Upload
arun-mishra
View
224
Download
0
Embed Size (px)
Citation preview
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
1/86
ZXWN CS Daily Operation
Course Objectives:
Signaling Trace
Log Management
Security Management
Resource Management
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
2/86
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
3/86
3.13 Creating a Role Set.............................................................................................................................42
3.14 Modifying a Role Set..........................................................................................................................44
3.15 Viewing a Role Set..............................................................................................................................45
3.16 Deleting a Role Set.............................................................................................................................46
3.17 Duplicating a Role Set........................................................................................................................47
3.18 Finding a Role Set...............................................................................................................................48
3.19 Viewing Role Set Assignment.............................................................................................................49
3.20 Creating a User....................................................................................................................................51
3.21 Modifying a User................................................................................................................................54
3.22 Viewing a User....................................................................................................................................56
3.23 Deleting a User....................................................................................................................................57
3.24 Duplicating a User..............................................................................................................................58
3.25 Finding a User.....................................................................................................................................59
3.26 Viewing Access Rights of a User........................................................................................................60
3.27 Managing Login Users........................................................................................................................61
3.28 Releasing Locked Users......................................................................................................................63
3.29 Setting the Login IP Range of Administrator.....................................................................................64
3.30 Modifying All Users' Passwords.........................................................................................................66
3.31 Setting Administrator Password Protection........................................................................................66
3.32 Creating a Department........................................................................................................................67
3.33 Modifying a Department.....................................................................................................................69
3.34 Viewing a Department.........................................................................................................................71
3.35 Deleting a Department........................................................................................................................72
3.36 Finding a Department..........................................................................................................................72
4 Resource Management..............................................................................................................................75
4.1 Resource Management Introduction.....................................................................................................75
4.2 Resource Management Interface...........................................................................................................75
ii
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
4/86
4.3 Implementing Area Operation...............................................................................................................78
4.4 Adding a Resource................................................................................................................................78
4.5 Deleting a Resource..............................................................................................................................81
4.6 Modify a Resource................................................................................................................................82
4.7 Viewing Resource Tree.........................................................................................................................83
iii
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
5/86
1 Signaling Trace
1.1 Signaling Trace Introduction
1.1.1 Description
Signaling trace is used for tracing specific signaling links, analyzing signaling sending
correctness, providing operators with signaling content tracing display, offering
maintenance personnel with convenient method of locating faults, facilitating signaling
flow query in commissioning and debugging, and finding errors in signaling
cooperation for further handling.
1.1.2 Categories
The categories of the MSCS signaling to be traces are as follows.
1. Subscriber signal trace
2. Interface signaling trace (BSSAP, RANAP, MAP, CAP, TUP/ISUP/BICC, CAS,
ISDNL3, and H248)
3. No.7 signaling trace (OMAP, SCCP, and MTP3)
4. SIGTRAN protocol trace (IUA, M3UA, and SCTP)
5. Discard message (MTP3 SNM, MTP3 link, M3UA link, and SCCP).
1.2 Signaling Trace Interface
1.2.1 Interface
Select Views > Signaling Trace to pop up the Signaling Trace window, as shown in Fig
1.2 -1.
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
6/86
Fig 1.2-1 Signaling Trace Interface
Label Description
1 Menu bar
2 Toolbar
3 Signaling Trace tree
4 Status bar
5 Message area
6 Operation window
1.2.2 Menu Bar
The menu bar in the Signaling Trace window consists of seven menus, including
System, Views, Data Window, Sigtrace Operation, Favorite, Windows, and Help. Table
1.2 -1 shows the functions of each menu.
Table 1.2-1 Functions Provided by Menu Bar of Signaling Trace
Menu Item Main Functions
System Lock Screen, Current User Info, Print Setup, Query
System Time, System Setting, Logout, and Exit
Views Daily maintenance, signaling trace, fail observer,performance management, MML terminal, log
management, professional maintenance, securitymanagement, system management, and resource
management
Data Window Cascade, tile, restore all, minimize all, close all
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
7/86
Chapter 4 Resource Management
Menu Item Main Functions
Sigtrace Operation Open data file, query system task, stop all task, set
client parameter, set server parameter, and set decodingparameter
Favorite Fault Management, Log Management, and SystemManagement
Windows Show/hide toolbar, status bar, and message area, closecurrent view or all views
Help Help (showing online help), and About (showing software
version and technical support information)
1.2.3 Toolbar
Table 1.2 -2 shows the icons in the toolbar.
Table 1.2-2 Icons in Toolbar
Icon Description Icon Description
Home page Daily Maintenance
Back Signaling Trace
Forward Fail Observer
Query System Time Fault Management
System Setting Performance Management
Lock Screen MML Terminal
Current User Info Help
Print Setup
1.2.4 Signaling Trace Tree
The signaling trace tree displays NEs in the system. Click the NE node to show types
of the signaling available for tracing.
1.2.5 Message Area
The Message Area window consists of two sub-windows, Hint Message and Error
Message, which display operation results. Table 1.2 -3 shows its main functions.
Table 1.2-3 Functions of Sub-windows
3
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
8/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Sub-window Main Functions
Hint Message Showing messages for successful operation, including its
name and time
Error Message Prompting messages for unsuccessful operation, includingits name, time, and probable failure cause
1.2.6 Status Bar
The status bar shows the connection status of current client
1.3 Setting Signaling Tracing
1.3.1 Purpose
To set the NE on which the signaling tracing will be performed, the tracing type and
corresponding parameters, and then to start the signaling tracing
1.3.2 Prerequisite
The user has logged in the OMM server normally. For detailed procedure, refer to.
1.3.3 Steps
1. On the main window of the OMM client, select Views > Signaling Trace.
Result: The Signaling Trace window appears.
2. In the Signaling Trace tree, double-click the NE to be traced.
3. Double-click the signaling category to expand the node, and then double-click
the signaling type to be traced, as shown in Fig 1.3 -2.
4
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
9/86
Chapter 4 Resource Management
Fig 1.3-2 Selecting Signaling Type to Be Traced
4. The Signaling Trace Task Set dialog box pops up, as shown in Fig 1.3 -3. Set
tracing parameters, or click the icon in the toolbar to set tracing parameters.
NOTE: Tracing parameters vary with different signaling tracing types. For
detailed signaling trace types and corresponding parameters, refer to Table 1.3
-4.
5
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
10/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Fig 1.3-3 Setting Tracing Parameters
5. Click OKto complete setting signaling tracing parameters. The system starts to
trace the signaling. The tracing result will automatically displays in the
operation window, as shown in Fig 1.3 -4.
Fig 1.3-4 Starting to Trace Signaling
1.3.4 Reference
Table 1.3 -4 shows MSCS signaling tracing types and their parameters
6
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
11/86
Chapter 4 Resource Management
Table 1.3-4 MSCS Signaling Tracing Types and Their Parameters
Signaling Tracing Type Parameter
Discard Message Including MTP3 SNM, MTP3 link, M3UA link, and SCCP
Subscriber signal trace Primary settings: set the tracing number and objects.
Advanced settings: set mission types, timing, and preservation.
BSSAP Signaling Trace Primary settings: set BSC office, module number, and message type
(including L3 message and BSSAP message).
Advanced settings: set timing and preservation.
RANAP signaling trace Primary settings: set RNC office, module number, and message type
(including L3 message and RANAP message).
Advanced settings: set timing and preservation.
MAP signaling trace Primary settings: set trace number, module number, and message type.
Advanced settings: set timing and preservation.
