Huawei Imanager U2000 Operation Guide For Common Features (V100R009)
Huawei Imanager U2000 Operation Guide For Common Features (V100R009)
Huawei Imanager U2000 Operation Guide For Common Features (V100R009)
System
V100R009C00
Operation Guide for Common
Features
Issue 03
Date 2014-05-15
HUAWEI TECHNOLOGIES CO., LTD.
Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website: http://www.huawei.com
Email: [email protected]
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
i
About This Document
Related Version
The following table lists the product version related to this document.
Product Name Version
iManager U2000 V100R009C00
Intended Audience
This document describes the operations for common features on the U2000.
This document guides the user to understand basic operations of the U2000.
The document is intended for:
l Data configuration engineers
l NM administrators
l System maintenance engineers
Symbol Conventions
The following symbols may be found in this document. They are defined as follows.
Symbol Description
Indicates an imminently hazardous situation
which, if not avoided, will result in death or
serious injury.
Indicates a potentially hazardous situation
which, if not avoided, could result in death or
serious injury.
iManager U2000 Unified Network Management System
Operation Guide for Common Features About This Document
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ii
Symbol Description
Indicates a potentially hazardous situation
which, if not avoided, may result in minor or
moderate injury.
Indicates a potentially hazardous situation
which, if not avoided, could result in
equipment damage, data loss, performance
deterioration, or unanticipated results.
NOTICE is used to address practices not
related to personal injury.
Calls attention to important information, best
practices and tips.
NOTE is used to address information not
related to personal injury, equipment damage,
and environment deterioration.
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
Boldface The keywords of a command line are in
boldface.
Italic Command arguments are in italic.
[ ] Items (keywords or arguments) in square
brackets [ ] are optional.
{ x | y | ... } Alternative items are grouped in braces and
separated by vertical bars. One is selected.
[ x | y | ... ] Optional alternative items are grouped in
square brackets and separated by vertical
bars. One or none is selected.
{ x | y | ... } * Alternative items are grouped in braces and
separated by vertical bars. A minimum of one
or a maximum of all can be selected.
[ x | y | ... ] * Optional alternative items are grouped in
square brackets and separated by vertical
bars. A maximum of all or none can be
selected.
iManager U2000 Unified Network Management System
Operation Guide for Common Features About This Document
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iii
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Boldface Buttons, menus, parameters, tabs, window,
and dialog titles are in boldface. For example,
click OK.
> Multi-level menus are in boldface and
separated by the ">" signs. For example,
choose File > Create > Folder.
Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes in earlier issues.
Changes in Issue 03 (2014-05-15) Based on Product Version V100R009C00
The third release. It has the following updates:
In the section "Alarm Management", optimized the description of some topics.
Changes in Issue 02 (2014-01-05) Based on Product Version V100R009C00
The second release. It has the following updates:
l In the section "Security Management", added "Users and User Groups".
l In the section "Topology Management", added "Configuring the NAT Address
Translation".
Changes in Issue 01 (2013-08-20) Based on Product Version V100R009C00
Initial field trail release.
iManager U2000 Unified Network Management System
Operation Guide for Common Features About This Document
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iv
Contents
About This Document.....................................................................................................................ii
1 Getting Started...............................................................................................................................1
1.1 Precautions for Using the U2000 Safely........................................................................................................................4
1.2 Starting the U2000 System.............................................................................................................................................4
1.2.1 Starting the U2000 Server in a Windows Single-Server System................................................................................5
1.2.1.1 Powering On the Server Safely................................................................................................................................5
1.2.1.2 Starting the Database................................................................................................................................................6
1.2.1.3 Starting the U2000 Server Processes........................................................................................................................7
1.2.2 Starting the U2000 Server in a Solaris Single-Server System.....................................................................................9
1.2.2.1 Powering On the Server Safely................................................................................................................................9
1.2.2.2 Starting the Database..............................................................................................................................................12
1.2.2.3 Starting the U2000 Server Processes......................................................................................................................14
1.2.3 Starting the U2000 Server in a SUSE Linux Single-Server System.........................................................................16
1.2.3.1 Powering On the Server Safely..............................................................................................................................16
1.2.3.2 Starting the Database..............................................................................................................................................17
1.2.3.3 Starting the U2000 Server Processes......................................................................................................................19
1.2.4 Starting the U2000 Server in a Solaris High Availability System............................................................................20
1.2.4.1 Powering On the Server Safely..............................................................................................................................20
1.2.4.2 Starting the Database..............................................................................................................................................24
1.2.4.3 Starting the U2000 Server Processes......................................................................................................................26
1.2.5 Starting the U2000 Server in a SUSE Linux High Availability System...................................................................28
1.2.5.1 Powering On the Server Safely..............................................................................................................................28
1.2.5.2 Starting the Database..............................................................................................................................................29
1.2.5.3 Starting the U2000 Server Processes......................................................................................................................32
1.2.6 Logging In to a U2000 Client....................................................................................................................................33
1.3 Shutting Down a U2000...............................................................................................................................................36
1.3.1 Shutting Down U2000 Clients...................................................................................................................................37
1.3.2 Shutting Down the U2000 Server (Single Server System, Windows)......................................................................37
1.3.2.1 Stopping the U2000 Server Processes....................................................................................................................37
1.3.2.2 Shutting Down the Database..................................................................................................................................38
1.3.2.3 Powering Off the Server Safely..............................................................................................................................39
1.3.3 Shutting Down the U2000 Server (Single Server System, Solaris)..........................................................................40
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
v
1.3.3.1 Stopping the U2000 Server Processes....................................................................................................................40
1.3.3.2 Shutting Down the Database..................................................................................................................................41
1.3.3.3 Power Off the Server Safely...................................................................................................................................42
1.3.4 Shutting Down the U2000 Server (Single Server System, SUSE Linux).................................................................42
1.3.4.1 Stopping the U2000 Server Processes....................................................................................................................42
1.3.4.2 Shutting Down the Database..................................................................................................................................43
1.3.4.3 Powering Off the Server Safely..............................................................................................................................45
1.3.5 Shutting Down the U2000 Server in a High Availability System (Solaris)..............................................................45
1.3.5.1 Stopping the U2000 Server Processes....................................................................................................................45
1.3.5.2 Shutting Down the Database..................................................................................................................................47
1.3.5.3 Stopping the VCS Service......................................................................................................................................48
1.3.5.4 Power Off the Server Safely...................................................................................................................................48
1.3.6 Shutting Down the U2000 Server in a High Availability System (PC Linux)..........................................................49
1.3.6.1 Stopping the U2000 Server Processes....................................................................................................................49
1.3.6.2 Shutting Down the Database..................................................................................................................................51
1.3.6.3 Stopping the VCS Service......................................................................................................................................52
1.3.6.4 Power Off the Server Safely...................................................................................................................................52
1.4 Using the Workbench and Favorites Folder.................................................................................................................53
1.4.1 Placing a Shortcut Icon on the Workbench...............................................................................................................53
1.4.2 Adding a Common Function to the Favorites Folder................................................................................................53
1.4.3 Viewing Common Functions.....................................................................................................................................54
1.5 Setting the Character Set of an NE...............................................................................................................................55
1.5.1 Character Set..............................................................................................................................................................55
1.5.2 Setting or Modifying Character Sets.........................................................................................................................58
1.6 Main Windows and Common Operations of the U2000..............................................................................................59
1.6.1 Client GUI in the Application Style..........................................................................................................................59
1.6.2 Quick Start for Clients in the Application Style........................................................................................................66
1.6.3 Client GUI in the Traditional Style...........................................................................................................................69
1.6.4 Key GUI Components...............................................................................................................................................71
1.6.5 Frequently Used Buttons...........................................................................................................................................72
1.6.6 Frequently Used Shortcut Icon..................................................................................................................................74
1.6.7 Keyboard Shortcuts...................................................................................................................................................80
1.6.8 Main Windows..........................................................................................................................................................82
1.6.8.1 Workbench..............................................................................................................................................................82
1.6.8.2 Main Topology.......................................................................................................................................................83
1.6.8.3 NE Explorer............................................................................................................................................................87
1.6.8.4 Clock View.............................................................................................................................................................88
1.6.8.5 NE Panel.................................................................................................................................................................96
1.6.8.6 WDM NE Signal Flow Diagram............................................................................................................................97
1.6.8.7 Browse Alarm.........................................................................................................................................................98
1.6.8.8 Browse Event..........................................................................................................................................................99
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
vi
1.6.9 Operations Frequently-Performed on the User Interface.........................................................................................100
1.6.9.1 Filtering Operation Objects in a View..................................................................................................................100
1.6.9.2 Searching for NEs in a View................................................................................................................................102
1.6.9.3 Collecting Statistics on the Number of NEs.........................................................................................................103
1.6.9.4 Customizing Parameter Display...........................................................................................................................104
1.6.9.5 Copying Table Texts Quickly...............................................................................................................................105
1.6.9.6 Monitoring Alarms...............................................................................................................................................105
1.7 How to Obtain Version Information About the U2000..............................................................................................106
1.8 Customizing the Client GUI Effect............................................................................................................................107
1.8.1 Setting the Client Skin.............................................................................................................................................108
1.8.2 Setting the Client Display Style...............................................................................................................................108
1.8.3 Setting the Main Window Title...............................................................................................................................109
1.8.4 Setting the Topology View Display........................................................................................................................110
1.8.5 Setting the Font Size................................................................................................................................................113
1.8.6 Setting the Output Information................................................................................................................................113
1.8.7 Setting the Workbench............................................................................................................................................115
1.8.8 Setting the Menu Collapse.......................................................................................................................................118
1.8.9 Setting the Colors of Alarms...................................................................................................................................119
1.8.10 Setting the Alarm Highlighting.............................................................................................................................120
1.8.11 Setting the Alarm Font..........................................................................................................................................121
1.8.12 Setting the Alarm Display Mode...........................................................................................................................122
1.8.13 Setting the Display Properties of New Alarm/Event.............................................................................................124
1.8.14 Setting the Alarm Display in the Topology View.................................................................................................125
1.8.15 Setting the Number Format of the Client..............................................................................................................128
1.8.16 Setting Board Color...............................................................................................................................................129
1.8.17 Setting the Time and Date Formats of the Client..................................................................................................130
1.8.17.1 Setting the Time Format of the Client................................................................................................................130
1.8.17.2 Setting the Date Format of the Client.................................................................................................................131
1.8.17.3 Setting the Time Mode of the Client..................................................................................................................132
1.8.18 Setting the Toolbar................................................................................................................................................133
1.9 Setting the Alert at Network Disconnection...............................................................................................................134
1.10 Checking Whether the Client Needs Upgrade..........................................................................................................135
1.11 Setting the Interval of Client Upgrade Check..........................................................................................................135
1.12 Locking the Client....................................................................................................................................................136
1.13 Unlocking the Client.................................................................................................................................................137
1.14 Setting the Level of Operation Logs Recorded by the Client...................................................................................137
1.15 Setting a Scheduled Task..........................................................................................................................................138
1.16 Broadcast Messages..................................................................................................................................................139
1.16.1 Setting Broadcast Parameters................................................................................................................................139
1.16.2 Sending Broadcast Messages.................................................................................................................................140
1.17 Applying for and Updating the U2000 License........................................................................................................141
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
vii
1.17.1 U2000 License Precautions...................................................................................................................................142
1.17.2 Applying for a U2000 License..............................................................................................................................142
1.17.3 Updating the U2000 License.................................................................................................................................144
1.17.4 Checking the Status of the U2000 License............................................................................................................153
1.17.5 Revoking a License on the U2000.........................................................................................................................153
1.17.6 Querying the License Revocation Code on the U2000.........................................................................................155
1.17.7 Setting Periodic Export of the U2000 License......................................................................................................155
1.17.8 Setting the NE Capacity Threshold for the U2000 License..................................................................................157
1.17.9 Collecting Port Statistics of Service Licenses.......................................................................................................157
1.18 Starting the Web Client............................................................................................................................................158
1.19 Starting the NE Data Collection...............................................................................................................................159
1.20 Customizing Naming Rule.......................................................................................................................................160
1.21 U2000 Process List...................................................................................................................................................162
1.22 GUI Input and Display Conventions........................................................................................................................260
1.23 Mutual Exclusion List for Multiclient Operations...................................................................................................262
2 Network Management Process...............................................................................................266
2.1 MSTP Network Management Process........................................................................................................................267
2.2 WDM Network Management Process........................................................................................................................268
2.3 RTN Network Management Process..........................................................................................................................272
2.4 PTN Network Management Process...........................................................................................................................273
2.5 Router and Switch Network Management Process....................................................................................................274
2.6 Access Network Management Process.......................................................................................................................280
2.7 Core Network Management Process..........................................................................................................................283
2.8 Security NE Network Management Process..............................................................................................................283
3 Security Management...............................................................................................................285
3.1 User Security..............................................................................................................................................................287
3.2 Managing User Rights................................................................................................................................................293
3.2.1 Getting to Know Operation Rights Management....................................................................................................293
3.2.1.1 Right Components................................................................................................................................................293
3.2.1.2 U2000 Authorization Principles...........................................................................................................................294
3.2.1.3 Users and User Groups.........................................................................................................................................301
3.2.1.4 Objects and Object Sets........................................................................................................................................303
3.2.1.5 Operation and Operation Set................................................................................................................................304
3.2.2 Scenarios for Operation Right Management...........................................................................................................308
3.2.3 Authorization Plan...................................................................................................................................................310
3.2.4 Assigning Rights to Users.......................................................................................................................................322
3.2.4.1 Authorization Process...........................................................................................................................................322
3.2.4.2 Creating User-Defined Object Sets......................................................................................................................323
3.2.4.3 Creating User-defined Operation Sets..................................................................................................................325
3.2.4.4 Creating and Authorizing U2000 User Groups....................................................................................................328
3.2.4.5 Creating Users and Adding the Users to User Groups.........................................................................................331
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
viii
3.2.5 Transferring Operation Sets.....................................................................................................................................333
3.2.5.1 Exporting Operation Sets......................................................................................................................................334
3.2.5.2 Adding Operation Sets or Changing Operation Set Members in Batches............................................................335
