5/12/2018
GuideM2000Client-slidepdf.com
Security Level: Internal
Operation and Maintenance of M2000 Client
www.huawei.com
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved 1/58
5/12/2018
GuideM2000Client-slidepdf.com
Developed independently by Huawei Technologies Co., Ltd, the iManager M2000 functions as EMS in the Huawei wireless network solution. The M2000 can access a whole series of products developed by Huawei and perform centralized management on them.
This slide introduces the basic operations of on the M2000 client.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 2 2/58
5/12/2018
GuideM2000Client-slidepdf.com
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management Chapter 6 Fault Management Chapter 7 Performance Management Chapter 8 Software Management Chapter 9 Data Management
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 3 3/58
5/12/2018
GuideM2000Client-slidepdf.com
Logging In to the M2000 Client Logging in to the M2000 server Logging out
The diagram on the left lists some basic operations involved in M2000 client login.
Exiting
Logging In to the M2000
Upgrading the software on the client Automatically
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 4 4/58
5/12/2018
GuideM2000Client-slidepdf.com
Logging In to the M2000 Server To log in to the M2000 server, choose Start All programs iManager M2000 client M2000 client.
Type the user name and password in the corresponding fields. Type the IP address of the M2000 server.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 5 5/58
5/12/2018
GuideM2000Client-slidepdf.com
Logging In to the M2000 Server |Main interface of the M2000 client| Menu bar
Tool bar
Information display
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
Status bar
All rights reserved
Page 6 6/58
5/12/2018
GuideM2000Client-slidepdf.com
Log Out Off the M2000 Client To log out off the M2000 client, choose System > Logout.
Note: Logging out off the M2000 client does not mean the applications running on the M2000 client are terminated.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 7 7/58
5/12/2018
GuideM2000Client-slidepdf.com
Exiting To exit the M2000 client, choose System Exit.
Note: Exiting the M2000 client means the applications running on the M2000 client are terminated.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 8 8/58
5/12/2018
GuideM2000Client-slidepdf.com
Upgrading the Software on the M2000 Client Automatically To upgrade the software on the M2000 client automatically, perform the following steps: Step 1: Start the M2000 client. Step 2: Log in to the M2000 server. After you log in to the M2000 server, the Confirmation dialog box is displayed, click Yes.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 9 9/58
5/12/2018
GuideM2000Client-slidepdf.com
Upgrading the Software on the M2000 Client Automatically Step 3: In the displayed Update Wizard dialog box, click Continue .
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 10 10/58
5/12/2018
GuideM2000Client-slidepdf.com
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management Chapter 6 Fault Management Chapter 7 Performance Management Chapter 8 Software Management Chapter 9 Data Management
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 11 11/58
5/12/2018
GuideM2000Client-slidepdf.com
Overview of the M2000 Network Monitoring
The M2000 network monitoring monitors the operational status of the M2000. For instance, the monitoring management monitors the status of hard disk, database, session, or services. The M2000 monitoring management involves the following operations: > Setting
the server threshold
> Monitoring
the performance status of the server
> Monitoring
the hard disk status of the server
> Monitoring
the database status of the server
> Monitoring
the database serving status
> Monitoring
the process status of the server
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 12 12/58
5/12/2018
GuideM2000Client-slidepdf.com
Setting the Server Threshold Step 1: Set the hard disk threshold.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 13 13/58
5/12/2018
GuideM2000Client-slidepdf.com
Setting the Server Threshold Step 2: Set the database threshold.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 14 14/58
5/12/2018
GuideM2000Client-slidepdf.com
Monitoring the Performance Status of the Server
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 15 15/58
5/12/2018
GuideM2000Client-slidepdf.com
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management Chapter 6 Fault Management Chapter 7 Performance Management Chapter 8 Software Management Chapter 9 Data Management
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 16 16/58
5/12/2018
GuideM2000Client-slidepdf.com
Topology Management
The topology management is used for constructing and managing the topology structure of the entire network. In this way, the networking topology and the operational status of the entire network are displayed clearly. > Creating
physical subnets
> Creating
physical NEs
> Monitoring NEs > Printing
the topology view
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 17 17/58
5/12/2018
GuideM2000Client-slidepdf.com
Creating Physical Subnets To create physical subnets, perform the following steps: Step 1: Right-click the topology view and choose Create Physical Subnet from the shortcut menu.