CAP signaling trace Primary settings: set GT number, module number, and message type.
Advanced settings: set timing and preservation.
TUP/ISUP/BICC
interface signaling trace
Primary settings: set office number and module number.
Advanced settings: set timing and preservation.
CAS signaling trace -
ISDNL3 interface
signaling trace
-
H248 signaling trace Primary settings: set trace type, module number, user-input
information, and user information list.
Advanced settings: set timing and preservation.
OMAP No.7 signaling
trace
Primary settings: set the type and the direction
Advanced settings: set timing and preservation.
SCCP signaling trace Primary settings: select modules and subsystems.
Advanced settings: set timing and preservation.
MTP3 signaling trace Primary settings: set direction, tracing options, and links
Advanced settings: set timing and preservation.
IUA signaling trace -
M3UA signaling trace Primary settings: set direction, tracing options, and association IDs.Advanced settings: set timing and preservation.
SCTP signaling trace Primary settings: set tracing type, by module number or by association.
Advanced settings: set timing and preservation.
.
7
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
12/86
2 Log Management
2.1 Log Management Introduction
2.1.1 Description
The log management provides the function of querying the system running log. It
enables to get the information about the operation and login status of users, and the
information about the complete condition of the timing tasks of the server.
The log falls into the operation log, security log, and system log. Users can query,
export, and print these three types of log.
2.1.2 Type
There are three types of logs.
1. Operation log
It records the information about user operations, including the log ID, operationrank, user name, module, operation set, host address, command function,
detailed information, operation result, failed reason, connection mode, operation
resource, operation start time, operation end time, and related log.
2. Security log
It records the information about user login status, including the log ID, user
name, host address, log name, operation time, connection mode, and detailed
information.
3. System log
It records the complete condition of the timing tasks of the server, including the
log ID, rank, source, log name, detailed information, host address, operation
start time, operation end time, and related log.
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
13/86
2.2 Log Management Interface
2.2.1 Interface
Select Views > Log Management to pop up the Log Management window, as shown in
Fig 2.2 -5.
Fig 2.2-5 Log Management Interface
Table 2.2-5 Labels in Log Management Interface
Label Description
1 Menu bar
2 Toolbar
3 Log tree
4 Message area
5 Status bar
6 Toolbar in operation window
7 Operation window
2.2.2 Menu bar
The menu bar in the Log Management window consists of six menus, including
System, Views, Operation, Favorite, Windows, and Help. Table 2.2 -6 shows the
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
14/86
Chapter 4 Resource Management
functions of each menu.
Table 2.2-6 Functions Provided by Menu Bar of Log Management
Menu Item Main Functions
System Lock Screen, Current User Info, Print Setup, Query System Time, System
Setting, Logout, and Exit
Views Daily Maintenance, Signaling Trace, Fail Observer, Performance
Management, MML Terminal, Log Management, Professional Maintenance,
Security Management, System Management, and Resource Management
Operation Run, Edit, Export Query, Save as, Refresh Current Tab Page, Export Result,
and Print Result
Favorite Fault Management, Log Management, and System Management
Windows Show/hide toolbar, status bar, and message area, close current view or all
views
Help Help (showing online help), and About (showing software version and
technical support information)
2.2.3 Toolbar
Table 2.2 -7 shows the icons in the toolbar.
Table 2.2-7 Icons in Toolbar
Icon Description Icon Description
Home page Daily Maintenance
Back Signaling Trace
Forward Fail Observer
Query System Time Fault Management
System Setting Performance Management
Lock Screen MML Terminal
Current User Info Help
Print Setup
2.2.4 Log Tree
The Log Tree shows the log types available for viewing, including Operation Log,
11
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
15/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Security Log, and System Log.
2.2.5 Message Area
The Message Area window consists of two sub-windows, Hint Message and Error
Message, which display operation results. Table 2.2 -8 shows its main functions.
Table 2.2-8 Functions of Sub-windows
Sub-window Main Functions
Hint Message Showing messages for successful operation, including itsname and time
Error Message Prompting messages for unsuccessful operation,including its name, time, and probable failure cause
2.2.6 Status Bar
The status bar shows the connection status of current client.
2.2.7 Toolbar in Operation Window
Table 2.2 -9 shows the icons shown in the toolbar in the operation window.
Table 2.2-9 Icons Shown in Toolbar
Icon Description Icon Description
Refresh Current Tab Page First Page
Previous Page Next Page
Last Page Go to Page
Query and Export ResultAccording to Current
Condition
Query and Print Result Accordingto Current Condition
Customize DisplayColumns
Edit Query Condition
Save Query Condition As Find
2.2.8 Operation Window
The operation window shown here varies with different operations performed in the
Log Management window, including:
12
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
16/86
Chapter 4 Resource Management
1. Querying logs
2. Exporting logs
3. Print logs
2.3 Querying Logs
2.3.1 Purpose
To query the log records of the OMM system
Note:This section takes the operation logs for example to describe the procedure for
querying logs. You can use similar method to query security and system logs.
2.3.2 Prerequisite
The user has logged in the OMM server normally. For detailed procedure, refer to.
2.3.3 Steps
1. On the main window of the OMM client, select Views > Log Management.
Result: The Log Management window appears.
2. Right-click the All Operation Log below the Operation Log node, select Edit
from the short-cut menu, as shown in Fig 2.3 -6.
Fig 2.3-6 Editing Query Conditions
13
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
17/86
TN_SM009_E1_0 ZXWN CS Daily Operation
3. Set query conditions in the Query Operation Log dialog box, consisting two
tabs, Basic and Advanced, as shown in Fig 2.3 -7.
Fig 2.3-7 Query Operation Log
Table 2.3-10 Parameter Description
Name Descriptions
User
information
Selecting to match the user information exactly by user name
or by host address
Operationstart time
Selecting the check box to set the log-generating time forquerying the operation records; not selecting the check box
means to query operation records from the first log to the lastlog.
OperationInformation
Selecting to query operation logs by user name or byoperation objects
When selecting the check box followed by Operation, the
Select button is activated. Click Select to choose the operator.When selecting the check box followed by Operation
Resource, the Select button is activated. Click Select tochoose the operation objects.
14
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
18/86
Chapter 4 Resource Management
Name Descriptions
Operation
result
Including: All, Successful Operation, Failed Operation, and
Unfinished Operation
Connectionmode
Including: All, GUI, TELNET, NDF, CORBA, WEB, and SNMP
Rank Including: All, 1-VERY IMPORTANT, 2-IMPORTANT, 3-NOTICE,
and 4-NORMAL
4. After the setting is completed, clickOK. The query result is displayed in the log
list, as shown in Fig 2.3 -8.
Fig 2.3-8 Query Result
5. If there are several pages showing the queried logs, click to view the next
page, or click to view the previous page, click to view the first page,
click to view the last page, and click to go to the specified page.
2.3.4 Optional Operation
1. To query todays operation log information, clickToday Operation Log below
the Operation Log node. The other operations are the same as that of querying
all operation logs.
2. If there is no need to modify query conditions, there are two methods to query
logs.
1) Double-click the node to be queried.
15
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
19/86
TN_SM009_E1_0 ZXWN CS Daily Operation
2) Right-click this node and then select Run from the short-cut menu to query logs.
2.4 Exporting Logs
2.4.1 Purpose
To export the queried log result and to save the result in the file format of *.txt, *.html,
*.pdf, *.csv, and *.xls
2.4.2 Prerequisite
1. The user has logged in the OMM server normally. For detailed procedure, refer
to.
