UNM2000 Network Convergence Management System Operation Guide (Version B)
UNM2000 Network Convergence Management System Operation Guide (Version B)
UNM2000 Network Convergence Management System Operation Guide (Version B)
Network Convergence
Management System
Operation Guide
Version: B
Code: MN000001822
June 2016
Thank you for choosing our products.
Related Documentation
Document Description
I
Version
Version Description
A Initial version.
Adds the new functions and operation methods of the
B
UNM2000 R0106, R0106SP1 and R0106SP2 versions.
Intended Readers
u Commissioning engineers
II
Conventions
Terminology Conventions
Terminology Convention
FiberHome UNM2000 Network Convergence Management
UNM2000
System
Symbol Conventions
Cascading
→ Connects multi-level menu options.
menu
Bidirectional
↔ The service signal is bidirectional.
service
Unidirectional
→ The service signal is unidirectional.
service
III
Operation Safety Rules
The computer case, UPS power supply and switch (or hub)
should be connected to protection earth ground.
V
Do not perform service configuration or expansion during service
busy hours via the network management system.
VI
VII
VIII
Contents
Preface...................................................................................................................I
Version ...........................................................................................................II
Conventions ..................................................................................................III
1 Overview ........................................................................................................1
5 Topology Management..................................................................................98
8 Performance Management..........................................................................242
9 Log Management........................................................................................273
10 Resource Management...............................................................................300
13 Abbreviations..............................................................................................353
Figures
The following introduces the product position and GUI description of the UNM2000.
Version: B 1
UNM2000 Network Convergence Management System Operation Guide
The TMN provides the hierarchical network architecture and standard network
interface. It is composed of business management layer (BML), service
management layer (SML), network management layer (NML) and element
management layer (EML). These layers comprise the layered management
architecture of the TMN.
The UNM2000 manages the access devices and locates at the EML, as shown in
Figure 1-1.
The devices that can be managed by the UNM2000 are shown in Table 1-1.
2 Version: B
1 Overview
Version: B 3
2 Basic Operations of the UNM2000
The following introduces basic operations of the UNM2000, including the topics
below.
Login / Logout
GUI Introduction
Menu Description
4 Version: B
2 Basic Operations of the UNM2000
The following introduces how to log into or log out of the UNM2000 client.
You need to log into the UNM2000 system via the UNM2000 client before
configuring and managing devices on the GUI of the UNM2000 client.
Prerequisite
u The client end communicates with the server end normally (check whether the
network communication is normal by pinging the IP address of the far end).
u The client IP address is in the access control list of the UNM2000. See Setting
the ACL for how to set the access control list.
Procedure
2. In the Server drop-down list of the UNM2000 Login window, select the IP
address of the UNM2000 server.
If the server to be logged in is not set, follow the steps below to add the server
IP address.
2) In the highlighted field, enter the IP Address, Port Number and Host
Name of the desired UNM2000 server, and then click OK.
Version: B 5
UNM2000 Network Convergence Management System Operation Guide
3. In the displayed UNM2000 Login dialog box, enter the username and
password, and then click Login.
Note:
Prerequisite
Procedure
Procedure
6 Version: B
2 Basic Operations of the UNM2000
The following enables you to understand the GUI of the UNM2000 and find the
operation menu quickly to improve your operation efficiency.
2.3.1 GUI
The UNM2000 main GUI is composed of the object tree pane, toolbar, menu bar,
etc., as shown in Figure 2-1.
(4) Alarm statistical panel (5) Display pane (6) Status bar
The following introduces the general shortcut icons in the UNM2000 GUI.
Version: B 7
UNM2000 Network Convergence Management System Operation Guide
See Table 2-1 for the default shortcut icons in the toolbar.
Classifica-
Icon Name Description
tion
Query Reported
Displays the report event information.
Events
Perfor- Displays the historical performance
Performance History
mance information.
NMS User Opens the NMS User Management
Management tab for user management.
8 Version: B
2 Basic Operations of the UNM2000
Classifica-
Icon Name Description
tion
Displays the quantity of prompt alarms
dynamically; Click this button to view
Warning
the prompt alarms in the Current
Alarm tab.
Clicking this button to open the Alarm
Display Alarm
Statistics dialog box which displays all
Statistics Window
current alarm statistics.
Query by
Queries by template or queries all.
template
Open the search dialog box and enter the key word to
Search
search in the object tree.
Quick search in
Enter the key word to search in the current object by
the current
clicking to select a search condition.
object
Create a custom Creates a custom topology view and sets the view to
topology view display the concerned objects only.
Version: B 9
UNM2000 Network Convergence Management System Operation Guide
Delete the
custom topology Deletes the custom topology view.
view
Modify Custom Modifies the basic information, node members and
View connection line members in the custom topology view.
Shortcut Description
10 Version: B
2 Basic Operations of the UNM2000
Shortcut Description
2.4.1 System
The submenus under the System main menu are described in Table 2-4.
Menu Description
Configura- Sets the data backup attributes to complete the device software
tion Backup backup task and configuration data backup task.
Version: B 11
UNM2000 Network Convergence Management System Operation Guide
Table 2-4 Description of the Submenus under the System Menu (Continued)
Menu Description
The test task includes the POTS port external / internal line task
Test Task
and the VoIP pinging test task.
Statistics Sets the statistics export task to export the performance data to
Export Task an FTP server.
Imports the Telnet command text file to perform the Batch-
Preconfig
Download operation on the device via issuing the Telnet
Task
command and display the operation result.
User
Sets the user login mode, access control list, password policy and
Security
account policy of the UNM2000.
Strategy
Service
Configura- Sets the global FTP server.
tion
Performance
Sets the 24-hour performance collection time of the server.
Settings
Default Work Section Sets the UNM2000 workspace directory for storing the temporary
Settings resource files needed by the system.
Logs out of the current UNM2000 client and returns to the user
Logout
login GUI.
2.4.2 View
The submenus under the View main menu are described in Table 2-5.
12 Version: B
2 Basic Operations of the UNM2000
Menu Description
Sets the map of the local city as the background image of the
Map Mode
current topology.
Alarm Statistics
on the toolbar of the
main GUI so as to view the UNM2000 and NE alarms.
Common
Sets whether to display on the toolbar of the main
Function Area
GUI.
Performance
Sets whether to display on the toolbar of the main GUI.
Small Toolbar
Sets the display size of shortcut icons.
Icons
Restores the system default shortcut keys on the toolbar of
Reset Toolbars
the main topology.
Version: B 13
UNM2000 Network Convergence Management System Operation Guide
Table 2-5 Description of the Submenus under the View Menu (Continued)
Menu Description
Optimum Size Displays the topology view according to the window size.
2.4.3 Resource
The submenus under the Resource main menu are described in Table 2-6.
Menu Description
14 Version: B
2 Basic Operations of the UNM2000
Table 2-6 Description of the Submenus under the Resource Menu (Continued)
Menu Description
Query the ONU Searches for the ONU by the specified search conditions.
Query MDU Phone Number Queries the port details by the port phone number.
ONU RMS Error Information Queries the information of the ONU that fails to register
Query according to specified search conditions.
ONU Network Intercept Log Queries the information of the ONU that is re-authorized
Query according to specified search conditions.
Physical
Gathers statistics of NEs, cards, ports and ONUs according
Resource
to the preset statistical template.
Statistics
Gathers statistics of ONU users, local end VLANs, NE MGC
Other Type
services and ONU MGC services according to the preset
Statistics
statistical template.
Resource
Physical
Statistics
Resource Exports the physical resource statistics as an CSV, HTML,
Statistics TXT or Excel file.
Export
Statistics
Exports the user information statistics or service information
Export of
resource statistics as an CSV, HTML, TXT or Excel file.
Other Types
Version: B 15
UNM2000 Network Convergence Management System Operation Guide
2.4.4 Configuration
The submenus under the Configure main menu are described in Table 2-7.
Menu Description
2.4.5 Alarm
The submenus under the Alarm main menu are described in Table 2-8.
16 Version: B
2 Basic Operations of the UNM2000
Menu Description
Sets the query conditions to view the alarm history of the entire
Alarm History
network or a specified object.
Alarm Shield Rule Sets filter rules to filter the alarms not focused according to the
Management network maintenance requirements.
Alarm Flashing Shield Rule Sets filter time rules for the alarms not focused according to the
Management network maintenance requirements.
Alarm Maintenance
Enters the experience information of alarm maintenance.
Experience Management
Version: B 17
UNM2000 Network Convergence Management System Operation Guide
Table 2-8 Description of the Submenus under the Alarm Menu (Continued)
Menu Description
Query Alarm
Queries alarms according to the query conditions.
Log
Alarm Log
Current Alarm Gathers statistics of alarms according to the statistical
Log Statistics conditions.
Sets the alarm frequency analysis rule so that the EMS will
Alarm Frequency Analysis
process alarms according to the rule settings once the
Rule
specified object meets the preset conditions.
2.4.6 Performance
The submenus under the Performance main menu are described in Table 2-9.
Menu Description
Collection Task Sets the indicator, threshold, task and time for the performance
Management connection.
Sets the statistical template of performance history to view the
View Performance performance history charts so as to understand the performance
History Trend data change trend of the specified object and the running status of
the network.
Performance Query
Save the common performance query conditions as a template.
Template
2.4.7 Security
The submenus under the Security main menu are described in Table 2-10.
18 Version: B
2 Basic Operations of the UNM2000
Menu Description
Query Operation Logs Sets the filter conditions to query the operations logs.
Query Security Logs Sets the filter conditions to query the security logs.
Statistical System Logs Sets the filter conditions to gather statistics of system logs.
Statistical Operation Logs Sets the filter conditions to gather statistics of operation logs.
Statistical Security Logs Sets the filter conditions to gather statistics of security logs.
Log Forwarding Server Forwards the UNM2000 logs onto another server.
2.4.8 Window
The submenus under the Window main menu are described in Table 2-11.
Menu Description
Close Window Closes all the opened windows except the main topology.
Close All Windows Closes all the opened windows except the main topology.
Close Other Windows Closes all the opened windows except the main topology.
2.4.9 Help
The submenus under the Help main menu are described in Table 2-12.
Version: B 19
UNM2000 Network Convergence Management System Operation Guide
Menu Description
The UNM2000 system parameters include the browse tree display style, the time
mode, the topology display, the pinging parameters, the Telnet proxy server, and the
GUI display. The following introduces how to set and use the parameters.
The Viewing Tree Setting dialog box is used for setting the display of the main
topology. You can set the icon size, border pixels, height as well as the space
between the border and the text.
Background Information
These settings take effect immediately. They are applicable to the current user at
any client ends, but they are not applicable to other users.
Procedure
2. Select Local Settings→Viewing Tree Setting in the left pane to open the
dialog box.
20 Version: B
2 Basic Operations of the UNM2000
3. Set various parameters as required. During setting, users can preview the
display style via the instance text.
4. Click Apply after the settings are completed, and the settings will be valid.
Other Operations
Set the time mode of the client end. The UNM2000 displays the time in the
configured time mode (UTC or local time).
Version: B 21
UNM2000 Network Convergence Management System Operation Guide
Background Information
u When you log in next time, the UNM2000 client will adopt the settings you set
last time.
u The settings of the time mode are applicable to the current user at any client.
However, they are not applicable to other users.
Note:
Procedure
2. Select Local Settings→Time Mode in the left pane to open the dialog box.
3. Set the time display mode of the client end as required. Then click Apply to
apply the settings.
The UNM2000 allows you to set the background image display of the main topology.
Background Information
u These settings are applicable to the current user at any client ends, but they are
not applicable to other users.
Procedure
22 Version: B
2 Basic Operations of the UNM2000
4 Select Image Mode and then click Apply→OK to set the background of
the main topology to image mode.
In the image mode, right-click in the blank area of the physical topology
view and select Set Background Image or Use the Default Background
Image from the shortcut menu to set the background image of the physical
topology view.
4 Select Map Mode to set the background of the main topology to map
mode.
a) In the gis map url text box, enter the address of the network map or
the map package in the local EMS.
b) Click Apply→OK.
Caution:
The address entered in the dis map url text box should meet the
following requirements:
u For the network map, the address must be the URL of the GIS online
map database.
u For the map package in the local EMS, the address should be that of
the map folder downloaded to the local EMS.
Other Operations
Right-click in the blank area of the physical topology view and select Expand
All Logic Domains or Collapse All Logic Domains.
u Hide nodes.
Right-click the NE in the physical topology view and select Hidden Node from
the shortcut menu. The NE will not appear in the physical topology view.
Version: B 23
UNM2000 Network Convergence Management System Operation Guide
Right-click in the blank area of the physical topology view and select Manage
the Hidden Nodes to open the Hide Node Management dialog box. Then
select the nodes to be displayed and click OK. The corresponding nodes are
displayed in the physical topology view.
u Lock, move, zoom in or zoom out the physical topology view via the shortcut
icons at the top of the main topology.
You can set the UNM2000 to continuously ping the NE or transfer the ping via the
server so as to confirm whether the communication between the UNM2000 and the
NE is normal.
Background Information
u When Consecutive Ping is not selected, the EMS will execute the Ping
command at most four times.
u When the client cannot ping the NEs, you can select Forward Ping Packet via
the Server to determine whether the communication between the EMS and
NEs are normal.
Procedure
2. Select Local Settings→Ping Parameter Config in the left pane to open the
Ping Parameter Config dialog box.
3. Set the Ping parameters as required and click Apply to validate the settings.
4 When the Consecutive Ping option is selected, right-click the object and
select Ping to ping the object continuously.
4 If Forward Ping Packet via the Server is selected, the Ping commands
will be forwarded by the server.
24 Version: B
2 Basic Operations of the UNM2000
After setting the parameters related to the Telnet proxy server, users can use the
proxy server to access the equipment.
Background Information
Prerequisite
Procedure
2. In the left pane, select Local Settings→Telnet Proxy Server to open the
dialog box.
3. Select the Enable Telnet Proxy Server check box, set the proxy server
information and then click Apply to validate the settings.
Users can set the GUI display mode, including the maximum row number of a table,
the display mode of name of alarms / performance / events, and whether the GUI is
locked automatically.
Background Information
u The alarm color settings are applicable for all users at any client.
Procedure
2. Select Local Settings→Display in the left pane to open the dialog box.
Version: B 25
UNM2000 Network Convergence Management System Operation Guide
Set the FTP server and related parameters to implement the data transmission
between the UNM2000 client end and the server end.
Background Information
The FTP server settings are the foundation for implementing the functions of
multiple modules, including policy task module, data history save module, log
forwarding module and statistical information export module. The functions of the
modules implemented via setting the FTP server are shown in the following table.
Module
Implementation Related Function
Name
Includes the software backup task,
Implements the task customization configuration export task, system software
Policy task
via the FTP server. upgrade task, ONU batch upgrade task and
service card batch upgrade.
Prerequisite
26 Version: B
2 Basic Operations of the UNM2000
Procedure
3. Click Add to add one blank row in the window. Then click and set the
parameters of the FTP server.
4. After completing the settings, click Apply. The added FTP server appears in
the window.
Other Operations
For the FTP server already set, you can delete it if it is no longer used or test it
before use.
u Select the FTP server not needed and click Delete to delete it.
u Select the desired FTP server and click Test FTP to test whether the FTP
server can be connected normally.
When using the UNM2000 for the first time, you need to set up a workspace
directory for storing the temporary resource files required by the system.
Note:
This directory must be readable and writable with a hard disk space
greater than 512M.
Version: B 27
UNM2000 Network Convergence Management System Operation Guide
Procedure
1. Select System→Default Work Section Settings in the main menu to open the
Default work space set dialog box.
2. Click Select... to select the folder that the workspace locates and then click
Open.
The UNM2000 license file is used for controlling the functions and management
capability of the UNM2000. You cannot log into the UNM2000 client without the
license file. The following introduces how to renew the UNM2000 license.
Prerequisite
Procedures
28 Version: B
2 Basic Operations of the UNM2000
2) In the License information dialog box that appears, click Update license.
3) In the Open dialog box, select the corresponding license and click Open.
4) In the License comparison dialog box, check the control items of both the
old and the new licenses and click Confirm License update.
3. After updating the license file, restart the UNM2000 client. The client will reload
the control items according to the updated license.
Procedure
2. In the displayed Modify Password dialog box, set Old Password:, New
Password: and Confirm Password:.
Note:
The new password must comply with the set password policies. For
setting the password policies, see Setting the Password Policy.
3. Click OK.
If the UNM2000 client is idle, you can lock the client upon leaving to prevent
unauthorized operations. The operation is only applicable to the user who
performed the operation.
Version: B 29
UNM2000 Network Convergence Management System Operation Guide
Prerequisite
Procedure
Select System→Lock the Terminal in the main menu to open the The
window is locked dialog box.
Refer to Setting the GUI Display Mode to lock the terminal automatically. If
no operation is performed after a set time period, the terminal will be
locked automatically.
Different UNM2000 users have different operation authorities. The user can perform
operations of different levels by logging out of the current account and logging in
again with another account.
Procedure
2. Click Yes in the alert box that appears to lock out of the current account.
3. In the UNM2000 Login dialog box that appears, select the server you want to
log in and enter the username and password. Click Enter.
30 Version: B
2 Basic Operations of the UNM2000
You can view the prompts and operation echo information that influence the running
of the UNM2000 on the message platform.
Procedure
1. Select View→Message Platform from the main menu to open the Message
Platform pane.
You can set which toolbars and their corresponding shortcut menus are displayed
for quick operations to improve the operation efficiency.
Version: B 31
UNM2000 Network Convergence Management System Operation Guide
Procedure
2. In the Toolbars menu, click the function modules to be displayed in the main
topology.
3. The selected function module will be added with a tick (√) in front of it and it will
appear in the toolbar of the main view.
Other Operations
2. Click New Toolbar, enter the name for the new toolbar in the displayed New
Toolbar dialog box and then click OK.
3. The user can drag an item in or out of the toolbar to add or delete the
corresponding shortcut icon as needed.
32 Version: B
2 Basic Operations of the UNM2000
In the following figure, the Topo functional module is added to the toolbar. Drag
the Create Custom Views shortcut icon to the Topo function module in the
Customize Toolbars dialog box.
In case of too many devices in the main topology, the focused object is not easy to
locate and view. However, you can create a custom view to only display your
focused objects.
Background Information
u A user can only see the custom views created by himself / herself.
Prerequisite
Procedure
2. In the Create custom views dialog box that appears, fill in the view name and
the remarks.
3. Select Node Member→Select to open the Select Object dialog box. Then
select the NEs to be displayed in the custom view and click OK.
4. Select Link Member→Select to open the Select Object dialog box. Then
select the NE fiber connections to be displayed in the custom view and click
OK.
6. In the UNM2000 alert box that appears, click Yes to switch to the custom view.
Version: B 33
3 Security Management
34 Version: B
3 Security Management
Managed Entities
u Object set: Indicates a set of managed objects. Dividing the managed objects
into object sets facilitates the allocation of authorities for managing NEs. The
object set only includes the physical objects (exclusive of logical objects) with
the smallest granularity being cards.
Note:
Default operation sets are provided in the UNM2000. When the default
operation sets do not meet the requirements for authority assignment.
You can create operation sets as needed.
The default user groups of the UNM2000 include the Administrators group, the
security admin group, inspector group, the operator group and the maintainer
group.
Version: B 35
UNM2000 Network Convergence Management System Operation Guide
u User: Indicates the UNM2000 client end users. The username and password of
the user uniquely determines the corresponding UNM2000 operation and
management authorities. When a user is added into a user group, the user is
assigned with the operation authorities associated with the user group.
4 A user can be added into multiple user groups. In this case, the authorities
of a user are the union of its basic authorities and the authorities of the
user groups that the user belongs to. There are two ways to assign
authorities to users:
¡ Divide the user to the user group and the user can thus have the
authorities of the user group.
¡ Give the user directly with the object set and the operation set.
36 Version: B
3 Security Management
4 The UNM2000 provides a default user named admin, which is the system
administrator. The admin user belongs to the Administrators and
Security Admin Group groups by default. The authorities of admin cannot
be modified and the admin user cannot be added to other user group.
When the managed objects and users are of a large scale, the uniform
management of authorization and domain division by a certain type of users will be
both time and effort consuming. Therefore, it is necessary to divide the managed
objects into several sub-domains. Each sub-domain can perform authorization and
domain division management without interfering each other.
The authority and domain division of the UNM2000 is implemented through the
administrative domain and operation authorities. The operation authorities are
divided into different functional domains through the authority division function and
the NEs are divided into different network domains through the domain division
function. Assigning the UNM2000 users with the authority combination of different
functional domains and network domains effectively controls user management
authorities.
Application of the authorization and domain division management: Divide the user
groups into ordinary user group and administrative user group. Creating a user
group is like creating a sub-domain. In this sub-domain, the users are authorized
with the operation authorities within this sub-domain and can create the object set,
operation set, user group, users based on such domain authorities. They are visible
to other users within the sub-domain, but invisible to users outside the sub-domain.
Note:
The UNM2000 user security can be implemented by setting the account policy and
password policy.
Version: B 37
UNM2000 Network Convergence Management System Operation Guide
u Account policy: Defines the minimum length, account login and unlocking
settings of the user account. Using the account policy can enhance the security
of the user account.
u Password policy: Defines the complexity, updating period and length limit of the
password.
The security policies, such as access control, password and lockout management
and online user monitoring effectively enhance the access security of the UNM2000
and prevent unauthorized operations.
The user security policies are the access control rules defined for managing users.
The security policy planning and configuration should be completed upon initial
installation. You can adjust the security policies according to your management
requirement.
The UNM2000 supports the single-user login mode and multi-user login mode.
Typically, the UNM2000 runs in the multi-user mode. When maintaining the
UNM2000 server (for example, adjusting the user group, administrative domain or
operation authority of a user), you can set the UNM2000 to the single-user login
mode to avoid operation interference caused by other users.
Background Information
u Single-user mode: In this mode, only one admin user can log into the UNM2000
via the client end, and all other online users will be forced to exit.
38 Version: B
3 Security Management
Caution:
When the UNM2000 is switched to the single-user mode, only one admin
user can log into the UNM2000 via the client end, and all other online
users will be forced to exit. To ensure that other users use the UNM2000
normally, switch the UNM2000 to the multi-user login mode after
completing the maintenance in single-user mode.
Prerequisite
Procedure
2. Select User Security Strategy→User Login Mode in the left pane to open the
User Login Mode dialog box.
3. Set the login mode as required. Then click Apply and the settings will be valid.
By setting the ACL, the operator can set the UNM2000 users to log in only via the
client end with the set IP address or network segment, so as to ensure the network
security.
Background Information
The access control list set by a user is only applicable to the user.
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group.
Version: B 39
UNM2000 Network Convergence Management System Operation Guide
Procedure
2. Select User Security Strategy→Access Control List in the left pane to open
the Access Control List dialog box.
4. Set the Start address and End address. After completing the settings, click
OK. Then the added IP address range appears in the ACL.
Note:
The account policy includes locking / unlocking users, non-logged-in user policy,
and the minimum length of the username. Setting the account policy can ensure the
security of the account and the network.
Prerequisite
Background Information
u The account policy must be configured upon initial installation of the UNM2000
and can be adjusted accordingly during maintenance.
u The new account policy has no effect on the accounts already set.
40 Version: B
3 Security Management
Procedure
2. Select User Security Strategy→Account Policy in the left pane to open the
dialog box.
3. Set the parameters and then click Apply to apply the settings.
Other Operations
Setting the complexity of the password and modifying the password regularly can
improve the access security of the UNM2000. The password policy, set by the
security administrator, is applicable to all users.
Prerequisite
Background Information
u The password policy must be configured upon initial phase of the site building
and can be adjusted accordingly during maintenance.
u The new password policy has no effect on the passwords already set.
u The password policy includes the complexity, updating period and length limit.
u The new password policy will be applicable to all users of the UNM2000.
Procedure
2. Select User Security Strategy→Password Policy in the left pane to open the
dialog box.
Version: B 41
UNM2000 Network Convergence Management System Operation Guide
3. Set the parameters in Common Policy and Advanced Policy tabs, and then
click Apply to apply the settings.
Other Operations
The following introduces the operations of creating, modifying, and deleting network
management users and assigning the authorities for them.
The operation set is the set of operations of a certain type. Via the operation set
management, users can assign and manage the operations on the equipment.
u The operation sets include two types: NM application and Network device.
u When a certain user or user group is bound with an operation set, this user or
user group will have the authorities of the operations in this set.
u Only the users in the security administrator group and the sub-domain security
administrator group can manage the operation sets.
The security administrator can view specific operations included in an operation set
to check whether the authorities in the operation set meet the requirements.
Prerequisite
You have logged into the UNM2000 as a user belonging to the Security Admin
Group.
42 Version: B
3 Security Management
Procedure
2. Select Operation Set or click before Operation Set in the left pane. Then
view the existing operation sets in the right pane or the expanded list of
Operation Set in the left pane.
3. Double-click the operation set entry in the right pane to view details in the
Basic Information, Member and Service For tabs of the operation set.
Other Operations
u In the right pane, click the button at the lower part of the corresponding entry, or
right-click the entry, and select operations such as Refresh, Delete, copy cell
(K), Print, or Export.
u Select the corresponding operation set in the left pane, and modify the
information items in the right pane. After completing the modification, click
Apply.
Note:
Version: B 43
UNM2000 Network Convergence Management System Operation Guide
The operation set is the set of operations of a certain type. Via the operation set
management, users can assign and manage the operations on the equipment.
When the current operation set cannot meet the requirements, users can create a
new operation set.
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group.
Procedure
2. Select one of the following access methods to open the Create Operation Set
dialog box.
