1284
iManager U2000 Unified Network Management System V100R009C00 Operation Guide for Common Features Issue 03 Date 2014-05-15 HUAWEI TECHNOLOGIES CO., LTD.

Huawei iManager U2000 Operation Guide for Common Features(V100R009)

Embed Size (px)

DESCRIPTION

This document provide you with operation guide.Thunder-link.com, professional Huawei optical transmission product wholesaler, all Huawei OSN MSTP, OSN DWDM series product and boards are available at competitive price and fast delivery.

Citation preview

  • iManager U2000 Unified Network ManagementSystemV100R009C00

    Operation Guide for CommonFeatures

    Issue 03Date 2014-05-15

    HUAWEI TECHNOLOGIES CO., LTD.

  • Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved.No part of this document may be reproduced or transmitted in any form or by any means without prior writtenconsent of Huawei Technologies Co., Ltd. Trademarks and Permissions

    and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.All other trademarks and trade names mentioned in this document are the property of their respective holders. NoticeThe purchased products, services and features are stipulated by the contract made between Huawei and thecustomer. All or part of the products, services and features described in this document may not be within thepurchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,and recommendations in this document are provided "AS IS" without warranties, guarantees or representationsof any kind, either express or implied.

    The information in this document is subject to change without notice. Every effort has been made in thepreparation of this document to ensure accuracy of the contents, but all statements, information, andrecommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd.Address: Huawei Industrial Base

    Bantian, LonggangShenzhen 518129People's Republic of China

    Website: http://www.huawei.comEmail: [email protected]

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    i

  • About This Document

    Related VersionThe following table lists the product version related to this document.

    Product Name VersioniManager U2000 V100R009C00

    Intended AudienceThis document describes the operations for common features on the U2000.This document guides the user to understand basic operations of the U2000.The document is intended for:l Data configuration engineersl NM administratorsl System maintenance engineers

    Symbol ConventionsThe following symbols may be found in this document. They are defined as follows.

    Symbol DescriptionIndicates an imminently hazardous situationwhich, if not avoided, will result in death orserious injury.Indicates a potentially hazardous situationwhich, if not avoided, could result in death orserious injury.

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features About This Document

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    ii

  • Symbol DescriptionIndicates a potentially hazardous situationwhich, if not avoided, may result in minor ormoderate injury.Indicates a potentially hazardous situationwhich, if not avoided, could result inequipment damage, data loss, performancedeterioration, or unanticipated results.NOTICE is used to address practices notrelated to personal injury.Calls attention to important information, bestpractices and tips.NOTE is used to address information notrelated to personal injury, equipment damage,and environment deterioration.

    Command ConventionsThe command conventions that may be found in this document are defined as follows.

    Convention DescriptionBoldface The keywords of a command line are in

    boldface.Italic Command arguments are in italic.[ ] Items (keywords or arguments) in square

    brackets [ ] are optional.{ x | y | ... } Alternative items are grouped in braces and

    separated by vertical bars. One is selected.[ x | y | ... ] Optional alternative items are grouped in

    square brackets and separated by verticalbars. One or none is selected.

    { x | y | ... } * Alternative items are grouped in braces andseparated by vertical bars. A minimum of oneor a maximum of all can be selected.

    [ x | y | ... ] * Optional alternative items are grouped insquare brackets and separated by verticalbars. A maximum of all or none can beselected.

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features About This Document

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    iii

  • GUI ConventionsThe GUI conventions that may be found in this document are defined as follows.

    Convention DescriptionBoldface Buttons, menus, parameters, tabs, window,

    and dialog titles are in boldface. For example,click OK.

    > Multi-level menus are in boldface andseparated by the ">" signs. For example,choose File > Create > Folder.

    Change HistoryChanges between document issues are cumulative. The latest document issue contains all thechanges in earlier issues.

    Changes in Issue 03 (2014-05-15) Based on Product Version V100R009C00The third release. It has the following updates:In the section "Alarm Management", optimized the description of some topics.

    Changes in Issue 02 (2014-01-05) Based on Product Version V100R009C00The second release. It has the following updates:l In the section "Security Management", added "Users and User Groups".l In the section "Topology Management", added "Configuring the NAT Address

    Translation".

    Changes in Issue 01 (2013-08-20) Based on Product Version V100R009C00Initial field trail release.

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features About This Document

