm end , the ANM2000 will confirm an alarm automatically after it is
Confirm when alarm end
ended.
Step 4: Click the OK button. Step 5: Restart the Client end to make th e configuration valid.
4.7.13
Telnet Proxy Server Setting
Purpose After setting the parameters related to the Telnet proxy server, you can use the proxy server to access the equipment.
Background information This function should be used together with the Telnet Proxy Enable function.
Operation steps Step 1: Select System
4-26
→
Option in the main menu to open the Option dialog box.
Version: F
Part 2
Operations
4
Step 2: Select Server
→
System Management
Telnet Proxy Server Setting in the object tree, as shown
in Figure 4-18.
Figure 4-18
The dialog box of Telnet proxy server setting
Step 3: Set the parameters related to the proxy server according to the actual situation. Step 4: Click the OK button. Step 5: Restart the Client end to make th e configuration valid.
4.8
Printing
Purpose The ANM2000 provides perfect print functions; you can select and print your own concerned data information.
Version: F
4-27
Part 2
Operations
4
System Management
Operation steps Table 4-11
The operation entry path of printing
Operation Item
Setting
the
Operation Entry Path
print
options Setting preview Printing
the
print
System
→
Print Options in the main menu
System
→
Print Preview in the main menu
System
→
Print… in the main menu
Step 1: Open the Page Setup dialog box via the path Print Option listed in Table 4-11, as shown in Figure 4-19.
Figure 4-19
The Page Setup dialog box
Step 2: In the Page Setup dialog box, set the items such as Headers and Footers, Paper , Orientation, Margins, and Printer on demand. Then click OK.
4-28
Version: F
Part 2
Operations
4
System Management
Step 3: Preview the print result in the view pane via th e path Print Preview listed in Table 4-11, as shown in Figure 4-20. If you are not satisfied with the print result, click Close and conduct step 2 again; if you are satisfied with the print result, click Close and conduct step 4.
Figure 4-20
The print preview
Step 4: Open the Print dialog box via the path Print… listed in Table 4-11, as shown in Figure 4-21.
Figure 4-21
The Print dialog box
Step 5: In the Print dialog box, set the items such as Printer , Print range, and Number of copies. Then click OK.
Version: F
4-29
Part 2
Operations
4
System Management
Step 6: In the Save As PDF File window that appears subsequently, you can save the contents to be printed as a file in the pdf format to the designated path on demand.
4.9
Locking / Logging out / Exiting the Network Management System Table 4-12
The operation entry path of locking / logging out / exiting the network management
system Operation Item
Locking
the
Operation Entry Path
network
management system Logging
out
System
→
Lock… in the main menu
System
→
Logout in the main menu
System
→
Exit in the main menu
the
network management system Exiting
the
network
management system
4.9.1
at the top right corner of the ANM2000 window
Locking the Network Management System
Purpose Locking the network management system is one of the security management measures. After this operation is executed, the current system operation GUI will be locked, and no GUI operations can be performed.
Operation steps After the network management system is locked via the path listed in Table 4-12, the ANM2000 User Login dialog box will appear automatically, as shown in Figure 4-22. The locking status can be cancelled only after you input the correct password at the right side of Password and click OK.
4-30
Version: F
Part 2
Operations
4
Figure 4-22
4.9.2
System Management
The ANM2000 User Login dialog box
Logging out the Network Management System
Purpose When needing to modify the login user, you can first log out the network management system and then log in it as a new user.
Operation steps Step 1: Select the path listed in Table 4-12, and the exit alert box as shown in Figure 4-23 will appear automatically.
Figure 4-23
The exit alert box
Step 2: Click OK in this alert box to exit the ANM2000; then the ANM2000 User Login dialog box as shown in Figure 4-24 will appear automatically.
Version: F
4-31
Part 2
Operations
4
Figure 4-24
System Management
The ANM2000 User Login dialog box
Step 3: In the ANM2000 User Login dialog box, input the username and the password in turn, and click OK to log in again.
4.9.3
Exiting the Network Management System
Purpose Under certain special conditions (for example, prior to the upgrade operation of the network management system), you need to exit the network management system.
Operation steps Step 1: Select the path listed in Table 4-12, and the exit alert box as shown in Figure 4-25 will appear automatically.
Figure 4-25
The exit alert box
Step 2: Click OK in the exit alert box.
4-32
Version: F
5
Configuration Management
The configuration management means the operations to configure the information of the network and the system equipment, and is the most important core management
function
of
the
ANM2000.
The
relationships
between
the
configuration management functions, sub-functions and operations are shown in Figure 5-1. Configure manager Manage capacity of history database
Manage EPON subscriber
Add configuration comparing task Add POTS port test task
Manage timed task
Add system configuration backup task
Figure 5-1
Configuration management function
Manage OLT register
Trace signalling
Manage configuration Set home gateway in bulk mode
Relationships around the configuration management function
This chapter includes the following contents:
Manager configuration EPON user management Home gateway setting Timing task management Signal trace The 5116 configuration manager Configuration manager Historical database capacity management Device auto discovery Version: F
5-1
Part 2
Operations
5
Configuration Management
History event query Upgrading the ONUs in batches Upgrading the MSAN line card software in batches Backing up the system configuration in batches Restoring the system configuration in batches Backing up the system software in batches Upgrading the system software in batches
5-2
Version: F
Part 2
Operations
5.1
5
Configuration Management
Manager Configuration
Background information The AEMS-Manager service is mainly used to interexchange the data between the equipment and the ANM2000. When there is relatively much equipment to be managed (for example, there are more than 500 OLTs), users generally install various services of the ANM2000 in the distributed mode, so as to increase the data-processing capacity of the ANM2000; in this case, the AEMS-Manager service may be installed on different computers.
Purpose To communicate with all equipment sets normally, when installing the ANM2000 in the distributed mode, you need to configure the server with the AEMS-Manager service on it as the manager. For the non-distributed installation, this operation is not needed.
Operation steps Table 5-1
The operation entry path of configuring the manager
Operation Item
Configuring
Operation Entry Path
the
manager
Step 1: Click the
Config Manage
→
Manager Configuration in the main menu
in the toolbar
icon in the toolbar of the ANM2000 main GUI or System
→
Edit Mode in the main menu to enter the edit mode. Step 2: Open the Manager Configuration dialog box as shown in Figure 5-2 via the path listed in Table 5-1.
Version: F
5-3
Part 2
Operations
5
Figure 5-2
Configuration Management
The Manager Configuration dialog box
Step 3: Execute the following operations on demand.
Add a manager: input a new manager’s IP address under Manager IP Address: and then click Add.
Modify the IP address of a manager: select the IP address to be modified, input the new manager’s IP address under Manager IP Address: and then click Modify.
Delete the IP address of a manager: select the IP address to be deleted, and then click Delete.
Step 4: Click OK. When multiple managers are configured, you can select the corresponding manager in the system property of the managed equipment.
5-4
Version: F
Part 2
Operations
5.2
5
Configuration Management
EPON User Management
Purpose Managing the EPON subscriber means to manage the service configurations of the ONU of the AN5116-02 and the AN5116-06.
Note: The subscriber mentioned in this section refers to the subscriber connected with the ONU of the AN5116-02 and the AN5116-06, and does not mean the user operating the ANM2000. Prerequisite
Only the users with the levels not lower than the middle level have this operation authorization.
Operation steps Table 5-2
The operation entry path of managing the EPON subscriber
Operation Item
Operation Entry Path Config Manage
→
EPON user management in the main menu
Managing the EPON
Config
subscriber
in the Object Tree tab
→
EPON user management in the shortcut menu of a system
EPON user management in the shortcut menu of a module in the Object Tree tab
Version: F
5-5
Part 2
Operations
5
Configuration Management
Step 1: Select a path listed in Table 5-2 to enter the EPON User Management window as shown in Figure 5-3.
Figure 5-3
The EPON User Management window (1)
Step 2: Select the card object needing to add subscribers, and click User Management
→
Add User / Add FTTB User in the main menu or
/
in the
toolbar to open the New Add User target system S1 dialog box as shown in Figure 5-4.
Figure 5-4
5-6
The New Add User target system S1 dialog box
Version: F
Part 2
Operations
5
Configuration Management
Step 3: Input the values of various information items in turn according to the actual demands, and then click OK or Apply to open the authorization dialog box as shown in Figure 5-5.
Figure 5-5
The authorization dialog box
Step 4: In the authorization dialog box, select the value of ONU Type and click Get Auth No; finally click Save Database or Write Device to save the configuration in the database or write it to the equipment. After the operation is successful, the basic information of the newly-added subscriber will be displayed in the EPON User Management window, as shown in Figure 5-6.
Figure 5-6
Version: F
The EPON User Management window (2)
5-7
Part 2
Operations
5
Configuration Management
Note: Write Device includes two operations—saving the configuration in the database and downloading the configuration to the equipment; Write DB only saves the configuration in the database, and users usually use it on demand when the configuration in the database is not consistent with that of the actual equipment. Step 5: For the versions lower than V1.3 (not including V1.3) of the 5116-02 and the 5116-06, when the configuration data of the network management system and the equipment are different, you need to conduct this step. 1.
Select a path listed in Table 5-2 to enter the EPON User Management window.
2.
Select the object ONU, and click User Data Check in the main menu or in the toolbar; if the system displays the information as shown in Figure 5-7, this indicates that the authorization status of the network management system is different with that of the equipment.
Figure 5-7
The authorization status of the network management system being different with
that of the equipment
5-8
Version: F
Part 2
Operations
5
3.
Configuration Management
Close the User Data Check window, and return to the EPON User Management window.
4.
Right-click the object, and select Delete in the shortcut menu; then click Yes in the alert box to delete the subscriber and deauthorize the ONU. See Figure 5-8.
Figure 5-8
5.
Deauthorizing the ONU
Click User Data Check in the main menu or
in the toolbar to open the
User Data Check window as shown in Figure 5-9.
Figure 5-9
Version: F
Performing the user data check again
5-9
Part 2
Operations
5
6.
Click
Configuration Management
, and then click OK in the dialog box as shown in Figure 5-10 to
authorize the ONU again.
Figure 5-10
Authorizing the ONU again
After the ONU is authorized again, the authorization states of the ANM2000 and the equipment are the same, as shown in Figure 5-11.
Figure 5-11
The authorization status of the network management system being the same as
that of the equipment
5-10
Version: F
Part 2
Operations
5.3
5
Configuration Management
Home Gateway Setting
Purpose If you need to set the MAC address of the home gateway in batches, you can enable this function.
Operation steps Step 1: Click Config Manage
→
Home Gateway Setting in the main menu to
open the Home Gateway Setting window as shown in Figure 5-12.
Figure 5-12
The Home Gateway Setting window
Step 2: Click the
button in the toolbar, input the number of the rows to be
added, and then click OK.
Figure 5-13
Version: F
The dialog box to add rows
5-11
Part 2
Operations
5
Configuration Management
Step 3: Click the added item, and input the values of Start MAC Address and End MAC Address in turn, as shown in Figure 5-14.
Figure 5-14
Inputting the MAC address
Step 4: Click the
,
, or
button on demand, and the system will display the execution results, as shown in Figure 5-15.
Figure 5-15
5-12
The execution results
Version: F
Part 2
Operations
5.4
5
Configuration Management
Timing Task Management Managing the timed task is used to execute the configuration comparison task, the POTS port line test task, or the system configuration backup task in the fixed time.
5.4.1
Adding the Configuration Comparison Task
Purpose You can use this task to compare whether the configuration data of the selected card are the same as those stored in the database.
Operation steps Step 1: Click Config Manage
→
Timed task Manage in the main menu to open
the Timed task manage window as shown in Figure 5-16.
Figure 5-16
Version: F
The Timed task manage window
5-13
Part 2
Operations
5
Step 2: Click Add Operation
Configuration Management
Add Config Compare Task in the main menu of
→
the Timed task manage window or the button in the toolbar to open the CFG Compare Timed task dialog box as shown in Figure 5-17.
Figure 5-17
The CFG Compare Timed task dialog box
Step 3: Select the equipment object, and then set the enabling state, the period, and the start time of the task in turn. Step 4: Click OK to save the setting, and the ANM2000 can compare whether the configuration data of the card are the same as those stored in the database on a fixed time; the comparison results will be displayed in the dialog box at the bottom of the window.
5-14
Version: F
Part 2
Operations
5.4.2
5
Configuration Management
Adding the POTS Port Line Test Task
Purpose You can use this function to test whether the POTS port of the ONU is normal.
Operation steps Step 1: Click Config Manage
→
Timed task Manage in the main menu to open
the Timed task manage window as shown in Figure 5-16. Step 2: Click Add Operation
Add POTSport Line Test Task in the main menu
→
of the Timed task manage window or the button in the toolbar to open the POTSport in out line test dialog box as shown in Figure 5-18.
Figure 5-18
Version: F
The POTSport in out line test dialog box (1)
5-15
Part 2
Operations
5
Configuration Management
Step 3: In the Basic parameter setting tab, set the enabling state, the period and the start time of the task. Step 4: Click the POTSport in out line test tab and select the equipment object.
Figure 5-19
The POTSport in out line test dialog box (2)
Step 5: Click OK, and the ANM2000 can perform the test on a fixed time; the test results will be displayed in the dialog box at the bottom of the window.
5-16
Version: F
Part 2
Operations
5.4.3
5
Configuration Management
Adding the System Configuration Backup Task
Purpose You can use this function to back up the configuration data of the selected equipment to the server with the appointed IP address.
Operation steps Step 1: Click Config Manage
→
Timed task Manage in the main menu to open
the Timed task manage window as shown in Figure 5-16. Step 2: Click Add Operation
→
Add System Config Backup Task in the main
menu of the Timed task manage window or the button in the toolbar to open the System config backup task dialog box as shown in Figure 5-20.
Figure 5-20
Version: F
The System config backup task dialog box (1)
5-17
Part 2
Operations
5
Configuration Management
Step 3: In the Basic parameter setting tab, set the enabling state, the period and the start time of the task. Step 4: Click the System config backup task setting tab, as shown in Figure 5-21. Then select the equipment object and set the IP address, the login username, and the password of the FTP server.
Figure 5-21
The System config backup task dialog box (2)
Step 5: Click OK to save the setting, and the ANM2000 can perform the test on a fixed time to back up the configuration data of the selected equipment to the server with the appointed IP address.
5-18
Version: F
Part 2
Operations
5.5
5
Configuration Management
Signal Trace
Background information Currently only the AN5116-02, the AN5116-06, and the AN5116-06B support this function.
Purpose Tracing the signaling is used to trace the signalling frame of the communication between the current IAD and the voice communication card, so as to find the communication faults in time.
Operation steps Please refer to the contents on the signalling tracing in the configuration guide of each type of equipment.
5.6
The 5116 Configuration Manager
Purpose You can use this function to upload and download the configuration data of the 5116-02 or the 5116-06, so as to keep the configuration data of the equipment the same as those in the database; or you can use this function to copy the configuration data of a certain object to another object, so as to configure the equipment rapidly.
Background information In the operation of managing the 5116 configuration,
Packet Download: Means overwriting the equipment configuration with the configuration data in the database.
Packet Upload: Means overwriting the configuration data in the database with the equipment configuration.
Config Copy: Means copying the configuration data of the object A to the object B.
Version: F
5-19
Part 2
Operations
5
Configuration Management
Operation steps Step 1: Click Config Manage
→
5116 Config Manager in the main menu to open
the Manage Configuration window as shown in Figure 5-22.
Figure 5-22
The Manage Configuration window (1)
Step 2: When you need to upload and download the configuration data, operate as follows: Select the object module, perform the operations in Table 5-3 on demand, and then click Yes in the alert box that appears. Table 5-3
Functions of the main menu and toolbar icons in the Manage Configuration
window Main Menu
Operation
5-20
Toolbar Icon
Description
Packet Download
Overwrites the equipment configuration with the configuration data in the database.
Packet Upload
Overwrites the configuration data in the database with the equipment configuration.
Exit
Exits the Manage Configuration window.
Version: F
Part 2
Operations
5
Configuration Management
Step 3: When you need to copy the configuration, operate as follows: Select the source module, and click
in the toolbar to open the Select config copy object
dialog box. Step 4: Select the destination object with the same type of the source object, as shown in Figure 5-23. If you select a destination object with the different type of the source object, the dialog box as shown in Figure 5-24 will appear.
Version: F
Figure 5-23
The Select config copy object dialog box
Figure 5-24
The object type dialog box
5-21
Part 2
Operations
5
Configuration Management
Step 5: Click OK, and the execution results will be displayed in the pane at the right-bottom of the window, as shown in Figure 5-25.
Figure 5-25
5.7
The execution result of the command
Configuration Manager
Purpose You can use this function to download and upload the configuration data of the AN5116-06B, so as to configure the equipment rapidly.
Operation steps Step 1: Click Config Manage
→
Config Manager in the main menu to open the
Manage Configuration window as shown in Figure 5-26.
Figure 5-26
The Manage Configuration window (2)
Step 2: Select the object module, perform the operations in Table 5-3 on demand, and then click Yes in the alert box that appears.
5-22
Version: F
Part 2
Operations
5.8
5
Configuration Management
Historical Database Capacity Management
Purpose Managing the capacity of the history database is used to set the thresholds of history performance data and history alarms in the database. When the history data in the database exceed the set threshold, the old data will be deleted or dumped to increase the running efficiency of the network management system.
Operation steps Step 1: Click Config Manage
→
Historical Database Capacity Management in
the main menu to open the History Database Capacity Management window as shown in Figure 5-27.
