UNM2000 Network Convergence Management System Operation Guide (Version B)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

UNM2000

Network Convergence
Management System

Operation Guide
Version: B

Code: MN000001822

FiberHome Telecommunication Technologies Co.,

Ltd. June 2016

Thank you for choosing our products.


We appreciate your business. Your satisfaction is our
goal. We will provide you with comprehensive technical
support and after-sales service. Please contact your local
sales representative, service representative or distributor
for any help needed at the contact information shown
below.

Fiberhome Telecommunication Technologies Co., Ltd.

Address: No. 67, Guanggu Chuangye Jie, Wuhan, Hubei,


China Zip code: 430073
Tel: +6 03 7960 0860/0884 (for Malaysia)
+91 98 9985 5448 (for South Asia)
+593 4 501 4529 (for South America)
Fax: +86 27 8717 8521
Website: http://www.fiberhomegroup.com

Legal Notice
are trademarks of FiberHome Telecommunication Technologies Co., Ltd.
(Hereinafter referred to as FiberHome)
All brand names and product names used in this document are used for
identification purposes only and are trademarks or registered trademarks
of their respective holders.

All rights reserved

No part of this document (including the electronic version) may be


reproduced or transmitted in any form or by any means without prior
written permission from FiberHome.
Information in this document is subject to change without notice.

Preface

Related

Documentation Document
Description

UNM2000 Network Convergence Management UNM2000 Network Convergence Management


System Product Description
System Installation Guide (Based on Windows)
UNM2000 Network Convergence Management UNM2000 Network Convergence Management
System Installation Guide (Based on Windows)
System Operation Guide
Introduces the functions, application scenarios
and technical specifications of the UNM2000
Network Convergence Management System.

Introduces how to install the UNM2000


Network Convergence Management System
on the Windows operating system.

Introduces how to install the UNM2000


Network Convergence Management System
on the SUSE Linux operating system.

Introduces the operation guidelines of the


UNM2000 Network Convergence Management
System.

Version
Version Description
A Initial version.

B Adds the new functions and operation methods of the UNM2000 R0106, R0106SP1
and R0106SP2 versions.

Intended Readers

This manual is intended for the following readers:

◆ Commissioning engineers

◆ Operation and maintenance engineers

To utilize this manual, these prerequisite skills are necessary:

◆ Data communication technology

◆ Access network technology

II

Conventions

Terminology Conventions

Terminology Convention

UNM2000 FiberHome UNM2000 Network Convergence Management System


Symbol Conventions

Symbol Convention Description

Note Important features or operation guide. Caution Possible injury to persons or


systems, or cause traffic
interruption or loss.

Warning May cause severe bodily injuries.


➔ Jump Jumps to another step.

→ Cascading
menuConnects multi-level menu options.

↔ Bidirectional

service The service signal is bidirectional.

→ Unidirectional

service The service signal is unidirectional.

III

Operation Safety Rules

The network management computer should be placed away


from direct sunlight, electromagnetic interference, heat source,
humidity and dust, and with at least 8cm distance from other
objects in order to keep good ventilation.

Use UPS power supply to avoid loss of network


management data caused by accidental power failure.

The computer case, UPS power supply and switch (or


hub) should be connected to protection earth ground.

To shut down the network management computer, first exit


the operation system normally and then shut off the power
supply.

Do not exit the network management system when it is working


normally. Exiting the network management system does not
interrupt traffic in the network, but precludes centralized control
of the networked equipment.

The network management computer cannot be used for


purposes other than network management. Use of unidentified
memory devices should be prohibited so as to avoid computer
viruses.

Do not delete any file in the network management system


randomly or copy any irrelevant file into the network
management computer.

Do not visit Internet via the network management computer.


Doing so may increase data flow in the net card and hence
affects normal network management data transmission or
results in other accidents.

Do not perform service configuration or expansion during


service
busy hours via the network management system.

Do not modify the network management computer’s


protocol
settings, computer name or LAN settings. Doing so may result in
abnormal operation of network management system.
VI
VII

VIII

Contents
Preface...................................................................................................................I

Related Documentation ...................................................................................I

Version ...........................................................................................................II

Intended Readers ...........................................................................................II

Conventions ..................................................................................................III

Operation Safety Rules......................................................................................... V

1 Overview ........................................................................................................1 1.1

Deployment of the UNM2000 in the TMN...........................................2 1.2

Manageable Device Types................................................................2 2 Basic

Operations of the UNM2000 ..................................................................4 2.1 Login

/ Logout...................................................................................5

2.1.1 Logging into the UNM2000 Client End.................................5


2.1.2 Exiting the UNM2000 Client End .........................................6

2.2 Viewing the UNM2000 Version..........................................................6 2.3

GUI Introduction ...............................................................................7

2.3.1 GUI ....................................................................................7


2.3.2 Shortcut Icons.....................................................................7
2.3.3 General Shortcut Keys......................................................10

2.4 Menu Description............................................................................ 11

2.4.1 System ............................................................................. 11


2.4.2 View .................................................................................12
2.4.3 Resource..........................................................................14
2.4.4 Configuration ....................................................................16
2.4.5 Alarm................................................................................16
2.4.6 Performance.....................................................................18
2.4.7 Security ............................................................................18
2.4.8 Window ............................................................................19
2.4.9 Help .................................................................................19

2.5 Setting System Parameters.............................................................20


2.5.1 Setting the Display Style of the Browse Tree .....................20
2.5.2 Setting the Time Mode ......................................................21
2.5.3 Setting the Topology Display .............................................22
2.5.4 Setting Ping Parameters ...................................................24
2.5.5 Setting the Telnet Proxy Server .........................................25
2.5.6 Setting the GUI Display Mode ...........................................25

2.6 Setting the FTP Server....................................................................26 2.7


Setting the Default Workspace ........................................................27 2.8

Basic Operations of the UNM2000 ..................................................28

2.8.1 Upgrading the License ......................................................28


2.8.2 Modifying the Password....................................................29
2.8.3 Lock the Terminal..............................................................29
2.8.4 Logging Out of the Current Account...................................30
2.8.5 Viewing the Message Platform ..........................................31
2.8.6 Managing Toolbars ...........................................................31
2.8.7 Creating a Custom View....................................................33

3 Security Management...................................................................................34 3.1

User Security Concepts ..................................................................35 3.2 User

Security Policy Management...................................................38

3.2.1 Setting the User Login Mode .............................................38


3.2.2 Setting the ACL ................................................................39
3.2.3 Setting the Account Policy.................................................40
3.2.4 Setting the Password Policy..............................................41

3.3 Managing Network Management Users...........................................42

3.3.1 Operation Set Management ..............................................42


3.3.2 Object Set Management ...................................................45
3.3.3 User Group Management..................................................48
3.3.4 User Management ............................................................52

3.4 Managing User Sessions ................................................................58

3.4.1 Monitoring User Sessions .................................................59


3.4.2 Logging Out Users............................................................60
3.4.3 Sending Messages to Online Users...................................61
3.4.4 Monitoring User Activities..................................................62

3.5 Authorization and Domain Division..................................................63


4 Configuration Management...........................................................................66

4.1 NE Communication Route Management..........................................67

4.1.1 NE Management Program.................................................67


4.1.2 Partition Policy Management.............................................71

4.2 SNMP Parameter Template.............................................................73

4.2.1 Creating and Using the SNMP Parameter Template...........73


4.2.2 Modifying / Deleting an SNMP Parameter Template...........75

4.3 Managing Global Templates............................................................76

4.3.1 Viewing the Global Template.............................................76


4.3.2 Adding a Global Template .................................................77
4.3.3 Modifying a Global Template .............................................78
4.3.4 Binding / Unbinding a Global Template ..............................80
4.3.5 Deleting a Global Template ...............................................81
4.4 Global Configuration Management ..................................................83

4.4.1 Viewing the Global Template.............................................83


4.4.2 Adding the Global Configuration........................................84
4.4.3 Modifying the Global Configuration....................................84
4.4.4 Binding / Unbinding the Global Configuration.....................85
4.4.5 Deleting a Global Configuration Template..........................86

4.5 Tracing Signaling ............................................................................87 4.6

Configuration Synchronization ........................................................88 4.7

Network Access Management.........................................................90 4.8

Home Gateway MAC Range Configuration......................................91 4.9

Pre-deploying ONUs.......................................................................93 4.10

Pinging NEs....................................................................................94 4.11

Telneting NEs .................................................................................95 4.12 The

Tracert Function of the UNM2000 Server..................................95 4.13 PON

Configuration Transfer ............................................................96

5 Topology Management..................................................................................98

5.1 Topology Creation Flow...................................................................99 5.2

Creating a Global Logical Domain .................................................100 5.3

Creating NEs ................................................................................101

5.3.1 Creating an Access NE...................................................101


5.3.2 Creating Other NEs.........................................................102
5.3.3 Automatic Discovery of NEs............................................103

5.4 Adding Cards................................................................................107

5.4.1 Adding Cards Automatically ............................................108


5.4.2 Adding Cards Manually...................................................109

5.5 Creating a Virtual Connection........................................................ 110 5.6

Editing NEs................................................................................... 111

5.6.1 Setting NE Attributes....................................................... 111


5.6.2 Editing Icons................................................................... 112
5.6.3 Setting the Displayed Contents of the Icon ...................... 113
5.6.4 Tagging NEs................................................................... 113
5.6.5 Querying a Label ............................................................ 114
5.6.6 Modify NE Names in a Batch Manner .............................. 114

5.7 Editing a Fiber Connection ............................................................ 118

5.7.1 Modifying the Connection Line Properties........................ 119


5.7.2 Setting the Display Mode of the Connection Line ............. 119

5.8 Checking the Topology View .........................................................120

5.8.1 Checking the Physical Topology View .............................120


5.8.2 Viewing the Sub-topology View .......................................121
5.8.3 Viewing the Thumbnail....................................................123
5.8.4 Searching Objects ..........................................................123