Create physical subnets Create topological objects
Set background
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 18 18/58
5/12/2018
GuideM2000Client-slidepdf.com
Creating Physical Subnets Step 2: Set the physical subnet
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 19 19/58
5/12/2018
GuideM2000Client-slidepdf.com
Creating Physical NEs Create a single physical NE.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 20 20/58
5/12/2018
GuideM2000Client-slidepdf.com
Monitoring NEs Monitor the NE status.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 21 21/58
5/12/2018
GuideM2000Client-slidepdf.com
Printing the topology view
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 22 22/58
5/12/2018
GuideM2000Client-slidepdf.com
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management Chapter 6 Fault Management Chapter 7 Performance Management Chapter 8 Software Management Chapter 9 Data Management
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 23 23/58
5/12/2018
GuideM2000Client-slidepdf.com
M2000 Security Management
The M2000 security management involves the following operations: > Configuring > Monitors
the security management
OM users Sessions
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 24 24/58
5/12/2018
GuideM2000Client-slidepdf.com
Interface of Security Management
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 25 25/58
5/12/2018
GuideM2000Client-slidepdf.com
Monitoring Users Sessions Monitor the OM Users. Monitor the operations of OM users who are now in session status. When the M2000 server restarts or the network is disconnected and restored, click R efresh to refresh the session monitor table.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 26 26/58
5/12/2018
GuideM2000Client-slidepdf.com
Monitoring Users Sessions Force OM users to exit the M2000.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 27 27/58
5/12/2018
GuideM2000Client-slidepdf.com
Monitoring Users Sessions Unlocking OM users.
If the times that a user enters password at a time wrong exceeds the maximum attempts, the OM user is locked for a period. Right-click the user and choose Unlock User from the shortcut menu to unlock the user.
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 28 28/58
5/12/2018
GuideM2000Client-slidepdf.com
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management Chapter 6 Fault Management Chapter 7 Performance Management Chapter 8 Software Management Chapter 9 Data Management
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 29 29/58
5/12/2018
GuideM2000Client-slidepdf.com
M2000 Log Management
Types of logs Such as the service start and stop, and log exporting and
Such as fault running errors, NE failures, etc NE configurations activity
deletion
the user performs on the M2000, including logout, login, log dumping, and
System log
NE System
record the important operations performed by the NE users,
log
device log synchronization.
NE operation log
Security log such as fault management, performance management, topology management, and resource management
such as logging in to the LMT, modifying the NE user rights, and adding NE users
Types
Operation log
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
of
NE security log
logs
All rights reserved
Page 30 30/58
5/12/2018
GuideM2000Client-slidepdf.com
M2000 Log Management Operations involved in the M2000 log management are as follows: Querying > > logs
logs
statistics
>
Managing log templates
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 31 31/58
5/12/2018
GuideM2000Client-slidepdf.com
Querying Logs
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 32 32/58
5/12/2018
GuideM2000Client-slidepdf.com
Logs Statistics
HUAWEI TECHNOLOGIES CO., LTD. http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 33 33/58
5/12/2018
GuideM2000Client-slidepdf.com
Managing Log Templates
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 34
34/58
5/12/2018
GuideM2000Client-slidepdf.com
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management Chapter 6 Fault Management Chapter 7 Performance Management Chapter 8 Software Management Chapter 9 Data Management
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 35
35/58
5/12/2018
GuideM2000Client-slidepdf.com
M2000 Fault Management
Function
The M2000 reports, manages, and analyzes NE alarms in a centralized manner. The M2000 collects NE alarms to the M2000. In addition, the M2000 notifies the maintenance personnel of device alarms by short message or email at the time when the alarm is generated.
Operations: The following operations and analysis can be performed on NE alarms at the M2000 side. >
Manual restore
>
Filtering
>
Severity redefinition
>
Alarm relevance
In this way, the M2000 can perform centralized analysis and processing on the device alarms generated in the current network.