3.2.5.3 Importing Files Containing Operation Set Information.......................................................................................337
3.2.6 Operation Right Adjustment After Device Addition or Deletion............................................................................339
3.2.6.1 Adjusting Operation Rights After an NE Is Added..............................................................................................339
3.2.6.2 Adjusting Operation Rights After a Subnet Is Added..........................................................................................342
3.2.6.3 Adjusting Operation Rights After the Networking Structure Is Changed............................................................344
3.2.7 Operation Right Adjustment After Personnel's Responsibilities Change...............................................................345
3.2.7.1 Adjusting Operation Rights After the Scope of Managed Objects Is Changed...................................................345
3.2.7.2 Adjusting Operation Rights After the Scope of Operation Rights Is Changed....................................................347
3.2.7.3 Adjusting Operation Rights After Management Personnel's Posts Change.........................................................348
3.2.8 Querying Authorization...........................................................................................................................................349
3.2.8.1 Viewing a User or User Group's Domain.............................................................................................................349
3.2.8.2 Viewing Operation Rights of a User or User Group............................................................................................351
3.2.8.3 Viewing User Groups To Which a User Belongs.................................................................................................352
3.2.8.4 Querying User and User Group Authorization Details.........................................................................................353
3.2.8.5 Viewing Operations Contained in an Operation Set............................................................................................354
3.2.8.6 Viewing Objects Contained in an Object Set.......................................................................................................355
3.2.8.7 Comparing U2000 User Rights............................................................................................................................356
3.2.9 FAQs About Authorization.....................................................................................................................................358
3.2.9.1 How Do I Determine an Operation Right Type?..................................................................................................358
3.2.9.2 How Do I Adjust Operation Rights After an NE Is Added?................................................................................359
3.2.9.3 How Do I Adjust Operation Rights After a Subnet Is Added?............................................................................362
3.2.9.4 How to Adjust Operation Rights After the Scope of Managed NEs Is Changed?...............................................364
3.2.9.5 How Do I Assign User Operation Rights That Do Not Belong to the User's User Group?.................................370
3.2.10 Configuration Examples of Security Management...............................................................................................371
3.2.10.1 Assigning Specific Operation Rights to an NMS User......................................................................................371
3.2.10.2 Adjusting User Rights........................................................................................................................................375
3.2.10.3 Example for Creating U2000 User Accounts and Allocating Rights in the Rights- and Domain-based Management
Scenario............................................................................................................................................................................380
3.3 User Security Policy Management.............................................................................................................................384
3.3.1 Security Policy Management...................................................................................................................................384
3.3.1.1 Setting the System ACL.......................................................................................................................................384
3.3.1.2 Setting the User ACL...........................................................................................................................................385
3.3.1.3 Setting the Proxy Service ACL............................................................................................................................386
3.3.1.4 Setting Account Policies.......................................................................................................................................388
3.3.1.5 Setting Password Policies.....................................................................................................................................389
3.3.1.6 Setting the Maximum Number of Sessions..........................................................................................................390
3.3.1.7 Setting the U2000 Login Mode............................................................................................................................391
3.3.1.8 Setting Auto-Locking for a Client........................................................................................................................393
3.3.2 Setting U2000 Data Transmission Security.............................................................................................................394
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ix
3.3.2.1 Setting a Secure Connection Between the U2000 Client and Server...................................................................394
3.3.2.2 Setting the FTP Transfer Policies Between the Client and Server.......................................................................395
3.3.3 Managing Passwords and Locking Clients..............................................................................................................396
3.3.3.1 Changing the Password of the Current User........................................................................................................396
3.3.3.2 Resetting the Password of an NMS user..............................................................................................................396
3.3.3.3 Modifying NMS user Information in Batches......................................................................................................397
3.3.3.4 Locking the Client Immediately...........................................................................................................................399
3.3.3.5 Unlocking the Client.............................................................................................................................................400
3.3.3.6 Setting Auto-Locking for an U2000.....................................................................................................................400
3.3.4 Monitoring U2000 Users.........................................................................................................................................401
3.3.4.1 Monitoring NMS User Sessions...........................................................................................................................401
3.3.4.2 Monitoring NMS User Operations.......................................................................................................................402
3.3.4.3 Forcing U2000 Users to Log Out.........................................................................................................................403
3.3.4.4 Unlocking Users...................................................................................................................................................403
3.3.4.5 Sending Messages to Online Users......................................................................................................................404
3.3.5 Managing the Remote Maintenance User................................................................................................................405
3.4 Managing NE Security...............................................................................................................................................406
3.4.1 NE Security Management........................................................................................................................................406
3.4.2 Setting the NE ACL.................................................................................................................................................408
3.4.2.1 Overview of ACL.................................................................................................................................................408
3.4.2.2 Setting Basic ACL Rules......................................................................................................................................409
3.4.2.3 Setting the Advanced ACL Rules.........................................................................................................................410
3.4.3 Setting the Security Access of an NE......................................................................................................................410
3.4.3.1 Setting Ethernet Access for NEs..........................................................................................................................411
3.4.3.2 Setting Serial Port Access for NEs.......................................................................................................................411
3.4.3.3 Setting the OAM Access to NEs..........................................................................................................................412
3.4.3.4 Setting the COM Access to NEs...........................................................................................................................412
3.4.3.5 Setting the LCT Access to NEs............................................................................................................................413
3.4.4 Managing NE Login................................................................................................................................................414
3.4.4.1 Locking Out NE Login.........................................................................................................................................414
3.4.4.2 Locking Out NE Settings......................................................................................................................................415
3.4.4.3 Querying the Information About an Online NE User...........................................................................................416
3.4.4.4 Switching a Logged-In NE User..........................................................................................................................417
3.4.4.5 Forcing an NE User to Log Out of the U2000.....................................................................................................418
3.4.4.6 Setting NE Login Prompt Message......................................................................................................................418
3.4.5 Managing NE Users.................................................................................................................................................419
3.4.5.1 Querying the Additional Information of NE User................................................................................................419
3.4.5.2 Creating an NE User.............................................................................................................................................420
3.4.5.3 Modifying NE Users.............................................................................................................................................422
3.4.5.4 Changing an NE User Password...........................................................................................................................423
3.4.5.5 Querying NE Security Parameters........................................................................................................................424
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
x
3.4.5.6 Querying NE User Groups...................................................................................................................................425
3.4.5.7 Deleting NE Users................................................................................................................................................425
3.4.6 Configuring an NE As an SSH Server.....................................................................................................................426
3.5 Configuring NE RADIUS..........................................................................................................................................429
3.5.1 Overview.................................................................................................................................................................429
3.5.2 Setting an NE as an RADIUS Client or Proxy Server.............................................................................................432
3.5.3 Adding an RADIUS Server.....................................................................................................................................433
3.5.4 Setting NE RADIUS Parameters.............................................................................................................................434
3.6 Change Audit..............................................................................................................................................................434
3.6.1 Viewing Information About Change Audit.............................................................................................................435
3.6.2 Dumping Information About Change Audit............................................................................................................435
3.6.3 Deleting Information About Change Audit.............................................................................................................436
3.7 Database Security Policy............................................................................................................................................437
4 Log Management.......................................................................................................................438
4.1 Log Management Overview.......................................................................................................................................440
4.1.1 Log Management Policy..........................................................................................................................................440
4.1.2 Log Type..................................................................................................................................................................441
4.1.2.1 U2000 System Logs..............................................................................................................................................441
4.1.2.2 U2000 Security Logs............................................................................................................................................442
4.1.2.3 U2000 Operation Logs.........................................................................................................................................444
4.1.2.4 Syslog Run Logs of IP NEs..................................................................................................................................445
4.1.2.5 Syslog Operation Logs of Access NEs.................................................................................................................446
4.1.2.6 Security Logs of Transport NEs...........................................................................................................................447
4.1.3 Syslog Service.........................................................................................................................................................448
4.2 Managing U2000 System Logs..................................................................................................................................452
4.2.1 Querying U2000 System Logs................................................................................................................................452
4.2.2 Collecting Statistics on U2000 System Logs..........................................................................................................453
4.3 Managing U2000 Security Logs.................................................................................................................................455
4.3.1 Querying U2000 Security Logs...............................................................................................................................455
4.3.2 Collecting Statistics on U2000 Security Logs.........................................................................................................457
4.4 Managing U2000 Operation Logs..............................................................................................................................460
4.4.1 Querying U2000 Operation Logs............................................................................................................................460
4.4.2 Collecting Statistics on U2000 Operation Logs......................................................................................................462
4.5 Setting U2000 Log Templates....................................................................................................................................464
4.6 Managing U2000 Log Data........................................................................................................................................466
4.6.1 Setting U2000 Log Dump........................................................................................................................................466
4.6.2 Setting U2000 Log Overflow Dump.......................................................................................................................467
4.6.3 Manually Dumping U2000 Logs.............................................................................................................................468
4.6.4 Setting U2000 Log Export.......................................................................................................................................469
4.6.5 Setting Device Log Dump.......................................................................................................................................470
4.6.6 Setting U2000 Log Forwarding...............................................................................................................................471
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xi
4.6.6.1 Understanding Log Forwarding............................................................................................................................471
4.6.6.2 Enabling Logging to U2000 Syslog Database......................................................................................................471
4.6.6.3 Setting the Interconnection Between the U2000 and the Syslog Server..............................................................473
4.6.6.4 Managing the Connection Between the U2000 and Syslog Server......................................................................475
4.7 Managing Logs of the IP NE Side..............................................................................................................................476
4.7.1 Configuring the Information Center on the NEs.....................................................................................................476
4.7.1.1 Enabling the Information Center..........................................................................................................................477
4.7.1.2 Configuring the Syslog Source Interface..............................................................................................................477
4.7.1.3 Adding a Syslog Host...........................................................................................................................................478
4.7.1.4 Configuring the Advanced Attributes of the Syslog Service...............................................................................479
4.7.2 Browsing the NE Syslog Run Logs.........................................................................................................................479
4.8 Managing Logs of the Access NE Side......................................................................................................................480
4.8.1 Browsing NE Syslog Operation Logs.....................................................................................................................481
4.8.2 Browsing Login Logs of NE Users.........................................................................................................................482
4.9 Managing Transport NE Logs....................................................................................................................................483
4.9.1 Transferring NE Logs to a Syslog Server................................................................................................................483
4.9.1.1 Setting a Syslog Server.........................................................................................................................................484
4.9.1.2 Setting a Syslog GNE...........................................................................................................................................485
4.9.1.3 Setting the Syslog Type and Severity...................................................................................................................485
4.9.1.4 Starting the Syslog Service...................................................................................................................................486
4.9.2 Viewing Security Logs of NEs................................................................................................................................486
4.9.3 Viewing Operation Logs of NEs.............................................................................................................................487
5 Topology Management.............................................................................................................489
5.1 Overview of Topology Management..........................................................................................................................491
5.1.1 Topology Management Function.............................................................................................................................491
5.1.2 Types of Topology Views.......................................................................................................................................493
5.1.3 Objects in a Topology View....................................................................................................................................497
5.1.4 Automatic Topology Discovery..............................................................................................................................502
5.1.5 Alarm Indication in a Topology View.....................................................................................................................503
5.2 Network Topology Construction Process...................................................................................................................504
5.3 Designing a Physical Topology..................................................................................................................................508
5.4 Creating a Subnet........................................................................................................................................................509
5.5 Setting Parameters for the Communication Between the U2000 and NEs................................................................510
5.5.1 Protocols for Communication Between the U2000 and NEs..................................................................................511
5.5.2 Setting SNMP Parameters.......................................................................................................................................516
5.5.2.1 Configuring the Default SNMP Parameters Template.........................................................................................516
5.5.2.2 Setting NE SNMP Parameters..............................................................................................................................517
5.5.3 Setting Telnet/STelnet Parameters..........................................................................................................................520
5.5.3.1 Configuring a Telnet/STelnet Parameter Template..............................................................................................520
5.5.3.2 Setting Telnet/STelnet Parameters with a Template............................................................................................522
5.5.3.3 Manually Setting Telnet/STelnet Parameters.......................................................................................................524
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xii
5.5.4 Configuring the xFTP Service.................................................................................................................................526
5.5.4.1 Testing Local xFTP Information..........................................................................................................................526
5.5.4.2 Configuring the NAT Address Translation..........................................................................................................528
5.6 Creating NEs...............................................................................................................................................................530
5.6.1 Creating NEs in Batches..........................................................................................................................................531
5.6.1.1 Creating Transport/PTN NEs in Batches..............................................................................................................531
5.6.1.2 Creating SNMP/ICMP NEs in Batches................................................................................................................534
5.6.1.3 Creating Core Network NEs in Batches...............................................................................................................540
5.6.1.4 Importing/Exporting NEs in Batches...................................................................................................................542
5.6.2 Creating a Single NE...............................................................................................................................................545
5.6.2.1 Creating Optical NEs............................................................................................................................................546
5.6.2.2 Creating a Single Transport NE............................................................................................................................546
5.6.2.3 Creating a Single PTN NE....................................................................................................................................550
5.6.2.4 Creating a Single Router NE................................................................................................................................553
5.6.2.5 Creating a Single Switch NE................................................................................................................................555
5.6.2.6 Creating a Single Security NE..............................................................................................................................557
5.6.2.7 Creating an Access NE.........................................................................................................................................558
5.6.2.8 Creating a Single BITS NE..................................................................................................................................560
5.6.2.9 Creating a Single Third-Party NE........................................................................................................................562
5.6.2.10 Creating Virtual NEs..........................................................................................................................................562
5.6.2.11 Creating a Single NGN NE................................................................................................................................563
5.6.2.12 Creating a Single IMS NE..................................................................................................................................564
5.6.3 Setting the Time Discovery Policy for NEs............................................................................................................567
