TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

Embed Size (px)

Citation preview

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    1/86

    ZXWN CS Daily Operation

    Course Objectives:

    Signaling Trace

    Log Management

    Security Management

    Resource Management

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    2/86

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    3/86

    3.13 Creating a Role Set.............................................................................................................................42

    3.14 Modifying a Role Set..........................................................................................................................44

    3.15 Viewing a Role Set..............................................................................................................................45

    3.16 Deleting a Role Set.............................................................................................................................46

    3.17 Duplicating a Role Set........................................................................................................................47

    3.18 Finding a Role Set...............................................................................................................................48

    3.19 Viewing Role Set Assignment.............................................................................................................49

    3.20 Creating a User....................................................................................................................................51

    3.21 Modifying a User................................................................................................................................54

    3.22 Viewing a User....................................................................................................................................56

    3.23 Deleting a User....................................................................................................................................57

    3.24 Duplicating a User..............................................................................................................................58

    3.25 Finding a User.....................................................................................................................................59

    3.26 Viewing Access Rights of a User........................................................................................................60

    3.27 Managing Login Users........................................................................................................................61

    3.28 Releasing Locked Users......................................................................................................................63

    3.29 Setting the Login IP Range of Administrator.....................................................................................64

    3.30 Modifying All Users' Passwords.........................................................................................................66

    3.31 Setting Administrator Password Protection........................................................................................66

    3.32 Creating a Department........................................................................................................................67

    3.33 Modifying a Department.....................................................................................................................69

    3.34 Viewing a Department.........................................................................................................................71

    3.35 Deleting a Department........................................................................................................................72

    3.36 Finding a Department..........................................................................................................................72

    4 Resource Management..............................................................................................................................75

    4.1 Resource Management Introduction.....................................................................................................75

    4.2 Resource Management Interface...........................................................................................................75

    ii

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    4/86

    4.3 Implementing Area Operation...............................................................................................................78

    4.4 Adding a Resource................................................................................................................................78

    4.5 Deleting a Resource..............................................................................................................................81

    4.6 Modify a Resource................................................................................................................................82

    4.7 Viewing Resource Tree.........................................................................................................................83

    iii

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    5/86

    1 Signaling Trace

    1.1 Signaling Trace Introduction

    1.1.1 Description

    Signaling trace is used for tracing specific signaling links, analyzing signaling sending

    correctness, providing operators with signaling content tracing display, offering

    maintenance personnel with convenient method of locating faults, facilitating signaling

    flow query in commissioning and debugging, and finding errors in signaling

    cooperation for further handling.

    1.1.2 Categories

    The categories of the MSCS signaling to be traces are as follows.

    1. Subscriber signal trace

    2. Interface signaling trace (BSSAP, RANAP, MAP, CAP, TUP/ISUP/BICC, CAS,

    ISDNL3, and H248)

    3. No.7 signaling trace (OMAP, SCCP, and MTP3)

    4. SIGTRAN protocol trace (IUA, M3UA, and SCTP)

    5. Discard message (MTP3 SNM, MTP3 link, M3UA link, and SCCP).

    1.2 Signaling Trace Interface

    1.2.1 Interface

    Select Views > Signaling Trace to pop up the Signaling Trace window, as shown in Fig

    1.2 -1.

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    6/86

    Fig 1.2-1 Signaling Trace Interface

    Label Description

    1 Menu bar

    2 Toolbar

    3 Signaling Trace tree

    4 Status bar

    5 Message area

    6 Operation window

    1.2.2 Menu Bar

    The menu bar in the Signaling Trace window consists of seven menus, including

    System, Views, Data Window, Sigtrace Operation, Favorite, Windows, and Help. Table

    1.2 -1 shows the functions of each menu.

    Table 1.2-1 Functions Provided by Menu Bar of Signaling Trace

    Menu Item Main Functions

    System Lock Screen, Current User Info, Print Setup, Query

    System Time, System Setting, Logout, and Exit

    Views Daily maintenance, signaling trace, fail observer,performance management, MML terminal, log

    management, professional maintenance, securitymanagement, system management, and resource

    management

    Data Window Cascade, tile, restore all, minimize all, close all

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    7/86

    Chapter 4 Resource Management

    Menu Item Main Functions

    Sigtrace Operation Open data file, query system task, stop all task, set

    client parameter, set server parameter, and set decodingparameter

    Favorite Fault Management, Log Management, and SystemManagement

    Windows Show/hide toolbar, status bar, and message area, closecurrent view or all views

    Help Help (showing online help), and About (showing software

    version and technical support information)

    1.2.3 Toolbar

    Table 1.2 -2 shows the icons in the toolbar.

    Table 1.2-2 Icons in Toolbar

    Icon Description Icon Description

    Home page Daily Maintenance

    Back Signaling Trace

    Forward Fail Observer

    Query System Time Fault Management

    System Setting Performance Management

    Lock Screen MML Terminal

    Current User Info Help

    Print Setup

    1.2.4 Signaling Trace Tree

    The signaling trace tree displays NEs in the system. Click the NE node to show types

    of the signaling available for tracing.

    1.2.5 Message Area

    The Message Area window consists of two sub-windows, Hint Message and Error

    Message, which display operation results. Table 1.2 -3 shows its main functions.

    Table 1.2-3 Functions of Sub-windows

    3

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    8/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Sub-window Main Functions

    Hint Message Showing messages for successful operation, including its

    name and time

    Error Message Prompting messages for unsuccessful operation, includingits name, time, and probable failure cause

    1.2.6 Status Bar

    The status bar shows the connection status of current client

    1.3 Setting Signaling Tracing

    1.3.1 Purpose

    To set the NE on which the signaling tracing will be performed, the tracing type and

    corresponding parameters, and then to start the signaling tracing

    1.3.2 Prerequisite

    The user has logged in the OMM server normally. For detailed procedure, refer to.

    1.3.3 Steps

    1. On the main window of the OMM client, select Views > Signaling Trace.

    Result: The Signaling Trace window appears.

    2. In the Signaling Trace tree, double-click the NE to be traced.

    3. Double-click the signaling category to expand the node, and then double-click

    the signaling type to be traced, as shown in Fig 1.3 -2.

    4

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    9/86

    Chapter 4 Resource Management

    Fig 1.3-2 Selecting Signaling Type to Be Traced

    4. The Signaling Trace Task Set dialog box pops up, as shown in Fig 1.3 -3. Set

    tracing parameters, or click the icon in the toolbar to set tracing parameters.

    NOTE: Tracing parameters vary with different signaling tracing types. For

    detailed signaling trace types and corresponding parameters, refer to Table 1.3

    -4.

    5

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    10/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Fig 1.3-3 Setting Tracing Parameters

    5. Click OKto complete setting signaling tracing parameters. The system starts to

    trace the signaling. The tracing result will automatically displays in the

    operation window, as shown in Fig 1.3 -4.

    Fig 1.3-4 Starting to Trace Signaling

    1.3.4 Reference

    Table 1.3 -4 shows MSCS signaling tracing types and their parameters

    6

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    11/86

    Chapter 4 Resource Management

    Table 1.3-4 MSCS Signaling Tracing Types and Their Parameters

    Signaling Tracing Type Parameter

    Discard Message Including MTP3 SNM, MTP3 link, M3UA link, and SCCP

    Subscriber signal trace Primary settings: set the tracing number and objects.

    Advanced settings: set mission types, timing, and preservation.

    BSSAP Signaling Trace Primary settings: set BSC office, module number, and message type

    (including L3 message and BSSAP message).

    Advanced settings: set timing and preservation.

    RANAP signaling trace Primary settings: set RNC office, module number, and message type

    (including L3 message and RANAP message).

    Advanced settings: set timing and preservation.

    MAP signaling trace Primary settings: set trace number, module number, and message type.