Figure 5-27 Version: F
The History Database Capacity Management window 5-23
Part 2
Operations
5
Configuration Management
Step 2: In each tab, set the thresholds according to the actual demands. The meanings of various setting items are listed in Table 5-4. Table 5-4
The setting items of the History Database Capacity Management window
Setting Item
Threshold setting
Dump Time
Description Item Numbers threshold
When the number of records in the database reaches the threshold setting, the system will save the data automatically.
Time threshold
When the data recording time reaches the threshold setting, the system will save the data automatically.
Dumped left Item Numbers:
The number of records reserved in the database after the saving.
Auto Dump Time:
The beginning time of auto saving.
Dump To File
Save the data which reaches the saving threshold into the designated path.
Delete
Delete the data which reaches the saving threshold directly.
Dump processing
Step 3: After finishing the setting operation, click OK to save the settings and exit the current window.
5-24
Version: F
Part 2
Operations
5.9
5
Configuration Management
Device Auto Discovery
Purpose When you need to add a system and its module via the ANM2000, you can find out the equipment in a certain network segment and add it rapidly.
Background information
Currently only the AN5006-20, the AN5116-02, and the AN5116-06B support this function.
This function does not influence the existing objects and their configurations in the ANM2000.
Prerequisite The ANM2000 is in the edit mode.
Operation steps Step 1: Click Configuration
→
Device Auto Discover in the main menu to make
the Device Auto Discover tab appear. Step 2: Input the values of the Start IP, End IP, and the Subnet Mask, click the Start Discover button, and the searching results will be displayed in the lower pane of the window, as shown in Figure 5-28.
Version: F
5-25
Part 2
Operations
5
Figure 5-28
Configuration Management
The Device Auto Discover tab
The parameters in this tab are described in Table 5-5. Table 5-5 Parameter
The parameters in the Device Auto Discover tab Value
Description
System
The system including the equipment.
Board
The card in the equipment.
Object
Type
The name of system or card
Address
The IP address of a system or the slot No. of a card
The IP address of a system or the slot No. of a card.
Add
This system has not been added to the ANM2000, and can be added to the ANM2000.
No Change
This system has been added to the ANM2000.
Status
a
The equipment system name or the card name
Step 3: Select an object to be added to the ANM2000, and click the Sync Object button to add the system whose Status is Add to the ANM2000.
5-26
Version: F
Part 2
Operations
5.10
5
Configuration Management
History Event Query
Purpose You can view the events occurred in the appointed object during the appointed time interval by using this function.
Operation steps Step 1: Click Configuration
→
History Event Query in the main menu to make
the History Event Query dialog box appear. Step 2: Select the object to be queried, set the event starting time, and then select the level of the event to be queried. See Figure 5-29.
Figure 5-29
Version: F
The History Event Query dialog box
5-27
Part 2
Operations
5
Configuration Management
Step 3: Click OK. Then the event query results will be displayed in the History Event Query tab, as shown in Figure 5-30.
Figure 5-30
The event query results
Step 4: Right-click the History Event Query tab, and select Export to Html or Export to Excel in the shortcut menu to export the query results.
5.11
Upgrading the ONUs in Batches
Purpose You can upgrade the CPU / IAD software and the ONU firmware of the ONUs in batches to increase the upgrade efficiency.
Prerequisite
5-28
The FTP server has been configured.
The FTP server is connected with the equipment normally.
Version: F
Part 2
Operations
5
Configuration Management
Operation steps Table 5-6
The operation entry path of upgrading the ONUs in batches
Operation Item
Upgrading the ONUs in batches
Operation Entry Path Configuration
→
Batches Upgrade ONU in the main menu
Device Backup and Upgrade
→
Batches Upgrade ONU in the
Admin Tool tab
Step 1: Open the Batches Upgrade ONU tab via the paths in Table 5-6. Step 2: Set the download file type, the FTP server IP address, the username, the user password, the file name, and the refresh time on demand. Step 3: Select the ONUs to be upgraded in the left-bottom pane, and click the Execute button; then the execution results will be displayed as shown in Figure 5-31.
Caution: One operation can only upgrade the ONUs with the same type.
Figure 5-31
Version: F
The Batches Upgrade ONU tab
5-29
Part 2
Operations
5.12
5
Configuration Management
Upgrading the MSAN Line Card Software in Batches
Purpose You can upgrade the MSAN line card software in batches to increase the upgrade efficiency.
Prerequisite
The FTP server has been configured.
The FTP server is connected with the equipment normally.
Operation steps Table 5-7
The operation entry path of upgrading the MSAN line card software in batches
Operation Item
Upgrading the MSAN line card software in batches
Operation Entry Path Configuration
→
MSAN line card Software Batch Upgrade in
the main menu Device Backup and Upgrade
→
MSAN line card Software
Batch Upgrade in the Admin Tool tab
Step 1: Open the MSAN line card Software Batch Upgrade tab via the paths in Table 5-7. Step 2: Set the File Type, Ftp Server IP, User Name, and Password items on demand.
5-30
Version: F
Part 2
Operations
5
Configuration Management
Step 3: Select the system to be upgraded in the left-bottom pane and select the file name of the software to be upgraded, and then click the Execute button to get the execution result, as shown in Figure 5-32.
Figure 5-32
5.13
The MSAN line card Software Batch Upgrade tab
Backing up the System Configuration in Batches
Purpose During the daily maintenance, or before upgrading the equipment, you need to back up the configuration data of the equipment. Backing up the system configuration in batches can increase the backup efficiency.
Prerequisite
Version: F
The FTP server has been configured.
The FTP server is connected with the equipment normally.
5-31
Part 2
Operations
5
Configuration Management
Operation steps Table 5-8
The operation entry path of backing up the system configuration in batches
Operation Item
Operation Entry Path
Backing up the system
Configuration
configuration
Device Backup and Upgrade
batches
in
→
Batches Backup Config in the main menu →
Batches Backup Config in the
Admin Tool tab
Step 1: Open the Batches Backup Config tab via the paths in Table 5-8. Step 2: Set the download file type, the FTP server IP address, the username, and the user password on demand. Step 3: Select the system to be backed up in the left-bottom pane, and click the Execute button after the name of the backup file is set; then the execution results will be displayed as shown in Figure 5-33.
Figure 5-33
5-32
The System Config Batches Backup tab
Version: F
Part 2
Operations
5.14
5
Configuration Management
Restoring the System Configuration in Batches
Purpose After upgrading the equipment, you need to restore the configuration data of the equipment. In this case, you can restore the system configuration in batches to increase the efficiency.
Prerequisite
The FTP server has been configured.
The FTP server is connected with the equipment normally.
Operation steps Table 5-9
The operation entry path of restoring the system configuration in batches
Operation Item
Operation Entry Path
Restoring the system
Configuration
configuration
Device Backup and Upgrade
batches
in
→
Batches Restore Config in the main menu →
Batches Restore Config in the
Admin Tool tab
Step 1: Open the Batches Restore Config tab via the paths in Table 5-9. Step 2: Set the download file type, the FTP server IP address, the username, and the user password on demand.
Version: F
5-33
Part 2
Operations
5
Configuration Management
Step 3: Select the system and the file to be restored in the left-bottom pane, and click the Execute button; then the execution results will be displayed as shown in Figure 5-34.
Figure 5-34
5.15
The System Config Batches Restore tab
Backing up the System Software in Batches
Purpose During the daily maintenance, or before upgrading the OLT, you need to back up the configuration data of the OLT. Backing up the system software in batches can increase the backup efficiency.
Prerequisite
The FTP server has been configured.
The FTP server is connected with the equipment normally.
Operation steps Table 5-10
The operation entry path of backing up the system software in batches
Operation Item
Operation Entry Path Configuration
→
System Software Batches Backup in the main
Backing up the system
menu
software in batches
Device Backup and Upgrade
→
System Software Batches
Backup in the Admin Tool tab
5-34
Version: F
Part 2
Operations
5
Configuration Management
Step 1: Open the System Software Batches Backup tab via the paths in Table 5-10. Step 2: Set the download file type, the FTP server IP address, the username, and the user password on demand. Step 3: Select the system to be backed up and the backup file name in the left-bottom pane, and click the Execute button; Execute button; then the execution results will be displayed as shown in Figure 5-35.
Figure 5-35
5.16
The System Software Batches Backup tab
Upgrading the System Software in Batches
Purpose You can upgrade the OLT software or the ONU software in batches to increase the upgrade efficiency by using this function.
Prerequisite
Version: F
The FTP server has been configured.
The FTP server is connected with the equipment normally. normally.
5-35
Part 2
Operations
5
Configuration Management
Operation steps Table 5-11 5-11
The operation entry path of upgrading the system software in batches
Operation Item
Operation Entry Path Configuration
→
System Software Batches Upgrade in the
Upgrading the system
main menu
software in batches
Device Backup and Upgrade
→
System Software Batches
Upgrade in the Admin Tool tab
Step 1: Open the System Software Batches Upgrade tab via the paths in Table 5-11. Step 2: Set the download file type, the FTP server IP address, the username, and the user password on demand. Step 3: Select the system to be backed up and the upgrade file name in the left-bottom pane, and click the Execute button; Execute button; then the execution results will be displayed as shown in Figure 5-36.
Figure 5-36
5-36
The System Software Batches Upgrade tab
Version: F
6
Alarm Management
The ANM2000 provides the alarm management functions, meaning the functions of monitoring, displaying, storing, and counting the alarms. The main purposes of the alarm management functions are to perform the daily maintenance, so as to help users find, locate, and solve faults and resume the services influenced by faults. The common alarm management operations used by users include setting alarms and viewing alarms. As the base of the troubleshooting, the common operations have the flow as follows: Set the filtering status of alarms
View the filtering status of alarms Optional step Define alarm levels Optional step Forward alarms Optional step Manage custom alarms
View alarm reports
View current / history alarms
View alarm statistics
Locate faults
Figure 6-1
The operation flow of the alarm management
This chapter includes the following contents:
Setting the filtering status of alarms Viewing the filtering status of alarms Defining alarm levels Version: F
6-1
Part 2
Operations
6
Alarm Management
Viewing custom alarm levels Forwarding alarms Managing custom alarms Viewing alarm reports Viewing alarms Viewing the alarm statistics
6-2
Version: F
Part 2
Operations
6.1
6
Alarm Management
Setting the Filtering Status Status of Alarms When the system reports many alarms, you can use this function to filter the unconcerned alarm types and alarm information.
6.1.1
Setting the Filtering Status of All Alarms
Purpose In this case, the set alarm filtering rules are valid to all systems on the ANM2000.
Background information The alarm filtering settings are only valid to the alarms generated after the setting operation, but invalid to the present alarms in the current alarm list and the report window.
Operation steps Table 6-1
The operation entry path of setting the filtering status of all alarms
Operation Item
Setting
the
filtering status of all alarms
Operation Entry Path Alarm
→
Current Alarm Shield Setting (G)
→
Alarm Shield Global
Setting in the main menu Admin Tools →
→
Alarm Manager
→
Current Alarm Shield Setting (G)
Alarm Shield Global Setting in the Admin Tools tab
Step 1: Select a path listed in Table 6-1 to open the Alarm Shield Global Setting tab.
Version: F
6-3
Part 2
Operations
6
Alarm Management
Step 2: Select the alarm level, alarm type, or alarm name to be filtered on demand, as shown in Figure 6-2.
Figure 6-2
The Alarm Shield Global Setting tab
Step 3: Click
under Shield Shield time to time to set the valid time of the filtering operation,
as shown in Figure 6-3, and then click OK. OK.
Figure 6-3
The Mask Time Section Set dialog box
Step 4: Click the Execute the Execute button button to make the settings valid.
6-4
Version: F
Part 2
Operations
6.1.2
6
Alarm Management
Setting the Filtering Status of Alarms on an Object
Purpose In this case, the set alarm filtering rules are valid to a specific port on the selected ONU, and you can only set one port once.
Background information The alarm filtering settings are only valid to the alarms generated after the setting operation, but invalid to the present alarms in the current alarm list and the report window.
Operation steps Table 6-2
The operation entry path of setting the filtering status of alarms on an object
Operation Item
Operation Entry Path
Setting
Alarm
the
→
Current Alarm Shield Setting (G)
filtering status of
Setting in the main menu
alarms
Admin Tools
object
on
an
→
→
Alarm Manager
→
→
Alarm Shield Object
Current Alarm Shield Setting (G)
Alarm Shield Object Setting in the Admin Tools tab
Step 1: Select a path listed in Table 6-2 to open the Alarm Shield Object Setting tab. Step 2: Select the valid port of the alarm filtering rules on demand.
Version: F
6-5
Part 2
Operations
6
Alarm Management
Step 3: Select the alarm level, alarm type, or alarm name to be filtered on demand, as shown in Figure 6-4.
Figure 6-4
The Alarm Shield Object Setting tab
Step 4: Click
under Shield time to set the valid time of the filtering operation,
as shown in Figure 6-5, and then click OK.
Figure 6-5
The Shield Time Setting dialog box
Step 5: Click the Execute button to make the settings valid.
6-6
Version: F
Part 2
Operations
6.1.3
6
Alarm Management
Setting the Filtering Status of Alarms on a Card or Port
Purpose In this case, the set alarm filtering rules are valid to a specific type of card or port selected, and you can set one type of port once.
Background information The alarm filtering settings are only valid to the alarms generated after the setting operation, but invalid to the present alarms in the current alarm list and the report window.
Operation steps Table 6-3
The operation entry path of setting the filtering status of alarms on a card or port
Operation Item
Operation Entry Path
Setting
Alarm
the
→
Current Alarm Shield Setting (G)
filtering status of
Board/Port Setting in the main menu
alarms on a card
Admin Tools
or port
→
→
Alarm Manager
→
→
Alarm Shield
Current Alarm Shield Setting (G)
Alarm Shield Board/Port Setting in the Admin Tools tab
Step 1: Select a path listed in Table 6-3 to open the Alarm Shield Board/Port Setting tab. Step 2: Select the valid card or port type of the alarm filtering rules on demand.
Version: F
6-7
Part 2
Operations
6
Alarm Management
Step 3: Select the alarm level, alarm type, or alarm name to be filtered on demand, as shown in Figure 6-6.
Figure 6-6
The Alarm Shield Board/Port Setting tab
Step 4: Click
under Shield time to set the valid time of the filtering operation,
as shown in Figure 6-7, and then click OK.
Figure 6-7
The Shield Time Setting dialog box
Step 5: Click the Execute button to make the settings valid.
6-8
Version: F
Part 2
Operations
6.2
6
Alarm Management
Viewing the Filtering Status of Alarms
Purpose You can use this function to view the set alarm filtering rules.
Operation steps Table 6-4
The operation entry path of viewing the filtering status of alarms
Operation Item
Operation Entry Path
Viewing
Alarm
the
→
Current Alarm Shield View (J) in the main menu
Filtering Status of
Admin Tools
Alarms
the Admin Tools tab
→
Alarm Manager
→
Current Alarm Shield View (J) in
Step 1: Select a path listed in Table 6-4 to open the Current Alarm Shield View tab as shown in Figure 6-8, and the global alarm filtering rules, the object alarm filtering rules, and the card / port alarm filtering rules will be displayed in this tab.
Figure 6-8
Version: F
The Current Alarm Shield View tab
6-9
Part 2
Operations
6
Alarm Management
Step 2: When you want to view the alarm filtering status on a certain object, you can select the object in the pane at the lower part of the Admin Tools tab, and then click the Execute button at the medium part of the Admin Tools tab. Then the alarm filtering rules of this object will be displayed in the Current Alarm Shield View tab.
Note: If you right-click any position and select Delete, the selected alarm items can be deleted. Step 3: When you want to view the global alarm filtering status, you can click the Execute button without selecting any object and alarm type. Then the global alarm filtering rules will be displayed in the Current Alarm Shield View tab.
6.3
Defining Alarm Levels When the default level of a certain alarm does not meet your requirements, you can define the custom alarm level.
6.3.1
Defining Global Alarm Levels
Purpose In this case, the set custom alarm levels are valid to a ll systems on the ANM2000.
Background information The custom alarm level settings are only valid to the alarms generated after the setting operation, but invalid to the present alarms in the current alarm list and the report window.
Prerequisite The ANM2000 is in the edit mode.
6-10
Version: F
Part 2
Operations
6
Alarm Management
Operation steps Table 6-5
The operation entry path of defining global alarm levels
Operation Item
Operation Entry Path Alarm
Defining alarm levels
global
→
Alarm Level Setting (G)
→
Global Alarm Level Definition in
the main menu Admin Tools →
→
Alarm Manager
→
Current Alarm Level Setting (G)
Global Alarm Level Definition in the Admin Tools tab
Step 1: Select a path listed in Table 6-5 to open the Global Alarm Level Definition tab. Step 2: Select the alarm to be modified and click its Current Alarm Level, and then select the target alarm level in the drop-down list. See Figure 6-9.
Figure 6-9
The Global Alarm Level Definition tab
Step 3: After finishing the modification operation, click OK.
Version: F
6-11
Part 2
Operations
6.3.2
6
Alarm Management
Defining Object Alarm Levels
Purpose In this case, the set custom alarm levels are valid to the specific object selected, and you can only set the alarm levels on one object once.
Background information The custom alarm level settings are only valid to the alarms generated after the setting operation, but invalid to the present alarms in the current alarm list and the report window.
Operation steps Table 6-6
The operation entry path of defining object alarm levels
Operation Item
Operation Entry Path Alarm
Defining alarm levels
object
→
Alarm Level Setting (G)
→
Object Alarm Level Definition in
the main menu Admin Tools →
→
Alarm Manager
→
Current Alarm Level Setting (G)
Object Alarm Level Definition in the Admin Tools tab
Step 1: Select a path listed in Table 6-6 to open the Object Alarm Level Definition tab. Step 2: Select the object to be set in the left-lower pane. Step 3: Select the alarm to be modified and click its Current Alarm Level, and then select the target alarm level in the drop-down list. See Figure 6-10.