5.6.4 Setting the Security SSL Connection Mode for Transport NEs..............................................................................569
5.7 Configuring the NE Data............................................................................................................................................576
5.7.1 Synchronizing NE Configuration Data....................................................................................................................576
5.7.2 Configuring the NE Data Manually.........................................................................................................................578
5.7.3 Replicating the NE Data..........................................................................................................................................580
5.7.4 Uploading the NE Data............................................................................................................................................582
5.7.5 Configuring Virtual NE Data..................................................................................................................................584
5.7.6 Adding Boards.........................................................................................................................................................585
5.8 Creating Connections.................................................................................................................................................586
5.8.1 Creating Fibers Manually........................................................................................................................................586
5.8.2 Creating Fibers/Cables Automatically.....................................................................................................................589
5.8.3 Creating Fiber/Cable Connections in Batches.........................................................................................................590
5.8.4 Creating a Link Manually........................................................................................................................................591
5.8.5 Creating Links Automatically.................................................................................................................................593
5.8.6 Creating Inter Fibers Inside a WDM NE.................................................................................................................598
5.8.7 Synchronizing Fiber/Cable Connection Data Inside a WDM NE...........................................................................599
5.8.8 Automatically Creating Microwave Links..............................................................................................................600
5.8.9 Manually Creating Microwave Links......................................................................................................................602
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xiii
5.8.10 Creating Cables Manually.....................................................................................................................................604
5.8.11 Creating Virtual Fibers..........................................................................................................................................605
5.8.12 Restoring the Fiber Connection.............................................................................................................................608
5.9 Maintaining a Network Topology View.....................................................................................................................608
5.9.1 Creating Custom Views...........................................................................................................................................608
5.9.2 Adjusting Topology Objects....................................................................................................................................610
5.9.2.1 Balancing Load of an NE Management Process..................................................................................................610
5.9.2.2 Modifying the NE ID and the Extended ID..........................................................................................................613
5.9.2.3 Modifying the NE Name......................................................................................................................................614
5.9.2.4 Modifying the NE IP Address..............................................................................................................................615
5.9.2.5 Modifying the Optical NE Name..........................................................................................................................615
5.9.2.6 Adjusting Optical NE Resource...........................................................................................................................616
5.9.2.7 Modifying the Status of Preconfigured NEs in Batches.......................................................................................616
5.9.2.8 Modifying the NMS Name...................................................................................................................................617
5.9.2.9 Modifying Fiber/Cable Information.....................................................................................................................618
5.9.2.10 Naming a Fiber/Cable/Microwave Link.............................................................................................................618
5.9.2.11 Copying Topology Objects.................................................................................................................................619
5.9.2.12 Moving Topology Objects..................................................................................................................................620
5.9.2.13 Modifying Topology Objects.............................................................................................................................622
5.9.3 Setting the NE Maintenance Information................................................................................................................622
5.9.4 Setting the Maintenance Personnel Information.....................................................................................................623
5.9.5 Deleting Topology Objects......................................................................................................................................624
5.9.5.1 Deleting a Subnet..................................................................................................................................................624
5.9.5.2 Deleting Boards....................................................................................................................................................625
5.9.5.3 Deleting Sub-boards.............................................................................................................................................625
5.9.5.4 Deleting Connections...........................................................................................................................................626
5.9.5.5 Deleting NEs.........................................................................................................................................................627
5.9.5.6 Deleting an Optical NE.........................................................................................................................................628
5.10 Viewing Topology Information................................................................................................................................629
5.10.1 Searching for NEs in a View.................................................................................................................................629
5.10.2 Browsing Fibers/Cables.........................................................................................................................................630
5.10.2.1 Viewing the Connection Status..........................................................................................................................630
5.10.2.2 Querying Fiber/Cable/Microwave Link Information.........................................................................................631
5.10.2.3 Querying Relevant Trails of a Fiber/Cable.........................................................................................................632
5.10.2.4 Querying Relevant Optical Power of a Fiber/Cable...........................................................................................633
5.10.2.5 Querying the Performance Data of a Microwave Link......................................................................................634
5.10.3 Setting the Topology Background.........................................................................................................................635
5.10.4 Selecting the Current Topology View...................................................................................................................637
5.10.5 Filtering Operation Objects in a View...................................................................................................................637
5.10.6 Viewing the Meanings of Topology Icons............................................................................................................640
5.10.7 Viewing Topology Object Detail Information......................................................................................................641
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xiv
5.10.8 Viewing the Topology Aerial View......................................................................................................................642
5.10.9 Zooming In/Out in a Topology View....................................................................................................................643
5.10.10 Returning to the Upper-Level Subnet..................................................................................................................643
5.10.11 Sorting Topology Objects....................................................................................................................................644
5.10.12 Setting Startup subnet..........................................................................................................................................644
5.11 Topology Management Examples............................................................................................................................645
5.11.1 Creating a Transport Network Topology...............................................................................................................645
5.11.2 Creating an IP Network Topology.........................................................................................................................650
5.11.3 Creating an Access Network Topology.................................................................................................................655
5.11.4 Creating a Security Network Topology.................................................................................................................661
5.11.5 Creating a NGN Network Topology.....................................................................................................................670
5.11.6 Creating an IMS Network Topology.....................................................................................................................674
5.11.7 Moving an NE from One Subnet to Another.........................................................................................................679
6 Time Localization Management.............................................................................................681
6.1 Time Localization.......................................................................................................................................................682
6.2 Setting Time Localization on the U2000....................................................................................................................683
6.2.1 Setting the Time Display Format.............................................................................................................................683
6.2.2 Setting the Time Mode of the Client.......................................................................................................................683
6.3 Setting Time Localization on NEs..............................................................................................................................684
6.3.1 Setting a Time Zone for an NE................................................................................................................................684
6.3.2 Setting DST on NEs................................................................................................................................................685
7 Alarm Management...................................................................................................................687
7.1 Basic Concepts...........................................................................................................................................................689
7.1.1 Alarms and Events...................................................................................................................................................689
7.1.2 Alarm Severities......................................................................................................................................................689
7.1.3 Alarm Status............................................................................................................................................................690
7.1.4 Alarm Category.......................................................................................................................................................691
7.1.5 Alarm Notification...................................................................................................................................................692
7.1.6 Current Alarms and Historical Alarms....................................................................................................................696
7.1.7 Alarm Basic Operations...........................................................................................................................................697
7.1.8 Alarm Setting Operations........................................................................................................................................700
7.2 Overview of Fault Operations....................................................................................................................................706
7.3 Setting Remote Alarm or Event Notification.............................................................................................................707
7.3.1 Commissioning the SMS Gateway..........................................................................................................................707
7.3.1.1 Setting Parameters for Alarm Notification by the SMS Gateway........................................................................707
7.3.1.2 Verifying the SMS Gateway.................................................................................................................................709
7.3.2 Commissioning Alarm Notification by Email.........................................................................................................710
7.3.2.1 Setting Parameters for Alarm Notification by Email...........................................................................................710
7.3.2.2 Verifying Remote Alarm Notification by Email..................................................................................................712
7.3.3 Commissioning the Wireless Modem......................................................................................................................713
7.3.3.1 Installing the Wireless Modem.............................................................................................................................713
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xv
7.3.3.2 Commissioning the Wireless Modem in Solaris or SUSE Linux.........................................................................716
7.3.3.3 Commissioning the Wireless Modem in Windows..............................................................................................716
7.3.3.4 Setting Parameters for Alarm Notification by the Wireless Modem....................................................................723
7.3.3.5 Verifying the Wireless Modem............................................................................................................................724
7.3.4 Setting the Format of Remote Alarm or Event Notification Messages...................................................................725
7.3.5 Setting Delay Delivery of Remote Alarm or Event Notification Messages............................................................726
7.3.6 Setting the Remote Alarm or Event Notification Rule............................................................................................727
7.3.7 Downloading Remote Notification Logs.................................................................................................................728
7.4 Analyzing Alarm Correlation.....................................................................................................................................729
7.4.1 Introduction to Correlation Rules............................................................................................................................729
7.4.2 Analyzing Root Alarms Based on Customized Rules.............................................................................................731
7.4.2.1 Setting the Default Alarm Correlation Rules.......................................................................................................731
7.4.2.2 Analyzing Root Alarms and Events According to Customized Rules.................................................................732
7.4.3 Trail Alarm Correlation Analysis - Analyzing Root Alarms..................................................................................733
7.4.3.1 Trail Root Alarm Analysis...................................................................................................................................733
7.4.3.2 Setting the Rules for Trail Alarm Correlation Analysis.......................................................................................736
7.4.3.3 Analyzing Root Alarms Based on Trail Alarm Correlation Rules.......................................................................737
7.4.4 Setting an Alarm or Event Frequency Analysis Rule..............................................................................................738
7.4.5 Setting an Intermittent Alarm or Repeat Event Analysis Rule................................................................................739
7.4.6 Setting an Acknowledged and Uncleared Alarm Time Analysis Rule....................................................................740
7.4.7 Example of Analyzing Root Alarms According to Customized Rules...................................................................741
7.4.8 Example of Alarm or Event Frequency Analysis....................................................................................................743
7.4.9 Example of Intermittent Alarm or Repeat Event Analysis......................................................................................744
7.4.10 Example of Acknowledged and Uncleared Alarm Time Analysis........................................................................745
7.5 Setting Automatic Alarm/Event Processing...............................................................................................................745
7.5.1 Setting Rules for Automatic Reporting Alarms or Events......................................................................................745
7.5.1.1 Setting Automatic Reporting Status for Alarms of an NE...................................................................................745
7.5.1.2 Setting Automatic Reporting Status for Alarms of a Board.................................................................................746
7.5.2 Setting Alarm Automatic Synchronization..............................................................................................................747
7.5.3 Setting an Alarm or Event Mask Rule.....................................................................................................................748
7.5.4 Setting an Automatic Alarm Acknowledgment Rule..............................................................................................751
7.5.5 Modifying Alarm Severity.......................................................................................................................................753
7.5.5.1 Setting an Alarm or Event Redefinition Rule.......................................................................................................753
7.5.5.2 Modifying the Alarm Severity for an NE.............................................................................................................755
7.5.5.3 Modifying the Alarm Severity for a Board..........................................................................................................756
7.5.6 Setting Alarm/Event Suppression Rules..................................................................................................................756
7.5.7 Setting an Alarm or Event Postprocessing Rule......................................................................................................758
7.5.8 An Instance of the Alarm or Event Postprocessing Script......................................................................................758
7.5.9 Setting Summarized Parallel Alarm Rules..............................................................................................................759
7.5.10 Setting Conversion from an Event to an ADMC Alarm.......................................................................................761
7.5.11 Setting the Lifecycle of the Current Alarm...........................................................................................................762
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xvi
7.5.12 Configuring Fiber-Related Alarms........................................................................................................................762
7.5.13 Setting an Alarm or Event Northbound Filtering Rule..........................................................................................763
7.6 Setting Alarm or Event Notification...........................................................................................................................765
7.6.1 Introduction to the Alarm Panel..............................................................................................................................765
7.6.2 Setting the Alarm Panel...........................................................................................................................................767
7.6.3 Setting the Alarm Sound..........................................................................................................................................769
7.6.4 Setting Prompt Colors of Alarms............................................................................................................................771
7.6.5 Setting the Alarm Box.............................................................................................................................................772
7.6.6 Disable the Alarm Sound.........................................................................................................................................773
7.6.7 Setting the Alarm Highlighting...............................................................................................................................775
7.6.8 Setting the Alarm Font............................................................................................................................................776
7.6.9 Setting the Alarm Display Mode.............................................................................................................................777
7.6.10 Setting the Format of the Alarm Lamp ToolTip....................................................................................................779
7.6.11 Setting the Display Properties of New Alarms/Events..........................................................................................780
7.6.12 Setting the Alarm Display in the Topology View.................................................................................................781
7.7 Managing an Alarm/Event Template.........................................................................................................................784
7.7.1 Alarm/Event Template............................................................................................................................................784
7.7.2 Creating an Alarm/Event Template.........................................................................................................................786
7.7.3 Setting Template Status for the Current User..........................................................................................................788
7.7.4 Customizing Alarm/Event Attribute Template........................................................................................................790
7.8 Monitoring Network Alarms/Events..........................................................................................................................791
7.8.1 Alarm Reporting Process.........................................................................................................................................791
7.8.2 Setting Trap Parameters on an NE..........................................................................................................................794
7.8.3 Synchronizing Alarms.............................................................................................................................................795
7.8.3.1 Synchronizing NE Alarms Manually...................................................................................................................795
7.8.3.2 Synchronizing Current Alarms on NEs................................................................................................................796
7.8.4 Monitoring Alarms Using the Alarm Panel.............................................................................................................797
7.8.5 Monitoring Alarms by Using the Topology View...................................................................................................798
7.8.6 Monitoring Alarms by Using the Alarm Bar Chart.................................................................................................799
7.8.7 Monitoring Events by Using the Event Indicator....................................................................................................800
7.8.8 Monitoring NMS Alarms/Events Using Emergency Maintenance Notifications...................................................801
7.8.9 Setting Columns to Be Displayed in an Alarm/Event Window..............................................................................802
7.8.10 Browsing the Current Alarms................................................................................................................................804
7.8.11 Querying Alarm Logs............................................................................................................................................806
7.8.12 Browsing the Historical Alarms............................................................................................................................808
7.8.13 Querying Event Logs.............................................................................................................................................810
7.8.14 Browse Current Alarm by Severity.......................................................................................................................811
7.8.15 Browse Current Alarm by Status...........................................................................................................................812
7.8.16 Querying Alarms at the Opposite Port..................................................................................................................814
7.8.17 Setting Maintenance Regions................................................................................................................................815
7.8.18 Setting the Time Display Mode for Queried Alarms or Events............................................................................817
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xvii
7.8.19 Locating Objects with Alarms/Events...................................................................................................................818
7.8.20 Collecting Statistics on Alarm Logs......................................................................................................................820
7.8.21 Collecting Statistics on Event Logs.......................................................................................................................822