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 36
36/58
5/12/2018
GuideM2000Client-slidepdf.com
Indicates that the device or the resource cannot be used completely and needs to be restored immediately.
M2000 Fault Management Alarm severity
device or the resource is severely damaged. Corrective measures should be taken immediately.
Alarm category
supply system system
system
Hardware
system
Software system system quality
handling
Internal
alarm
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
Event alarm
Refers to the notification generated when the system detects the events occurred.
Refers to the notification generated when the system detects the faults occurred.
Operating
Fault
Fault alarm
Service
Warning
Indicates that the quality of the device or the resource may probably be affected.
Alarms can be related to the following items:
Signaling
Minor
Indicates that the quality of the device or the resource is slightly affected.
Environment
Major
Indicates that the quality of the
Fault Management
Power
Critical
Alarm type
All rights reserved
Page 37
37/58
5/12/2018
Operations Involved in the M2000 Fault Management
GuideM2000Client-slidepdf.com
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 38
38/58
5/12/2018
GuideM2000Client-slidepdf.com
Subscriber Informations Monitoring Monitor Signaling Trace Collection ± select subscriber information monitoring
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 39
39/58
5/12/2018
GuideM2000Client-slidepdf.com
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management Chapter 6 Fault Management Chapter 7 Performance Management Chapter 8 Software Management Chapter 9 Data Management
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 40
40/58
5/12/2018
GuideM2000Client-slidepdf.com
Performance Management
Measurement is a process during which the value of an attribute for an NE
entity (including logical entity) in a period is acquired. Category of performance measurement counters > System
counters: a kind of a default counter defined in the NE. System
counters are categorized into common counters and extended counters. - Common counters: By default, the common counters are in the measurement state. The measurement can be cancelled. - Extended counters: By default, the extended counters are in the nonmeasurement state. Before performing any measurement on extended counters, you need to activate them first. You can enable or disable the measurement on extended counters. Custom >
counters: refers to the counters that are defined on the M2000
client by users. The principle for customizing counters is to perform arithmetic operations on the default counters, including common counters and extended counters, in the system. In this way, custom counters are self-defined. HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 41
41/58
5/12/2018
GuideM2000Client-slidepdf.com
Performance Measurement Periods The measurement periods vary according to the measurement objects. The following measurement periods are available: 5 minutes, 15 minutes, 30 minutes, 60 minutes, or 24 hours. Note that the measurement whose periods are 5 minutes or 15 minutes are called real-time measurement, or short-period measurement. Only some of the NEs support the real-time measurement. Caution:
The measurement periods for all the NEs of the same type must be same.
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 42
42/58
5/12/2018
GuideM2000Client-slidepdf.com
Performance Measurement Results and Counter Threshold
Performance measurement results refer to the values of measurement counters of NE measurement objects.
Performance counter threshold can be set in either of the following windows: > Threshold
Management window
>
Performance Monitor window
If the value of a counter exceed this threshold, the threshold alarm is generated.
For the same counter, you can set alarm thresholds for various time phases, or set an alarm threshold for all time periods in each measurement period. These thresholds can be set for all objects of a measurement type, or for one or more objects.
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 43
43/58
5/12/2018
GuideM2000Client-slidepdf.com
Results of Performance Measurement Statistics
The maximum saving days for the results whose measurement period is 5 minutes or 15 minutes are 7 and represented by the parameter maxRTResultSavingDay.
The maximum saving days for the results whose measurement period is 30 minutes, 60 minutes, or 1 day are 30 and represented by the parameter maxResultSavingDay.
The M2000 checks the results whose period is 30 minutes, 60 minutes, or 1 day on a fixed time 03:25 a.m. each day. This is represented by the parameter capacityControlTime. The M2000 deletes the data saved for over 30 days.
The M2000 checks the results whose period is 5 minutes or 15 minutes on a fixed time 04:35 a.m. each day. This is represented by the parameter capacityControlTime + 70 minutes. The M2000 deletes the data saved for over 7 days.
The parameters described previously are described in the file /export/home/omc/var/etc/conf/pmsvc.xml.