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    iv

  • Contents

    About This Document.....................................................................................................................ii1 Getting Started...............................................................................................................................11.1 Precautions for Using the U2000 Safely........................................................................................................................41.2 Starting the U2000 System.............................................................................................................................................41.2.1 Starting the U2000 Server in a Windows Single-Server System................................................................................51.2.1.1 Powering On the Server Safely................................................................................................................................51.2.1.2 Starting the Database................................................................................................................................................61.2.1.3 Starting the U2000 Server Processes........................................................................................................................71.2.2 Starting the U2000 Server in a Solaris Single-Server System.....................................................................................91.2.2.1 Powering On the Server Safely................................................................................................................................91.2.2.2 Starting the Database..............................................................................................................................................121.2.2.3 Starting the U2000 Server Processes......................................................................................................................141.2.3 Starting the U2000 Server in a SUSE Linux Single-Server System.........................................................................161.2.3.1 Powering On the Server Safely..............................................................................................................................161.2.3.2 Starting the Database..............................................................................................................................................171.2.3.3 Starting the U2000 Server Processes......................................................................................................................191.2.4 Starting the U2000 Server in a Solaris High Availability System............................................................................201.2.4.1 Powering On the Server Safely..............................................................................................................................201.2.4.2 Starting the Database..............................................................................................................................................241.2.4.3 Starting the U2000 Server Processes......................................................................................................................261.2.5 Starting the U2000 Server in a SUSE Linux High Availability System...................................................................281.2.5.1 Powering On the Server Safely..............................................................................................................................281.2.5.2 Starting the Database..............................................................................................................................................291.2.5.3 Starting the U2000 Server Processes......................................................................................................................321.2.6 Logging In to a U2000 Client....................................................................................................................................331.3 Shutting Down a U2000...............................................................................................................................................361.3.1 Shutting Down U2000 Clients...................................................................................................................................371.3.2 Shutting Down the U2000 Server (Single Server System, Windows)......................................................................371.3.2.1 Stopping the U2000 Server Processes....................................................................................................................371.3.2.2 Shutting Down the Database..................................................................................................................................381.3.2.3 Powering Off the Server Safely..............................................................................................................................391.3.3 Shutting Down the U2000 Server (Single Server System, Solaris)..........................................................................40

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    v

  • 1.3.3.1 Stopping the U2000 Server Processes....................................................................................................................401.3.3.2 Shutting Down the Database..................................................................................................................................411.3.3.3 Power Off the Server Safely...................................................................................................................................421.3.4 Shutting Down the U2000 Server (Single Server System, SUSE Linux).................................................................421.3.4.1 Stopping the U2000 Server Processes....................................................................................................................421.3.4.2 Shutting Down the Database..................................................................................................................................431.3.4.3 Powering Off the Server Safely..............................................................................................................................451.3.5 Shutting Down the U2000 Server in a High Availability System (Solaris)..............................................................451.3.5.1 Stopping the U2000 Server Processes....................................................................................................................451.3.5.2 Shutting Down the Database..................................................................................................................................471.3.5.3 Stopping the VCS Service......................................................................................................................................481.3.5.4 Power Off the Server Safely...................................................................................................................................481.3.6 Shutting Down the U2000 Server in a High Availability System (PC Linux)..........................................................491.3.6.1 Stopping the U2000 Server Processes....................................................................................................................491.3.6.2 Shutting Down the Database..................................................................................................................................511.3.6.3 Stopping the VCS Service......................................................................................................................................521.3.6.4 Power Off the Server Safely...................................................................................................................................521.4 Using the Workbench and Favorites Folder.................................................................................................................531.4.1 Placing a Shortcut Icon on the Workbench...............................................................................................................531.4.2 Adding a Common Function to the Favorites Folder................................................................................................531.4.3 Viewing Common Functions.....................................................................................................................................541.5 Setting the Character Set of an NE...............................................................................................................................551.5.1 Character Set..............................................................................................................................................................551.5.2 Setting or Modifying Character Sets.........................................................................................................................581.6 Main Windows and Common Operations of the U2000..............................................................................................591.6.1 Client GUI in the Application Style..........................................................................................................................591.6.2 Quick Start for Clients in the Application Style........................................................................................................661.6.3 Client GUI in the Traditional Style...........................................................................................................................691.6.4 Key GUI Components...............................................................................................................................................711.6.5 Frequently Used Buttons...........................................................................................................................................721.6.6 Frequently Used Shortcut Icon..................................................................................................................................741.6.7 Keyboard Shortcuts...................................................................................................................................................801.6.8 Main Windows..........................................................................................................................................................821.6.8.1 Workbench..............................................................................................................................................................821.6.8.2 Main Topology.......................................................................................................................................................831.6.8.3 NE Explorer............................................................................................................................................................871.6.8.4 Clock View.............................................................................................................................................................881.6.8.5 NE Panel.................................................................................................................................................................961.6.8.6 WDM NE Signal Flow Diagram............................................................................................................................971.6.8.7 Browse Alarm.........................................................................................................................................................981.6.8.8 Browse Event..........................................................................................................................................................99