2. Confirm that the logs to be exported are queried. For the operation method, refer
to Querying Logs.
2.4.3 Steps
1. On the window displaying the query result shown in Fig 2.3 -8, click the
button on the toolbar, or select Operation > Export Result to pop up the Save
dialog box, as shown in Fig 2.4 -9.
Fig 2.4-9 Exporting and Saving Logs
2. Set the save position, file format, and file name, clickSave. The Message dialog
box pops up, prompting that the logs are exported successfully.
16
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
20/86
Chapter 4 Resource Management
3. Click OKto complete exporting logs.
2.5 Printing Logs
2.5.1 Purpose
To print queried logs
2.5.2 Prerequisite
1. The user has logged in the OMM server normally. For detailed procedure, refer
to.
2. Confirm that the logs to be exported are queried. For the operation method, refer
to Querying Logs.
2.5.3 Steps
1. On the window displaying the queried logs shown in Fig 2.3 -8, click the
button on the toolbar, or select Operation > Print Result to pop up the Print
Setup dialog box, as shown in Fig 2.5 -10.
Fig 2.5-10 Print Setup
Table 2.5-11 Parameter Descriptions for Each Tab
17
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
21/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Tab Parameter
General Setting the printer name, print range (including printing all
the pages, and selecting several required pages), and thenumber of copies
Page Setup Setting page size, orientation, and margins
Advance Setting the printing style
2. Click the Preview All button to view the printing effect. Click Print to start
printing logs.
18
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
22/86
3 Security Management
3.1 Security Management Introduction
3.1.1 Functions
Security management aims to ensure the legitimate use of the system by users. Security
management implements the management to the role/role set, user, and department,
and provides the security control to the operators so that they can conduct security
management operations through reasonable relationship between the user and the role
as well as the corresponding operation authority. Through the login authentication, this
function can prevent illegal users from entering the system and implement the security
control over the operations of the operator.
3.1.2 Concepts Involved
1. Role
The role assigns users managerial authority by defining the operation and
resource authority. The operation authority defines the functional modules of the
NMS that can be operated by a certain user. The resource authority defines the
subnet or the specific NEs under the subnet that can be managed by a certain
user.
The operation authority and the resource authority separately define two aspects
of a role. Both of them are independent from each other when a role is defined.
The authority set corresponding to a role is the intersection set of them during
the usage.
2. Role set
The role set is the set of several roles. The authority of a role set is the authority
set of all its roles.
Using the role set facilitates system administer or subnet administer to allocate
the authority. The user authority of an administrator usually is the set of the
managerial authorities of multiple common users. Granting a role set to an
administrator directly is as same as granting all roles in this role set to the
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
23/86
administrator. In this way, the role set facilitates the management and allocation
of the user authority.
3. User
User is the set of the operators who log in and operate the NMS. While creating
a user, system administrator defines the operation authority of this user by
defining a role or a role set, and sets the administration by defining the
department to which the user belongs.
4. Department
A department is the simulation of a service department to facilitate the
organization and management of users. The new added user must belong to a
certain department.
5. Creator
A creator is a user, who can create new role, role set, user, and department. For
these new added role, role set, user, and department, the user who creates them
is the creator.
Because a creator is a user, too, the creator (except admin) identity is also
created by another creator. Ultimately, all users are created by admin. Therefore,
a creator tree is formed, ranging from the admin to the current creator.
Only a user logging in the system with a creator or a creator whose node is the
parent node of the current creator on the creator tree can edit, delete, and copy a
role, role set, user, and department. Otherwise, this user can only implement
such operations as creating, searching, refreshing, viewing assignment
information.
3.2 Security Management Interface
3.2.1 Interface
Select Views > Security Management to pop up the Security Management window, as
shown in Fig 3.2 -11.
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
24/86
Chapter 4 Resource Management
Fig 3.2-11 Security Management Interface
Table 3.2-12 Labels in Security Management Interface
Label Description
1 Menu bar
2 Toolbar
3 Security tree
4 Status bar
5 Message area
6 Operation window
3.2.2 Menu bar
The menu bar in the Security Management window consists of six menus, including
System, Views, Operation, Tools, Favorite, Windows, and Help. Table 3.2 -13 shows
the functions of each menu.
Table 3.2-13 Functions Provided by Menu Bar of Security Management
Menu Item Main Functions
System Lock Screen, Current User Info, Print Setup, Query SystemTime, System Setting, Logout, and Exit
Views Daily maintenance, signaling trace, fail observer,performance management, MML terminal, log management,professional maintenance, security management, system
management, and resource management
21
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
25/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Menu Item Main Functions
Operation Create role/role set/user/department, modify role/role
set/user/department, view role/role set/user/department,delete role/role set/user/department, and duplicate role/roleset/user
Tools View operation tree, view user lockup records, login usermanagement, customize user account rule, customizesecurity event rule, modify all users password, export roleoperation (s) information, and import role operation (s)information
Favorite Fault Management, Log Management, and SystemManagement
Windows Show/hide toolbar, status bar, and message area, close
current view or all views
Help Help (showing online help), and About (showing softwareversion and technical support information)
3.2.3 Toolbar
Table 3.2 -14 shows the icons in the toolbar.
Table 3.2-14 Icons in Toolbar
Icon Description Icon Description
Home page Daily Maintenance
Back Signaling Trace
Forward Fail Observer
Query System Time Fault Management
System Setting Performance Management
Lock Screen MML Terminal
Current User Info Help
Print Setup
3.2.4 Security tree
The security tree shows the relevant operations of security management, including
Role Management, Role Set Management, User Management, and Department
Management.
22
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
26/86
Chapter 4 Resource Management
3.2.5 Message area
The Message Area window consists of two sub-windows, Hint Message and Error
Message, which display operation results. Table 3.2 -15 shows its main functions.
Table 3.2-15 Functions of Sub-windows
Sub-window Main Functions
Hint Message Showing messages for successful operation, including its
name and time
Error Message Prompting messages for unsuccessful operation, includingits name, time, and probable failure cause
3.2.6 Status Bar
The status bar shows the connection status of current client
3.2.7 Toolbar in Operation Window
Table 3.2 -16 shows the icons shown in the toolbar in the operation window.
Table 3.2-16 Icons Shown in Toolbar
Icon Description Icon Description
Refresh role/roleset/user/department
View role/roleset/user/department
Modify role/role
set/user/department
Find
Delete role/roleset/user/department
Export role operation(s)information
Create role/roleset/user/department
3.2.8 Operation Window
The operation window shown here varies with different operations performed in the
Security Management window, including:
Customizing user account rule
Viewing operation tree
Customizing security event rule
Role management
23
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
27/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Role set management
Department management.
3.3 Customizing a User Account Rule
3.3.1 Purpose
Customizing a user account rule is to set the password length, password policy, account
restriction, and expiration examination.
3.3.2 Prerequisite
The user has logged in the OMM server normally.
The user can open the Security Management window.
3.3.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Select Tools > Customize User Account Rule to pop up the Customize UserAccount Rule window, as shown in Fig 3.3 -12. Table 3.3 -17 describes the
settings of partial parameters.
24
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
28/86
Chapter 4 Resource Management
Fig 3.3-12 Security Policy Management
Table 3.3-17 Descriptions of Partial User Account Parameters
Name DescriptionsDefault
Value
Enable WeakPassword Check
Activating the rule of weal passwordcheck, which defines that the passwordcannot be empty or only contain letters orFigs, that the password cannot be the
same as the username or telephonenumber of the user, that the passwordcannot be the twice repeats of theusername or the telephone number, thatthe password cannot be the username ortelephone number in reverse.