Click NMS User Management in the left pane, right-click in the right pane, and select
2
New Operation Set in the shortcut menu.
3 Select Operation Set in the left pane, and click New Operation Set in the right pane.
Select Operation Set in the left pane, right-click in the right pane, and select New
4
Operation Set from the shortcut menu.
Right-click Operation Set in the left pane and select New Operation Set from the
5
shortcut menu.
3. In the New Operation Set dialog box, set the parameters in the Basic
information and Member tabs.
44 Version: B
3 Security Management
Note:
Click Copy Members from Operational Set, and select the operation
set in the Select the operation set dialog box, so as to copy the
members of the corresponding operation set. This can improve the
setting efficiency.
Subsequent Operation
Double-click the added object set to view its relevant information in the right pane.
The object set is the set of managed objects of a certain type. Via the object set
management, users can manage the equipment objects uniformly.
u The default object set provided by the UNM2000 is the complete set of the
objects, including all manageable objects. Users cannot delete the default
object set, but can only modify its descriptions.
u When a certain user or user group is bound with an object set, this user or user
group will have the authorities of the objects in this set.
u Only the users in the security administrator group and the sub-domain security
administrator group can manage the object sets.
The security administrator can view the objects included in the object set to check
whether the objects in the object set meet the requirements.
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group.
Version: B 45
UNM2000 Network Convergence Management System Operation Guide
Procedure
2. Click Object Set or click before Object Set in the left pane. Then view the
existing object sets in the right pane or the expanded list of Object Set in the
left pane.
3. Double-click the object set entry in the right pane to view details in the Basic
Information, Member and Service For tabs of the object set.
Other Operations
u In the right pane, click the button at the lower part of the corresponding entry, or
right-click the entry, and select operations such as Refresh, Delete, copy cell
(K), Print, or Export.
u Select the corresponding object set in the left pane, and modify the information
items in the right pane. After completing the modification, click Apply.
Note:
46 Version: B
3 Security Management
When the current object set cannot meet the requirements, users can create a new
object set.
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group.
Procedure
2. Select one of the following access methods to open the Create Object Set
dialog box.
Select NMS User Management in the left pane, right-click in the right pane and
2
select Create Object Set from the shortcut menu.
3 Select Object Set in the left pane and click Create Object Set in the right pane.
Select Object Set in the left pane, right-click the right pane and select Create Object
4
Set from the shortcut menu.
Right-click Object Set in the left pane and select Create Object Set from the shortcut
5
menu.
3. In the Create object set dialog box, set the parameters in the Basic
information and Member tabs.
Note:
Click Copy member form object set..., and select the operation set in
the Select object set dialog box, so as to copy the members of the
corresponding object set. This can improve the setting efficiency.
Version: B 47
UNM2000 Network Convergence Management System Operation Guide
Subsequent Operation
Double-click an added object set to view the information related to the object set in
the right pane.
The user group is the set of the network management users with the same
management authorities. For the users to be granted with the same authorities, you
can add them into the same user group and authorize the user group to make every
user in the user group have the same authorities, quickly allocating the authorities to
users.
u The default user groups of the UNM2000 include the Administrators group, the
security administrator group, the operator group, the maintainer group, and the
monitor group.
u When a user is bound with a user group, this user owns the authorities
assigned to the user group.
u Only the users in Security Admin Group and Domain Security Admin Group
can manage user groups.
Caution:
The security administrator can view the administrative domains of the user groups
to check which objects are managed by the user group.
Prerequisite
48 Version: B
3 Security Management
Procedure
2. Click User Group or before User Group in the left pane and then view the
existing user groups in the right pane or the expanded list of User Group in the
left pane.
3. Double-click the user group entry to view the details of the user group.
Version: B 49
UNM2000 Network Convergence Management System Operation Guide
Note:
The Current Session tab displays the sessions of the online users in the
user group.
Other Operations
u In the right pane, click the button at the lower part of the corresponding entry, or
right-click the entry, and select operations such as Refresh, Delete, copy cell
(K), Print, or Export.
u Select the corresponding user group in the left pane, and modify the user group
information in the right pane through Find or Select.
When default user groups in the UNM2000 do not meet the requirements for user
authorization, you can create user groups according to the management features of
the users, which is convenient for assigning authorities for users.
Prerequisite
You have logged into the OTNM2000 as a user belonging to Security Admin
Group.
Procedure
2. Select one of the following access methods to open the New User dialog box.
Select NMS User Management in the left pane, right-click in the right pane and
2
select Create User Group from the shortcut menu.
3 Select User Group in the left pane, and click Create User Group.
50 Version: B
3 Security Management
Right-click User Group in the left pane, and select Create User Group from the
5
shortcut menu.
3. According to Table 3-1, set the user group parameters in the Create User
Group dialog box.
Parameter Description
User Group
Compulsory. Sets the user group name.
Name
Sets the user group type to Sub Domain Security Administrator
Group or Ordinary User Group.
u Sub Domain Security Administrator Group: The
administrative domain of this group is assigned by the
security administrator. This group only has the application
User Group
authorities of security management and its authorities
Type
cannot be modified.
Version: B 51
UNM2000 Network Convergence Management System Operation Guide
Parameter Description
Sets the operation authority of the user group. The objects of the
operation authority are classified into the network management
application objects, all objects in the management system, and
Operational Authority
network devices. The network management application authority
includes the operation groups of the network management
application types and the network management operation list.
Note:
Click Copy Authority Settings from the User Group, set the user group
in the Select User Group dialog box, and directly copy the management
domain authority and operation authority of the corresponding user group.
This can improve the setting efficiency.
Subsequent Operation
Double-click an added user group to view the information related to the user group
in the right pane.
The user refers to the person who uses the UNM2000. Users need to log into the
UNM2000 via the corresponding user account. The UNM2000 provides a default
superuser named admin.
52 Version: B
3 Security Management
Caution:
The authorities of admin cannot be modified and the admin user cannot
be added to other user group.
You can query the number and additional information of the UNM2000 users for
convenient user management.
Prerequisite
Procedure
2. Click User or before User in the left pane and then view the existing users in
the right pane or the expanded list of User in the left pane.
3. Double-click a user entry and view the details of the user in the right pane.
Version: B 53
UNM2000 Network Convergence Management System Operation Guide
Other Operations
u In the right pane, click the button below the corresponding entry, or right-click
the entry, and select operations such as Delete, Unlock, Reset password (C),
Clone, Refresh, Print..., Copy Cell (K), or Export.
u In the right pane, modify the information in the Basic Information and Access
Control List and then click Apply to apply the changes.
Create the UNM2000 user accounts and assign them with corresponding authorities
so as to allocate the accounts to users of different responsibilities.
Background Information
The UNM2000 provides a default superuser named admin. The authorities of admin
cannot be modified and the admin user cannot be added to other user group.
Prerequisite
Procedure
2. Select one of the following access methods to open the New User dialog box.
54 Version: B
3 Security Management
Select NMS User Management in the left pane, right-click in the right pane and
2
select Create User from the shortcut menu.
3 Click User in the left pane and click Create User in the right pane.
Click User in the left pane, right-click in the right pane and select Create User from
4
the shortcut menu.
5 Right-click User in the left pane and select Create User from the shortcut menu.
3. According to Table 3-2, set the user parameters in the Create user dialog box.
Parameter Description
Compulsory. Sets the user account, which must comply with the
Username account policies. For the settings of the account policies, see
Setting the Account Policy.
Confirm the
Type the user password again.
password
Modify
If this item is selected, when the corresponding user logs in again,
Password on
he or she will be requested to modify the password.
Basic Next Login
Version: B 55
UNM2000 Network Convergence Management System Operation Guide
Parameter Description
Note:
Click Copy permission from users..., set the user in the Select user
dialog box, and directly copy the management domain and operation
authority of the corresponding user. This can improve the setting
efficiency.
56 Version: B
3 Security Management
Subsequent Operation
Double-click an added user to view the information related to the user in the right
pane.
When the number of login attempts exceeds the limit set in the account
management policy at the client, the user will be locked. The user can be unlocked
via the following ways:
u The admin user resets the password of the user and you can login again.
Background Information
u Only the users belonging to the Security Admin Group or the Domain Security
Admin Group can unlock users.
Prerequisite
Procedure
3) Right-click the locked user, and select Unlock from the shortcut menu.
Set the automatic unlocking time according to Setting the Account Policy. The
locked user can log in only after the set automatic unlocking time expires.
Version: B 57
UNM2000 Network Convergence Management System Operation Guide
In case you forget your password, your password expires, or you are disallowed to
log into the UNM2000, you need to reset the password. The following instructs the
users in the security administrator group to reset the passwords of other users.
Background Information
The users in the Security Admin Group and the Domain Security Admin Group can
reset the passwords of all the users except the admin user. The password of the
admin user can only been modified by the admin user at the UNM2000 client end.
Procedure
3. Right-click the corresponding user and select Reset Password from the
shortcut menu.
4. In the Reset Password dialog box, set New Password and Confirm
Password, and then click OK.
Note:
u The new password must comply with the set password policies. For
setting the password policies, see Setting the Password Policy.
The users belonging to the Security Admin Group or Inspector Group can
monitor user sessions. You can understand the information of the current online
users in the system via monitoring the user sessions. The following introduces the
operations of monitoring the user sessions and activities.
58 Version: B
3 Security Management
By monitoring user sessions, you can view the information of the online users and
log out the users who may influence the system security as needed, so as to ensure
the system security.
Background Information
u Session: The connection set up between the client end and the server.
u When the user login mode is set to Multi-User Mode, one user account can log
in multiple client ends at the same time. You can specify the maximum number
of concurrent online users using a same account. For details, see Creating
Users.
u The object of forced exiting and sending messages is the user session. For
example, if the user account “user” logs in the same UNM2000 server via client
ends A and B, sessions a and b will be generated respectively. When the
account “user” generating session a is forced to exit, the account “user”
generating session b is not influenced.
Prerequisite
Procedure
2. In the Monitor User Session tab, view the information of the online user.
Version: B 59
UNM2000 Network Convergence Management System Operation Guide
Other Operations
Right-click in the tab and click Refresh, Copy Cell, Print or Export from the
shortcut menu.
By monitoring user sessions, you can view the information of the online users and
log out the users who may influence the system security as needed, so as to ensure
the system security.
Background Information
u Session: The connection set up between the client end and the server.
u When the user login mode is set to Multi-User Mode, one user account can log
in multiple client ends at the same time. You can specify the maximum number
of concurrent online users using a same account. For details, see Creating
Users.
u The object of forced exiting and sending messages is the user session. For
example, if the user account “user” logs in the same UNM2000 server via client
ends A and B, sessions a and b will be generated respectively. When the
account “user” generating session a is forced to exit, the account “user”
generating session b is not influenced.
u The superuser admin can force all users except for itself to exit, and the users
in the security administrator can only force the common users to exit.
Prerequisite
Procedure
2. In the Monitor User Session tab, view the information of the online user.
60 Version: B
3 Security Management
3. Right-click the corresponding user session, and select Forced Offline from the
shortcut menu.
4. Type the reasons in the Forced Offline dialog box, and click OK.
By monitoring user sessions, you can view the information of the online users and
log out the users who may influence the system security as needed, so as to ensure
the system security.
Background Information
u Session: The connection set up between the client end and the server.
u When the user login mode is set to Multi-User Mode, one user account can log
in multiple client ends at the same time. You can specify the maximum number
of concurrent online users using a same account. For details, see Creating
Users.
u The object of forced exiting and sending messages is the user session. For
example, if the user account “user” logs in the same UNM2000 server via client
ends A and B, sessions a and b will be generated respectively. When the
account “user” generating session a is forced to exit, the account “user”
generating session b is not influenced.
u The UNM2000 does not support the user of the current session sending
messages to himself or herself.
Version: B 61
UNM2000 Network Convergence Management System Operation Guide
Prerequisite
Procedure
2. In the Monitor User Session tab, view the information of the online user.
3. Right-click the corresponding user session, and select Send Message from the
shortcut menu.
4. Type the message contents in the Send message dialog box, and then click
OK.
Procedure
3. Click the corresponding user and click Activity Info in the right pane to view
the activity information of the user.
62 Version: B
3 Security Management
Note:
The following takes assigning authorities for users in two areas as example to
introduce how to create user accounts and assign authorities.
Scenario Description
The devices in Area A and Area B are managed by UNM2000 for uniform
supervision. The device in Area A is monitored, operated and maintained by
working staff in Area A and the device in Area B is monitored, operated and
maintained by working staff in Area B. Therefore, the working staff in Area A and
Area B should be allocated with user accounts and authorities respectively.
Procedures
According to area division, create object set A and object set B. Add the
devices of Area A and Area B to the members of object set A and object set B.
Version: B 63
UNM2000 Network Convergence Management System Operation Guide
4 The working staff responsible for monitoring: the application supervisor set
and the network supervisor set.
4 The working staff responsible for operation: the application operator set
and the network operator set.
For specific operations of creating the operation set, see Adding an Operation
Set.
Manage-
User Group User Group
ment Operation Authority
Name Type
Domain
Inspector Common Object Group Application supervisor set and network
Group A user group A supervisor set
Operator Common Object Group Application operator set and network operator
group A user group A set
Maintainer Common Object Group Application maintainer set and network
group A user group A maintainer set
Supervisor Common Object Group Application supervisor set and network
group B user group B supervisor set
Operator Common Object Group Application operator set and network operator
group B user group B set
Maintainer Common Object Group Application maintainer set and network
group B user group B maintainer set
Refer to Creating User Groups for specific steps of creating the user groups.
4. Create users.
64 Version: B
3 Security Management
4 Create the user's basic information. Set the username and password. For
security, select Modify Password on Next Login or set the valid days of
the password.
4 According to the working shifts of the staff, set the login time ranges.
4 Set the users' user groups. If six user groups A, B, C, D, E, and F are to be
created, refer to Table 3-4. After being assigned with a user group, the
user will be authorized with the management domain and operational
authorities of the user group.
A Inspector Group A
B Operator Group A
C Maintainer Group A
D Inspector Group B
E Operator Group B
F Maintainer Group B
4 Set the access control list and limit the IP address range accessible to the
user.
After completing the above configurations, provide the user accounts for the
corresponding staff.
Version: B 65
4 Configuration Management
Tracing Signaling
Configuration Synchronization
Pre-deploying ONUs
Pinging NEs
Telneting NEs
66 Version: B
4 Configuration Management
Prerequisite
Procedure
Version: B 67
UNM2000 Network Convergence Management System Operation Guide
Note:
In case of network resource adjustment and that changes are made to the
management program that the NE belongs to, you can delete the management
program and then create one or directly modify the management program to meet
your requirement.
Prerequisite
68 Version: B
4 Configuration Management
Procedure
Other Operations
1. In the left pane of the Communication Routing Management dialog box, click
→Pass-throughbefore the management program. The right pane displays
the pass-through NEs under the current management program.
Version: B 69
UNM2000 Network Convergence Management System Operation Guide
Note:
Copy NE is used to copy the NE of the same type. After copying an NE,
users only need to modify the different parameters (such as the IP
address), so that they can create NEs rapidly.
4.1.1.3 Pre-configuration
Prerequisite
Procedure
2. In the left pane of the Communication Routing Management dialog box, click
→Pass-through before the management program.
70 Version: B
4 Configuration Management
3. Click a certain NE in the Pass-through NE List of the Manager in the right pane
and select Cancel Manager Management from the shortcut menu. This NE is
moved to Pre-configured NE list.
Subsequent Operation
The partition policy can be used to divide the NEs in a same management program
according to the start IP address and end IP address of the partition.
Prerequisite
Procedure
Version: B 71
UNM2000 Network Convergence Management System Operation Guide
2. Right-click Partition Policy Management in the left pane and select Create a
Partition from the shortcut menu. In the displayed dialog box, set the
parameters and click OK.
Note:
Other Operations
Right-click the created partition and select Create a Partition (N), Modify Partition
or Delete the Partition from the shortcut menu to perform the corresponding
operation.
72 Version: B
4 Configuration Management
To ensure the communication between the EMS and the NE, it is necessary to
configure the SNMP parameters of NEs at the UNM2000.
You can directly configure the SNMP parameters of NEs at the UNM2000 side,
create NEs manually, or automatically apply the SNMP parameters by using the
applicable SNMP parameter template upon NE automatic discovery.
You can manage the SNMP parameter templates used for the communication
between the UNM2000 and the NEs.
Prerequisite
Background Information
The SNMP parameter template named default is the default template and cannot
be deleted. If no SNMP parameter template is set for an NE during the creation, the
NE will use the default SNMP parameter template default.
Procedure
Version: B 73
UNM2000 Network Convergence Management System Operation Guide
2. Set various parameters in the SNMP Parameter Template pane at the bottom
of the tab, and click Create. The detailed information of the newly created
SNMP parameter template appears in the template list above.
3. Right-click a template and select Bind NE from the shortcut menu to open the
Select Bound NE dialog box. Select the NE to be bound and click OK. After
the binding is performed, the information on the NE bound with the SNMP
parameter template will be displayed in the Binding NE Information pane.
Other Operations
1. In the main topology window, right-click the NE and select Attribute. The
Attribute Page dialog box appears on the right.
2. In the Attribute Page dialog box, click the SNMP parameter template and
select a new template from the drop-down box to modify the SNMP parameter
template bound with the NE.
74 Version: B
4 Configuration Management
You can manage the SNMP parameter templates used for the communication
between the UNM2000 and the NEs.
Prerequisite
Background Information
The SNMP parameter template named default is the default template and cannot
be deleted.
Procedure
2. In the upper pane of the SNMP Parameter Template Management dialog box,
select the desired SNMP parameter template.
Note:
Version: B 75
UNM2000 Network Convergence Management System Operation Guide
You can use a template to configure multiple NEs of the same model in the
administrative domain of the entire network by using the global profile, so as to
improve the project start-up efficiency.
You can configure multiple NEs of the same model in the administrative domain of
the entire network in a batch manner by using the global profile, so as to improve
the project start-up efficiency.
Prerequisite
Note:
Procedure
1. Select Configure→Global Template Config from the main menu to open the
Global Template Management tab.
2. Select Global Profile→ADSL Line Profile under the AN5006–20 to open the
ASDL Line Profile tab.
76 Version: B
4 Configuration Management
3. Click the template entry in the ADSL Line Profile tab to view the NE bound
with the template.
Other Operations
In the ADSL Line Profile dialog box, right-click the template entry and select Add,
Delete, Modify, Compare Templates, Bind to System Card / Port, etc.
When the existing global templates do not meet the requirements or new global
templates are needed, follow the steps below to add global templates.
Prerequisite
Note:
The following uses the Packets Rate Control Profile of the AN5116–
06B as an example. You can follow the same procedures to bind other
templates with the only difference in the access method.
Procedure
1. Select Configure→Global Template Config from the main menu to open the
Global Template Management tab.
Version: B 77
UNM2000 Network Convergence Management System Operation Guide
3. Click to open the Enter the number of rows to add. dialog box, type the
number of templates to be added and then click OK.
4. Complete the parameter settings of the packet rate control template(s) in the
right pane and click . The system automatically generates the Global
Template ID.
When the existing global templates do not meet your requirements, you can create
global templates according to your needs.
Background Information
u If you only modify the parameter settings of the template with the template
name unchanged, the UNM2000 will automatically update the parameter
settings of the template. If the template is bound with a device, the template
parameter settings on the device are inconsistent with those in the UNM2000.
To ensure the consistency of the template parameter settings on the device and
in the UNM2000, seeBinding / Unbinding a Global Template.
u If you modify the name of the template, the UNM2000 will create a template
with the new name and the old template will be deleted from the UNM2000. If
the template is bound with a device, the template on the device will lose the
reference relationship with the template in the UNM2000.
Prerequisite
78 Version: B
4 Configuration Management
Note:
The following uses the Packets Rate Control Profile of the AN5116–
06B as an example. You can follow the same procedures to bind other
templates with the only difference in the access method.
Procedure
1. Select Configure→Global Template Config from the main menu to open the
Global Template Management tab.
3. Right-click the desired template and select Batch Modify to open the Batch
Modify dialog box.
4. Modify the parameter settings and click Apply→OK at the lower part to save
the changes.
Version: B 79
UNM2000 Network Convergence Management System Operation Guide
Bind a global template with a device so that the parameter settings of the device are
consistent with those set in the global template in the UNM2000.
Prerequisite
Note:
The following uses the Packets Rate Control Profile of the AN5116–
06B as an example. You can follow the same procedures to bind other
templates with the only difference in the access method.
Procedure
1. Select Configure→Global Template Config from the main menu to open the
Global Template Management tab.
80 Version: B
4 Configuration Management
3. Select the template and click or select Save to System from the shortcut
menu to open the Select Object dialog box. Select the system to be bound and
click the OK.
4. Bind a card / port (for the template to be bound with a card / port).
2) The Please Select ONU Port dialog box appears. Select a desired port
and click Next. After the binding is completed, the corresponding binding
information appears in the Binding NE Information pane.
5. Unbind a template.
2) In the displayed Select Object dialog box, select the desired device and
click OK.
Other Operations
Select the shortcut menu or click the button on the toolbar to perform the
corresponding operation on the template, such as Delete, Batch Modify, Delete
from System and Compare Templates.
Prerequisite
u The template to be deleted is not bound with any device; otherwise, see
Binding / Unbinding a Global Template to unbind the template from the device.
Version: B 81
UNM2000 Network Convergence Management System Operation Guide
Note:
The following uses the ADSL Line Template as an example. You can
follow the same procedures to delete other templates with the only
difference in the access method.
Procedure
1. Select Configure→Global Template Config from the main menu to open the
Global Template Management tab.
2. Select ADSL Line Profile in the left pane to open the ASDL Line Profile tab.
3. Click to open the Configure the Selection Range dialog box, select the
corresponding range according to the quantity of templates to be deleted and
then click OK.
82 Version: B
4 Configuration Management
The global configuration is a set of attributes with specific values. You can use the
global configuration to configure NEs of multiple types (non-template) in the
administrative domain of the entire network, so as to improve the project start-up
efficiency.
The user can configure NE devices of multiple types (non-template) within a global
network management domain uniformly, so as to enhance the project provisioning
efficiency.
Prerequisite
Note:
Procedure
1. Select Configure→Global Template Config from the main menu to open the
Global Template Management tab.
Version: B 83
UNM2000 Network Convergence Management System Operation Guide
When the existing global configurations do not meet the requirements or new global
configurations are needed, follow the steps below to add the global configuration.
Prerequisite
Note:
The following uses the IGMP Mode under Service Configure of the
AN5116-06B as an example. You can follow the same procedures to add
other global configurations with the only difference in the access method.
Procedure
1. Select Configure→Global Template Config from the main menu to open the
Global Template Management tab.
3. Click to open the Enter the number of rows to add dialog box, enter the
number of entries to be added and click OK.
4. In the multicast mode dialog box, complete the parameter settings and click
. The system automatically generates the Global Configuration ID.
When the existing global configurations do not meet your requirements, you can
modify the global configurations according to your needs.
Prerequisite
84 Version: B
4 Configuration Management
Note:
The following uses the IGMP Mode under Service Configure of the
AN5116-06B as an example. You can follow the same procedures to add
other global configurations with the only difference in the access method.
Procedure
1. Select Configure→Global Template Config from the main menu to open the
Global Template Management tab.
3. Right-click the desired configuration entry and select Batch Modify from the
shortcut menu to open the Batch Modify dialog box.
4. Modify the parameter settings and click Apply→OK at the lower part to save
the changes.
Bind the global configuration with a device so that the parameter settings of the
device are consistent with those set in the global configuration in the UNM2000.
Prerequisite
Note:
The following uses the IGMP Mode under Service Configure of the
AN5116-06B as an example. You can follow the same procedures to
perform the operation on other global configurations with the only
difference in the access method.
Version: B 85
UNM2000 Network Convergence Management System Operation Guide
Procedure
1. Select Configure→Global Template Config from the main menu to open the
Global Template Management tab.
4. The Select Port dialog box appears. Select a desired port and click OK.
When a global configuration template is no longer needed, you can delete it.
Prerequisite
Note:
The following uses the Voip Service Vlan under Voice Service Config
of the AN5006–30 as an example. You can follow the same procedures
to delete other templates with the only difference in the access method.
Procedure
1. Select Configure→Global Template Config from the main menu to open the
Global Template Management tab.
3. Click to open the Configure the Selection Range dialog box, select the
corresponding range according to the quantity of templates to be deleted and
then click OK.
86 Version: B
4 Configuration Management
Tracing the signaling is used to trace the signaling frame of the communication
between the current IAD and the voice communication card, so as to find the
communication faults in a timely manner.
Background Information
This function is available only to the FTTH type ONUs and the FTTB type ONUs that
support the voice service.
Procedure
2. Select the signaling tracing object in the left pane and click New to add one row
in the right pane. Then set IP address, Four-layer source port number, and 4
Level Destination Port Number.
Version: B 87
UNM2000 Network Convergence Management System Operation Guide
Procedure
2. Right-click the objects to be compared and select Add Selected and Sub-
items from the shortcut menu. The selected objects will be added to the right
comparison zone.
88 Version: B
4 Configuration Management
Note:
The comparison results displayed in the Status column are described as
follows:
Subsequent Operation
When the comparison results are different, you can click or to upload or
download the configuration according to Table 4-1.
Button Description
Version: B 89
UNM2000 Network Convergence Management System Operation Guide
The network access management helps you analyze and observe the resource
interconnection status and network access status of the system and the line card.
Prerequisite
Procedure
2. Select the desired object in the object tree and select the Query Status (Q)
button to query the resource management system interconnection status and
registration status of the object.