    Advanced settings: set timing and preservation.

    CAP signaling trace Primary settings: set GT number, module number, and message type.

    Advanced settings: set timing and preservation.

    TUP/ISUP/BICC

    interface signaling trace

    Primary settings: set office number and module number.

    Advanced settings: set timing and preservation.

    CAS signaling trace -

    ISDNL3 interface

    signaling trace

    -

    H248 signaling trace Primary settings: set trace type, module number, user-input

    information, and user information list.

    Advanced settings: set timing and preservation.

    OMAP No.7 signaling

    trace

    Primary settings: set the type and the direction

    Advanced settings: set timing and preservation.

    SCCP signaling trace Primary settings: select modules and subsystems.

    Advanced settings: set timing and preservation.

    MTP3 signaling trace Primary settings: set direction, tracing options, and links

    Advanced settings: set timing and preservation.

    IUA signaling trace -

    M3UA signaling trace Primary settings: set direction, tracing options, and association IDs.Advanced settings: set timing and preservation.

    SCTP signaling trace Primary settings: set tracing type, by module number or by association.

    Advanced settings: set timing and preservation.

    .

    7

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    12/86

    2 Log Management

    2.1 Log Management Introduction

    2.1.1 Description

    The log management provides the function of querying the system running log. It

    enables to get the information about the operation and login status of users, and the

    information about the complete condition of the timing tasks of the server.

    The log falls into the operation log, security log, and system log. Users can query,

    export, and print these three types of log.

    2.1.2 Type

    There are three types of logs.

    1. Operation log

    It records the information about user operations, including the log ID, operationrank, user name, module, operation set, host address, command function,

    detailed information, operation result, failed reason, connection mode, operation

    resource, operation start time, operation end time, and related log.

    2. Security log

    It records the information about user login status, including the log ID, user

    name, host address, log name, operation time, connection mode, and detailed

    information.

    3. System log

    It records the complete condition of the timing tasks of the server, including the

    log ID, rank, source, log name, detailed information, host address, operation

    start time, operation end time, and related log.

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    13/86

    2.2 Log Management Interface

    2.2.1 Interface

    Select Views > Log Management to pop up the Log Management window, as shown in

    Fig 2.2 -5.

    Fig 2.2-5 Log Management Interface

    Table 2.2-5 Labels in Log Management Interface

    Label Description

    1 Menu bar

    2 Toolbar

    3 Log tree

    4 Message area

    5 Status bar

    6 Toolbar in operation window

    7 Operation window

    2.2.2 Menu bar

    The menu bar in the Log Management window consists of six menus, including

    System, Views, Operation, Favorite, Windows, and Help. Table 2.2 -6 shows the

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    14/86

    Chapter 4 Resource Management

    functions of each menu.

    Table 2.2-6 Functions Provided by Menu Bar of Log Management

    Menu Item Main Functions

    System Lock Screen, Current User Info, Print Setup, Query System Time, System

    Setting, Logout, and Exit

    Views Daily Maintenance, Signaling Trace, Fail Observer, Performance

    Management, MML Terminal, Log Management, Professional Maintenance,

    Security Management, System Management, and Resource Management

    Operation Run, Edit, Export Query, Save as, Refresh Current Tab Page, Export Result,

    and Print Result

    Favorite Fault Management, Log Management, and System Management

    Windows Show/hide toolbar, status bar, and message area, close current view or all

    views

    Help Help (showing online help), and About (showing software version and

    technical support information)

    2.2.3 Toolbar

    Table 2.2 -7 shows the icons in the toolbar.

    Table 2.2-7 Icons in Toolbar

    Icon Description Icon Description

    Home page Daily Maintenance

    Back Signaling Trace

    Forward Fail Observer

    Query System Time Fault Management

    System Setting Performance Management

    Lock Screen MML Terminal

    Current User Info Help

    Print Setup

    2.2.4 Log Tree

    The Log Tree shows the log types available for viewing, including Operation Log,

    11

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    15/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Security Log, and System Log.

    2.2.5 Message Area

    The Message Area window consists of two sub-windows, Hint Message and Error

    Message, which display operation results. Table 2.2 -8 shows its main functions.

    Table 2.2-8 Functions of Sub-windows

    Sub-window Main Functions

    Hint Message Showing messages for successful operation, including itsname and time

    Error Message Prompting messages for unsuccessful operation,including its name, time, and probable failure cause

    2.2.6 Status Bar

    The status bar shows the connection status of current client.

    2.2.7 Toolbar in Operation Window

    Table 2.2 -9 shows the icons shown in the toolbar in the operation window.

    Table 2.2-9 Icons Shown in Toolbar

    Icon Description Icon Description

    Refresh Current Tab Page First Page

    Previous Page Next Page

    Last Page Go to Page

    Query and Export ResultAccording to Current

    Condition

    Query and Print Result Accordingto Current Condition

    Customize DisplayColumns

    Edit Query Condition

    Save Query Condition As Find

    2.2.8 Operation Window

    The operation window shown here varies with different operations performed in the

    Log Management window, including:

    12

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    16/86

    Chapter 4 Resource Management

    1. Querying logs

    2. Exporting logs

    3. Print logs

    2.3 Querying Logs

    2.3.1 Purpose

    To query the log records of the OMM system

    Note:This section takes the operation logs for example to describe the procedure for

    querying logs. You can use similar method to query security and system logs.

    2.3.2 Prerequisite

    The user has logged in the OMM server normally. For detailed procedure, refer to.

    2.3.3 Steps

    1. On the main window of the OMM client, select Views > Log Management.

    Result: The Log Management window appears.

    2. Right-click the All Operation Log below the Operation Log node, select Edit

    from the short-cut menu, as shown in Fig 2.3 -6.

    Fig 2.3-6 Editing Query Conditions

    13

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    17/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    3. Set query conditions in the Query Operation Log dialog box, consisting two

    tabs, Basic and Advanced, as shown in Fig 2.3 -7.

    Fig 2.3-7 Query Operation Log

    Table 2.3-10 Parameter Description

    Name Descriptions

    User

    information

    Selecting to match the user information exactly by user name

    or by host address

    Operationstart time

    Selecting the check box to set the log-generating time forquerying the operation records; not selecting the check box

    means to query operation records from the first log to the lastlog.

    OperationInformation

    Selecting to query operation logs by user name or byoperation objects

    When selecting the check box followed by Operation, the

    Select button is activated. Click Select to choose the operator.When selecting the check box followed by Operation

    Resource, the Select button is activated. Click Select tochoose the operation objects.

    14

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    18/86

    Chapter 4 Resource Management

    Name Descriptions

    Operation

    result

    Including: All, Successful Operation, Failed Operation, and

    Unfinished Operation

    Connectionmode

    Including: All, GUI, TELNET, NDF, CORBA, WEB, and SNMP

    Rank Including: All, 1-VERY IMPORTANT, 2-IMPORTANT, 3-NOTICE,

    and 4-NORMAL

    4. After the setting is completed, clickOK. The query result is displayed in the log

    list, as shown in Fig 2.3 -8.

    Fig 2.3-8 Query Result

    5. If there are several pages showing the queried logs, click to view the next

    page, or click to view the previous page, click to view the first page,

    click to view the last page, and click to go to the specified page.

    2.3.4 Optional Operation

    1. To query todays operation log information, clickToday Operation Log below

    the Operation Log node. The other operations are the same as that of querying

    all operation logs.

    2. If there is no need to modify query conditions, there are two methods to query

    logs.

    1) Double-click the node to be queried.

    15

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    19/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    2) Right-click this node and then select Run from the short-cut menu to query logs.

    2.4 Exporting Logs

    2.4.1 Purpose

    To export the queried log result and to save the result in the file format of *.txt, *.html,

    *.pdf, *.csv, and *.xls

    2.4.2 Prerequisite

    1. The user has logged in the OMM server normally. For detailed procedure, refer

    to.