Figure 6-10
The Global Alarm Level Definition tab
Step 4: After finishing the modification operation, click OK. 6-12
Version: F
Part 2
Operations
6.3.3
6
Alarm Management
Defining Card / Port Alarm Levels
Purpose In this case, the set custom alarm levels are valid to a specific type of card or port, and you can set the alarms on one type of card or port once.
Background information The custom alarm level settings are only valid to the alarms generated after the setting operation, but invalid to the present alarms in the current alarm list and the report window.
Operation steps Table 6-7
The operation entry path of defining card / port alarm levels
Operation Item
Operation Entry Path Alarm
Defining
card
port alarm levels
/
→
Alarm Level Setting
→
Alarm Level Board or Port Setting in
the main menu Admin Tools →
→
Alarm Management
→
Current Alarm Level Setting
Alarm Level Board or Port Setting in the Admin Tools tab
Step 1: Select a path listed in Table 6-7 to open the Alarm Level Board or Port Setting tab. Step 2: Select the card or port t ype to be set in the left-lower pane. Step 3: Select the alarm to be modified in the right pane and click its Current Alarm Level, and then select the target alarm level in the drop-down list. See Figure 6-11.
Figure 6-11
The Alarm Level Board or Port Setting tab
Step 4: After finishing the modification operation, click OK. Version: F
6-13
Part 2
Operations
6.4
6
Alarm Management
Viewing Custom Alarm Levels
Purpose You can view the set custom alarm levels in the appointed range by using this function.
Operation steps Table 6-8
The operation entry path of viewing custom alarm levels
Operation Item
Viewing
custom
alarm levels
Operation Entry Path Alarm Level Setting View under Alarm in the main menu Admin Tools
→
Alarm Manager
→
Alarm Level Setting View in the
Admin Tools tab
Step 1: Select a path listed in Table 6-8 to open the Alarm Level Setting View tab. Step 2: Select the range to be viewed, and click Execute. Then the system will display the set custom alarm levels in this range, as shown in Figure 6-12.
Figure 6-12
6-14
The Alarm Level Setting View tab
Version: F
Part 2
Operations
6.5
6
Alarm Management
Forwarding Alarms
Purpose When you need to send the alarm information to dedicated maintenance engineers in the message or e-mail mode, you can use this function.
Prerequisite This function needs the support of the message sender and the e-mail server.
Operation steps Table 6-9
The operation entry path of forwarding alarms
Operation Item
Forwarding alarms
Operation Entry Path Alarm
→
Alarm Forward in the main menu
Admin Tools
→
Alarm Manager
→
Alarm Forward in the Admin Tools
tab
Step 1: Select a path listed in Table 6-9 to open the Alarm Forward window. Step 2: In the User Info Setup tab, click Add Rule, and then input the number of rows to be added in the Prompt dialog box that appears and click OK to add items. Step 3: Click a newly-added item, and then input the values of Username, Mobile number , and Email in turn. See Figure 6-13.
Figure 6-13
Version: F
The Alarm Forward window (1)
6-15
Part 2
Operations
6
Alarm Management
Step 4: Click Save to Database to save the settings in the database. Step 5: In the Alarm Filter tab, select the alarm items needing to be sent to maintenance engineers, and then click Save to Database to save the settings in the database. See Figure 6-14.
Figure 6-14
The Alarm Forward window (2)
Step 6: Exits the Alarm Forward window. Step 7: Click D:\aems\Server\ini in the network management computer, and set various items under [ALMSMS] in the md.ini window as shown in Figure 6-15; among them, the values of username and password are the username and the password of the sending box. Save the settings and then exit the window.
Figure 6-15
6-16
The md.ini window
Version: F
Part 2
Operations
6
Alarm Management
Step 8: Restart the AEMS-DBServer service, and make the modification of the md.ini file valid.
6.6
Managing Custom Alarms
Purpose To obtain the physical environment information of the equipment, you can define the environment-related alarms of the equipment, such as the fire alarm, the water alarm, and the too high / too low temperature alarm.
Operation steps Table 6-10
The operation entry path of managing custom alarms
Operation Item
Managing alarms
custom
Operation Entry Path Alarm
→
Custom alarm manage in the main menu
Custom alarm manage in the system shortcut menu of the Object Tree tab
Step 1: Open the Custom alarm manage window via the paths listed in Table 6-10. Step 2: Select the ONU needing to set the custom alarms, and click the alarm name to select your target custom alarms. See Figure 6-16.
Figure 6-16
Version: F
The Custom alarm manage window
6-17
Part 2
Operations
6
Alarm Management
Step 3: Click Save to Database to save the settings in the database. In this case, the setting operations are completed. As soon as the equipment generates a custom alarm, the ANM2000 will give the prompt according to the settings.
6.7
Viewing Alarm Reports
Purpose You can use this function to open the Alarm Notice pane and understand the alarm conditions of the equipment in the real time mode.
Operation steps Step 1: Select Alarm
→
Alarm Report in the main menu to open the Alarm Notice
pane as shown in Figure 6-17 for the viewing operation.
Figure 6-17
The Alarm Notice pane
Step 2: After viewing the alarms, click the
button at the top right corner of the
Alarm Notice pane; in this case, the pane will be minimized and displayed at the task column at the bottom of the ANM2000 main GUI.
6-18
Version: F
Part 2
Operations
6.8
6
Alarm Management
Viewing Alarms Alarms are classified into the current alarms and the history alarms.
Current alarms: mean the alarm events that are not ended and still exist in the network, and they are not confirmed and cleared by the administrator.
History alarms: mean the alarm events that have ended in the network and been confirmed by the administrator (or automatically confirmed by the system) and recorded.
6.8.1
Viewing Current Alarms
Purpose You can view the occurring time, etc. of each current alarm on a certain object to analyze the alarm information and perform the troubleshooting.
Operation steps Table 6-11
The operation entry path of viewing current alarms
Operation Item
Operation Entry Path Alarm
→
Current Alarm in the main menu
Current Alarm under the shortcut menu of management domain in
the Object Tree tab Current Alarm under the shortcut menu of system in the Object Tree
Viewing alarms
current
tab Current Alarm under the shortcut menu of module in the Object Tree
tab Current Alarm under the shortcut menu of card in the Object Tree
tab in the toolbar
Version: F
6-19
Part 2
Operations
6
Alarm Management
Enter the Current alarm tab via the paths listed in Table 6-11. This tab displays the current alarms of the selected object, as shown in Figure 6-18.
Figure 6-18
6.8.2
The Current alarm tab
Viewing History Alarms
Purpose You can view the history alarm information of a certain object to understand its running status.
6-20
Version: F
Part 2
Operations
6
Alarm Management
Operation steps Table 6-12
The operation entry path of viewing history alarms
Operation Item
Operation Entry Path Alarm
→
Historical Alarm in the main menu
Historical Alarm under the shortcut menu of management domain in
the Object Tree tab Historical Alarm under the shortcut menu of system in the Object
Viewing alarms
history
Tree tab Historical Alarm under the shortcut menu of module in the Object Tree tab Historical Alarm under the shortcut menu of card in the Object Tree
tab in the toolbar
Enter the History alarm tab via the paths listed in Table 6-12. This tab displays the history alarms of the selected object, as shown in Figure 6-19.
Figure 6-19
Version: F
The History alarm tab
6-21
Part 2
Operations
6.9
6
Alarm Management
Viewing the Alarm Statistics The ANM2000 provides the alarm statistics query function. You can set the time, the system object, and the alarm code to count and query the alarm information. Table 6-13
The operation entry path of viewing the alarm statistics
Operation Item
Viewing the alarm statistics brief list Viewing history statistics
6.9.1
the alarm
Operation Entry Path Alarm
→
Alarm Statistic in the main menu
Alarm
→
History Alarm Statistics View (X) in the main menu
Admin Tools
→
Alarm Management
History Alarm Statistics View
→
in the Admin Tools tab
Viewing the Alarm Statistics Brief List
Purpose You can use this function to view the current alarms number of the system, and understand the current running status of the system.
Operation steps Step 1: Select Alarm
→
Alarm Statistic in the main menu to open the alarm
statistics brief list as shown in Figure 6-20. This list displays the real time information of numbers of the occurred, confirmed, and ended alarms at various levels.
Figure 6-20
The alarm statistics brief list
Double-click a certain alarm level in this list to open the corresponding alarm list. 6-22
Version: F
Part 2
Operations
6.9.2
6
Alarm Management
Viewing the History Alarm Statistics
Purpose You can use this function to view the history alarm statistics, and understand the running status in a certain past time interval of the equipment.
Operation steps Step 1: Select the paths listed in Table 6-13 to open the Statistics parameter setting dialog box as shown in Figure 6-21.
Figure 6-21
The Statistics parameter setting dialog box
Step 2: Set the statistics time, the selected o bject, and the alarm code.
Version: F
6-23
Part 2
Operations
6
Alarm Management
Step 3: After completing the settings, click OK. In this case, the History Alarm Statistics tab will appear; in this tab, there are Report View and Chart View for users to query.
Figure 6-22
The History Alarm Statistics tab (1)
Figure 6-23
The History Alarm Statistics tab (2)
You can right-click the Report View tab, and select Statistics parameter setting in the shortcut menu to set the query conditions again. 6-24
Version: F
7
Performance Management
The ANM2000 has strong performance management functions, able to store the performance information of the equipment in the network. Performance data are classified into the instant performance data and the history performance data.
Instant performance data: are the current 15-minute performance data read from the equipment directly and displayed, meaning the performance data not saved in the database within the latest 15-minute from the query time point st
th
and the last 1 to 16 15-minute intervals.
History performance data: are the performance data saved in the database according to the performance collection settings, prior to the latest 15-minute or 24-hour.
The common performance management operations include querying the instant and history performance data, collecting the performance data, etc. As the base of testing the equipment running quality, the common operations have the flow as Figure 7-1.
Enable performance statistics function
Set performance collection scheme
View instant performance data
View history performance data
Locate faults Figure 7-1
The operation flow of the performance management
This chapter includes the following contents: Setting the performance collection scheme Viewing performance data Comparing performance data Viewing the history performance chart Version: F
7-1
Part 2
Operations
7.1
7
Performance Management
Setting the Performance Collection Scheme
Purpose If users want to view the history performance data of the equipment, they should first set the performance collection scheme of the equipment. The network management system only collects and processes the history performance data of the equipment whose performance collection scheme has been set; for the equipment whose performance collection scheme is not set, the network management system will not record its history performance data.
Operation steps Table 7-1
The operation entry path of setting the performance collection scheme
Operation Item
Setting
Operation Entry Path
the
performance
Performance
collection
main menu
→
Performance Collect Scheme Configuration in the
scheme
Step 1: Select the path in Table 7-1 to open the Options For Performance Collection And Storage dialog box and the Command Manager window. Step 2: Select the equipment and port to be set in the left tree.
7-2
Version: F
Part 2
Operations
7
Performance Management
Step 3: In the right Performance Collection tab, set the time and type of the performance to be collected, as shown in Figure 7-2.
Figure 7-2
Version: F
The Options For Performance Collection And Storage dialog box (1)
7-3
Part 2
Operations
7
Performance Management
Step 4: In the Performance Storage tab, select the code of the performance to be stored in the database, as shown in Figure 7-3.
Figure 7-3
The Options For Performance Collection And Storage dialog box (2)
Step 5: After completing the setting operation, click Save. Then the Command Manager window as shown in Figure 7-4 will appear, and Command Succeed will be displayed.
Figure 7-4 7-4
The Command Manager window Version: F
Part 2
Operations
7.2
7
Performance Management
Viewing Performance Data You can select a system object in the Object Tree tab on demand to view the instant performance data or history performance data.
7.2.1
Viewing Instant Performance Data
Purpose You can use this function to obtain the performance data of the equipment in the st
th
last 1 to 16
15-minute intervals, and understand the running status of the
equipment.
Prerequisite The performance classification function of the equipment to be viewed is enabled.
Operation steps Table 7-2
The operation entry path of viewing instant performance data
Operation Item
Operation Entry Path Performance
→
Instant Performance in the main menu
RealTime Performance under the shortcut menu of a card in the Object
Viewing instant
Tree tab
performance
RealTime Performance under the shortcut menu of an ONU in the ONU
data
List tab
in the toolbar
Version: F
7-5
Part 2
Operations
7
Performance Management
Step 1: Select the path in Table 7-2 to open the Instant Performance tab as shown in Figure 7-5; this tab displays the instant performance data of the selected system object.
Figure 7-5
7.2.2
The Instant Performance tab
Viewing History Performance Data
Purpose You can use this function to view the history performance data of the management domain, system, or card whose performance collection scheme has been set, and understand the history running status of the network.
Background information After the performance collection scheme has been set, the ANM2000 collects the performance data according to the collection scheme and save the data in the database. In this case, you can view the performance data from setting the performance collection scheme to the current time point. So we recommend that you set performance collection scheme for the concerned object to understand its running status easily.
7-6
Version: F
Part 2
Operations
7
Performance Management
Prerequisite
The performance collection scheme has been set, and the system has waited for one test period (15 minutes or 24 hours) at least.
Operation steps Table 7-3
The operation entry path of viewing history performance data
Operation Item
Operation Entry Path Performance
→
History Performance in the main menu
History Performance under the shortcut menu of a management domain
in the Object Tree tab History Performance under the shortcut menu of a system in the Object
Viewing history
Tree tab
performance
History Performance under the shortcut menu of a card in the Object
data
Tree tab History Performance under the shortcut menu of an ONU in the ONU List
tab in the toolbar
Step 1: Select the path in Table 7-3 to open the History Performance tab as shown in Figure 7-6; this tab displays the history performance data of the selected system object.
Figure 7-6 Version: F
The History Performance tab 7-7
Part 2
Operations
7
Performance Management
Step 2: Right-click the object and select Set Query Condition to open the Set History Performance Query Condition dialog box. Step 3: Set the history performance query con dition, as shown in Figure 7-7.
Figure 7-7
The Set History Performance Query Condition dialog box
Step 4: After completing the settings, click OK; then the query results will be displayed in the History Performance tab.
7.3
Comparing Performance Data
Purpose You can use this function to compare the performance data in appointed periods of the appointed object, and understand the running status of this object in different periods.
Prerequisite
The system has waited for two test periods (15 minutes for each test period) at least.
7-8
The performance statistic switch is enabled.
Version: F
Part 2
Operations
7
Performance Management
Operation steps Table 7-4
The operation entry path of comparing performance data
Operation Item
Operation Entry Path
Comparing performance
Performance
→
Performance Compare in the main menu
data
Step 1: Select the object to be compared in the Object Tree tab. Step 2: Select the path in Table 7-4 to open the Performance Compare dialog box. Step 3: Select the periods and types of the performance to be compared, and click OK, as shown Figure 7-8. Then the system will display the comparison results in the Performance Compare tab, as shown in Figure 7-9.
Figure 7-8 Version: F
The Performance Compare dialog box 7-9
Part 2
Operations
7
Figure 7-9
7.4
Performance Management
The Performance Compare tab
Viewing the History Performance Chart
Purpose You can use this function to view the changing conditions of the performance data of the appointed object, and understand the running status of the network.
Prerequisite The object to be viewed has its history performance data.
Operation steps Table 7-5
The operation entry path of viewing the history performance chart
Operation Item
Viewing history performance
Operation Entry Path
the Performance
→
History Performance Chart in the main menu
chart
7-10
Version: F
Part 2
Operations
7
Performance Management
Step 2: Select the path in Table 7-5 to open the Set History Performance Query Condition dialog box as shown in Figure 7-10.
Figure 7-10
The Set History Performance Query Condition dialog box (1)
Step 2: Set the beginning time, period, performance type, and chart number to be queried.
Note: The performance type here should be the same as that set for the performance collection scheme. Step 3: Click the Policy Edit button to open the Policy Edit dialog box, as shown in Figure 7-11.
Version: F
7-11
Part 2
Operations
7
Figure 7-11
Performance Management
The Policy Edit dialog box (1)
Step 3: Click the Create button. After setting the policy name and the performance code, click Insert; in this case, the newly-created policy will appear in the policy pane, as shown in Figure 7-12.
Figure 7-12
7-12
The Policy Edit dialog box (2)
Version: F
Part 2
Operations
7
Performance Management
Note: You can select Draw threshold line and set the demanded threshold; after the threshold is set, the set threshold curve will appear in the performance chart. Step 4: After confirming the correctness of the policy setting, click Exit to return to the Set History Performance Query Condition dialog box. Step 5: After selecting the query range, click Apply; then the query policy and the query range will be displayed in the Select Curve pane, as shown in Figure 7-13.
Figure 7-13
Version: F
The Set History Performance Query Condition dialog box (2)
7-13
Part 2
Operations
7
Performance Management
Step 6: Click OK; the performance data chart meeting the query condition will be displayed in the History Performance Chart tab (as shown in Figure 7-14), and corresponding performance data value will be displayed in the Performance tab.
Figure 7-14
7-14
The History performance curve tab
Version: F
8
Statistics Management
As for the statistics operation, the ANM2000 provides abundant resource statistics functions. Users can perform the statistics operations of resources managed by the current network management system on demand, and the resources include the system, the card, the card port, the ONU subscriber information, the ONU port information, the MGC resource, etc. The relationships between the statistics management functions, sub-functions and operations are shown in Figure 8-1. Equipment statistics
ONU port information statistics
System resource statistics
ONU equipment statistics
System card statistics
System-related statistics
Statistics management
ONUrelated statistics
System port statistics Query subscriber port status
Figure 8-1
MGC resource statistics
View ONU resource detailed list View ONU equipment statistics detailed list View ONU port resource statistics detailed list
Relationships around the statistics management function
This chapter includes the following contents:
Equipment statistics System-related statistics ONU-related statistics MGC resource statistics
Version: F
8-1
Part 2
Operations
8.1
8
Statistics Management
Equipment Statistics
Purpose The equipment statistics is used to count the equipment information of the current system object, including the types and numbers of its subracks, cards, ONUs, and ports. It enables you to grasp the equipment using status correctly.