3. Select the system / card to be registered in the object tree, and click the Send
RMS Connection Status (M) / Send the Selected Line Card RMS
Connection Status (C) button to enable the interconnection with the resource
management system.
90 Version: B
4 Configuration Management
4. Select the system / card to be registered and click the Initiate Registration /
Initiate Registration of the Selected Line Cards button. After the registration
succeeds, the status is as shown in the following figure.
5. Click the Write DB or Read DB button to write the configuration into the
database or read the configuration from the database.
The UNM2000 enables you to configure the home gateways in a batch manner,
which effectively lowers the heavy workload of configuring the NEs one by one.
Prerequisite
Procedure
Version: B 91
UNM2000 Network Convergence Management System Operation Guide
2. In the left pane of the dialog box, select the desired NE and click to enter
the number of entries to be added.
3. Configure the start MAC address of the home gateways in a batch manner
according to the planning data.
92 Version: B
4 Configuration Management
4. Select the configured multiple home gateway entries and click to deliver
them to the device.
In some network deployment, there are a great number of remote ONUs far away
from the equipment room of the central office and dispersed. However, the
UNM2000 enables you to implement pre-deployment of NEs and their
corresponding services via importing a table. This achieves offline batch-
configuration and plug-and-play of ONUs.
Prerequisite
Version: B 93
UNM2000 Network Convergence Management System Operation Guide
Procedure
2. Click the button to download the template and save it to the local computer.
Subsequent Operation
1. When the ONU is provisioned, select the corresponding configuration entry and
click to deliver the pre-deployment parameters to the ONU so as to
complete the service data configuration.
Other Operations
u Click to export the configuration data in the UNM2000 to the local client end
as a configuration template.
Ping operations are used to check the communication between the NE and the
network management system.
94 Version: B
4 Configuration Management
Procedure
1. Right-click the object in the object tree of the main topology, select Ping from
the shortcut menu. In the displayed Command Tool dialog box, view the Ping
operation result.
When the UNM2000 client cannot access the device directly, it can access the
device via Telnet or access the Telnet proxy server to perform operations via CLI.
See Setting the Telnet Proxy Server for the Telnet proxy server settings.
Procedures
1. Right-click the object in the main topology object tree and select Telnet from
the shortcut menu.
2. In the displayed Command Tool dialog box, enter the username and password
to log into the CLI and perform operations via the CLI.
The UNM2000 supports performing the Tacert operation from the UNM2000 server
to the specified IP address.
Background Information
The Tracert (tracing the route) function is used to test the gateway that the data
packet passes from the source host to the destination. It mainly checks whether the
network connection is reachable and analyzes the failure occurrence location in the
network. The Tracert command uses the IP Time to Live (TTL) field and the ICMP
error message to determine the route from a host to another host in the network.
Version: B 95
UNM2000 Network Convergence Management System Operation Guide
Prerequisite
u The authority of the Tracert function is configured in the authority and domain
division management. Only the user who has the corresponding authority can
perform the Tracert function.
Procedure
1. In the Object Tree pane of the UNM2000 main topology, right-click Local NMS
and select Server tracert, as shown below:
2. In the Server Tracert Tool command dialog box, enter the specified IP address
and press Enter. The Tracert result appears in the command window, as shown
below:
The UNM2000 supports PON configuration migration as well as the PON port
configuration migration.
96 Version: B
4 Configuration Management
Prerequisite
Procedure
1. Select Config→PON Config Transfer from the main menu to open PON
Config Transfer dialog box.
2. Set the parameters, such as IP addresses of the source and sink OLTs.
3. Click Execute.
Version: B 97
5 Topology Management
The topology management is used to create and manage the topology architecture
of the entire network, so as to reflect the network connection status and operating
status of the equipment. Users can view the topology objects and real-time alarm
prompts in the topology view.
Creating NEs
Adding Cards
Editing NEs
98 Version: B
5 Topology Management
The creation flow of the network topology describes the creation procedures of the
subnet, NEs, cards and links as well as the relationship among the operation tasks.
The creation flow of the network topology is as shown in Figure 5-1.
In the creation flowchart, the horizontal procedures indicate the four phases of the
network topology creation: creating the subnet, creating the NE, creating the card
and creating the link; the vertical procedures indicate the operation tasks included in
each phase.
The flow for creating the network topology is as shown inTable 5-1
Manage the Creating a Global For convenient management of NEs, you can place the topological objects in
subnet Logical Domain the same area or of the same attribute into a same logical domain.
To manage the physical devices through the UNM2000, you need to create the
Creating an NE corresponding NEs in the UNM2000. Creating NEs includes creating the
access NE and virtual NE, and discovering the NE automatically.
Configure the NE The NEs are not configured after being created. Before managing the NEs via
Manage the data the UNM2000, you need to configure the NE data first.
NE The NE ID is the unique identifier of the NE. During the network planning, each
NE must be assigned a unique ID. In case of NE ID conflicts, the route conflicts
Modify the NE ID will occur and consequently some NEs cannot be managed. To adjust the
original planning and modify the NE ID during debugging or capacity
expansion, you can modify it through the UNM2000.
Version: B 99
UNM2000 Network Convergence Management System Operation Guide
Modify the NE You can modify the NE name as needed. Modifying the NE name does not
name influence the running of the NE.
Creating a Link You can create links, fibers / cables as well as virtual fibers.
Modify the fiber
You can modify the name, attenuation, length and type of the fiber according
Manage the connection
the connection status and physical features of the fiber.
link information
To delete an NE or modify the fiber connection between NEs during network
Delete the fiber
adjustment, you need to delete the fiber connection between the NEs.
For convenient management of NEs, you can customize logical domains and place
the NEs in the same area or of the same attribute into a same logic domain. The
domain is a set of various NEs, and sub logical domains can be created under it.
For example, you can create a logical domain named Site A, and then create sub
logical domains Area 1, Area 2, etc. under Site A.
Prerequisite
Procedure
2. Set the parameters, among which Logical Domain Name is required and
others are optional.
100 Version: B
5 Topology Management
3. After configuring the parameters, click OK. The created logical domain appears
in the main topology.
Other Operations
Right-click the logical domain and select the shortcut menus to perform the
corresponding operations.
To manage the physical devices through the UNM2000, you need to create the
corresponding NEs in the UNM2000. There are two ways to create the NEs: Manual
creation and automatic discovery. For creating the network topology architecture,
manual creation of NEs in a batch manner is recommended. For network capacity
expansion, automatic discovery of NEs is recommended.
Only when the access NE is created can the access devices be managed via the
UNM2000.
Prerequisite
Procedure
1. Right-click the logical domain, and select Create NE→Create Access NE, or
click the logical domain and select Resource→Create NE→Create Access
NE in the main menu to open the Create Access NE dialog box.
Version: B 101
UNM2000 Network Convergence Management System Operation Guide
3. After configuring the parameters, click OK. The created access NE appears in
the logical domain or main topology.
To display the topological relationship between the NEs that can be directly
managed and the NEs that cannot be directly managed in the topograph, you need
to create virtual NEs (representing the NEs that cannot be directly managed) to
implement unified management of the NEs in the entire network.
102 Version: B
5 Topology Management
Background Information
Virtual NE
u The virtual NE is the abstract concept of the NEs that cannot be directly
managed by the UNM2000. In case the NEs managed by other EMS instead of
the UNM2000 exist in the network and paths are created between these NEs
and the NEs managed by the UNM2000, you can create virtual NEs in the
UNM2000 to present their topological relationship in the topograph.
u Different from the actual NEs, the virtual NEs has no restriction on hardware
device and therefore they can be used to represent any unknown devices.
Prerequisite
Procedure
1. Right-click the logical domain and select Create NE→Create Other NE, or
click the logical domain and select Resource→Create NE→Create Other NE
in the main menu to open the Create a Virtual NE dialog box.
3. After configuring the parameters, click OK. The created virtual NE appears in
the logical domain or main topology.
The UNM2000 supports the NE automatic discovery function. You can set the
desired IP segment, in which the NEs will be discovered automatically and created
in the UNM2000. Meanwhile, the configuration data will be uploaded, adding the
NEs to the UNM2000 for management.
Version: B 103
UNM2000 Network Convergence Management System Operation Guide
You can view the existing NE automatic discovery tasks to check whether they meet
the requirements for network development.
Prerequisite
Procedure
1. Select one of the following access methods to open the Policy Task
Management tab to view the existing NE automatic discovery tasks.
2. Click a desired NE automatic discovery task in the left pane to view the IP
address, type and status of the automatically discovered NE.
104 Version: B
5 Topology Management
Users can set the system to discover the NEs inside the appointed IP address
section as required and create the discovered NE automatically.
Prerequisite
Procedure
1. Select one of the following access methods to open the Policy Task
Management tab.
2. Click the Create button at the bottom of the tab, or right-click Auto Detect NE
Task in the left pane, or right-click in the right pane and select Create to open
the dialog box.
3. Set the related parameters in the Basic information and Extend information
tabs, and click OK after completing the settings. Then the added tasks will be
displayed in the task list.
Version: B 105
UNM2000 Network Convergence Management System Operation Guide
Note:
u Click the Copy from Other Task button, and users can copy all
settings except for the Task name of other tasks. This can improve
the setting efficiency.
106 Version: B
5 Topology Management
Users can set the system to discover the NEs inside the appointed IP address
section as required and create the discovered NE automatically.
Prerequisite
Procedure
1. Select one of the following access methods to open the Policy Task
Management tab and view the existing NE automatic discovery tasks.
2. Right-click the task, and select Execute Now, or click the task, and then click
the Execute Now button at the bottom of the tab to execute the NE automatic
discovery task.
After configuring the NE data, you need to add cards in the NEs. You can manually
add cards or have the cards added automatically.
Version: B 107
UNM2000 Network Convergence Management System Operation Guide
Prerequisite
Procedure
2. Select the system to be detected in the object tree pane, and click Detect
Physical Configuration (D) at the lower part of the tab to execute the
detection command. Then you can view the information of the detected cards
and ports.
3. Select the synchronization mode according to Table 5-3, and click the
Synchronize All button to synchronize the configuration of detected cards to
the UNM2000.
108 Version: B
5 Topology Management
Prerequisite
Procedure
a) Right-click the subrack in the device tree and select Add All Cards
from the shortcut menu.
Version: B 109
UNM2000 Network Convergence Management System Operation Guide
b) In the displayed dialog box, click Yes. The UNM2000 adds all the
cards to the recommended locations respectively.
c) Right-click the card and select Delete Card / Replace Card from the
shortcut menu to adjust the inserted cards according to the actual
card quantity and the corresponding card location of the project.
Right-click the slot of the card in the subrack view and select Add Card→
to add the corresponding card according to the actual card quantity and
the corresponding card location of the project.
Since there are no physical connections between the OLT devices, you can create
connections between any two NEs in the UNM2000 for convenient topology
management. This kind of connection is called virtual connection.
Prerequisite
Procedure
1. Right-click in the blank area of the physical topology view, and select Create
Virtual Link from the shortcut menu to open the Create the Virtual
Connection dialog box.
Table 5-4 Description of Parameters in the Create the Virtual Connection Dialog Box
Parameter Description
110 Version: B
5 Topology Management
Table 5-4 Description of Parameters in the Create the Virtual Connection Dialog Box
(Continued)
Parameter Description
3. After completing the settings, click OK . The connection line appears between
the source and sink NEs.
After configuring the NE basic data, you can set the NE attribute (NE name, NE IP
address, etc.) and NE icon according to the management requirement.
After creating NEs, you can modify the NE attributes (NE name, NE IP address,
etc.) according to the network running status and management requirement.
u Modifying the NE name does not influence the running of the NE.
Prerequisite
Version: B 111
UNM2000 Network Convergence Management System Operation Guide
Procedure
1. Right-click the desired NE and select Attribute from the shortcut menu to open
the Attribute Page pane.
You can modify the size and pattern of the NE icon according to your preference.
Prerequisite
112 Version: B
5 Topology Management
Procedure
1. Right-click the NE whose icon is to be edited and select Edit the Icon from the
shortcut menu to open the Edit Icon dialog box.
2. Modify the size and pattern of the NE icon and preview the icon at the lower
part of the dialog box.
3. Click OK.
You can set whether to display the NE IP address and type in the NE icon,
facilitating NE query in the topograph.
Prerequisite
Procedure
You can make special tags on the NEs to distinguish NEs of difference levels of
attention.
Version: B 113
UNM2000 Network Convergence Management System Operation Guide
Prerequisite
Procedure
3. In the Identifier NE dialog box, enter the tag content and click OK.
Procedure
1. Select View→Label Query in the main menu to open the Label Query tab,
which displays all the objects that have been labeled by default.
4 Reset Query: Click Reset Query to open the Reset Query dialog box and
then set the flag name and applicable object to search for the object with a
specific flag.
4 Locate to Object: Select the desired object and click Locate to Object to
locate the object in the Main topology tab.
4 Delete the Flag: Select the object and click Delete the Flag to delete the
flag of the object.
When the network is of large scale, you can modify the names of the logical
domains, NEs and ONUs into easy-to-identify names in a batch manner.
Prerequisite
114 Version: B
5 Topology Management
1. Select Resource→Batch modify NE name from the main menu and open the
Batch modify NE name tab.
2. In the left pane of the Modify NE Names in a Batch Manner tab, click NE to
modify the NE names in a batch manner.
1) Click Set Object Query Conditions to open the Set Object Query
Condition dialog box. Then query and modify the object, and click OK.
i) Click Excel Import to open the Import Data dialog box. Select
Download Template to download the Excel file template.
Version: B 115
UNM2000 Network Convergence Management System Operation Guide
iii) In the Import Data dialog box, select View File to upload the
Excel table already edited and then click OK.
i) Select the desired NEs and click Batch Modify to open the
Batch Modify dialog box.
116 Version: B
5 Topology Management
ii) Set the batch modification rule in the Batch Modify dialog box
according to Table 5-5, and then click OK.
Parameter Description
iii) In the Confirm information alert box, click Yes to confirm the
modification.
iv) In the Modify NE Names in a Batch Manner tab, check the new
names under the Preview Name column. After the confirmation,
click Save.
Version: B 117
UNM2000 Network Convergence Management System Operation Guide
ii) Enter the original NE names and new NE names in the Search
Characters and Replace with textboxes and then click OK.
iii) In the Confirm Information alert box, click Yes to confirm the
replacement.
iv) In the Modify NE Names in a Batch Manner tab, check the new
names under the Preview Name column. After the confirmation,
click Save.
Note:
In the left pane of the Modify NE Names in a Batch Manner tab, click
Logical Domain or ONU to modify the names of logical domains or
ONUs according to Step 2.
The following introduces how to modify the connection line properties and how to
expand / collapse the connection line.
118 Version: B
5 Topology Management
The user can modify the properties of the connection line between NEs; for
example, direction, type and width.
Prerequisite
Procedure
2. Modify the connection line direction, control point format, width and color as
needed.
When there are multiple connection lines between the NEs, the user can collapse or
expand the lines.
Prerequisite
Procedure
1. Right-click the connection line between the NEs and set the display mode.
4 Collapse the connection lines: After Collapse line is selected from the
shortcut menu, the collapsed line is added with a + symbol, and the
connection line names are hidden.
4 Expand the lines: After the Expand line is selected from the shortcut menu,
the connection lines are expanded, each of which is displayed with its
name.
Version: B 119
UNM2000 Network Convergence Management System Operation Guide
In the topology view, the user can know the network layout, and the networking
operation of each NE.
In the physical topology view, the user can check the NE topology monitored by the
UNM2000 and relevant information.
Procedure
1. Click the Main Topology tab and select Physical Topology View from the
Current View drop-down list.
2. The Current View window displays the information of the devices in the
topology.
Subsequent Operation
In the image mode, right-click in the blank area of the physical topology view
and select Set Background Image or Use the Default Background Image
from the shortcut menu to set the background image of the physical topology
view.
Right-click in the blank area of the physical topology view and select Expand
All Logic Domains or Collapse All Logic Domains.
u Hide nodes.
Right-click the NE in the physical topology view and select Hidden Node from
the shortcut menu. The NE will not appear in the physical topology view.
120 Version: B
5 Topology Management
Right-click in the blank area of the physical topology view and select Manage
the Hidden Nodes to open the Hide Node Management dialog box. Then
select the nodes to be displayed and click OK. The corresponding nodes are
displayed in the physical topology view.
u According to Table 2-2, you can lock, move, zoom in or zoom out the physical
topology view by clicking the shortcut icons on the top of the view.
By checking the sub-topology view, users can view the topology relationship
between various physical units of the NE, including the subrack, cards, and ports.
Procedure
1. Right-click the NE in the object tree pane or the physical topology and select
View Topology to open the Sub-topology View tab of the corresponding NE.
2. The Sub-topology View tab displays all the information of the NE, including
the subrack, card and the connection of the port.
Subsequent Operation
You can perform the following operations in the sub-topology view via the shortcut
menus.
Right-click the blank area in the Topology View tab, and select Set a
background image or use the default background image to set the
background image of the sub-topology view.
1) Right-click the blank area in the Topology View tab, and select layout... to
open the layout dialog box.
Version: B 121
UNM2000 Network Convergence Management System Operation Guide
2) Adjust the layout style as required, and preview the adjustment results in
the Preview pane.
u Hide nodes.
Right-click the node in the sub-topology view, and select hidden nodes; then
the selected node will not be displayed in the sub-topology view.
Right-click the blank area in the sub-topology view, select Hidden Node
Manager...; select the hidden nodes to be displayed in the Hidden Node
Manager dialog box, and click OK. Then the corresponding nodes will be
displayed in the sub-topology view.
u Edit icons.
Right-click the node in the sub-topology view, and select edit icon...; in the edit
icon dialog box, set the size and style of the node icon, and click OK.
u Users can lock, move, zoom in, and zoom out the sub-topology view via the
shortcut icons at the top part of sub-topology view according to Table 2-2.
122 Version: B
5 Topology Management
The Bird-eye View displays the thumbnail of the topology. In case the topology
window displays only part of the view, you can browse the full view, understand the
topology architecture as well as locate the display area of the topology view via
Bird-eye View.
Procedure
1. On the toolbar above the topology view, click to open the Bird-eye View,
which displays the thumbnail of the corresponding topology.
Note:
In the Bird-eye View window, only the area within the purplish red frame
is displayed. Drag this area to locate the display zone of the topology.
You can search for and locate the object quickly via the object search functions.
Background Information
Procedures
2. In the displayed Advanced Search dialog box, set the object type, search type
and search content, and then click Search.
Version: B 123
UNM2000 Network Convergence Management System Operation Guide
3. Select the desired object in the search result and click Localize. The Main
Topology tab will automatically go to the area that the NE locates in and mark
the target object.
Typically, you need to delete the objects in the network topology before adjusting
the topology.
When adjusting the network topology, you can delete the subnet logical domain that
is no longer needed from the topology view. After a logical domain is deleted, the
objects in this logical domain will be moved to its upper-level logical domain.
Prerequisite
124 Version: B
5 Topology Management
Procedure
1. Right-click in the logical domain of the main topology window and select Delete
from the shortcut menu.
Prerequisite
Procedure
1. Right-click the desired NE and select Delete from the shortcut menu.
Caution:
When adjusting the network topology, you can delete the subnet logical domain that
is no longer needed from the topology view. After a logical domain is deleted, the
objects in this logical domain will be moved to its upper-level logical domain.
Prerequisite
Version: B 125
UNM2000 Network Convergence Management System Operation Guide
Procedure
1. Right-click in the logical domain of the main topology window and select Delete
from the shortcut menu.
Prerequisite
u Before deleting a card, you need to delete the services and protection groups
related to the card.
Procedure
1. Right-click the desired NE in the main topology and select Open NE Manager
from the shortcut menu to open the NE Manager window.
a) Right-click the subrack in the device tree and select Delete All Cards
from the shortcut menu.
a) Right-click the desired card in the device tree and select Delete Card
from the shortcut menu.
126 Version: B
6 Managing Access NEs
The following introduces how to manage the access NEs using the UNM2000.
Authorizing ONUs
Authorizing Cards
Version: B 127
UNM2000 Network Convergence Management System Operation Guide
The NE Manager GUI is the main GUI for managing the devices. You can perform
operations based on NEs as well as configure, manage and maintain the NEs,
cards or ports separately. You can select the corresponding operation object and the
corresponding function in the main menu of the NE manager to search for and use
the related configuration items of the function.
Access Method
Right-click the object in the object tree of the main topology and select Open NE
Manager from the shortcut menu to access the NE Manager GUI, as shown in
Figure 6-1.
128 Version: B
6 Managing Access NEs
The following introduces the access method and GUI layout of the Local Service
Configuration function in the NE Manager.
Access Method
GUI Introduction
The Local Service Config GUI mainly includes the Operational Tree, Service
Configuration Tab and Operation Information Displayed Pane, as shown in
Figure 6-2.
(1) The Operational Tree (2) The service configuration (3) The operation information
pane pane pane
Version: B 129
UNM2000 Network Convergence Management System Operation Guide
With the ONU query function, you can find the desired ONU quickly and view the
system, slot number, PON port number and logical ID of the ONU.
The UNM2000 supports querying the ONU by different ONU attributes. It also
supports fuzzy query and complete match. The ONU query conditions fall into two
parts:
u General query conditions: Include the logical domain, type, name, logical ID,
physical ID, OLT IP address, voice service and data service of the ONU.
u Advanced query conditions: Include slot No., ONU No., ONU password, logical
SN password, optical splitter No., optical splitter port No., ONU label and ONU
user information.
Prerequisite
Procedure
2. Set the query conditions in the Set ONU Query Conditions dialog box.
3. After completing the settings, click OK. The Query ONU tab displays the ONUs
meeting the query conditions.
130 Version: B
6 Managing Access NEs
4. In the Query ONU tab, select one or more entries and click Service
Configuration at the lower-right corner to go to the NE Manager window. Then
you can query the service configuration information of the ONU device.
The user can view the detailed ONU information and perform ONU configurations.
Procedure
Version: B 131
UNM2000 Network Convergence Management System Operation Guide
Click Port Service Config to view the port type of the ONU service and
the number of ports of different types.
Note:
Click View Details to view the detailed information of the specified ONU,
including ONU Port Panel, ONU Information, ONU Service Information,
and ONU Callback Information.
132 Version: B
6 Managing Access NEs
With the ONU query function, you can find the desired ONU quickly and view the
system, slot number, PON port number and logical ID of the ONU.
Background Information
The UNM2000 supports querying the ONU by different ONU attributes. It also
supports fuzzy query and complete match. The ONU query conditions fall into two
parts:
u General query conditions: Include the logical domain, type, name, logical ID,
physical ID, OLT IP address, voice service and data service of the ONU.
u Advanced query conditions: Include slot No., ONU No., ONU password, logical
SN password, optical splitter No., optical splitter port No., ONU label and ONU
user information.
The following introduces how to perform the ONU query via setting different query
conditions:
2. Enter the MAC address of the ONU in the Physical Address field.
3. Click OK. The Query ONU tab displays the ONUs matching the MAC address.
3. Set Service Condition to Data and specify the values of CVLAN ID and
SVLAN ID.
4. Click OK. The Query ONU tab displays the ONUs matching the set conditions.
2. Select the logical domain where the desired ONU locates from the Logical
Domain drop-down list.
3. Click the Advanced tab in the Set ONU Query Conditions dialog box.
5. Click OK. The Query ONU tab displays the ONUs matching the set conditions.
You can perform ONU authorization related operations, including configuring the
authentication mode of the PON port or the ONU, authorizing the ONU, replacing
the ONU logical identifier and viewing authorized ONU list.
You can query the information of the authorized ONUS and pre-authorize the
unauthorized ONUs. The ONUs in the white list can be authorized and service-
provisioned, while the ONUs not in the whitelist cannot be authorized and
provisioned.
Prerequisite
u The settings of the PON port authorization type of the OLT device have been
completed.
134 Version: B
6 Managing Access NEs
Procedure
2. Modify the ONU whitelist information: Select an entry, double-click Slot No.,
PON No., ONU Type and ONU No. and select the corresponding value from
the drop-down list.
1. Click in the ONU Authorization View window. In the displayed dialog box,
enter the number of ONUs to be pre-authorized and click OK.
2. Set the parameters for these ONUs to be pre-authorized according to the PON
port authentication mode.
View and modify the authentication mode of the ONU connected to a single PON
port, card or device.
Version: B 135
UNM2000 Network Convergence Management System Operation Guide
Prerequisite
Procedure
2. In the Changing objects (ONU authentication way) dialog box that appears,
click OK.
Physical address
Authenticates the ONU based on its MAC address.
authentication
Logical SN
authentication: enable
the ONU MAC automatic Turn on this switch to set the ONU that is already authenticated
replacement function based on its SN to be authenticated based on its MAC address.
under the logical SN
authentication mode
136 Version: B
6 Managing Access NEs
Logical SN
authentication: disable
the ONU MAC automatic Turn on this switch, and the ONU can be authenticated only based
replacement function on its SN. It cannot be authenticated based on its MAC address.
under the logical SN
authentication mode
GPON password
authentication: enable
the ONU MAC automatic Turn on this switch to set the ONU that is already authenticated
replacement function based on GPON password to be authenticated based on its MAC
under the GPON address.
password authentication
mode
GPON password
authentication: disable
the ONU MAC automatic Turn on this switch, and the ONU can be authenticated only based
replacement function on GPON password. It cannot be authenticated based on its MAC
under the GPON address.
password authentication
mode
You can view and modify the authentication mode of each PON port. After the
authentication mode of the PON port is set, the ONUs under this PON port will be
authenticated adopting the set authentication mode.