    2. Confirm that the logs to be exported are queried. For the operation method, refer

    to Querying Logs.

    2.4.3 Steps

    1. On the window displaying the query result shown in Fig 2.3 -8, click the

    button on the toolbar, or select Operation > Export Result to pop up the Save

    dialog box, as shown in Fig 2.4 -9.

    Fig 2.4-9 Exporting and Saving Logs

    2. Set the save position, file format, and file name, clickSave. The Message dialog

    box pops up, prompting that the logs are exported successfully.

    16

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    20/86

    Chapter 4 Resource Management

    3. Click OKto complete exporting logs.

    2.5 Printing Logs

    2.5.1 Purpose

    To print queried logs

    2.5.2 Prerequisite

    1. The user has logged in the OMM server normally. For detailed procedure, refer

    to.

    2. Confirm that the logs to be exported are queried. For the operation method, refer

    to Querying Logs.

    2.5.3 Steps

    1. On the window displaying the queried logs shown in Fig 2.3 -8, click the

    button on the toolbar, or select Operation > Print Result to pop up the Print

    Setup dialog box, as shown in Fig 2.5 -10.

    Fig 2.5-10 Print Setup

    Table 2.5-11 Parameter Descriptions for Each Tab

    17

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    21/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Tab Parameter

    General Setting the printer name, print range (including printing all

    the pages, and selecting several required pages), and thenumber of copies

    Page Setup Setting page size, orientation, and margins

    Advance Setting the printing style

    2. Click the Preview All button to view the printing effect. Click Print to start

    printing logs.

    18

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    22/86

    3 Security Management

    3.1 Security Management Introduction

    3.1.1 Functions

    Security management aims to ensure the legitimate use of the system by users. Security

    management implements the management to the role/role set, user, and department,

    and provides the security control to the operators so that they can conduct security

    management operations through reasonable relationship between the user and the role

    as well as the corresponding operation authority. Through the login authentication, this

    function can prevent illegal users from entering the system and implement the security

    control over the operations of the operator.

    3.1.2 Concepts Involved

    1. Role

    The role assigns users managerial authority by defining the operation and

    resource authority. The operation authority defines the functional modules of the

    NMS that can be operated by a certain user. The resource authority defines the

    subnet or the specific NEs under the subnet that can be managed by a certain

    user.

    The operation authority and the resource authority separately define two aspects

    of a role. Both of them are independent from each other when a role is defined.

    The authority set corresponding to a role is the intersection set of them during

    the usage.

    2. Role set

    The role set is the set of several roles. The authority of a role set is the authority

    set of all its roles.

    Using the role set facilitates system administer or subnet administer to allocate

    the authority. The user authority of an administrator usually is the set of the

    managerial authorities of multiple common users. Granting a role set to an

    administrator directly is as same as granting all roles in this role set to the

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    23/86

    administrator. In this way, the role set facilitates the management and allocation

    of the user authority.

    3. User

    User is the set of the operators who log in and operate the NMS. While creating

    a user, system administrator defines the operation authority of this user by

    defining a role or a role set, and sets the administration by defining the

    department to which the user belongs.

    4. Department

    A department is the simulation of a service department to facilitate the

    organization and management of users. The new added user must belong to a

    certain department.

    5. Creator

    A creator is a user, who can create new role, role set, user, and department. For

    these new added role, role set, user, and department, the user who creates them

    is the creator.

    Because a creator is a user, too, the creator (except admin) identity is also

    created by another creator. Ultimately, all users are created by admin. Therefore,

    a creator tree is formed, ranging from the admin to the current creator.

    Only a user logging in the system with a creator or a creator whose node is the

    parent node of the current creator on the creator tree can edit, delete, and copy a

    role, role set, user, and department. Otherwise, this user can only implement

    such operations as creating, searching, refreshing, viewing assignment

    information.

    3.2 Security Management Interface

    3.2.1 Interface

    Select Views > Security Management to pop up the Security Management window, as

    shown in Fig 3.2 -11.

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    24/86

    Chapter 4 Resource Management

    Fig 3.2-11 Security Management Interface

    Table 3.2-12 Labels in Security Management Interface

    Label Description

    1 Menu bar

    2 Toolbar

    3 Security tree

    4 Status bar

    5 Message area

    6 Operation window

    3.2.2 Menu bar

    The menu bar in the Security Management window consists of six menus, including

    System, Views, Operation, Tools, Favorite, Windows, and Help. Table 3.2 -13 shows

    the functions of each menu.

    Table 3.2-13 Functions Provided by Menu Bar of Security Management

    Menu Item Main Functions

    System Lock Screen, Current User Info, Print Setup, Query SystemTime, System Setting, Logout, and Exit

    Views Daily maintenance, signaling trace, fail observer,performance management, MML terminal, log management,professional maintenance, security management, system

    management, and resource management

    21

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    25/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Menu Item Main Functions

    Operation Create role/role set/user/department, modify role/role

    set/user/department, view role/role set/user/department,delete role/role set/user/department, and duplicate role/roleset/user

    Tools View operation tree, view user lockup records, login usermanagement, customize user account rule, customizesecurity event rule, modify all users password, export roleoperation (s) information, and import role operation (s)information

    Favorite Fault Management, Log Management, and SystemManagement

    Windows Show/hide toolbar, status bar, and message area, close

    current view or all views

    Help Help (showing online help), and About (showing softwareversion and technical support information)

    3.2.3 Toolbar

    Table 3.2 -14 shows the icons in the toolbar.

    Table 3.2-14 Icons in Toolbar

    Icon Description Icon Description

    Home page Daily Maintenance

    Back Signaling Trace

    Forward Fail Observer

    Query System Time Fault Management

    System Setting Performance Management

    Lock Screen MML Terminal

    Current User Info Help

    Print Setup

    3.2.4 Security tree

    The security tree shows the relevant operations of security management, including

    Role Management, Role Set Management, User Management, and Department

    Management.

    22

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    26/86

    Chapter 4 Resource Management

    3.2.5 Message area

    The Message Area window consists of two sub-windows, Hint Message and Error

    Message, which display operation results. Table 3.2 -15 shows its main functions.

    Table 3.2-15 Functions of Sub-windows

    Sub-window Main Functions

    Hint Message Showing messages for successful operation, including its

    name and time

    Error Message Prompting messages for unsuccessful operation, includingits name, time, and probable failure cause

    3.2.6 Status Bar

    The status bar shows the connection status of current client

    3.2.7 Toolbar in Operation Window

    Table 3.2 -16 shows the icons shown in the toolbar in the operation window.

    Table 3.2-16 Icons Shown in Toolbar

    Icon Description Icon Description

    Refresh role/roleset/user/department

    View role/roleset/user/department

    Modify role/role

    set/user/department

    Find

    Delete role/roleset/user/department

    Export role operation(s)information

    Create role/roleset/user/department

    3.2.8 Operation Window

    The operation window shown here varies with different operations performed in the

    Security Management window, including:

    Customizing user account rule

    Viewing operation tree

    Customizing security event rule

    Role management

    23

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    27/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Role set management

    Department management.

    3.3 Customizing a User Account Rule

    3.3.1 Purpose

    Customizing a user account rule is to set the password length, password policy, account

    restriction, and expiration examination.

    3.3.2 Prerequisite

    The user has logged in the OMM server normally.

    The user can open the Security Management window.

    3.3.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Select Tools > Customize User Account Rule to pop up the Customize UserAccount Rule window, as shown in Fig 3.3 -12. Table 3.3 -17 describes the

    settings of partial parameters.