Operation steps Table 8-1
The operation entry path of the equipment statistics
Operation Item
Equipment statistics
Operation Entry Path Resource Statistics
→
Device Statistic (Z) in the main menu
Step 1: Select the path in Table 8-1 to open the Device Statistic tab. Step 2: Select the object needing the statistics in the lower left pane, and click Execute. In this case, the statistics results will be displayed in the Device Statistic tab, as shown in Figure 8-2.
Figure 8-2
8-2
The Device Statistic tab
Version: F
Part 2
Operations
8.2
8
Statistics Management
System-Related Statistics The system-related statistics is used to count the system information of the current system object.
8.2.1
System Resource Statistics
Purpose You can use this function to perform the statistics of the system source globally, such as the IP address, the electrification time, the port type, the card name, and the slot No.
Operation steps Table 8-2
The operation entry path of the system resource statistics
Operation Item
Operation Entry Path Resource Statistics
System statistics
resource
→
System Resource Statistics in the main
menu The Admin Tools tab
→
View Statistics Report
→
System
Resource Statistics
Step 1: Select the path in Table 8-2 to open the System Resource Statistics tab. Step 2: Select the system object needing the statistics under Admin Tool, and click Execute. In this case, the statistics results will be displayed in the System Resource Statistics tab, as shown in Figure 8-3.
Figure 8-3 Version: F
The System Resource Statistics tab 8-3
Part 2
Operations
8.2.2
8
Statistics Management
System Card Statistics
Purpose You can use this function to perform the statistics of the information related to a certain card, such as the card name and the card number.
Operation steps Table 8-3
The operation entry path of the system card statistics
Operation Item
System statistics
Operation Entry Path
card
Resource Statistics
→
The Admin Tools tab
System Board Statistics in the main menu
→
View Statistics Report
→
System Board
Statistics
Step 1: Select the path in Table 8-3 to open the System Board Statistics tab. Step 2: Select the system object needing the statistics under Admin Tool, and click Execute. In this case, the statistics results will be displayed in the System Board Statistics tab, as shown in Figure 8-4.
Figure 8-4
8-4
The System Board Statistics tab
Version: F
Part 2
Operations
8.2.3
8
Statistics Management
System Port Statistics
Purpose You can use this function to perform the statistics of the information related to the system port, such as the number of the occupied PON ports, the total number of the PON ports, the number of the occupied uplink ports, and the to tal number of the uplink ports.
Operation steps Table 8-4
The operation entry path of the system port statistics
Operation Item
Operation Entry Path Resource Statistics
System port statistics
→
The Admin Tools tab
System Port Statistics in the main menu →
View Statistics Report
→
System Port
Statistics
Step 1: Select the path in Table 8-4 to open the System Port Statistics tab. Step 2: Select the system object needing the statistics under Admin Tool, and click Execute. In this case, the statistics results will be displayed in the System Port Statistics tab, as shown in Figure 8-5.
Figure 8-5
Version: F
The System Port Statistics tab
8-5
Part 2
Operations
8
8.3
ONU-Related Statistics
8.3.1
ONU Port Information Statistics
Statistics Management
Purpose You can use this function to view the number of the used ONU ports and the total number of the ONU ports.
Operation steps Table 8-5
The operation entry path of the ONU port information statistics
Operation Item
Operation Entry Path Resource Statistics
→
ONU port information
menu
statistics
The Admin Tools tab
ONU Port information statistic in the main
→
View Statistics Report
→
ONU Port
information statistic
Step 1: Select the path in Table 8-5 to open the ONU Port information statistic dialog box. Step 2: Select the corresponding system object and then click OK to exit this dialog box. Then the statistics results will appear in the ONU Port information statistic tab as shown in Figure 8-7.
Figure 8-6 8-6
The ONU Port information statistic dialog box Version: F
Part 2
Operations
8
Figure 8-7
8.3.2
Statistics Management
The ONU Port information statistic tab
Viewing the ONU Subscriber Statistics Detailed List
Purpose You can use this function to view the detailed information of the subscriber connected with an ONU, such as its slot No., PON port No., and ONU authorization No.
Operation steps Table 8-6
The operation entry path of viewing the ONU subscriber statistics detailed list
Operation Item
Viewing
the
Operation Entry Path
ONU
subscriber statistics detailed list
Resource Statistics
→
ONU User Detail Information in the main
→
View Statistics Report
menu The Admin Tools tab
→
ONU User Detail
Information
Step 1: Select the path in Table 8-6 to open the ONU User information statistic tab.
Version: F
8-7
Part 2
Operations
8
Statistics Management
Step 2: Select the corresponding system object ne eding the statistics and then click Execute under Admin Tool. Then the statistics results will appear in the ONU User Detail Information tab, as shown in Figure 8-8.
Figure 8-8
8.3.3
The ONU User Detail Information tab
ONU Equipment Statistics
Purpose You can use this function to view the OLT system type, ONU type, and total number of the object ONUs.
Operation steps Table 8-7
The operation entry path of the ONU equipment statistics
Operation Item
ONU statistics
equipment
Operation Entry Path Resource Statistics
→
The Admin Tools tab
ONU Device Statistic in the main menu →
View Statistics Report
→
ONU Device
Statistic
Step 1: Select the path in Table 8-7 to open the ONU Device Statistic tab.
8-8
Version: F
Part 2
Operations
8
Statistics Management
Step 2: Select the corresponding system object ne eding the statistics under Admin Tool and then click Execute. Then the statistics results will appear in the ONU Device Statistic tab, as shown in Figure 8-9.
Figure 8-9
8.3.4
The ONU Device Statistics tab
Viewing the ONU Resource Detailed List
Purpose You can use this function to view the relevant information of the ONU resource, such as the CPU version, the firmware version, and the hardware version.
Operation steps Table 8-8
The operation entry path of viewing the ONU resource detailed list
Operation Item
Operation Entry Path Resource Statistics
Viewing
the
ONU
resource detailed list
→
ONU Resource Detailed Information in the
main menu The Admin Tools tab
→
View Statistics Report
→
ONU Resource
Detailed Information
Step 1: Select the path in Table 8-8 to open the ONU Resource Detailed Information tab.
Version: F
8-9
Part 2
Operations
8
Statistics Management
Step 2: Select the corresponding system object ne eding the statistics under Admin Tool and then click Execute. Then the statistics results will appear in the ONU Resource Detailed Information tab, as shown in Figure 8-10.
Figure 8-10
8.3.5
The ONU Resource Detailed Information tab
Viewing the ONU Port Resource Statistics Detailed List
Purpose You can use this function to view the relevant detailed information of the ONU port, such as the port status, the service type, the uplink rate, the downlink rate, the inner VLAN ID, and the outer VLAN ID.
Operation steps Table 8-9
The operation entry path of viewing the ONU port resource statistics detailed list
Operation Item
Viewing port
the
Operation Entry Path
ONU
resource
statistics detailed list
Resource Statistics
→
ONU Port Resource Detailed Information
in the main menu The Admin Tools tab
→
View Statistics Report
→
ONU Port
Resource Detailed Information
Step 1: Select the path in Table 8-9 to open the ONU Port Resource Detailed Information tab.
8-10
Version: F
Part 2
Operations
8
Statistics Management
Step 2: Select the corresponding system object ne eding the statistics under Admin Tool (in this case you can only select one system) and then click Execute. Then the statistics results will appear in the ONU Port Resource Detailed Information tab, as shown in Figure 8-11.
Figure 8-11
8.4
The ONU Port Resource Detail Information tab
MGC Resource Statistics
Purpose You can use this function to view the information of the MGC configured on the OLT, such as the MGC protocol type, the MGC IP address or domain name address, and the MGC port No.
Operation steps Table 8-10
The operation entry path of the MGC resource statistics
Operation Item
MGC statistics
resource
Operation Entry Path Resource Statistics
→
The Admin Tools tab
MGC Resource Statistics in the main menu
→
View Statistics Report
→
MGC Resource
Statistics
Step 1: Select the path in Table 8-10 to open the MGC Resource Statistics tab.
Version: F
8-11
Part 2
Operations
8
Statistics Management
Step 2: Select the corresponding system object ne eding the statistics under Admin Tool and then click Execute. Then the statistics results will appear in the MGC Resource Statistics tab, as shown in Figure 8-12.
Figure 8-12
8-12
The MGC Resource Statistics tab
Version: F
9
Security Management
The ANM2000 not only provides new user management functions (such as the online user management, the restriction of repeated login, the restriction of IP section, and locking edit mode) for users, but also improves the authorization and domain division management function; for this reason, the ANM2000 can configure the EPON, GPON, and other services for multiple users. The relationships between various security management functions are shown in Figure 9-1. Manage online users
View logs
Manage operators Manage users
Security management
Add new users Modify password of current user
Send messages
Manage command authorization Manage authorization and domain division
Manage messages and upload files
Figure 9-1
Relationships between various security management functions
This chapter includes the following contents:
Managing users Sending messages Managing messages and uploading files Managing the authorization and domain division Viewing logs
Version: F
9-1
Part 2
Operations
9.1
9
Security Management
Managing Users The user management function provided by the ANM2000 can define the legal users and their authorizations and management domains, so as to prevent illegal operations effectively.
9.1.1
Adding New Users
Purpose An Admin user can assign the corresponding authorizations for the users with different roles (levels). Before assigning users, the Admin user needs to add new users.
Prerequisite Only the Admin user can add new users.
Operation steps Table 9-1
The operation entry path of adding new users
Operation Item
Operation Entry Path
Adding new users
Safety Manage
→
Add New User… in the main menu
Step 1: Select the paths listed in Table 9-1 to open the Add New User… dialog box.
9-2
Version: F
Part 2
Operations
9
Security Management
Step 2: Input the relevant information according to Table 9-2. See Figure 9-2. Table 9-2
The configuration items in the Add New User… dialog box
Configuration Item
Description
User Name
Input the organization name of the new user.
“
There are five user levels for selection: Admin, Manager , User, User Grade
Operator , and Guest.
Name
Input the name and surname of the new user.
Staff ID.
Input the staff No. of the new user.
Operation From
Set it on demand, with the default value being 00: 00:00.
Operation To
Set it on demand, with the default value being 00: 00:00. Sets the new user as a domain-limited user, meaning that the new user
Limited User
can only manage the equipment inside the authorization domain.
User Validation
Sets the new user as a legal user. Sets the new user to having the locked edit mode. Otherwise certain
Lock Edit Mode Ability
operations such as the basic configuration cannot be conducted. The system permits one and only one user to log in the network management system with the appointed username at the same time interval. For example, if user A logs in the network management system
Only Login Once
with the username abc, other users cannot log in the network management system with the username abc before user A exits the network management system. Input the descriptions of the n ew user.
Description Password Confirm Password Setting
Password Password Overdue Time (Day)
Input the login password, with the length being 8 to 32 symbols. Input the login password again.
Sets the login overdue period of the new user; its value is 0 by default, meaning that the password is valid for ever. Click Add IP Section , and input the starting IP address in the box under
Allow Login IP List
it. In this case, the new user can log in ANM2000 successfully only when his / her IP address belo ngs to the network section.
Version: F
9-3
Part 2
Operations
9
Figure 9-2
Security Management
The Add New User… dialog box
Step 3: After completing the setting operation, click OK to save the settings and then exit the dialog box.
9.1.2
Managing Operators
Purpose The system administrator can use this function to view the users in the system and their properties, so as to find abnormal conditions in time and ensure the normal running of the system and the equipment.
Prerequisite Only the Admin user can manage operators.
9-4
Version: F
Part 2
Operations
9
Security Management
Operation steps Table 9-3
The operation entry path of managing operators
Operation Item
Operation Entry Path Safety Manage
Managing operators
→
User Management in the main menu
The Admin Tools tab
→
Safety Manage
→
User Management i n
the edit mode
Step 1: Select the paths listed in Table 9-3 to open the User Management tab as shown in Figure 9-3.
Figure 9-3
The User Management tab
Note: When a user logs in with errors for more than three times, this user will be locked.
Version: F
9-5
Part 2
Operations
9
Security Management
Step 2: Double-click a certain user, or select a certain user and click Property in the shortcut menu to open the User Property dialog box as shown in Figure 9-4.
Figure 9-4
The User Property dialog box
Step 3: You can modify the relevant information of the selected user, and then click OK to save the settings and then exit the dialog box.
9.1.3
Managing Online Users
Purpose You can use this function to view the current online users and their basic information (an Admin user can force other non-Admin users to leave), so as to ensure the normal running of the system and the equipment.
9-6
Version: F
Part 2
Operations
9
Security Management
Operation steps Table 9-4
The operation entry path of managing online users
Operation Item
Operation Entry Path
Managing
Safety Manage
online
users
→
Admin Tools tab
→
Online User Management in the main menu Safety Manage
Online User Management
→
Step 1: Select the paths listed in Table 9-4 to open the Online User Management tab as shown in Figure 9-5.
Figure 9-5
The Online User Management tab
Step 2: The current user can perform the following operations of other online users.
Select other online users and click Refresh in the shortcut menu to refresh the statuses information of the selected users.
Select other online users and click Send Message in the shortcut menu to chat with them in instant mode.
Select other online users and click Enforce Outline in the shortcut menu to force the lower-level online users to leave.
Note: Under some special conditions (such as the system upgrade and cutover), the system needs that other users leave. To meet this demand, the ANM2000 provides the force-leave function. Only the online user with the Admin level has the authorization to force other users to leave.
Version: F
9-7
Part 2
Operations
9.1.4
9
Security Management
Modifying the Password of the Current User
Purpose Under some special conditions (such as your first login of the ANM2000), you need to modify the login password to ensure the security of the user.
Operation steps Table 9-5
The operation entry path of Modifying the password of the current user
Operation Item
Modifying password current user
Operation Entry Path
the of
the
Safety Manage
→
’
Change Current User s Password… in the main
menu
Step 1: Select the paths listed in Table 9-5 to open the Change Current User ’s Password dialog box as shown in Figure 9-6.
Figure 9-6
’
The Change Current User s Password dialog box
Step 2: Input the old password, the new password, and the confirmed password in turn, and then click OK.
9-8
Version: F
Part 2
Operations
9.2
9
Security Management
Sending Messages
Purpose Sending messages is used to communicate between the network management system users.
Operation steps Table 9-6
The operation entry path of sending messages
Operation Item
Operation Entry Path
Sending messages
Safety Manage
Send Message in the main menu
→
Step 1: Select the path listed in Table 9-6 to open the Send Message window as shown in Figure 9-7.
Figure 9-7
The Send Message window
Step 2: In the right-bottom pane, select the target user and select Receiver or CC in the shortcut menu.
Version: F
9-9
Part 2
Operations
9
Security Management
Step 3: Input the message subject and the message content, and then click the
button to send the message.
In the receiver GUI, a dialog box as shown in Figure 9-8 will appear; click it to view the content of this message.
Figure 9-8
9.3
The dialog box of receiving the message
Managing Messages and Uploading Files
Purpose You can use this function to view the information on the messages that you send and receive, and view the information of the uploaded files.
Prerequisite Before users upload the files, the FTP server has been set.
Operation steps Table 9-7
The operation entry path of managing messages and uploading files
Operation Item
Operation Entry Path Safety Manage
→
Message And Upload File Manager in the main
Managing messages
menu
and uploading files
The Admin Tools tab
→
System Manager
→
Message And Upload
File Manager
Step 1: Select the paths listed in Table 9-7 to open the Message And Upload File Manager tab as shown in Figure 9-9.This tab displays the information of the inbox by default.
9-10
Version: F
Part 2
Operations
9
Figure 9-9
Security Management
The Message And Upload File Manager tab
Step 2: Select a letter in the inbox and right-click it, and users can select to reply to , delete it, or send messages to its sender. Step 3: Click Upload File Manager
→
Upload File List below the Admin Tools
tab and you can see the list information of the uploaded files, as shown in Figure 9-10.
Figure 9-10
The Message And Upload File Manager tab (2)
Step 4: Select and right-click a file, and users can select to download or delete this file; at the same time, users can upload new files.
Version: F
9-11
Part 2
Operations
9
Security Management
Step 5: Right-click the blank, and select Upload File in the shortcut menu to open the Select Upload File dialog box, as shown in Figure 9-11.
Figure 9-11
The Select Upload File dialog box
Step 6: Click
to select the file to be uploaded, and click OK. Then the file will
be uploaded to the appointed FTP server.
Note: 1. The uploading file address can be set in the FILEMANAGE field of the md.ini file under the D:\aems\Server\ini path. 2. Only the user with the Admin level has the operation authorization to upload / delete files.
9-12
Version: F
Part 2
Operations
9.4
9
Security Management
Managing the Authorization and Domain Division
9.4.1
Basic Knowledge of the Authorization and Domain Division The ANM2000 supports the Client end-Server end networking; the typical architecture in actual applications is shown in Figure 9-12.