5.9 Deleting the Topology ...................................................................124

5.9.1 Deleting the Global Logical Domain.................................124


5.9.2 Delete NEs .....................................................................125
5.9.3 Deleting the System........................................................125
5.9.4 Deleting Cards................................................................126

6 Managing Access NEs................................................................................127

6.1 The NE Manager GUI ...................................................................128 6.2

Configuring Local Services............................................................129 6.3 ONU

Query Management .............................................................130

6.3.1 Querying ONUs ..............................................................130


6.3.2 Viewing the ONU List......................................................131
6.3.3 ONU Query Example ......................................................133
6.4 Authorizing ONUs.........................................................................134

6.4.1 Configuring the ONU Whitelist.........................................134


6.4.2 Managing ONU Authentication Modes.............................135
6.4.3 Managing PON Port Authentication Modes......................137
6.4.4 Replacing the ONU Logical Identifier...............................139
6.4.5 Viewing the Authorized ONU Information.........................139

6.5 ONU Registration Management ....................................................140

6.5.1 Querying the ONU RMS Error Information .......................141


6.5.2 Querying the ONU Network Access Interception Logs .....141

6.6 Rule Tasks of Enabling the ONU Port ............................................141

6.6.1 Viewing Rule Tasks.........................................................142


6.6.2 Adding a Rule Task.........................................................142
6.6.3 Executing Rule Tasks......................................................143

6.7 Authorizing Cards .........................................................................143 6.8

Synchronizing ONUs Manually......................................................145 6.9

Obtaining Unauthorized ONUs......................................................145 6.10

Authorizing ONUs Manually ..........................................................147 6.11

Comparing and Synchronizing the ONU Manually .........................147 6.12

Querying the Card Software / Hardware Versions ..........................148 6.13

Upgrading the Card.......................................................................149

6.13.1 Tasks of Upgrading the System Software ........................150


6.13.2 Tasks of Upgrading ONUs in a Batch Manner..................152
6.13.3 Batch Upgrade Task of Service Cards .............................155

6.14 Managing the Test Task ................................................................157


6.14.1 Managing POTS Port Internal / External Line Test Tasks..157
6.14.2 Managing the Task of VoIP Pinging Test..........................159

6.15 Managing ONU MGC Query Tasks................................................162

6.16 Managing NE Automatic Discovery Tasks .....................................163

6.16.1 Viewing NE Automatic Discovery Tasks...........................163


6.16.2 Adding an NE Automatic Discovery Task.........................164

7 Alarm Management ....................................................................................165

7.1 Basic Concepts.............................................................................166

7.2 Setting Alarm Related Parameters ................................................170

7.2.1 Managing Alarm Reporting Rules....................................170


7.2.2 Managing Alarm Filter Rules ...........................................172
7.2.3 Setting the Audible Alarms ..............................................176
7.2.4 Enabling / Disabling the Audio Alarm...............................177
7.2.5 Setting the Display Modes of New Alarms / Events..........178
7.2.6 Setting the Alarm Color ...................................................179
7.2.7 Setting Other Items of the Local Alarms...........................180
7.2.8 Setting the Alarm Automatic Synchronization Policy ........180
7.2.9 Setting the Definition of the Alarm History........................181
7.2.10 Setting the Alarm Automatic Confirmation Rules..............182
7.2.11 Converting Events to Alarms...........................................183
7.2.12 Customizing Alarms........................................................183

7.3 Managing Alarm / Event Templates ...............................................187

7.3.1 Alarm Template...............................................................187


7.3.2 Event Template...............................................................192

7.4 Synchronizing Alarms ...................................................................195

7.4.1 Synchronizing Alarms Manually ......................................195


7.4.2 Synchronizing Alarms Automatically................................196

7.5 Monitoring Network Alarms ...........................................................196

7.5.1 Viewing Current Alarms ..................................................197


7.5.2 Viewing Alarm History.....................................................199
7.5.3 Viewing Related Alarms..................................................202
7.5.4 Viewing Alarm Details .....................................................202
7.5.5 Viewing Alarm Logs ........................................................204
7.5.6 Viewing Statistical Data of the Alarm Logs.......................206
7.5.7 Viewing Alarm Statistics..................................................208
7.5.8 Querying Reported Events..............................................210
7.5.9 Viewing the Reported Alarms ..........................................212

7.6 Handling Alarms ...........................................................................213

7.6.1 Confirming Alarms ..........................................................214


7.6.2 Clearing Alarms Manually ...............................................215
7.6.3 Locating Alarms..............................................................215
7.6.4 Filtering Alarms...............................................................215
7.6.5 Modifying Alarm Levels...................................................216
7.6.6 Editing Alarm Remarks ...................................................217
7.6.7 Exporting Alarms ............................................................217
7.6.8 Editing Alarm Maintenance Experience ...........................218
7.6.9 Managing Maintenance Experience ................................219
7.6.10 Exporting All Alarm Data to the FTP Service....................220

7.7 Customizing the Alarm Information................................................221

7.7.1 Customizing Alarm Names..............................................221


7.7.2 Customizing Alarm Levels...............................................222
7.7.3 Setting the Project Alarm Filter ........................................224

7.8 Remote Alarm / Event Notification.................................................226

7.8.1 Setting Remote Communication Parameters ...................226


7.8.2 Setting the Remote Notification Format of the Alarm /
Event..............................................................................227
7.8.3 Setting the Remote Notification Sending Rules of the Alarm /
Event..............................................................................227
7.8.4 Setting the Remote Notification Rules of the Alarm /
Event..............................................................................228
7.8.5 Sending the Remote Alarm / Event Notification................229

7.9 Managing Alarm / Event Data........................................................230

7.9.1 Settings the Alarm / Event Overflow Save........................231


7.9.2 Settings the Manual Save of the Alarms / Events.............233

7.10 Alarm Logs ...................................................................................235 7.11

Managing Alarm Frequency Analysis Rules...................................238 8

Performance Management..........................................................................242 8.1

Basic Concepts.............................................................................243 8.2 Managing

Performance Query Templates......................................244

8.2.1 Viewing Performance Templates .....................................244


8.2.2 Creating a Performance Query Profile .............................244
8.2.3 Modifying a Performance Query Template .......................246

8.3 Setting the Performance Collection Time.......................................246

8.4 Configuring the Performance Classification Switch in a Batch


Manner.........................................................................................247

8.5 Managing the Card Performance...................................................249

8.5.1 Viewing the Current Performance....................................249

8.5.2 Viewing Performance History ..........................................250


8.5.3 Viewing Comparison of Performance Data ......................252
8.5.4 Viewing the Real-time Performance ................................253
8.5.5 View Performance History Trend.....................................255

8.6 Managing the Performance Collection...........................................257

8.6.1 Managing Performance Index Sets .................................257


8.6.2 Managing Performance Threshold Sets...........................259
8.6.3 Managing Performance Collection Task...........................262

8.7 Managing Performance Data ........................................................264

8.7.1 Setting the Overflow Save of Performance ......................265


8.7.2 Setting the Manual Save of Performance.........................266
8.7.3 Gathering Statistics of PON Traffic ..................................268
8.7.4 Setting the FTP Reporting Switch....................................269
8.7.5 Top Rank Statistics .........................................................271

9 Log Management........................................................................................273 9.1

Log Management Policy................................................................274 9.2 Log

Types.....................................................................................275

9.2.1 System Logs...................................................................275


9.2.2 Operation Logs ...............................................................276
9.2.3 Security Logs..................................................................277
9.2.4 TL1 Command Logs .......................................................278

9.3 Log Statistics ................................................................................279 9.4

Managing System Logs ................................................................280

9.4.1 Managing System Log Templates....................................280


9.4.2 Querying System Logs....................................................282

9.5 Managing Operation Logs.............................................................283

9.5.1 Managing Operation Log Templates................................283


9.5.2 Querying Operation Logs ................................................285

9.6 Managing Security Logs................................................................288

9.6.1 Managing Security Log Templates...................................288


9.6.2 Querying Security Logs...................................................290

9.7 Managing TL1 Command Logs .....................................................291

9.7.1 Managing TL1 Command Log Templates ........................292

9.7.2 Querying TL1 Command Logs ........................................293

9.8 Managing Log Data.......................................................................294

9.8.1 Managing the Log Forwarding Server..............................295


9.8.2 Setting the Overflow Save of Logs...................................297
9.8.3 Setting the Manual Save of logs ......................................299

10 Resource Management...............................................................................300

10.1 Managing Resource Statistical Templates .....................................302

10.1.1 Viewing Resource Statistical Templates ..........................302


10.1.2 Customizing a Resource Statistical Template ..................304

10.2 Physical Resource Statistics .........................................................306

10.3 Resource Statistics of Other Types................................................307

10.4 Exporting Physical Resource Statistics..........................................308

10.5 Exporting Resource Statistics of Other Types ................................310

10.6 Example of Resource Statistics..................................................... 311

10.7 Importing the ODN NSM Information .............................................313

10.8 Querying Multiple ONUs ...............................................................314

10.9 Querying Cards by SN ..................................................................317

10.10 Querying the MDU Phone Number................................................318

10.11 Querying the ONU RMS Error Information .....................................320

10.12 Querying the ONU Network Access Interception Logs ...................321

10.13 Gateway Type Configuration .........................................................322

10.14 Unauthorized ONU List .................................................................323

10.15 Modifying ONU Names by Importing an Excel File.........................324

11 Data Synchronization and Backup...............................................................326

11.1 Managing Data Synchronization Tasks..........................................327

11.1.1 Managing Software / Hardware Version Update Tasks.....327


11.1.2 Managing Configuration Uploading Tasks........................327

11.2 Data Backup.................................................................................331

11.2.1 Managing Software Backup Tasks...................................331


11.2.2 Managing Configuration Export Tasks .............................333
11.2.3 Managing Card Software Backup Tasks ..........................336
11.2.4 Managing MAC Address Table Export Tasks of PON
Ports...............................................................................339