    24

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    28/86

    Chapter 4 Resource Management

    Fig 3.3-12 Security Policy Management

    Table 3.3-17 Descriptions of Partial User Account Parameters

    Name DescriptionsDefault

    Value

    Enable WeakPassword Check

    Activating the rule of weal passwordcheck, which defines that the passwordcannot be empty or only contain letters orFigs, that the password cannot be the

    same as the username or telephonenumber of the user, that the passwordcannot be the twice repeats of theusername or the telephone number, thatthe password cannot be the username ortelephone number in reverse.

    None

    Min length The minimal length of a password,ranging from 0 to 20

    0

    Max length The maximal length of a password,ranging from 2 to 20

    20

    25

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    29/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Name DescriptionsDefault

    Value

    Lock Rule Including Never lock, Lock permanently,and Lock temporary

    Set the lock rule when selecting to lockthe account. It includes password error

    times, and locking duration.

    Passwordenteringerror=3

    Duration of

    beinglocked=24

    hour

    Expired accountchecking

    Reminding the user to replace the accountbefore it expires

    0 day

    Expired PasswordChecking

    Setting the time to remind the user tochange the password before it expires,which enhances the system security

    0 day

    3. Click OK to complete the settings.

    3.4 Viewing an Operation Tree

    3.4.1 Purpose

    Viewing an operation tree is to get know the operation authority of the current login

    user and the description of each operation.

    3.4.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Select Tools > View Operation Tree to pop up the View Operation Tree window,

    as shown in Fig 3.4 -13.

    26

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    30/86

    Chapter 4 Resource Management

    Fig 3.4-13 Viewing Operation Tree

    3. Expand an operation node in the Operation Tree column. The detailed

    information about this operation is displayed on the right Operation Description

    column.

    Example: Click the Global node, the corresponding operation information is

    displayed in the right column, as shown in Fig 3.4 -14.

    Fig 3.4-14 Viewing an Operation Tree

    27

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    31/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    4. Click Close to complete the viewing operation.

    3.5 Customizing a Security Event Rule

    3.5.1 Purpose

    Customizing a security event rule is to set the conditions of recording the security

    event log thus to help the system administrator get to know the usage condition of the

    user accounts and manage the user accounts effectively.

    3.5.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Select Tools > Customizing Security Event Rule.

    Result: The Customize Security Event Rule dialog box pops up, as shown in Fig

    3.5 -15. For parameter descriptions, refer to Table 3.5 -18.

    Fig 3.5-15 Customizing a Security Event Rule

    Table 3.5-18 Parameter Descriptions for the Security Event Rule

    Item Descriptions

    Record on security log when

    user is locked/unlocked

    Recording this event on the security event

    log when locking or unlocking a user

    Record on security log whenuser is disabled/enabled

    Recording this event on the security eventlog when disabling or enabling a user

    Record on security log whenauthentication fails

    Recording this event on the security eventlog when the subscriber access does notpass the authentication

    28

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    32/86

    Chapter 4 Resource Management

    3. Select the check box followed by each rule of security events as required.

    4. Click OK to complete the settings, or click Cancel to cancel the operation.

    3.6 Creating a Role

    3.6.1 Purpose

    To create a new role and to assign a certain operation and resource authority so as to

    define the authority of a user

    3.6.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Right-click Role Management in the Security Tree in the Security Management

    window, and select Create Role, as shown in Fig 3.6 -16.

    Fig 3.6-16 Selecting Create Role

    3. The Create Role dialog box pops up. On the Basic Information page, enter Role

    Name and Role Description, as shown in Fig 3.6 -17.

    29

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    33/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Fig 3.6-17 Entering Basic Information of a Role

    Table 3.6-19 Description of Basic Information Tab

    Parameter Notes Default

    Role name The name of a role

    You must input a unique name

    Null

    Roledescription

    The description information about a role

    Optional

    Null

    Lock therole

    Setting whether to lock this role

    Optional, a user assigned with this role will not ownthe corresponding permissions of this role after thisrole is locked.

    None

    4. Select the Access Rights tab. Set the operation authority of this role on the

    Operation Tree, and the resource authority on the Resource Tree, as shown in

    Fig 3.6 -18. Or, select the pre-defined scheme of the authority assignment from

    the drop-down list of the Operations Assignment. Table 3.6 -20 introduces each

    assignment scheme.

    30

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    34/86

    Chapter 4 Resource Management

    Fig 3.6-18 Setting Access Rights about a Role

    Table 3.6-20 Scheme Description of Predefined Authority Assignment

    Name Descriptions

    Power user Implementing all the functions of log management, securitymanagement, fault management, system management, MML

    terminal, daily maintenance, professional maintenance,performance management, bill security management, devicemaintenance, and resource management

    Maintenanceperson

    Implementing partial functions of security management

    Implement all the functions of log management, faultmanagement, and system management

    Operator Implementing partial functions of security management, andsystem management,

    Implement all the functions of log management, and faultmanagement

    Supervisor Implement partial functions of security management, fault

    management, and system managementImplementing all the functions of log management

    5. Select the Login Address tab to set the IP address range of the OMM client that

    this role can use. Click Add to pop up the Set IP Range dialog box, as shown in

    Fig 3.6 -19. Set the start address and the end address. If it is not set, there is no

    address limitation for the user belonging to this role.

    31

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    35/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Fig 3.6-19 Setting IP Range

    6. Click the User tab to assign this role to existing users, or to no one (the role

    without being assigned is useless temporarily), as shown in Fig 3.6 -20.

    Fig 3.6-20 Assigning a Role to Users

    Note:The new role cannot be assigned to cguser and cgadmin, the default users of the

    system, for modifying the authority of default user is not allowed.

    7. Click OK to complete the creation of a role.

    3.6.3 Result

    The new role is displayed in the role list, as shown in Fig 3.6 -21.

    32

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    36/86

    Chapter 4 Resource Management

    Fig 3.6-21 Showing New Role

    3.7 Modifying a Role

    3.7.1 Purpose

    To modify attributes of a created role. All attributes of a role can be modified except

    the role name.

    3.7.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click the Role Management in the Security Tree. From the right role list, right-

    click the role to be modified, and select Modify from the short-cut menu, as

    shown in Fig 3.7 -22.

    33

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    37/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Fig 3.7-22 Modifying a Role

    3. The Modify Role dialog box pops up, as shown in Fig 3.7 -23. Modify Role

    Description on the Basic Information page.

    Fig 3.7-23 Modifying Basic Information about a Role

    4. Select the Access Rights tab to modify the scheme of the Operations

    Assignment, or to select the required operations on the Operation Tree directly,

    as shown in Fig 3.7 -24.

    34

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    38/86

    Chapter 4 Resource Management

    Fig 3.7-24 Modifying Access Rights about a Role

    5. Select the Login Address tab to add, modify, and delete the range of the IP

    address for login, as shown in Fig 3.7 -25.

    Fig 3.7-25 Modifying the Range of IP Address

    6. Select the User tab to modify the user belonging to this role, as shown in Fig

    3.7 -26.

    35

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    39/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Fig 3.7-26 Modifying User Information

    7. Click OK to complete the modification.

    3.8 Viewing a Role

    3.8.1 Purpose

    To view the properties of a created role

    3.8.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the role to be viewed has been created. For operation method, refer

    to Creating a Role.

    3.8.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click the Role Management in the Security Tree. From the right role list, right-

    click the role to be viewed, and select View from the short-cut menu, as shown

    in Fig 3.8 -27.

    36

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    40/86

    Chapter 4 Resource Management

    Fig 3.8-27 Viewing a Role

    Result: The View Role dialog box pops up, as shown in Fig 3.8 -28.

    For the description of each page, refer to Table 3.8 -21.