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    vi

  • 1.6.9 Operations Frequently-Performed on the User Interface.........................................................................................1001.6.9.1 Filtering Operation Objects in a View..................................................................................................................1001.6.9.2 Searching for NEs in a View................................................................................................................................1021.6.9.3 Collecting Statistics on the Number of NEs.........................................................................................................1031.6.9.4 Customizing Parameter Display...........................................................................................................................1041.6.9.5 Copying Table Texts Quickly...............................................................................................................................1051.6.9.6 Monitoring Alarms...............................................................................................................................................1051.7 How to Obtain Version Information About the U2000..............................................................................................1061.8 Customizing the Client GUI Effect............................................................................................................................1071.8.1 Setting the Client Skin.............................................................................................................................................1081.8.2 Setting the Client Display Style...............................................................................................................................1081.8.3 Setting the Main Window Title...............................................................................................................................1091.8.4 Setting the Topology View Display........................................................................................................................1101.8.5 Setting the Font Size................................................................................................................................................1131.8.6 Setting the Output Information................................................................................................................................1131.8.7 Setting the Workbench............................................................................................................................................1151.8.8 Setting the Menu Collapse.......................................................................................................................................1181.8.9 Setting the Colors of Alarms...................................................................................................................................1191.8.10 Setting the Alarm Highlighting.............................................................................................................................1201.8.11 Setting the Alarm Font..........................................................................................................................................1211.8.12 Setting the Alarm Display Mode...........................................................................................................................1221.8.13 Setting the Display Properties of New Alarm/Event.............................................................................................1241.8.14 Setting the Alarm Display in the Topology View.................................................................................................1251.8.15 Setting the Number Format of the Client..............................................................................................................1281.8.16 Setting Board Color...............................................................................................................................................1291.8.17 Setting the Time and Date Formats of the Client..................................................................................................1301.8.17.1 Setting the Time Format of the Client................................................................................................................1301.8.17.2 Setting the Date Format of the Client.................................................................................................................1311.8.17.3 Setting the Time Mode of the Client..................................................................................................................1321.8.18 Setting the Toolbar................................................................................................................................................1331.9 Setting the Alert at Network Disconnection...............................................................................................................1341.10 Checking Whether the Client Needs Upgrade..........................................................................................................1351.11 Setting the Interval of Client Upgrade Check..........................................................................................................1351.12 Locking the Client....................................................................................................................................................1361.13 Unlocking the Client.................................................................................................................................................1371.14 Setting the Level of Operation Logs Recorded by the Client...................................................................................1371.15 Setting a Scheduled Task..........................................................................................................................................1381.16 Broadcast Messages..................................................................................................................................................1391.16.1 Setting Broadcast Parameters................................................................................................................................1391.16.2 Sending Broadcast Messages.................................................................................................................................1401.17 Applying for and Updating the U2000 License........................................................................................................141

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    vii

  • 1.17.1 U2000 License Precautions...................................................................................................................................1421.17.2 Applying for a U2000 License..............................................................................................................................1421.17.3 Updating the U2000 License.................................................................................................................................1441.17.4 Checking the Status of the U2000 License............................................................................................................1531.17.5 Revoking a License on the U2000.........................................................................................................................1531.17.6 Querying the License Revocation Code on the U2000.........................................................................................1551.17.7 Setting Periodic Export of the U2000 License......................................................................................................1551.17.8 Setting the NE Capacity Threshold for the U2000 License..................................................................................1571.17.9 Collecting Port Statistics of Service Licenses.......................................................................................................1571.18 Starting the Web Client............................................................................................................................................1581.19 Starting the NE Data Collection...............................................................................................................................1591.20 Customizing Naming Rule.......................................................................................................................................1601.21 U2000 Process List...................................................................................................................................................1621.22 GUI Input and Display Conventions........................................................................................................................2601.23 Mutual Exclusion List for Multiclient Operations...................................................................................................2622 Network Management Process...............................................................................................2662.1 MSTP Network Management Process........................................................................................................................2672.2 WDM Network Management Process........................................................................................................................2682.3 RTN Network Management Process..........................................................................................................................2722.4 PTN Network Management Process...........................................................................................................................2732.5 Router and Switch Network Management Process....................................................................................................2742.6 Access Network Management Process.......................................................................................................................2802.7 Core Network Management Process..........................................................................................................................2832.8 Security NE Network Management Process..............................................................................................................2833 Security Management...............................................................................................................2853.1 User Security..............................................................................................................................................................2873.2 Managing User Rights................................................................................................................................................2933.2.1 Getting to Know Operation Rights Management....................................................................................................2933.2.1.1 Right Components................................................................................................................................................2933.2.1.2 U2000 Authorization Principles...........................................................................................................................2943.2.1.3 Users and User Groups.........................................................................................................................................3013.2.1.4 Objects and Object Sets........................................................................................................................................3033.2.1.5 Operation and Operation Set................................................................................................................................3043.2.2 Scenarios for Operation Right Management...........................................................................................................3083.2.3 Authorization Plan...................................................................................................................................................3103.2.4 Assigning Rights to Users.......................................................................................................................................3223.2.4.1 Authorization Process...........................................................................................................................................3223.2.4.2 Creating User-Defined Object Sets......................................................................................................................3233.2.4.3 Creating User-defined Operation Sets..................................................................................................................3253.2.4.4 Creating and Authorizing U2000 User Groups....................................................................................................3283.2.4.5 Creating Users and Adding the Users to User Groups.........................................................................................331