Prerequisite
Procedure
Version: B 137
UNM2000 Network Convergence Management System Operation Guide
Physical ID
Authenticates based on the MAC address of the ONU.
authentication
Physical ID + password Authenticates based on the MAC address and password of the
authentication ONU.
Password authentication Authenticates based on the password of the ONU.
Logical ID authentication
Authenticates based on the SN or password of the ONU.
(with password)
Physical ID / Logical ID
Authenticates based on the MAC address, SN or password of the
(with password)
ONU.
authentication
No authentication No authentication is required for the ONU.
Logical ID authentication
Authenticates based on the SN of the ONU.
(without password)
Physical ID / Logical ID
(without password) Authenticates based on the MAC address or SN of the ONU.
authentication
Physical ID / Logical ID Authenticates based on the MAC address or password of the
authentication ONU.
Note 1: The ONU password and SN have been set before delivery. You can obtain them by
viewing the label attached to the ONU device.
138 Version: B
6 Managing Access NEs
When an ONU adopting the authentication based on logical ID is faulty, you can
replace it with an ONU of the same type. The logical ID of the new ONU is still the
logical ID of the faulty ONU. The services on the original ONU will be downloaded to
the new ONU, without the need to configure the services.
Procedure
2. Click and enter the number of rows to be added in the dialog box that
appears. Then click OK.
Procedures
2. Select the card or port and click OK to view the information of the authorized
ONU connected to the card or port. The statuses displayed in the Status
column in the ONU Authorization View tab are described in Table 6-3.
Version: B 139
UNM2000 Network Convergence Management System Operation Guide
Status Meaning
Authorized The ONU is connected and the authorization information is sent to the ONU.
The ONU is disconnected and the authorization information is saved in the
Preauthorized
network management database.
Caution:
You can select only one card in the Switch Object (Authorized ONU
Information) dialog box.
Other Operations
The UNM2000 allows you to query and manage the registration information
(registration failure and times of repeated registration) of the ONUs.
140 Version: B
6 Managing Access NEs
You can query and gather statistics of registration information of the ONUs to
understand the running status of the ONUs.
Procedure
2. In the Query ONU RMS Error Information dialog box, set the query conditions,
query object and registration status.
3. Click OK. The Query ONU RMS Error Information window displays details of
the ONUs matching the conditions.
Procedure
2. In the ONU Network Intercept Log Query dialog box, set the query conditions,
query object and registration status.
3. Click OK. The ONU Network Intercept Log Query window displays the
information of the ONUs matching the conditions.
Set the automatic enabling and disabling time period of the ONU port, which is
convenient for you to remotely manage the time period in which the ONU port can
be used.
Version: B 141
UNM2000 Network Convergence Management System Operation Guide
You can view the port enabling rule tasks already set in the system to understand
the object source included in each task, execution result and other related
information.
Prerequisite
Procedure
2. Select Data Synchronization→ONU Port Enable Rule Task in the left pane
to view the existing tasks.
3. Click a task in the left pane to view the task type, execution type, task progress,
task status, execution result and start time of the task.
4. Double-click a task in the right pane to view the attributes (basic information,
object source and extension information) of the task.
Prerequisite
Procedure
2. Right-click ONU Port Enable Rule Task in the left pane or right-click in the
right pane and select Create to open the dialog.
3. Set the parameters in the Basic information, Object information, and Object
source and Extend information tabs as required, and then click OK. The
added task appears in the task list.
142 Version: B
6 Managing Access NEs
Note:
Click the Copy from Other Task button, and users can copy all settings
except for the Task name: of other tasks. This can improve the setting
efficiency.
The following introduces how to execute the enabling rule task of the ONU port.
Prerequisite
Procedure
2. Select Data Synchronization→ONU Port Enable Rule Task in the left pane
to view the existing tasks.
3. Right-click the rule task, and select Execute now, or click the task and then
click the Execute now button at the bottom of the tab to execute the ONU port
enabling rule task.
Other Operations
Right-click the executed rule task and select View from the shortcut menu. A pane
appears in the lower part, displaying the execution object and status.
Version: B 143
UNM2000 Network Convergence Management System Operation Guide
Procedures
2. Authorize the card according to the description of parameters in Table 6-4 and
the description of operations in Table 6-5.
Parameter Description
Actual Configuration The type of card physically inserted into the device.
Button Operation
144 Version: B
6 Managing Access NEs
The user can synchronize the ONU authorization information on the device to the
network management system.
Prerequisite
Procedure
Prerequisite
Procedure
Version: B 145
UNM2000 Network Convergence Management System Operation Guide
2. Select the desired PON port and click OK. The ONU Authorization View tab
displays the information of unauthorized ONUs.
Subsequent Operation
u Click to open the Switch Object (Unauthorized ONU List) dialog box and
reselect the desired PON port.
u Click , select the range in the Configure the Selection Range dialog box
and click OK to authorize the ONU in the displayed ONU Authorization tab.
146 Version: B
6 Managing Access NEs
Prerequisite
Procedure
2. Configure the basic information and authentication information, and click Write
Database or Write Equipment according to Table 6-6 to authorize the ONU
manually.
Button Application
Applicable when the ONU is not physically connected. After the ONU
Write database is connected, the user can write the configuration in the database to
the device via configuration synchronization operations.
You can compare the ONU authorization information on the device and that in
UNM2000. If they are inconsistent, you can synchronize the ONU authorization
Version: B 147
UNM2000 Network Convergence Management System Operation Guide
Prerequisite
Procedure
Subsequent Operation
When the ONU authorization information on the device is different from that on the
network management system, the user can perform the following operations.
Before upgrading / degrading the device, you can query the card software /
hardware version to get the version information of the current device card.
148 Version: B
6 Managing Access NEs
Prerequisite
u The communication between the UNM2000 and the device where the desired
card locates is normal.
Procedure
1. Right-click the object in the object tree of the main topology and select Open
NE Manager from the shortcut menu to open the NE Manager GUI.
2. In the device subrack view of the NE manager, right-click the desired card and
select Card Service Config to open the Card Service Config dialog box.
You can create tasks for the upgrade operations required for OLT system cards
(system cards, service cards, TDM cards, voice cards and OLT firmware) and the
ONU system software and firmware so as to implement automatic upgrade.
Version: B 149
UNM2000 Network Convergence Management System Operation Guide
Caution:
You can create the system software upgrade task to upgrade the system software of
multiple objects. By selecting the file type of the object source, you can upgrade the
core switch card, IDM software, voice interface card, OLT firmware, time card
software and OTDR card. The following introduces how to view, create and execute
the upgrade task of the system software.
Prerequisite
Procedure
150 Version: B
6 Managing Access NEs
3. Click a task in the left pane to view the object information and execution status
of the task.
4. Double-click a task in the right pane to view the attributes (basic information,
object source and extension information) of the task.
Prerequisite
Procedure
2. Right-click System Software Upgrade Task in the left pane or right-click in the
right pane and select Create from the shortcut menu to open the dialog box.
3. Set the parameters in the Basic information, Object source, and Extend
information tabs as required, and click OK after completing the settings. The
added task appears in the task list.
Note:
Click the Copy from Other Task button, and users can copy all settings
except for the Task name: of other tasks. This can improve the setting
efficiency.
Version: B 151
UNM2000 Network Convergence Management System Operation Guide
Other Operations
When the system software upgrade tasks do not meet the upgrade requirements or
will expire, you can right-click the task to Delete / Disable the task or view / modify
its Attribute.
Prerequisite
Procedure
3. Right-click the task meeting the requirement for system software upgrade, and
select Execute Now, or click the task and then click the Execute Now button at
the bottom of the tab to execute the system software upgrade task.
Other Operations
Right-click the executed system software upgrade task and select View from the
shortcut menu. The execution object and status of the task appear in the lower part
of the pane.
You can select different object sources in the ONU batch upgrade task to upgrade
the CPU / IAD software and firmware of the ONU in a batch manner.
152 Version: B
6 Managing Access NEs
Prerequisite
Procedure
2. Select Upgrade Task→ONU Batch Upgrade Task in the left pane to view the
current tasks of upgrading ONUs in a batch manner.
3. Click a task in the left pane to view the object information and execution status
of the task.
4. Double-click a task in the right pane to view the attributes (basic information,
object source and extension information) of the task.
Prerequisite
Version: B 153
UNM2000 Network Convergence Management System Operation Guide
Procedure
2. Right-click ONU Batch Upgrade Task in the left pane or right-click in the right
pane and select Create from the shortcut menu to open the dialog box.
3. Set the parameters in the Basic information, Object source, and Extend
information tabs as required, and click OK after completing the settings. The
added task appears in the task list.
Note:
Click the Copy from Other Task button, and users can copy all settings
except for the Task name: of other tasks. This can improve the setting
efficiency.
Other Operations
When the ONU software upgrade tasks do not meet the upgrade requirements or
will expire, you can right-click the task to Delete / Disable the task or view / modify
its Attribute.
Prerequisite
Procedure
2. Select Upgrade Task→ONU Batch Upgrade Task in the left pane to view the
current tasks of upgrading ONUs in a batch manner.
154 Version: B
6 Managing Access NEs
3. Right-click the task meeting the requirement for batch upgrade of ONUs, and
select Execute Now, or click the task and then click the Execute Now button at
the bottom of the tab to execute the batch upgrade of ONUs.
Other Operations
Right-click the batch upgrade task of ONUs and select View from the shortcut menu.
The execution object and status of the task appear in the lower part of the pane.
Users can upgrade the service cards of multiple objects in a batch manner via the
task of upgrading the service cards in a batch manner.
Prerequisite
Procedure
2. Select Upgrade Task→Batch Upgrade Task of the Service Card in the left
pane to view the current tasks of upgrading the service cards in a batch
manner.
3. Click a task in the left pane to view the object information and execution status
of the task.
Version: B 155
UNM2000 Network Convergence Management System Operation Guide
4. Double-click a task in the right pane to view the attributes (basic information,
object source and extension information) of the task.
Prerequisite
Procedure
2. Right-click Batch Upgrade Task of the Service Card in the left pane or right-
click in the right pane and select Create from the shortcut menu to open the
dialog box.
3. Set the parameters in the Basic information, Object source, and Extend
information tabs as required, and click OK after completing the settings. The
added task appears in the task list.
Note:
Click the Copy from Other Task button, and users can copy all settings
except for the Task name: of other tasks. This can improve the setting
efficiency.
Other Operations
When the service upgrade tasks do not meet the upgrade requirements or will
expire, you can right-click the task to Delete / Disable the task or view / modify its
Attribute.
Prerequisite
156 Version: B
6 Managing Access NEs
Procedure
2. Select Upgrade Task→Batch Upgrade Task of the Service Card in the left
pane to view the current tasks of upgrading the service cards in a batch
manner.
3. Right-click the task meeting the requirement for batch upgrade of service cards,
and select Execute Now, or click the task and then click the Execute Now
button at the bottom of the tab to execute the system software upgrade task.
Other Operations
Right-click the batch upgrade task of service cards and select View from the
shortcut menu. The execution object and status of the task appear in the lower part
of the pane.
The test task includes the POTS port external / internal line task and the VoIP
pinging test task.
Via the task of the POTS port internal / external line test, you can detect whether the
POTS port of the ONU is normal.
Prerequisite
Version: B 157
UNM2000 Network Convergence Management System Operation Guide
Procedure
2. Select Test Task→POTS Port Inter & Outer Line Test Task in the left pane to
view the current tasks of POTS port internal / external line test.
3. Click a task in the left pane to view the object information and execution status
of the task.
4. Double-click a task in the right pane to view the attributes (basic information,
object source and extension information) of the task.
Prerequisite
Procedure
2. Right-click POTS Port Inner & Outer Line Test Task in the left pane or right-
click in the right pane and then select Create to open the dialog box.
3. Set the parameters in the Basic information, Object source, and Extend
information tabs as required, and click OK after completing the settings. The
added task appears in the task list.
Note:
Click the Copy from Other Task button, and users can copy all settings
except for the Task name: of other tasks. This can improve the setting
efficiency.
158 Version: B
6 Managing Access NEs
Other Operations
When the POTS port internal / external line test tasks do not meet the upgrade or
will expire, you can right-click the task to Delete / Disable the task or view / modify
its Attribute.
Prerequisite
Caution:
The execution of the test task will influence the use of services and
therefore it is recommended to execute the test task when service traffic
is at a relatively low volume.
Procedure
2. Select Test Task→POTS Port Inter & Outer Line Test Task in the left pane to
view the current tasks of POTS port internal / external line test.
3. Right-click the desired test task and select Execute Now from the shortcut
menu, or click the task and then click the Execute Now button at the bottom of
the tab to execute the POTS port internal / external test task.
Other Operations
Right-click the executed test task and select View from the shortcut menu. A pane
appears in the lower part, displaying the execution object and status.
The VoIP PING test task can be used to detect the MGC IP address corresponding
to the ONU, helping isolate failures.
Version: B 159
UNM2000 Network Convergence Management System Operation Guide
Prerequisite
Procedure
2. Select test task→VOIP PING Task in the left pane to view the current VoIP
pinging tasks.
3. Click a task in the left pane to view the object information and execution status
of the task.
4. Double-click a task in the right pane to view the attributes (basic information,
object source and extension information) of the task.
The VoIP pinging test is used to check whether the network management system
can ping the IP address of the MGC related to the ONU. This function is used to
isolate the fault in failure detection.
Procedure
2. Right-click POTS Port Inner & Outer Line Test Task in the left pane or right-
click in the right pane and then select Create to open the dialog box.
3. Set the parameters in the Basic information, Object source and Extend
information tabs; for Parameter Settings items in the Extend information tab,
see Table 6-7. After completing the settings, click OK. The task appears in the
task list.
160 Version: B
6 Managing Access NEs
Parameter Description
Sends the ECHO data packets with the number assigned by the transmission
-n
COUNT
-w The timeout interval, unit: ms
-k Uses the computer list assigned by the computer-list to list the route packet
Note:
Click the Copy from Other Task button, and users can copy all settings
except for the Task name: of other tasks. This can improve the setting
efficiency.
Other Operations
When the VOIP PING test tasks do not meet the upgrade requirements or will expire,
you can right-click the task to Delete / Disable the task or view / modify its Attribute.
Prerequisite
Version: B 161
UNM2000 Network Convergence Management System Operation Guide
Procedure
2. Select test task→VOIP PING Task in the left pane to view the current VoIP
pinging tasks.
3. Right-click the desired test task and select Execute Now from the shortcut
menu, or click the task and then click the Execute Now button at the bottom of
the tab to execute the VOIP PING test task.
Other Operations
Right-click the executed test task and select View from the shortcut menu. A pane
appears in the lower part, displaying the execution object and status.
The user can obtain the ONU MGC service configuration from the device and save
to database via the ONU MGC query task.
Prerequisite
Procedure
2. In the left pane, select Data Synchronization→ONU MGC Query to view the
existing ONU MGC query task.
3. Right-click a task and select Execute Now, or click the task and click Execute
now at the lower right corner of the tab to execute the ONU MGC query task.
4. Click a certain task in the left pane to view its object information, status, or
failure cause.
162 Version: B
6 Managing Access NEs
Other Operations
Right-click an ONU MGC query task to disable the task, and view / modify the task
attributes.
You can set the NE automatic discovery task to automatically discover the NEs in
the specified IP range and then synchronize the NEs to the UNM2000 so as to
automatically create NEs in the UNM2000.
You can set the NE automatic discovery task to automatically discover the NEs in
the specified IP segment.
Prerequisite
Procedure
2. Right-click a task entry and select Attribute from the shortcut menu to view the
details of the task (such as execution period, execution time and IP address).
Version: B 163
UNM2000 Network Convergence Management System Operation Guide
Subsequent Operation
u Right-click the task, and select Execute Now, or click the task, and then click
the Execute Now button at the bottom of the tab to execute the NE automatic
discovery task.
When changes are made to IP segments managed by the UNM2000 and new NEs
of devices are added in these IP segment, you can create NE automatic discovery
tasks to enable the UNM2000 to manage the devices in the entire network.
Prerequisite
Procedure
2. Click the Create button at the bottom of the tab, or right-click Auto Detect NE
Task in the left pane, or right-click in the right pane and select Create from the
shortcut menu to open Create Auto Detect NE Task dialog box.
3. Set the related parameters in the Basic information and Extend information
tabs, and click OK after completing the settings. Then the added tasks will be
displayed in the task list.
Note:
Click the Copy from Other Task button, and users can copy all settings
except for the Task name of other tasks. This can improve the setting
efficiency.
4. Click the desired NE automatic discovery task in the left pane to view the IP
address, NE type and status.
164 Version: B
7 Alarm Management
The alarm is the main information source for knowing about the operating condition
of the equipment and the fault isolation. Users should monitor and handle alarms in
a timely manner, so as to ensure the normal operation of the network.
Basic Concepts
Synchronizing Alarms
Handling Alarms
Alarm Logs
Version: B 165
UNM2000 Network Convergence Management System Operation Guide
The following introduces the basic concepts related to alarm management, including
alarm browsing, alarm notification mode, alarm level, alarm classification, current
alarm, alarm history, alarm and event, alarm statistics and alarm saving, facilitating
you in alarm processing.
Alarm Browsing
By browsing alarms, the network maintainer can understand the running status of
the network devices and the UNM2000 timely. The alarm browsing operation
includes browsing the current alarms or alarm history of the UNM2000, NEs, cards
and service, as well as synchronizing, verifying and confirming the alarms.
u Alarm browsing: You can browse the alarms of the devices or service in the
UNM2000 to understand the running status of the network or device.
4 Browsing current alarms: Browses the current alarms of all levels of the
entire network.
4 Browsing the alarms of the specified NE: By selecting the device in the
main topology, you can browse the current alarms of the selected device
quickly.
4 Manual confirmation: You can select the desired alarm and confirm it in the
current alarm window.
166 Version: B
7 Alarm Management
4 Manual confirmation: You can select the NE alarms and synchronize them
in current alarm window.
u Checking alarms: Checks whether the current alarm at the UNM2000 side
exists in the current alarms at the NE side. If yes, the alarms at the UNM2000
side keep unchanged. If not, the UNM2000 clears the alarm.
u Refreshing alarms: Obtains the latest alarms from the UNM2000 alarm
database and displays them at the client.
u Clearing alarms: Clears the alarms from the current alarm database of the
UNM2000 and from the NE and saves them to the alarm history database.
u Filtering alarms: You can set the filter conditions to filter the alarm not focused
in the alarm browsing window.
u Alarm remarks: Adds remarks for the alarms already processed, convenient for
alarm management.
Obtaining the alarm information timely is very important to alarm processing and
network maintenance. The UNM2000 provides multiple ways of alarm notification.
u Alarm indicator color: The UNM2000 uses the changes of the alarm indicator to
help you quickly locate the alarmed object. By default, the alarm indicator of the
UNM2000 indicates critical alarms in red, major alarms in orange and minor
alarms in yellow. You can customize the colors of the alarm indicator to indicate
alarms of different levels.
u Alarm sound: The UNM2000 provides the audible and visual alarm when
connected to the alarm box device. You can determine the level of the reported
alarm according to the indicator color and sound of the alarm box. Upon the
reporting of a new alarm, the UNM2000 immediately triggers the alarm box to
play the alarm sound and the corresponding alarm indicator flickers.
Version: B 167
UNM2000 Network Convergence Management System Operation Guide
u Remote alarm notification: The UNM2000 provides the following two ways of
remote alarm notification for users who are not on site.
Alarm Level
Alarm levels are used to identify the severity, importance and urgency of the alarms.
The UNM2000 classifies the alarms into the following four levels in terms of severity:
critical alarms, major alarms, minor alarms and prompt alarms. The alarms of
different levels have different meanings and should be processed differently, as
shown in Table 7-1.
Alarm Status
The alarm status includes alarm confirmation and clearance. Different handling
methods should be adopted for alarms in different status. Alarms can be divided into
the following different statuses according to whether the alarm has been confirmed
or cleared.
168 Version: B
7 Alarm Management
Alarm Classification
Alarms can be divided into NE alarms and UNM2000 alarms according to their
occurrence locations.
Alarms are divided into current alarm and alarm history. Their respective meanings
are as follows:
u Current alarms: Indicates the NE alarms saved in the current alarm database of
the core switch card or the UNM2000 alarms saved in the current alarm
database of the UNM2000.
u Alarm history: Indicates the NE alarms cleared and then saved in the alarm
history database of the core switch card or the UNM2000 alarms confirmed by
users, cleared from the current alarm database and then saved to the alarm
history database.
Alarm Statistics
Alarm statistics indicates gathering the alarm data according to your desired
conditions. The alarm statistics are convenient for you to analyze the running status
of the device.
Alarm Saving
When the alarm history saved in the UNM2000 exceeds a certain limit, it will
influence the operations performed in the UNM2000. The alarm saving function can
be used to remove the alarm history data from the database to a specified file, which
improves the running performance of the UNM2000. The UNM2000 supports
manual save and overflow save of alarms.
Version: B 169
UNM2000 Network Convergence Management System Operation Guide
u Overflow saving: You can set the maximum alarm saving capacity and the
UNM2000 will regularly check the alarm history data. When the alarm history
data reach the preset capacity, the UNM2000 will save the data to a specified
file to decrease its load.
u Manual saving: You can save the alarm history data to a specified file folder
manually at anytime. You can set the saving period of alarm history data. When
the alarm history data saved in the database reach the preset time period, the
UNM2000 will save the data to a designated file folder.
When detecting the status changes of the managed objects, the UNM2000 presents
them via alarms or events.
u The alarm indicates the notification generated when the system detects a
failure.
Set the alarm-related parameters, including the alarm reporting rules, alarm filter
rules, alarm history definition and other local settings.
You can set the alarm reporting rules to automatically report the alarms that you
concern most. These alarms will be automatically reported to the UNM2000 upon
their occurrence. For the unnecessary alarms, you can set not to report them so as
to minimize the influence on the UNM2000 performance caused by a large number
of alarms.
View whether the existing alarm reporting rules meet the requirements for current
network maintenance.
170 Version: B
7 Alarm Management
Prerequisite
Procedure
2. Select Report rule in the left pane, and view the current reporting rules in the
right pane.
3. Click before Report Rule, select the corresponding alarm reporting rule, and
then view the related information of the rule in the right pane.
When the existing alarm reporting rules cannot meet the requirements for device
maintenance, you can create alarm reporting rules as described below.
Prerequisite
u The desired alarm reporting rule has been planned according to the
maintenance requirement.
Procedure
2. Select one of the following access methods to open the Create Alarm Report
Rule dialog box.
Select Report Rule in the left pane, right-click in the blank area in the right pane
2
and select Create from the shortcut menu.
3 Right-click Report Rule in the left pane and select Create from the shortcut menu.
Version: B 171
UNM2000 Network Convergence Management System Operation Guide
3. In the Create Alarm Report Rule dialog box, set the alarm reporting rules as
required.
Note:
u Click Copy from Other Rule, select the reporting rules in the Select
the Report Rule dialog box, and copy the related information of the
selected reporting rule. This can improve the setting efficiency.
Other Operations
Right-click the alarm reporting rule entry in the right pane and select the Delete,
Refresh, Enable / Disable, Print, Copy Cell or Export operation.
The alarm filter rules are used to filter some NE alarms so that you can focus on
important alarms, improving the failure solving efficiency. After the alarm filter rules
are set, the filtered alarms will neither be saved into the alarm database nor be
displayed.
View whether the existing alarm filter rules meet the maintenance requirements of
the UNM2000 and the NE.
Prerequisite
172 Version: B
7 Alarm Management
Procedure
2. Select Current Alarm Shield Rule in the left pane, and view the current alarm
filter rules in the right pane.
3. Click before Current Alarm Shield Rule, select the corresponding alarm
filter rule, and view the related information of the rule in the right pane.
When the existing alarm filter rules cannot meet the management and maintenance
requirements of the UNM2000 and NEs, you can create alarm filter rules as
described below.
Prerequisite
u The desired alarm filter rule has been planned according to the maintenance
requirement.
Procedure
2. Select one of the following access methods to open the Create Alarm Report
Rule dialog box.
Click Alarm Shield Rule Management in the left pane, right-click in the right pane
2
and select Create from the shortcut menu.
Right-click Alarm Shield Rule Management in the left pane and select Create from
3
the shortcut menu.
3. In the Create Current Alarm Shield Rule dialog box, set the alarm filter rule
according to the planning.
Version: B 173
UNM2000 Network Convergence Management System Operation Guide
Note:
Click Copy from Other Rule to open the Select Shield Rule dialog box
and select the desired filter rule to copy its rule settings. This can improve
the setting efficiency.
Other Operations
Right-click the alarm reporting rule entry in the right pane and select the Delete,
Refresh, Enable / Disable, Print, Copy Cell or Export operation.
When some alarms need not be reported to the third-party EMS through the
northbound interface, you can set northbound interface alarm filter rules to fitter
these alarms so as to improve the alarm processing efficiency.
Background Information
u The filter rules do not apply to the alarms already reported. They are only
applicable to the matching alarms reported after the filter rules are set.
Procedure
1. Select Alarm→Shield Rule of North from the main menu to open the Filter
Rule of North tab.
3. In the displayed Filter Rule of North dialog box, set the filter rules.
174 Version: B
7 Alarm Management
4. Click OK to add a northbound interface alarm filter rule and filter the current
alarm in specific condition. You can view the added northbound interface alarm
filter rule in the Filter Rule of North tab.
Other Operations
In the Filter Rule of North tab, right-click a northbound interface alarm rule and
select the menus from the shortcut menu to perform the corresponding operations,
including Modify Rule, Delete Rule, Disable Rule, Copy Rule, etc.