    Fig 3.8-28 Viewing Properties of a Role

    Table 3.8-21 Page Descriptions of the View Role

    Page Name Parameter Description

    BasicInformation

    Role Name, Role Description The name and descriptionof a role

    Access Rights Predefined operationassignment, Operation Tree,Resource Tree

    Operation authority of arole

    37

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    41/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Page Name Parameter Description

    Login Address Login Address The range of the IP

    address for the user ofthis role to log in theOMM client

    User User The user belonging to thisrole

    3. Click OK to complete the viewing operation.

    3.9 Deleting a Role

    3.9.1 Purpose

    To delete an existing role that is not used any more. The role that has been assigned to

    users cannot be deleted.

    3.9.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the role to be deleted exists, and is not used any more.

    Confirm there is no user belonging to this role.

    3.9.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click the Role Management in the Security Tree. From the right role list, right-

    click the role to be deleted, and select Delete from the short-cut menu, as shown

    in Fig 3.9 -29.

    38

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    42/86

    Chapter 4 Resource Management

    Fig 3.9-29 Deleting a Role

    3. The Delete Role dialog box pops up. Click Yes to complete deleting this role.

    3.10 Duplicating a Role

    3.10.1 Purpose

    To create a role having the same attributes of the role to be duplicated, except the role

    name

    3.10.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the role to be duplicated exists.

    3.10.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click Role Management in the Security Tree. From the right role list, right-click

    the role to be duplicated, and select Duplicate from the short-cut menu, as

    shown in Fig 3.10 -30.

    Fig 3.10-30 Duplicating a Role

    3. The Create Role dialog box pops up. The attributes of the role is as same as that

    of the duplicated role, except Role Name. Modify the role attributes on each

    39

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    43/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    page according to actual requirements. For the description of each page, refer to

    Table 3.10 -22.

    Table 3.10-22 Description of Role Duplication

    Page Name Parameter Description

    Basic

    Information

    Role Description Role description

    Access Rights Predefined operationassignment, Operation Tree,

    Resource Tree

    Operation authority of a role

    Login Address Login Address The range of the IP address

    used by the user of this roleto log in the OMM client

    User User The user belonging to thisrole

    4. After the setting is completed, click OK.

    3.11 Finding a Role

    3.11.1 Purpose

    To implement a fuzzy search to the role according to the role name

    A fuzzy search is to find a role according to partial continuous or all characters

    contained in its name.

    3.11.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. In the Role Management interface, click on the toolbar.

    3. The Find dialog box pops up. Input the role name or any continuous characters

    contained by the role name, as shown in Fig 3.11 -31.

    40

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    44/86

    Chapter 4 Resource Management

    Fig 3.11-31 Entering Role Name to be Found

    4. Click Find to start searching. If there is a matched role, this role is highlighted in

    the role list. Click Find to search the next matched role. If there is no matched

    role, the Message dialog box pops up, as shown in Fig 3.11 -32.

    Fig 3.11-32 Prompting no Matched Role

    3.12 Viewing Role Assignment Information

    3.12.1 Purpose

    To view the assignment and usage condition of a role among the users and role sets.

    3.12.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the role to be viewed exists.

    3.12.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click the Role Management in the Security Tree. From the right role list, right-

    click the role whose assignment condition is to be viewed, and select

    41

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    45/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Assignment from the short-cut menu, as shown in Fig 3.12 -33.

    Fig 3.12-33 Selecting Assignment

    3. The Role Assignment dialog box pops up. View the users belonging to this role

    on the Assigned User page, and the role set of this role on the Assigned Role Set

    page, as shown in Fig 3.12 -34.

    Fig 3.12-34 Viewing Assignment Condition of a Role

    3.13 Creating a Role Set

    3.13.1 Purpose

    To create a new role set and to assign one or more roles to this role set

    42

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    46/86

    Chapter 4 Resource Management

    3.13.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Right-click Role Set Management in the Security Tree in the Security

    Management window, and select Create Role Set, as shown in Fig 3.13 -35.

    Fig 3.13-35 Selecting Create Role Set

    3. The Create Role Set dialog box pops up. On the Basic Information page, enter

    Role Set Name and Role Set Description, and set whether to lock this role set, as

    shown in Fig 3.13 -36.

    Fig 3.13-36 Entering Basic Information about a Role Set

    43

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    47/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Table 3.13-23 Description of Basic Information Tab

    Parameter Notes Default

    Role set name The name of a role set

    You must input a unique name

    Null

    Role setdescription

    The description information about a role set

    Optional

    Null

    Lock the role set Setting whether to lock this role set

    Optional

    None

    4. Select the Assign Roles tab, and assign the role set to roles, as shown in Fig

    3.13 -37.

    Fig 3.13-37 Assigning a Role to Role Set

    5. Click OK to complete the creation of a role set. The new role set is displayed in

    the role set list.

    3.14 Modifying a Role Set

    3.14.1 Purpose

    To modify attribute parameters of an existing role set

    44

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    48/86

    Chapter 4 Resource Management

    3.14.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the role set to be modified exists.

    3.14.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click the Role Set Management in the Security Tree. From the right role set list,

    right-click the role set to be modified, and select Modify from the short-cut

    menu, as shown in Fig 3.14 -38.

    Fig 3.14-38 Selecting Modify from Short-cut Menu

    3. The Modify Role Set dialog box pops up.

    Change its description and select whether to lock it on the Basic Information

    page.

    Assign a role to it on the Assign Roles page.

    4. Click OK to complete the modification.

    3.15 Viewing a Role Set

    3.15.1 Purpose

    To view attributes of a created role set

    45

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    49/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    3.15.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the role set to be viewed exists.

    3.15.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click the Role Set Management in the Security Tree. From the right role set list,

    right-click the role set to be viewed, and select View from the short-cut menu, as

    shown in Fig 3.15 -39.

    Fig 3.15-39 Selecting View from Short-cut Menu

    3. The View Role Set dialog box pops up. View the Role Set Name, Role Set

    Description, and its lock status on the Basic Information page. View available

    roles and assigned roles on the Assign Roles page.

    4. Click OK to complete viewing.

    3.16 Deleting a Role Set

    3.16.1 Purpose

    To delete an existing role set that is not used any more. The role set that has been

    assigned to users cannot be deleted, but the role set that has been assigned to roles can

    be deleted.

    46

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    50/86

    Chapter 4 Resource Management

    3.16.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the role set to be deleted exists, and is not used any more.

    3.16.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click the Role Set Management in the Security Tree. From the right role set list,

    right-click the role set to be deleted, and select Delete from the short-cut menu,

    as shown in Fig 3.16 -40.

    Fig 3.16-40 Selecting Delete from Short-cut Menu

    3. The confirmation dialog box pops up. Click Yes to delete the role set.

    3.17 Duplicating a Role Set

    3.17.1 Purpose

    To create a role set with the same attributes of the role set to be duplicated, except the

    name of the role set

    3.17.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the role set to be duplicated exists.

    47

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    51/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    3.17.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click the Role Set Management in the Security Tree. From the right role list,

    right-click the role set to be duplicated, and select Duplicate from the short-cut

    menu, as shown in Fig 3.17 -41.

    Fig 3.17-41 Selecting Duplicate from the Short-cut Menu

    3. The Create Role Set dialog box pops up. The attributes of the role set is as same

    as that of the duplicated role set, except the Role Set Name. Modify the role set

    attributes on each page as required.

    4. After the setting is completed, click OK.

    3.18 Finding a Role Set

    3.18.1 Purpose

    To implement a fuzzy search on the role set according to its name.

    A fuzzy search is to find an existing role set according to partial continuous or all

    characters contained in its name.

    3.18.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    48

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    52/86

    Chapter 4 Resource Management

    2. In the Role Set Management interface, click on the toolbar.

    3. The Find dialog box pops up. Input the role set name, or any continuouscharacters contained by the role name, as shown in Fig 3.18 -42.

    Fig 3.18-42 Finding A Role Set

    4. Click Find to start searching. If there is a matched role set, this role set is

    highlighted in the role set list. Click Find to search the next matched role set. If

    there is no matched role set, the Message dialog box pops up.