None
Min length The minimal length of a password,ranging from 0 to 20
0
Max length The maximal length of a password,ranging from 2 to 20
20
25
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
29/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Name DescriptionsDefault
Value
Lock Rule Including Never lock, Lock permanently,and Lock temporary
Set the lock rule when selecting to lockthe account. It includes password error
times, and locking duration.
Passwordenteringerror=3
Duration of
beinglocked=24
hour
Expired accountchecking
Reminding the user to replace the accountbefore it expires
0 day
Expired PasswordChecking
Setting the time to remind the user tochange the password before it expires,which enhances the system security
0 day
3. Click OK to complete the settings.
3.4 Viewing an Operation Tree
3.4.1 Purpose
Viewing an operation tree is to get know the operation authority of the current login
user and the description of each operation.
3.4.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Select Tools > View Operation Tree to pop up the View Operation Tree window,
as shown in Fig 3.4 -13.
26
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
30/86
Chapter 4 Resource Management
Fig 3.4-13 Viewing Operation Tree
3. Expand an operation node in the Operation Tree column. The detailed
information about this operation is displayed on the right Operation Description
column.
Example: Click the Global node, the corresponding operation information is
displayed in the right column, as shown in Fig 3.4 -14.
Fig 3.4-14 Viewing an Operation Tree
27
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
31/86
TN_SM009_E1_0 ZXWN CS Daily Operation
4. Click Close to complete the viewing operation.
3.5 Customizing a Security Event Rule
3.5.1 Purpose
Customizing a security event rule is to set the conditions of recording the security
event log thus to help the system administrator get to know the usage condition of the
user accounts and manage the user accounts effectively.
3.5.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Select Tools > Customizing Security Event Rule.
Result: The Customize Security Event Rule dialog box pops up, as shown in Fig
3.5 -15. For parameter descriptions, refer to Table 3.5 -18.
Fig 3.5-15 Customizing a Security Event Rule
Table 3.5-18 Parameter Descriptions for the Security Event Rule
Item Descriptions
Record on security log when
user is locked/unlocked
Recording this event on the security event
log when locking or unlocking a user
Record on security log whenuser is disabled/enabled
Recording this event on the security eventlog when disabling or enabling a user
Record on security log whenauthentication fails
Recording this event on the security eventlog when the subscriber access does notpass the authentication
28
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
32/86
Chapter 4 Resource Management
3. Select the check box followed by each rule of security events as required.
4. Click OK to complete the settings, or click Cancel to cancel the operation.
3.6 Creating a Role
3.6.1 Purpose
To create a new role and to assign a certain operation and resource authority so as to
define the authority of a user
3.6.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Right-click Role Management in the Security Tree in the Security Management
window, and select Create Role, as shown in Fig 3.6 -16.
Fig 3.6-16 Selecting Create Role
3. The Create Role dialog box pops up. On the Basic Information page, enter Role
Name and Role Description, as shown in Fig 3.6 -17.
29
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
33/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Fig 3.6-17 Entering Basic Information of a Role
Table 3.6-19 Description of Basic Information Tab
Parameter Notes Default
Role name The name of a role
You must input a unique name
Null
Roledescription
The description information about a role
Optional
Null
Lock therole
Setting whether to lock this role
Optional, a user assigned with this role will not ownthe corresponding permissions of this role after thisrole is locked.
None
4. Select the Access Rights tab. Set the operation authority of this role on the
Operation Tree, and the resource authority on the Resource Tree, as shown in
Fig 3.6 -18. Or, select the pre-defined scheme of the authority assignment from
the drop-down list of the Operations Assignment. Table 3.6 -20 introduces each
assignment scheme.
30
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
34/86
Chapter 4 Resource Management
Fig 3.6-18 Setting Access Rights about a Role
Table 3.6-20 Scheme Description of Predefined Authority Assignment
Name Descriptions
Power user Implementing all the functions of log management, securitymanagement, fault management, system management, MML
terminal, daily maintenance, professional maintenance,performance management, bill security management, devicemaintenance, and resource management
Maintenanceperson
Implementing partial functions of security management
Implement all the functions of log management, faultmanagement, and system management
Operator Implementing partial functions of security management, andsystem management,
Implement all the functions of log management, and faultmanagement
Supervisor Implement partial functions of security management, fault
management, and system managementImplementing all the functions of log management
5. Select the Login Address tab to set the IP address range of the OMM client that
this role can use. Click Add to pop up the Set IP Range dialog box, as shown in
Fig 3.6 -19. Set the start address and the end address. If it is not set, there is no
address limitation for the user belonging to this role.
31
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
35/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Fig 3.6-19 Setting IP Range
6. Click the User tab to assign this role to existing users, or to no one (the role
without being assigned is useless temporarily), as shown in Fig 3.6 -20.
Fig 3.6-20 Assigning a Role to Users
Note:The new role cannot be assigned to cguser and cgadmin, the default users of the
system, for modifying the authority of default user is not allowed.
7. Click OK to complete the creation of a role.
3.6.3 Result
The new role is displayed in the role list, as shown in Fig 3.6 -21.
32
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
36/86
Chapter 4 Resource Management
Fig 3.6-21 Showing New Role
3.7 Modifying a Role
3.7.1 Purpose
To modify attributes of a created role. All attributes of a role can be modified except
the role name.
3.7.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click the Role Management in the Security Tree. From the right role list, right-
click the role to be modified, and select Modify from the short-cut menu, as
shown in Fig 3.7 -22.
33
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
37/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Fig 3.7-22 Modifying a Role
3. The Modify Role dialog box pops up, as shown in Fig 3.7 -23. Modify Role
Description on the Basic Information page.
Fig 3.7-23 Modifying Basic Information about a Role
4. Select the Access Rights tab to modify the scheme of the Operations
Assignment, or to select the required operations on the Operation Tree directly,
as shown in Fig 3.7 -24.
34
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
38/86
Chapter 4 Resource Management
Fig 3.7-24 Modifying Access Rights about a Role
5. Select the Login Address tab to add, modify, and delete the range of the IP
address for login, as shown in Fig 3.7 -25.
Fig 3.7-25 Modifying the Range of IP Address
6. Select the User tab to modify the user belonging to this role, as shown in Fig
3.7 -26.
35
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
39/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Fig 3.7-26 Modifying User Information
7. Click OK to complete the modification.
3.8 Viewing a Role
3.8.1 Purpose
To view the properties of a created role
3.8.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the role to be viewed has been created. For operation method, refer
to Creating a Role.
3.8.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click the Role Management in the Security Tree. From the right role list, right-
click the role to be viewed, and select View from the short-cut menu, as shown
in Fig 3.8 -27.
36
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
40/86
Chapter 4 Resource Management
Fig 3.8-27 Viewing a Role
Result: The View Role dialog box pops up, as shown in Fig 3.8 -28.
For the description of each page, refer to Table 3.8 -21.
Fig 3.8-28 Viewing Properties of a Role
Table 3.8-21 Page Descriptions of the View Role
Page Name Parameter Description
BasicInformation
Role Name, Role Description The name and descriptionof a role
Access Rights Predefined operationassignment, Operation Tree,Resource Tree
Operation authority of arole
37
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
41/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Page Name Parameter Description
Login Address Login Address The range of the IP
address for the user ofthis role to log in theOMM client
User User The user belonging to thisrole
3. Click OK to complete the viewing operation.
3.9 Deleting a Role
3.9.1 Purpose
To delete an existing role that is not used any more. The role that has been assigned to
users cannot be deleted.