Figure 9-12
Version: F
The Client end-Server end networking
9-13
Part 2
Operations
9
Security Management
When this networking mode is used, the network management computer in an area can be a workstation or PC with a relatively lower level configuration, and can connect to the central network management computer (server) to implement the management functions if it is installed with the ANM2000 Client end. This networking mode brings the following problem: Because of the sharing of the database, a certain user in one area can manage the equipment in another area. This obviously causes the hidden trouble. To solve this problem, the ANM2000 adds options to assign a certain user to be or not to be the area-limited user in the user management module. By using these options, the ANM2000 can configure management objects (system, module, card) for a user; in this case, when the user logs in the ANM2000 GUI in a certain client area, the network management system only displays devices in the management range of the user, and this user only can manage devices in his / her authorized area within the assigned authorization. As soon as this user performs an operation exceeding the assigned authorization, the Command Manager window will appear to give the prompt Not Have the Authorization, and the corresponding operation will be invalid.
Note: 1. The Admin user must be the global user, and only the Admin user has the authorization to configure limited users. 2. A user with the authorization of the parent object is sure to have all authorizations of the sub-objects, but the opposite conclusion is not true. The ANM2000 has the following domain authorization division functions implemented in the object tree.
For an area management user, the systems and cards not in the management range are not displayed at the GUI.
When displaying alarm indicators, the network management system filters the nodes not in the management range and displays them with different icons; commonly the network management system only filters the objects not lower than modules, and for the card objects, the network management system only filters the EC2 card and other similar cards with remote end modules.
9-14
Version: F
Part 2
Operations
9
Security Management
When generating the object trees, the network management system filters the nodes not needed in these object trees, including the object trees at the main GUI and other GUIs such as uploading / downloading in the packet mode, detecting the physical configuration, and the performance collection.
The ANM2000 has the following domain authorization division functions implemented in the menu control.
Object menu: The area-limited user cannot import the management domain. The user can add / delete lower level objects or re-configure the card types only when he / she has the authorization of the upper level objects. The user can check physical configurations only when he / she has the authorization of the objects not lower than the module.
Main menu: The area-limited user cannot perform forced saving, importing, and exporting operations, and cannot execute user management, domain authorization division management, and command authorization management operations (only the Admin user can execute these operations).
According to the area authorizations, the network management system can filter the main menus and object menus (including detecting physical configurations, adding / deleting / importing / exporting management domains or logical domains, forced saving, etc.)
Detecting
physical
configurations:
The
user
can
check
physical
configurations only when he / she has the authorization of the objects not lower than the module.
Basic operations of various objects: The user can add / delete lower level objects only when he / she has the authorization to operate all lower level objects of the local object.
For the operation of viewing logs, the network management system needs to distinguish the Admin users and other users. Non-Admin users only can view their own logs.
A user can set the performance collection scheme only when he / she has the authorization of the system object.
Version: F
9-15
Part 2
Operations
9.4.2
9
Security Management
Managing the Authorization and Domain Division
Purpose You can assign the domain division authorization for the domain-limited users via an Admin user; this makes them only able to operate the management domain or equipment in the given authorization, and can increase the security of the system.
Prerequisite Only an Admin user can perform the domain division authorization management operation of non-Admin users.
Operation steps Table 9-8
The operation entry path of managing the authorization and domain division
Operation Item
Operation Entry Path Zone Right Management in the main menu
Managing
the
Safety Manage
authorization
and
The Admin Tools tab
domain division
→
→
Safety Manage
→
Zone Right
Management
Step 1: Log in the ANM2000 with the Admin level. Step 2: Select Safety Manage
→
User Management in the main menu to open the
User Management tab; for the user needing the domain management, select Limited User .
Step 3: Click System
→
Edit Mode in the main menu or
in the toolbar to enter
the edit mode. Select the paths listed in Table 9-8 to open the Zone Right Setting window as shown in Figure 9-13.
9-16
Version: F
Part 2
Operations
9
Figure 9-13
Security Management
The Zone Right Setting window
Step 4: Select the user needing to be assigned with the management area authorization in the left pane of this window, and select the system objects that can be managed by this user in the right pane. Step 5: After completing the setting operation, click Access Operation DB in the main menu or the
→
Save to
button in the toolbar to save the setting and exit
this window.
Note: You need to save the authorization and domain division setting of each user in the database alone.
Version: F
9-17
Part 2
Operations
9.4.3
9
Security Management
Managing the Command Authorization
Purpose You can assign the management command authorization for the domain-limited users via an Admin user; this makes them only able to perform the command operations in the given authorization, and can increase the security of the system.
Prerequisite Only an Admin user can perform the command authorization management operation of non-Admin users.
Operation steps Table 9-9
The operation entry path of managing the command authorization
Operation Item
Managing command authorization
Operation Entry Path
the
Safety Manage
→
Command Right Management in the main
menu The Admin Tools tab
→
Safety Manager
→
Command Right
Management
Step 1: Log in the ANM2000 with the Admin level. Step 2: Select Safety Manage
→
User Management in the main menu to open the
User Management tab; for the user needing the domain management, select Limited User .
9-18
Version: F
Part 2
Operations
9
Step 3: Click System
→
Edit Mode in the main menu or
Security Management
in the toolbar to enter
the edit mode. Select the paths listed in Table 9-9 to open the Command Right Setting window as shown in Figure 9-14.
Figure 9-14
The Command Right Setting window
Step 4: Select the user needing to be assigned with command authorization in the left pane of this window, and select the commands that can be operated by this user in the right pane. Step 5: After completing the setting operation, click Access Operation DB in the main menu or the
→
Save to
button in the toolbar to save the setting and exit
this window.
Note: You need to save the command authorization setting of each user in the database alone.
Version: F
9-19
Part 2
Operations
9.5
9
Security Management
Viewing Logs The ANM2000 provides command logs and login logs for users to query, so as to make you understand the running conditions of the ANM2000 and judge the network faults easily.
9.5.1
Viewing Command Logs
Purpose An Admin user can use this function to understand the command operations of all users logging in the server, and this can provide evidences for locating faults.
Prerequisite Only an Admin user can view command logs.
Operation steps Table 9-10
The operation entry path of viewing command logs
Operation Item
Viewing logs
9-20
command
Operation Entry Path Safety Manage
→
View The Command Log in the main menu
The Admin Tools tab
→
System Manager
→
View The Command
Log
Version: F
Part 2
Operations
9
Security Management
Step 1: Enter the View The Command Log tab as shown in Figure 9-15 via the paths listed in Table 9-10. The tab displays all command logs by default.
Figure 9-15
The View The Command Log tab
Step 2: Right-click the tab, and select Modify Query Condition to open the Command Log Filter dialog box as shown in Figure 9-16.
Figure 9-16
Version: F
The Command Log Filter dialog box
9-21
Part 2
Operations
9
Security Management
Step 3: Select various items and set the filter conditions in turn. After completing the setting operation, click OK. In this case, the View The Command Log tab will only display the items meeting the filter conditions. See Figure 9-17.
Figure 9-17
9.5.2
The filtering results of the View The Command Log tab
Viewing Login Logs
Purpose An Admin user can use this function to understand the information of all users logging in the server and discover abnormal logins in time, and this can increase the security of the system.
Prerequisite Only an Admin user can view login logs.
Operation steps Table 9-11
The operation entry path of viewing login logs
Operation Item
Operation Entry Path Safety Manage
Viewing login logs
→
View The User Login Log in the main menu
The Admin Tools tab
→
System Manager
→
View The User Login
Log
9-22
Version: F
Part 2
Operations
9
Security Management
Step 1: Enter the View The User Login Log tab as shown in Figure 9-18 via the paths listed in Table 9-11.
Note: This tab displays all login logs of the current day by default.
Figure 9-18
The View The User Login Log tab
Step 2: Right-click the tab, and select Modify Query Condition to open the Login Filter dialog box as shown in Figure 9-19.
Version: F
9-23
Part 2
Operations
9
Figure 9-19
Security Management
The Login Filter dialog box
Step 3: Select various items and set the filter conditions in turn. After completing the setting operation, click OK. In this case, the View The User Login Log tab will only display the items meeting the filter conditions. See Figure 9-20.
Figure 9-20
9-24
The filtering results of the View The User Login Log tab
Version: F
10
Other Management Operations
Besides the management operations mentioned previously, the ANM2000 also provides some characteristic functions, such as filtering texts, managing styles. Hereinafter, we will introduce these functions in turn. This chapter includes the following contents:
Viewing the command manager / command bar Viewing the Airscape view Searching systems Querying the ONUs Filtering texts
Version: F
10-1
Part 2
Operations
10.1
10
Other Management Operations
Viewing the Command Manager / Command Bar
10.1.1
Viewing the Command Manager
Purpose The command manager is used to display all commands operated to the equipment by the user, including the command start time, used time, and other relevant information. You can use this function to understand the detailed information of the command execution.
Operation steps
Note: After users operate the ANM2000, the Command Manager window usually appears automatically. Step 1: Select View
→
Command Manager in the main menu to open the
Command Manager window, as shown in Figure 10-1.
Figure 10-1
10-2
The Command Manager window
Version: F
Part 2
Operations
10.1.2
10
Other Management Operation
Viewing the Command Bar
Purpose You can use this function to understand the valid commands able to be executed on the selected system or card, and also can double-click a command to enter the corresponding GUI rapidly and perform settings.
Operation steps Step 1: In the Object Tree tab, select the system or card to be viewed. Step 2: Select View
→
Command Bar in the main menu to open the Command
Bar pane, as shown in Figure 10-2.
Figure 10-2
The Command Bar pane
Step 3: Double-click the command to be executed and open the corresponding setting dialog box; after the corresponding settings are completed, the command can be executed.
Version: F
10-3
Part 2
Operations
10.2
10
Other Management Operations
Viewing the Airscape View
Purpose When the topology pane only displays partial contents of the view, you can use this function to see the total view and locate the area displayed in the topology pane.
Operation steps
Step 1: Select View
→
Show topo airscape in the main menu or click
in the
toolbar to open the Air Scape pane, as shown in Figure 10-3.
Figure 10-3
The Air Scape pane
In the Air Scape pane, the area with deep color is the position of the view of the current topology in the whole view. Step 2: In the Air Scape pane, drag the area with deep color, and you can change the view displayed in the topology view.
Note: When you switch to another window, the Air Scape pane will be closed automatically.
10-4
Version: F
Part 2
Operations
10.3
10
Other Management Operation
Searching Systems
Purpose When the scale of a network is relatively large, you can find the objects meeting your requirements in the Object Tree tab by searching the key information.
Background information You can search systems via the system name or the IP address.
Operation steps Step 1: Click View
→
Search System in the main menu to open the Search
Object dialog box as shown in Figure 10-4.
Figure 10-4
The Search Object dialog box
Step 2: After setting the searching conditions, click Find Next to start searching the systems meeting the conditions in the Object Tree tab.
Version: F
10-5
Part 2
Operations
10.4
10
Other Management Operations
Querying the ONUs
Purpose You can use this function to find a designated ONU rapidly in the current system.
Operation steps Step 1: Click View
→
ONU Query… in the main menu to open the ONU Search
Setting: dialog box as shown in Figure10-5.
Figure 10-5
10-6
The ONU Search Setting: dialog box
Version: F
Part 2
Operations
10
Other Management Operation
Step 2: Set the basic information, the service information, and the subscriber information of the ONU in turn. Step 3: After completing the setting operations, click OK. In this case, the Search ONU tab will appear and display the ONUs meeting the query conditions.
10.5
Filtering Texts
Purpose You can select key words in the current tab, so as to make the system only display the items including these keywords.
Prerequisite
The current tab including the result information exists.
Operation steps Step 1: Click View
→
Text filter… in the main menu to open the Filter Text dialog
box as shown in Figure 10-6.
Figure 10-6
Version: F
The Filter Text dialog box
10-7
Part 2
Operations
10
Other Management Operations
Step 2: In the Filter Text dialog box, input the key words (if there are multiple key words, separate them by spaces). Then the current tab will only display the related items (items containing the key words), and the unrelated items (items not containing the key words) will be filtered. See Figure 10-7.
Figure 10-7
Text filter results
Note: After the operation is completed, users must delete the key words in the Filter Text dialog box and then exit the dialog box. Otherwise the current tab will always only display the related items.
10-8
Version: F
e-Fim ANM2000 Broadband Access Network Management System Operation Manual (Based on Windows) Version: F Code: MN000000050
Part 3 Maintenance
11
Routine Maintenance
To ensure the long-period stable running of the ANM2000, users need to maintain the ANM2000 regularly, so as to master the running state of the equipment and network and find hidden troubles and handle them in time, for avoiding accidents. The main contents of this chapter are as follows:
Maintenance requirements Maintenance precautions Daily routine maintenance Weekly routine maintenance Monthly routine maintenance Quarterly routine maintenance
Version: F
11-1
Part 3
Maintenance
11.1
11 Routine Maintenance
Maintenance Requirements Before conducting the routine maintenance to the ANM2000, the maintenance staff should be aware of their responsibilities; to ensure that the ANM2000 works normally, they also should be familiar with the relevant technology and other knowledge, as presented in this section.
11.1.1
Duty of Maintenance Staff Follow the maintenance procedures to perform the routine maintenance well and make the relevant records in detail. If a sudden accident occurs:
They should not only follow the maintenance procedures but also report to the department in charge or the supervisor immediately. If necessary, they should request for cooperating with other departments, so as to eliminate the fault in the shortest time.
They should record the processing of serious faults as well as the relevant data in detail, and archive the records regularly.
Do not modify network configuration data nor replace card or software randomly; if inevitable, make a detailed record for future reference.
11.1.2
Requirements of Maintenance Staff Maintenance staff should conduct routine maintenance carefully, find out the hidden fault and remove it in time, and try to decrease fault rate. In addition, they should analyze the fault, which has already happened, locate the root cause quickly, and clear the fault in time. Therefore, good maintenance skill, operation specification and psychological quality are required of maintenance staff.
Be familiar with the network management system operation.
Be familiar with the system networking.
Be familiar with various alarms and performance parameters of the equipment and understand them correctly.
11-2
Version: F
Part 3
Maintenance
11.2
11 Routine Maintenance
Maintenance Precautions To ensure the normal running of the ANM2000, maintenance staff should pay attention to the following precautions and obey them.
11.2.1
Precautions for Hardware Operations To make sure that the hardware operations are normal, note the following affairs:
Configure the UPS (uninterrupted power supply) for the network management workstation. This can avoid some serious problems such as data loss caused by abnormal power failure, hardware damage, and system restoration failure.
Obviously mark “No power off at the ANM2000 workstation” on the workstation and its power supply plug respectively.
Generally, do not shut down the ANM2000 after it is started, so that the administrator can monitor the system state at any time.
To
avoid
network
communication
interruption,
check
the
network
communication state daily according to daily routine maintenance items.
Keep the equipment room clean, dustproof and moistureproof.
If any problem is found, handle it in time. If the problem cannot be solved, contact the local maintenance center of FiberHome.
11.2.2
Precautions for Software Operations To make sure that the software operations are normal, note t he following affairs:
The ANM2000 workstation should be dedicated. Neither irrelevant operations nor unnecessary software is permitted in th e ANM2000 workstation.
Do not use other computers or portable computers to access the network in which the ANM2000 server is located. In t his way, conflict of IP addresses and virus infection can be avoided.
The password of the ANM2000 workstation should be authorized according to the level. Ensure that only the maintenance chief knows the administrator level password.
Version: F
11-3
Part 3
Maintenance
11 Routine Maintenance
Perform check and test daily according to the related routine maintenance items and keep a record. Post the contact information such as the telephone and fax of FiberHome’s local maintenance center in the machine room for reference of maintenance personnel. Technical support hotline of FiberHome is 0086-27-87691549.
If any problem is found, handle it in time. If the problem cannot be solved, contact the local maintenance center of FiberHome.
11.3
Daily Routine Maintenance In the course of the daily routine maintenance, it is required to record problems and fault symptoms in detail, which act as the reliable grounds for analyzing and solving problems. The daily routine maintenance items are listed in Table 11-1. Table 11-1
Daily maintenance items
Maintenance Item
Requirement
Logging in the ANM2000 with a low-level user authority
Can log in the ANM2000 normally, and the operation
Pinging the system
Ensure that the system is communicating with the ANM2000.
authority is not changed.
Ensure Viewing the service start state
Refer To
that
services
AEMS-Manager ,
Informix-IDS,
11.3.1 11.3.2
AEMS-DBServer ,
AEMS-CollectionServer,
and
11.3.3
AEMS-DumpServer are started normally.
Can get or view each card’s current alarms or history alarms
Checking the alarm Checking performance
normally, and the system filters the invalid alarms in time. the
Can get or view each card’s performance data normally.
11.3.4 11.3.5
View the system’s log information to monitor and manage the Querying the message record
network’s important state, or view the relevant operations and records of error messages via the Command Manager
11.3.6
window. Before modifying the configuration, users should back up Backing up the real time data
data to avoid loss of important data caused by wrong
11.3.7
operation.
11-4
Version: F
Part 3
Maintenance
11.3.1
11 Routine Maintenance
Logging in the ANM2000 with a Low-level User Authority Advanced users have all authorities; if a user logs in the ANM2000 with this identity, a serious result will be caused in case of wrong operations. In the daily operation, it is not recommended to log in the ANM2000 as an advanced user but as a low-level user (such as the power user, user, or guest). The procedure of logging in the ANM2000 with a low-level user authority is described as below:
Step 1: Double-click the
icon on the desktop to open the ANM2000 User
Login dialog box, as shown in Figure 11-1.
Figure 11-1
The ANM2000 User Login dialog box
Step 2: In the ANM2000 User Login dialog box, input the correct username and password, and click OK. Step 3: After the user logs in successfully, the ANM2000 main GUI will appear. During the login operation, if the login GUI of the ANM2000 stops at a certain login alert box, this indicates that faults occur in this step and users fail to log in the system. In this case, users need to eliminate the faults and log in again; for the detailed operation methods, refer to Section 13.2.