12 Application Scenario ...................................................................................343

12.1 Alarm Management ......................................................................344 12.2

Performance Management............................................................347 12.3

Authorization and Domain Division................................................349 12.4

Guaranteeing Device Configuration...............................................351 13

Abbreviations..............................................................................................353

Figures

Figure 1-1 Deployment of the UNM2000 in the TMN...........................................2


Figure 2-1 UNM2000 Main GUI..........................................................................7
Figure 5-1 Network Topology Creation Flow.....................................................99
Figure 6-1 The NE Manager GUI ...................................................................128
Figure 6-2 Local Service Configuration GUI ...................................................129
Figure 10-1 Setting the MDU Phone Number Query Conditions........................319
Figure 10-2 The Query MDU Phone Number Tab ...........................................319
Figure 10-3 Unauthorized ONU List .................................................................324

Tables

Table 1-1 Manageable Devices of the UNM2000 ..............................................3


Table 2-1 Default Shortcut Icons in the Toolbar .................................................8
Table 2-2 Other Common Shortcut Icons ..........................................................9
Table 2-3 Descriptions of the General Keyboard Shortcuts..............................10
Table 2-4 Description of the Submenus under the System Menu .................... 11
Table 2-5 Description of the Submenus under the View Menu.........................13
Table 2-6 Description of the Submenus under the Resource Menu.................14
Table 2-7 Description of the Submenus under the Configure Menu ................16
Table 2-8 Description of the Submenus under the Alarm Menu.......................17
Table 2-9 Description of the Submenus under the Performance Menu ...........18
Table 2-10 Sub Menus under the Security Main Menu .....................................19
Table 2-11 Description of the Submenus under the Window Menu ...................19
Table 2-12 Description of the Submenus under the Help Menu .........................20
Table 3-1 The User Group Settings.................................................................51
Table 3-2 Description on User Settings...........................................................55
Table 3-3 Creating User Groups .....................................................................64
Table 3-4 Creating Users................................................................................65
Table 4-1 Configuration Uploading / Downloading...........................................89
Table 5-1 Description of the Network Topology Creation Flow .........................99
Table 5-2 Setting Items of Creating the Access NE .......................................101
Table 5-3 Synchronization Mode ..................................................................109
Table 5-4 Description of Parameters in the Create the Virtual Connection
Dialog Box.................................................................................... 110
Table 5-5 Descriptions of Settings in the Batch Modify Dialog box ............... 117
Table 6-1 Description of the ONU Authentication Modes ...............................136
Table 6-2 Description of PON Port Authentication Modes..............................138
Table 6-3 ONU Authorization Status .............................................................140
Table 6-4 Parameters...................................................................................144
Table 6-5 Buttons.........................................................................................144
Table 6-6 Buttons.........................................................................................147
Table 6-7 Description on the VoIP Pinging Parameters .................................161
Table 7-1 Description and Handling Method of Alarms of Different Levels......168
Table 7-2 Access Method of Viewing Current Alarms ....................................197
Table 7-3 Access Method of Viewing the Alarm History.................................200
Table 7-4 Parameter Descriptions of Project Alarm Filtering ..........................225
Table 7-5 Descriptions of the Alarm / Event Overflow Save Task Settings......232
Table 7-6 Descriptions of the Alarm / Event Overflow Save Task Settings......234
Table 8-1 Access Method of Viewing the Performance History ......................251
Table 8-2 Threshold Set Parameters ............................................................261
Table 8-3 Description of the Performance Overflow Save Task Settings ........266
Table 8-4 Descriptions of the Performance Manual Save Task Settings.........267
Table 9-1 Description of the Parameters in the Query System Logs Dialog
Box...............................................................................................281 Table 9-2
Description of the Parameters in the Query Operation Logs Dialog
Box...............................................................................................284 Table 9-3
Description of the Parameters in the Query Security Logs Dialog
Box...............................................................................................288 Table 9-4
Description of the Parameters in the Query TL1 Command Logs Dialog
Box....................................................................................292 Table 9-5 Description
on the Settings of the Log Forwarding Server ..............296 Table 9-6 Descriptions
of the Overflow Save Task.........................................298 Table 12-1 Alarm
Operation Descriptions........................................................345 Table 12-2
Performance Operation Descriptions.............................................348 Table 12-3
Creating User Groups ...................................................................350 Table 12-4
Creating Users..............................................................................351

1 Overview

The following introduces the product position and GUI description of the UNM2000.

Deployment of the UNM2000 in the TMN

Manageable Device Types


Version: B 1
UNM2000 Network Convergence Management System Operation Guide

1.1 Deployment of the UNM2000 in the TMN

The TMN provides the hierarchical network architecture and standard


network interface. It is composed of business management layer (BML),
service
management layer (SML), network management layer (NML) and element
management layer (EML). These layers comprise the layered management
architecture of the TMN.

The UNM2000 manages the access devices and locates at the EML, as shown
in Figure 1-1.
Figure 1-1 Deployment of the UNM2000 in the TMN

1.2 Manageable Device Types

The devices that can be managed by the UNM2000 are shown in Table 1-1.

2 Version: B
1 Overview

Table 1-1 Manageable Devices of the UNM2000

Type Device Model

OLTAN5116–06B, AN5116–02, AN5116–06B, AN5516–04, AN5516–04B and


AN5516–06.

ONUAN5506-04-FG, AN5006-04-A, AN5006-04-B, AN5006-04-F, AN5506-01-A,


AN5506-01-B, AN5006-01-A, AN5006-01-B, etc.
MSAN AN5006–20, AN5006–30, AN5006–15 and AN5006–16.
Version: B 3

2 Basic Operations of the UNM2000

The following introduces basic operations of the UNM2000, including the


topics below.

Login / Logout

Viewing the UNM2000 Version

GUI Introduction

Menu Description
Setting System Parameters

Setting the FTP Server

Setting the Default Workspace

Basic Operations of the UNM2000

4 Version: B
2 Basic Operations of the UNM2000

2.1 Login / Logout

The following introduces how to log into or log out of the UNM2000 client.

2.1.1 Logging into the UNM2000 Client End

You need to log into the UNM2000 system via the UNM2000 client before
configuring and managing devices on the GUI of the UNM2000 client.

Prerequisite

◆ You have logged into the UNM2000 as the administrator.

◆ The UNM2000 services at the server end have been started.

◆ The client end communicates with the server end normally (check whether the
network communication is normal by pinging the IP address of the far end).
◆ The client IP address is in the access control list of the UNM2000. See Setting
the ACL for how to set the access control list.

◆ The user has been assigned a legal username and password.

◆ The client end of the UNM2000 is installed.

Procedure

1. Double-click the icon on the desktop.


2. In the Server drop-down list of the UNM2000 Login window, select the IP
address of the UNM2000 server.

If the server to be logged in is not set, follow the steps below to add the
server IP address.

1) Click to open the Server IP Management dialog box, and click


Add.

2) In the highlighted field, enter the IP Address, Port Number and Host
Name of the desired UNM2000 server, and then click OK.

Version: B 5
UNM2000 Network Convergence Management System Operation Guide

3. In the displayed UNM2000 Login dialog box, enter the username and
password, and then click Login.

Note:

Upon completion of the UNM2000 installation, a default account will


be given: the username is admin and the password is admin. To
guarantee the UNM2000 security, please change the password
immediately after login.

2.1.2 Exiting the UNM2000 Client End


Prerequisite

The UNM2000 client end runs normally.

Procedure

1. In the UNM2000 window, select System→Exit or simply click .

2. Click Yes in the displayed Confirm to Exit from the System.

2.2 Viewing the UNM2000 Version

View the UNM2000 version information via the UNM2000 client.

Procedure

1. Log into the UNM2000 client.

6 Version: B
2 Basic Operations of the UNM2000

2. Select Help→About UNM2000 in the main menu.

3. View the UNM2000 version in the displayed window.

2.3 GUI Introduction

The following enables you to understand the GUI of the UNM2000 and find
the operation menu quickly to improve your operation efficiency.

2.3.1 GUI

The UNM2000 main GUI is composed of the object tree pane, toolbar, menu
bar, etc., as shown in Figure 2-1.
(1) Object tree pane (2) Toolbar (3) Menu bar

(4) Alarm statistical panel (5) Display pane (6) Status bar

Figure 2-1 UNM2000 Main GUI

2.3.2 Shortcut Icons

The following introduces the general shortcut icons in the UNM2000 GUI.

Version: B 7
UNM2000 Network Convergence Management System Operation Guide

Shortcut Icons in the Toolbar

See Table 2-1 for the default shortcut icons in the toolbar.

Table 2-1 Default Shortcut Icons in the Toolbar

Classifica

tionIcon Name Description


for objects. Searches and isolates the object.
Common
Alarm Prompt Tone Is
functional area
On
Click the icon to switch on / off the The
alarm sound alarm sound.
prompt is turned off.

Alarm
Current Alarm Displays the current alarm
information.
Query Reported

Events Displays the report event information.


Perfor
Refresh Refreshes the current view. Searches
mancePerformance History Displays the historical performance information.
Management management.

Opens the NE
NE Communication Route Communication Route
Management
Management tab for NE
Others
Opens the NMS User
NMS User communication route
Management tab for user management.

Parameter Settings Opens the Parameter Settings dialog


box for system parameter settings.