    3.19 Viewing Role Set Assignment

    3.19.1 Purpose

    To view the assignment and usage condition of a role set among the users. The role set

    is the set of a group of roles. A defined role set can be assigned to the users with

    corresponding permissions.

    3.19.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the role set to be viewed exists.

    3.19.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click the Role Set Management in the Security Tree. From the right role set list,

    right-click the role set whose assignment condition is to be viewed, and select

    Assignment from the short-cut menu, as shown in Fig 3.19 -43.

    49

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    53/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Fig 3.19-43 Selecting Assignment from the Short-cut Menu

    3. The Role Set Assignment dialog box pops up. The Assigned User page displays

    users belonging to this role set, as shown in Fig 3.19 -44.

    Fig 3.19-44 Viewing Assignment Condition of a Role Set

    4. Click Close to complete the operation.

    50

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    54/86

    Chapter 4 Resource Management

    3.20 Creating a User

    3.20.1 Purpose

    To create a new user with a certain operation authority assigned through a role or role

    set

    3.20.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Right-click User Management in the Security Tree on the Security Management

    window, and select Create User, as shown in Fig 3.20 -45.

    Fig 3.20-45 Selecting Create User from Short-cut Menu

    3. The Create User dialog box pops up. Set the basic information about this user, as

    shown in Fig 3.20 -46. For parameter description, refer to Table 3.20 -24.

    51

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    55/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Fig 3.20-46 Entering Basic Information about a User

    Table 3.20-24 Description of Parameters on Basic Information Page

    Parameter Descriptions

    User name The name of a userFull name The full name of a user

    User Password Setting the user password according to the user accountrule customized in the Security Policy Management

    Verify Password Entering the password the same as that entered in theUser Password edit box

    User Description Providing proper description about the user for betterunderstanding

    Phone Number Setting users phone number to send the short message

    to notify this user when an alarm is forwarded

    Email Setting users Email address to send the Email to notifythis user when an alarm is forwarded

    User Status Showing the creator, creation time, and passwordactivation time of this user

    4. Click the Advanced Information tab, as shown in Fig 3.20 -47. For parameter

    description, refer to Table 3.20 -25.

    52

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    56/86

    Chapter 4 Resource Management

    Fig 3.20-47 Entering Advanced Information about a User

    Table 3.20-25 Description of Parameters on Advanced Information Page

    Parameter Descriptions

    User Valid Day(s) Setting valid days of an account, ranging from 1 to 500;Setting or viewing working time of the user

    Password Control Setting valid days of a password, ranging from 1 to 500;

    Setting that user must modify the password before nextlogin or cannot change the password

    Disable and Logout The system will automatically disable this user when

    he/she does not log in the system in specified days.

    The system automatically logs out when it is inactive inspecified minutes.

    Number of Logins Setting the maximum number of users concurrentlyonline, including NDF, GUI, TELNET, and WEB, ranging

    from 0 to 99, with default value as 10

    5. Click the Role tab to assign a role or role set to the user, as shown in Fig 3.20

    -48.

    Note:A junction node stands for a role set, while a node stands for a role.

    When a user is assigned with roles or role sets, he/she is authorized with operating

    permissions of the specified role or role set.

    53

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    57/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    If a user is not assigned with a role or role set, he/she is not allowed to log in the

    system.

    Fig 3.20-48 Assigning Role/Role Set to a User

    6. Click the User Department tab to assign a department to the user.

    7. Click OK to complete the creation of a user. The new user is displayed in the

    user list.

    3.21 Modifying a User

    3.21.1 Purpose

    To modify the attributes of an existing user, except the user name

    3.21.2 Prerequisite

    The user has logged in the OMM server normally..

    Confirm that the user to be modified exists.

    3.21.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    54

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    58/86

    Chapter 4 Resource Management

    2. Click the User Management in the Security Tree to show the user list. Right-

    click the user to be modified from the right user list, and select Modify from the

    short-cut menu, as shown in Fig 3.21 -49.

    Fig 3.21-49 Selecting Modify from short-cut menu

    3. The Modify User dialog box pops up, as shown in Fig 3.21 -50. Modify the

    attributes as required. For parameter descriptions, see Table 3.21 -26.

    Fig 3.21-50 Modifying a User

    Table 3.21-26 Parameters Available for Modification

    55

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    59/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Tab Contents Available for Modification

    Basic Information Modify parameters such as full name, user password,

    user description, phone number, Email

    AdvancedInformation

    Modifying parameters, such as user valid day(s),password control, disable and logout, and number oflogins

    Role Modifying the role or role set belonged to the user

    User Department Modifying the department belonged to the user

    4. Click OK to complete the modification.

    3.22 Viewing a User

    3.22.1 Purpose

    To view the attributes of an existing user

    3.22.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the user to be viewed exists.

    3.22.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click the User Management in the Security Tree. From the right user list, right-

    click the user to be viewed, and select View from the short-cut menu, as shown

    in Fig 3.22 -51.

    56

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    60/86

    Chapter 4 Resource Management

    Fig 3.22-51 Selecting View

    3. In the popup View User dialog box, view the attributes of this user by selecting

    each tab.

    NOTE: The User Status area on the Basic Information page shows some

    information of this user, such as creator, creation time, and password activation

    time.

    4. Click OK to complete viewing.

    3.23 Deleting a User

    3.23.1 Purpose

    To delete an existing user that is not used any more

    3.23.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the user to be deleted exists, and is not used any more.

    3.23.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click User Management in the Security Tree to show the user list. From the

    right user list, right-click the user to be deleted, and select Delete from the short-

    57

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    61/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    cut menu, as shown in Fig 3.23 -52.

    Fig 3.23-52 Selecting Delete

    3. The Confirm dialog box pops up. Click Yes to delete this user.

    3.24 Duplicating a User

    3.24.1 Purpose

    To duplicate an existing user to remain all the attributes of this user, except the user

    name. Create a user by duplicating an existing one, thus to save the workload of

    creating a new user directly.

    3.24.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the user to be duplicated exists.

    3.24.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. Click User Management in the Security Tree to show the user list. From the

    right user list, right-click the user to be duplicated, and select Duplicate from the

    short-cut menu, as shown in Fig 3.24 -53.

    58

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    62/86

    Chapter 4 Resource Management

    Fig 3.24-53 Selecting Duplicate

    3. The Create User dialog box pops up. All the parameters are set as same as those

    of the user to be duplicated, except the parameters on the Basic Information

    page. Modify attributes of the user as required.

    4. After the setting is completed, click OK.

    3.25 Finding a User

    3.25.1 Purpose

    The system provides the function of implementing fuzzy query to the user according to

    the user name.

    A fuzzy search is to find an existing user according to partial continuous or all

    characters contained in his/her name.

    3.25.2 Prerequisite

    The user has logged in the OMM server normally. For detailed procedure, refer to.

    3.25.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    Result: The Security Management window appears.

    2. In the User Management interface, click on the toolbar.

    3. The Find dialog box pops up. Input the user name or any continuous characters

    59

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    63/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    contained by this name.

    4. Click Find to start searching. If there is a matched user, this user is highlightedin the user list. Click Find to search the next matched user. If there is no matched

    user, the Message dialog box pops up.

    3.26 Viewing Access Rights of a User

    3.26.1 Purpose

    To view operation and resource authorities of a user. The operation authority refers to

    what kinds of operation that this user can implement. The resource authority refers tothe objects that this user can manipulate.

    3.26.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the user whose access rights are to be viewed exists.

    3.26.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    2. Click the User Management in the Security Tree. From the right user list, right-

    click the user whose access authority is to be viewed, and select Access Right

    from the short-cut menu, as shown in Fig 3.26 -54.