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    viii

  • 3.2.5 Transferring Operation Sets.....................................................................................................................................3333.2.5.1 Exporting Operation Sets......................................................................................................................................3343.2.5.2 Adding Operation Sets or Changing Operation Set Members in Batches............................................................3353.2.5.3 Importing Files Containing Operation Set Information.......................................................................................3373.2.6 Operation Right Adjustment After Device Addition or Deletion............................................................................3393.2.6.1 Adjusting Operation Rights After an NE Is Added..............................................................................................3393.2.6.2 Adjusting Operation Rights After a Subnet Is Added..........................................................................................3423.2.6.3 Adjusting Operation Rights After the Networking Structure Is Changed............................................................3443.2.7 Operation Right Adjustment After Personnel's Responsibilities Change...............................................................3453.2.7.1 Adjusting Operation Rights After the Scope of Managed Objects Is Changed...................................................3453.2.7.2 Adjusting Operation Rights After the Scope of Operation Rights Is Changed....................................................3473.2.7.3 Adjusting Operation Rights After Management Personnel's Posts Change.........................................................3483.2.8 Querying Authorization...........................................................................................................................................3493.2.8.1 Viewing a User or User Group's Domain.............................................................................................................3493.2.8.2 Viewing Operation Rights of a User or User Group............................................................................................3513.2.8.3 Viewing User Groups To Which a User Belongs.................................................................................................3523.2.8.4 Querying User and User Group Authorization Details.........................................................................................3533.2.8.5 Viewing Operations Contained in an Operation Set............................................................................................3543.2.8.6 Viewing Objects Contained in an Object Set.......................................................................................................3553.2.8.7 Comparing U2000 User Rights............................................................................................................................3563.2.9 FAQs About Authorization.....................................................................................................................................3583.2.9.1 How Do I Determine an Operation Right Type?..................................................................................................3583.2.9.2 How Do I Adjust Operation Rights After an NE Is Added?................................................................................3593.2.9.3 How Do I Adjust Operation Rights After a Subnet Is Added?............................................................................3623.2.9.4 How to Adjust Operation Rights After the Scope of Managed NEs Is Changed?...............................................3643.2.9.5 How Do I Assign User Operation Rights That Do Not Belong to the User's User Group?.................................3703.2.10 Configuration Examples of Security Management...............................................................................................3713.2.10.1 Assigning Specific Operation Rights to an NMS User......................................................................................3713.2.10.2 Adjusting User Rights........................................................................................................................................3753.2.10.3 Example for Creating U2000 User Accounts and Allocating Rights in the Rights- and Domain-based ManagementScenario............................................................................................................................................................................3803.3 User Security Policy Management.............................................................................................................................3843.3.1 Security Policy Management...................................................................................................................................3843.3.1.1 Setting the System ACL.......................................................................................................................................3843.3.1.2 Setting the User ACL...........................................................................................................................................3853.3.1.3 Setting the Proxy Service ACL............................................................................................................................3863.3.1.4 Setting Account Policies.......................................................................................................................................3883.3.1.5 Setting Password Policies.....................................................................................................................................3893.3.1.6 Setting the Maximum Number of Sessions..........................................................................................................3903.3.1.7 Setting the U2000 Login Mode............................................................................................................................3913.3.1.8 Setting Auto-Locking for a Client........................................................................................................................3933.3.2 Setting U2000 Data Transmission Security.............................................................................................................394

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    ix

  • 3.3.2.1 Setting a Secure Connection Between the U2000 Client and Server...................................................................3943.3.2.2 Setting the FTP Transfer Policies Between the Client and Server.......................................................................3953.3.3 Managing Passwords and Locking Clients..............................................................................................................3963.3.3.1 Changing the Password of the Current User........................................................................................................3963.3.3.2 Resetting the Password of an NMS user..............................................................................................................3963.3.3.3 Modifying NMS user Information in Batches......................................................................................................3973.3.3.4 Locking the Client Immediately...........................................................................................................................3993.3.3.5 Unlocking the Client.............................................................................................................................................4003.3.3.6 Setting Auto-Locking for an U2000.....................................................................................................................4003.3.4 Monitoring U2000 Users.........................................................................................................................................4013.3.4.1 Monitoring NMS User Sessions...........................................................................................................................4013.3.4.2 Monitoring NMS User Operations.......................................................................................................................4023.3.4.3 Forcing U2000 Users to Log Out.........................................................................................................................4033.3.4.4 Unlocking Users...................................................................................................................................................4033.3.4.5 Sending Messages to Online Users......................................................................................................................4043.3.5 Managing the Remote Maintenance User................................................................................................................4053.4 Managing NE Security...............................................................................................................................................4063.4.1 NE Security Management........................................................................................................................................4063.4.2 Setting the NE ACL.................................................................................................................................................4083.4.2.1 Overview of ACL.................................................................................................................................................4083.4.2.2 Setting Basic ACL Rules......................................................................................................................................4093.4.2.3 Setting the Advanced ACL Rules.........................................................................................................................4103.4.3 Setting the Security Access of an NE......................................................................................................................4103.4.3.1 Setting Ethernet Access for NEs..........................................................................................................................4113.4.3.2 Setting Serial Port Access for NEs.......................................................................................................................4113.4.3.3 Setting the OAM Access to NEs..........................................................................................................................4123.4.3.4 Setting the COM Access to NEs...........................................................................................................................4123.4.3.5 Setting the LCT Access to NEs............................................................................................................................4133.4.4 Managing NE Login................................................................................................................................................4143.4.4.1 Locking Out NE Login.........................................................................................................................................4143.4.4.2 Locking Out NE Settings......................................................................................................................................4153.4.4.3 Querying the Information About an Online NE User...........................................................................................4163.4.4.4 Switching a Logged-In NE User..........................................................................................................................4173.4.4.5 Forcing an NE User to Log Out of the U2000.....................................................................................................4183.4.4.6 Setting NE Login Prompt Message......................................................................................................................4183.4.5 Managing NE Users.................................................................................................................................................4193.4.5.1 Querying the Additional Information of NE User................................................................................................4193.4.5.2 Creating an NE User.............................................................................................................................................4203.4.5.3 Modifying NE Users.............................................................................................................................................4223.4.5.4 Changing an NE User Password...........................................................................................................................4233.4.5.5 Querying NE Security Parameters........................................................................................................................424