3.9.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the role to be deleted exists, and is not used any more.
Confirm there is no user belonging to this role.
3.9.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click the Role Management in the Security Tree. From the right role list, right-
click the role to be deleted, and select Delete from the short-cut menu, as shown
in Fig 3.9 -29.
38
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
42/86
Chapter 4 Resource Management
Fig 3.9-29 Deleting a Role
3. The Delete Role dialog box pops up. Click Yes to complete deleting this role.
3.10 Duplicating a Role
3.10.1 Purpose
To create a role having the same attributes of the role to be duplicated, except the role
name
3.10.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the role to be duplicated exists.
3.10.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click Role Management in the Security Tree. From the right role list, right-click
the role to be duplicated, and select Duplicate from the short-cut menu, as
shown in Fig 3.10 -30.
Fig 3.10-30 Duplicating a Role
3. The Create Role dialog box pops up. The attributes of the role is as same as that
of the duplicated role, except Role Name. Modify the role attributes on each
39
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
43/86
TN_SM009_E1_0 ZXWN CS Daily Operation
page according to actual requirements. For the description of each page, refer to
Table 3.10 -22.
Table 3.10-22 Description of Role Duplication
Page Name Parameter Description
Basic
Information
Role Description Role description
Access Rights Predefined operationassignment, Operation Tree,
Resource Tree
Operation authority of a role
Login Address Login Address The range of the IP address
used by the user of this roleto log in the OMM client
User User The user belonging to thisrole
4. After the setting is completed, click OK.
3.11 Finding a Role
3.11.1 Purpose
To implement a fuzzy search to the role according to the role name
A fuzzy search is to find a role according to partial continuous or all characters
contained in its name.
3.11.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. In the Role Management interface, click on the toolbar.
3. The Find dialog box pops up. Input the role name or any continuous characters
contained by the role name, as shown in Fig 3.11 -31.
40
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
44/86
Chapter 4 Resource Management
Fig 3.11-31 Entering Role Name to be Found
4. Click Find to start searching. If there is a matched role, this role is highlighted in
the role list. Click Find to search the next matched role. If there is no matched
role, the Message dialog box pops up, as shown in Fig 3.11 -32.
Fig 3.11-32 Prompting no Matched Role
3.12 Viewing Role Assignment Information
3.12.1 Purpose
To view the assignment and usage condition of a role among the users and role sets.
3.12.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the role to be viewed exists.
3.12.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click the Role Management in the Security Tree. From the right role list, right-
click the role whose assignment condition is to be viewed, and select
41
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
45/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Assignment from the short-cut menu, as shown in Fig 3.12 -33.
Fig 3.12-33 Selecting Assignment
3. The Role Assignment dialog box pops up. View the users belonging to this role
on the Assigned User page, and the role set of this role on the Assigned Role Set
page, as shown in Fig 3.12 -34.
Fig 3.12-34 Viewing Assignment Condition of a Role
3.13 Creating a Role Set
3.13.1 Purpose
To create a new role set and to assign one or more roles to this role set
42
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
46/86
Chapter 4 Resource Management
3.13.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Right-click Role Set Management in the Security Tree in the Security
Management window, and select Create Role Set, as shown in Fig 3.13 -35.
Fig 3.13-35 Selecting Create Role Set
3. The Create Role Set dialog box pops up. On the Basic Information page, enter
Role Set Name and Role Set Description, and set whether to lock this role set, as
shown in Fig 3.13 -36.
Fig 3.13-36 Entering Basic Information about a Role Set
43
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
47/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Table 3.13-23 Description of Basic Information Tab
Parameter Notes Default
Role set name The name of a role set
You must input a unique name
Null
Role setdescription
The description information about a role set
Optional
Null
Lock the role set Setting whether to lock this role set
Optional
None
4. Select the Assign Roles tab, and assign the role set to roles, as shown in Fig
3.13 -37.
Fig 3.13-37 Assigning a Role to Role Set
5. Click OK to complete the creation of a role set. The new role set is displayed in
the role set list.
3.14 Modifying a Role Set
3.14.1 Purpose
To modify attribute parameters of an existing role set
44
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
48/86
Chapter 4 Resource Management
3.14.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the role set to be modified exists.
3.14.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click the Role Set Management in the Security Tree. From the right role set list,
right-click the role set to be modified, and select Modify from the short-cut
menu, as shown in Fig 3.14 -38.
Fig 3.14-38 Selecting Modify from Short-cut Menu
3. The Modify Role Set dialog box pops up.
Change its description and select whether to lock it on the Basic Information
page.
Assign a role to it on the Assign Roles page.
4. Click OK to complete the modification.
3.15 Viewing a Role Set
3.15.1 Purpose
To view attributes of a created role set
45
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
49/86
TN_SM009_E1_0 ZXWN CS Daily Operation
3.15.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the role set to be viewed exists.
3.15.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click the Role Set Management in the Security Tree. From the right role set list,
right-click the role set to be viewed, and select View from the short-cut menu, as
shown in Fig 3.15 -39.
Fig 3.15-39 Selecting View from Short-cut Menu
3. The View Role Set dialog box pops up. View the Role Set Name, Role Set
Description, and its lock status on the Basic Information page. View available
roles and assigned roles on the Assign Roles page.
4. Click OK to complete viewing.
3.16 Deleting a Role Set
3.16.1 Purpose
To delete an existing role set that is not used any more. The role set that has been
assigned to users cannot be deleted, but the role set that has been assigned to roles can
be deleted.
46
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
50/86
Chapter 4 Resource Management
3.16.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the role set to be deleted exists, and is not used any more.
3.16.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click the Role Set Management in the Security Tree. From the right role set list,
right-click the role set to be deleted, and select Delete from the short-cut menu,
as shown in Fig 3.16 -40.
Fig 3.16-40 Selecting Delete from Short-cut Menu
3. The confirmation dialog box pops up. Click Yes to delete the role set.
3.17 Duplicating a Role Set
3.17.1 Purpose
To create a role set with the same attributes of the role set to be duplicated, except the
name of the role set
3.17.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the role set to be duplicated exists.
47
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
51/86
TN_SM009_E1_0 ZXWN CS Daily Operation
3.17.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click the Role Set Management in the Security Tree. From the right role list,
right-click the role set to be duplicated, and select Duplicate from the short-cut
menu, as shown in Fig 3.17 -41.
Fig 3.17-41 Selecting Duplicate from the Short-cut Menu
3. The Create Role Set dialog box pops up. The attributes of the role set is as same
as that of the duplicated role set, except the Role Set Name. Modify the role set
attributes on each page as required.
4. After the setting is completed, click OK.
3.18 Finding a Role Set
3.18.1 Purpose
To implement a fuzzy search on the role set according to its name.
A fuzzy search is to find an existing role set according to partial continuous or all
characters contained in its name.
3.18.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
48
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
52/86
Chapter 4 Resource Management
2. In the Role Set Management interface, click on the toolbar.
3. The Find dialog box pops up. Input the role set name, or any continuouscharacters contained by the role name, as shown in Fig 3.18 -42.
Fig 3.18-42 Finding A Role Set
4. Click Find to start searching. If there is a matched role set, this role set is
highlighted in the role set list. Click Find to search the next matched role set. If
there is no matched role set, the Message dialog box pops up.
3.19 Viewing Role Set Assignment
3.19.1 Purpose
To view the assignment and usage condition of a role set among the users. The role set
is the set of a group of roles. A defined role set can be assigned to the users with
corresponding permissions.