Help Legend Opens the Legend pane that displays the system icons.

Displays the quantity of critical alarms


alarms in the Current Alarm
Critical Major tab.
Displays the quantity of minor
alarms dynamically; Click this
Alarm Minor button to view the minor
dynamically; Click this button
alarms in the Current Alarm
to view the critical alarms in
Statistics tab.
the Current Alarm tab.
Displays the quantity of major
alarms dynamically; Click this
button to view the major

8 Version: B
2 Basic Operations of the UNM2000

Table 2-1 Default Shortcut Icons in the Toolbar (Continued)

Classifica

tionIcon Name Description


Displays the quantity of prompt alarms
dynamically; Click this button to view Warning
the prompt alarms in the Current
Alarm tab.
Clicking this button to open the Alarm Display Alarm Statistics Window
Statistics dialog box which displays all
current alarm statistics.

Other Common Shortcut Icons

See Table 2-2 for other common shortcut icons.

Table 2-2 Other Common Shortcut Icons

Icon Name Description

Table Settings Sets the table rows in the current GUI.


Query
by

template Queries by template or queries all.

New Creates a new object.

Expand Expands the object tree.

Collapse Collapses the object tree.

Search Open the search dialog box and enter the key word to search in
the object tree.
condition.
Quick search in the current
object Creates a custom topology view and sets the
Create a custom topology view view to display the concerned objects only.

Lock / Unlock the View Locks / unlocks the location of the NE icon in
Enter the key word to search in the current the topology view.
object by clicking to select a search

Select Moves NE icon freely in the topology view when the


current view is unlocked.

Move Moves the topology view.

Version: B 9
UNM2000 Network Convergence Management System Operation Guide

Table 2-2 Other Common Shortcut Icons (Continued)

Icon Name Description

Edit Edits the connection line by adding / deleting the control


points.

Aerial view Displays the aerial view of the topology.

Zoom In Zooms in the topology view.

Zoom Out Zooms out the topology view.

Zoom to 100% Displays the topology in the original display scale.

– Sets the display scale of the topology view.


Delete the
custom topology view node members and connection line
members in the custom topology
Modify Custom View
view.
Deletes the custom topology
view.

Modifies the basic information,


2.3.3 General Shortcut Keys

See Table 2-3 for the general UNM2000 keyboard shortcuts.

Table 2-3 Descriptions of the General Keyboard Shortcuts

Shortcut Description
F1 Opens the Help.
F5 Refreshes the current view.
Alt+Shift+Enter Selects / Cancels the full-screen mode.

Ctrl+F Opens the Search Object dialog box to search for NEs, logical domains or cards.
Ctrl+M Displays the current alarms.
Ctrl+H Vies the alarm history.
Ctrl+P Displays the performance history.

Ctrl+G Opens the Global Template Management tab to manage global templates and
configurations.
Alt+S Opens the System main menu.
Alt+V Opens the View main menu.

10 Version: B
2 Basic Operations of the UNM2000

Table 2-3 Descriptions of the General Keyboard Shortcuts (Continued)

Shortcut Description
Alt+E Opens the Resource main menu.
Alt+G Opens the Configure main menu.
Alt+A Opens the Alarm main menu.
Alt+P Opens the Performance main menu.
Alt+U Opens the Security main menu.
Alt+W Opens the Window main menu.
Alt+H Opens the Help main menu.
Ctrl+W Closes the current window.
Shift+Escape Maximizes / restores the current window.
Alt+Shift+D Opens the tab in the current or new window.
Ctrl+Shift+W Closes all tabs except the Main Topology tab.

2.4 Menu Description

2.4.1 System

The submenus under the System main menu are described in Table 2-4.
Table 2-4 Description of the Submenus under the System Menu

Menu Description
When the overflow save task of historical data is set, the
task.

Data Creates the upgrade task to


Save Data
Synchroni zation implement upgrade of the OLT
UNM2000 will automatically system cards, service cards,
save the NMS log history TDM cards, voice cards, OLT
data, device alarm data and firmware and ONU software
performance data according and firmware in a batch
to the conditions set in the manner. Implements the
task. synchronization of the data on
Policy Task Manage ment
the device and in the
Overflow Saving Manually saves the EMS log
UNM2000. The data
data, device alarm data and
synchronization tasks include
performance data.
Save
the software / hardware
Manually Sets the data backup
version update tasks,
attributes to complete the
Configura tion Backup configuration uploading tasks,
device software backup task
NE automatic discovery and
Upgrade and configuration data backup
ONU MGC query.
Task

Version: B 11
UNM2000 Network Convergence Management System Operation Guide

Table 2-4 Description of the Submenus under the System Menu (Continued)

Menu Description

Test TaskThe test task includes the POTS port external / internal line task
and the VoIP pinging test task.
Settings command and display the
operation result.
User Sets the system parameters,
Security including the browse tree
Strategy display style, the time mode,
the topology display, the
pinging parameters, the Telnet
Alarm
proxy server, and the GUI
Settings
display.

Sets the user login mode,


Service
access control list, password
Configura tion
policy and account policy of
Performance
Parameter Settings the UNM2000.
Sets the statistics export task
Statistics to export the performance data
Sets the alarm-related
Export Task to an FTP server.
parameters, including the
Imports the Telnet command UNM2000 client end settings
Preconfig
text file to perform the Batch (alarm sound, and processing
Task
Download operation on the and display mode of newly
device via issuing the Telnet reported alarms) and the
Local
UNM2000 server settings rules, automatic
(alarm automatic confirmation synchronization mode, etc.). Sets the global FTP server.

Settings Sets the 24-hour performance collection time of the server.


storing the temporary resource files needed
Default Work Section Settings
by the system.
Sets the UNM2000 workspace directory for

Lock the Terminal Locks the UNM2000 client manually.


Modify Password Modifies the password of the current user.

Logout Logs out of the current UNM2000 client and returns to the user login GUI.
Exit Exits and closes the UNM2000 client.

2.4.2 View

The submenus under the View main menu are described in Table 2-5.

12 Version: B
2 Basic Operations of the UNM2000

Table 2-5 Description of the Submenus under the View Menu

Menu Description
Refresh Refreshes the current view.
Show NE IP and Type
Sets whether to display the NE IP
address and type next to the NE icon Common
main topology, in which you can
in the network topology.
understand the system information.
Topology View
Sets whether to display

Picture Mode Sets a picture as the


background image of the current
topology. on the toolbar of the main GUI so as
to view the UNM2000 and NE alarms.
Map Mode Sets the map of the local
city as the background image of the
current topology.

Opens the Message Platform


window at the bottom of the
Message Platform

Alarm Statistics

Function Area Sets whether to display on the toolbar of the main GUI.

Alarm Sets whether to display on the toolbar of the main


GUI.
Performance
Sets whether to display on the toolbar of the main GUI.

Others Sets whether to display on the toolbar of the main


GUI.

Sets whether to display on the toolbar of the main GUI.


Help window appears on the right,
displaying the description of the icons.

Small Toolbar
Click this icon and the Legend

Icons Sets the display size of shortcut icons.

Reset Toolbars Restores the system default shortcut keys on the toolbar of
the main topology.

Customize Adds the commonly used tools onto the toolbar by


customizing the toolbar.

Version: B 13
UNM2000 Network Convergence Management System Operation Guide

Table 2-5 Description of the Submenus under the View Menu (Continued)

Menu Description
Zoom In Zooms in the topology view.
Zoom Out Zooms out the topology view.
Zoom Displays the topology view according to the
Actual Size Displays the topology view
window size.
according to its actual size. Optimum Size

Full Screen Displays the EMS system in full screen.

2.4.3 Resource

The submenus under the Resource main menu are described in Table 2-6.

Table 2-6 Description of the Submenus under the Resource Menu

Menu Description
Opens the NE manager, in which you can perform operations
Open NE Manager Discovery

Detect Physical Configuration Auto NE Auto Patrol


based on NEs as well as configure, manage
and maintain NEs, cards or ports separately.
configures NE data in the topology.
Detects the card physical configurations of the
devices in the network and automatically Creates the automatic patrol conditions and
synchronizes the card physical configurations executes patrol on the UNM2000, OLT, MDU
of the devices to the UNM2000. and ONU according to the set patrol

Detects the devices connected to the conditions.

UNM2000 automatically, creates NE and

Create Logical Domain Creates a logical domain for managing NEs. The logical domain
is a set of NEs.
Create Access
Create Other
Create NE
NECreates a virtual NE.
NECreates an access NE.
domains, NEs or ONUs in a batch manner.
Modify NE Names in a Batch Manner
Modify ONU Names by Importing EXCEL Modifies the ONU names in a batch manner

Modifies or replaces the names of logical by exporting an Excel file.

14 Version: B
2 Basic Operations of the UNM2000

Table 2-6 Description of the Submenus under the Resource Menu (Continued)

Menu Description
Imports the ODN relevant information into the UNM2000,
ONU, ONU name, optical splitter name, port,
Import ODN NSM Information etc.
including the IP address and name of the
OLT connected to the ODN, PON port of the

Delete Deletes all the data of the selected network or subnet.

Searches for objects. Searches for the object by the specified search conditions, for example,
NE, logical domain or card.

Query the ONU Searches for the ONU by the specified search conditions.

Batch Query ONU Queries the ONUs in a batch manner by importing the specified
conditions.

Query MDU Phone Number Queries the port details by the port phone number.

Query Board by Serial Number Queries card details by card SN.

ONU RMS Error Information Query search conditions.

ONU Network Intercept Log Query Queries the information of the ONU that is
Queries the information of the ONU that re-authorized according to specified search
fails to register according to specified conditions.