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    x

  • 3.4.5.6 Querying NE User Groups...................................................................................................................................4253.4.5.7 Deleting NE Users................................................................................................................................................4253.4.6 Configuring an NE As an SSH Server.....................................................................................................................4263.5 Configuring NE RADIUS..........................................................................................................................................4293.5.1 Overview.................................................................................................................................................................4293.5.2 Setting an NE as an RADIUS Client or Proxy Server.............................................................................................4323.5.3 Adding an RADIUS Server.....................................................................................................................................4333.5.4 Setting NE RADIUS Parameters.............................................................................................................................4343.6 Change Audit..............................................................................................................................................................4343.6.1 Viewing Information About Change Audit.............................................................................................................4353.6.2 Dumping Information About Change Audit............................................................................................................4353.6.3 Deleting Information About Change Audit.............................................................................................................4363.7 Database Security Policy............................................................................................................................................4374 Log Management.......................................................................................................................4384.1 Log Management Overview.......................................................................................................................................4404.1.1 Log Management Policy..........................................................................................................................................4404.1.2 Log Type..................................................................................................................................................................4414.1.2.1 U2000 System Logs..............................................................................................................................................4414.1.2.2 U2000 Security Logs............................................................................................................................................4424.1.2.3 U2000 Operation Logs.........................................................................................................................................4444.1.2.4 Syslog Run Logs of IP NEs..................................................................................................................................4454.1.2.5 Syslog Operation Logs of Access NEs.................................................................................................................4464.1.2.6 Security Logs of Transport NEs...........................................................................................................................4474.1.3 Syslog Service.........................................................................................................................................................4484.2 Managing U2000 System Logs..................................................................................................................................4524.2.1 Querying U2000 System Logs................................................................................................................................4524.2.2 Collecting Statistics on U2000 System Logs..........................................................................................................4534.3 Managing U2000 Security Logs.................................................................................................................................4554.3.1 Querying U2000 Security Logs...............................................................................................................................4554.3.2 Collecting Statistics on U2000 Security Logs.........................................................................................................4574.4 Managing U2000 Operation Logs..............................................................................................................................4604.4.1 Querying U2000 Operation Logs............................................................................................................................4604.4.2 Collecting Statistics on U2000 Operation Logs......................................................................................................4624.5 Setting U2000 Log Templates....................................................................................................................................4644.6 Managing U2000 Log Data........................................................................................................................................4664.6.1 Setting U2000 Log Dump........................................................................................................................................4664.6.2 Setting U2000 Log Overflow Dump.......................................................................................................................4674.6.3 Manually Dumping U2000 Logs.............................................................................................................................4684.6.4 Setting U2000 Log Export.......................................................................................................................................4694.6.5 Setting Device Log Dump.......................................................................................................................................4704.6.6 Setting U2000 Log Forwarding...............................................................................................................................471

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xi

  • 4.6.6.1 Understanding Log Forwarding............................................................................................................................4714.6.6.2 Enabling Logging to U2000 Syslog Database......................................................................................................4714.6.6.3 Setting the Interconnection Between the U2000 and the Syslog Server..............................................................4734.6.6.4 Managing the Connection Between the U2000 and Syslog Server......................................................................4754.7 Managing Logs of the IP NE Side..............................................................................................................................4764.7.1 Configuring the Information Center on the NEs.....................................................................................................4764.7.1.1 Enabling the Information Center..........................................................................................................................4774.7.1.2 Configuring the Syslog Source Interface..............................................................................................................4774.7.1.3 Adding a Syslog Host...........................................................................................................................................4784.7.1.4 Configuring the Advanced Attributes of the Syslog Service...............................................................................4794.7.2 Browsing the NE Syslog Run Logs.........................................................................................................................4794.8 Managing Logs of the Access NE Side......................................................................................................................4804.8.1 Browsing NE Syslog Operation Logs.....................................................................................................................4814.8.2 Browsing Login Logs of NE Users.........................................................................................................................4824.9 Managing Transport NE Logs....................................................................................................................................4834.9.1 Transferring NE Logs to a Syslog Server................................................................................................................4834.9.1.1 Setting a Syslog Server.........................................................................................................................................4844.9.1.2 Setting a Syslog GNE...........................................................................................................................................4854.9.1.3 Setting the Syslog Type and Severity...................................................................................................................4854.9.1.4 Starting the Syslog Service...................................................................................................................................4864.9.2 Viewing Security Logs of NEs................................................................................................................................4864.9.3 Viewing Operation Logs of NEs.............................................................................................................................4875 Topology Management.............................................................................................................4895.1 Overview of Topology Management..........................................................................................................................4915.1.1 Topology Management Function.............................................................................................................................4915.1.2 Types of Topology Views.......................................................................................................................................4935.1.3 Objects in a Topology View....................................................................................................................................4975.1.4 Automatic Topology Discovery..............................................................................................................................5025.1.5 Alarm Indication in a Topology View.....................................................................................................................5035.2 Network Topology Construction Process...................................................................................................................5045.3 Designing a Physical Topology..................................................................................................................................5085.4 Creating a Subnet........................................................................................................................................................5095.5 Setting Parameters for the Communication Between the U2000 and NEs................................................................5105.5.1 Protocols for Communication Between the U2000 and NEs..................................................................................5115.5.2 Setting SNMP Parameters.......................................................................................................................................5165.5.2.1 Configuring the Default SNMP Parameters Template.........................................................................................5165.5.2.2 Setting NE SNMP Parameters..............................................................................................................................5175.5.3 Setting Telnet/STelnet Parameters..........................................................................................................................5205.5.3.1 Configuring a Telnet/STelnet Parameter Template..............................................................................................5205.5.3.2 Setting Telnet/STelnet Parameters with a Template............................................................................................5225.5.3.3 Manually Setting Telnet/STelnet Parameters.......................................................................................................524