Version: F
11-5
Part 3
Maintenance
11.3.2
11 Routine Maintenance
Pinging the System Step 1: In the ANM2000 main GUI, right-click a system in the Object Tree tab of the browse tree pane, and select Ping in the shortcut menu to open the ping window, as shown in Figure 11-2.
Figure 11-2
The ping window
Step 2: View the information displayed in the ping window.
If the information Reply from *.*.*.*
bytes=32 time<*ns TTL=* (as shown in
Figure 11-2) appears in the window, it means that ANM2000 is communicating with the system normally.
If the information Request timed out appears in the window, it means that the Ping operation fails. In this case, the user should eliminate faults and ping the system again till the Ping operation becomes successful.
11-6
Version: F
Part 3
Maintenance
11.3.3
11 Routine Maintenance
Viewing the Service Start State Step 1: Click Start (on the bottom-left corner of the desktop) Administrative Tools
→
→
All Programs
→
Services to enter the Services window, as shown in
Figure 11-3.
Figure 11-3
The Services window
Step 2: Check whether the states of Informix IDS, AEMS-DBServer , AEMS-Manager , AEMS-CollectionServer , and AEMS-DumpServer services are started.
Note: For AEMS-TL1Server and AEMS-WebServiceServer services, their start states depend on the conditions at the operation site. Step 3: If any service is not started, select this service and click the
button in the
toolbar to start it, till its state changes into Started. Step 4: If the service still cannot be started, please contact FiberHome’s local maintenance center to solve the problem.
Version: F
11-7
Part 3
Maintenance
11.3.4
11 Routine Maintenance
Checking the Alarm The ANM2000 provides powerful alarm management functions. In the routine maintenance, the maintenance personnel should view the alarm information every day; if any new alarm appears, they should record, analyze and handle it in time. Alarms are divided into the current alarm and the history alarm.
Current alarm: means the uncleared alarm events in the network (that is, these alarm events still exist).
History alarm: means the ended, confirmed and recorded alarm events.
Users can select a certain system object to view its current alarm or history alarm according to the actual requirement.
Viewing the current alarm Refer to Section 6.8.1.
Viewing the history alarm Refer to Section 6.8.2.
Confirming an alarm Confirm the ended alarms to transfer them to the history alarm database; that is, remove them from the current alarm tab. Thus it gives an at-a-glance impression of the current persistent alarms and eases the equipment fault analyzing. Step 1: Click an ended alarm in the Current Alarm tab. Step 2: Select the Alarm Confirm or Alarm Confirm-Add Confirm Information option in the shortcut menu, to complete the alarm confirmation.
11-8
Version: F
Part 3
Maintenance
11.3.5
11 Routine Maintenance
Checking the Performance Performance data are classified into the instant performance and the history performance. Instant performance data are the instant performance data stored in the equipment, and users can query performance data of the current 15-minute st th and the latest 1 to 16 15-minute intervals. History performance data are the
performance data stored in the database according to the performance collection and stored settings, including 15-minute performance data and 24-hour performance data. For the detailed operations of checking pe rformance, users can refer to Section 7.2, and we will not go further on this issue here.
11.3.6
Querying the Message Record The ANM2000 records the operations that all login users perform to it and some cases occur in it (such as the system start and quitting, the user login, logout, and illegal login, the change of the connection between the ANM2000 and system objects). Users need to query the record periodically so as to ensure the ANM2000’s security. Users can view the command log or login log, and also can check Event Viewer ; so that, users can know any operation and error message that occurs in the ANM2000.
Viewing the command / login log Refer to Section 0.
Viewing Event Viewer Step 1: Click Start (on the bottom-left corner of the desktop) Administrative Tools
→
→
All Programs
→
Event Viewer to open the Event Viewer window, as
shown in Figure 11-4. In this window, users can view Application Log, Security Log and System Log.
Version: F
11-9
Part 3
Maintenance
Figure 11-4
11 Routine Maintenance
The Event Viewer window (1)
Select a certain log entry in the browse tree on the left part of the Event Viewer window to display all information of the log on th e right part of the window, including Type, Date, Time, Source and so on. Step 2: Double-click a certain log to be queried on the right part of the Event Viewer window to get the Event Properties dialog box for displaying the detailed information of the log, as shown in Figure 11-5.
11-10
Version: F
Part 3
Maintenance
Figure 11-5
11.3.7
11 Routine Maintenance
The Event Properties dialog box
Backing up the Real Time Data In the routine maintenance, users should back up the data before modifying the configuration, so as to avoid loss of important data due to a misoperation. For the detailed operations of backing up the data, users can refer to Section 5.13, and we will not go further on this issue here.
Version: F
11-11
Part 3
Maintenance
11.4
11 Routine Maintenance
Weekly Routine Maintenance In the course of the weekly routine maintenance, it is required to record the problems and fault symptoms in detail, which act as the reliable grounds for analyzing and solving problems. The weekly routine maintenance items are listed in Table 11-2. Table 11-2
Weekly routine maintenance items
Maintenance Item
Viewing the service start state
name and the IP address Viewing the size of system files
Ensure that services Informix-IDS, AEMS-DBServer , AEMS-Manager ,
AEMS-CollectionServer,
and
11.3.3
Ensure that both the host name and IP address are correct.
11.4.1
Check system files regularly lest some of them become large increasingly and the system cannot run normally due
11.4.2
to this. the
database space
Check the database space periodically. If the free space is too small, users should ask technicians of FiberHome to
11.4.3
enlarge the database.
Checking advanced settings Viewing
Refer To
AEMS-DumpServer are started normally.
Checking the host
Viewing
Requirement
Make sure that Database is located above Device in the Connections list; that is, Database is preferential to be
11.4.4
connected with. Otherwise, the database is unavailable. the
management
Check whether the settings of IP address and protocol are
configuration
correct.
11.4.5
program
11.4.1
Checking the Host Name and the IP Address Checking the host name Step 1: Right-click My Computer at the desktop and select Properties in the shortcut menu to open the System Properties dialog box as shown in Figure 11-6.
11-12
Version: F
Part 3
Maintenance
Figure 11-6
11 Routine Maintenance
The System Properties dialog box
Step 2: Check the computer name according to the delivery configuration list. If you need to modify the computer name, please click Change settings to modify it and restart the computer after the modification.
Checking the IP address Step 1: Click Start
→
Control Panel
→
Network and Sharing Center on the
desktop to open the Network and Sharing Center window, as shown in Figure 11-7.
Version: F
11-13
Part 3
Maintenance
Figure 11-7
11 Routine Maintenance
The Network and Sharing Center window
Step 2: Click the Manage network connections to open the Network Connections window, as shown in Figure 11-8.
Figure 11-8
11-14
The Network Connections window
Version: F
Part 3
Maintenance
11 Routine Maintenance
Step 3: In the Network Connections window, right-click the Local Connection and select Properties to open the Local Connection Properties dialog box, as shown in Figure 11-9.
Figure 11-9
The Local Connection Properties dialog box
Step 4: Double-click Internet Protocol Version 4 (TCP/IPv4) or just click this item and then click the Properties button; then the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box appears, as shown in Figure 11-10. Check the IP address according to the delivery configuration list.
Version: F
11-15
Part 3
Maintenance
11 Routine Maintenance
Figure 11-10 The Internet Protocol Version 4 (TCP/IPv4) Properties dialog box
11.4.2
Viewing the Size of System Files The maintenance personnel should check system files regularly lest the system running is influenced by some enlarging files. Step 1: Open the drive C.
11-16
Version: F
Part 3
Maintenance
11 Routine Maintenance
Step 2: Press the Ctrl and F keys together to open the Search Results window, as shown in Figure 11-11.
Figure 11-11 The Search Results window (1)
Version: F
11-17
Part 3
Maintenance
11 Routine Maintenance
Step 3: Click the
button beside the Advanced Search and set the searching
conditions to search the files with their size larger than 30 M under the drive C directory. See Figure 11-12.
Figure 11-12 The Search Results window (2)
Step 4: Observe the change conditions of log files, temporary files and .txt files. If these files keep on growing, please contact technicians of FiberHome to h andle the problem as soon as possible. You can use the same method to view the size of files under the D:\aems directory.
Note: Some database files such as olsysdbs_dat.000, alarmdbs_dat.000, alarmmonthdbs_dat.000, ol_***_dat.000 (*** represents the equipment name), rootdbs_dat.000, faultdaydbs_dat.000, faultmonthdbs_dat.000, pmdaydbs_dat.000, pmmonthdbs_dat.000, and oltempdbs_dat.000 have a large size indeed. Users may leave them alone. 11-18
Version: F
Part 3
Maintenance
11.4.3
11 Routine Maintenance
Viewing the Database Space Step 1: Click the Start (on the bottom-left corner of the desktop) →
IBM Informix Dynamic Server 11.50
→
→
All Programs
ol_*** (*** represents the equipment
name) to open the ol_*** window, as shown in Figure 11-13.
Figure 11-13 The ol_*** window (1)
Step 2: In the ol_*** window, input the command Onstat –d to check the status of the data space, as shown in Figure 11-14.
Version: F
11-19
Part 3
Maintenance
11 Routine Maintenance
Figure 11-14 The ol_*** window (2)
In this figure, size represents the size of the created space (unit: chunk; 1 chunk = 4k = 4×1024 byte) and free represents the size of the free space. If the free space is smaller than 20%, please contact technicians of FiberHome to enlarge the database space.
11.4.4
Checking Advanced Settings Step 1: Right-click Network and select Properties to open the Network and Sharing Center window. Step 2: Select Manage network connections to open the Network Connections dialog box.
11-20
Version: F
Part 3
Maintenance
Step 3: Select Advanced
11 Routine Maintenance
→
Advanced Settings to open the Advanced
Settings dialog box. Step 4: In the Adapters and Bindings tab, the IP address of the NIC with the highest PRI in the Connections box is the IP address of the NIC binding to the database. See Figure 11-15.
Figure 11-15 Viewing the database’s IP address
Version: F
11-21
Part 3
Maintenance
11.4.5
11 Routine Maintenance
Viewing the Management Configuration Program Step 1: Click Config Manage
→
Manager Configuration in the main menu to
open the Manager Configuration dialog box, as shown in Figure 11-16.
Figure 11-16 The Manager Configuration dialog box
Step 2: In this dialog box, check whether the manager IP address is correct.
11-22
Version: F
Part 3
Maintenance
11.5
11 Routine Maintenance
Monthly Routine Maintenance In the course of the monthly routine maintenance, it is required to record problems and fault symptoms in detail, which act as the reliable grounds for analyzing and solving problems. The monthly routine maintenance items are listed in Table 11-3. Table 11-3
Monthly routine maintenance items
Maintenance Item
Requirement
Ensure
that
Refer To
services
Informix-IDS,
Viewing the service start
AEMS-DBServer ,
state
AEMS-CollectionServer, and AEMS-DumpServer
AEMS-Manager ,
11.3.3
are started normally. Backing up data Checking the configuration Collecting performance
physical
the
Checking the working state of the hardware Checking the connection
11.5.1
database
Backing up data can avoid loss of important data due to misoperation. Check whether the configuration data read from the equipment are consistent with those in the database. Check performance collection settings of system objects whose performance data should be queried, so as to make sure that the settings are correct. Check whether the modem and network card work normally; check whether the mouse, keyboard and display work normally. Log out the ANM2000 and log in again to check whether the database connection is normal.
11.5.1 11.5.2
11.5.3
11.5.4
11.5.5
Backing up Data In the routine maintenance, users should back up data to avoid loss of important data due to a misoperation. For the operations of backing up data, users can refer to Section 5.13, and we will not go further on this issue here.
11.5.2
Checking the Physical Configuration As a kind of the check mechanism, checking the physical configuration is used to check whether the actual equipment configuration is consistent with that in the database. For the detailed operations of checking the physical configuration, users can refer to the configuration guide of each equipment type, and we will not go further on this issue here.
Version: F
11-23
Part 3
Maintenance
11.5.3
11 Routine Maintenance
Collecting the Performance The ANM2000 only collects the history performance data of the system for which the performance collection has been set; that is, the history performance data of the system for which the performance collection has not been set will not be recorded. Therefore, users should set the performance collection for a system before viewing its history performance data. For the detailed operations, refer to Section 7.1. In the routine maintenance, the maintenance personnel should check periodically to make sure that the performance collection has been set for all the systems whose performance data should be viewed.
11.5.4
Checking the Working State of the Hardware The hardware check includes the following two aspects:
Check whether the modem and the network card work normally. The modem and the network card, which are installed before delivery, should be used exclusively for a dedicated network manage ment computer.
11.5.5
Check whether the mouse, keyboard and display work normally.
Checking the Database Connection Log out the ANM2000 and log in again to check whether the database connection is normal.
11-24
Version: F
Part 3
Maintenance
11.6
11 Routine Maintenance
Quarterly Routine Maintenance In the course of the quarterly routine maintenance, it is required to record problems and fault symptoms in detail, which act as the reliable grounds for analyzing and solving problems. The quarterly routine maintenance items are listed in Table 11-4. Table 11-4
Quarterly routine maintenance items
Maintenance
Requirement
Item
Viewing
the
service start state Calibrating
the
ANM2000 time Changing login
Ensure
that
Refer To
services
AEMS-Manager ,
Informix-IDS,
AEMS-DBServer ,
AEMS-CollectionServer,
and
11.3.3
AEMS-DumpServer are started normally.
Check the ANM2000 time and calibrate it with the standard time.
11.6.1
the
password
Log in with the new password and make a detailed record.
11.6.2
periodically Checking
the
remote login Checking
11.6.1
Technicians of FiberHome can log in the local host in the dialup mode.
the
11.6.3
Click a system or module; if the sound card is equipped,
ANM2000
various alarm sounds can be heard, and alarms can be
functions
refreshed automatically.
11.6.4
Calibrating the ANM2000 Time The time calibration is to set time of the equipment based on the current time of the ANM2000. When the time of the equipment and the time of the ANM2000 are not in compliance, configurations in the database will fail to be delivered to the equipment. Therefore, in the routine maintenance, users should check the ANM2000 time and calibrate it with the standard time. For the detailed operations, refer to the configuration guide of each equipment type.
Version: F
11-25
Part 3
Maintenance
11.6.2
11 Routine Maintenance
Changing the Login Password Periodically To improve the security of the system, users should change the login password of the ANM2000 periodically. Step 1: Log in the ANM2000. Step 2: Click Safety Manage Admin Tools tab
→
→
User Management in the main menu or the
Safety Manage
→
User Management to open the User
Management tab as shown in Figure 11-17.
Figure 11-17 The User Management tab
11-26
Version: F
Part 3
Maintenance
11 Routine Maintenance
Step 3: Double-click a certain user or select Property in the shortcut menu of a user to open the User Property dialog box as shown in Figure 11-18.
Figure 11-18 The User Property dialog box
Step 3: Set the new password, click OK to save the settings and then exit the dialog box.
Version: F
11-27
Part 3
Maintenance
11.6.3
11 Routine Maintenance
Checking the Remote Login The remote login plays an important role in the quick fault location. So every maintenance personnel should be familiar with this operation and check each network management computer whose remote login function is enabled periodically to test whether the remote login is successful. To implement the remote login, users should complete the corresponding operations on the network management computer and the remote computer respectively. In the following contents, we will introduce the operation steps on the two computers respectively, taking the remote login via the modem dialup as an example.
Operations on the network management computer The operation steps on the network management computer for the remote login are described as follows:
Step 1: Right-click the
icon and select Properties in the shortcut menu
to open the Network and Dial-up Connections window as shown in Figure 11-19.
Figure 11-19 The Network and Dial-up Connections window 11-28
Version: F
Part 3
Maintenance
11 Routine Maintenance
Step 2: In the Network Task pane, select Make New Connection to open the New Connection Wizard dialog box as shown in Figure 11-20. Then click Next>.
Figure 11-20 The New Connection Wizard dialog box (1)
Step 3: Select Set up an advanced connection for Network Connection Type, and then click Next>.
Figure 11-21 The New Connection Wizard dialog box (2)
Version: F
11-29
Part 3
Maintenance
11 Routine Maintenance
Step 4: It is not necessary to set Advanced Connection Options. Click Next> directly.
Figure 11-22 The New Connection Wizard dialog box (3)
Step 5: Select the equipment for the incoming connection, and then click Next>.
Figure 11-23 The New Connection Wizard dialog box (4)
11-30
Version: F
Part 3
Maintenance
11 Routine Maintenance
Step 6: It is not necessary to set Incoming Virtual Private Network (VPN) Connection. Click Next> directly.
Figure 11-24 The New Connection Wizard dialog box (5)
Step 7: Select root (root), i.e. the administrator user of the network management computer, for Users allowed to connect, and then click Next>.
Figure 11-25 The New Connection Wizard dialog box (6)
Version: F
11-31
Part 3
Maintenance
11 Routine Maintenance
Step 8: It is not necessary to set Networking Software. Click Next> directly.
Figure 11-26 The New Connection Wizard dialog box (7)
Step 9: Click Finish to create the incoming connection, as shown in Figure 11-27.
Figure 11-27 The New Connection Wizard dialog box (8)
11-32
Version: F
Part 3
Maintenance
11 Routine Maintenance
Step 10: Right-click the
icon and select Properties in the shortcut
menu to open the System Properties dialog box as shown in Figure 11-28.
Figure 11-28 The System Properties dialog box
Step 11: Click the Remote tab, and select Allow users to connect remotely to this computer to enable the remote login function of this network management computer.
Note: If an incoming connection has been created on the network management computer, users only need to conduct steps 10 and 11.