Mark the NE As Marks the NE with a specified label so that it can be quickly queried.
Label Query Queries an NE according to the customized NE label. GIS Batch Import

Imports NE GIS information in a batch manner. Gateway Type Config Sets the

gateway type.
Export preset statistical template.

Statistics
Export of Exports the physical resource
Other Types statistics as an CSV, HTML,
Gathers statistics of NEs, TXT or Excel file.
cards, ports and ONUs
Resource Statistics
according to the preset
Physical Exports the user information
statistical template.
Resource Statistics statistics or service
Gathers statistics of ONU information resource statistics
Other Type Statistics
users, local end VLANs, NE as an CSV, HTML, TXT or

Physical MGC services and ONU MGC Excel file.


Resource Statistics services according to the

HGU Resource Interconnect Manages the ONU manufacturer and device model
information.
Unauthorized ONU List Queries the unauthorized ONU list of a specified object.

Version: B 15
UNM2000 Network Convergence Management System Operation Guide

2.4.4 Configuration

The submenus under the Configure main menu are described in Table

2-7. Table 2-7 Description of the Submenus under the Configure Menu

Menu Description
Configures multiple same-model NEs in the administrative
domain of the entire network administrative domain of the
by using a global profile, for entire network, for example,
Global example, the line profile, QoS the ONU card configuration,
Template Config profile, port profile, service service configuration, alarm
Global Profile Global Config profile and bandwidth profile. management and time

Completes the non-profile management.

configurations for multiple Configures and manages the


SNMP parameter templates
same model NEs in the

SNMP Parameter Template

NE Communication Route Management


Pre-deploying ONUs

Network Access Status Management


Home Gateway MAC Range Config
used for communication between the
Signaling Tracing UNM2000 server and NEs.
Creates management programs so as to
manage NEs based on partitions and manage
the pre-configured NEs.
Configuration Synchronization
Queries, sets and delivers the interconnection
status and network access status of the
system and the line card resource are the same and synchronizes the
management system. configuration data in the UNM2000 with the

Traces the signaling frame of the data on the equipment.

communication between the current IAD and Completes the configuration and deployment
the voice communication card to find the of the ONU service in advance to implement
communication failure timely. the automatic provisioning of the ONU service.

Compares whether the configuration data in Configures and modifies the MAC addresses
the UNM2000 and the data on the equipment of home gateways in a batch manner.

PON Config Transfer Completes the PON configuration migration.

2.4.5 Alarm

The submenus under the Alarm main menu are described in Table 2-8.

16 Version: B
2 Basic Operations of the UNM2000

Table 2-8 Description of the Submenus under the Alarm Menu

Menu Description

Current Alarm Sets the query conditions to view the current alarms of the entire network
or a specified object.

Alarm History Sets the query conditions to view the alarm history of the entire network or a
specified object.

View the Reported Alarms Sets the alarm reporting conditions to view the reported alarms of
the entire network or a specified object.

Alarm Reporting Settings Sets the alarm reporting rules according to the requirements for
network maintenance.
Event to Alarm Settings

Alarm Query Template Quickly completes the settings of alarm browsing and alarm
attributes to simplify the user setting operations.

Query Reported Event Sets the event reporting conditions to view the reported events of the
entire network or a specified object.

Event Query Template Sets the event reporting rules according to the requirements for
network maintenance.
Sets the alarm filter to automatically filter all the alarms and
Shield Project Alarms during the project construction.
alarm clearance information reported

Shield Rule Of North Sets filter rules to filter the unnecessary northbound interface alarms
according to the network maintenance requirements.
Alarm Shield Rule
Management Alarm Notification Settings Alarm Maintenance

Alarm Flashing Shield Rule Management


Sets filter rules to filter the alarms not focused
according to the network maintenance
requirements.
Sets filter time rules for the alarms not focused Sets the information of the alarm receiver to
according to the network maintenance make sure important alarms are notified to the
requirements. device maintainer in a timely manner.

Experience Management Enters the experience information of alarm maintenance.


Customizing Alarm Names Customizes the alarm names.
Custom Alarm Level Customizes the alarm levels.

Version: B 17
UNM2000 Network Convergence Management System Operation Guide

Table 2-8 Description of the Submenus under the Alarm Menu (Continued)

Menu Description
Query Alarm

Log Queries alarms according to the query conditions.


Alarm Log
Current Alarm Gathers statistics of alarms according to the
Log Statistics statistical conditions.

Sets the alarm frequency analysis rule so that the EMS


Alarm Frequency Analysis
will process alarms according to the rule settings once
Rule
the specified object meets the preset conditions.

2.4.6 Performance

The submenus under the Performance main menu are described in Table

2-9. Table 2-9 Description of the Submenus under the Performance Menu

Menu Description

Performance History Sets the query conditions to view the performance history of the
entire network or a specified object.
the performance connection.
Collection Task Management
Sets the statistical template of performance
history to view the performance history charts
View Performance History Trend
so as to understand the performance data
change trend of the specified object and the
Performance Query running status of the network.
Sets the indicator, threshold, task and time for
Template Save the common performance query conditions as a template.
classification switch for NEs in a batch
Performance Switch Config
manner.
Pm FTP Switch
Queries or configures the performance

Management Configures the performance FTP reporting function.


Analysis of PON traffic

statistics Queries the traffic analysis data of the PON interface.


Top rank statistics Queries the ranking data of PON traffic and device health.

2.4.7 Security

The submenus under the Security main menu are described in Table 2-10.

18 Version: B
2 Basic Operations of the UNM2000

Table 2-10 Sub Menus under the Security Main Menu

Menu Description

NMS User Management Manages the users, user groups, operation sets of the UNM2000,
including the security attribute settings and authority allocation.

Monitor User Session Sets the operations of monitoring user sessions and user activity
information.
Search the System Logs Sets the filter conditions to query the system logs.

Query Operation Logs Sets the filter conditions to query the operations logs.

Query Security Logs Sets the filter conditions to query the security logs.

View the TL1 Command

Logs Sets the filter conditions to query the TL1 command logs.
Statistical System Logs Sets the filter conditions to gather statistics of system logs.

Statistical Operation Logs Sets the filter conditions to gather statistics of operation logs.

Statistical Security Logs Sets the filter conditions to gather statistics of security logs.

Statistical TL1 Command

Logs Sets the filter conditions to gather statistics of TL1 command logs. Log Forwarding
Server Forwards the UNM2000 logs onto another server.

2.4.8 Window

The submenus under the Window main menu are described in Table 2-11.

Table 2-11 Description of the Submenus under the Window Menu

Menu Description
Close Window Closes all the opened windows except the main topology. Maximize
Window Maximizes the current window.
Undock Window Cascades all the opened windows.
Close All Windows Closes all the opened windows except the main topology. Close Other
Windows Closes all the opened windows except the main topology. Window Opens the
description for each windows.

2.4.9 Help

The submenus under the Help main menu are described in Table 2-12.

Version: B 19
UNM2000 Network Convergence Management System Operation Guide

Table 2-12 Description of the Submenus under the Help Menu

Menu Description
Legend Opens the Legend pane to view the system legend.

License Management Views the UNM2000 license information list, including server ID,
upgrading license, etc.

About UNM2000 Views the UNM2000 version information, registration information and
installed components.

2.5 Setting System Parameters

The UNM2000 system parameters include the browse tree display style, the time
mode, the topology display, the pinging parameters, the Telnet proxy server, and
the GUI display. The following introduces how to set and use the parameters.

2.5.1 Setting the Display Style of the Browse Tree

The Viewing Tree Setting dialog box is used for setting the display of the
main topology. You can set the icon size, border pixels, height as well as the
space
between the border and the text.

Background Information

These settings take effect immediately. They are applicable to the current user
at any client ends, but they are not applicable to other users.

Procedure

1. Select System→Parameter Settings in the main menu to open the Parameter


Settings dialog box.

2. Select Local Settings→Viewing Tree Setting in the left pane to open the
dialog box.

20 Version: B
2 Basic Operations of the UNM2000

3. Set various parameters as required. During setting, users can preview the
display style via the instance text.

4. Click Apply after the settings are completed, and the settings will be valid.

Other Operations

Click Restore Default Configurations to restore the parameters to the


default values.

2.5.2 Setting the Time Mode

Set the time mode of the client end. The UNM2000 displays the time in the
configured time mode (UTC or local time).
Version: B 21
UNM2000 Network Convergence Management System Operation Guide

Background Information

◆ When you log in next time, the UNM2000 client will adopt the settings you set
last time.

◆ The settings of the time mode are applicable to the current user at any client.
However, they are not applicable to other users.

Note:

It is recommended to keep client time synchronous with the server


end time to avoid data reporting error.

Procedure

1. Select System→Parameter Settings in the main menu to open the Parameter


Settings dialog box.

2. Select Local Settings→Time Mode in the left pane to open the dialog box.

3. Set the time display mode of the client end as required. Then click Apply to
apply the settings.

2.5.3 Setting the Topology Display

The UNM2000 allows you to set the background image display of the main

topology. Background Information

◆ The settings of the topology display mode take effect immediately.

◆ These settings are applicable to the current user at any client ends, but they are
not applicable to other users.
Procedure

1. Select System→Parameter Settings in the main menu to open the Parameter


Settings dialog box.

2. Select Local Settings→Topology Setting in the left pane to open the


Topology Setting dialog box.

22 Version: B
2 Basic Operations of the UNM2000

3. Set the background display mode of the main topology.

4 Select Image Mode and then click Apply→OK to set the background of
the main topology to image mode.

In the image mode, right-click in the blank area of the physical topology
view and select Set Background Image or Use the Default Background
Image from the shortcut menu to set the background image of the physical
topology view.

4 Select Map Mode to set the background of the main topology to map
mode.

a) In the gis map url text box, enter the address of the network map or
the map package in the local EMS.

b) Click Apply→OK.