7.8.22 Setting an NE Object Group..................................................................................................................................824
7.8.23 Setting an Alarm or Event Name Group...............................................................................................................826
7.9 Handling Alarms.........................................................................................................................................................827
7.9.1 Alarm Handling Procedure......................................................................................................................................827
7.9.2 Viewing Alarm Details............................................................................................................................................829
7.9.3 Acknowledging an Alarm........................................................................................................................................830
7.9.4 Locating Objects with Alarms/Events.....................................................................................................................831
7.9.5 Checking NE Alarms...............................................................................................................................................832
7.9.6 Rectifying a Fault....................................................................................................................................................833
7.9.7 Masking Alarms......................................................................................................................................................834
7.9.8 Suppressing Alarms.................................................................................................................................................836
7.9.9 Clearing an Alarm Manually...................................................................................................................................837
7.9.10 Recording Alarm or Event Maintenance Experience............................................................................................838
7.10 Managing Alarm or Event Data................................................................................................................................839
7.10.1 Alarm/Event Data Dumping..................................................................................................................................839
7.10.2 Setting a Scheduled Alarm/Event Log Dump Task...............................................................................................840
7.10.3 Setting Alarm/Event Overflow Dump...................................................................................................................841
7.10.4 Manually Dumping Alarms/Events.......................................................................................................................842
7.10.5 Setting Alarm or Event Log Scheduled Export.....................................................................................................843
7.11 Managing Maintenance Experience.........................................................................................................................844
7.11.1 Recording Alarm/Event Maintenance Experience................................................................................................844
7.11.2 Exporting Alarm or Event Maintenance Experience.............................................................................................845
7.11.3 Importing Alarm or Event Maintenance Experience.............................................................................................846
7.12 Managing the Alarm Maintenance Status................................................................................................................847
7.12.1 Configure a Construction Task for NEs................................................................................................................849
7.12.2 Configuring a Construction Task..........................................................................................................................850
7.12.3 Configuring Objects for a Construction Task........................................................................................................852
7.12.4 Setting the Alarm Maintenance Status..................................................................................................................854
7.13 Alarm Management (MSTP&WDM&RTN&PTN NE)...........................................................................................856
7.13.1 Suppressing Alarms...............................................................................................................................................856
7.13.1.1 Suppressing NE Alarms......................................................................................................................................856
7.13.1.2 Suppressing Alarms of a Board or Port..............................................................................................................857
7.13.1.3 Suppressing the Alarms on an ATM Connection...............................................................................................858
7.13.1.4 Checking Path Alarm Suppression Status..........................................................................................................859
7.13.2 Setting Alarm Reversion.......................................................................................................................................859
7.13.2.1 Setting the Alarm Reversion Mode of an NE.....................................................................................................859
7.13.2.2 Setting the Alarm Reversion for Specified Resources.......................................................................................861
7.13.2.3 Setting Alarm Reversion for a Specified Port....................................................................................................864
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xviii
7.13.2.4 Setting Alarm Reversion for an SDH Trail........................................................................................................865
7.13.2.5 Checking Path Alarm Reversion Status..............................................................................................................866
7.13.3 Setting the Types of Lower Order Services in the VC4 Path................................................................................866
7.13.4 Monitoring the Alarms and Performance of Lower Order Services in the VC4 Path...........................................867
7.13.5 Setting the Insertion Mode for Channels Not Configured with Services..............................................................868
7.13.6 Specifying the Port QoS Alarm.............................................................................................................................869
7.13.6.1 Specifying Bit Error Alarm Threshold...............................................................................................................869
7.13.6.2 Enabling AIS Insertion for a Specified Channel................................................................................................870
7.13.6.3 Enabling UNEQ Insertion for a Specified Path..................................................................................................870
7.13.7 Configuring Alarm Insertion.................................................................................................................................871
7.13.7.1 Inserting an Alarm at a Specified Path...............................................................................................................871
7.13.7.2 Testing Trail Connectivity by Inserting an Alarm..............................................................................................872
7.13.7.3 Checking Path Alarm Insertion Status................................................................................................................873
7.13.8 Inserting a Maintenance Signal to the ODU Layer...............................................................................................874
7.13.9 Setting NE Alarm Attributes.................................................................................................................................874
7.13.9.1 Setting the Register Mode for NE Alarms..........................................................................................................874
7.13.9.2 Setting the Enabling Status of NE Alarm Correlation Suppression...................................................................875
7.13.9.3 Querying NE Alarm Correlation Rules..............................................................................................................876
7.13.9.4 Setting NE Alarm Delay.....................................................................................................................................876
7.13.10 Setting Triggered Alarm Insertion.......................................................................................................................877
7.13.11 Enabling the Alarm Monitoring for Lower Order Paths.....................................................................................878
7.13.12 Browsing Microwave Link Alarms.....................................................................................................................879
7.13.13 Processing Alarm Threshold-Crossing Notifications..........................................................................................880
7.13.14 Diagnosing Faults................................................................................................................................................880
7.13.14.1 Creating Fault Diagnosis Rules........................................................................................................................881
7.13.14.2 Analyzing and Diagnosing a Service Fault by Wizard.....................................................................................882
7.13.14.3 Starting the Fault Diagnosis Wizard.................................................................................................................883
7.13.15 Configuring Housekeeping..................................................................................................................................884
7.13.15.1 Configuring Environment Property..................................................................................................................884
7.13.15.2 Configuring Control Property...........................................................................................................................885
7.14 Alarm Reliability of Routers and Switches..............................................................................................................886
7.14.1 Alarm Reliability Overview..................................................................................................................................886
7.14.2 Configuring Alarm Reliability in Inform Mode....................................................................................................887
7.14.3 Configuring Alarm Reliability in ESN Mode........................................................................................................889
8 Performance Management (MSTP&WDM&RTN&PTN).................................................892
8.1 Basic Concept.............................................................................................................................................................894
8.1.1 Introduction to Performance Events........................................................................................................................894
8.1.2 Performance Reporting Process...............................................................................................................................897
8.1.3 Current Performance and History Performance......................................................................................................898
8.1.4 Performance Threshold............................................................................................................................................899
8.1.5 Performance Dumping.............................................................................................................................................899
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xix
8.1.6 Performance Analysis..............................................................................................................................................899
8.2 Viewing SDH/WDM Performance Data....................................................................................................................900
8.2.1 Setting Performance Monitoring Parameters..........................................................................................................900
8.2.1.1 Setting Performance Monitoring Time of NE......................................................................................................901
8.2.1.2 Setting the Performance Reporting Status for a Single NE..................................................................................902
8.2.1.3 Setting the NE Performance Event Monitoring Parameters.................................................................................903
8.2.1.4 Setting Performance Threshold............................................................................................................................905
8.2.2 Creating a Browsing Performance Filtering Template............................................................................................907
8.2.3 Viewing Current Performance Data........................................................................................................................908
8.2.4 Viewing Historical Performance Data.....................................................................................................................910
8.2.5 Viewing UAT Records............................................................................................................................................912
8.2.6 Viewing Performance Threshold Crossing..............................................................................................................914
8.2.7 Querying Performance Data of a Microwave Link.................................................................................................916
8.2.8 Collecting the Performance Data.............................................................................................................................917
8.2.9 Analyzing History Performance Data......................................................................................................................920
8.3 Viewing RMON Performance Data...........................................................................................................................921
8.3.1 Setting RMON Performance Monitoring Parameters.............................................................................................922
8.3.1.1 Setting the RMON Performance Monitoring Parameters for NE.........................................................................922
8.3.1.2 Setting the RMON Performance Event Monitoring Parameters..........................................................................923
8.3.1.3 Setting Automatic Reporting of RMON Performance Events.............................................................................926
8.3.1.4 Setting the RMON Performance Threshold.........................................................................................................926
8.3.2 Viewing Statistics Group Performance of an Ethernet Port....................................................................................928
8.3.3 Viewing Historical Group Performance..................................................................................................................930
8.4 Viewing Ethernet Port Flow.......................................................................................................................................933
8.4.1 Setting Ethernet Port Flow Monitoring...................................................................................................................933
8.4.2 Query Ethernet Port Flow........................................................................................................................................933
8.5 Viewing Performance Data of an ATM Port..............................................................................................................934
8.5.1 Setting ATM Performance Monitoring Parameters of an NE.................................................................................934
8.5.2 Viewing Current Performance Data of an ATM Port..............................................................................................935
8.5.3 Viewing History Performance Data of an ATM Port..............................................................................................935
8.6 Viewing Lower Order Performance Data...................................................................................................................936
8.6.1 Setting the Lower Order Performance Monitoring Status.......................................................................................936
8.6.2 Setting the Lower Order Performance Threshold....................................................................................................937
8.6.3 Viewing Current Lower Order Performance Data...................................................................................................938
8.6.4 Viewing History Lower Order Performance Data...................................................................................................938
8.6.5 Viewing UAT Records for a Lower Order Service.................................................................................................939
8.6.6 Viewing Lower Order Performance Threshold-Crossing Records.........................................................................940
8.7 Viewing IP Performance of Ethernet Ports................................................................................................................941
8.7.1 Setting IP Performance Monitoring Parameters of an NE.......................................................................................941
8.7.2 Viewing Current Performance Data of an Ethernet Port.........................................................................................942
8.7.3 Viewing History Performance Data of an Ethernet Port.........................................................................................942
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xx
8.8 Dumping Performance Data.......................................................................................................................................943
8.8.1 Dumping Performance Data Manually....................................................................................................................943
8.8.2 Dumping Performance Data Periodically................................................................................................................944
8.8.3 Dumping Performance Data in the Overflow Way.................................................................................................945
8.9 Forecasting the Failure Time of the Laser..................................................................................................................946
8.10 Resetting Performance Registers..............................................................................................................................946
8.10.1 Resetting Board Performance Registers................................................................................................................946
8.10.2 Resetting ATM Performance Registers.................................................................................................................947
8.10.3 Resetting Ethernet Performance Registers............................................................................................................947
8.11 Configuring the Q Value Performance Monitoring..................................................................................................948
8.11.1 Setting and Querying the Threshold of the Q Value Performance........................................................................948
8.11.2 Querying the Current Q Value Performance.........................................................................................................949
8.11.3 Querying the History Q Value Performance.........................................................................................................950
9 Inventory Management............................................................................................................952
9.1 Telecommunications Room Management..................................................................................................................955
9.1.1 Creating a Telecommunications Room...................................................................................................................955
9.1.2 Installing a Rack or an NMS in a Telecommunications Room...............................................................................956
9.1.3 Querying Telecommunications Rooms...................................................................................................................957
9.1.4 Modifying a Telecommunications Room................................................................................................................957
9.1.5 Deleting a Telecommunications Room...................................................................................................................958
9.1.6 Setting a Flag for a Telecommunications Room.....................................................................................................958
9.1.7 Exporting Information About telecommunications Rooms ....................................................................................959
9.1.8 Collecting Statistics on a Telecommunications Room............................................................................................960
9.2 Rack Management......................................................................................................................................................961
9.2.1 Creating a Rack.......................................................................................................................................................961
9.2.2 Installing a Subrack on a Rack................................................................................................................................962
9.2.3 Querying Racks.......................................................................................................................................................962
9.2.4 Modifying a Rack....................................................................................................................................................963
9.2.5 Deleting a Rack.......................................................................................................................................................964
9.2.6 Setting a Rack Flag..................................................................................................................................................964
9.2.7 Exporting Rack Information....................................................................................................................................965
9.2.8 Collecting Statistics on a Rack................................................................................................................................965
9.3 NE Management.........................................................................................................................................................967
9.3.1 Querying NEs..........................................................................................................................................................967
9.3.2 Setting a Flag for an NE..........................................................................................................................................968
9.3.3 Exporting NE Information.......................................................................................................................................968
9.3.4 Collecting Statistics on an NE.................................................................................................................................969
9.3.5 Collecting Statistics on an Equivalent NE...............................................................................................................970
9.4 Subrack Management.................................................................................................................................................971
9.4.1 Querying Subracks..................................................................................................................................................971
9.4.2 Setting a Flag for a Subrack....................................................................................................................................972
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxi
9.4.3 Exporting Subrack Information...............................................................................................................................973
9.4.4 Collecting Statistics on a Subrack...........................................................................................................................973
9.5 Board Management.....................................................................................................................................................974
9.5.1 Querying Boards......................................................................................................................................................974
9.5.2 Setting a Flag for a Board........................................................................................................................................975
9.5.3 Exporting Board Information..................................................................................................................................976
9.5.4 Collecting Statistics on a Board...............................................................................................................................977
9.6 Subboard Management...............................................................................................................................................978
9.6.1 Querying Subboards................................................................................................................................................978
9.6.2 Setting a Flag for a Subboard..................................................................................................................................979
9.6.3 Exporting Subboard Information.............................................................................................................................979
9.6.4 Collecting Statistics on a Subboard.........................................................................................................................980
9.7 Port Management........................................................................................................................................................981
9.7.1 Querying Ports.........................................................................................................................................................981
9.7.2 Setting a Port Flag...................................................................................................................................................982
9.7.3 Exporting Port Information.....................................................................................................................................983
9.7.4 Collecting Statistics on Ports...................................................................................................................................983
9.8 Optical/Electrical Module Management.....................................................................................................................984
9.8.1 Querying Optical/Electrical Modules......................................................................................................................984
9.8.2 Setting an Optical/Electrical Module Label............................................................................................................985
9.8.3 Exporting Optical/Electrical Module Information...................................................................................................985
9.8.4 Collecting Statistics on Optical/Electrical Module.................................................................................................986
9.9 Collecting Statistics on the Slot Usage.......................................................................................................................987
9.10 Collecting Statistics on the ONU..............................................................................................................................988
9.11 Fiber/Cable/Microwave Link Management..............................................................................................................988
9.11.1 Creating Fiber/Cable Connections in Batches.......................................................................................................988