    Fig 3.26-54 Selecting Access Right

    60

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    64/86

    Chapter 4 Resource Management

    3. The Access Right dialog box pops up, as shown in Fig 3.26 -55. The left

    column shows the operation authority of this user, while the right column shows

    the resource authority of this user. When a check box in the Operation Tree or

    the Resource Tree is checked, the user has this authority.

    NOTE: The resource tree shows the NE that can be managed by the user, while

    the operation tree shows the operations that can be performed on the NE

    managed by the user. When different operations are selected in the operation

    tree, different resources will be selected in the resource tree.

    Fig 3.26-55 Viewing Access Rights of a User

    4. Click Close to complete the operation.

    3.27 Managing Login Users

    3.27.1 Purpose

    To view the list of current login users. The administrator can forcefully disconnect

    other users from the OMM server through this function.

    61

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    65/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    3.27.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    2. On the Security Management window, select Tools > Login User Management.

    The Login User dialog box pops up, displaying the list of login users, as shown

    in Fig 3.27 -56.

    Fig 3.27-56 Login User

    3. To disconnect a user, select the user, and click the Kick Out button.

    4. The Confirm dialog box pops up. Click OK to break off the connection.

    Fig 3.27-57 Confirming Disconnecting a User

    62

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    66/86

    Chapter 4 Resource Management

    3.28 Releasing Locked Users

    3.28.1 Purpose

    The condition of an account being locked is set in the user account rule, that is, the

    error times of entering the password. When a user enters a wrong password for the

    specified times, this account is locked. Administrator can view and unlock the lock

    status of users.

    3.28.2 Prerequisite

    The user has logged in the OMM server normally..

    Confirm that this user exists and has been locked.

    3.28.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    2. On the Security Management window, select Tools > View User Lockup

    Records. The View User Lockup Records dialog box pops up, displaying the list

    of locked users, as shown in Fig 3.28 -58.

    Fig 3.28-58 Viewing Lockup Status of Users

    3. Right-click the user to be unlocked, select Unlock from the short-cut menu to

    pop up the confirmation dialog box, as shown in Fig 3.28 -59.

    63

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    67/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Fig 3.28-59 Confirming Unlocking A User

    4. Click Yes to unlock this user. After being unlocked, this user can log in again

    from the original OMM client.

    3.29 Setting the Login IP Range of Administrator

    3.29.1 Purpose

    Because the administrator has the highest operation authority, the administrator login

    can be restricted by setting the login IP range. The administrator can only log in the

    system within the specified IP range. Beyond this specified range, the administrator

    cannot log in the system, even if both username and password are correct.

    3.29.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    2. Click the User Management in the Security Tree. Right-click admin from the

    right user list, and select Modify from the short-cut menu.

    3. Click the Login tab, as shown in Fig 3.29 -60.

    64

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    68/86

    Chapter 4 Resource Management

    Fig 3.29-60 Selecting Login Tab

    4. Click Add to pop up the Set IP Range dialog box. Enter Start Address and End

    Address to set the login IP range for administrator to log in, as shown in Fig

    3.29 -61.

    Fig 3.29-61 Setting the IP Range

    5. Click OK to complete the settings.

    65

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    69/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    3.30 Modifying All Users' Passwords

    3.30.1 Purpose

    To change the password of all the users except administrator to the same one

    3.30.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    2. On the Security Management window, select Tools > Modify All Users

    Password.

    Result: The Modify All Users Password dialog box pops up, as shown in Fig

    3.30 -62.

    Fig 3.30-62 Modifying All Users' Passwords

    3. Enter the new password twice, and click OK to pop up the Message dialog box.

    4. Click OK to complete the modification.

    3.31 Setting Administrator Password Protection

    3.31.1 Purpose

    To set the protection question for the administrator password so that the administrator

    can get it again in the case of forgetting or losing the password

    3.31.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    2. Click the User Management in the Security Tree.

    3. Right-click admin from the right user list, and select Modify from the short-cut

    66

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    70/86

    Chapter 4 Resource Management

    menu.

    4. Click the Advanced Information tab, as shown in Fig 3.31 -63.

    Fig 3.31-63 Setting Password Protection Question

    5. Click the Enable Password Protection check box.

    6. Select the required question from the drop-down list of Question. Enter the

    answer to this selected question.

    NOTE: The answer to the password protection question must be at least four

    characters, and cannot be all the digits or spaces.

    7. Click OK to complete setting a question to protect the administrators password.

    3.32 Creating a Department

    3.32.1 Purpose

    To create a sub-department under the root department or an existing department

    A department is used to perform the administrative management to the users.

    Generated by the system, the root department is the top department, and other

    departments are all the sub-departments of it. The root department cannot be deleted.

    67

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    71/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    3.32.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    2. In the Security Tree, right-click Department Management, and select Create

    Sub-department from the short-cut menu, as shown in Fig 3.32 -64.

    Fig 3.32-64 Selecting Create Sub-department

    3. The Create Department dialog box pops up. Set the Department Name and

    Department Description on the Basic Information page, as shown in Fig 3.32

    -65.

    Fig 3.32-65 Entering Basic Information about a Department

    68

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    72/86

    Chapter 4 Resource Management

    4. Select the Superior Department tab to select a superior department for it, as

    shown in Fig 3.32 -66.

    Fig 3.32-66 Selecting a Superior Department

    5. Click OK to complete the creation of a department, which is displayed in the

    department list.

    3.33 Modifying a Department

    3.33.1 Purpose

    To modify the attributes of a created department except the department name

    3.33.2 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    2. Click the Department Management in the Security Tree. From the right

    department list, right-click the department to be modified, and select Modify

    from the short-cut menu, as shown in Fig 3.33 -67.

    69

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    73/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Fig 3.33-67 Modifying a Department

    3. The Modify Department dialog box pops up, as shown in Fig 3.33 -68. Modify

    the department as required. Table 3.33 -27 shows the contents available for

    modification.

    Fig 3.33-68 Modifying a Department

    Table 3.33-27 Contents Available for Modification

    Tab Contents Available for Modification

    Basic Information The description of the department

    Superior Department Its parent department

    70

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    74/86

    Chapter 4 Resource Management

    4. Click OK to complete the modification.

    3.34 Viewing a Department

    3.34.1 Purpose

    To view the attributes of a created department

    3.34.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the department to be viewed exists.

    3.34.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    2. Click the Department Management in the Security Tree. From the right

    department list, right-click the department to be viewed, and select View from

    the short-cut menu, as shown in Fig 3.34 -69.

    Fig 3.34-69 Viewing a Department

    3. The View Department dialog box pops up. Select the Basic Information tab to

    view Department Name and Department Description.

    4. Select the Superior Department tab to view its superior department.

    5. Click OK to complete the viewing operation.

    71

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    75/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    3.35 Deleting a Department

    3.35.1 Purpose

    To delete an existing department that is not used any more

    The department having users or sub-departments cannot be deleted.

    3.35.2 Prerequisite

    The user has logged in the OMM server normally.

    Confirm that the department to be deleted exists.

    3.35.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    2. Click the Department Management in the Security Tree. Right-click the

    department to be deleted from the right department list, and select Delete from

    the short-cut menu, as shown in Fig 3.34 -69.

    Fig 3.35-70 Deleting a Department

    3. The confirmation dialog box pops up. Click Yes to delete this department.

    3.36 Finding a Department

    3.36.1 Purpose

    The system provides the function of implementing fuzzy query to the department

    according to its name.

    72

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    76/86

    Chapter 4 Resource Management

    A fuzzy search is to find an existing department according to partial continuous or all

    characters contained in its name.

    3.36.2 Prerequisite

    The user has logged in the OMM server normally.

    The user has logged in the OMM server normally.

    3.36.3 Steps

    1. On the main window of the OMM client, select Views > Security Management.

    2. In the Department Management interface, click on the toolbar.

    3. The Find dialog box pops up. Input the department name or any continuous

    characters contained by its name.