When some alarms need not be reported, you can set alarm flashing rules to fitter
these alarms so as to improve the alarm processing efficiency.
Procedure
4. In the displayed Create Current Alarm Flashing Shield Rule dialog box, set
the filter rule as required.
Version: B 175
UNM2000 Network Convergence Management System Operation Guide
5. Click OK to add an alarm filter rule and filter the current alarm in specific
condition. The newly added alarm northbound interface file rules can be viewed
in the Alarm Flashing Shield Management tab.
Other Operations
In the Alarm Flashing Shield Management tab, right-click a file rule and select the
shortcut menus to perform the corresponding operations, such as Delete and Copy.
You can set different sounds for alarms of different levels and set the play priority of
the alarm sounds. When an alarm occurs, the loudspeaker on the computer running
the client will play the corresponding sound to notify of the reported alarm of the
specific level.
Background Information
176 Version: B
7 Alarm Management
Procedure
Other Operations
The following introduces how to enable / disable the audio alarm. This operation is
only valid to the current client end. The UNM2000 client will play different alarm
sounds for alarms of different levels upon their occurrence in the UNM2000 or NE.
You can select whether to enable the audio alarm in the UNM2000.
Version: B 177
UNM2000 Network Convergence Management System Operation Guide
Background Information
Procedure
Click to change it to .
Click to change it to .
Note:
For other setting items related to the audio alarm, see Setting the Audible
Alarms.
Users can set the display modes of new alarms / events as required.
Background Information
Procedure
178 Version: B
7 Alarm Management
3. Set the parameters as required. Then click Apply and the settings will be valid.
Other Operations
You can set different colors for alarms of different levels, which is convenient for you
to browse the focused alarms.
Background Information
u After the colors corresponding to alarms of different levels are set, the alarm
icons in the topology view, alarm entries queried and alarm indicators on the
alarm bulletin board will appear in the set colors.
u The UNM2000 provides four colors corresponding to four alarm levels - Critical
alarms: ; major alarms: ; minor alarms: ; prompt alarms:
.
u The alarm color settings are applicable for all users at any client.
Procedure
Version: B 179
UNM2000 Network Convergence Management System Operation Guide
2. In the Set a Color for the Alarm Level combo box, click on the right to
select the desired color for each alarm level.
3. In the Set the Background Color of the List Corresponding to the Alarm
combo box, click on the right to select the desired colors for different
confirmation statuses.
Other local alarm settings include the alarm monitoring template, maximum number
of startup templates as well as whether to enable alarm automatic reporting upon
client startup.
Background Information
Procedure
Other Operations
180 Version: B
7 Alarm Management
Procedure
3. Set the alarm automatic synchronization policies and then click Apply to apply
the settings.
Users can set the delay for switching current alarms to the alarm history as required.
Background Information
When the current alarms have been confirmed and cleared, they will be switched to
the alarm history after the set delay time.
Procedure
3. Set the delay for switching current alarms to the alarm history and then click
Apply to apply the settings.
Version: B 181
UNM2000 Network Convergence Management System Operation Guide
Procedure
5. Return to the Auto Confirm dialog box, and click Apply to make the settings
valid.
Other Operations
182 Version: B
7 Alarm Management
You can change the events into alarms by adding or deleting events in a batch
manner. The UNM2000 will process the alarms transformed from events as alarms.
Prerequisite
The authority of the Event to Alarm Settings function is configured in the authority
and domain division management. Only the user who has the corresponding
authority can perform this function.
Procedure
2. In the Event to Alarm Settings tab, select the desired event entries, as shown
below:
3. Click Save.
Version: B 183
UNM2000 Network Convergence Management System Operation Guide
Prerequisite
Procedure
3. Select the Customized special alarm tab to view the special alarms already
defined.
Prerequisite
184 Version: B
7 Alarm Management
Procedure
4. Click Create, select the NE type, alarm name, and special alarm name in the
Custom Special Alarms dialog box, and then click OK.
5. Click Apply after the settings are completed, and the settings will be valid.
Subsequent Operation
Select the useless customized special alarms, and click Delete to delete them.
Background Information
By setting the special alarm icons, users can achieve the following functions: When
the corresponding alarm occurs at the NE, the special icon of this alarm will be
displayed at the right-upper corner of the NE, so as to make the related staff obtain
the alarm information in a timely manner.
u When multiple alarms occur at the NE, the special icon of the alarm with the
highest priority will be displayed at the upper-right corner of the NE icon.
Version: B 185
UNM2000 Network Convergence Management System Operation Guide
u The priority of an alarm ranges from 1 to 17, with 17 being the highest.
Prerequisite
Procedure
3. In the Special Icon of the Alarm tab, select Enable, Hide after Confirmation,
or Hide after Clearing as required.
4 If Enable is selected, the special icon of this alarm appears at the upper-
right corner of the NE icon upon the occurrence of the alarm.
186 Version: B
7 Alarm Management
Note:
4. Click Apply after the settings are completed, and the settings will be valid.
The UNM2000 supports setting the alarm / event query conditions or statistical
conditions as templates. You can use the predefined alarm / event template to
quickly set the filter conditions and attributes of alarms / events.
The alarm template is used to save the alarm query / statistical conditions. The
alarm template simplifies the setting operation and enables you to quickly complete
the settings of the alarm browsing and alarm attributes.
The UNM2000 allows you to set the alarm templates for different objects, such as
network blocks, NEs, and cards.
The following introduces how to view, add, delete and modify various alarm
templates.
Version: B 187
UNM2000 Network Convergence Management System Operation Guide
You can view the alarm template already set and saved. If the current alarm
template meets your requirements for querying alarms, you can use the template
directory without the need to set the conditions.
Prerequisite
Procedure
1. In the main menu, select Alarm→Alarm Query Template to open the Alarm
Query Template Management tab.
2. Select Alarm Profile in the left pane of the Alarm Query Template
Management tab, and view the quantity and attributes of various preset
templates in the right pane.
3. Click the desired alarm template type and select the specific number of this
type of template to view the details.
You can save the commonly used alarm query / statistical conditions as a template
so that you can directly use the template next time for the same query or statistics,
without the need to set the conditions again.
Note:
The following uses the current alarm query template as an example. You
can follow the same procedures to add other templates with the only
difference in the access method.
Prerequisite
188 Version: B
7 Alarm Management
Procedure
1. In the main menu, select Alarm→Alarm Query Template to open the Alarm
Query Template Management tab.
2. Select one of the following access methods to open the Create Current Alarm
Template dialog box.
Select Current Alarm Query Template in the left pane, right-click in the right
2
pane and select Create Current Alarm Template from the shortcut menu.
Right-click Current Alarm Query Template in the left pane and select Create
3
Current Alarm Template from the shortcut menu.
3. Set the alarm query conditions in the Create Current Alarm Template dialog
box as needed.
Note:
Click Copy from Other Template, select the alarm profile in the Select
Template dialog box, and copy the related information of the selected
alarm profile. This can improve the setting efficiency.
Subsequent Operation
Select Current Alarm Query Template in the left pane, select the corresponding
entry in the right pane and click the corresponding button at the bottom, or right-click
the desired entry to perform the operations, such as Delete, Refresh, Print, Copy
Cell (K) and Export.
When setting the alarm template, you can modify the settings in case the query
condition setting error occurs.
Version: B 189
UNM2000 Network Convergence Management System Operation Guide
Note:
The following uses the current alarm query template as an example. You
can follow the same procedures to modify other templates with the only
difference in the access method.
Prerequisite
Procedure
1. In the main menu, select Alarm→Alarm Query Template to open the Alarm
Query Template Management tab.
2. Select Alarm Profile in the left pane of the Alarm Query Template
Management tab, and view the quantity and attributes of various preset
templates in the right pane.
3. Click the desired alarm template type and select the specific number of this
type of template to view the details.
4. Modify the relevant information of the alarm template in the right pane and click
Save All.
190 Version: B
7 Alarm Management
At the UNM2000 client, you can set the alarm template as a monitoring template,
startup template and default template to facilitate monitoring, querying or gathering
statistics of alarms.
Background Information
u Default profile: When users query or count the alarms via the menu, the
UNM2000 will use this profile to open the tab of the corresponding functions.
Users can only set one default profile in one type of alarm profiles.
u Monitoring profile: The Alarm Statistics dialog box in the toolbar of the
UNM2000 client end will display the alarm statistics data according to this
profile. The monitoring profile must be a current alarm profile, and users can set
five monitoring profiles at most.
Note:
After users set the monitoring profile to the current profile in the Alarm
Statistics dialog box, the indicators (with four colors) in the toolbar will
display the statistics data of alarms with various levels according to the
current profile.
u Starting profile: After logging in the UNM2000 client end successfully, the
system will access the alarm query or statistics GUI automatically according to
this profile. Users can set five starting profiles at most.
Prerequisite
Procedure
1. In the main menu, select Alarm→Alarm Query Template to open the Alarm
Query Template Management tab.
2. Set the alarm template attributes, that is, set the alarm profile to be a monitoring
template or startup template.
Version: B 191
UNM2000 Network Convergence Management System Operation Guide
b) Right-click in the blank area of the right pane and select Select, or
click the Select button at the lower-right corner.
b) Right-click in the blank area of the right pane and select Select, or
click the Select button at the lower-right corner.
The event template simplifies the setting operation and enables you to quickly
complete the settings of the event browsing. The event template is used to save the
event query or statistical conditions.
The UNM2000 allows you to set the event templates for different objects, such as
network blocks, NEs, and cards. Monitoring and managing events can ensure the
normal operation of the network.
You can save the frequently used event query conditions as a template so that you
can use the template for quick query in the future.
192 Version: B
7 Alarm Management
Procedure
1. In the main menu, select Alarm→Event Query Template to access the Event
Query Template tab.
2. Click Event Report Query Template in the left pane and view the existing
event query templates.
3. Click the desired event template type and select the specific number of
template entries of this type to view the details.
You can save the frequently used event query conditions as a template so that you
can use the template for quick query in the future.
Prerequisite
Procedure
1. In the main menu, select Alarm→Event Query Template to access the Event
Query Template tab.
2. Select one of the following access methods to open the New Event Query
Template dialog box.
Right-click Event Report Query Template in the left pane and select
2
Create Event Query Template from the shortcut menu.
Click Create Event Query Template in the left pane, right-click in the
3 right pane and select Create Event Query Template from the shortcut
menu.
3. Set the parameters in the Basic Information, Filter Info, and Event Source
tabs as required, and click OK. Then the new event query template will be
displayed in the template list.
Version: B 193
UNM2000 Network Convergence Management System Operation Guide
Note:
Click the Copy from the Template button, and users can copy all
settings except for the Template Name of other profiles. This can
improve the setting efficiency.
Other Operations
Right-click the corresponding query template, and select operations such as Copy,
Delete, Refresh, Set as Default Template / Cancel Default Template, Print, Copy
Cell (K), or Export.
Note:
The default profile (All Object) of the system cannot be copied, deleted,
and modified.
When setting the event template, you can modify the settings in case the query
condition setting error occurs.
Prerequisite
Procedure
1. In the main menu, select Alarm→Event Query Template to access the Event
Query Template tab.
2. Click Event Report Query Template in the left pane and view the existing
event query templates.
3. Click the desired event reporting query template to view the details of the
template.
194 Version: B
7 Alarm Management
4. Modify the relevant information of the event reporting query template in the right
pane as needed and click Save All.
Synchronizing alarms includes synchronizing the current alarms of NEs and the
UNM2000. With this function, you can synchronize the alarms at the NE side with
those at the UNM2000 side and synchronize the current alarms of the UNM2000
with the alarms in the alarm database of the UNM2000. The UNM2000 supports
automatic and manual alarm synchronization.
Background Information
Generally, the UNM2000 will automatically synchronize the alarm data at the NE
side with those at the UNM2000.
Version: B 195
UNM2000 Network Convergence Management System Operation Guide
Procedure
1. Right-click the NE in the main topology and select Open NE Manager from the
shortcut menu to open the NE Manager GUI.
2. Right-click the corresponding NE in the object tree pane and select Manual
Alarm Synchronization from the shortcut menu. Then click Close in the
displayed alert box. The manual alarm synchronization is completed.
When the alarm automatic synchronization is set, the alarms will be automatically
synchronized after the UNM2000 recovers from the communication interruption with
the NE or restarts so as to ensure the consistency of the alarms at the UNM2000
side and at the NE side.
Prerequisite
Procedure
1. Set the UNM2000 to automatically synchronize all alarms and the device
alarms after the recovery of the communication interruption upon startup of the
UNM2000 services. See Setting the Alarm Automatic Synchronization Policy.
By monitoring the network alarms, the user can know the operating status of the
network in a timely manner.
Based on the alarms status, the UNM2000 divides the alarms into current alarms
and alarm history.
u Current alarm: the alarm data saved in the current alarm database of the
UNM2000.
The alarm frequently generated by the same object will be displayed as one
entry in the current alarm list. To query each alarm record, you can check the
alarm logs.
196 Version: B
7 Alarm Management
u Alarm history: The removed current alarms are added into the alarm history
after the preset delay time has expired.
The alarm history will be transferred to the alarm history database from the
current alarm database. See Setting the Definition of the Alarm History
regarding how to set the delay time for transferring the current alarms to the
alarm history.
Users can view the current alarms of the entire network or a certain object, so as to
analyze the alarm information and perform the troubleshooting.
Procedure
1. Select one of the access methods described in Table 7-2 to open the Query
Current Alarm dialog box.
Version: B 197
UNM2000 Network Convergence Management System Operation Guide
Note:
If the current alarm query template is set, the system collects the current
alarms according to the query conditions set in the template. For setting
the alarm template, see Alarm Template.
a) In the Current Alarm tab, click Query. The Query Current Alarm
window appears.
Note:
After setting the query conditions in the Current alarm query dialog box,
you can click Save as template to save the query conditions as a profile.
When needing to query according to the same conditions, you can select
this profile directly, without repeated settings.
198 Version: B
7 Alarm Management
Subsequent Operation
u Click the shortcut icons at the upper left corner of the Current Alarm tab to
perform the following operations.
4 Click to set whether the system automatically scrolls the alarm display
table when the alarms are reported.
4 Click to set whether the current alarm window displays only the critical
alarms.
4 Click to set whether the current alarm window displays only the major
alarms.
4 Click to set whether the current alarm window displays only the minor
alarms.
4 Click to set whether the current alarm window displays only the prompt
alarms.
u Click the buttons at the bottom-right corner of the tab to perform the
corresponding operations.
4 Select an alarm and click View Details to view the detailed information of
the selected alarm.
4 Select an alarm and click Clear Alarm. The Clear Status of the alarm
becomes User Clearance.
You can view the alarm history of a certain object or all objects in the entire network
to understand the alarms occurred so as to facilitate failure analysis.
Version: B 199
UNM2000 Network Convergence Management System Operation Guide
Background Information
u The alarms already confirmed and cleared are categorized into the alarm
history while the alarms in other status are categorized as the current alarms.
u When the number of alarms exceeds the default threshold preset, only the
latest alarm history will be displayed and the earlier alarm history will not be
displayed. To view the earlier alarm history, you can set the filter condition to
query.
Procedure
1. Select one of the access methods mentioned in Table 7-3 to open the Alarm
History Query dialog box.
Right-click the corresponding NE in the object tree pane and select Alarm
History from the shortcut menu.
Note:
If the alarm history query template is set, the system collects the alarm
history according to the query conditions set in the template. For setting
the alarm template, see Alarm Template.
200 Version: B
7 Alarm Management
a) In the Alarm History tab, click Query by Template. The alarm history
tab displays the alarms queried by the template.
a) In the Alarm History tab, click Query. The Alarm History Query
window appears.
Note:
After setting the query conditions in the Alarm History Query dialog box,
you can click Save as template to save the query conditions as a profile.
When needing to query according to the same conditions, you can select
this profile directly, without repeated settings.
Subsequent Operation
u Perform operations by clicking shortcut icons. Click the shortcut icons at the
upper left corner to perform the following operations.
Version: B 201
UNM2000 Network Convergence Management System Operation Guide
4 Click to set whether the alarm history window displays only the critical
alarms.
4 Click to set whether the alarm history window displays only the major
alarms.
4 Click to set whether the alarm history window displays only the minor
alarms.
4 Click to set whether the alarm history window displays only the prompt
alarms.
u Perform operations by clicking buttons. Click the buttons at the lower right
corner of the tab to perform the following operations.
4 Select an alarm and click View Details to view the details of the selected
alarm.
4 Right-click an alarm, and you can perform the following operations via the
shortcut menu: isolating, refreshing, and exporting, etc. For operations
related to alarm handling, see Handling Alarms.
Procedures
1. See Viewing Current Alarms or Viewing Alarm History for opening the Current
Alarm or Alarm History tab.
2. Right-click the corresponding alarm and select View current alarm of the
relevant NE / View NE history alarm to view the current alarms or the alarm
history of the selected NE.
By viewing the detailed alarm information, the user can obtain the alarm name,
alarm cause, recovery advice, isolation information, etc.
202 Version: B
7 Alarm Management
Procedures
1. Open the Current Alarm or Alarm History tab. See Viewing Current Alarms
or Viewing Alarm History.
2. Select an alarm and click the View Details at the lower right corner of the tab to
view the detailed information of the corresponding alarm.
3. Right-click the alarm and select View Detail to view the alarm details in text.
You can click Copy to copy the alarm details to the clipboard.
Subsequent Operation
You can handle the alarms according to the suggestion in the Maintenance
Information tab.
Version: B 203
UNM2000 Network Convergence Management System Operation Guide
Users can query the log information for the alarms of the entire network or the
selected object via viewing the alarm logs.
Procedure
1. Select Alarm→Alarm Log→Query Alarm Log from the main menu to open
the Query Alarm Logs dialog box.
Note:
If the default log query template is set, the system collects the alarm logs
according to the query conditions set in the template. For setting the
alarm template, see Adding an Alarm Template.
c) In the Query Alarm Logs tab, click OK. The Alarm Log tab displays
the alarm logs matching the conditions preset in the template.
a) Set the query conditions in the Query Alarm Logs dialog box.
204 Version: B
7 Alarm Management
Note:
After setting the query conditions in the Alarm log query dialog box, you
can click Save as template to save the query conditions as a profile.
When querying according to the same conditions, you can select this
profile directly, without repeated settings.
Subsequent Operation
You can also perform the following operations as required after completing the
alarm log query information.
u Click the shortcut icons at the upper-left corner of the Alarm Log tab to perform
the corresponding operations.
4 Click to set whether to display logs of critical alarms only in the Alarm
Log tab.
4 Click to set whether to display logs of major alarms only in the Alarm
Log tab.
4 Click to set whether to display logs of minor alarms only in the Alarm
Log tab.
4 Click to set whether to display logs of prompt alarms only in the Alarm
Log tab.
Version: B 205
UNM2000 Network Convergence Management System Operation Guide
u Click the buttons at the bottom-right corner of the Alarm Log tab to perform the
corresponding operations.
4 Select an alarm and click View Details to view the detailed information of
the selected alarm. For details, see Viewing Alarm Details.
4 Click Query to open the Query Alarm Logs dialog box. Then reset the
query condition for query.
u Select the shortcut menus. Right-click an alarm and select the corresponding
shortcut menu to confirm, clear or locate the alarm. For operations related to
alarm handling, see Handling Alarms.
Users can set the statistics conditions for the statistics of alarm logs.
Procedure
Note:
If the default alarm log statistics profile has been set, the system will
query according to the default profile. For the operations of setting the
default alarm query profile, see Alarm Template.
2. Set the statistics conditions in the Alarm log statistics query dialog box, and
then click OK.
206 Version: B
7 Alarm Management
Note:
After setting the query conditions in the Alarm log statistics query
dialog box, users can click Save As a Template to save the query
conditions as a profile. When needing to query according to the same
conditions, users can select this profile directly, without repeated settings.
3. After completing the settings, click OK to view the statistics information of alarm
logs meeting the set conditions.
Subsequent Operation
u Click the shortcut icons at the upper-left corner of the Alarm Log Statistics tab
to perform the corresponding operations.
Version: B 207
UNM2000 Network Convergence Management System Operation Guide
The following introduces how to view the alarm statistics from the alarm bulletin
board.
Procedures
1. Click on the shortcut toolbar in the main menu to open the Alarm
Statistics dialog box.
Note:
In the Alarm Statistics dialog box, the statistics are displayed in the way
you have selected.
Subsequent Operation
208 Version: B
7 Alarm Management
Click the Table Display tab, and select the corresponding monitoring template
and the statistical classification item. In the display pane, the alarm statistical
information is displayed in a table.
4 Click the Select Template or right-click in the table display area to select
Select Template. In the displayed Select Template dialog box, select the
corresponding template and view its statistical information.
4 Select the corresponding row in the table and click Cancel Statistics or
right-click the row and select Cancel Statistics to cancel calculating the
alarm information.
4 Select the corresponding row in the table and click Set to Current or right-
click the row and select Set to Current. After setting the selected template
as the current one, the four-color alarm indicator LEDs on the toolbar will
display the corresponding information of the current template.
Version: B 209
UNM2000 Network Convergence Management System Operation Guide
Click the Bar Chart Display tab, and select the corresponding monitoring
template and the statistical classification item. In the display pane, the alarm
statistical information is displayed in bar chart.
Click the Pie chart display tab, and select the corresponding monitoring
template and the statistical classification item. In the display pane, the alarm
statistical information is displayed in the pie chart.
By querying the reported events, you can obtain the running status of the system.
Procedure
210 Version: B
7 Alarm Management
2. Set the query conditions in the Query Reported Events dialog box that
appears and click OK.
Note:
u If the default template has been set, the system will query according
to the default template.
u After setting the query conditions, you can click Save as Template
to save the current query conditions as a template.
Subsequent Operation
u Click the shortcut icons at the upper-left corner of the Query Reported Events
tab to perform the corresponding operations.
4 Click to set whether the system automatically scrolls the alarm display
table when the alarms are reported.
4 Click to set whether the current alarm window displays only the critical
alarms.
4 Click to set whether the current alarm window displays only the major
alarms.
Version: B 211
UNM2000 Network Convergence Management System Operation Guide
4 Click to set whether the current alarm window displays only the minor
alarms.
4 Click to set whether the current alarm window displays only the prompt
alarms.
u Click the buttons at the bottom of the Query Reported Events tab to perform
the corresponding operations.
4 Click Query to re-set the query conditions in the Query Reported Events
dialog box and then click OK.
4 Select an event entry and click View Details to view the detailed
information of the selected event.
u Right-click the event entry in the Query Reported Events tab and select the
shortcut menus to perform the corresponding operations.
u Select Topology Location to locate the source NE that triggered the event in
the topology view so as to ascertain the physical position of the corresponding
NE in the network.
u Select View Event Report of the NE to filter the events corresponding to the
NE so as to analyze the running status of the NE.
u Select Copy Cell to copy the information in the selected table cell to the
clipboard.
The following introduces the related operations of viewing the reported alarms.
212 Version: B
7 Alarm Management
Prerequisite
Procedure
2. In the View Reported Alarm tab, view the information on the alarms meeting
the reporting conditions.
Note:
For the related operations of the buttons, shortcut icons, and shortcut
menus in the Report alarm automatically tab, see Viewing Current
Alarms.
3. Click Report Setting at the bottom-right part of the tab, and access the Alarm
Report Setting tab to re-configure the alarm reporting rules.
4. Click Clear All Records at the bottom-right part of the tab to clear all the
records in the current tab. Then the tab will display the alarm information
reported after the records are cleared.
When an alarm appears, you should handle the alarm following the procedures to
exclude the fault, including viewing the detailed alarm information, isolating the
alarm, confirming the alarm and clearing the alarm.
Version: B 213
UNM2000 Network Convergence Management System Operation Guide
Procedure
1) See Viewing Current Alarms or Viewing Alarm Logs for opening the
Current Alarm or Alarm Log tab.
¡ Select the corresponding alarm and click Confirm Alarm in the lower
right part of the tab.
¡ Right-click the corresponding alarm and select Confirm and Mark the
Alarms.
See Setting the Alarm Automatic Confirmation Rules for setting the automatic
confirmation rules of the cleared alarms.
By default, the system clears the alarms one day after their occurrence time at
00:00 automatically and the Confirmation Status of the alarms will change to
Auto Confirm.
Note:
If any alarm is to be re-focused, you can right-click this alarm and select
Unconfirm the Alarm. The Confirmation Status of this alarm will
subsequently change to Unconfirmed.
214 Version: B
7 Alarm Management
After excluding the fault, the equipment will clear the alarms automatically. If the
alarms cannot be cleared automatically, you can remove them manually.
Procedure
1. See Viewing Current Alarms or Viewing Alarm Logs for opening the Current
Alarm or Alarm Log tab.
2. Select one or more alarms and right-click to select Clear Alarm, or click Clear
Alarm at the lower right corner of the tab. The Clear Status of the
corresponding alarm changes to User Clearance.
By isolating the alarm, the user can locate the topological object that generated this
alarm.
Procedure
1. See Viewing Current Alarms, Viewing Alarm History or Viewing Alarm Logs for
opening the Current Alarm, Alarm History or Alarm Log tab.
The following introduces how to shield a certain alarm in the current alarm query
interface. When some alarms do not need to be handled, you can filter these
alarms.
Background Information
u The filter rules do not apply to the alarms already reported. They are only
applicable to the matching alarms reported after the filter rules are set.
u The filtered alarms are neither in the alarm database nor displayed.
Version: B 215
UNM2000 Network Convergence Management System Operation Guide
Procedure
1. See Viewing Current Alarms for opening the Current Alarm tab.
4. Click OK to add an alarm filter rule and filter the current alarm in specific
condition.