Caution:

The address entered in the dis map url text box should meet the
following requirements:
◆ For the network map, the address must be the URL of the GIS online
map database.

◆ For the map package in the local EMS, the address should be that of
the map folder downloaded to the local EMS.

Other Operations

◆ Expand / collapse all logical domains.

Right-click in the blank area of the physical topology view and select Expand
All Logic Domains or Collapse All Logic Domains.

◆ Hide nodes.

Right-click the NE in the physical topology view and select Hidden Node
from the shortcut menu. The NE will not appear in the physical topology
view.

◆ Manage the hidden nodes.

Version: B 23
UNM2000 Network Convergence Management System Operation Guide

Right-click in the blank area of the physical topology view and select Manage
the Hidden Nodes to open the Hide Node Management dialog box. Then
select the nodes to be displayed and click OK. The corresponding nodes are
displayed in the physical topology view.

◆ Lock, move, zoom in or zoom out the physical topology view via the shortcut
icons at the top of the main topology.

2.5.4 Setting Ping Parameters

You can set the UNM2000 to continuously ping the NE or transfer the ping via the
server so as to confirm whether the communication between the UNM2000 and
the NE is normal.

Background Information

◆ When Consecutive Ping is not selected, the EMS will execute the Ping
command at most four times.

◆ When the client cannot ping the NEs, you can select Forward Ping Packet via
the Server to determine whether the communication between the EMS and
NEs are normal.

◆ The Ping parameters of the client take effect immediately.

Procedure

1. Select System→Parameter Settings in the main menu to open the Parameter


Settings dialog box.

2. Select Local Settings→Ping Parameter Config in the left pane to open the
Ping Parameter Config dialog box.

3. Set the Ping parameters as required and click Apply to validate the settings.

4 When the Consecutive Ping option is selected, right-click the object


and
select Ping to ping the object continuously.
4 If Forward Ping Packet via the Server is selected, the Ping commands
will be forwarded by the server.

24 Version: B
2 Basic Operations of the UNM2000

2.5.5 Setting the Telnet Proxy Server

After setting the parameters related to the Telnet proxy server, users can use
the proxy server to access the equipment.

Background Information

The settings of the Telnet proxy server take effect immediately.

Prerequisite

You have the authorities of Operator Group or higher authorities.

Procedure

1. Select System→Parameter Settings in the main menu to open the Parameter


Settings dialog box.

2. In the left pane, select Local Settings→Telnet Proxy Server to open the
dialog box.

3. Select the Enable Telnet Proxy Server check box, set the proxy server
information and then click Apply to validate the settings.

2.5.6 Setting the GUI Display Mode

Users can set the GUI display mode, including the maximum row number of a
table, the display mode of name of alarms / performance / events, and whether
the GUI is locked automatically.

Background Information

◆ The display settings take effect immediately.

◆ The alarm color settings are applicable for all users at any client.

Procedure

1. Select System→Parameter Settings in the main menu to open the Parameter


Settings dialog box.

2. Select Local Settings→Display in the left pane to open the dialog box.

Version: B 25
UNM2000 Network Convergence Management System Operation Guide

3. Set the parameters and click Apply to apply the settings.

2.6 Setting the FTP Server

Set the FTP server and related parameters to implement the data
transmission between the UNM2000 client end and the server end.

Background Information

The FTP server settings are the foundation for implementing the functions of
multiple modules, including policy task module, data history save module, log
forwarding module and statistical information export module. The functions of
the modules implemented via setting the FTP server are shown in the following
table.

Module

Name Implementation Related Function


Includes the software backup task,
resource statistics, port resource
Policy task Implements the task customization statistics, ONU resource statistics, ONU
via the FTP server.
configuration export task, system software port resource statistics, MDU port

upgrade task, ONU batch upgrade task resource

and service card batch upgrade.

Includes the NE resource statistics, card


Resource export statistics, ONU user statistics, PON traffic statistics and PON
Exports the resource statistics NE MGC service statistics, port MAC address table.
onto the FTP server. ONU MGC service statistics, Includes the operation log
statistics, local VLAN device type statistics, PON save, TL1 log
device capability statistics,

save, system log save, alarm history save, Save Data Releases the database space and saves the
performance history save and event data onto the FTP server.
overflow save.

Prerequisite

You have the authorities of Operator Group or higher authorities.


26 Version: B
2 Basic Operations of the UNM2000

Procedure

1. Select System→Parameter Settings in the main menu to open the Parameter


Settings dialog box.

2. Select Service Configuration→FTP Server Setting in the left pane to view


the FTP server already set.

3. Click Add to add one blank row in the window. Then click and set the
parameters of the FTP server.

4. After completing the settings, click Apply. The added FTP server appears in
the window.

Other Operations

For the FTP server already set, you can delete it if it is no longer used or
test it before use.

◆ Select the FTP server not needed and click Delete to delete it.

◆ Select the desired FTP server and click Test FTP to test whether the FTP
server can be connected normally.

2.7 Setting the Default Workspace

When using the UNM2000 for the first time, you need to set up a workspace
directory for storing the temporary resource files required by the system.

Note:
This directory must be readable and writable with a hard disk space
greater than 512M.
Version: B 27
UNM2000 Network Convergence Management System Operation Guide

Procedure

1. Select System→Default Work Section Settings in the main menu to open the
Default work space set dialog box.

2. Click Select... to select the folder that the workspace locates and then click
Open.

3. Click OK to complete the settings.

2.8 Basic Operations of the UNM2000 2.8.1

Upgrading the License

The UNM2000 license file is used for controlling the functions and
management capability of the UNM2000. You cannot log into the UNM2000
client without the license file. The following introduces how to renew the
UNM2000 license.

Prerequisite

◆ You have logged into the UNM2000 as the admin user.

◆ The user has obtained the UNM2000 license.

Procedures

1. Back up the original License.

Create a folder named backup under D:\unm2000\platform\etc\license and


copy the original license file unm2000_license.lic to this folder.
28 Version: B
2 Basic Operations of the UNM2000

2. Renew the License.

1) Select Help→License management in the main menu.

2) In the License information dialog box that appears, click Update license.

3) In the Open dialog box, select the corresponding license and click Open.

4) In the License comparison dialog box, check the control items of both the
old and the new licenses and click Confirm License update.

5) Click Yes in the displayed alert box.

6) Click Close in the License Information dialog box.

3. After updating the license file, restart the UNM2000 client. The client will reload
the control items according to the updated license.

2.8.2 Modifying the Password

To ensure the access security of the UNM2000, it is recommended to modify


your password regularly.

Procedure

1. Select System→Modify Password in the main menu.

2. In the displayed Modify Password dialog box, set Old Password:, New
Password: and Confirm Password:.

Note:

The new password must comply with the set password policies.
For setting the password policies, see Setting the Password
Policy.

3. Click OK.

2.8.3 Lock the Terminal

If the UNM2000 client is idle, you can lock the client upon leaving to prevent
unauthorized operations. The operation is only applicable to the user who
performed the operation.

Version: B 29
UNM2000 Network Convergence Management System Operation Guide

Prerequisite

You have logged into the UNM2000.

Procedure

1. Follow the steps below to lock the client.

4 Lock the terminal manually.


Select System→Lock the Terminal in the main menu to open the The
window is locked dialog box.

4 Locking the terminal automatically.


Refer to Setting the GUI Display Mode to lock the terminal automatically. If
no operation is performed after a set time period, the terminal will be
locked automatically.

2.8.4 Logging Out of the Current Account

Different UNM2000 users have different operation authorities. The user can
perform operations of different levels by logging out of the current account and
logging in again with another account.

Procedure

1. Select System→Log off from the main menu.

2. Click Yes in the alert box that appears to lock out of the current account.

3. In the UNM2000 Login dialog box that appears, select the server you want to
log in and enter the username and password. Click Enter.

30 Version: B
2 Basic Operations of the UNM2000
2.8.5 Viewing the Message Platform

You can view the prompts and operation echo information that influence the
running of the UNM2000 on the message platform.

Procedure

1. Select View→Message Platform from the main menu to open the Message
Platform pane.

2.8.6 Managing Toolbars

You can set which toolbars and their corresponding shortcut menus are
displayed for quick operations to improve the operation efficiency.

Version: B 31
UNM2000 Network Convergence Management System Operation Guide

Procedure

1. Select View→Toolbars in the main menu.

2. In the Toolbars menu, click the function modules to be displayed in the main
topology.

3. The selected function module will be added with a tick (√) in front of it and it will
appear in the toolbar of the main view.

Other Operations

1. Select Customize to open the Customize Toolbars dialog box.

2. Click New Toolbar, enter the name for the new toolbar in the displayed New
Toolbar dialog box and then click OK.

3. The user can drag an item in or out of the toolbar to add or delete the
corresponding shortcut icon as needed.

4. After completing the settings, click Close.

32 Version: B
2 Basic Operations of the UNM2000

In the following figure, the Topo functional module is added to the toolbar.
Drag the Create Custom Views shortcut icon to the Topo function module in
the
Customize Toolbars dialog box.
2.8.7 Creating a Custom View

In case of too many devices in the main topology, the focused object is not easy
to locate and view. However, you can create a custom view to only display your
focused objects.

Background Information

◆ One user can create up to five custom views.

◆ A user can only see the custom views created by himself / herself.

Prerequisite

You have the authorities of Operator Group or higher authorities.

Procedure

1. On the toolbar of the Main topology tab, click .

2. In the Create custom views dialog box that appears, fill in the view name and
the remarks.

3. Select Node Member→Select to open the Select Object dialog box. Then
select the NEs to be displayed in the custom view and click OK.

4. Select Link Member→Select to open the Select Object dialog box. Then
select the NE fiber connections to be displayed in the custom view and
click
OK.