    4. Click Find to start searching. If there is a matched department, this department

    is highlighted in the department list. Click Find to search the next matched. If

    there is no matched department, the Message dialog box pops up.

    73

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    77/86

    4 Resource Management

    4.1 Resource Management Introduction

    4.1.1 Description

    The resource management is responsible for managing areas and various resources, and

    adding different resources for the different areas.

    4.1.2 Concepts Involved

    Area: When the large area networking is adopted, the area is that managed by

    the MSCS when it serves as virtual MSC. The area includes common area and

    other areas.

    Resource: A set of various available resources. For specific resource types, see

    the related description in Adding Resources.

    4.2 Resource Management Interface

    4.2.1 Interface

    Select Views > Resource Management to pop up the Resource Management

    window, as shown in Fig 4.2 -71.

    Fig 4.2-71 Resource Management Interface

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    78/86

    Table 4.2-28 Labels in Resource Management Interface

    Label Description

    1 Menu bar

    2 Toolbar

    3 Area tree and resource tree

    4 Status bar

    5 Toolbar in operation window

    6 Operation window

    7 Message area

    4.2.2 Menu Bar

    The menu bar in the Resource Management window consists of six menus, including

    System, Views, Operation, Favorite, Windows, and Help. Table 4.2 -29 shows the

    functions of each menu.

    Table 4.2-29 Functions Provided by Menu Bar of Resource Management

    Menu Item Main Functions

    System Lock Screen, Current User Info, Print Setup, Query

    System Time, System Setting, Logout, and Exit

    Views Daily maintenance, signaling trace, fail observer,performance management, MML terminal, logmanagement, professional maintenance, securitymanagement, system management, and resourcemanagement

    Operation Refresh resource data

    Favorite Fault Management, Log Management, and SystemManagement

    Windows Show/hide toolbar, status bar, and message area, closecurrent view or all views

    Help Help (showing online help), and About (showing software

    version and technical support information)

    4.2.3 Toolbar

    Table 4.2 -30 shows the icons in the toolbar.

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    79/86

    Chapter 4 Resource Management

    Table 4.2-30 Icons in Toolbar

    Icon Description Icon Description

    Home page Daily Maintenance

    Back Signaling Trace

    Forward Fail Observer

    Query System Time Fault Management

    System Setting Performance Management

    Lock Screen MML Terminal

    Current User Info Help

    Print Setup

    4.2.4 Message Area

    The Message Area window consists of two sub-windows, Hint Message and Error

    Message, which display operation results. Table 4.2 -31 shows its main functions.

    Table 4.2-31 Functions of Sub-windows

    Sub-window Main Functions

    Hint Message Showing messages for successful operation, including name and time

    Error Message Prompting messages for unsuccessful operation, including its name,

    time, and probable failure cause

    4.2.5 Status Bar

    The status bar shows the connection status of current client

    4.2.6 Toolbar in Operation Window

    Table 4.2 -32 shows the icons shown in toolbar in the operation window.

    Table 4.2-32 Icons in Toolbar

    Icon Description Icon Description

    Modify resource Delete resource

    Full screen Exit full screen

    77

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    80/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    4.3 Implementing Area Operation

    4.3.1 Purpose

    To add, modify, query, and delete an area node corresponding to virtual MSCS index,

    thus to implement the divisional management on resource devices

    4.3.2 Steps

    1. On the main window of the OMM client, select Views > MML Management.

    2. Implement various operations on the area node through commands.

    4.4 Adding a Resource

    4.4.1 Purpose

    To add resources required by subscribers for different areas

    4.4.2 Steps

    1. In the main interface of the OMM client, select Views > Resource

    Management.

    Result: The Resource Management window appears.

    2. In the Area Tree, under the MSCS office, right-click the area whose resources

    are to be added, and select Add Resource from the short-cut menu, as shown in

    Fig 4.4 -72.

    78

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    81/86

    Chapter 4 Resource Management

    Fig 4.4-72 Adding Resources

    3. The Add Resource dialog box pops up, as shown in Fig 4.4 -73.Table 4.4 -33

    shows parameters in the dialog box.

    Fig 4.4-73 Add Resource Dialog Box

    79

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    82/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Table 4.4-33 Descriptions of Parameters in Resource Management Interface

    Resource Type Key Field Value Range

    ASP ASP ID 1~1024

    AS AS ID 1~128

    M3UA static route ID of M3UA static route 1~128

    MSISDN Zone ID Analysis Result (MSISDN Zone

    ID)

    1~65535

    SIP called numberanalysis selector

    Analyzer entry 1~1000

    SCTP SCTP ID 1~1024

    Location area Location area ID 1~65535

    Signaling linkset Signaling link set ID 1~1024

    Signaling route Signaling route number 1~2000

    Trunk group Trunk group number 1~4000

    Outgoing route Outgoing route number 1~20000

    Outgoing route set Route set number 1~3000

    Outgoing route chain Route chain ID 1~3000

    Number pre analysisselector

    Number pre-analysis selector 1~1000

    Number transfer data Number transformation ID 1~2048

    Number analysis selector Number analysis selector 1~4096

    Number analysis entrance Analyzer entry 1~1000

    Templet of numberanalysis selector

    Template of number analysisselector

    1~65535

    Node topology config Node number allocated toconnected equipment

    1~2048

    CAMEL accesssubscription information

    Camel information indexnumber

    1~255

    Welcome message Welcome message code 1~128

    Emergency call centerindex

    Emergency call center index 1~255

    Voice CODEC template CODEC template ID 1~255

    Adjacent office Adjacent office ID 1~2048

    Automatic re-routingroute set

    Re-routing route set number 1~1000

    Black white list selector Black and white list selector 1~1000

    4. Click Add to add a resource.

    5. Click Confirm to add the resource to the resource list.

    80

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    83/86

    Chapter 4 Resource Management

    Note:

    The resource identifying ranges of different areas cannot overlap.

    4.5 Deleting a Resource

    4.5.1 Purpose

    To delete unnecessary resource

    4.5.2 Steps

    1. In the main interface of the OMM client, select Views > Resource

    Management.

    2. In the Area Tree, right-click the area whose resources are to be deleted, and

    select Delete Resource from the short-cut menu, as shown in Fig 4.5 -74.

    Fig 4.5-74 Deleting a Resource

    3. The Confirm dialog box pops up, as shown in Fig 4.5 -75. ClickYes to delete

    the resource.

    81

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    84/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Fig 4.5-75 Confirming Deletion

    4.6 Modify a Resource

    4.6.1 Purpose

    To modify the value of key field of a resource

    4.6.2 Steps

    1. In the main interface of the OMM client, select Views > Resource

    Management.

    2. In the Area Tree, right-click the area whose resources are to be modified, and

    select Modify Resource from the short-cut menu, as shown in Fig 4.6 -76.

    Fig 4.6-76 Modifying a Resource

    82

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    85/86

    Chapter 4 Resource Management

    3. The Modify Resource dialog box pops up, as shown in Fig 4.6 -77. Modify the

    value of the key field.

    Fig 4.6-77 Modify Resource Dialog Box

    4. Click Confirm to complete modification.

    4.7 Viewing Resource Tree

    4.7.1 Purpose

    To view the assignment of resources in the area

    4.7.2 Steps

    1. In the main interface of the OMM client, select Views > Resource

    Management.

    2. Click Resource Tree to pop up the Resource Tree interface, as shown in Fig

    4.7 -78. The resource tree on the left displays all the resource types, while the

    operation window on the right displays the assignment of various resources in

    the area.

    83

  • 7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc

    86/86

    TN_SM009_E1_0 ZXWN CS Daily Operation

    Fig 4.7-78 Resource Assignment

    3. Delete or modify the resources displayed in the operation window as required