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xii

  • 5.5.4 Configuring the xFTP Service.................................................................................................................................5265.5.4.1 Testing Local xFTP Information..........................................................................................................................5265.5.4.2 Configuring the NAT Address Translation..........................................................................................................5285.6 Creating NEs...............................................................................................................................................................5305.6.1 Creating NEs in Batches..........................................................................................................................................5315.6.1.1 Creating Transport/PTN NEs in Batches..............................................................................................................5315.6.1.2 Creating SNMP/ICMP NEs in Batches................................................................................................................5345.6.1.3 Creating Core Network NEs in Batches...............................................................................................................5405.6.1.4 Importing/Exporting NEs in Batches...................................................................................................................5425.6.2 Creating a Single NE...............................................................................................................................................5455.6.2.1 Creating Optical NEs............................................................................................................................................5465.6.2.2 Creating a Single Transport NE............................................................................................................................5465.6.2.3 Creating a Single PTN NE....................................................................................................................................5505.6.2.4 Creating a Single Router NE................................................................................................................................5535.6.2.5 Creating a Single Switch NE................................................................................................................................5555.6.2.6 Creating a Single Security NE..............................................................................................................................5575.6.2.7 Creating an Access NE.........................................................................................................................................5585.6.2.8 Creating a Single BITS NE..................................................................................................................................5605.6.2.9 Creating a Single Third-Party NE........................................................................................................................5625.6.2.10 Creating Virtual NEs..........................................................................................................................................5625.6.2.11 Creating a Single NGN NE................................................................................................................................5635.6.2.12 Creating a Single IMS NE..................................................................................................................................5645.6.3 Setting the Time Discovery Policy for NEs............................................................................................................5675.6.4 Setting the Security SSL Connection Mode for Transport NEs..............................................................................5695.7 Configuring the NE Data............................................................................................................................................5765.7.1 Synchronizing NE Configuration Data....................................................................................................................5765.7.2 Configuring the NE Data Manually.........................................................................................................................5785.7.3 Replicating the NE Data..........................................................................................................................................5805.7.4 Uploading the NE Data............................................................................................................................................5825.7.5 Configuring Virtual NE Data..................................................................................................................................5845.7.6 Adding Boards.........................................................................................................................................................5855.8 Creating Connections.................................................................................................................................................5865.8.1 Creating Fibers Manually........................................................................................................................................5865.8.2 Creating Fibers/Cables Automatically.....................................................................................................................5895.8.3 Creating Fiber/Cable Connections in Batches.........................................................................................................5905.8.4 Creating a Link Manually........................................................................................................................................5915.8.5 Creating Links Automatically.................................................................................................................................5935.8.6 Creating Inter Fibers Inside a WDM NE.................................................................................................................5985.8.7 Synchronizing Fiber/Cable Connection Data Inside a WDM NE...........................................................................5995.8.8 Automatically Creating Microwave Links..............................................................................................................6005.8.9 Manually Creating Microwave Links......................................................................................................................602