9.11.2 Importing Link Data..............................................................................................................................................989
9.11.3 Querying Fiber/Cable/Microwave Link Information............................................................................................991
9.11.4 Modifying Fiber/Cable Information......................................................................................................................991
9.11.5 Deleting Connections............................................................................................................................................992
9.11.6 Setting the Line Shape and Width for New Fiber/Cable/Microwave Link ..........................................................993
9.11.7 Modifying the Line Shape and Width for Fiber/Cable/Microwave Link..............................................................994
9.11.8 Exporting Fiber/Cable/Microwave Link Information...........................................................................................995
9.11.9 Creating an Intermediate Office............................................................................................................................995
9.11.10 Checking the Fiber/Cable Connection.................................................................................................................996
9.11.11 Querying the Fiber/Cable Pipe to Which a Fiber/Cable Belongs........................................................................997
9.11.12 Querying Alarms Related to a Fiber/Cable/Microwave Link..............................................................................998
9.12 Fiber/Cable Pipe Management.................................................................................................................................998
9.12.1 Creating a Fiber/Cable Pipe...................................................................................................................................998
9.12.2 Adding a Fiber/Cable to a Fiber/Cable Pipe..........................................................................................................999
9.12.3 Querying a Fiber/Cable Pipe...............................................................................................................................1000
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxii
9.12.4 Modifying Information About a Fiber/Cable Pipe..............................................................................................1001
9.12.5 Removing a Fiber/Cable from a Fiber/Cable Pipe..............................................................................................1001
9.12.6 Deleting a Fiber/Cable Pipe.................................................................................................................................1002
9.13 Link Resource Management...................................................................................................................................1003
9.13.1 Synchronizing Trunk Links.................................................................................................................................1003
9.13.2 Creating a Link....................................................................................................................................................1004
9.13.3 Querying a Link...................................................................................................................................................1005
9.13.4 Viewing Link Alarms..........................................................................................................................................1005
9.13.5 Reverting the Source and Sink NEs of a Link.....................................................................................................1006
9.13.6 Modifying the Line Shape and Width for a Link................................................................................................1006
9.13.7 Creating a Link View..........................................................................................................................................1007
9.13.8 Creating a Link Group.........................................................................................................................................1008
9.13.9 Adding a Link to a Link Group...........................................................................................................................1008
9.14 Interface Resource Management............................................................................................................................1009
9.14.1 Querying Router/Switch Interface Resources.....................................................................................................1009
9.14.2 Setting a Router/Switch Interface Flag................................................................................................................1010
9.14.3 Exporting Router/Switch Interface Information..................................................................................................1011
9.15 Access Service Statistics Management...................................................................................................................1012
9.15.1 Statistics on ports of various types......................................................................................................................1012
9.15.2 Querying Port Statistics.......................................................................................................................................1014
9.15.3 Creating a Port Statistics Collection Task...........................................................................................................1015
9.15.4 Modifying a Port Statistics Collection Task........................................................................................................1016
9.15.5 Deleting a Port Statistics Collection Task...........................................................................................................1016
9.15.6 Starting a Port Statistics Collection Task............................................................................................................1017
9.15.7 Stopping a Port Statistics Collection Task..........................................................................................................1017
9.16 Exporting Electronic Labels of NEs.......................................................................................................................1018
9.17 SDH Report............................................................................................................................................................1020
9.17.1 Collecting Statistics on the SDH Ports................................................................................................................1020
9.17.2 Collecting Statistics on the SDH Lower Order Cross-Connections....................................................................1021
9.17.3 Collecting Statistics on SDH Tributary Port Resources......................................................................................1021
9.17.4 Collecting Statistics on Trails Between SDH NEs..............................................................................................1022
9.17.5 Collecting Statistics on the SDH Protection Subnet Resources..........................................................................1023
9.17.6 Collecting Statistics on SDH Trail Resources.....................................................................................................1023
9.17.7 Collecting Statistics on SDH Fiber Resource Usage...........................................................................................1024
9.17.8 Creating a Timing Task for Collecting Statistics on SDH Resources.................................................................1025
9.18 Microwave Report..................................................................................................................................................1026
9.18.1 Collecting Statistics on the Microwave License Capacity..................................................................................1026
9.18.2 Collecting Statistics on Microwave Links...........................................................................................................1026
9.18.3 Collecting Statistics on Microwave Link Resource Usage.................................................................................1027
9.18.4 Collecting Statistics on Fiber/Cable Occupancy Resources at Scheduled Time.................................................1028
9.19 MSTP Ethernet Report...........................................................................................................................................1029
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxiii
9.19.1 Collecting Statistics on Ethernet Port Resources................................................................................................1029
9.19.2 Collecting Statistics on Service Resources Between Ethernet NEs....................................................................1029
9.20 WDM Statistic Report............................................................................................................................................1030
9.20.1 Collecting Statistics on the WDM Protection Group Switching State................................................................1030
9.20.2 Collecting Statistics on WDM NE Master/Slave Shelf Information...................................................................1031
9.20.3 Collecting Statistics on WDM Client-Side Port Resources.................................................................................1031
9.20.4 Collecting Statistics on Wavelength Resources Between WDM Sites...............................................................1032
9.20.5 Statistics Report of WDM Link Resources.........................................................................................................1033
9.20.6 Collecting Statistics on Wavelength Resource Usage.........................................................................................1034
9.20.7 Creating a Timing Task for Collecting Statistics on WDM Resources...............................................................1034
9.20.8 Viewing WDM Channel Resources....................................................................................................................1035
9.20.9 Viewing WDM Bandwidth Resource Statistics Report......................................................................................1036
9.21 PTN Statistic Report...............................................................................................................................................1040
9.21.1 Querying a PTN Interface Resource Report........................................................................................................1040
9.21.2 Querying a PTN Port Resource Report...............................................................................................................1041
9.21.3 Querying a PTN Network Resource Statistics Report.........................................................................................1041
9.21.4 Query LAG Resource Report..............................................................................................................................1042
9.22 Project Document...................................................................................................................................................1043
9.22.1 Viewing the Board Manufacturer Information Report........................................................................................1043
9.22.2 Viewing Common Manufacturer Information Report.........................................................................................1044
9.22.3 Viewing the Clock Tracing Diagram...................................................................................................................1045
9.22.4 Viewing the Networking Diagram......................................................................................................................1045
9.22.5 Viewing the Timeslot Allocation Diagram.........................................................................................................1047
10 U2000 Server Monitoring.....................................................................................................1048
10.1 Setting the Monitoring Parameters.........................................................................................................................1049
10.1.1 Setting the Parameters for Monitoring the U2000 Server...................................................................................1049
10.1.2 Setting the Parameters for Monitoring the Disk Usage of the U2000 Server.....................................................1051
10.1.3 Setting the Parameters for Monitoring the Database Usage of the U2000 Server..............................................1053
10.1.4 Setting the Parameters for Monitoring the Service Status of the U2000 Server.................................................1054
10.2 Monitoring the Status of the U2000 Server............................................................................................................1055
10.2.1 Monitoring the Service Status of the U2000 Server............................................................................................1055
10.2.2 Monitoring the Process Status of the U2000 Server............................................................................................1056
10.2.3 Monitoring the Disk Status of the U2000 Server................................................................................................1056
10.2.4 Monitoring the Database Status of the U2000 Server.........................................................................................1057
10.2.5 Monitoring the Resource Status of the U2000 Server.........................................................................................1058
10.2.6 Viewing the Component Information of the U2000 Server................................................................................1058
10.2.7 Refreshing the Monitoring Information..............................................................................................................1059
10.2.8 Saving the Monitoring Information.....................................................................................................................1059
11 Task Management.................................................................................................................1061
11.1 Basic Concepts.......................................................................................................................................................1062
11.1.1 Task Management Window.................................................................................................................................1062
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxiv
11.1.2 Periods of Scheduled Tasks.................................................................................................................................1063
11.1.3 Features of Scheduled Tasks...............................................................................................................................1064
11.1.4 Types of Scheduled Tasks...................................................................................................................................1064
11.1.5 Task Scheduling Parameters................................................................................................................................1068
11.1.6 States of a Scheduled Task..................................................................................................................................1069
11.2 Managing Scheduled Tasks....................................................................................................................................1071
11.2.1 Customizing the Interface for Managing Scheduled Tasks.................................................................................1071
11.2.2 Viewing Scheduled Tasks...................................................................................................................................1071
11.2.3 Creating User Scheduled Tasks...........................................................................................................................1073
11.2.4 Modifying Scheduled Tasks................................................................................................................................1074
11.2.5 Deleting Scheduled Tasks...................................................................................................................................1075
11.2.6 Suspending Scheduled Tasks...............................................................................................................................1076
11.2.7 Resuming Scheduled Tasks.................................................................................................................................1076
12 Backing Up and Restoring the U2000 Data......................................................................1078
12.1 Basic Concepts and Application Scenarios............................................................................................................1079
12.2 Methods of Backing Up and Restoring the U2000 Data........................................................................................1080
12.3 U2000 Database List..............................................................................................................................................1082
12.3.1 List of Minimum-Size U2000 Databases............................................................................................................1082
12.3.2 List of Small-Size U2000 Databases...................................................................................................................1085
12.3.3 List of Medium-Size U2000 Databases...............................................................................................................1088
12.3.4 List of Extra-Large-Size U2000 Databases.........................................................................................................1091
12.4 Suggestions on Data Backup and Restoration........................................................................................................1094
12.5 Backing Up and Restoring All Data in U2000 Database.......................................................................................1094
12.5.1 Immediately Backing Up the U2000 Data to a Local Server Through the U2000 Client...................................1094
12.5.2 Periodically Backing Up the U2000 Data to a Local Server Through the U2000 Client....................................1096
12.5.3 Periodically Backing Up the U2000 Data to a Remote Server Through the U2000 Client................................1099
12.5.4 Restoring a U2000 Database...............................................................................................................................1101
12.6 Backing Up and Restoring the U2000 Network Configuration Data by Using Scripts.........................................1102
12.6.1 Script Files...........................................................................................................................................................1104
12.6.2 Immediately Backing Up the U2000 Data by Script...........................................................................................1117
12.6.3 Backing Up the U2000 Data Through Script Exporting in a Scheduled Manner...............................................1119
12.6.4 Restoring the U2000 Data by Using the Script...................................................................................................1120
12.7 Dumping Performance Data...................................................................................................................................1122
12.7.1 Dumping Performance Data Manually................................................................................................................1122
12.7.2 Dumping Performance Data Automatically........................................................................................................1124
13 Keeping Data Consistency Between the U2000 and NEs...............................................1126
13.1 Data Management Policy of the U2000.................................................................................................................1128
13.2 Checking Consistency of Configuration Data Between an NE and the U2000.....................................................1134
13.3 Viewing the Asynchronous Information................................................................................................................1135
13.4 Synchronizing NE Configuration Data...................................................................................................................1136
13.5 Uploading NE Configuration Data.........................................................................................................................1138
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxv
13.6 Downloading NE Configuration Data....................................................................................................................1139
13.7 Configuration Data Management Information List................................................................................................1140
13.7.1 Configuration Data Management Specifications of the General Operations......................................................1140
13.7.2 Configuration Data Management Specifications of the SDH..............................................................................1142
13.7.3 Configuration Data Management Specifications of the PTN..............................................................................1153
13.7.4 Configuration Data Management Specifications of the WDM...........................................................................1156
13.7.5 Configuration Data Management Specifications of the NG WDM.....................................................................1172
13.7.6 Configuration Data Management Specifications of the WDM (NA)..................................................................1182
13.7.7 Configuration Data Management Specifications of the NG WDM (NA)...........................................................1188
13.7.8 Configuration Data Management Specifications of the Ethernet........................................................................1195
13.7.9 Configuration Data Management Specifications of the ATM.............................................................................1212
13.7.10 Configuration Data Management Specifications of the ASON.........................................................................1215
13.7.11 Configuration Data Management Specifications of the alarm and performance..............................................1216
14 Backing Up and Restoring the NE Data............................................................................1218
14.1 Comparing Methods for Backing Up and Restoring NE Data...............................................................................1220
14.2 Backing Up the NE Database to the SCC Board....................................................................................................1223
14.3 Backing Up Historical Alarms to the Flash Memory.............................................................................................1224
14.4 Backing Up the NE Database to a CF Card............................................................................................................1225
14.4.1 Automatically Backing Up the NE Database to a CF Card.................................................................................1225
14.4.2 Manually Backing Up the NE Database to a CF Card........................................................................................1225
14.5 Restoring the NE Database From the SCC Board..................................................................................................1226
14.6 Restoring the NE Database from the CF Card.......................................................................................................1227
15 Customer Management........................................................................................................1229
15.1 Relationships Between Customers and Users........................................................................................................1231
15.2 Creating a Customer...............................................................................................................................................1231
15.3 Creating a Customer Group....................................................................................................................................1232
15.4 Authorizing a Customer to a U2000 User..............................................................................................................1232
15.5 Browsing Customer Information............................................................................................................................1233
15.6 Viewing Relevant Trails of a Customer.................................................................................................................1233
15.7 Browsing Current Alarms of a Customer...............................................................................................................1234
15.8 Browsing Historical Alarms of a Customer...........................................................................................................1235
15.9 Modifying Customer Information..........................................................................................................................1236
15.10 Deleting a Customer.............................................................................................................................................1236
15.11 Viewing the Customers Affected by an Alarm....................................................................................................1237
15.12 Specifying the Customer of a Service..................................................................................................................1238
15.13 Enabling VCN Status of a Customer....................................................................................................................1239
16 Managing NE Communication in the DCC View...........................................................1240
16.1 DCC View..............................................................................................................................................................1241
16.2 General Operations in the DCC View....................................................................................................................1242
16.2.1 Synchronizing Network-wide DCC Data............................................................................................................1242
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxvi
16.2.2 Synchronizing DCC Subnet Data........................................................................................................................1243
16.2.3 Viewing Data in the DCC View..........................................................................................................................1244
16.2.4 Troubleshooting NE Communication Faults.......................................................................................................1245
16.3 GUI Reference: DCC View....................................................................................................................................1249
16.4 DCC Link Attributes..............................................................................................................................................1255
iManager U2000 Unified Network Management System
Operation Guide for Common Features Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xxvii
1 Getting Started
About This Chapter
The following topics introduce some preparation operations that will ensure a smooth, trouble-
free launch of the U2000.
1.1 Precautions for Using the U2000 Safely
This topic describes the precautions for using the U2000 safely. Take the following precautions
to ensure correct operations:
1.2 Starting the U2000 System
This topic describes how to start the U2000 system. The procedure for starting the U2000 system
varies according to deployment solutions.
1.3 Shutting Down a U2000
This topic describes how to shut down the U2000 server and U2000 clients. The shutdown
procedure varies according to the deployment scheme.
1.4 Using the Workbench and Favorites Folder
This topic describes how to use the workbench and the favorites folder of commonly used
functions to rapidly locate the commonly used functions of the U2000.
1.5 Setting the Character Set of an NE
To meet global requirements, the U2000 provides the function of setting or modifying NE
character sets to prevent garbled characters caused by language change.
1.6 Main Windows and Common Operations of the U2000
This topic describes the main windows of the U2000 client. Learning about the main windows
helps you locate entrances to operations quickly, which increase your operation efficiency.