3.19.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the role set to be viewed exists.
3.19.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click the Role Set Management in the Security Tree. From the right role set list,
right-click the role set whose assignment condition is to be viewed, and select
Assignment from the short-cut menu, as shown in Fig 3.19 -43.
49
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
53/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Fig 3.19-43 Selecting Assignment from the Short-cut Menu
3. The Role Set Assignment dialog box pops up. The Assigned User page displays
users belonging to this role set, as shown in Fig 3.19 -44.
Fig 3.19-44 Viewing Assignment Condition of a Role Set
4. Click Close to complete the operation.
50
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
54/86
Chapter 4 Resource Management
3.20 Creating a User
3.20.1 Purpose
To create a new user with a certain operation authority assigned through a role or role
set
3.20.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Right-click User Management in the Security Tree on the Security Management
window, and select Create User, as shown in Fig 3.20 -45.
Fig 3.20-45 Selecting Create User from Short-cut Menu
3. The Create User dialog box pops up. Set the basic information about this user, as
shown in Fig 3.20 -46. For parameter description, refer to Table 3.20 -24.
51
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
55/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Fig 3.20-46 Entering Basic Information about a User
Table 3.20-24 Description of Parameters on Basic Information Page
Parameter Descriptions
User name The name of a userFull name The full name of a user
User Password Setting the user password according to the user accountrule customized in the Security Policy Management
Verify Password Entering the password the same as that entered in theUser Password edit box
User Description Providing proper description about the user for betterunderstanding
Phone Number Setting users phone number to send the short message
to notify this user when an alarm is forwarded
Email Setting users Email address to send the Email to notifythis user when an alarm is forwarded
User Status Showing the creator, creation time, and passwordactivation time of this user
4. Click the Advanced Information tab, as shown in Fig 3.20 -47. For parameter
description, refer to Table 3.20 -25.
52
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
56/86
Chapter 4 Resource Management
Fig 3.20-47 Entering Advanced Information about a User
Table 3.20-25 Description of Parameters on Advanced Information Page
Parameter Descriptions
User Valid Day(s) Setting valid days of an account, ranging from 1 to 500;Setting or viewing working time of the user
Password Control Setting valid days of a password, ranging from 1 to 500;
Setting that user must modify the password before nextlogin or cannot change the password
Disable and Logout The system will automatically disable this user when
he/she does not log in the system in specified days.
The system automatically logs out when it is inactive inspecified minutes.
Number of Logins Setting the maximum number of users concurrentlyonline, including NDF, GUI, TELNET, and WEB, ranging
from 0 to 99, with default value as 10
5. Click the Role tab to assign a role or role set to the user, as shown in Fig 3.20
-48.
Note:A junction node stands for a role set, while a node stands for a role.
When a user is assigned with roles or role sets, he/she is authorized with operating
permissions of the specified role or role set.
53
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
57/86
TN_SM009_E1_0 ZXWN CS Daily Operation
If a user is not assigned with a role or role set, he/she is not allowed to log in the
system.
Fig 3.20-48 Assigning Role/Role Set to a User
6. Click the User Department tab to assign a department to the user.
7. Click OK to complete the creation of a user. The new user is displayed in the
user list.
3.21 Modifying a User
3.21.1 Purpose
To modify the attributes of an existing user, except the user name
3.21.2 Prerequisite
The user has logged in the OMM server normally..
Confirm that the user to be modified exists.
3.21.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
54
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
58/86
Chapter 4 Resource Management
2. Click the User Management in the Security Tree to show the user list. Right-
click the user to be modified from the right user list, and select Modify from the
short-cut menu, as shown in Fig 3.21 -49.
Fig 3.21-49 Selecting Modify from short-cut menu
3. The Modify User dialog box pops up, as shown in Fig 3.21 -50. Modify the
attributes as required. For parameter descriptions, see Table 3.21 -26.
Fig 3.21-50 Modifying a User
Table 3.21-26 Parameters Available for Modification
55
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
59/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Tab Contents Available for Modification
Basic Information Modify parameters such as full name, user password,
user description, phone number, Email
AdvancedInformation
Modifying parameters, such as user valid day(s),password control, disable and logout, and number oflogins
Role Modifying the role or role set belonged to the user
User Department Modifying the department belonged to the user
4. Click OK to complete the modification.
3.22 Viewing a User
3.22.1 Purpose
To view the attributes of an existing user
3.22.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the user to be viewed exists.
3.22.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click the User Management in the Security Tree. From the right user list, right-
click the user to be viewed, and select View from the short-cut menu, as shown
in Fig 3.22 -51.
56
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
60/86
Chapter 4 Resource Management
Fig 3.22-51 Selecting View
3. In the popup View User dialog box, view the attributes of this user by selecting
each tab.
NOTE: The User Status area on the Basic Information page shows some
information of this user, such as creator, creation time, and password activation
time.
4. Click OK to complete viewing.
3.23 Deleting a User
3.23.1 Purpose
To delete an existing user that is not used any more
3.23.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the user to be deleted exists, and is not used any more.
3.23.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click User Management in the Security Tree to show the user list. From the
right user list, right-click the user to be deleted, and select Delete from the short-
57
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
61/86
TN_SM009_E1_0 ZXWN CS Daily Operation
cut menu, as shown in Fig 3.23 -52.
Fig 3.23-52 Selecting Delete
3. The Confirm dialog box pops up. Click Yes to delete this user.
3.24 Duplicating a User
3.24.1 Purpose
To duplicate an existing user to remain all the attributes of this user, except the user
name. Create a user by duplicating an existing one, thus to save the workload of
creating a new user directly.
3.24.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the user to be duplicated exists.
3.24.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. Click User Management in the Security Tree to show the user list. From the
right user list, right-click the user to be duplicated, and select Duplicate from the
short-cut menu, as shown in Fig 3.24 -53.
58
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
62/86
Chapter 4 Resource Management
Fig 3.24-53 Selecting Duplicate
3. The Create User dialog box pops up. All the parameters are set as same as those
of the user to be duplicated, except the parameters on the Basic Information
page. Modify attributes of the user as required.
4. After the setting is completed, click OK.
3.25 Finding a User
3.25.1 Purpose
The system provides the function of implementing fuzzy query to the user according to
the user name.
A fuzzy search is to find an existing user according to partial continuous or all
characters contained in his/her name.
3.25.2 Prerequisite
The user has logged in the OMM server normally. For detailed procedure, refer to.
3.25.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
Result: The Security Management window appears.
2. In the User Management interface, click on the toolbar.
3. The Find dialog box pops up. Input the user name or any continuous characters
59
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
63/86
TN_SM009_E1_0 ZXWN CS Daily Operation
contained by this name.
4. Click Find to start searching. If there is a matched user, this user is highlightedin the user list. Click Find to search the next matched user. If there is no matched
user, the Message dialog box pops up.
3.26 Viewing Access Rights of a User
3.26.1 Purpose
To view operation and resource authorities of a user. The operation authority refers to
what kinds of operation that this user can implement. The resource authority refers tothe objects that this user can manipulate.
3.26.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the user whose access rights are to be viewed exists.
3.26.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
2. Click the User Management in the Security Tree. From the right user list, right-
click the user whose access authority is to be viewed, and select Access Right
from the short-cut menu, as shown in Fig 3.26 -54.
Fig 3.26-54 Selecting Access Right
60
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
64/86
Chapter 4 Resource Management
3. The Access Right dialog box pops up, as shown in Fig 3.26 -55. The left
column shows the operation authority of this user, while the right column shows
the resource authority of this user. When a check box in the Operation Tree or
the Resource Tree is checked, the user has this authority.