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xiii

  • 5.8.10 Creating Cables Manually.....................................................................................................................................6045.8.11 Creating Virtual Fibers..........................................................................................................................................6055.8.12 Restoring the Fiber Connection.............................................................................................................................6085.9 Maintaining a Network Topology View.....................................................................................................................6085.9.1 Creating Custom Views...........................................................................................................................................6085.9.2 Adjusting Topology Objects....................................................................................................................................6105.9.2.1 Balancing Load of an NE Management Process..................................................................................................6105.9.2.2 Modifying the NE ID and the Extended ID..........................................................................................................6135.9.2.3 Modifying the NE Name......................................................................................................................................6145.9.2.4 Modifying the NE IP Address..............................................................................................................................6155.9.2.5 Modifying the Optical NE Name..........................................................................................................................6155.9.2.6 Adjusting Optical NE Resource...........................................................................................................................6165.9.2.7 Modifying the Status of Preconfigured NEs in Batches.......................................................................................6165.9.2.8 Modifying the NMS Name...................................................................................................................................6175.9.2.9 Modifying Fiber/Cable Information.....................................................................................................................6185.9.2.10 Naming a Fiber/Cable/Microwave Link.............................................................................................................6185.9.2.11 Copying Topology Objects.................................................................................................................................6195.9.2.12 Moving Topology Objects..................................................................................................................................6205.9.2.13 Modifying Topology Objects.............................................................................................................................6225.9.3 Setting the NE Maintenance Information................................................................................................................6225.9.4 Setting the Maintenance Personnel Information.....................................................................................................6235.9.5 Deleting Topology Objects......................................................................................................................................6245.9.5.1 Deleting a Subnet..................................................................................................................................................6245.9.5.2 Deleting Boards....................................................................................................................................................6255.9.5.3 Deleting Sub-boards.............................................................................................................................................6255.9.5.4 Deleting Connections...........................................................................................................................................6265.9.5.5 Deleting NEs.........................................................................................................................................................6275.9.5.6 Deleting an Optical NE.........................................................................................................................................6285.10 Viewing Topology Information................................................................................................................................6295.10.1 Searching for NEs in a View.................................................................................................................................6295.10.2 Browsing Fibers/Cables.........................................................................................................................................6305.10.2.1 Viewing the Connection Status..........................................................................................................................6305.10.2.2 Querying Fiber/Cable/Microwave Link Information.........................................................................................6315.10.2.3 Querying Relevant Trails of a Fiber/Cable.........................................................................................................6325.10.2.4 Querying Relevant Optical Power of a Fiber/Cable...........................................................................................6335.10.2.5 Querying the Performance Data of a Microwave Link......................................................................................6345.10.3 Setting the Topology Background.........................................................................................................................6355.10.4 Selecting the Current Topology View...................................................................................................................6375.10.5 Filtering Operation Objects in a View...................................................................................................................6375.10.6 Viewing the Meanings of Topology Icons............................................................................................................6405.10.7 Viewing Topology Object Detail Information......................................................................................................641

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xiv

  • 5.10.8 Viewing the Topology Aerial View......................................................................................................................6425.10.9 Zooming In/Out in a Topology View....................................................................................................................6435.10.10 Returning to the Upper-Level Subnet..................................................................................................................6435.10.11 Sorting Topology Objects....................................................................................................................................6445.10.12 Setting Startup subnet..........................................................................................................................................6445.11 Topology Management Examples............................................................................................................................6455.11.1 Creating a Transport Network Topology...............................................................................................................6455.11.2 Creating an IP Network Topology.........................................................................................................................6505.11.3 Creating an Access Network Topology.................................................................................................................6555.11.4 Creating a Security Network Topology.................................................................................................................6615.11.5 Creating a NGN Network Topology.....................................................................................................................6705.11.6 Creating an IMS Network Topology.....................................................................................................................6745.11.7 Moving an NE from One Subnet to Another.........................................................................................................6796 Time Localization Management.............................................................................................6816.1 Time Localization.......................................................................................................................................................6826.2 Setting Time Localization on the U2000....................................................................................................................6836.2.1 Setting the Time Display Format.............................................................................................................................6836.2.2 Setting the Time Mode of the Client.......................................................................................................................6836.3 Setting Time Localization on NEs..............................................................................................................................6846.3.1 Setting a Time Zone for an NE................................................................................................................................6846.3.2 Setting DST on NEs................................................................................................................................................6857 Alarm Management...................................................................................................................6877.1 Basic Concepts...........................................................................................................................................................6897.1.1 Alarms and Events...................................................................................................................................................6897.1.2 Alarm Severities......................................................................................................................................................6897.1.3 Alarm Status............................................................................................................................................................6907.1.4 Alarm Category.......................................................................................................................................................6917.1.5 Alarm Notification...................................................................................................................................................6927.1.6 Current Alarms and Historical Alarms....................................................................................................................6967.1.7 Alarm Basic Operations...........................................................................................................................................6977.1.8 Alarm Setting Operations........................................................................................................................................7007.2 Overview of Fault Operations....................................................................................................................................7067.3 Setting Remote Alarm or Event Notification.............................................................................................................7077.3.1 Commissioning the SMS Gateway..........................................................................................................................7077.3.1.1 Setting Parameters for Alarm Notification by the SMS Gateway........................................................................7077.3.1.2 Verifying the SMS Gateway.................................................................................................................................7097.3.2 Commissioning Alarm Notification by Email.........................................................................................................7107.3.2.1 Setting Parameters for Alarm Notification by Email...........................................................................................7107.3.2.2 Verifying Remote Alarm Notification by Email..................................................................................................7127.3.3 Commissioning the Wireless Modem......................................................................................................................7137.3.3.1 Installing the Wireless Modem.............................................................................................................................713