1.7 How to Obtain Version Information About the U2000
This topic describes how to obtain version information about the U2000.
1.8 Customizing the Client GUI Effect
You can customize the GUI effect of the U2000 client as required.
1.9 Setting the Alert at Network Disconnection
After you set the disconnection alert on the U2000 client, the sound box connected to the client
plays the sound if the U2000 client is disconnected from the server.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1
1.10 Checking Whether the Client Needs Upgrade
You can perform this operation to check whether the version of the client matches that of the
server. If the versions do not match, you must upgrade the client.
1.11 Setting the Interval of Client Upgrade Check
After the server is upgraded, the server version and the client version do not match. Therefore,
the client has to be upgraded accordingly. After the interval for upgrade checking is set, the
U2000 periodically checks whether the client needs to be upgraded.
1.12 Locking the Client
You can lock the U2000 client to prevent unauthorized operations.
1.13 Unlocking the Client
After a client is locked by the current login user or by the system automatically, the current user
can unlock it, or ask a user in the SMManagers group to reset the password and then log in
again, or ask a user in the Administrators group to unlock the client.
1.14 Setting the Level of Operation Logs Recorded by the Client
You can set the level of operation logs recorded by the client, which enables you to focus on
desired operation logs.
1.15 Setting a Scheduled Task
The U2000 can automatically execute certain tasks in a scheduled time without manual
intervention. You can set and modify these scheduled tasks as required.
1.16 Broadcast Messages
The broadcast message function includes setting the broadcast parameters and sending the
broadcast messages. The broadcast message function of the U2000 enables you to send messages
to other users with ease.
1.17 Applying for and Updating the U2000 License
This topic describes the license file of the U2000, and how to apply for, install, and use the
U2000 license.
1.18 Starting the Web Client
Certain NEs must be configured by using the Web LCT. Before you configure services for these
NEs, you need to first start the Web LCT client.
1.19 Starting the NE Data Collection
When an NE is faulty, you can collect the NE data for fault identification and analysis. There
are fast fault collection and full fault collection.
1.20 Customizing Naming Rule
When you create fibers or trails, the U2000 automatically creates the names of the fibers, trails,
ASON trails, Tunnel, Tunnel protection group PWE3 Service and Native Ethernet E-Line
Service based on the naming rule. The settings can be modified according to actual requirements.
This section takes the fiber naming rule as an example to illustrate how to customize the naming
rule.
1.21 U2000 Process List
This topic describes the information about U2000 processes,such as the functions and dependent
processes of each process and the port occupied by each process.
1.22 GUI Input and Display Conventions
The topic describes the input conventions for the text boxes and display conventions for GUI
elements on the U2000. These rules specify the typing requirements for the text boxes in the
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2
U2000 operation interface. These text boxes are used to enter character strings, file names, IP
addresses, MAC addresses, numerals, passwords, dates, time, and so on.
1.23 Mutual Exclusion List for Multiclient Operations
The mutual exclusion list for multiclient operations is given below.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
3
1.1 Precautions for Using the U2000 Safely
This topic describes the precautions for using the U2000 safely. Take the following precautions
to ensure correct operations:
l Do not modify the system time when the U2000 is running. Set the time before installing
the U2000.
To modify the system time of the server, exit the U2000 server and restart it after the
modification.
To modify the system time of the client, exit the U2000 client and restart it after the
modification.
l Avoid modifying the name and IP address of the U2000 server computer.
l Log in to the U2000 server as user ossuser on Solaris. Log in to the U2000 server as user
ossuser on SUSE Linux. On Windows, log in to the U2000 server with the same user ID
that you have chosen when installing the U2000. Do not change the Windows user name.
l The data created on the NE is consistent with that on the U2000. After an NE is configured
and runs properly, ensure data consistency between the NE and the U2000 by means of
manual or automatic synchronization.
l Back up the U2000 database periodically to minimize the loss caused by system
malfunction.
l Synchronize the NE configuration data to the NMS and query the latest NE data before
setting the parameters.
l When a potentially service-affecting operation is performed, the U2000 asks the user for
confirmation. For example, the U2000 displays a message indicating that services will be
interrupted when you download the U2000 data to the NE.
l The installation directory of the U2000 must contain only letters, digits and underscores.
Otherwise, the U2000 Online Help cannot be used.
l If you select a non-English language for an NE when maintaining it, garbled characters are
returned after you query information about the NE.
l Ensure that no other data communication or transmission process is running on the OS of
the U2000 server.
l The default passwords for the default U2000 client user, server OS user, and database user
are all Changeme_123. To ensure the security of the U2000, change the default passwords
after the first login and change the non-default passwords regularly. Meanwhile, the
passwords must be complex enough. For example, a password must contain six or more
characters of different types. The allowed character types are digits, letters, and special
characters.
1.2 Starting the U2000 System
This topic describes how to start the U2000 system. The procedure for starting the U2000 system
varies according to deployment solutions.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
4
1.2.1 Starting the U2000 Server in a Windows Single-Server System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
1.2.1.1 Powering On the Server Safely
This topic describes how to power on the server in a Windows single-server system safely.
Power on the IBM X3650 M4, IBM X3650 M3, IBM X3850 X5 or Huawei Tecal RH2288H
V2 on condition that the power supply is normal.
1. Power on a Huawei Tecal RH2288H V2/Huawei Tecal RH5885H V3/IBM X3650 M4/
IBM X3650 M3/IBM X3850 X5 server.
NOTICE
l Huawei Tecal RH2288H V2/Huawei Tecal RH5885H V3 server supports 100 to 240
VAC input voltage.
l IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server supports 100 to 132 VAC and
200 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet). If the power supply is
insufficient, the server automatically stops.
2. Press the power buttons on the peripherals and monitor connected to a server.
3. Wait 2 to 3 minutes. When the green indicator on the front panel of the server blinks every
1s, press the power button on the shelf of the server.
NOTE
If the power button is steady on, the server has been successfully powered on. For details about IBM
server indicators, see the manual for IBM servers or log in to the official IBM website. For details
about Huawei server indicators, see the manual for Huawei servers or log in to the official Huawei
website.
The red boxes in the following figures show the positions of power buttons on Huawei
Tecal RH2288H V2, Huawei Tecal RH5885H V3, IBM X3650 M4, IBM X3650 M3 and
IBM X3850 X5.
Figure 1-1 Position of the power button on Huawei Tecal RH5885H V3 server
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
5
Figure 1-2 Position of the power button on Huawei Tecal RH2288H V2 server
Figure 1-3 Position of the power button on IBM X3650 M4
Figure 1-4 Position of the power button on IBM X3650 M3
Figure 1-5 Position of the power button on IBM X3850 X5
1.2.1.2 Starting the Database
This topic describes how to start the database in a Windows single-server system. The U2000
can start properly only after the database is started.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
6
Prerequisites
The OS has been started.
Context
Generally, the database starts along with the OS.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Choose Start > All Programs > Microsoft SQL Server 2008 > Configuration Tools > SQL
Server Configuration Manager > SQL Server Services.
Step 3 Right-click SQL Server (MSSQLSERVER) and choose Start from the shortcut menu.
NOTE
If the SQL Server 2000 database is installed on Windows Server 2003, choose Start > Programs >
Microsoft SQL Server > Service Manager. In the SQL Server Service Manager dialog box, click Start/
Continue.
----End
Result
In the SQL Server (MSSQLSERVER), if Start is dimmed, Microsoft SQL Server 2008 is
running.
NOTE
If the SQL Server 2000 database is installed on Windows Server 2003, in the SQL Server Service
Manager dialog box, if Start/Continue is dimmed, Microsoft SQL Server 2000 is running.
1.2.1.3 Starting the U2000 Server Processes
This topic describes how to start the U2000 server processes in a Windows single-server system.
You can log in to the U2000 to manage a network only after starting the U2000 server processes
on the computer on which the U2000 is installed.
Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.
Context
l Generally, the U2000 server processes start along with the OS.
l Only one default NMS user, admin, is provided during U2000 software installation. The
admin user is a U2000 administrator with the highest rights on the U2000 system.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
7
Step 2 View the startup information about the U2000 server processes.
1. Choose Start > Run. The Run window will be displayed.
2. Enter cmd and click OK.
3. In the CLI, run the daem_ps command to check whether the U2000 process is started.
l If information similar to the following is displayed, the U2000 process has started.
imapwatchdog.exe 7672 Services 0 7,172
K
ResourceMonitor.exe 21280 Services 0 23,756
K
imapmrb.exe 29188 Services 0 32,760
K
imapsysd.exe 9968 Services 0 40,988
K
imapeventmgr.exe 2756 Services 0 18,452
K
imap_sysmonitor.exe 5124 Services 0 34,432
K
httpd.exe 4908 Services 0 13,476
K
httpd.exe 28900 Services 0 14,756
K
javaw.exe 24564 Services 0 72,036
K
l If no command output is displayed, the U2000 process is not started. You can run the
D:\oss\server\platform\bin\startnms.bat command in the CLI to start the U2000
process.
NOTE
l D:\oss specifies the installation path of the U2000.
l Starting the U2000 process takes about 3 minutes.
Step 3 Check the running status of every process on the System Monitor client.
1. Choose Start > All Programs > Network Management System > U2000 System
Monitor or click the shortcut icon on the desktop to start the U2000 System Monitor client.
2. In the Login dialog box, enter a user name and a password.
NOTE
Two data transmission modes are available: Common and Security(SSL) (more secure,
recommended). The default data transmission mode is Security(SSL). For details, see section How
to Set the Communication Mode on the U2000 server for the Single-Server System (Windows).
The initial password of the admin user is Changeme_123 (It is Admin_123 for a U2000 that comes
preinstalled). The password must be changed during the first login to ensure system security. Keep
the password confidential and change it regularly.
----End
Result
l If the U2000 services with the startup type of Automatic have started properly, the
U2000 runs properly.
l If some services have not started, select them, right-click, and choose Start the Service
from the shortcut menu.
l If the U2000 does not run properly, contact Huawei engineers.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
8
Follow-up Procedure
The network management system maintenance suite is used for U2000 commissioning,
maintenance, and redeployment. Generally, the MSuite server starts along with the OS.
In the Windows Task Manager dialog box, check whether msdaemon.exe and
msserver.exe are listed.
l If the two processes are listed, the MSuite server has started.
l If the two processes are not listed, the MSuite server has not started. Navigate to the C:
\OSSENGR\engineering directory of U2000 server and double-click startserver.bat to
start the MSuite server.
1.2.2 Starting the U2000 Server in a Solaris Single-Server System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
1.2.2.1 Powering On the Server Safely
This topic describes how to power on the server in a Solaris single-server system safely. The
procedure for powering on a server varies according to the server type and disk array type.
Netra T4-1/Oracle T4-1/Oracle T4-2/T5220 Server
1. Power on a Netra T4-1/Oracle T4-1/Oracle T4-2/T5220 server.
NOTICE
l Oracle SPARC T4-2 workstations support only 200 ~ 240 VAC input voltage and do
not support 100 ~ 120 VAC input voltage.
l Netra T4-1/Oracle T4-1/T5220/M4000/M5000 server supports 200 to 240 VAC and
100 to 120 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet). If the power supply is
insufficient, the server automatically stops and the high availability system fails to
trigger an active/standby switchover.
2. Wait about 2 or 3 minutes. Then switch on the power of the Netra T4-1/Oracle T4-1/Oracle
T4-2/T5220 workstation to start the server.
3. After the server is started, check indicators on the front panel. If the power indicator is
steady green, the server is powered on. If another indicator is on or blinks, the server does
not function properly. Contact the server maintenance engineers to solve the problem. The
following figure shows the positions of the power switch and power indicator.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
9
Figure 1-6 Power switch and power indicator on the Netra T4-1 server
Figure 1-7 Power switch and power indicator on the Oracle T4-1 server
Figure 1-8 Power switch and power indicator on the Oracle T4-2 server
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
10
Figure 1-9 Power switch and power indicator on the T5220 server
NOTE
l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
l If the server displays the OK prompt, enter boot. If the server does not respond, no Solaris OS has been
installed on the server.
M4000/M5000 Server
1. Power on an M4000/M5000 server.
NOTE
Configure power supply based on the rated system power requirement, see U2000 Hardware
Installation Guide (Huawei N610E cabinet). If the power supply is insufficient, the server
automatically stops and the high availability system fails to trigger an active/standby switchover.
This issue occurs frequently for the M4000/M5000 with high power consumption.
2. Insert the key delivered with the server into the key slot in the front panel of the M4000/
M5000 server, and turn the rotary switch to the Locked position labeled with , as shown
in the following figure.
Figure 1-10 Power button on the M4000/M5000 server
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
11
3. Press the power switch of the workstation, which is identified by . Wait 2 to 3 minutes.
If front indicator of the server is on (changes to steady green), the server starts up and
performs self-diagnosis.
NOTE
l Ensure that the green LED power indicator on the operation panel is lit.
l During the power-on process, it is recommended that you use a PC to log in to the controller on
an M4000/M5000 server through a serial interface and enter console -d 0 -f to view the server
start status.
l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
l If turn the rotary switch to the Service position labeled with , the server cannot access the
OS automatically, the server displays the ok prompt. Enter boot. If the server does not respond,
no Solaris OS has been installed on the server.
Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
NOTE
Power supply must be provided for the two power modules of the OceanStor S2600 and OceanStor
S3900; otherwise, the OceanStor S2600 and OceanStor S3900 fail to be used. Then press the power switch
on the controller A/B. Wait 5 to 10 minutes until the power indicator is steady green, no longer flashing,
indicating the success of the power-on.
1.2.2.2 Starting the Database
This topic describes how to start the database. The U2000 can start properly only after the
database is started.
Prerequisites
The OS has been started.
Context
Generally, the database starts along with the OS.
Procedure
Step 1 Log in to the OS as the dbuser user.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
12
NOTE
To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123.
Step 2 Ensure that the database is running.
Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 793 1 0 Sep 16 ? 0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR
dbuser 802 801 0 Sep 16 ? 0:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/insta
dbuser 795 793 0 Sep 16 ? 118:30 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt
dbuser 926 795 0 Sep 16 ? 117:45 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:1,0,0x2005f917, 10000000000, 0xd4be
dbuser 927 795 0 Sep 16 ? 63:59 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:2,0,0x2005f917, 10000000000, 0xd4be
dbuser 930 795 0 Sep 16 ? 145:24 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:5,0,0x2005f917, 10000000000, 0xd4be
dbuser 929 795 0 Sep 16 ? 69:26 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:4,0,0x2005f917, 10000000000, 0xd4be
dbuser 801 1 0 Sep 16 ? 0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR_back
dbuser 932 795 0 Sep 16 ? 56:19 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:7,0,0x2005f917, 10000000000, 0xd4be
dbuser 931 795 0 Sep 16 ? 54:25 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:6,0,0x2005f917, 10000000000, 0xd4be
dbuser 928 795 0 Sep 16 ? 90:08 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:3,0,0x2005f917, 10000000000, 0xd4be
dbuser 28591 28193 0 15:22:07 pts/1 0:00 grep sybase
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
Run the following commands to start the Sybase database if it is not running:
$ su - dbuser
NOTE
Enter the dbuser user password as prompted. The default password is Changeme_123. For system security,
modify the default password and remember the new password. For details, see How to Change the OS User
Password.
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
$ exit
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
13
Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 4664 1 0 Apr15 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser 4675 4664 32 Apr15 ? 2-22:42:47 /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/
DBSVR.log -c/opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 4688 1 0 Apr15 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 4692 4688 0 Apr15 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
If the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -sDBSVR and /opt/sybase/
ASE-15_0/bin/backupserver -SDBSVR_back, the Sybase process is running.
1.2.2.3 Starting the U2000 Server Processes
This topic describes how to start the U2000 server processes in a Solaris single-server system.
You can log in to the U2000 to manage a network only after starting the U2000 server processes
on the computer on which the U2000 is installed.
Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.
Context
l Generally, the U2000 server processes start along with the OS.
l Only one default NMS user, admin, is provided during U2000 software installation. The
admin user is a U2000 administrator with the highest rights on the U2000 system.
Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 Run the following command to check whether the U2000 processes have started:
$ daem_ps
Information similar to the following is displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
14
NOTE
If the displayed information contains imap_sysmonitor -cmd start, the U2000 processes have started.
Step 3 Run the following command to start the U2000 processes if they have not started:
$ cd /opt/oss/server/platform/bin
$ ./startnms.sh
Step 4 Perform the following operations to log in to the server GUI as the ossuser user and view the
running status of every process on the System Monitor client:
NOTICE
If the login to the server GUI is unavailable, run the svc_adm -cmd status command as the
ossuser user to view the process status.
1. Double-click the U2000 System Monitor shortcut icon on the desktop.
2. In the dialog box that is displayed, enter a U2000 user name and a password. The initial
password of the admin user is Changeme_123 (It is Admin_123 for a U2000 that comes
preinstalled). The password must be changed during the first login to ensure system
security. Keep the password confidential and change it regularly.
NOTE
Two data transmission modes are available: Common and Security(SSL). The default data
transmission mode is Security(SSL). Security(SSL) is recommended for the high security
requirements. You can run a command on the server to query the data transmission mode.
For details about how to set the communication mode for the U2000 server in a Solaris single-server
system, see How to Set the Communication Mode on the U2000 server for the Single-Server System
(Solaris).
----End
Result
l If the U2000 services with the startup type of Automatic have started properly, the
U2000 runs properly.
l If some services have not started, select them, right-click, and choose Start the Service
from the shortcut menu.
l If the U2000 does not run properly, contact Huawei engineers.
Follow-up Procedure
The network management system maintenance suite is used for U2000 commissioning,
maintenance, and redeployment. Generally, the MSuite server starts along with the OS. If the
MSuite server does not start, run the following commands:
$ su - root
password: password_of_the_root_user
# cd /opt/OSSENGR/engineering
# ./startserver.sh
Run the following command to switch back to the ossuser user:
# exit
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
15
Run the following command to check whether the network management system maintenance
suite process has started:
$ ps -ef | grep java
root 19913 19907 0 04:04:09 pts/1 0:00 grep java
...
root 18382 18311 0 03:42:33 pts/2 12:20 /opt/OSSJRE/jre_sol/bin/java -server
-Dequinox.conf=engineering/conf/installE
NOTE
If the displayed information contains /opt/OSSJRE/jre_sol/bin/java -server, the network management
system maintenance suite process has started.
1.2.3 Starting the U2000 Server in a SUSE Linux Single-Server
System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
1.2.3.1 Powering On the Server Safely
This topic describes how to power on the server in a SUSE Linux system safely. Power on the
IBM X3650M4, IBM X3650M3 or IBM X3850X5 on condition that the power supply is normal.
Server
1. Power on a IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server.
NOTICE
l IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server supports 100 to 132 VAC and
200 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet).
For the Single-Server System (SUSE Linux), if the power supply is insufficient, the
server automatically stops.
For the High Availability System (SUSE Linux), if the power supply is insufficient, the
server automatically stops and the high availability system fails to trigger an active/
standby switchover.
2. Press the power button on the chassis of the server to power on the server. In the following
figures, the power button is marked in a red frame.
NOTE
If the power button is steady green, the server has been successfully powered on. For details about
server indicators, see the manual for IBM servers or log in to the official IBM website.
Figure 1-11 Position of the power button on IBM X3650 M4
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
16
Figure 1-12 Position of the power button of the IBM X3650 M3 server
Figure 1-13 Position of the power button of the IBM X3850 X5 server
Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
NOTE
Power supply must be provided for the two power modules of the OceanStor S3900; otherwise, the
OceanStor S3900 fail to be used. Then press the power switch on the controller A / B. Wait 5 to 10 minutes
until the power indicator is steady green, no longer flashing, indicating the success of the power-on.
1.2.3.2 Starting the Database
This topic describes how to start the database. The U2000 can start properly only after the
database is started.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
17
Prerequisites
The OS has been started.
Context
Generally, the database starts along with the OS.
Procedure
Step 1 Log in to the OS as the dbuser user.
NOTE
To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123. For system security, modify the default password and remember
the new password. For details, see How to Change the OS User Password.
Step 2 Run the following command to check whether the Sybase database is running.
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 4989 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser 5003 4989 0 Sep20 ? 00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 5012 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 5016 5012 0 Sep20 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
Step 3 Run the following commands to start the Sybase database if it is not running.
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/ASE*/install
$ ./startserver -f ./RUN_DBSVR &
$ ./startserver -f ./RUN_DBSVR_back &
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l DBSVR is the name of the database server and DBSVR_back is the name of the database backup
server. These names must be consistent with the actual database names.
l View the database name and database backup server name by running the more /opt/sybase/
interfaces command.
----End
Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
18
dbuser 4989 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser 5003 4989 0 Sep20 ? 00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 5012 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 5016 5012 0 Sep20 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
1.2.3.3 Starting the U2000 Server Processes
This topic describes how to start the U2000 server processes in a SUSE Linux single-server
system. You can log in to the U2000 to manage a network only after starting the U2000 server
processes on the computer on which the U2000 is installed.
Prerequisites
The OS on the PC server on which the U2000 server processes are installed is running properly,
and the database has been started.
Context
Generally, the U2000 server processes start along with the OS.
Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 Ensure that the U2000 is running.
Run the following command to check whether the U2000 is running:
$ daem_ps
Information similar to the following is displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
NOTE
The U2000 is running if the displayed information contains imap_sysmonitor -cmd start. If no
introduction is displayed, the U2000 processes have been stopped.
Run the following command to start the U2000 if it is not running:
$ cd /opt/oss/server/platform/bin
$ ./startnms.sh
Step 3 View the running status of each process through the System Monitor on the SUSE Linux OS,
as follows:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
19
1. On the desktop of the OS, double-click the U2000 System Monitor shortcut icon.
NOTE
You can run the following commands to start the system monitor client through the CLI:
$ cd /opt/oss/client
$ ./startup_sysmonitor_global.sh
2. In the dialog box that is displayed, enter the U2000 user name and password to open the
System Monitor window. The initial password of the admin user is Changeme_123 (It is
Admin_123 for a U2000 that comes preinstalled). The password must be changed during
the first login to ensure system security. Keep the password confidential and change it
regularly.
NOTE
Two data transmission modes are available: Common and Security(SSL). The default data
transmission mode is Security(SSL). Security(SSL) is recommended for the high security
requirements. You can run a command on the server to query the data transmission mode.
For details about how to set the communication mode for the U2000 server in a SUSE Linux single-
server system, see How to Set the Communication Mode on the U2000 server for the Single-Server
System (SUSE Linux).
----End
Result
l If the U2000 services with the startup type of Automatic have started properly, the
U2000 runs properly.
l If some services have not started, select them, right-click, and choose Start the Service
from the shortcut menu.
l If the U2000 does not run properly, contact Huawei engineers.
1.2.4 Starting the U2000 Server in a Solaris High Availability System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
1.2.4.1 Powering On the Server Safely
This topic describes how to power on the server in a HA system (Solaris) safely. The procedure
for powering on a server varies according to the server type and disk array type.
Netra T4-1/Oracle T4-1/Oracle T4-2/T5220 Server
1. Power on a Netra T4-1/Oracle T4-1/Oracle T4-2/T5220 server.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
20
NOTICE
l Oracle SPARC T4-2 workstations support only 200 ~ 240 VAC input voltage and do
not support 100 ~ 120 VAC input voltage.
l Netra T4-1/Oracle T4-1/T5220/M4000/M5000 server supports 200 to 240 VAC and
100 to 120 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet). If the power supply is
insufficient, the server automatically stops and the high availability system fails to
trigger an active/standby switchover.
2. Wait about 2 or 3 minutes. Then switch on the power of the Netra T4-1/Oracle T4-1/Oracle
T4-2/T5220 workstation to start the server.
3. After the server is started, check indicators on the front panel. If the power indicator is
steady green, the server is powered on. If another indicator is on or blinks, the server does
not function properly. Contact the server maintenance engineers to solve the problem. The
following figure shows the positions of the power switch and power indicator.
Figure 1-14 Power switch and power indicator on the Netra T4-1 server
Figure 1-15 Power switch and power indicator on the Oracle T4-1 server
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
21
Figure 1-16 Power switch and power indicator on the Oracle T4-2 server
Figure 1-17 Power switch and power indicator on the T5220 server
NOTE
l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
l If the server displays the OK prompt, enter boot. If the server does not respond, no Solaris OS has been
installed on the server.
M4000/M5000 Server
1. Power on an M4000/M5000 server.
NOTE
Configure power supply based on the rated system power requirement, see U2000 Hardware
Installation Guide (Huawei N610E cabinet). If the power supply is insufficient, the server
automatically stops and the high availability system fails to trigger an active/standby switchover.
This issue occurs frequently for the M4000/M5000 with high power consumption.
2. Insert the key delivered with the server into the key slot in the front panel of the M4000/
M5000 server, and turn the rotary switch to the Locked position labeled with , as shown
in the following figure.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
22
Figure 1-18 Power button on the M4000/M5000 server
3. Press the power switch of the workstation, which is identified by . Wait 2 to 3 minutes.
If front indicator of the server is on (changes to steady green), the server starts up and
performs self-diagnosis.
NOTE
l Ensure that the green LED power indicator on the operation panel is lit.
l During the power-on process, it is recommended that you use a PC to log in to the controller on
an M4000/M5000 server through a serial interface and enter console -d 0 -f to view the server
start status.
l If the Solaris OS starts automatically on the server, the Solaris OS has been correctly installed.
l If turn the rotary switch to the Service position labeled with , the server cannot access the
OS automatically, the server displays the ok prompt. Enter boot. If the server does not respond,
no Solaris OS has been installed on the server.
Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
23
NOTE
Power supply must be provided for the two power modules of the OceanStor S2600 and OceanStor
S3900; otherwise, the OceanStor S2600 and OceanStor S3900 fail to be used. Then press the power switch
on the controller A/B. Wait 5 to 10 minutes until the power indicator is steady green, no longer flashing,
indicating the success of the power-on.
1.2.4.2 Starting the Database
This topic describes how to start the database in a Solaris high availability system. The U2000
can start properly only after the database is started.
Prerequisites
l The OS has been started.
l The server is properly connected to the network.
l The VCS service must be properly started. The VCS service has started along with the OS
and the disk is functioning properly.
Procedure
Step 1 Perform the following operations to start the Sybase database:
l GUI mode:
1. Log in to the active site as the root user.
2. Run the following command to start the VCS client:
# hagui&
3. Choose File > New Cluster from the main menu. In the dialog box that is displayed,
enter the server IP address and click OK.
NOTE
If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.
4. Enter the default user name admin and the initial password Changeme_123 for the
VCS client. Then click OK. For system security, modify the default password and
remember the new password. For detail, see How to Change the admin User Password
for Logging In to the VCS Client.
5. Ensure that all Veritas resources are in Enabled state. Use the BackupServer resource
as an example. Perform the following operations:
Expand the AppService node and then the SybaseBk node in the navigation tree, right-
click BackupServer, and check whether Enabled has been selected in the shortcut
menu. If Enabled has not been selected, select it.
6. Right-click BackupServer and choose Online > host name from the shortcut menu.
7. In the dialog box that is displayed, click Yes.
Wait until the BackupServer and DatabaseServer resource icons on the Resources
tab page are bright, which indicates that the Sybase database service has started.
l CLI mode:
1. Log in to the active site as the root user.
2. Run the following commands to query Veritas resource names:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
24
# haconf -makerw
# hares -list
Information similar to the following is displayed in a Solaris high availability system:
BackupServer Primary
DataFilesystem Primary
DatabaseServer Primary
NMSServer Primary
RVGPrimary Primary
datarvg Primary
wac Primary
Information similar to the following is displayed in a PC Linux high availability
system:
APPBOND Primaster
BackupServer Primary
DatabaseServer Primary
NMSServer Primary
RVGPrimary Primary
datarvg Primary
mountRes Primary
wac Primary
3. Run the hares -modify resource name Enabled 1 command to change the status of all
Veritas resources to Enabled. Use the resource names displayed in the previous
command output as an example. Run the following commands to change the status of
all the Veritas resources to Enabled:
For example, execute the following commands in a Solaris high availability system:
# hares -modify BackupServer Enabled 1
# hares -modify DataFilesystem Enabled 1
# hares -modify DatabaseServer Enabled 1
# hares -modify NMSServer Enabled 1
# hares -modify RVGPrimary Enabled 1
# hares -modify datarvg Enabled 1
# hares -modify wac Enabled 1
For example, execute the following commands in a PC Linux high availability system:
# hares -modify APPBOND Enabled 1
# hares -modify BackupServer Enabled 1
# hares -modify DatabaseServer Enabled 1
# hares -modify NMSServer Enabled 1
# hares -modify RVGPrimary Enabled 1
# hares -modify datarvg Enabled 1
# hares -modify mountRes Enabled 1
# hares -modify wac Enabled 1
4. Run the following command to start the Sybase database service:
# hares -online BackupServer -sys hostname
NOTE
hostname specifies the server name. You can run the hostname command to view the server
name.