Note:
u The newly added alarm filter rules can be viewed in the Alarm
Shield Rule Management tab.
u To cancel the alarm filter settings, clear the Enable option or delete
the corresponding filter rules. See Viewing Alarm Filter Rules.
The user can set the alarm levels of the network management alarms as needed, so
as to enhance the alarm monitoring efficiency.
Procedures
1. See Viewing Current Alarms for opening the Current Alarm tab.
216 Version: B
7 Alarm Management
3. In the displayed Modify Alarm Level dialog box, select the corresponding
check boxes of the Modification Range and the Modify the Level to.
The user can edit the alarm remarks to record extra alarm information for future
maintenance.
Procedures
1. See Viewing Current Alarms for opening the Current Alarm tab.
3. In the Edit alarm remark dialog box that appears, enter the alarm remarks.
4. Click OK and you can view the entered alarm remarks in the Remark field of
the corresponding alarm.
Version: B 217
UNM2000 Network Convergence Management System Operation Guide
Procedures
1. Refer to Viewing Current Alarms, Viewing Alarm History or Viewing Alarm Logs
and open the Current Alarm, the Alarm History or the Alarm Log tab.
4 Print alarms.
b) In the Print Preview dialog box, set the page setup and other print
options.
c) Click Print and select printer and other printing settings in the
displayed Print dialog box.
d) Click OK.
4 Export alarms.
¡ Export all alarm entries. Right-click anywhere in the tab and select
Export→Export All Records to export all the alarm entries as a TXT,
XLS, CSV or HTML file.
¡ Export the selected alarm entry. Select the alarm entry and right-click
to select Export→Export Selected Record to export the selected
alarm entries as a TXT, XLS, CSV or HTML file.
By recording the alarm maintenance experience, the user can handle the alarms of
the same type quickly and conveniently.
Procedures
1. See Viewing Current Alarms for opening the Current Alarm tab.
3. In the Edit Maintenance Experience dialog box, select the applicable range,
enter the maintenance experience and click OK.
218 Version: B
7 Alarm Management
Note:
Procedure
4 In the right pane, select the experience entry and click the corresponding
buttons at the lower right corner, or right-click the entry and select Edit,
Delete, Copy Cell, Print, or Export from the shortcut menu.
4 Filter the maintenance experience. Click above the left pane to switch
the tree structure and sort alarms by alarm name or type. Then click the
tree node to filter the maintenance experience entries in the right pane.
4 Click the Import / Export data in the table on the right button at the top
of the right pane to import / export the maintenance experience in the xml
format.
Version: B 219
UNM2000 Network Convergence Management System Operation Guide
You can set the FTP server and export all the current alarms and alarm history to
the local client or other hosts in the network so that you need not perform operations
on the UNM2000 server remotely.
Prerequisite
Procedure
2. In the alarm query dialog box, select Export to FTP to open the FTP Choose
dialog box.
220 Version: B
7 Alarm Management
3. Specify the FTP server address and click Yes to export all alarm data to the
specified FTP server.
The user can customize alarm names and levels according to maintenance
requirements, for easier management and alarm monitoring.
Procedure
2. In the Please Select a NE dialog box, select the desired NE and click OK.
3. In the left pane of the Custom Alarm Name tab, select the PUBA card or ONU
which needs the customized alarms, and click the Default Alarm Name bar to
select the alarm name.
Version: B 221
UNM2000 Network Convergence Management System Operation Guide
Other Operations
u Clear the customized alarm: Select the row containing the customized alarm
and click Clear to clear the customized alarm information. Then click Save.
u Define the alarm for the same object quickly: Click Apply to Object of the
Same Type to make it valid and apply the changes to the cards of the same
type.
u Display / hide the undefined alarm: Click Display Undefined Alarm / Hide
Undefined Alarm to display or hide the alarms not defined on the GUI.
u Set the defined alarm row by row: Click Hide Undefined Alarm, click Add to
set the alarm name, and click Save.
Users can adjust the alarm levels of all objects, the appointed types of equipment,
or the appointed equipment as required.
Procedure
2. At the lower right corner of the Customize Alarm Level tab, click Create; or
right-click in the blank area of the tab, and select Create.
3. In the New Customized Rule of the Alarm Level dialog box, set Alarm
Source.
4 Select All Objects, and the customized alarm levels apply to all objects.
Note:
222 Version: B
7 Alarm Management
4. Right-click in the blank area of the Alarm Name section, click Select from the
shortcut menu, select the desired alarms in the Select Alarm Name dialog box,
and click OK.
5. Click the Custom level bar of the corresponding alarm, and select the needed
alarm level. Then click OK.
Version: B 223
UNM2000 Network Convergence Management System Operation Guide
6. In the Customize Alarm Level tab, check the information related to the custom
alarm levels, and click Save All.
Other Operations
u Delete the custom alarm level: In the Customize Alarm Level tab, select the
desired alarm level and click Delete.
u Modify the custom alarm level: In the Custom Alarm Level tab, click the
Custom Level column of the corresponding alarm entry to reset the alarm level.
Then click Save all.
During the project installation, commissioning, cut over and maintenance, massive
alarms may occur, which will distract maintainers from significant alarms. Users can
automatically filter all the alarms and alarm clearance information reported by the
resources during the project construction by setting the project alarm filtering. The
filtered alarms are neither saved in the database nor displayed in the client terminal.
224 Version: B
7 Alarm Management
Procedure
1. Select Alarm→Shield Project Alarms in the main menu to open the Shield
Project Alarms tab.
2. Click the Added Filtered NE of Project Alarm at the lower right corner of the
tab or right-click in the blank area of the tab to select Added Filtered NE of
Project Alarm.
3. In the Please select the need to generate masking rules NE dialog box,
select the NE object to set to the project construction status, and click OK.
4. Refer to Table 7-4 and set the relevant project alarm filtering parameters.
Parameter Description
The start time of filtering the alarms of the selected NE object; the default
Start Time
time is the current system time.
Select this item and the filtering end time will become valid, otherwise the
Auto Stopped
End Time is unavailable.
After the end time has expired, the alarm filtering of the selected NE will
End Time
be stopped. The default value is the current time plus 24 hours.
5. After completing the settings, click Save All at the lower right corner of the tab,
or simply right-click the blank area in the tab and select Save All to save the
project alarm filtering settings.
Other Operations
1. Select the project alarm filter entry, and select Delete at the lower right corner
of the tab, or simply right-click the project alarm filter entry to select Delete.
Version: B 225
UNM2000 Network Convergence Management System Operation Guide
When the remote alarm / event notification rules are set, the UNM2000 will send the
alarms / events matching the conditions to the maintainer via email or SMS so that
the maintainer not on-site can obtain the alarms / events generated on the devices
and UNM2000 timely and take the corresponding measures.
To send the remote email or SMS notification through the UNM2000, you need to
set the email notification parameters and SMS center relevant parameters.
Background Information
For setting the IP address, port, username, password and encoding protocol of the
SMS center, please contact the SMS center.
Procedure
3. Set the related parameters in the Email Notice, Message modem setting,
and Message gate setting tabs respectively. Click Apply to apply the settings.
226 Version: B
7 Alarm Management
Set the remote notification format of the alarm / event, including setting the email
subject and contents of the mail notification.
Procedure
4 In the Email Notification tab, click the Select the Field buttons in the Title
and Content panes respectively to select the subject and contents of the
mail to be sent.
4 Select the SMS Notification tab, and click the Select the Field button to
select the contents to be sent.
Other Operations
Click Restore Default Configurations to restore the parameters to the values set
last time.
By setting the alarm / event remote notification rules (including the receiver
information, notification conditions, alarm sources, and time limit), the alarms
meeting the rules will be sent to the maintenance personnel so that they can obtain
the alarm information timely even if they are not on site.
Prerequisite
Version: B 227
UNM2000 Network Convergence Management System Operation Guide
Procedure
4 In the right pane, click the button below the corresponding entry, or right-
click the entry, and select operations such as Enable/Disable, Delete,
copy cell (K), Print..., or Export.
4 Select the corresponding receiver in the left pane, and modify the
information items in the right pane. After completing the modification, click
Save all.
4 If the current alarm / event remote notification rules cannot meet the
requirements, you can create rules according to Step 3.
1) Select one of the following ways to open the Create Alarm Remote
Notification Rule dialog box.
¡ Select Recipient Info in the left pane, and click Create Receiver
Information in the right pane.
¡ Select Recipient Info in the left pane, right-click in the right pane, and
select Create Receiver Information from the shortcut menu.
Set the delayed duration to send the remote notification upon the occurrence of the
alarm / event. If the alarm is still not cleared after the duration, the remote
notification will be sent; otherwise, it will not be sent.
228 Version: B
7 Alarm Management
Procedure
3. Set the alarm delay time interval and then click Apply. Set all Alarm Forward
Time items in the Sending Delay dialog box to the new values set.
4. Select the NE types and alarm codes needing transmission delay. Users can
isolate the target alarm codes rapidly via the searching function.
Note:
u If an alarm is not set here, the system will send the corresponding
remote notification immediately after this alarm occurs without delay.
5. Click Apply after the settings are completed, and the settings will be valid.
After analyzing and editing the current alarms / events of different stations via the
UNM2000 client, the maintainer of the central office equipment room sends the
Version: B 229
UNM2000 Network Convergence Management System Operation Guide
alarms / events of different stations to the maintainer who is nearest to the failure
location according to geographical distribution of maintainers. This achieves quick
and prompt processing of alarms / events, greatly improving the device
maintenance efficiency.
Prerequisite
u The parameters and rules related to the remote alarm / event notification have
been configured.
Procedure
2. In the Current Alarm dialog box, right-click the alarm entry and select Remote
Notification→Email / Message from the shortcut menu to open the Send a
Mail to Notify or Notify via SMS dialog box.
3. Select Receiver, and enter Title and Content. Then click OK.
When the alarm history saved in the UNM2000 exceeds a certain limit, it will
influence the operations performed in the UNM2000. The alarm saving function can
be used to remove the alarm history data from the database to a specified file, which
improves the running performance of the UNM2000. The UNM2000 supports
manual save and overflow save of alarms.
u Overflow saving: You can set the maximum alarm saving capacity and the
UNM2000 will regularly check the alarm history data. When the alarm history
data reach the preset capacity, the UNM2000 will save the data to a specified
file to decrease its load.
u Manual saving: You can save the alarm history data to a specified file folder
manually at anytime. You can set the saving period of alarm history data. When
the alarm history data saved in the database reach the preset time period, the
UNM2000 will save the data to a designated file folder.
230 Version: B
7 Alarm Management
When the alarm / event overflow save task is set, the UNM2000 will regularly check
whether the alarm / event historical data in the database have met the preset
conditions. If yes, the UNM2000 will save the alarm / event historical data
automatically. The saved alarm / event historical data will be deleted from the
database.
Background Information
The default historical data overflow save task provided by the UNM2000 cannot be
deleted. The user can modify the overflow save conditions of the corresponding task
as required.
Procedures
1. Select System→Save Data in the main menu to open the Save the Data tab.
3. Open the Property dialog box of the corresponding historical data save task
via one of the following ways:
4 Right-click the corresponding overflow save task in the right pane and
select Attribute from the shortcut menu.
4 In the left pane, click next to the Overflow Saving, right-click the
corresponding overflow save task and select Attribute from the shortcut
menu.
Version: B 231
UNM2000 Network Convergence Management System Operation Guide
4. See Table 7-5 for setting the properties of the overflow save task.
Table 7-5 Descriptions of the Alarm / Event Overflow Save Task Settings
Parameter Description
232 Version: B
7 Alarm Management
Table 7-5 Descriptions of the Alarm / Event Overflow Save Task Settings (Continued)
Parameter Description
Extend u Select Delete and the historical data meeting the overflow save
tion The preset save proportion of the database when the save task is
Overflow
carried out as soon as the historical data have exceeded the
Border
maximum storage entry quantity or the threshold value.
Capacity The preset days of saving the historical data in the database when the
limit save task is carried out.
6. Select the corresponding overflow save task in the left pane, and click Execute
Now in the upper right pane. The execution result is shown in the lower right
pane.
The UNM2000 supports manual save of historical alarm / event data to avoid
insufficient database space.
Background Information
The default manual save task of historical alarm / event data provided by the
UNM2000 cannot be deleted. The user can modify the manual save conditions of
the corresponding task as required.
Procedures
1. Select System→Save Data in the main menu to open the Save the Data tab.
3. Select either way below to open the Properties of the corresponding manual
save task of historical data.
Version: B 233
UNM2000 Network Convergence Management System Operation Guide
4 Right-click the corresponding manual save task in the right pane and
select Properties.
4 In the left pane, click next to the Manual Dump, right-click the
corresponding manual save task in the right pane and select Properties.
4. See Table 7-6 for setting the properties of the overflow save task.
Table 7-6 Descriptions of the Alarm / Event Overflow Save Task Settings
Parameter Description
234 Version: B
7 Alarm Management
Table 7-6 Descriptions of the Alarm / Event Overflow Save Task Settings (Continued)
Parameter Description
Extend u Select Delete and the historical data meeting the overflow save
tion The preset save proportion of the database when the save task is
Overflow
carried out as soon as the historical data have exceeded the
Border
maximum storage entry quantity or the threshold value.
Capacity The preset days of saving the historical data in the database when the
limit save task is carried out.
5. Select the corresponding manual save task in the left pane, and click Execute
now in the upper right pane. The execution result is shown in the lower right
pane.
The Alarm Log function supports querying alarm logs, and gathering statistics of
alarm history logs and current alarm logs. You can set the statistical conditions as
needed to query the alarm logs.
Version: B 235
UNM2000 Network Convergence Management System Operation Guide
Note:
3. Click OK. The query result appears in the Alarm Log tab.
236 Version: B
7 Alarm Management
Note:
3. Click OK. The statistical result appears in the Alarm Log History Statistics
tab.
Version: B 237
UNM2000 Network Convergence Management System Operation Guide
Note:
3. Click OK. The statistical result appears in the Current Alarm Log Statistics
tab.
For alarms (such as ONU fiber disconnection, power failure and MGC link alarms)
with a large quantity but little impact in current networks, you can set the alarm
frequency analysis rules and set Handling Strategy and Triggering Conditions for
different alarms. The UNM2000 will filter the alarms or generate new alarms based
on the rules.
238 Version: B
7 Alarm Management
Prerequisite
Procedure
2. In the Alarm Frequency Analysis Rule tab, select Add to open the Object
dialog box.
3. In the Basic Information tab of the Object dialog box, select Alarm Name and
set Handling Strategy and Triggering Conditions. Select or clear the Enable
Rule check box to enable or disable the alarm frequency analysis rule.
Version: B 239
UNM2000 Network Convergence Management System Operation Guide
4. In the Object dialog box, select the Object Source tab to set the applicable
objects of the alarm frequency analysis rule.
240 Version: B
7 Alarm Management
Version: B 241
8 Performance Management
Basic Concepts
242 Version: B
8 Performance Management
With the performance management function, you can detect the silent failure of
network running to avoid network failure risks. You need to grasp the relevant basic
concepts before performing the performance monitoring operation.
The performance data includes the current performance data and performance
history data. You can check whether the service is running normally in a specified
time period by browsing the performance data.
u Current performance
The current performance refers to the data saved in the current performance
register of the NE. The current performance data can be divided into 15-minute
current performance and 24-hour current performance in terms of monitoring
period. When browsing the current performance, the UNM2000 will query the
performance data directly from the current performance register at the NE side.
u Performance History
The performance history refers to the performance data of NEs detected in the
past specified time period. When querying the performance history data, you
can select whether to query the performance history data at the NE side or at
the UNM2000 side according to the location where the data are stored.
The current performance data whose saved time exceeds the specified time
period will be saved to the NE performance history register.
Performance Threshold
By setting the performance threshold, you can filter the performance events that
change in the normal value range so that you can focus the critical performance
events.
The threshold is also called tolerance, which indicates the performance value that
meets the requirements for normal running of the device. If a certain performance
indicator exceeds the preset performance threshold, the performance degradation
trend has reached the degree that needs to be focused. Generally, it is
recommended to reserve a certain value margin when setting the performance
threshold so as to detect anomalies in advance.
Version: B 243
UNM2000 Network Convergence Management System Operation Guide
Performance Saving
The performance saving function can be used to remove the performance history
data from the database to a specified file, which improves the running performance
of the UNM2000.
Comparing Performance
Prerequisite
Procedure
Users can save the current performance history query conditions as a profile to
avoid setting query conditions repeatedly. Then users can select the corresponding
244 Version: B
8 Performance Management
profile to query the performance in the future. The following introduces how to
create performance query template.
Prerequisite
Procedure
2. Select one of the following access methods to open the Create Performance
Query Template dialog box.
3. In the AddPerformance query template dialog box, set the parameters in the
Template information, Basic information, and Advance information tabs as
required.
Note:
Version: B 245
UNM2000 Network Convergence Management System Operation Guide
Other Operations
In the right pane, select the button below the corresponding entry, or right-click the
entry, and select operations such as Delete, Refresh, Set / Cancel Default
Template, Print..., copy cell (K), or Export.
When setting the performance query template, you can modify the settings in case
the query condition setting error occurs.
Prerequisite
Procedure
3. Modify the settings of the template in the right pane as needed and click Save
All.
Users can set the collection time of the 24-hour performance as required.
Prerequisite
Procedure
246 Version: B
8 Performance Management
3. Set the 24-hour performance collection time and then click Apply to apply the
settings.
Procedure
2. Click Create NE Object to open the Add Object dialog box and then select
one or multiple NEs, as shown below:
Version: B 247
UNM2000 Network Convergence Management System Operation Guide
3. Click OK. The UNM2000 reads the performance classification switch status of
the selected device, as shown below:
248 Version: B
8 Performance Management
The following introduces how to manage the card performance, including viewing
the current performance and the real-time performance and conducting the
performance comparison.
Users can understand the operating status of the equipment via viewing the current
performance.
Prerequisite
Procedure
1. Right-click the corresponding NE in the object tree at the left side of the Main
topology tab or the physical topology view at the right side, and select Open
NE manager from the shortcut menu.
Version: B 249
UNM2000 Network Convergence Management System Operation Guide
3. In the 15 Minutes drop-down box, select the corresponding item to query the
first to sixteenth 15-minute performance of the object.
4. (Optional) Right-click the current performance tab, and select operations such
as Print, copy cell (K), or Export.
Subsequent Operation
Set the query conditions for current performance and then query again.
2. In the Current Performance Query dialog box, set Select the 15-minute
Performance, Performance Code Type, Object and Performance Code, and
then click OK.
You can obtain the abnormal performance data of the devices by viewing the
performance history so as to instruct the current maintenance.
250 Version: B
8 Performance Management
Prerequisite
u The performance collection scheme has been set, and the system has waited
for one test period (15 minutes or 24 hours) at least.
Procedure
1. Select the access method mentioned in Table 8-1 to open the History
property query dialog box.
2. Set the query conditions in the History property query dialog box according to
requirements.
Note:
Version: B 251
UNM2000 Network Convergence Management System Operation Guide
3. After completing the settings, click OK; then the query results will be displayed
in the Performance History tab.
Prerequisite
u The system has waited two test periods (15 minutes for each test period) at
least.
Procedure
1. Right-click the corresponding NE in the object tree at the left side of the Main
topology tab or the physical topology view at the right side, and select Open
NE manager from the shortcut menu.
3. In the Performance Comparison Query dialog box, set the query conditions
of the performance comparison.
Note:
252 Version: B
8 Performance Management
Note:
Subsequent Operation
Click the corresponding button at the top part of the right pane, and users can print
the comparison results or export them to a *.jpeg file and save the file in the
appointed directory.
This function enables you to monitor the performance data of the selected
resources in real time.
Version: B 253
UNM2000 Network Convergence Management System Operation Guide
Prerequisite
Procedure
1. Right-click the corresponding NE in the object tree at the left side of the Main
topology tab or the physical topology view at the right side, and select Open
NE manager in the shortcut menu.
2. Select one of the following methods to open the Real-time Performance dialog
box.
3. Set Collection Cycle, Time Length, and Object for the real-time performance.
4. Click OK, and view the real-time performance of the selected object in the
Real-time Performance tab after a certain period of time.
Note:
u The system displays the real-time performance in the List view and
Curve chart modes by default. You can select other display modes
as required.
254 Version: B
8 Performance Management
Subsequent Operation
Click the corresponding button at the top part of the right pane, and users can print
the real-time performance results or export them to a *.jpeg file and save the file in
the appointed directory.
Users can understand the network operating status by viewing the performance
data variation of the designated object using the performance history chart.
Prerequisite
Procedure
Version: B 255
UNM2000 Network Convergence Management System Operation Guide
2. Set the query conditions in the History property query dialog box according to
requirements.
Note:
3. After completing the settings, click OK; then the query results will be displayed
in the History property trend tab.
Note:
The system displays the performance history in the List view or Curve
Chart mode by default. You can select other display modes as required.
256 Version: B
8 Performance Management
You can use the scheduled performance collection to query and process the
performance data of NEs. The UNM2000 provides the scheduled collection of NE
performance data via NE Performance Indicator Collection and NE Performance
Threshold Collection and supports exporting the collection result as a text file to
reduce repeated labor.
The following introduces how to view and set the performance index sets.
View the existing performance indicator sets so as to quickly set the collection
indicator of the performance collection task.
Prerequisite
u The time at the NE side has been synchronized with the time at the UNM2000
side.
Procedure
2. In the Collection Task Management tab, click Indicator Set and view the
existing indicator sets in the right pane.
3. In the Collection Task Management tab, double-click the desired indicator set
to view the details of the threshold set, including Basic Information and
Member.
Version: B 257
UNM2000 Network Convergence Management System Operation Guide
Subsequent Operation
In the left pane, select the corresponding index, modify the relevant information
if necessary in the right pane. Click Save All.
u Other Operations
In the right pane, select the corresponding entry and click the button at the
bottom, or simply right-click the entry and select Delete, Print, Copy Cell or
Export from the shortcut menu.
Set the performance indicator set so as to quickly set the collection indicator of the
performance collection task.
Prerequisite
u The time at the NE side has been synchronized with the time at the UNM2000
side.
Procedure
2. Select one of the following access methods to open the Create Indicator Set
dialog box.
Right-click Indicator Set in the left pane and select Create Indicator Set from
3
the shortcut menu.
258 Version: B
8 Performance Management
Click the Indicator Set in the left pane, right-click in the right pane and select
5
Create Indicator Set from the shortcut menu.
3. Set the parameters in the Basic Information and Member tabs of the Create
Indicator Set dialog box.
Note:
Click the Copy from Other Indicator Set to open the Select Indicator
Set dialog box. Then select the desired indicator set to copy its
parameter settings, so as to improve setting efficiency.
The following introduces how to view, create and use the performance threshold
sets.
View the performance threshold sets already set and select the desired threshold
set to quickly complete the statistics and query of performance threshold.
Prerequisite
u The time at the NE side has been synchronized with the time at the UNM2000
side.
Version: B 259
UNM2000 Network Convergence Management System Operation Guide
Procedure
2. In the Collection Task Management tab, select Threshold Set and view the
existing threshold sets in the right pane.
Subsequent Operation
In the left pane, select the corresponding performance threshold set, modify the
relevant information in the right pane and then click Save All.
u Other Operations
In the right pane, select the corresponding entry and click the button at the
bottom, or simply right-click the entry and select Delete, Print, Copy Cell or
Export from the shortcut menu.
The user can monitor the performance data by setting the performance threshold. If
the performance data exceeds the preset threshold value, the threshold crossing
alarm will be generated.
Prerequisite
u The time at the NE side has been synchronized with the time at the UNM2000
side.
260 Version: B
8 Performance Management
Procedure
2. Select one of the following access methods to open the Create Threshold Set
tab.
Select Threshold Set in the left pane and click Create Threshold Set in the
5
right pane.
3. Set the information in the Basic Information and Member dialog boxes
according to Table 8-2.
Parameter Description
Basic Threshold
Sets a name for the threshold set.
Informa- Set Name
tion NE Type Selects the corresponding NE type.
Version: B 261
UNM2000 Network Convergence Management System Operation Guide
Parameter Description
Lower
Sets the Lower clearing limit for the corresponding performance code.
Clear
The lower clearing limit must be greater than the lower limit.
Limit
Sets the threshold-crossing alarm code for the corresponding
performance code. The following options are available:
Alarm u PM_THRESHOLD_CRITICAL
Code u PM_THRESHOLD_MAJOR
u PM_THRESHOLD_MINOR
u PM_THRESHOLD_WARNING
Note: The performance threshold values must be set as follows: Upper limit value > Upper
clearance value > Lower clearance value > Lower limit value.
4. Click OK.
The following introduces how to view and create the performance collection tasks.
View the performance collection task already set and select the desired
performance collection task to collect the performance.
Prerequisite
u The time at the NE side has been synchronized with the time at the UNM2000
side.
2. In the Performance collection management tab, select Gather task and view
the existing collection tasks in the right tab.
262 Version: B
8 Performance Management
Subsequent Operation
In the left pane, select the corresponding performance collection task, modify
the relevant information in the right pane and then click Save All.
u Other Operations
In the right pane, select the corresponding entry and click the button at the
bottom, or simply right-click the entry and select Disable, Delete, Print, Copy
Cell or Export from the shortcut menu.
You can monitor the performance data by setting the performance collection task.
Prerequisite
u The time at the NE side has been synchronized with the time at the UNM2000
side.
2. Select one of the following access methods to open the Create Collection
Task dialog box.
Click Collection Task in the left pane and click Create Collection Task in
3
the right pane.