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 44
44/58
5/12/2018
GuideM2000Client-slidepdf.com
Measurement Settings
Open the Measurement Settings window.
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 45
45/58
5/12/2018
Setting Measurement
GuideM2000Client-slidepdf.com
Refences Counter
Select site
Active Counter
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 46
46/58
5/12/2018
GuideM2000Client-slidepdf.com
Query Result Measurement
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 47
47/58
5/12/2018
GuideM2000Client-slidepdf.com
Query Result Measurement
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 48
48/58
5/12/2018
GuideM2000Client-slidepdf.com
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management Chapter 6 Fault Management Chapter 7 Performance Management Chapter 8 Software Management Chapter 9 Data Management
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 49
49/58
5/12/2018
Software Management
GuideM2000Client-slidepdf.com
The software management involves the following operations: > Upload
software
> Upgrading > Querying
NE software
Version Information on Software Installed on the Server
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 50
50/58
5/12/2018
Upload Software
GuideM2000Client-slidepdf.com
Software software browser Transfer from Client to NM in computer/notebook client
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
Select software folder
All rights reserved
Page 51
51/58
5/12/2018
Upgrading NE software
GuideM2000Client-slidepdf.com
Software software browser Select software in M2000 List client Transfer from NM to NE
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 52
52/58
5/12/2018
GuideM2000Client-slidepdf.com
Chapter 1 Logging In to the M2000 Client Chapter 2 Network Monitoring Chapter 3 Topology Management Chapter 4 Security Management Chapter 5 Log Management Chapter 6 Fault Management Chapter 7 Performance Management Chapter 8 Software Management Chapter 9 Data Management
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 53
53/58
5/12/2018
GuideM2000Client-slidepdf.com
Overview of Data Management: Backing Up NM Data
You can back up the NM data in two ways: periodic backup and manual backup.
You can back up the NM data through the full backup and the incremental backup. The following gives the difference between the full backup and the incremental backup: > Each
time when a full backup is performed, the M2000 removes all the previous files
related to full backup and incremental backup on the server and saves one and only the latest compressed full backup file. The file of full backup is named in the following way: all-current time, such as, all-20060106103055.tar.gz. > Each
time when an incremental backup is performed, a new backup file is generated. The
incremental backup is on the basis of previous backup data that can be a full backup or an incremental backup. The file of an incremental backup is named in the following way: inccurrent time, such as,
inc-20060106103055.tar.gz.
The NM data to be backed up refers to the data contained the following files: > /export/home/omc/var/ > /export/home/sysm/
The backup files of the NM data are saved in the directory of /export/home/backup/omc/ on the M2000 server.
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 54
54/58
5/12/2018
GuideM2000Client-slidepdf.com
Overview of Data Management: Backing Up NE Data
NE data backup: The data management provided by the M2000 enables you to back up the configuration files of all NEs managed by the M2000 and the files that change dynamically during the operation.
You can back up the NE data in two ways: the periodic backup and the manual backup. The system can generate one backup file after you perform the backup task once. > The
maximum number of NE backup files stored on the server is determined by the
M2000 configuration file. At present, the M2000 server can store up to seven backup files for each NE. When more than seven backup files are generated for an NE, the M2000 server stores only the latest seven backup files for this NE. Meanwhile, the M2000 server refreshes the backup file list. The >
backup files of NE data are saved to the path: M2000
server/export/home/sysm/ftproot/NE type. Take the RNC for example, /data type/NE FDN.
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 55
55/58
5/12/2018
Data
GuideM2000Client-slidepdf.com
Management ( Backup )
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 56
56/58
5/12/2018
Data
GuideM2000Client-slidepdf.com
Management (restore)
HUAWEI TECHNOLOGIES CO., LTD.
http://slidepdf.com/reader/full/guide-m2000-client
All rights reserved
Page 57
57/58
5/12/2018
GuideM2000Client-slidepdf.com
Thank You www.huawei.com
HUAWEI TECHNOLOGIES CO LTD
http://slidepdf.com/reader/full/guide-m2000-client
All i ht
d
P
58
58/58