Version: F
11-33
Part 3
Maintenance
11 Routine Maintenance
Operations on the remote computer The operation steps on the remote computer for the remote login are described as follows.
Step 1: Right-click
and select Properties in the shortcut menu option,
to open the Network and Dial-up Connections dialog box as shown in Figure 11-19. Step 2: In the Network Task pane, select Make New Connection to open the New Connection Wizard dialog box as shown in Figure 11-29.
Figure 11-29 The New Connection Wizard dialog box (1)
11-34
Version: F
Part 3
Maintenance
11 Routine Maintenance
Step 3: Select Connect to the Internet for Network Connection Type, and then click Next>.
Figure 11-30 The New Connection Wizard dialog box (2)
Step 4: It is not necessary to set Internet Connection. Click Next> directly.
Figure 11-31 The New Connection Wizard dialog box (3)
Version: F
11-35
Part 3
Maintenance
11 Routine Maintenance
Step 5: Input the connection name in the textbox under ISP Name, and then click Next>.
Figure 11-32 The New Connection Wizard dialog box (4)
Step 6: Input the telephone number (i.e. the number of the line connected with the network management computer modem) to be dialed in the textbox under Phone number , and then click Next>.
Figure 11-33 The New Connection Wizard dialog box (5)
11-36
Version: F
Part 3
Maintenance
11 Routine Maintenance
Step 7: It is not necessary to set Completing the New Connection Wizard. Click Next> directly.
Figure 11-34 The New Connection Wizard dialog box (6)
Step 8: Input the administrator username (usually, it is root) of the network management computer in the textbox on the right side of User name; and then, input the login password (for example, Anms2k) in both textboxes of Password and Confirm password; last, click Next>.
Figure 11-35 The New Connection Wizard dialog box (7)
Version: F
11-37
Part 3
Maintenance
11 Routine Maintenance
Step 9: Select Add a shortcut to this connection to my desktop, and then click Finish to complete the creation. In this case, the Connect ** (** presents the connection name inputted in step 5) dialog box will appear, as shown in Figure 11-37.
Figure 11-36 The New Connection Wizard dialog box (8)
Figure 11-37 The Connect ** dialog box 11-38
Version: F
Part 3
Maintenance
11 Routine Maintenance
Step 10: Click Connect to open the Connecting ** (** presents the connection name input in step 5) alert box, as shown in Figure 11-37.
Figure 11-38 The Connecting ** alert box
Step 11: Please wait a moment; if the Error Connecting ** (** presents the connection name input in step 5) alert box appears, users should follow the method in Section 13.4 to find out the cause and eliminate the fault, until the ** has connected (** presents the connection name input in step 5) icon appears in Dialup of the Network Connection dialog box, or until
icon appears at the
bottom-right corner of the desktop, indicating that the dialup connection is created.
Figure 11-39 The Error Connecting ** alert box
Step 12: Click Start (on the bottom-left corner of the desktop)
→
Run and input
mstsc to open the Remote Desktop Connection window, as shown in Figure 11-40.
Version: F
11-39
Part 3
Maintenance
11 Routine Maintenance
Figure 11-40 The Remote Desktop Connection window
Step 13: In the Remote Desktop Connection window, set the Computer , User name and Password items in turn.
Computer : input the IP address of the network management computer which needs to perform the remote login.
User name: input the username of the network management computer which needs to perform the remote login.
Password: input the password of the network management computer which needs to perform the remote login.
Step 14: When completing these settings, click Connect. When the bar box, as shown in Figure 11-41, appears on the top part of the desktop, it means that the remote login is successful.
Figure 11-41 The alert box indicating the successful remote login
11-40
Version: F
Part 3
Maintenance
11 Routine Maintenance
If the alert box, as shown in Figure 11-42, appears, it means that the login operation fails. In this case, follow the methods mentioned in Section 13.4 to find out the cause and eliminate the fault, until the remote login is successful.
Figure 11-42 The Remote Desktop Disconnected alert box
Note: 1. When the remote login operation is completed, the logout operation must be implemented on the remote computer; otherwise, the remote user of the network management computer will always exist. 2. If a dialup connection has been created on the remote computer, users only need to conduct steps 12 to 14. Please contact technicians of FiberHome to conduct the functional test at the remote end. If the maintenance staffs in the equipment room are familiar with this operation, they can test the remote login function through another network management computer by themselves.
11.6.4
Checking the ANM2000 Functions The ANM2000 function check includes:
Check whether alarms and performance data can be obtained.
Check whether alarms can be refreshed automatically (use the shortcut menu options of the Current Alarm tab).
Check whether a system or module can be clicked.
Check whether various alarm sounds can be heard, if the sound card is installed.
Version: F
11-41
12
Troubleshooting Principles and Flow
This chapter covers the troubleshooting principles and flow of the ANM2000, including the following contents:
Basic troubleshooting principles Troubleshooting flow Fault data collection
Version: F
12-1
Part 3
Maintenance
12
Troubleshooting Principles and Flow
12.1
Basic Troubleshooting Principles
12.1.1
Troubleshooting Principles Please keep the following troubleshooting principles to analyze, locate and eliminate a fault:
Restore the system monitoring as soon as possible.
Before locating a fault, collect the fault data in time, and save the collected data to a removable storage medium or another computer in the network.
When determining the troubleshooting scheme, evaluate the influence first, so as to ensure the normal transmission of services.
If the fault point cannot be located or the fault cannot be eliminated, please contact FiberHome (our service hot line: 0086-27-87691549) to obtain the technical support. Cooperate with technicians from FiberHome for the troubleshooting, so as to minimize the period of service interruption.
12.1.2
Troubleshooting Precautions
Analyze the fault symptom and locate the cause first, and then handle the fault. Do not make blind attempts if the fault cause is unknown, to prevent the problem from being enlarged. Notice that the repairing of faults on the ANM2000 cannot influence the system running.
Before handling the fault, keep all onsite records concerning the fault and do not delete any data or log randomly.
Before any modification, back up the data of the ANM2000.
After the system recovers, observe the running state to verify the fault is eliminated; and complete the relevant handling report in time.
Caution: To ensure the normal running of the ANM2000 and the equipment, users should be familiar with the troubleshooting principles and precautions before handling a fault, and then follow these principles and precautions to locate and eliminate the fault.
12-2
Version: F
Part 3
Maintenance
12.2
12
Troubleshooting Principles and Flow
Troubleshooting Flow When the ANM2000 is abnormal because of such external cause as power failure, misoperation, or software and hardware fault, the network may fail to be monitored. In this case, users can locate the fault and repair the system by referring to the troubleshooting flow and complying with the troubleshooting principles and precautions. If the problem persists, contact the local office or the customer service center of FiberHome. Figure 12-1 shows the troubleshooting flow.
Figure 12-1
Version: F
The troubleshooting flow
12-3
Part 3
Maintenance
12.3
12
Troubleshooting Principles and Flow
Fault Data Collection When a system fault occurs, users should collect the relevant data in time, to locate and handle the problem. When a fault occurs on the ANM2000, see Table 12-1 to collect the fault data. Table 12-1
Fault data collection
Collection Item
Time and place
Collect the information about the when and where of a fault; and the time should be precise to minute.
Symptom
Describe the symptom when a fault occurs; and the fault can be
description
located better based on a more specific description.
Measures taken and result
Alarm information Log information Networking diagram
12-4
Description
After some preliminary troubleshooting measures are taken on site, new problems may occur. Therefore, users need to record the procedure of taking measures and the subsequent result in detail. Collect the alarm information, especially the alarms or abnormal events of the ANM2000. Collect the commands and user login logs information. If the fault is caused by networking problems, users need to view the networking diagram.
Version: F
13
Start and Login Faults
Start and login is the first step of operating the ANM2000, and is the prerequisite for achieving other operations and various network management functions in the ANM2000. Therefore, start and login operations are very important. This chapter covers common faults and their troubleshooting methods in the system login and start, including the following aspects:
Failure to start the database Failure to log in the ANM2000 Failure to access the server by the client Failure of the remote login
Version: F
13-1
Part 3
Maintenance
13
13.1
Failure to Start the Database
13.1.1
Fault Symptom
Start and Login Faults
The ANM2000 GUI gives the Connection failure! alert box during the login operation.
13.1.2
Cause and Handling Procedure 1
Cause The last shutdown operation is abnormal, resulting in loss of the data in the database.
Handling method Step 1: Click Start (on the bottom-left corner of the desktop) Tools
→
Services to open the Services window, as shown in Figure 13-1.
Figure 13-1
13-2
Administrative
→
The Services window
Version: F
Part 3
Maintenance
13
Start and Login Faults
Step 2: Check whether the Informix IDS_ol_*** (*** represents the database instance name) database service is started. If not, start it. In this case, if the problem persists, contact technicians of FiberHome for further instructions.
13.1.3
Cause and Handling Procedure 2
Cause The ANM2000 is shut down illegally due to an abnormal power failure of the network management computer, leading to the destruction of the database environment variables; for example, the Informix password is changed.
Handling method Reset the environment variables, following the steps below: Step 1: Click Start
→
Programs
→
IBM Informix Client
SDK 3.50
→
Setnet32
to open the IBM Informix Setnet32 dialog box. Step 2: Check whether each setting in the Server Information tab is correct, according to Table 13-1.
Figure 13-2
Version: F
The Server Information tab
13-3
Part 3
Maintenance
13
Table 13-1
Start and Login Faults
Configuration items in the Server Information tab
Configuration Item
Description
IBM Informix Server
It is for inputting the server database name.
HostName
It is for inputting the server computer name.
Protolname
Select olsoctcp.
Service Name
Usually input 6000 (the port No.), or input turbo.
After completing the settings, click Make Default Server first; first; and then click Apply to open the Define New Informix Server? alert Server? alert box; finally click OK. OK. Step 3: Click the Host Information tab, Information tab, as shown in Figure 13-3; and then check each setting according to Table Table 13-2.
Figure 13-3
13-4
The Host Information tab
Version: F
Part 3
Maintenance
13
Table 13-2
Start and Login Faults
Configuration items in the Host Information tab
Configuration Item
Description
Current Host
It is for inputting the server computer name.
User Name
Always input informix.
Password Option
Its drop-down menu includes Ask Password At Runtime , No Password and Password. Usually select Password, indicating that inputting password is necessary for accessing the server database.
Password
Input the Informix user password; here it is Anms2k.
After completing the settings, click Apply to Apply to bring up the Define New Host? alert Host? alert box; and then, click OK in OK in the alert box. Step 4: Click the Environment Environment tab, as shown in Figure 13-4, to set the environment variables.
Figure 13-4
The Environment tab
Select the Use my settings check settings check box and click Apply and OK and OK..
Version: F
13-5
Part 3
Maintenance
13
13.2
Failure to Log in the ANM2000
13.2.1
Fault Symptom
Start and Login Faults
Users cannot log in the ANM2000 GUI after repeating to input the username and password.
13.2.2
Cause and Handling Procedure
Cause The username or password has errors.
Handling method Use the correct username and password to log in again.
Note: If a user inputs an incorrect password for three times, this user will be locked. An Admin level user can unlock a locked user.
13.3
Failure to Access the Server by the Client
13.3.1
Fault Symptom When users run the ANM2000 on a client, the GUI gives the prompt: Can't open database! Please check database configuration and network connection. connection.
13-6
Version: F
Part 3
Maintenance
13.3.2
13
Start and Login Faults
Cause and Handling Procedure 1
Cause The priority of the server ’s dual NIC setting is incorrect.
Handling method Check whether the priority of the server’s database network card is higher than that of the equipment’s network card; that is, ensure that the priority of server’s database network card is in the first place. The method of setting the network card’s priority is as follows: Step 1: In the server, right-click Network Network and select Properties Properties to open the Network and Sharing Center window. window. Step 2: Select Manage network connections to connections to open the Network Connections dialog box. Step 3: Select Advanced
→
Advanced Settings Settings to open the Advanced
Settings dialog Settings dialog box. Step 4: In the Adapters and Bindings tab Bindings tab of the Advanced Settings dialog Settings dialog box, select tcpip and tcpip and click the
button on the right side to make tcpip in tcpip in the first
place, as shown in Figure 13-5.
Figure 13-5 Version: F
Setting the network card’s priority 13-7
Part 3
Maintenance
13
Start and Login Faults
Step 5: Restart the server.
Note: If the server is installed with other network cards besides the database network card and the equipment network card, the database network card’s priority must always be placed in the first place.
13.3.3
Cause and Handling Procedure 2
Cause The IP address setting of the client database network card is wrong.
Handling method Follow the method mentioned in Section 11.4.1 to check whether the IP address of the client database network card is set a s that of the server database ne twork card.
13.3.4
Cause and Handling Procedure 3
Cause The client cannot communicate with t he server.
Handling method Step 1: Follow the method mentioned in Section 11.3.2 to check whether the client can ping the server. server. Step 2: If the client cannot ping the server, users should check whether the hardware connections of the network components are normal, and whether the settings are correct.
13-8
Version: F
Part 3
Maintenance
13.3.5
13
Start and Login Faults
Cause and Handling Procedure 4
Cause The setting of the configuration file is wrong.
Handling method Open the file D: \ aems \ Client \ ini \ aems.ini, and check whether the setting of each item is correct, referring to the delivery configuration list. See Figure 13-6.
Figure 13-6
Version: F
An example of checking the aems.ini file
13-9
Part 3
Maintenance
13.3.6
13
Start and Login Faults
Cause and Handling Procedure 5
Cause The setting of the environment variable is wrong.
Handling method Step 1: Click Start (on the bottom-left corner of the desktop) Informix Client
SDK 3.50
→
→
Programs
→
IBM
Setnet32 to open the IBM Informix Setnet32
dialog box, as shown in Figure 13-7.
Figure 13-7
The IBM Informix Setnet32 dialog box
Step 2: Check each environment variable setting against the configuration item in Table 13-3.
13-10
Version: F
Part 3
Maintenance
13
Table 13-3 Tab
Start and Login Faults
Configuration items in the IBM Informix Setnet32 dialog box
Configuration Item
Description
INFORMIXSERVER
Input the server database name.
Use my settings
Select it.
IBM Informix Server
Input the server database name.
Server
HOSTName
Input the server computer name.
Information
Protolname
Select olsotcp.
Service Name
Usually input the port No. 6000; or input turbo.
Current Host
Input the server computer name.
User Name
Always input informix.
Environment
Host Information
Usually Password Option
select
Password,
indicating
that
inputting
password is necessary for the client to access server database. Input the Informix user password; here it is Anms2k.
Password
13.4
Failure of the Remote Login
13.4.1
Fault Symptom When users log in on the remote computer, the alert box as shown in Figure 13-8 appears, indicating the login failure.
Figure 13-8
Version: F
The Remote Desktop Disconnected alert box
13-11
Part 3
Maintenance
13.4.2
13
Start and Login Faults
Cause and Handling Procedure 1
Cause The hardware connection between the remote computer and the network management computer fails.
Handling method Step 1: Follow the method in Section 11.3.2 to check whether the remote computer can ping the network management computer. Step 2: If the remote computer cannot ping the network management computer, users should check whether the hardware connection of the network components is normal, and whether the settings are correct.
13.4.3
Cause and Handling Procedure 2
Cause The remote login function of the network management computer is not enabled.
Handling method Step 1: In the network management computer, right-click My Computer on the desktop and select Properties in the shortcut menu to open the System window. Step 2: Select Remote Settings to open the System Properties dialog box. Step 3: Select Allow users to connect remotely to this computer to enable the remote login function of this network management computer.
13-12
Version: F
Part 3
Maintenance
13
Figure 13-9
13.4.4
Start and Login Faults
The System Properties dialog box
Cause and Handling Procedure 3
Cause The remote login setting of the remote computer is incorrect.
Handling method Step 1: In the remote computer, click Start (on the bottom-left corner of the desktop) →
All programs
→
Accessories
→
Communications
→
Remote Desktop
Connection to open the Remote Desktop Connection window, as shown in Figure 13-10.
Version: F
13-13
Part 3
Maintenance
13
Start and Login Faults
Figure 13-10 The Remote Desktop Connection window
Step 2: In the Remote Desktop Connection window, check and modify the incorrect settings; and ensure that the settings of Computer , User name and Password are correct.
13-14
Version: F
14
ANM2000 GUI Operation Faults
This chapter covers the common faults and troubleshooting methods in various management operations at the ANM2000 GUI, including the following aspects:
Failure of importing the configuration data Failure of delivering commands Failure of obtaining the service version information Failure of normally viewing alarms Failure of normally viewing performance data Interruption of services Failure of managing a system via the ANM2000
Version: F
14-1
Part 3
Maintenance
14
ANM2000 GUI Operation Faults
14.1
Failure of Importing the Configuration Data
14.1.1
Fault Symptom When users click System
→
Import Configuration in the main menu at the
ANM2000 GUI to import the configuration data, the system gives an error prompt.
14.1.2
Cause and Handling Procedure 1
Cause The database service Informix IDS_ol_ *** (*** indicating the database instance name) is not started.
Handling method Step 1: Click Start (on the bottom-left corner of the desktop) Tools
→
→
Administrative
Services to enter the Service window.
Step 2: In the Service window, start the Informix IDS_ol_ *** (*** indicating the database instance name) service.
14.1.3
Cause and Handling Procedure 2
Cause The configuration file is generated in a network management system with a higher level version, but the current network management system is a lower level version.
Handling method Upgrade the current network management system; for the detailed operation methods, please contact technicians of FiberHome.
14-2
Version: F
Part 3
Maintenance
14
ANM2000 GUI Operation Faults
14.2
Failure of Delivering Commands
14.2.1
Fault Symptom 1 When users deliver commands, the system gives the following prompt: Connection Error (1021), please close this dialog box!