Version: B 263
UNM2000 Network Convergence Management System Operation Guide
3. In the Create Collection Task dialog box, set the parameters in the Basic
Information, Collection Object, Collection Specification and Collection
Cycle tabs.
Note:
Click Copy from Other Collection Task to open the Select Collection
Task dialog box, select the desired collection task to copy the settings of
the corresponding collection task. This improves the setting efficiency.
When the performance history data saved in the UNM2000 exceeds a certain limit,
it will influence the operations performed in the UNM2000. The performance data
saving function can be used to remove the performance history data from the
database to a specified file, which improves the running performance of the
UNM2000. The UNM2000 supports manual save and overflow save of performance
data.
u Overflow save: You can set the maximum performance data saving capacity
and the UNM2000 will regularly check the performance history data. When the
performance history data reach the preset capacity, the UNM2000 will save the
data to a specified file to decrease its load.
u Manual save: Saves the performance history data to a specified file folder
manually at anytime. You can set the save period of alarm history data. When
the performance history data saved in the database reach the preset time
period, the UNM2000 will save the data to a designated file folder.
264 Version: B
8 Performance Management
When the performance overflow save task is set, the UNM2000 will regularly check
whether the performance history data in the database have met the preset
conditions. If yes, the UNM2000 will save the performance history data
automatically. The saved performance history data will be deleted from the
database.
Background Information
The default historical data overflow save task provided by the UNM2000 cannot be
deleted. The user can modify the overflow save conditions of the corresponding task
as required.
Prerequisite
Procedure
1. Select System→Save Data in the main menu to open the Save the Data tab.
3. Select one of the following access methods to open the Properties of the
corresponding overflow save task of performance history.
Right-click the corresponding overflow save task in the right pane and select
2
Attribute from the shortcut menu.
In the left pane, click before Overflow Saving, right click Save 15-Minute
3 Performance History Overflow / Save 24-Hour Performance History Overflow
and select Attribute from the shortcut menu.
4. See Table 8-3 for setting the properties of the overflow save task.
Version: B 265
UNM2000 Network Convergence Management System Operation Guide
Parameter Description
Extend u Select Delete and the historical data meeting the overflow save
tion The preset save proportion of the database when the save task is
Overflow
carried out as soon as the historical data have exceeded the
Border
maximum storage entry quantity or the threshold value.
Capacity The preset days of saving the historical data in the database when the
limit save task is carried out.
6. Select the corresponding overflow save task in the left pane, and click Execute
Now in the upper right pane. The execution result is shown in the lower right
pane.
The UNM2000 supports manual save of historical alarm / event data to avoid
insufficient database space.
Background Information
The default manual save task of historical alarm / event data provided by the
UNM2000 cannot be deleted. The user can modify the manual save conditions of
the corresponding task as required.
266 Version: B
8 Performance Management
Procedures
1. Select System→Save Data in the main menu to open the Save the Data tab.
3. Select one of the following access methods to open the Properties of the
corresponding manual save task of performance history.
Right-click the corresponding manual save task in the right pane and select
2
Properties.
In the left pane, click next to the Manual Dump, right-click the corresponding
3
manual save task in the right pane and select Properties.
4. See Table 8-4 for setting the properties of the overflow save task.
Parameter Description
Extend u Select Delete and the historical data meeting the overflow save
tion The preset save proportion of the database when the save task is
Overflow
carried out as soon as the historical data have exceeded the
Border
maximum storage entry quantity or the threshold value.
Capacity The preset days of saving the historical data in the database when the
limit save task is carried out.
Version: B 267
UNM2000 Network Convergence Management System Operation Guide
5. Select the corresponding manual save task in the left pane, and click Execute
now in the upper right pane. The execution result is shown in the lower right
pane.
The PON traffic statistics and analysis function supports analyzing traffic, optical
power and device health. It provides abundant reports for analyzing and monitoring
services and device running status so as to provide detailed data for network
planning.
Prerequisite
Procedure
2. Set the statistical type, period, object, performance code and then click OK.
The Traffic Statistical Chart tab appears, displaying the statistical result.
268 Version: B
8 Performance Management
Other Operations
By clicking the buttons on the toolbar of the Traffic Statistical Chart tab, you can
print or export the statistical result or display the statistical result in different charts.
When the FTP reporting function is enabled, PON traffic data will be collected to a
specified FTP server for you to view and back up.
Prerequisite
u The FTP server is set (Click SystemParameter Settings and then select Service
ConfigurationFTP Server Setting).
Procedure
3. Click Add NE to open the Please Select NE dialog box and then select desired
NEs.
4. Click OK.
5. Set the FTP server parameters, enable the traffic function and click OK.
Version: B 269
UNM2000 Network Convergence Management System Operation Guide
Other Operations
Right-click an NE in the list and the buttons at the lower part of the tab to perform
the corresponding operations, such as Delete NE.
Subsequent Operation
After enabling the FTP reporting function, create the performance collection task to
collect the traffic, optical power or ONU test distance performance data. The
following introduces how to collect the PON traffic data.
2. Right-click Collection Task and select Create Collection Task from the
shortcut menu.
3. In the Create Collection Task dialog box, set the task parameters and set
PON Traffic Collection to Yes to enable the FTP collection.
270 Version: B
8 Performance Management
The Top rank statistics function supports PON traffic ranking and device health
ranking so as to provide professional and abundant reports.
Prerequisite
Procedure
1. Select Performance→Top rank statistics from the main menu to open the
Query Traffic Top Ranking dialog box.
Version: B 271
UNM2000 Network Convergence Management System Operation Guide
2. Set the statistical type, period, object, performance code and then click OK.
The Traffic Statistical Top Ranking tab appears, displaying the statistical
result.
Other Operations
By clicking the buttons on the toolbar of the Traffic Statistical Top Ranking tab,
you can print or export the statistical result or display the statistical result in different
charts.
272 Version: B
9 Log Management
The logs record the information on operations in the network management system
and key events in the system. Via the log management function, users can query
and output the logs.
Log Types
Log Statistics
Version: B 273
UNM2000 Network Convergence Management System Operation Guide
The log security management includes managing the UNM2000 system logs,
UNM2000 operation logs, UNM2000 security logs, TL1 command logs, log saving
and log forwarding.
The UNM2000 system logs record the tasks that influence the running of the
UNM2000. By viewing the UNM2000 system logs, you can detect the failure that
may influence the running of the UNM2000 and process it in a timely manner so as
to ensure the normal running of the UNM2000.
The operation logs record all the operations performed at the UNM2000 client end
(such as creating logical domains, creating NEs and confirming alarms) except the
operations that influence the security of the UNM2000. By viewing the operation
logs, you can understand the operation performed at the UNM2000 client end so as
to trace and audit the operations. This provides support to elimination of the
influence caused by misoperation.
The security logs record the operations performed at the UNM2000 client end that
influence the security of the UNM2000, for example, user login, user logout and
unlocking. By viewing the UNM2000 security logs, you can understand the
operations performed at the UNM2000 client end that influence the security of the
UNM2000. Querying the security logs on a regular basis can effectively ensure the
security of the UNM2000.
The TL1 command logs record the operations performed on the devices by users in
the UNM2000 via the TL1 commands. By viewing the TL1 command logs, you can
understand the TL1 command operations performed on the devices so as to obtain
the running status of the devices.
274 Version: B
9 Log Management
Log Saving
By setting the scheduled save task of logs, the UNM2000 will save the logs to the
specified directory regularly, which provides convenience for viewing logs and
reduces the records in the database so as to improve the running speed of the
system.
Log Forwarding
The UNM2000 supports forwarding the UNM2000 logs to the FTP server to save
various logs, providing reference for maintenance and relieving the storage
pressure of the UNM2000 sever.
The types of the UNM2000 logs include system logs, operation logs, security logs
and TL1 command logs.
The system logs record the running status of the UNM2000. By viewing the
UNM2000 system logs, you can detect the failure that may influence the running of
the UNM2000 and process it in a timely manner so as to ensure the normal running
of the UNM2000.
The system logs are saved in the database and can be queried through the client
end.
Meaning of Logs
The system logs record the operations performed by the UNM2000 automatically.
For example, executing scheduled tasks or system tasks.
Parameter Description
The level of the risk that the operation may cause to the UNM2000. The risk
Danger Level
levels include Prompt, General and Danger.
Version: B 275
UNM2000 Network Convergence Management System Operation Guide
Parameter Description
Operation
The terminal that executes the operation.
Terminal
The operation result: Succeeded, Failed and Part Succeeded.
u Succeeded: The operation is successful and all the operation results
Operation are returned.
Result u Failed: The operation is failed.
u Part Succeeded: The operation is partly successful and partly failed; all
the operation results are returned.
The operation logs record all the operations performed at the UNM2000 client end
(such as creating logical domains, creating NEs and confirming alarms) except the
operations that influence the security of the UNM2000. By viewing the operation
logs, you can understand the operation performed at the UNM2000 client end so as
to trace and audit the operations.
The operation logs are saved in the database and can be queried through the client
end.
Meaning of Logs
The operation logs record all the operations performed at the UNM2000 client end
except the operations that influence the security of the UNM2000. For example,
creating logical domains, creating NEs and confirming alarms.
Parameter Description
Operation
The name of the operation performed in the UNM2000.
Name
The level of the risk that the operation may cause to the UNM2000. The risk
Danger Level
levels include Prompt, General and Danger.
The login mode of the user who performed the operation. The login modes
Login Mode
include Login to NMS and Login to Northbound Interface.
276 Version: B
9 Log Management
Parameter Description
User Type The type of the UNM2000 user who performs the operation.
Operation
The specific execution time of the operation.
Time
Operation
The IP address of the terminal used for operation execution.
Terminal
Operation
The execution object of the operation.
Object
The security logs record the operations performed at the UNM2000 client end that
influence the security of the UNM2000, for example, user login, user logout and
unlocking. By viewing the UNM2000 security logs, you can understand the
operations performed at the UNM2000 client end that influence the security of the
UNM2000. Querying the security logs on a regular basis can effectively ensure the
security of the UNM2000.
The security logs are saved in the database and can be queried through the client
end.
Meaning of Logs
The security logs record all the operations performed at the UNM2000 client end
that influence the security of the UNM2000. For example, user login, user logout
and unlocking.
Version: B 277
UNM2000 Network Convergence Management System Operation Guide
Parameter Description
Security
The operation related to security.
Event
The level of the risk that the operation may cause to the UNM2000. The risk
Danger Level
levels include Prompt, General and Danger.
The login mode of the user who performed the operation. The login modes
Login Mode
include Login to NMS and Login to Northbound Interface.
User Type The type of the UNM2000 user who performs the operation.
Operation
The specific execution time of the operation.
Time
Operation
The IP address of the terminal used for operation execution.
Terminal
Operation
The execution object of the operation.
Object
The TL1 command logs record the operations performed on the devices by users in
the UNM2000 via the TL1 commands. By viewing the TL1 command logs, you can
understand the TL1 command operations performed on the devices so as to obtain
the running status of the devices.
Meaning of Logs
The TL1 command logs record the operations performed on the devices by users in
the UNM2000 via the TL1 commands.
278 Version: B
9 Log Management
Parameter Description
NE IP
The IP address for running the TL1 commands.
Address
Operation
The execution object of the operation.
Object
Operation
The name of the operation performed on the NE.
Name
Deliver
The TL1 command issued to the NE.
Command
Operation results include Succeeded, Failed and Unknown.
u Succeeded: Indicates the operation is successful and all the operation
Operation
results are returned.
Result
u Failed: Indicates the operation failed.
u Unknown: Indicates the result of the operation is unknown.
Begin Time The start time for executing the TL1 command.
End Time The end time for executing the TL1 command.
The UNM2000 new function, Log Statistics, includes Statistical System Logs,
Statistical Operation Logs, Statistical Security Logs and Statistical TL1
Command Logs.
u Function Overview: You can gather statistics of and analyze the system logs by
setting System Log Statistical Conditions and Query Conditions so as to
quickly understand the system service operation information.
Version: B 279
UNM2000 Network Convergence Management System Operation Guide
u Function Overview: You can gather statistics of and analyze the operation logs
by setting Operation Log Statistical Conditions and Query Conditions so as
to quickly understand the operations performed by users in the UNM2000.
u Function Overview: You can gather statistics of and analyze the security logs
by setting Security Log Statistical Conditions and Query Conditions so as
to quickly understand the operations performed by users that may influence the
security of the UNM2000.
u Function Overview: You can gather statistics of and analyze the TL1 command
logs by setting TL1 Command Log Statistical Conditions and Query
Conditions so as to quickly understand the TL1 relevant operations performed
by users.
The system logs record the information on the operations performed by the
UNM2000 automatically, so as to obtain the operating status of the UNM2000 easily.
The following introduces how to manage the system log templates and query the
system logs.
To conveniently and quickly query the system logs, you can set the most concerned
system log types as a query template.
Prerequisite
280 Version: B
9 Log Management
Procedure
2. In the System Logs tab, click Query to open the Query System Logs dialog
box.
Table 9-1 Description of the Parameters in the Query System Logs Dialog Box
Operation Queries the operation logs Select one or more options under Operation
Result by the operation result. Result. All options are selected by default.
Queries the operation logs Select one or more options under Danger
Danger Level
by risk level. Level. All options are selected by default.
4. Click Save as Template to complete setting the system log query template.
Other Operations
In the System Logs tab, right-click an entry and select Template Management
from the shortcut menu to edit or delete the existing log templates.
Version: B 281
UNM2000 Network Convergence Management System Operation Guide
The system logs record the information on the operations performed by the
UNM2000 automatically, so as to obtain the operating status of the UNM2000
easily.
Procedure
2. In the System Logs tab, view the query result. The system displays the system
logs of the current day by default.
3. In the System Logs tab, double-click the desired system log to view the log
details.
Note:
Click the column heading of the query result to sort the result.
Other Operations
u Buttons
4 Refresh: Obtains the latest data from the server end database and
displays them in the client.
4 Query: Sets the query condition to view the query result. For the
description of the query parameters, see Managing System Log
Templates.
4 View / Hide Details: Displays / hides the details pane of the selected log.
282 Version: B
9 Log Management
u Shortcut Menus
Right-click in the System Logs dialog box to open the shortcut menu, which is
described as follows:
u Refresh: Obtains the latest data from the server end database and
displays them in the client.
u Export All Records: Exports all the operation logs as a TXT, XLS, CSV or
HTML file to the specified directory.
The operation logs record the information on the user operations, so as to monitor
and check the user operations easily. The following introduces how to manage the
operation log templates and query the operation logs.
To conveniently and quickly query the UNM2000 user operation logs, you can set
the most concerned operation log types as a query template.
Prerequisite
Procedure
Version: B 283
UNM2000 Network Convergence Management System Operation Guide
2. In the Operation Logs tab, click Query to open the Query Operation Logs
dialog box.
Table 9-2 Description of the Parameters in the Query Operation Logs Dialog Box
284 Version: B
9 Log Management
Table 9-2 Description of the Parameters in the Query Operation Logs Dialog Box
(Continued)
4. Click Save as Template to complete setting the operation log query template.
Other Operations
In the Operation Logs tab, right-click an entry and select Template Management
from the shortcut menu to edit or delete the existing log templates.
The operation logs record the information on the user operations, so as to monitor
and check the user operations easily.
Background Information
u If you filter operation logs by user name, the Unselected Value Filter in the
Select User dialog box only displays the names of the users that performed
operations.
u The authorities of browsing operation logs for users of different roles are
described as follows:
4 The users in the Administrators group can view the operation logs of all
users.
4 Given the Querying Operation Logs authorities, the users in the Security
Administrator Group can view the operation logs of all users.
4 Given the “Querying Operation Logs” authorities, the users neither in the
“Administrators” group nor in the Security Administrator Group can only
view the operations of themselves.
Version: B 285
UNM2000 Network Convergence Management System Operation Guide
Procedure
2. In the Operation Logs tab, view the query result. The system displays the
operation logs of the current day by default.
3. In the Operation Logs tab, double-click the desired operation log to view the
log details.
Note:
Click the column heading of the query result to sort the result.
Other Operations
u Buttons
4 Refresh: Obtains the latest data from the server end database and
displays them in the client.
4 Query: Sets the query condition to view the query result. For the
description of the query parameters, see Managing Operation Log
Templates.
4 View Data: Views the data recorded in the corresponding operation logs.
286 Version: B
9 Log Management
Note:
View data... is only available for the write-to-device operation logs of the
service configuration.
4 View / Hide Details: Displays / hides the details pane of the selected log.
u Shortcut Menus
Right-click in the Operation Logs dialog box to open the shortcut menu, which
is described as follows:
u Query: Sets the query condition to view the query result. For the
description of the query parameters, see Managing Operation Log
Templates.
u View Data: Views the data recorded in the corresponding operation logs.
Note:
View data... is only available for the write-to-device operation logs of the
service configuration.
u Refresh: Obtains the latest data from the server end database and
displays them in the client.
u Export All Records: Exports all the operation logs as a TXT, XLS, CSV or
HTML file to the specified directory.
Version: B 287
UNM2000 Network Convergence Management System Operation Guide
The security logs record the information on the security operations performed by the
UNM2000. Querying security logs regularly helps ensuring the security of the
network management system effectively. The following introduces how to manage
the security log templates and query the security logs.
To conveniently and quickly query the UNM2000 security logs, you can set the most
concerned security log types as a query template.
Prerequisite
Procedure
2. In the Security Logs tab, click Query to open the Query Security Logs dialog
box.
Table 9-3 Description of the Parameters in the Query Security Logs Dialog Box
288 Version: B
9 Log Management
Table 9-3 Description of the Parameters in the Query Security Logs Dialog Box (Continued)
Queries the security logs Select one or more options under Danger
Danger Level
by risk level. Level. All options are selected by default.
4. Click Save as Template to complete setting the security log query template.
Other Operations
In the Security Logs tab, right-click an entry and select Template Management
from the shortcut menu to edit or delete the existing log templates.
Version: B 289
UNM2000 Network Convergence Management System Operation Guide
The security logs record the information on the security operations performed by the
UNM2000. Querying security logs regularly helps ensuring the security of the
network management system effectively.
Background Information
The user with the Query Security Logs authority can view the security logs of all
users.
Procedure
2. In the Security Logs tab, view the query result. The system displays the
security logs of the current day by default.
3. In the Security Logs tab, double-click the desired security log to view the log
details.
Note:
Click the column heading of the query result to sort the result.
Other Operations
u Buttons
4 Refresh: Obtains the latest data from the server end database and
displays them in the client.
290 Version: B
9 Log Management
4 Query: Sets the query condition to view the query result. For the
description of the query parameters, see Managing Security Log
Templates.
4 View / Hide Details: Displays / hides the details pane of the selected log.
u Shortcut menus
Right-click in the Security Logs dialog box to open the shortcut menu, which is
described as follows:
4 Query: Sets the query condition to view the query result. For the
description of the query parameters, see Managing Security Log
Templates.
4 Refresh: Obtains the latest data from the server end database and
displays them in the client.
4 Export All Records: Exports all the operation logs as a TXT, XLS, CSV or
HTML file to the specified directory.
The TL1 command logs record the operations performed on the devices by users in
the UNM2000 via the TL1 commands. By viewing the TL1 command logs, you can
understand the TL1 command operations performed on the devices so as to obtain
the running status of the devices. The following introduces how to manage the TL1
command log templates and query the TL1 command logs.
Version: B 291
UNM2000 Network Convergence Management System Operation Guide
To conveniently and quickly query the TL1 commands accepted and executed by
the NEs, you can set the most concerned TL1 commands as a query template.
Prerequisite
Procedure
2. In the TL1 Logs tab, click Query to open the Query TL1 Command Logs
dialog box.
Table 9-4 Description of the Parameters in the Query TL1 Command Logs Dialog Box
292 Version: B
9 Log Management
4. Click Save as Template to complete setting the TL1 command log query
template.
The TL1 command logs record the operations performed on the devices by users in
the UNM2000 via the TL1 commands. By viewing the TL1 command logs, you can
understand the operations performed on the devices by users via the TL1
commands so as to obtain the running information of the devices.
Prerequisite
Procedure
2. In the TL1 Logs tab, view the query result. The system displays the security
logs of the current day by default.
3. In the TL1 Logs tab, double-click the desired security log to view the log
details.
Note:
Click the column heading of the query result to sort the result.
Other Operations
u Buttons
Version: B 293
UNM2000 Network Convergence Management System Operation Guide
4 Refresh: Obtains the latest data from the server end database and
displays them in the client.
4 Query: Sets the query condition to view the query result. For the
description of the query parameters, see Managing TL1 Command Log
Templates.
4 View / Hide Details: Displays / hides the details pane of the selected log.
u Shortcut menus
Right-click in the TL1 Logs dialog box to open the shortcut menu, which is
described as follows:
4 Query: Sets the query condition to view the query result. For the
description of the query parameters, see Managing TL1 Command Log
Templates.
4 Refresh: Obtains the latest data from the server end database and
displays them in the client.
4 Export All Records: Exports all the operation logs as a TXT, XLS, CSV or
HTML file to the specified directory.
With the log saving function, the logs that are no longer needed can be deleted
regularly or manually to avoid occupation of too many resources by the log
information. The logs can also be exported as a file for you to view or isolate failures.
294 Version: B
9 Log Management
By setting the log forwarding server, users can forward the logs of the UNM2000 to
other servers.
Prerequisite
Procedure
2. Click the buttons below the corresponding entry, or right-click the entry, and
select operations such as Modify, Start / Stop, Delete, Refresh, Copy Cell (K)
, Print..., or Export.
If the current log forwarding server cannot meet the requirements, you can add new
log forwarding servers following the steps below.
Prerequisite
Procedure
1. In the lower part of the Log forwarding server tab, click Adding... to open the
Log forwarding server dialog box.
2. Set the parameters of the log forwarding server according to Table 9-5.
Version: B 295
UNM2000 Network Convergence Management System Operation Guide
Parameter Description
Sets the type of the transmission protocol. TCP and UDP can be
Protocol
Protocol selected, and the value should be consistent with the settings of
type
information the log forwarding server.
296 Version: B
9 Log Management
Table 9-5 Description on the Settings of the Log Forwarding Server (Continued)
Parameter Description
Sets the string. The log will be forwarded only when it complies
Other String filter
with the string filtering conditions.
Information
Memo Sets the remark information.
When the alarm / event overflow save task is set, the UNM2000 will regularly check
whether the alarm / event historical data in the database have met the preset
conditions. If yes, the UNM2000 will save the alarm / event historical data
automatically. The saved alarm / event history data will be deleted from the
database.
Background Information
The default historical data overflow save task provided by the UNM2000 cannot be
deleted. The user can modify the overflow save conditions of the corresponding task
as required.
Prerequisite
Procedure
1. Select System→Save Data in the main menu to open the Save the Data tab.
3. Select one of the following access methods to open the Properties of the
corresponding overflow save task of alarm history.
Version: B 297
UNM2000 Network Convergence Management System Operation Guide
Right-click the corresponding overflow save task in the right pane and select
2
Attribute from the shortcut menu.
In the left pane, click next to the Overflow Saving, right-click the
3
corresponding overflow save task and select Attribute from the shortcut menu.
4. See Table 9-6 for setting the properties of the overflow save task.
Parameter Description
Task
The name of the overflow save task; read-only.
name
Yes Select this check box to start this task.
The task execution cycle. The default setting is once every other
Task type
Basic day.
Information Execution
The execution time of the task.
time
Begin
The start time of the task.
Time
End Time The end time of the task.
u Select Save to File to save the historical data meeting the
overflow save conditions to a file.
Saving You can select to save the historical data as a CSV file to the
Mode server's hard disk or in the FTP server.
u Select Delete and the historical data meeting the overflow
Extend save conditions are deleted directly.
Information
The preset save proportion of the database when the save task is
Overflow
carried out as soon as the historical data have exceeded the
Border
maximum storage entry quantity or the threshold value.
Capacity The preset days of saving the historical data in the database when
limit the save task is carried out.
6. Select the corresponding overflow save task in the left pane, and click Execute
Now in the upper right pane. The execution result is shown in the lower right
pane.
298 Version: B
9 Log Management
Background Information
The UNM2000 provides default manual save task of logs, which cannot be deleted.
The user can modify the manual save conditions of the corresponding task as
required.
Prerequisite
Procedure
1. Select System→Save Data in the main menu to open the Save the Data tab.
3. Select one of the following access methods to open the Properties of the
corresponding manual save task of data history.
Right-click the corresponding manual save task in the right pane and select
2
Properties.
In the left pane, click next to the Manual Dump, right-click the corresponding
3
manual save task in the right pane and select Properties.
5. Select the corresponding manual save task in the left pane, and click Execute
now in the upper right pane. The execution result is shown in the lower right
pane.
Version: B 299
10 Resource Management
The UNM2000 supports statistics and statistical result export for the following
resources:
u Other types: Include ONU users, local end VLANs, NE MGC services, ONU
MGC services, device types and PON device capability.
Querying Cards by SN
300 Version: B
10 Resource Management
Version: B 301
UNM2000 Network Convergence Management System Operation Guide
You can view the resource statistical templates already set and saved. If a template
meets your requirements for querying resources, you can use the template directory
without the need to set the conditions. The following introduces how to view the
resource statistical templates already customized in the UNM2000.
Note:
Prerequisite
Procedure
302 Version: B
10 Resource Management
Other Operations
When the statistical items set in the template do not meet the requirements for
resource statistics, you can modify the template.
1. Select the desired template entry, click Modify to open the Modify the
Template dialog box.
Version: B 303
UNM2000 Network Convergence Management System Operation Guide
2. Select the items according to the statistical range and click OK.
When the existing resource statistical templates in the UNM2000 do not meet the
requirements for resource query, you can customize resource statistical templates
according to your needs. The following introduces how to customize resource
statistical templates in the UNM2000.