NOTE: The resource tree shows the NE that can be managed by the user, while
the operation tree shows the operations that can be performed on the NE
managed by the user. When different operations are selected in the operation
tree, different resources will be selected in the resource tree.
Fig 3.26-55 Viewing Access Rights of a User
4. Click Close to complete the operation.
3.27 Managing Login Users
3.27.1 Purpose
To view the list of current login users. The administrator can forcefully disconnect
other users from the OMM server through this function.
61
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
65/86
TN_SM009_E1_0 ZXWN CS Daily Operation
3.27.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
2. On the Security Management window, select Tools > Login User Management.
The Login User dialog box pops up, displaying the list of login users, as shown
in Fig 3.27 -56.
Fig 3.27-56 Login User
3. To disconnect a user, select the user, and click the Kick Out button.
4. The Confirm dialog box pops up. Click OK to break off the connection.
Fig 3.27-57 Confirming Disconnecting a User
62
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
66/86
Chapter 4 Resource Management
3.28 Releasing Locked Users
3.28.1 Purpose
The condition of an account being locked is set in the user account rule, that is, the
error times of entering the password. When a user enters a wrong password for the
specified times, this account is locked. Administrator can view and unlock the lock
status of users.
3.28.2 Prerequisite
The user has logged in the OMM server normally..
Confirm that this user exists and has been locked.
3.28.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
2. On the Security Management window, select Tools > View User Lockup
Records. The View User Lockup Records dialog box pops up, displaying the list
of locked users, as shown in Fig 3.28 -58.
Fig 3.28-58 Viewing Lockup Status of Users
3. Right-click the user to be unlocked, select Unlock from the short-cut menu to
pop up the confirmation dialog box, as shown in Fig 3.28 -59.
63
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
67/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Fig 3.28-59 Confirming Unlocking A User
4. Click Yes to unlock this user. After being unlocked, this user can log in again
from the original OMM client.
3.29 Setting the Login IP Range of Administrator
3.29.1 Purpose
Because the administrator has the highest operation authority, the administrator login
can be restricted by setting the login IP range. The administrator can only log in the
system within the specified IP range. Beyond this specified range, the administrator
cannot log in the system, even if both username and password are correct.
3.29.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
2. Click the User Management in the Security Tree. Right-click admin from the
right user list, and select Modify from the short-cut menu.
3. Click the Login tab, as shown in Fig 3.29 -60.
64
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
68/86
Chapter 4 Resource Management
Fig 3.29-60 Selecting Login Tab
4. Click Add to pop up the Set IP Range dialog box. Enter Start Address and End
Address to set the login IP range for administrator to log in, as shown in Fig
3.29 -61.
Fig 3.29-61 Setting the IP Range
5. Click OK to complete the settings.
65
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
69/86
TN_SM009_E1_0 ZXWN CS Daily Operation
3.30 Modifying All Users' Passwords
3.30.1 Purpose
To change the password of all the users except administrator to the same one
3.30.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
2. On the Security Management window, select Tools > Modify All Users
Password.
Result: The Modify All Users Password dialog box pops up, as shown in Fig
3.30 -62.
Fig 3.30-62 Modifying All Users' Passwords
3. Enter the new password twice, and click OK to pop up the Message dialog box.
4. Click OK to complete the modification.
3.31 Setting Administrator Password Protection
3.31.1 Purpose
To set the protection question for the administrator password so that the administrator
can get it again in the case of forgetting or losing the password
3.31.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
2. Click the User Management in the Security Tree.
3. Right-click admin from the right user list, and select Modify from the short-cut
66
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
70/86
Chapter 4 Resource Management
menu.
4. Click the Advanced Information tab, as shown in Fig 3.31 -63.
Fig 3.31-63 Setting Password Protection Question
5. Click the Enable Password Protection check box.
6. Select the required question from the drop-down list of Question. Enter the
answer to this selected question.
NOTE: The answer to the password protection question must be at least four
characters, and cannot be all the digits or spaces.
7. Click OK to complete setting a question to protect the administrators password.
3.32 Creating a Department
3.32.1 Purpose
To create a sub-department under the root department or an existing department
A department is used to perform the administrative management to the users.
Generated by the system, the root department is the top department, and other
departments are all the sub-departments of it. The root department cannot be deleted.
67
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
71/86
TN_SM009_E1_0 ZXWN CS Daily Operation
3.32.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
2. In the Security Tree, right-click Department Management, and select Create
Sub-department from the short-cut menu, as shown in Fig 3.32 -64.
Fig 3.32-64 Selecting Create Sub-department
3. The Create Department dialog box pops up. Set the Department Name and
Department Description on the Basic Information page, as shown in Fig 3.32
-65.
Fig 3.32-65 Entering Basic Information about a Department
68
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
72/86
Chapter 4 Resource Management
4. Select the Superior Department tab to select a superior department for it, as
shown in Fig 3.32 -66.
Fig 3.32-66 Selecting a Superior Department
5. Click OK to complete the creation of a department, which is displayed in the
department list.
3.33 Modifying a Department
3.33.1 Purpose
To modify the attributes of a created department except the department name
3.33.2 Steps
1. On the main window of the OMM client, select Views > Security Management.
2. Click the Department Management in the Security Tree. From the right
department list, right-click the department to be modified, and select Modify
from the short-cut menu, as shown in Fig 3.33 -67.
69
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
73/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Fig 3.33-67 Modifying a Department
3. The Modify Department dialog box pops up, as shown in Fig 3.33 -68. Modify
the department as required. Table 3.33 -27 shows the contents available for
modification.
Fig 3.33-68 Modifying a Department
Table 3.33-27 Contents Available for Modification
Tab Contents Available for Modification
Basic Information The description of the department
Superior Department Its parent department
70
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
74/86
Chapter 4 Resource Management
4. Click OK to complete the modification.
3.34 Viewing a Department
3.34.1 Purpose
To view the attributes of a created department
3.34.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the department to be viewed exists.
3.34.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
2. Click the Department Management in the Security Tree. From the right
department list, right-click the department to be viewed, and select View from
the short-cut menu, as shown in Fig 3.34 -69.
Fig 3.34-69 Viewing a Department
3. The View Department dialog box pops up. Select the Basic Information tab to
view Department Name and Department Description.
4. Select the Superior Department tab to view its superior department.
5. Click OK to complete the viewing operation.
71
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
75/86
TN_SM009_E1_0 ZXWN CS Daily Operation
3.35 Deleting a Department
3.35.1 Purpose
To delete an existing department that is not used any more
The department having users or sub-departments cannot be deleted.
3.35.2 Prerequisite
The user has logged in the OMM server normally.
Confirm that the department to be deleted exists.
3.35.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
2. Click the Department Management in the Security Tree. Right-click the
department to be deleted from the right department list, and select Delete from
the short-cut menu, as shown in Fig 3.34 -69.
Fig 3.35-70 Deleting a Department
3. The confirmation dialog box pops up. Click Yes to delete this department.
3.36 Finding a Department
3.36.1 Purpose
The system provides the function of implementing fuzzy query to the department
according to its name.
72
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
76/86
Chapter 4 Resource Management
A fuzzy search is to find an existing department according to partial continuous or all
characters contained in its name.
3.36.2 Prerequisite
The user has logged in the OMM server normally.
The user has logged in the OMM server normally.
3.36.3 Steps
1. On the main window of the OMM client, select Views > Security Management.
2. In the Department Management interface, click on the toolbar.
3. The Find dialog box pops up. Input the department name or any continuous
characters contained by its name.