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xv

  • 7.3.3.2 Commissioning the Wireless Modem in Solaris or SUSE Linux.........................................................................7167.3.3.3 Commissioning the Wireless Modem in Windows..............................................................................................7167.3.3.4 Setting Parameters for Alarm Notification by the Wireless Modem....................................................................7237.3.3.5 Verifying the Wireless Modem............................................................................................................................7247.3.4 Setting the Format of Remote Alarm or Event Notification Messages...................................................................7257.3.5 Setting Delay Delivery of Remote Alarm or Event Notification Messages............................................................7267.3.6 Setting the Remote Alarm or Event Notification Rule............................................................................................7277.3.7 Downloading Remote Notification Logs.................................................................................................................7287.4 Analyzing Alarm Correlation.....................................................................................................................................7297.4.1 Introduction to Correlation Rules............................................................................................................................7297.4.2 Analyzing Root Alarms Based on Customized Rules.............................................................................................7317.4.2.1 Setting the Default Alarm Correlation Rules.......................................................................................................7317.4.2.2 Analyzing Root Alarms and Events According to Customized Rules.................................................................7327.4.3 Trail Alarm Correlation Analysis - Analyzing Root Alarms..................................................................................7337.4.3.1 Trail Root Alarm Analysis...................................................................................................................................7337.4.3.2 Setting the Rules for Trail Alarm Correlation Analysis.......................................................................................7367.4.3.3 Analyzing Root Alarms Based on Trail Alarm Correlation Rules.......................................................................7377.4.4 Setting an Alarm or Event Frequency Analysis Rule..............................................................................................7387.4.5 Setting an Intermittent Alarm or Repeat Event Analysis Rule................................................................................7397.4.6 Setting an Acknowledged and Uncleared Alarm Time Analysis Rule....................................................................7407.4.7 Example of Analyzing Root Alarms According to Customized Rules...................................................................7417.4.8 Example of Alarm or Event Frequency Analysis....................................................................................................7437.4.9 Example of Intermittent Alarm or Repeat Event Analysis......................................................................................7447.4.10 Example of Acknowledged and Uncleared Alarm Time Analysis........................................................................7457.5 Setting Automatic Alarm/Event Processing...............................................................................................................7457.5.1 Setting Rules for Automatic Reporting Alarms or Events......................................................................................7457.5.1.1 Setting Automatic Reporting Status for Alarms of an NE...................................................................................7457.5.1.2 Setting Automatic Reporting Status for Alarms of a Board.................................................................................7467.5.2 Setting Alarm Automatic Synchronization..............................................................................................................7477.5.3 Setting an Alarm or Event Mask Rule.....................................................................................................................7487.5.4 Setting an Automatic Alarm Acknowledgment Rule..............................................................................................7517.5.5 Modifying Alarm Severity.......................................................................................................................................7537.5.5.1 Setting an Alarm or Event Redefinition Rule.......................................................................................................7537.5.5.2 Modifying the Alarm Severity for an NE.............................................................................................................7557.5.5.3 Modifying the Alarm Severity for a Board..........................................................................................................7567.5.6 Setting Alarm/Event Suppression Rules..................................................................................................................7567.5.7 Setting an Alarm or Event Postprocessing Rule......................................................................................................7587.5.8 An Instance of the Alarm or Event Postprocessing Script......................................................................................7587.5.9 Setting Summarized Parallel Alarm Rules..............................................................................................................7597.5.10 Setting Conversion from an Event to an ADMC Alarm.......................................................................................7617.5.11 Setting the Lifecycle of the Current Alarm...........................................................................................................762

    iManager U2000 Unified Network Management SystemOperation Guide for Common Features Contents

    Issue 03 (2014-05-15) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xvi

  • 7.5.12 Configuring Fiber-Related Alarms........................................................................................................................7627.5.13 Setting an Alarm or Event Northbound Filtering Rule..........................................................................................7637.6 Setting Alarm or Event Notification...........................................................................................................................7657.6.1 Introduction to the Alarm Panel..............................................................................................................................7657.6.2 Setting the Alarm Panel...........................................................................................................................................7677.6.3 Setting the Alarm Sound..........................................................................................................................................7697.6.4 Setting Prompt Colors of Alarms............................................................................................................................7717.6.5 Setting the Alarm Box.............................................................................................................................................7727.6.6 Disable the Alarm Sound.........................................................................................................................................7737.6.7 Setting the Alarm Highlighting...............................................................................................................................7757.6.8 Setting the Alarm Font............................................................................................................................................7767.6.9 Setting the Alarm Display Mode.............................................................................................................................7777.6.10 Setting the Format of the Alarm Lamp ToolTip....................................................................................................7797.6.11 Setting the Display Properties of New Alarms/Events..........................................................................................7807.6.12 Setting the Alarm Display in the Topology View.................................................................................................7817.7 Managing an Alarm/Event Template.........................................................................................................................7847.7.1 Alarm/Event Template............................................................................................................................................7847.7.2 Creating an Alarm/Event Template.........................................................................................................................7867.7.3 Setting Template Status for the Current User..........................................................................................................7887.7.4 Customizing Alarm/Event Attribute Template........................................................................................................7907.8 Monitoring Network Alarms/Events..........................................................................................................................7917.8.1 Alarm Reporting Process.........................................................................................................................................7917.8.2 Setting Trap Parameters on an NE..........................................................................................................................7947.8.3 Syn