Note:
Caution:
For PON Device Capability Statistics, only the default template can be
used and no new one can be created.
Prerequisite
Procedure
304 Version: B
10 Resource Management
5. In the Custom Template dialog box, click Create to open the Create Template
dialog box.
6. Set Template Name, Template Type and Statistics Combination Item, and
then click OK. The added template appears in the Custom Template dialog
box.
Version: B 305
UNM2000 Network Convergence Management System Operation Guide
7. Close the Custom Template dialog box and the added template appears in the
Statistics Template drop-down list.
The user can understand the NEs, cards, ports, ONUs, ONU ports, MDU ports and
other physical resources in the network through the physical resource statistics.
Prerequisite
Procedure
The procedures of gathering different physical resources are similar. The following
uses the NE statistics as an example.
5. Select the desired object or use the search function to select the object quickly.
Then click OK to view the statistical result.
306 Version: B
10 Resource Management
Other Operations
Right-click an entry in the statistical result and select Copy the Cell, Print or Export
from the shortcut menu.
Resource statistics of other types include statistics of ONU subscribers, local end
VLANs, NE MGC services, ONU MGC services, device types, PON device
capabilities, ONU WAN connection services, etc.
Note:
Prerequisite
Version: B 307
UNM2000 Network Convergence Management System Operation Guide
Procedure
5. Select the desired object or use the search function to select the object quickly.
Then click OK to view the statistical result.
Other Operations
Right-click an entry in the statistical result and select Copy the Cell, Print or Export
from the shortcut menu.
The user can export the physical resource statistical information to the configured
FTP server as needed.
308 Version: B
10 Resource Management
Background Information
Prerequisite
u The statistical template has been set. See Customizing a Resource Statistical
Template for the setting method.
u The FTP server has been set. See Setting the FTP Server for the setting
method.
Note:
Procedure
4 If the existing task has met the requirements, run the task at the scheduled
time; or click Execute now, or select Execute now from the shortcut menu
to start the task.
Note:
The task will automatically run at the scheduled time and the user can
obtain the exported statistical information file from the FTP when the
execution result displays Successful.
Version: B 309
UNM2000 Network Convergence Management System Operation Guide
1) Right-click in the blank area of the GUI and select Create from the shortcut
menu to open the Add NE Resource Statistics Export dialog box.
2) Set the parameters in the Basic information, Object source and Extend
information tabs and then click OK. The created task appears on the GUI.
3) Select a task and click Execute Now or select Execute Now from the
shortcut menu to execute the task immediately.
Other Operations
Click a task and select the shortcut menus to delete, print, export or view the task.
You can export statistical information of resources like the ONU subscribers, local
end VLANs, MGC services, ONU MGC services, device types and ONU WAN
connection services as needed.
Prerequisite
u The statistical template has been set. See Customizing a Resource Statistical
Template for the setting method.
u The FTP server has been set. See Setting the FTP Server for the setting
method.
Note:
Procedure
310 Version: B
10 Resource Management
4 If the existing task has met the requirements, run the task at the scheduled
time; or click Execute now, or select Execute now from the shortcut menu
to start the task.
Note:
The task will automatically run at the scheduled time and the user can
obtain the exported statistical information file from the FTP when the
execution result displays Successful.
1) Right-click in a blank area of the GUI and select Create from the shortcut
menu to open the Create ONU User Statistics Export dialog box.
2) Set the parameters in the Basic information, Object source and Extend
information tabs and then click OK. The created task appears on the GUI.
3) Select a task and click Execute Now or select Execute Now from the
shortcut menu to execute the task immediately.
Other Operations
Click a task and select the shortcut menus to delete, print, export or view the task.
The resource statistics of the UNM2000 can be used to manage the asset
information of the devices in the entire network and important logical configuration
information.
The UNM2000 provides the unified query and statistics functions for the resources
in the network. You can understand the usage of various resources in the entire
network timely via the resource management.
Version: B 311
UNM2000 Network Convergence Management System Operation Guide
Note:
Taking the user preferences and use habit into consideration, the
UNM2000 supports loading up to 20 thousand data entries and the
excessive data will not be displayed. You can export the statistical
records to view all the data.
Note:
4. Click Statistics Range to select the statistical object and then click OK.
5. The Resource Statistics tab displays the ONU port usage set in the template.
312 Version: B
10 Resource Management
Note:
4. Click Statistics Range to select the statistical object and then click OK.
5. The Resource Statistics tab displays the ONU quantity set in the template.
4. Click Statistics Range to select the statistical object and then click OK.
5. The Resource Statistics tab displays the corresponding local end VLAN
information.
Creating the ODN view manually is inefficient and likely to generate errors. By
importing the ODN NMS information, you can build the ODN network view quickly.
After importing the information, the topology will display the relationship between
NEs (OLT PON ports, splitters and ONUs), improving the maintenance efficiency.
Background Information
The ODN provides the optical transmission channel between the OLT and the ONU.
Prerequisite
Version: B 313
UNM2000 Network Convergence Management System Operation Guide
Procedure
2. Click Open File at the lower right corner of the window to open the Import Data
window.
3. Click Download Template to save the ODN import information template to the
local computer and enter the information according to the project requirement.
Note:
The items marked with an asterisk (*) are required. Either incorrect or
missing input will lead to import failure.
4. Click View File to select the file with ODN information entered, and then click
OK to import the data.
After importing the ONU physical ID table, you can search for the corresponding
ONU information (ONU basic information, online status and port VLAN information)
according to the ONU physical ID, and deauthorize them in a batch manner.
Procedure
314 Version: B
10 Resource Management
2. In the Set Query Condition dialog box, click Download Template to download
the ONU physical ID template.
3. Enter the desired ONU physical ID in the ONU physical ID template table.
Note:
The ONU physical ID types and value range are described as follows:
u Physical SN: The first four digits are a ASCII character string (case-
sensitive) and the last 8 digits should range from 0 to 9 or a to f
(lower-case letters).
4. In the Set Query Condition dialog box, click Import to import the ONU
physical ID template with physical IDs entered.
Version: B 315
UNM2000 Network Convergence Management System Operation Guide
5. In the Set Query Condition dialog box, click OK. The Batch Query ONU tab
displays the query result.
6. Select multiple entries in the query result list and right-click to select ONU
Deauthorization to deauthorize multiple ONUs.
316 Version: B
10 Resource Management
You can query the name and management IP address of the OLT where the card
locates as well as the slot number of the card by serial number. You can query all
OLT devices in the entire network.
Prerequisite
Procedure
2. In the Set Query Conditions dialog box, enter the serial number of the card
and select one or multiple OLT devices, as shown below:
Version: B 317
UNM2000 Network Convergence Management System Operation Guide
Note:
u If you select Full Field Matching, enter the complete serial number
of the card.
3. Click OK. The query result appears in the Query Board by Serial Number, as
shown below:
You can locate the corresponding card and port by the port phone number through
the Query MDU Phone Number function. At present, it supports the SIP voice port
query of the AN5006-20 and AN5006-30.
Prerequisite
The authority of the Query MDU Phone Number function has been assigned to you
in the authority and domain division management.
Procedure
2. In the Set Query Conditions dialog box, enter the Phone Number (phone
number of the port), as shown in Figure 10-1.
318 Version: B
10 Resource Management
Note:
u If you select Full Field Matching, enter the complete phone number.
3. Click OK. The query result appears in the Query MDU Phone Number tab, as
shown in Figure 10-2.
Version: B 319
UNM2000 Network Convergence Management System Operation Guide
You can filter and query the ONU RMS failure information through the UNM2000
and print and export the content in the failure information table.
Prerequisite
Procedure
2. In the ONU RMS Error Information dialog box, set the query conditions,
including Basic Information and Advanced Information.
3. Click OK. The ONU RMS Error Information tab lists the detailed failure
information.
320 Version: B
10 Resource Management
Other Operations
In the ONU RMS Error Information tab, right-click to Print or Export the selected
entries.
You can filter and query the ONU network access interception logs through the
UNM2000 and print and export the logs.
Prerequisite
Procedure
Version: B 321
UNM2000 Network Convergence Management System Operation Guide
2. In the ONU Network Intercept Log Query dialog box, set the query conditions,
including Basic Information and Advanced Information.
3. Click OK. The ONU Network Intercept Log tab lists the log information.
Other Operations
In the ONU Network Intercept Log Query tab, right-click to Print or Export the
selected entries.
You can configure the gateway types, actual models and manufacturer names of
ONU devices of different manufacturers so that the gateway types of the ONU
devices can be identified when the resource management system delivers the
network access configuration of enterprise gateway.
Prerequisite
Procedure
2. In the Gateway Type Config dialog box, click Add to open the Add dialog box.
322 Version: B
10 Resource Management
3. In the Add dialog box, enter the ONU Vendor and ONU Realno and select the
gateway type.
4. Click Yes to save the gateway type configuration into the database.
You can obtain the information of all unauthorized ONUs under one or multiple OLTs
through the UNM2000. The information of the unauthorized ONU includes the ONU
slot number, PON port number, ONU physical address, logical ID and logical
password.
Prerequisite
Procedure
2. In the Unauthorized ONU List tab, click Select the object, as shown in
Figure 10-3.
Version: B 323
UNM2000 Network Convergence Management System Operation Guide
3. In the Unauthorized ONU List dialog box, select the desired OLT and click OK
to query the unauthorized ONUs.
You can modify the names of ONUs in a batch manner by importing an Excel file.
Prerequisite
Procedure
324 Version: B
10 Resource Management
3. Click Download Template to save the Excel template into the designated
directory on the UNM2000 client end.
4. Enter the planned data into the Excel file and save it.
5. Click View File, and select the configured Excel template to import it.
Version: B 325
11 Data Synchronization and Backup
In case multiple UNM2000 systems are used to manage NEs, modifying the NE
configuring data in one of the UNM2000 will make the data in other UNM2000
inconsistent with the NE data. To ensure the consistency of the network data and
NE data and the data security, the UNM2000 provides the data synchronization and
backup.
Data Backup
326 Version: B
11 Data Synchronization and Backup
Data synchronization refers to the synchronization of the equipment data with those
in the UNM2000. Managing data synchronization tasks includes managing the
software / hardware version update tasks, managing the configuration uploading
tasks, and managing the NE automatic discovery task.
The software / hardware version update refers to updating the software / hardware
version of the equipment into the database of the network management system.
Procedure
4 If the current tasks can meet the requirements, operate as follows: Right-
click a task, and select Execute now, or select it and click the Execute
now at the lower part of the tab to execute the software / hardware version
update task.
4 Right-click the task, and perform the following operations: Disabled (U),
viewing and modifying Properties, etc.
4. Click a certain task in the left pane to view its object information, status, or
failure cause.
Version: B 327
UNM2000 Network Convergence Management System Operation Guide
The configuration upload tasks can be used to upload the configuration data on the
device to the UNM2000 database, ensuring the consistency of the data in the
UNM2000 and the data on the device.
By viewing the configuration uploading tasks, you can check whether the execution
time and object of the device configuration uploaded to the UNM2000 database
meet the requirements for data synchronization.
Prerequisite
Procedure
3. In the right pane, right-click the desired task entry and select View from the
shortcut menu to view its object information and status.
328 Version: B
11 Data Synchronization and Backup
Other Operations
In the right pane, right-click the desired task and select the corresponding shortcut
menu to Delete / Disabled the task or view / modify Properties, etc.
When the existing configuration uploading tasks do not meet the data
synchronization requirements, you can create configuration export tasks according
to your needs.
Prerequisite
Procedure
2. Right-click Configure Upload Task in the left pane or right-click in the right
pane and select Create to open the dialog box.
3. Set the related parameters in the Basic information and Object source tabs,
and click OK after completing the settings. Then the added tasks will be
displayed in the task list.
Version: B 329
UNM2000 Network Convergence Management System Operation Guide
Note:
Click the Copy from Other Task button, and users can copy all settings
except for the Task name: of other tasks. This can improve the setting
efficiency.
4. Click the desired task in the left pane to view its object information and status.
You can execute the configuration uploading tasks to timely synchronize the
configuration data on the device to the UNM2000 database, so as to ensure the
security and accuracy of the UNM2000 data.
Prerequisite
Procedure
330 Version: B
11 Data Synchronization and Backup
3. In the right pane, right-click the desired task entry and select View from the
shortcut menu to view its Object Information and Status and check whether
the configuration uploading task meets your requirements.
4. Right-click the desired task and select Execute Now, or click the task and click
Execute Now at the lower right corner of the tab to execute the configuration
upload task.
To ensure the security of the NE data, you can back up the NE data and restore it
when critical failures occur in the network. Managing configuration backup tasks
includes managing the software backup tasks and managing the configuration
exporting tasks.
The following introduces how to view, create and execute the software backup tasks
of the card.
Prerequisite
Procedure
3. In the right pane, right-click the desired task entry and select View from the
shortcut menu to view its object information and status.
Version: B 331
UNM2000 Network Convergence Management System Operation Guide
Other Operations
In the right pane, right-click the desired task and select the corresponding shortcut
menu to Delete / Disabled the task or view / modify Properties, etc.
When the existing software backup tasks do not meet the backup requirements, you
can create software backup tasks according to your needs.
Prerequisite
Procedure
2. Right-click Software Backup Task in the left pane or right-click in the right
pane and select Create to open the dialog box.
3. Set the parameters in the Basic information, Object source, and Extend
information tabs as required, and click OK after completing the settings. Then
the added tasks will be displayed in the task list.
Note:
Click the Copy from Other Task button, and users can copy all settings
except for the Task name: of other tasks. This can improve the setting
efficiency.
4. Click a certain task in the left pane, and users can view its object information
and status.
332 Version: B
11 Data Synchronization and Backup
Prerequisite
u The file transmission service between the client end and the server end runs
normally.
Procedure
3. In the right pane, right-click the desired task entry and select View from the
shortcut menu to view its Object Information and Status and check whether
the software backup task meets your requirements.
4. Right-click the desired task and select Execute Now, or click the task and click
Execute now at the lower right corner of the tab to execute the software
backup task.
The following introduces how to view, add and execute the export tasks of data
already backed up.
By viewing the configuration export tasks, you can confirm whether the exported
data information should be saved to an external location.
Prerequisite
Version: B 333
UNM2000 Network Convergence Management System Operation Guide
Procedure
3. In the right pane, right-click the desired task entry and select View from the
shortcut menu to view its object information and status.
Other Operations
In the right pane, right-click the desired task and select the corresponding shortcut
menu to Delete / Disabled the task or view / modify Properties, etc.
When the existing configuration export tasks do not meet the backup requirements,
you can create configuration export tasks according to your needs.
334 Version: B
11 Data Synchronization and Backup
Prerequisite
Procedure
2. Right-click Configuration Export Task in the left pane or right-click in the right
pane and select Create to open the dialog box.
3. Set the parameters in the Basic information, Object source, and Extend
information tabs as required, and click OK after completing the settings. Then
the added tasks will be displayed in the task list.
Note:
Click the Copy from Other Task button, and users can copy all settings
except for the Task name: of other tasks. This can improve the setting
efficiency.
4. Click a certain task in the left pane, and users can view its object information
and status.
Prerequisite
u The file transmission service between the client end and the server end runs
normally.
Procedure
Version: B 335
UNM2000 Network Convergence Management System Operation Guide
3. In the right pane, right-click the desired task entry and select View from the
shortcut menu to view its Object Information and Status and check whether
the configuration export task meets your requirements.
4. Right-click the desired task and select Execute Now, or click the task and click
Execute now at the lower right corner of the tab to execute the configuration
export task.
The following introduces how to view, create and execute the card software backup
tasks.
Prerequisite
Procedure
3. In the right pane, right-click the desired task entry and select View from the
shortcut menu to view its object information and status.
336 Version: B
11 Data Synchronization and Backup
Other Operations
In the right pane, right-click the desired task and select the corresponding shortcut
menu to Delete / Disabled the task or view / modify Properties, etc.
When the existing software backup tasks do not meet the backup requirements, you
can create software backup tasks according to your needs.
Prerequisite
Procedure
1. Select System→Policy Task Management from the main menu to open the
Policy Task Management tab.
Version: B 337
UNM2000 Network Convergence Management System Operation Guide
4. Set the parameters in the Basic information, Object source, and Extend
information tabs as required, and click OK after completing the settings. Then
the added tasks will be displayed in the task list.
Note:
Click the Copy from Other Task button, and users can copy all settings
except for the Task name: of other tasks. This can improve the setting
efficiency.
5. Click a certain task in the left pane, and users can view its object information
and status.
Prerequisite
u The file transmission service between the client end and the server end runs
normally.
Procedure
3. In the right pane, right-click the desired task entry and select View from the
shortcut menu to view its Object Information and Status and check whether
the configuration export task meets your requirements.
4. Right-click the desired task and select Execute Now, or click the task and click
Execute now at the lower right corner of the tab to execute the configuration
export task.
338 Version: B
11 Data Synchronization and Backup
The following introduces how to view, create and execute the MAC address table
export tasks of PON ports.
By viewing MAC address table export tasks of PON ports, you can decide whether
to add or delete the tasks.
Prerequisite
Procedure
3. In the right pane, right-click the desired task entry and select View from the
shortcut menu to view its object information and status.
Other Operations
In the right pane, right-click the desired task and select the corresponding shortcut
menu to Delete / Disabled the task or view / modify Properties, etc.
Version: B 339
UNM2000 Network Convergence Management System Operation Guide
When the existing tasks do not meet the backup requirements, you can create MAC
address table export tasks of PON ports according to your needs.
Prerequisite
Procedure
1. Select System→Policy Task Management from the main menu to open the
Policy Task Management tab.
4. Set the parameters in the Basic information, Object source, and Extend
information tabs as required, and click OK. The new task appears in the task
list.
340 Version: B
11 Data Synchronization and Backup
Note:
Click Copy from other tasks to copy all settings except Task Name from
other templates. This improves the setting efficiency.
5. Click a certain task in the left pane, and users can view its object information
and status.
The following introduces how to execute the MAC address table export tasks of
PON ports.
Prerequisite
u The file transmission service between the client end and the server end runs
normally.
Procedure
Version: B 341
UNM2000 Network Convergence Management System Operation Guide
3. In the right pane, right-click the desired task entry and select View from the
shortcut menu to view its Object Information and Status and check whether
the configuration export task meets your requirements.
4. Right-click the desired task and select Execute Now, or click the task and click
Execute now at the lower right corner of the tab to execute the configuration
export task.
342 Version: B
12 Application Scenario
Alarm Management
Performance Management
Version: B 343
UNM2000 Network Convergence Management System Operation Guide
The alarm management module monitors the faults and abnormalities generated
during the device operation in real time. Besides, it provides detailed information of
the alarms and analysis tools supporting quick fault isolation and troubleshooting.
Background Information
The UNM2000 classifies the alarms into the current alarms and the alarm history
according to the alarm statuses.
u Current alarm: the alarm data saved in the current alarm database of the
UNM2000.
The alarm frequently generated by the same object will be displayed as one
entry in the current alarm list. To query each alarm record, you can check the
alarm logs.
u Alarm history: The removed current alarms are added into the alarm history
after the preset delay time has expired.
The alarm history will be transferred to the alarm history database from the
current alarm database. See Setting the Definition of the Alarm History
regarding how to set the delay time for transferring the current alarms to the
alarm history.
The UNM2000 provides abundant alarm management functions. The user can refer
to Table 12-1 and choose the corresponding function to monitor and handle the
alarms.
344 Version: B
12 Application Scenario
Version: B 345
UNM2000 Network Convergence Management System Operation Guide
failure information and analyzes For isolating the alarm, see Locating Alarms.
information failure causes by viewing For locating alarms, see Viewing Related
and analyze alarm details, locating Alarms.
the failure alarms and viewing related For outputting alarm information, see Exporting
cause alarms. Alarms.
View root / derivative alarms.
See the related manuals of
the corresponding NEs and
Eliminate handling suggestions in the For viewing alarm details, see Viewing Alarm
failures alarm details to eliminate Details.
the failure that triggers the
alarm.
After a failure is eliminated,
the corresponding alarms
will be cleared
For clearing the alarms manually, see Clearing
automatically. If the alarms
Alarms Manually.
cannot be cleared
automatically, you can
remove them manually.
Handle
During maintenance, For filtering alarms, see Filtering Alarms.
alarms
commissioning or For managing alarm mask rules, see Viewing
provisioning, a large number Alarm Filter Rules.
of alarms may be reported.
The user can filter the
For setting project alarm filtering, see Setting the
alarms by setting alarm
Project Alarm Filter.
mask to focus on the
important ones only.
346 Version: B
12 Application Scenario
Record the After handling the alarms, For editing alarm maintenance experience, see
alarm you can record the alarm Editing Alarm Maintenance Experience.
maintenance maintenance experience in For managing alarm maintenance experience,
experience the alarm library. see Managing Maintenance Experience.
The following introduces the performance management function, which helps the
user understand the service operation status during a period of time.
Background Information
u Current performance: The current 15-minute performance and the latest one to
sixteen 15-minute performance. The performance data is not stored in the
database.
u Real-time performance: The performance data that are collected and displayed
in a real-time manner. The collection cycle can be set to 10 seconds or 30
seconds, and the collection period can be set to 15 minutes, 30 minutes, 1 hour
or 24 hours. The performance data is not stored in the database.
u Performance history: The performance data that are saved in the database
according to the performance collection task.
Version: B 347
UNM2000 Network Convergence Management System Operation Guide
348 Version: B
12 Application Scenario
The following takes assigning authorities for users in two areas as example to
introduce how to create user accounts and assign authorities.
Scenario Description
The devices in Area A and Area B are managed by UNM2000 for uniform
supervision. The device in Area A is monitored, operated and maintained by
working staff in Area A and the device in Area B is monitored, operated and
maintained by working staff in Area B. Therefore, the working staff in Area A and
Area B should be allocated with user accounts and authorities respectively.
Procedures
According to area division, create object set A and object set B. Add the
devices of Area A and Area B to the members of object set A and object set B.
Version: B 349
UNM2000 Network Convergence Management System Operation Guide
4 The working staff responsible for monitoring: the application supervisor set
and the network supervisor set.
4 The working staff responsible for operation: the application operator set
and the network operator set.
For specific operations of creating the operation set, see Adding an Operation
Set.
Manage-
User Group User Group
ment Operation Authority
Name Type
Domain
Inspector Common Object Group Application supervisor set and network
Group A user group A supervisor set
Operator Common Object Group Application operator set and network operator
group A user group A set
Maintainer Common Object Group Application maintainer set and network
group A user group A maintainer set
Supervisor Common Object Group Application supervisor set and network
group B user group B supervisor set
Operator Common Object Group Application operator set and network operator
group B user group B set
Maintainer Common Object Group Application maintainer set and network
group B user group B maintainer set
Refer to Creating User Groups for specific steps of creating the user groups.
4. Create users.
4 Create the user's basic information. Set the username and password. For
security, select Modify Password on Next Login or set the valid days of
the password.
4 According to the working shifts of the staff, set the login time ranges.
350 Version: B
12 Application Scenario
4 Set the users' user groups. If six user groups A, B, C, D, E, and F are to be
created, refer to Table 12-4. After being assigned with a user group, the
user will be authorized with the management domain and operational
authorities of the user group.
A Inspector Group A
B Operator Group A
C Maintainer Group A
D Inspector Group B
E Operator Group B
F Maintainer Group B
4 Set the access control list and limit the IP address range accessible to the
user.
After completing the above configurations, provide the user accounts for the
corresponding staff.
To avoid sudden accidents like device fault, disconnection between the network
management system and the device, shut-off of the power supply system, which
may impact the service restoration, the UNM2000 provides several functions to
guarantee the device configuration.
u When the user needs to compare the device configuration with the
configuration in the network management database, the user can perform
configuration synchronization and check whether every configuration is
consistent. If not, the user can manually synchronize the device configuration to
the database, or from the database to the device. For detailed operation steps,
see Configuration Synchronization.
Version: B 351
UNM2000 Network Convergence Management System Operation Guide
u To avoid device fault, the user can set the execution cycle to automatically
upload the device configuration to the network management database
periodically. This helps restore the configuration quickly after the device fault is
recovered. For detailed operation steps, see Managing Configuration
Uploading Tasks.
u To avoid fault occurring on the device and the network management server at
the same time, the user can set the execution cycle to automatically export the
device configuration periodically and save to another FTP server. This ensures
the device configuration will not be lost. For detailed operation steps, see
Managing Configuration Export Tasks.
To avoid device software upload failure, the user can set the execution cycle to
automatically back up the device software periodically to the FTP server. This helps
recover the device software quickly. For detailed operation steps, see Managing
Software Backup Tasks.
352 Version: B
13 Abbreviations
IP Internet Protocol
International Telecommunication Union-
ITU-T
Telecommunication Standardization Sector
NE Network Element
NEL Network Element Level
NML Network Management Layer
Version: B 353
UNM2000 Network Convergence Management System Operation Guide
354 Version: B
Product Documentation Customer Satisfaction Survey
Thank you for reading and using the product documentation provided by FiberHome. Please take a moment to
complete this survey. Your answers will help us to improve the documentation and better suit your needs. Your
responses will be confidential and given serious consideration. The personal information requested is used for
no other purposes than to respond to your feedback.
Name
Phone Number
Email Address
Company
To help us better understand your needs, please focus your answers on a single documentation or a complete
documentation set.
Documentation Name
Code and Version
12. Additional comments about our documentation or suggestions on how we can improve:
Thank you for your assistance. Please fax or send the completed survey to us at the contact information
included in the documentation. If you have any questions or concerns about this survey please email at
[email protected]