5. In the Create Custom View dialog box, click OK.

6. In the UNM2000 alert box that appears, click Yes to switch to the custom view.

Version: B 33

3 Security Management

The security management is used to prevent unauthorized login to the public


network to guarantee the network data security. The security management
includes the security policy management, user management and authority and
domain division management of the UNM2000.

User Security Concepts


User Security Policy Management

Managing Network Management Users

Managing User Sessions

Authorization and Domain Division

34 Version: B
3 Security Management

3.1 User Security Concepts

The security management of UNM2000 users mainly includes authority


management, password policy, account policy, user management and user
monitoring. The concepts involved in the security management of UNM2000
users are described as follows:

Managed Entities

◆ Object set: Indicates a set of managed objects. Dividing the managed objects
into object sets facilitates the allocation of authorities for managing NEs.
The
object set only includes the physical objects (exclusive of logical objects) with
the smallest granularity being cards.

◆ Operation set: Indicates a set of operations. Dividing the operations into


operation sets facilitates the management of user authorities. Different
operations have different influence on the system. You can divide the
operations that may cause the same influence on the system into an
operation set. When being assigned with the authorities of an operation set,
the user can perform all the operations included in the operation set.

Note:

Default operation sets are provided in the UNM2000. When the


default operation sets do not meet the requirements for authority
assignment. You can create operation sets as needed.

◆ User group: Indicates a set of UNM2000 users of the same management


authorities. The UNM2000 supports creating user groups to manage the
users of the same authorities in a same group. The users in a same group
have the
same authorities and can perform the operations included in the operation
set associated with the user group.

The default user groups of the UNM2000 include the Administrators group,
the security admin group, inspector group, the operator group and the
maintainer
group.

Version: B 35
UNM2000 Network Convergence Management System Operation Guide

4 Administrators: The Administrators group is unique. It cannot be created


nor deleted. The Administrators group has the administrative domains of
all objects in the entire network and all the operation authorities except the
security management authority. Its administrative domains and operation
authorities cannot be modified.

4 Security Admin Group: This group is unique. It cannot be created nor


deleted. The Security Admin Group has the administrative domains of all
objects in the entire network and the authorities related to security
management authority.

4 Inspector group: This group has the default authorities of Inspector


Operation Sets. The users in this group can only query and gather
statistics, having no authorities to perform the creation and configuration
operations.

4 Operator group: This group has the default authorities of Operator


Operation Set. Apart from the basic authorities of the inspector group, the
users in this group can perform the creation, modification and deletion
operations in the UNM2000, but having no authorities related to security
management.

4 Maintainer group: This group has the default authorities of Maintainer


Operation Set. Apart from the authorities of the inspector group and the
operator group, the users in this group can perform the configuration
operations that may influence the running of the UNM2000 and the NEs,
such as searching for service path, deleting service configuration, etc.

◆ User: Indicates the UNM2000 client end users. The username and password of
the user uniquely determines the corresponding UNM2000 operation and
management authorities. When a user is added into a user group, the user is
assigned with the operation authorities associated with the user group.

4 A user can be added into multiple user groups. In this case, the
authorities of a user are the union of its basic authorities and the authorities
of the
user groups that the user belongs to. There are two ways to assign
authorities to users:

¡ Divide the user to the user group and the user can thus have the
authorities of the user group.

¡ Give the user directly with the object set and the operation set.

36 Version: B
3 Security Management

4 The UNM2000 provides a default user named admin, which is the system
administrator. The admin user belongs to the Administrators and
Security Admin Group groups by default. The authorities of admin cannot
be modified and the admin user cannot be added to other user group.

Authority and Domain Division

When the managed objects and users are of a large scale, the uniform
management of authorization and domain division by a certain type of users will
be both time and effort consuming. Therefore, it is necessary to divide the
managed objects into several sub-domains. Each sub-domain can perform
authorization and domain division management without interfering each other.

The authority and domain division of the UNM2000 is implemented through the
administrative domain and operation authorities. The operation authorities are
divided into different functional domains through the authority division function
and the NEs are divided into different network domains through the domain
division function. Assigning the UNM2000 users with the authority combination
of different functional domains and network domains effectively controls user
management authorities.

Application of the authorization and domain division management: Divide the user
groups into ordinary user group and administrative user group. Creating a user
group is like creating a sub-domain. In this sub-domain, the users are authorized
with the operation authorities within this sub-domain and can create the object
set, operation set, user group, users based on such domain authorities. They are
visible to other users within the sub-domain, but invisible to users outside the
sub-domain.

Note:

The network management system provides an embedded user


named admin, who is authorized with all authorities and can manage
all object sets, operation sets, user groups and users.

Account Policy and Password Policy

The UNM2000 user security can be implemented by setting the account policy
and password policy.

Version: B 37
UNM2000 Network Convergence Management System Operation Guide

◆ Account policy: Defines the minimum length, account login and unlocking
settings of the user account. Using the account policy can enhance the
security of the user account.

◆ Password policy: Defines the complexity, updating period and length limit of the
password.

3.2 User Security Policy Management

The security policies, such as access control, password and lockout management
and online user monitoring effectively enhance the access security of the
UNM2000 and prevent unauthorized operations.

The user security policies are the access control rules defined for managing
users. The security policy planning and configuration should be completed upon
initial installation. You can adjust the security policies according to your
management requirement.
The user security policy management includes the following contents:

◆ Setting the user login mode

◆ Setting the ACL

◆ Setting the Account Policy

◆ Setting the Password Policy

3.2.1 Setting the User Login Mode

The UNM2000 supports the single-user login mode and multi-user login
mode. Typically, the UNM2000 runs in the multi-user mode. When
maintaining the
UNM2000 server (for example, adjusting the user group, administrative domain
or operation authority of a user), you can set the UNM2000 to the single-user
login mode to avoid operation interference caused by other users.

Background Information

◆ Single-user mode: In this mode, only one admin user can log into the UNM2000
via the client end, and all other online users will be forced to exit.

38 Version: B
3 Security Management

◆ Multiple-user mode: In this mode, multiple users are allowed to log in


simultaneously. This mode is used for monitoring the network routinely.

Caution:

When the UNM2000 is switched to the single-user mode, only one


admin user can log into the UNM2000 via the client end, and all other
online users will be forced to exit. To ensure that other users use the
UNM2000 normally, switch the UNM2000 to the multi-user login mode
after
completing the maintenance in single-user mode.

Prerequisite

Log in as an admin user.

Procedure
1. Select System→Parameter Settings in the main menu to open the Parameter
Settings dialog box.

2. Select User Security Strategy→User Login Mode in the left pane to open the
User Login Mode dialog box.

3. Set the login mode as required. Then click Apply and the settings will be valid.

3.2.2 Setting the ACL

By setting the ACL, the operator can set the UNM2000 users to log in only via
the client end with the set IP address or network segment, so as to ensure the
network security.

Background Information

The access control list set by a user is only applicable to the user.

Prerequisite

You have logged into the OTNM2000 as a user belonging to Security Admin
Group.

Version: B 39
UNM2000 Network Convergence Management System Operation Guide

Procedure

1. Select System→Parameter Settings in the main menu to open the Parameter


Settings dialog box.

2. Select User Security Strategy→Access Control List in the left pane to open
the Access Control List dialog box.

3. Click Add and open the Set IP Range dialog box.

4. Set the Start address and End address. After completing the settings, click
OK. Then the added IP address range appears in the ACL.

Note:
Click to switch between the IPv4 and IPv6.

5. Click Apply to apply the settings.

3.2.3 Setting the Account Policy

The account policy includes locking / unlocking users, non-logged-in user policy,
and the minimum length of the username. Setting the account policy can ensure
the security of the account and the network.

Prerequisite

You have logged in as a member of the Security Administrator group.

Background Information

◆ The account policy must be configured upon initial installation of the UNM2000
and can be adjusted accordingly during maintenance.

◆ The new account policy has no effect on the accounts already set.

40 Version: B
3 Security Management

Procedure

1. Select System→Parameter Settings in the main menu to open the Parameter


Settings dialog box.

2. Select User Security Strategy→Account Policy in the left pane to open the
dialog box.

3. Set the parameters and then click Apply to apply the settings.

Other Operations

Click Restore Default Configurations to restore the parameters to the


default values.

3.2.4 Setting the Password Policy

Setting the complexity of the password and modifying the password regularly
can improve the access security of the UNM2000. The password policy, set by
the security administrator, is applicable to all users.

Prerequisite

You have logged in as a member of the Security Administrator Group.


Background Information

◆ The password policy must be configured upon initial phase of the site building
and can be adjusted accordingly during maintenance.

◆ The new password policy has no effect on the passwords already set.

◆ The password policy includes the complexity, updating period and length limit.

◆ The new password policy will be applicable to all users of the UNM2000.

Procedure

1. Select System→Parameter Settings in the main menu to open the Parameter


Settings dialog box.

2. Select User Security Strategy→Password Policy in the left pane to open the
dialog box.

Version: B 41
UNM2000 Network Convergence Management System Operation Guide

3. Set the parameters in Common Policy and Advanced Policy tabs, and then
click Apply to apply the settings.

Other Operations

Click Restore Default Configurations to restore the parameters to the


default values.

3.3 Managing Network Management Users

The following introduces the operations of creating, modifying, and deleting


network management users and assigning the authorities for them.

3.3.1 Operation Set Management

The operation set is the set of operations of a certain type. Via the operation
set management, users can assign and manage the operations on the
equipment.

◆ In the default operation sets provided by the UNM2000, the application


operation complete set and the object operation complete set cannot be
deleted.

◆ The operation sets include two types: NM application and Network device.