4. Click Find to start searching. If there is a matched department, this department
is highlighted in the department list. Click Find to search the next matched. If
there is no matched department, the Message dialog box pops up.
73
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
77/86
4 Resource Management
4.1 Resource Management Introduction
4.1.1 Description
The resource management is responsible for managing areas and various resources, and
adding different resources for the different areas.
4.1.2 Concepts Involved
Area: When the large area networking is adopted, the area is that managed by
the MSCS when it serves as virtual MSC. The area includes common area and
other areas.
Resource: A set of various available resources. For specific resource types, see
the related description in Adding Resources.
4.2 Resource Management Interface
4.2.1 Interface
Select Views > Resource Management to pop up the Resource Management
window, as shown in Fig 4.2 -71.
Fig 4.2-71 Resource Management Interface
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
78/86
Table 4.2-28 Labels in Resource Management Interface
Label Description
1 Menu bar
2 Toolbar
3 Area tree and resource tree
4 Status bar
5 Toolbar in operation window
6 Operation window
7 Message area
4.2.2 Menu Bar
The menu bar in the Resource Management window consists of six menus, including
System, Views, Operation, Favorite, Windows, and Help. Table 4.2 -29 shows the
functions of each menu.
Table 4.2-29 Functions Provided by Menu Bar of Resource Management
Menu Item Main Functions
System Lock Screen, Current User Info, Print Setup, Query
System Time, System Setting, Logout, and Exit
Views Daily maintenance, signaling trace, fail observer,performance management, MML terminal, logmanagement, professional maintenance, securitymanagement, system management, and resourcemanagement
Operation Refresh resource data
Favorite Fault Management, Log Management, and SystemManagement
Windows Show/hide toolbar, status bar, and message area, closecurrent view or all views
Help Help (showing online help), and About (showing software
version and technical support information)
4.2.3 Toolbar
Table 4.2 -30 shows the icons in the toolbar.
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
79/86
Chapter 4 Resource Management
Table 4.2-30 Icons in Toolbar
Icon Description Icon Description
Home page Daily Maintenance
Back Signaling Trace
Forward Fail Observer
Query System Time Fault Management
System Setting Performance Management
Lock Screen MML Terminal
Current User Info Help
Print Setup
4.2.4 Message Area
The Message Area window consists of two sub-windows, Hint Message and Error
Message, which display operation results. Table 4.2 -31 shows its main functions.
Table 4.2-31 Functions of Sub-windows
Sub-window Main Functions
Hint Message Showing messages for successful operation, including name and time
Error Message Prompting messages for unsuccessful operation, including its name,
time, and probable failure cause
4.2.5 Status Bar
The status bar shows the connection status of current client
4.2.6 Toolbar in Operation Window
Table 4.2 -32 shows the icons shown in toolbar in the operation window.
Table 4.2-32 Icons in Toolbar
Icon Description Icon Description
Modify resource Delete resource
Full screen Exit full screen
77
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
80/86
TN_SM009_E1_0 ZXWN CS Daily Operation
4.3 Implementing Area Operation
4.3.1 Purpose
To add, modify, query, and delete an area node corresponding to virtual MSCS index,
thus to implement the divisional management on resource devices
4.3.2 Steps
1. On the main window of the OMM client, select Views > MML Management.
2. Implement various operations on the area node through commands.
4.4 Adding a Resource
4.4.1 Purpose
To add resources required by subscribers for different areas
4.4.2 Steps
1. In the main interface of the OMM client, select Views > Resource
Management.
Result: The Resource Management window appears.
2. In the Area Tree, under the MSCS office, right-click the area whose resources
are to be added, and select Add Resource from the short-cut menu, as shown in
Fig 4.4 -72.
78
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
81/86
Chapter 4 Resource Management
Fig 4.4-72 Adding Resources
3. The Add Resource dialog box pops up, as shown in Fig 4.4 -73.Table 4.4 -33
shows parameters in the dialog box.
Fig 4.4-73 Add Resource Dialog Box
79
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
82/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Table 4.4-33 Descriptions of Parameters in Resource Management Interface
Resource Type Key Field Value Range
ASP ASP ID 1~1024
AS AS ID 1~128
M3UA static route ID of M3UA static route 1~128
MSISDN Zone ID Analysis Result (MSISDN Zone
ID)
1~65535
SIP called numberanalysis selector
Analyzer entry 1~1000
SCTP SCTP ID 1~1024
Location area Location area ID 1~65535
Signaling linkset Signaling link set ID 1~1024
Signaling route Signaling route number 1~2000
Trunk group Trunk group number 1~4000
Outgoing route Outgoing route number 1~20000
Outgoing route set Route set number 1~3000
Outgoing route chain Route chain ID 1~3000
Number pre analysisselector
Number pre-analysis selector 1~1000
Number transfer data Number transformation ID 1~2048
Number analysis selector Number analysis selector 1~4096
Number analysis entrance Analyzer entry 1~1000
Templet of numberanalysis selector
Template of number analysisselector
1~65535
Node topology config Node number allocated toconnected equipment
1~2048
CAMEL accesssubscription information
Camel information indexnumber
1~255
Welcome message Welcome message code 1~128
Emergency call centerindex
Emergency call center index 1~255
Voice CODEC template CODEC template ID 1~255
Adjacent office Adjacent office ID 1~2048
Automatic re-routingroute set
Re-routing route set number 1~1000
Black white list selector Black and white list selector 1~1000
4. Click Add to add a resource.
5. Click Confirm to add the resource to the resource list.
80
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
83/86
Chapter 4 Resource Management
Note:
The resource identifying ranges of different areas cannot overlap.
4.5 Deleting a Resource
4.5.1 Purpose
To delete unnecessary resource
4.5.2 Steps
1. In the main interface of the OMM client, select Views > Resource
Management.
2. In the Area Tree, right-click the area whose resources are to be deleted, and
select Delete Resource from the short-cut menu, as shown in Fig 4.5 -74.
Fig 4.5-74 Deleting a Resource
3. The Confirm dialog box pops up, as shown in Fig 4.5 -75. ClickYes to delete
the resource.
81
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
84/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Fig 4.5-75 Confirming Deletion
4.6 Modify a Resource
4.6.1 Purpose
To modify the value of key field of a resource
4.6.2 Steps
1. In the main interface of the OMM client, select Views > Resource
Management.
2. In the Area Tree, right-click the area whose resources are to be modified, and
select Modify Resource from the short-cut menu, as shown in Fig 4.6 -76.
Fig 4.6-76 Modifying a Resource
82
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
85/86
Chapter 4 Resource Management
3. The Modify Resource dialog box pops up, as shown in Fig 4.6 -77. Modify the
value of the key field.
Fig 4.6-77 Modify Resource Dialog Box
4. Click Confirm to complete modification.
4.7 Viewing Resource Tree
4.7.1 Purpose
To view the assignment of resources in the area
4.7.2 Steps
1. In the main interface of the OMM client, select Views > Resource
Management.
2. Click Resource Tree to pop up the Resource Tree interface, as shown in Fig
4.7 -78. The resource tree on the left displays all the resource types, while the
operation window on the right displays the assignment of various resources in
the area.
83
7/29/2019 TN_SM009_E1_0 ZXWN CS Daily Operation-96.doc
86/86
TN_SM009_E1_0 ZXWN CS Daily Operation
Fig 4.7-78 Resource Assignment
3. Delete or modify the resources displayed in the operation window as required