14.2.2
Cause and Handling Procedure of Fault Symptom 1
Cause
The AEMS-DBServer service is not started.
The configuration of the aems.ini file is incorrect.
Handling method
Start the AEMS-DBServer service.
Open D: \ aems \ Client \ ini \ aems.ini, and ensure that the IP address in the aems.ini file is set to the IP address of the network card that the background AEMS-Dbserver service is bound with.
14.2.3
Fault Symptom 2 When users deliver commands, the system gives the following prompt: Manager program is not started or is being started!
14.2.4
Cause and Handling Procedure of Fault Symptom 2
Cause The AEMS-Manager service is not started.
Version: F
The setting of the management configuration program is incorrect.
The configuration of the md.ini file is incorrect.
14-3
Part 3
Maintenance
14
ANM2000 GUI Operation Faults
Handling method
Start the AEMS-Manager service.
Click Configuration
→
Manager Configuration in the main menu to open
the Manager Configuration dialog box as shown in Figure 14-1, and confirm that the setting of each item is correct according to Figure 14-1.
Figure 14-1
The Manager Configuration dialog box
Open the md.ini file under the D:\aems\Server\ini directory and set the UpServerSockAddr item to the IP address of the database.
14.3
Failure of Obtaining the Service Version Information
14.3.1
Fault Symptom After logging in the ANM2000 GUI, users cannot obtain the version information of services such as ANSEVER by clicking Help
14-4
→
About Anms… in the main menu.
Version: F
Part 3
Maintenance
14.3.2
14
ANM2000 GUI Operation Faults
Cause and Handling Procedure
Cause Services such as AEMS-DBserver are not started.
Handling method Confirm that services such as AEMS-DBserver are started.
14.4
Failure of Normally Viewing Alarms
14.4.1
Fault Symptom Some alarms cannot be read out by the current or history alarm query operation in the ANM2000 GUI.
14.4.2
Cause and Handling Procedure
Cause The query condition setting is incorrect.
Handling method Step 1: In the ANM2000 GUI, right-click the blank in the Current Alarm tab (or the History Alarm tab), and select Modify Query Condition in the shortcut menu to open the Setting current alarm query condition (or Setting history alarm query condition) dialog box. Step 2: Check and ensure that the query conditions are set correctly. For instance, in the query time settings, >= and <= under Begin Time indicate the time period during which the alarm to be queried occurs; >= and <= under End Time indicate the time period during which the alarm to be queried ends.
Version: F
14-5
Part 3
Maintenance
14.5
14
ANM2000 GUI Operation Faults
Failure of Normally Viewing Performance Data
14.5.1
Fault Symptom In a certain project, users can normally monitor all stations and query the current performance data, but fail to query partial stations’ history performance data, or get an incomplete query result of the history performance data (that is, the result does not match the query conditions).
14.5.2
Cause and Handling Procedure
Cause The performance collection scheme setting is incorrect.
Handling method Follow the methods mentioned in Section 7.1 to set the performance collection scheme again.
14.6
Interruption of Services
14.6.1
Fault Symptom Service Interrupted is displayed at the lower-right corner of the status bar in the ANM2000 GUI.
14.6.2
Cause and Handling Procedure
Cause The AEMS-DBServer service is not started.
Handling method Start the AEMS-DBServer service or restart the computer. 14-6
Version: F
Part 3
Maintenance
14.7
14
ANM2000 GUI Operation Faults
Failure of Managing a System via the ANM2000
14.7.1
Fault Symptom The network management server fails to connect the system equipment; the system is always gray in the ANM2000 GUI.
14.7.2
Cause and Handling Procedure 1
Cause The cable which connects the network management computer with the equipment is improper or in bad connection.
Handling method
Check whether the network management computer is connected with the equipment via a proper cable: a straight-through cable should be used if the network card is connected with the GSWC card’s FE port directly or is connected through a HUB.
Ensure that the network management computer is in good connection with the equipment.
Version: F
14-7
Part 3
Maintenance
14.7.3
14
ANM2000 GUI Operation Faults
Cause and Handling Procedure 2
Cause
The network card of the network management computer fails.
The network card’s configuration is incorrect.
Handling method
Check whether the network card works normally. On the network management computer, click Start
→
Run at the lower left corner on the desktop to open
the Run dialog box. In the dialog box, enter PING *.*.*.* (*.*.*.* stands for the local computer’s IP address) and click OK. This brings up the ping window shown as Figure 14-2; the result Request timed out indicates a failure of the network card. In this case, you should check whether the network card has faults.
Figure 14-2
The window indicating failure of the ping operation
Against the delivery configuration list, check whether the network card configuration is correct.
14.7.4
Cause and Handling Procedure 3
Cause The AEMS-Manager service is not started.
Handling method Start the AEMS-Manager service or restart the computer. 14-8
Version: F
Part 3
Maintenance
14.7.5
14
ANM2000 GUI Operation Faults
Cause and Handling Procedure 4
Cause The system’s network management configuration is incorrect. For example, the system’s management program is not set as the management program of the current network management system, or the system’s IP address setting is wrong.
Handling method Step 1: Log in the ANM2000 GUI, and select Config Manage
→
Manager
Configuration in the main menu to open the Manager Configuration dialog box as shown in Figure 14-3.
Figure 14-3
The Manager Configuration dialog box
Step 2: Check and confirm that the manager IP address is correct. Step 3: In the Object Tree tab at the browse tree pane of the ANM2000 GUI, right-click the corresponding system and select Properties in the shortcut menu to open the System Property dialog box as shown in Figure 14-4.
Version: F
14-9
Part 3
Maintenance
Figure 14-4
14
ANM2000 GUI Operation Faults
The System Property dialog box
Step 4: Set Managing Program as the management program of the current network management system, select the management program of the current network management system under Workstation, and finally click the Apply button.
14.7.6
Cause and Handling Procedure 5
Cause A certain card of the system is configured incorrectly, the configuration of the card is lost, or the card has faults.
Handling method Please refer to the relevant manuals corresponding to the specific equipment. If the fault still exists, please contact engineers o f FiberHome. 14-10
Version: F
Part 3
Maintenance
14.7.7
14
ANM2000 GUI Operation Faults
Cause and Handling Procedure 6
Cause The configuration of the aems.ini file is incorrect.
Handling method Step 1: Open D: \ aems \ Client \ ini \ aems.ini. Step 2: Check the settings and confirm that the settings of various items in the aems.ini file are correct. See Figure 14-5.
Figure 14-5
Version: F
An example of checking the aems.ini file
14-11
e-Fim ANM2000 Broadband Access Network Management System Operation Manual (Based on Windows) Version: F Code: MN000000050
Part 4 Appendixes
Appendix A
Dual NIC Settings
The ANM2000 adopts the dual NIC mode. In this mode, different IP addresses are used to run the database and manage the equipment.
Equipment network card (device network card): is used to perform the communication between the ANM2000 and the equipment.
Database network card (tcpip network card): is used to perform the
communication
between
the
ANM2000
and
the
database
and
the
communication between network management systems. There are two methods as follows to isolate the two network cards:
Physical isolation: uses two unrelated HUBs or switches to connect with the two network cards respectively.
Logical isolation: connects both the network cards to the same switch, and sets two or multiple VLANs for their isolation.
Compared with the single NIC mode, the dual NIC mode has the following advantages:
When the network management system connects with different devices, users do not need to modify the IP address of the computer. This can avoid paralysis of the ANM2000 caused by wrong modifications of the IP address.
The system separates the communication signals between the network management system and the local network and the communication signals between various network management systems at the egress of the network management system, so as to avoid the interference between the two types of signals.
Note: VLAN means the virtual local area network; it sets various network segments (or smaller LANs) logically for the LAN equipment, so as to implement the data switch between virtual workgroups (units). Hereinafter, we introduce the setting methods of the dual NIC mode.
Version: F
A-1
Part 4
A.1
Appendixes
A Dual NIC Settings
Settings at the Server Step 1: Log in the ANM2000 main GUI, and click Config Manage
→
Manager
Configuration in the main menu to open the Manager Configuration dialog box as shown in Figure A-1.
Figure A-1
The Manager Configuration dialog box
Step 2: Set the IP address in th e Manager IP Address text box; then click the Add button. Step 3: Click System
A-2
→
Save To Database in the main menu.
Version: F
Part 4
Appendixes
A Dual NIC Settings
Step 4: Open the file D: \ AEMS \ Server \ ini \ md.ini, and confirm that MONITOR_IP and BIND_TO_IP under ANSERVER are both the IP address of the database network card; LocalUpSockAddr and UpServerSockAddr1 under ADMAEMS are both the IP address of the database network card.
Version; F
Figure A-2
The md.ini window (1)
Figure A-3
The md.ini window (2)
A-3
Part 4
Appendixes
A Dual NIC Settings
Step 5: Open the d: \ Client \ fhanms \ ini \ aems.ini file, and confirm that DATABASE_SERVER and COMMAND_SERVER under BROWSER are both the IP address of the database network card.
Figure A-4
The aems.ini window
Step 6: Click Start (on the bottom-left corner of the desktop) Control Panel
→
Admin Tools
→
→
Settings
→
Service to open the Service window, and then
restart the ANSERVER and admaems services.
A.2
Settings at the Client Step 1: Open the file: C: \ WINDOWS \ system32 \ drivers\ etc \ hosts, as shown in Figure A-5. Input the IP address of the server database network card under 127.0.0.1, and input the computer name of the server under localhost; then save the settings.
Input the IP address of the server database network card under 127.0.0.1 Input the computer name of the server under localhost Figure A-5 A-4
The hosts window Version: F
Part 4
Appendixes
A Dual NIC Settings
Step 2: Click Start (on the bottom-left corner of the desktop) Informix Client--SDK 2.81
→
→
Program
→
Setnet32, and set the items in the Server
Information tab of the IBM Informix Setnet32 dialog box that appears.
IBM Informix Server : Input the database name of the server.
HostName: Input the computer name of the server.
Protolname: Select olsoctcp.
Service Name: Usually input the port No. 6000, and turbo also can be input.
After completing the settings, first click Make Default Server , and then click Apply; then select OK in the Define New Informix Server alert box that appears. Step 3: Click the Host Information tab to set the relevant items.
Current Host: Input the computer name of the server.
User Name: Always input Informix.
Password Option: There are three options in its drop-down menu -- Ask Password At Runtime, No Password, and Password. Usually users should select Password, indicating that the client needs to input the password when accessing the server database.
Password: Input the Informix user password; here it is Anms2k.
After completing the settings, click Apply, and then select OK in the Define New Host
alert box that appears.
Step 4: Click the Environment tab. Select Use my settings, and click Apply and OK.
Version; F
A-5
Appendix B
System Backup and
Import
The system backup and import is implemented via the GHOST, namely the clone-installation. It is to make mirror image files of the computer installed with the operating system, the database, and the ANM2000 via the GHOST software, and copy them to another computer to enhance the system security. The following introduces how to back up the system and import mirror image files with the GHOST in turn.
B.1
Backing up the System Steps of backing up the system with the GHOST are as follows: Step 1: Install the GHOST in the network management server to be backed up. Step 2: Restart the server and enter th e DOS mode. Step 3: Run the GHOST. Here we suppose that the execution program is installed in the directory of e: \ GHOST \, and input the commands as follows: E:
cd GHOST
Then the GHOST.EXE will start running. Step 4: Save the data.
To save all data of the server harddisk, select Local
To save a certain partition (e.g., drive C, drive D), select Local →
Version: F
→
Disk
→
To Image. →
Partition
To Image, as shown in the following figure:
B-1
Part 4
Appendixes
B
Figure B-1
Selecting the backup area
In the dialog box of selecting the local harddisk drive, click OK.
Figure B-2
System Backup and Import
The dialog box of selecting the local harddisk drive
In the dialog box of selecting local partition(s), select the local partition and click OK.
Figure B-3
B-2
The dialog box of selecting local partition(s)
Version: F
Part 4
Appendixes
B
System Backup and Import
Note: Generally for the network management system backup, at least the contents in disk c and d should be exported to acquire the image files. Step 5: Enter the image storage directory (the default directory is the directory of the GHOST). Commonly the network management system image files can be stored in the partitions other than drivers C and D, or exported to a CD. Please note that the image file size should be less than the CD capacity.
Figure B-4
The dialog box of selecting the path
Step 6: In the Compress Image dialog box that appears, click Fast. The meanings of the three items are listed in Table B-1.
Figure B-5
Version: F
The Compress Image dialog box
B-3
Part 4
Appendixes
B
Table B-1
System Backup and Import
Meanings of the three items in the Compress Image dialog box
Item
Meaning
No
Indicates that the image files are not compressed.
Fast
Indicates that the image files are compressed slightly.
High
Indicates that the image files are compressed highly. In this case, the generated image files occupy the least disk space.
Step 7: In the Question: dialog box that appears, click Yes. Then the GHOST will begin to make image files, as shown in Figure B-6.
Figure B-6
Making image files
When the image files are made successfully, the alert box as shown in Figure B-7 will appear.
B-4
Version: F
Part 4
Appendixes
B
Figure B-7
B.2
System Backup and Import
The image making success alert box
Importing Image Files To import the current network management system image files to the server, please import the image files of the system disk (disk c) first and the network management system software installation disk image files (disk d) then. The operation steps are described a s follows: Step 1: Enter the GHOST directory in the DOS mode and run the GHOST.EXE then. Step 2: Select Local
Figure B-8
Version: F
→
Partition
→
From Image in the GHOST main menu.
Importing files
B-5
Part 4
Appendixes
B
System Backup and Import
Step 3: In the dialog box of selecting the directory, select the image file directory and click Open.
Figure B-9
The dialog box of selecting the directory
Step 4: In the dialog box of selecting the partition that appears, select the partition to import the appointed image files, and click OK.
Figure B-10
B-6
The dialog box of selecting the partition
Version: F
Part 4
Appendixes
B
System Backup and Import
Step 5: In the Question dialog box that appears, click Yes. Then the GHOST will begin to import the image files.
Figure B-11
The Question dialog box
When the image files are imported successfully, the alert box as shown in Figure B-12 will appear.
Figure B-12
The Clone Complete Alert box
Step 6: Restart the server.
Version: F
B-7
Appendix C
Version: F
Abbreviations
ADSL
Asymmetric Digital Subscriber Line
AIS
Alarm Indication Signal
ATM
Asynchronous Transfer Mode
BER
Bit Error Rate
CATV
Cable Television
DSL
Digital Subscriber Line
DSLAM
Digital Subscriber Line Access Multiplexer
EPON
Ethernet Passive Optical Network
GPON
Gigabit-Capable Passive Optical Network
GUI
Graphical User Interface
IP
Internet Protocol
IPTV
Internet Protocol Television
LCD
Loss Cell Delineation
LOF
Loss Of Frame
LOS
Loss Of Signal
LVDS
Low Voltage Differential Signal
MAC
Media Access Control
MGC
Media Gateway Controllor
MSAN
Multi-Service Access Network
OLT
Optical Line Terminal
ONT
Optical Network Terminal
ONU
Optical Network Unit
OS
Operating System
PC
Personal Computer
PM
Performance Monitor
PON
Passive Optical Network
RDI
Remote Defect Indication
SNMP
Simple Network Management Protocol
UPS
Uninterruptible Power Supply
VDSL
Very high data rate Digital Subscriber Line
VLAN
Virtual Local Area Network
VOIP
Voice Over Internet Protocol
WS
Work Station
C-1
Product Documentation Customer Satisfaction Survey Thank you for reading and using the product documentation provided by FiberHome. Please take a moment to complete this survey. Your answers will help us to improve the documentation and better suit your needs. Your responses will be confidential and given serious consideration. The personal
information requested is used for no other purposes than to respond to your feedback. Name Phone Number Email Address Company
To help us better understand your needs, please focus your answers on a single documentation or a complete documentation set. Documentation Name Code and Version
Usage of the product documentation: 1. How often do you use the documentation? Frequently
Rarely
Never
Other
(please specify)
2. When do you use the documentation?
in starting up a project
troubleshooting
Other
in installing the product
in daily maintenance
in
( please specify)
3. What is the percentage of the operations on the product for which you can get instruction from the documentation?
100%
80%
50%
0%
Other
(please specify)
4. Are you satisfied with the promptness with which we update the documentation? Satisfied
Unsatisfied
(your advice)
5. Which documentation form do you prefer? Print
edition
Electronic
edition
Other
(please specify)
Quality of the product documentation: 1. Is the information organized and presented clearly? Very
Somewhat
Not
at all (your advice)
2. How do you like the language style of the documentation? Good
Normal
Poor
(please specify)
3. Are any contents in the documentation inconsistent with the product?
4. Is the information complete in the documentation? Yes No
(please specify)
5. Are the product working principles and the relevant technologies covered in the documentation sufficient for you to get known and use the product? Yes No
(please specify)
6. Can you successfully implement a task following the operation steps given in the documentation? Yes No
(please give an example)
(please specify the reason)
7. Which parts of the documentation are you satisfied with?
8. Which parts of the documentation are you unsatisfied with? Why?
9. What is your opinion on the Figures in the documentation? Beautiful
Unbeautiful
(your advice)
Practical
Unpractical
(your advice)
10. What is your opinion on the layout of the documentation?
Beautiful
Unbeautiful (your advice)
11. Thinking of the documentations you have ever read offered by other companies, how would you
compare our documentation to them? Product documentations from other companies: Satisfied (please specify) Unsatisfied (please specify) 12. Additional comments about our documentation or suggestions on how we can improve:
Thank you for your assistance. Please fax or send the completed survey to us at the contact info rmation included in the documentation. If you have any questions or concerns about this survey please email at [email protected].