◆ When a certain user or user group is bound with an operation set, this user or
user group will have the authorities of the operations in this set.

◆ Only the users in the security administrator group and the sub-domain security
administrator group can manage the operation sets.

3.3.1.1 Viewing Operation Sets

The security administrator can view specific operations included in an operation


set to check whether the authorities in the operation set meet the requirements.

Prerequisite

You have logged into the UNM2000 as a user belonging to the Security
Admin Group.

42 Version: B
3 Security Management

Procedure

1. In the main menu, select Security→NMS User Management to access the


NMS User Management tab.

2. Select Operation Set or click before Operation Set in the left pane.
Then view the existing operation sets in the right pane or the expanded list of
Operation Set in the left pane.

3. Double-click the operation set entry in the right pane to view details in the
Basic Information, Member and Service For tabs of the operation
set.

Other Operations

◆ In the right pane, click the button at the lower part of the corresponding entry, or
right-click the entry, and select operations such as Refresh, Delete, copy
cell (K), Print, or Export.

◆ Select the corresponding operation set in the left pane, and modify the
information items in the right pane. After completing the modification, click
Apply.

Note:

Users can only modify the descriptions in the application operation


complete set and the object operation complete set.

Version: B 43
UNM2000 Network Convergence Management System Operation Guide

3.3.1.2 Adding an Operation Set

The operation set is the set of operations of a certain type. Via the operation set
management, users can assign and manage the operations on the equipment.
When the current operation set cannot meet the requirements, users can create
a new operation set.

Prerequisite

You have logged into the OTNM2000 as a user belonging to Security Admin
Group.

Procedure

1. In the main menu, select Security→NMS User Management to access the


NMS User Management tab.

2. Select one of the following access methods to open the Create Operation Set
dialog box.

No. Access Method

1Click NMS User Management in the left pane and click New Operation Set in the right
pane.

2Click NMS User Management in the left pane, right-click in the right pane, and select New
Operation Set in the shortcut menu.
3 Select Operation Set in the left pane, and click New Operation Set in the right pane.

4Select Operation Set in the left pane, right-click in the right pane, and select New
Operation Set from the shortcut menu.

5 Right-click Operation Set in the left pane and select New Operation Set from the
shortcut menu.

3. In the New Operation Set dialog box, set the parameters in the Basic
information and Member tabs.

44 Version: B
3 Security Management

Note:

Click Copy Members from Operational Set, and select the


operation set in the Select the operation set dialog box, so as to
copy the
members of the corresponding operation set. This can improve the
setting efficiency.

4. After completing the settings, click OK.

Subsequent Operation

Double-click the added object set to view its relevant information in the right

pane. 3.3.2 Object Set Management

The object set is the set of managed objects of a certain type. Via the object
set management, users can manage the equipment objects uniformly.

◆ The default object set provided by the UNM2000 is the complete set of the
objects, including all manageable objects. Users cannot delete the
default
object set, but can only modify its descriptions.

◆ When a certain user or user group is bound with an object set, this user or user
group will have the authorities of the objects in this set.

◆ Only the users in the security administrator group and the sub-domain security
administrator group can manage the object sets.

3.3.2.1 Viewing Object Sets


The security administrator can view the objects included in the object set to
check whether the objects in the object set meet the requirements.

Prerequisite

You have logged into the OTNM2000 as a user belonging to Security Admin
Group.

Version: B 45
UNM2000 Network Convergence Management System Operation Guide

Procedure

1. In the main menu, select Security→NMS User Management to access the


NMS User Management tab.

2. Click Object Set or click before Object Set in the left pane. Then view the
existing object sets in the right pane or the expanded list of Object Set in
the
left pane.

3. Double-click the object set entry in the right pane to view details in the Basic
Information, Member and Service For tabs of the object set.

Other Operations

◆ In the right pane, click the button at the lower part of the corresponding entry, or
right-click the entry, and select operations such as Refresh, Delete, copy
cell (K), Print, or Export.

◆ Select the corresponding object set in the left pane, and modify the information
items in the right pane. After completing the modification, click Apply.
Note:

Users can only modify the descriptions in the application operation


complete set and the object operation complete set.

46 Version: B
3 Security Management

3.3.2.2 Creating an Object Set

When the current object set cannot meet the requirements, users can create a
new object set.

Prerequisite

You have logged into the OTNM2000 as a user belonging to Security Admin
Group.

Procedure

1. In the main menu, select Security→NMS User Management to access the


NMS User Management tab.

2. Select one of the following access methods to open the Create Object Set
dialog box.

No. Access Method

1Select NMS User Management in the left pane and click Create Object Set in the right
pane.

2Select NMS User Management in the left pane, right-click in the right pane and
select Create Object Set from the shortcut menu.

3 Select Object Set in the left pane and click Create Object Set in the right pane.

4Select Object Set in the left pane, right-click the right pane and select Create Object Set
from the shortcut menu.

5 Right-click Object Set in the left pane and select Create Object Set from the shortcut
menu.

3. In the Create object set dialog box, set the parameters in the Basic
information and Member tabs.

Note:

Click Copy member form object set..., and select the operation set
in the Select object set dialog box, so as to copy the members of
the
corresponding object set. This can improve the setting efficiency.

4. After completing the settings, click OK.

Version: B 47
UNM2000 Network Convergence Management System Operation Guide

Subsequent Operation

Double-click an added object set to view the information related to the object set
in the right pane.

3.3.3 User Group Management

The user group is the set of the network management users with the same
management authorities. For the users to be granted with the same authorities,
you can add them into the same user group and authorize the user group to make
every user in the user group have the same authorities, quickly allocating the
authorities to users.

◆ The default user groups of the UNM2000 include the Administrators group, the
security administrator group, the operator group, the maintainer group, and
the monitor group.

◆ When a user is bound with a user group, this user owns the authorities
assigned to the user group.

◆ Only the users in Security Admin Group and Domain Security Admin Group
can manage user groups.

Caution:

Users cannot delete the Administrators group and the security


administrator group, but can only modify their descriptions.

3.3.3.1 Viewing User Groups

The security administrator can view the administrative domains of the user
groups to check which objects are managed by the user group.

Prerequisite

You have the authorities of Security Admin Group.


48 Version: B
3 Security Management

Procedure

1. In the main menu, select Security→NMS User Management to access the


NMS User Management tab.

2. Click User Group or before User Group in the left pane and then view the
existing user groups in the right pane or the expanded list of User Group in
the left pane.

3. Double-click the user group entry to view the details of the user group.

Version: B 49
UNM2000 Network Convergence Management System Operation Guide

Note:
The Current Session tab displays the sessions of the online users in
the user group.

Other Operations

◆ In the right pane, click the button at the lower part of the corresponding entry, or
right-click the entry, and select operations such as Refresh, Delete, copy
cell (K), Print, or Export.

◆ Select the corresponding user group in the left pane, and modify the user group
information in the right pane through Find or Select.

3.3.3.2 Creating User Groups

When default user groups in the UNM2000 do not meet the requirements for user
authorization, you can create user groups according to the management features
of the users, which is convenient for assigning authorities for users.

Prerequisite

You have logged into the OTNM2000 as a user belonging to Security Admin
Group.

Procedure

1. In the main menu, select Security→NMS User Management to access the


NMS User Management tab.

2. Select one of the following access methods to open the New User dialog box.

No. Access Method

1Select NMS User Management in the left pane and click Create User Group in the right
pane.

2Select NMS User Management in the left pane, right-click in the right pane and
select Create User Group from the shortcut menu.

3 Select User Group in the left pane, and click Create User Group.

50 Version: B
3 Security Management

No. Access Method

4Click User Group in the left pane, right-click in the right pane and select Create User Group
from the shortcut menu.

5 Right-click User Group in the left pane, and select Create User Group from the
shortcut menu.
3. According to Table 3-1, set the user group parameters in the Create User
Group dialog box.

Table 3-1 The User Group Settings

Parameter Description
User Group

Name Compulsory. Sets the user group name.


Sets the user group type to Sub Domain Security Administrator
Group or Ordinary User Group.
◆ Sub Domain Security Administrator Group: The
administrative domain of this group is assigned by the
management and its authorities cannot be
User Group modified.
Type
◆ Ordinary User Group: The administrative
domain and operation authorities of the users
Basic
in this group are assigned by the security
Information
security administrator. This group only has the administrator or sub domain security
application authorities of security administrator.

Description The brief description of the user group, used to identify different
user groups.
used to limit the number of sessions
Maximum Session Number logged in by users in one user group in
Sets the maximum number of sessions one time interval. Value range: 0 to
for users in the user group. It can be 100, No limit.

Member Sets the members of the user group via the Select... and Delete
buttons.

Version: B 51
UNM2000 Network Convergence Management System Operation Guide

Table 3-1 The User Group Settings (Continued)

Parameter Description
Sets the management domain of the user group. The objects of
the management domain are arranged in parallel in the tree
Domain
management domain is the sum of the
selected devices, global logical domains, and
object groups.

Sets the operation authority of the user group.


The objects of the operation authority are
classified into the network management
Operational Authority Note: application objects, all objects in the
management system, and network devices.
The network management application authority
includes the operation groups of the network
management application types and the
network management operation list.
topology of the devices, the global logical
domains, and the object groups. The valid

Click Copy Authority Settings from the User Group, set the user
group in the Select User Group dialog box, and directly copy the
management domain authority and operation authority of the
corresponding user group. This can improve the setting efficiency.

4. After completing the settings, click OK.

Subsequent Operation

Double-click an added user group to view the information related to the user
group in the right pane.

3.3.4 User Management

The user refers to the person who uses the UNM2000. Users need to log into
the UNM2000 via the corresponding user account. The UNM2000 provides a
default superuser named admin.

52 Version: B

You might also like