----End
Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 4664 1 0 Apr15 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
25
RUN_DBSVR
dbuser 4675 4664 32 Apr15 ? 2-22:42:47 /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/
DBSVR.log -c/opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 4688 1 0 Apr15 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 4692 4688 0 Apr15 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
If the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -sDBSVR and /opt/sybase/
ASE-15_0/bin/backupserver -SDBSVR_back, the Sybase process is running.
1.2.4.3 Starting the U2000 Server Processes
This topic describes how to start the U2000 server processes in a Solaris high availability system.
You can log in to the U2000 to manage a network only after starting the U2000 server processes
on the computer on which the U2000 is installed.
Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.
Procedure
Step 1 Log in to the OS on the active site as the root user.
Step 2 Start the U2000 server processes.
l GUI mode:
1. Open a terminal window and run the following command:
# hagui&
NOTE
If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.
2. Choose Connect to cluster name.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
26
NOTE
If you are logging in to the VCS for the first time, create a new cluster.
1. Choose File > New Cluster.
2. Enter an application network IP address.
3. Click OK.
3. Set User Name and Password.
NOTE
The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.
4. Click OK.
5. In the Cluster Explorer window, select the AppService resource group in the
navigation tree, right-click, and choose Online > host name from the shortcut menu to
start the Sybase process and U2000 server processes.
NOTE
Click the Resources tab to view the start status of each resource.
Normally, the value of State for the active site is Online in the Group Status on
Member Systems area on the Status tab page, and the value of Status is Online on
host name in the Resource Status area.
NOTE
l Use the actual host name for real-world configuration.
l If a fault has occurred during the start of the AppService process, right-click AppService and
choose clear fault from the shortcut menu to rectify the fault. Then choose Online > host name
to start the AppService process.
6. In the dialog box that is displayed, click Yes.
l CLI mode:
# hagrp -online AppService -sys hostname
NOTE
l Use the actual host name for real-world configuration.
l If a fault has occurred during the start of the AppService process, run the
# hagrp -clear AppService -sys hostname
command to rectify the fault. Then run the
# hagrp -online AppService -sys hostname
command to start the AppService process.
----End
Result
1. Log in to the OS of the active site as the ossuser user.
2. Run the following command to check whether the U2000 is running:
$ daem_ps
Information similar to the following is displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
27
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd
start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
NOTE
The U2000 is running if the displayed information contains imap_sysmonitor -cmd start.
1.2.5 Starting the U2000 Server in a SUSE Linux High Availability
System
The U2000 server can be started in three steps: power on the server safely, start the database,
and start the U2000 server processes.
1.2.5.1 Powering On the Server Safely
This topic describes how to power on the server in a SUSE Linux system safely. Power on the
IBM X3650M4, IBM X3650M3 or IBM X3850X5 on condition that the power supply is normal.
Server
1. Power on a IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server.
NOTICE
l IBM X3650 M4/IBM X3650 M3/IBM X3850 X5 server supports 100 to 132 VAC and
200 to 240 VAC input voltage.
l Configure power supply based on the rated system power requirement, see U2000
Hardware Installation Guide (Huawei N610E cabinet).
For the Single-Server System (SUSE Linux), if the power supply is insufficient, the
server automatically stops.
For the High Availability System (SUSE Linux), if the power supply is insufficient, the
server automatically stops and the high availability system fails to trigger an active/
standby switchover.
2. Press the power button on the chassis of the server to power on the server. In the following
figures, the power button is marked in a red frame.
NOTE
If the power button is steady green, the server has been successfully powered on. For details about
server indicators, see the manual for IBM servers or log in to the official IBM website.
Figure 1-19 Position of the power button on IBM X3650 M4
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
28
Figure 1-20 Position of the power button of the IBM X3650 M3 server
Figure 1-21 Position of the power button of the IBM X3850 X5 server
Disk Array
NOTICE
l To prevent data loss, do not remove or insert disk modules, controllers, fibers, network cables,
or serial cables when powering on a disk array.
l To prevent disk damage and data loss, do not turn on or cut off the power supply when the
disk is accessing data. If the power supply is cut off, wait at least 1 minute before turning it
on.
Power on a disk array.
NOTE
Power supply must be provided for the two power modules of the OceanStor S3900; otherwise, the
OceanStor S3900 fail to be used. Then press the power switch on the controller A / B. Wait 5 to 10 minutes
until the power indicator is steady green, no longer flashing, indicating the success of the power-on.
1.2.5.2 Starting the Database
This topic describes how to start the database in a PC Linux high availability system. The
U2000 can start properly only after the database is started.
Prerequisites
l The OS has been started.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
29
l The server is properly connected to the network.
l The VCS service has started along with the OS and the disk is functioning properly.
Procedure
Step 1 Perform the following operations to start the Sybase database:
l GUI mode:
1. Log in to the active site as the root user.
2. Run the following command to start the VCS client:
# hagui&
3. Choose File > New Cluster from the main menu. In the dialog box that is displayed,
enter the server IP address and click OK.
NOTE
If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.
4. Enter the default user name admin and the initial password Changeme_123 for the
VCS client. Then click OK. For system security, modify the default password and
remember the new password. For detail, see How to Change the admin User Password
for Logging In to the VCS Client.
5. Ensure that all Veritas resources are in Enabled state. Use the BackupServer resource
as an example. Perform the following operations:
Expand the AppService node and then the SybaseBk node in the navigation tree, right-
click BackupServer, and check whether Enabled has been selected in the shortcut
menu. If Enabled has not been selected, select it.
6. Right-click BackupServer and choose Online > host name from the shortcut menu.
7. In the dialog box that is displayed, click Yes.
Wait until the BackupServer and DatabaseServer resource icons on the Resources
tab page are bright, which indicates that the Sybase database service has started.
l CLI mode:
1. Log in to the active site as the root user.
2. Run the following commands to query Veritas resource names:
# haconf -makerw
# hares -list
Information similar to the following is displayed in a Solaris high availability system:
BackupServer Primary
DataFilesystem Primary
DatabaseServer Primary
NMSServer Primary
RVGPrimary Primary
datarvg Primary
wac Primary
Information similar to the following is displayed in a PC Linux high availability
system:
APPBOND Primaster
BackupServer Primary
DatabaseServer Primary
NMSServer Primary
RVGPrimary Primary
datarvg Primary
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
30
mountRes Primary
wac Primary
3. Run the hares -modify resource name Enabled 1 command to change the status of all
Veritas resources to Enabled. Use the resource names displayed in the previous
command output as an example. Run the following commands to change the status of
all the Veritas resources to Enabled:
For example, execute the following commands in a Solaris high availability system:
# hares -modify BackupServer Enabled 1
# hares -modify DataFilesystem Enabled 1
# hares -modify DatabaseServer Enabled 1
# hares -modify NMSServer Enabled 1
# hares -modify RVGPrimary Enabled 1
# hares -modify datarvg Enabled 1
# hares -modify wac Enabled 1
For example, execute the following commands in a PC Linux high availability system:
# hares -modify APPBOND Enabled 1
# hares -modify BackupServer Enabled 1
# hares -modify DatabaseServer Enabled 1
# hares -modify NMSServer Enabled 1
# hares -modify RVGPrimary Enabled 1
# hares -modify datarvg Enabled 1
# hares -modify mountRes Enabled 1
# hares -modify wac Enabled 1
4. Run the following command to start the Sybase database service:
# hares -online BackupServer -sys hostname
NOTE
hostname specifies the server name. You can run the hostname command to view the server
name.
----End
Result
Run the following command to check whether the Sybase process is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 4989 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser 5003 4989 0 Sep20 ? 00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 5012 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 5016 5012 0 Sep20 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
31
1.2.5.3 Starting the U2000 Server Processes
This topic describes how to start the U2000 server processes in a PC Linux high availability
system. You can log in to the U2000 to manage a network only after starting the U2000 server
processes on the computer on which the U2000 is installed.
Prerequisites
The OS on the computer on which the U2000 server processes are installed is running properly,
and the database has been started.
Procedure
Step 1 Log in to the OS on the active site as the root user.
Step 2 Start the U2000 server processes.
l GUI mode:
1. Open a terminal window and run the following command:
# hagui&
NOTE
If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.
2. Click Connect to cluster name.
NOTE
If you are logging in to the VCS for the first time, create a new cluster.
1. Choose File > New Cluster.
2. Enter an application network IP address.
3. Click OK.
3. Set User Name and Password.
NOTE
The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.
4. Click OK.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
32
5. In the Cluster Explorer window, select the AppService resource group in the
navigation tree, right-click, and choose Online > host name from the shortcut menu to
start the Sybase process and U2000 server processes.
NOTE
Click the Resources tab to view the start status of each resource.
Normally, the value of State for the active site is Online in the Group Status on
Member Systems area on the Status tab page, and the value of Status is Online on
host name in the Resource Status area.
NOTE
l Use the actual host name for real-world configuration.
l If a fault has occurred during the start of the AppService process, right-click AppService and
choose clear fault from the shortcut menu to rectify the fault. Then choose Online > host name
to start the AppService process.
6. In the dialog box that is displayed, click Yes.
l CLI mode:
# hagrp -online AppService -sys hostname
NOTE
l hostname specifies the server name. You can run the hostname command to view the server name.
l If a fault has occurred during the start of the AppService process, run the # hagrp -clear AppService
-sys hostname command to rectify the fault. Then run the # hagrp -online AppService -sys hostname
command to start the AppService process.
----End
Result
1. Log in to the OS of the active site as the ossuser user.
2. Run the following command to check whether the U2000 is running:
$ daem_ps
Information similar to the following is displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd
start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
NOTE
The U2000 is running if the displayed information contains imap_sysmonitor -cmd start.
1.2.6 Logging In to a U2000 Client
Log in to a U2000 using the client, and then perform management operations in the GUI of the
U2000 client.
Prerequisites
Before logging in to a U2000 client, ensure that the following conditions are met:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
33
l The U2000 server has been started.
l The U2000 client communicates with the U2000 server properly.
NOTE
Run the ping peer IP address command to check the network communication.
In a single-server system, the IP address is the system IP address for the server.
In an availability system, the IP address is the NMS application network IP address for
the active site.
l The ports used between the U2000 client and the U2000 server have been enabled. For
details, see U2000 Communication Port Matrix.
l The IP address of the U2000 client is included in the ACL configured on the U2000 server.
NOTE
By default, an ACL contains all IP addresses. Setting an ACL based on security requirements is
recommended. For details, see 3.3.1.2 Setting the User ACL.
l Valid U2000 user account and password are available.
l U2000 licenses have been correctly loaded to the U2000 server.
l Using the resolution 1024 x 768 or higher is recommended. If the resolution is not used,
the U2000 client GUI may be incomplete. If the GUI contains complex elements, use a
higher resolution at the same ratio, such as 1152 x 864.
Context
l By default, if three incorrect passwords are entered consecutively, the associated user
account will be locked by the U2000. The user admin can unlock common user accounts.
The U2000 will also unlock the user account in 30 minutes.
l The password for the U2000 System Monitor must be the same as that for the U2000 client.
l Check whether the version of the client is the same as the version of server. If they are
different, you must upgrade the client or reinstall a client with the same version as the
server.
Procedure
Step 1 Log in to the OS on which the U2000 client is installed.
l On Windows, log in to the OS as the administrator user.
l On Solaris, log in to the OS GUI as the ossuser user.
Step 2 Double-click the U2000 Client shortcut icon on the desktop. The Login dialog box is displayed.
NOTE
l On Windows, double-click the startup_all_global.bat file in the client installation path, for example
D:\oss\client directory to start the U2000 client.
l On Solaris, run the ./startup_all_global.sh command in the /opt/oss/client directory to start the
U2000 client.
Step 3 In the Login dialog box, select a desired server from the Server drop-down list.
If no server has been configured, perform the following operations to add a server:
1. Click the ... button. In the Server List dialog box, click Add.
2. In the Add Server Information dialog box, set parameters for the U2000 server to be
added and click OK.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
34
Table 1-1 Server parameter settings
Parameter Settings
Name Setting this parameter to the login IP address or the related host name
is recommended.
Server name (or
IP address)
Setting this parameter to an IP address is recommended.
l In a single-server system, the IP address is the system IP address
for the server.
l In an availability system, the IP address is the NMS application
network IP address for the active site.
Secondary server
name (or IP
address)
Generally, this parameter is not set. If the U2000 server is running
in a high availability system, set this parameter to the IP address of
the standby site.
Port Two data transmission modes are available: Common and Security
(SSL) (more secure, recommended). By default, port 31037 is used
in Common mode and port 31039 is used in Security(SSL) (more
secure, recommended) mode.
Mode Two data transmission modes are available: Common and Security
(SSL). The default data transmission mode is Security(SSL).
Security(SSL) is recommended for the high security requirements.
You can run a command on the server to query the data transmission
mode.
l about how to set the communication mode for the U2000 server
and client in a Windows single-server system, see How to Set
the Communication Mode on the U2000 server for the Single-
Server System (Windows).
l about how to set the communication mode for the U2000 server
and client in a Solaris single-server system, see How to Set the
Communication Mode on the U2000 server for the Single-Server
System (Solaris).
l about how to set the communication mode for the U2000 server
and client in a SUSE Linux single-server system, see How to Set
the Communication Mode on the U2000 server for the Single-
Server System (SUSE Linux).
l about how to set the communication mode for the U2000 server
and client in a Solaris high availability system, see How to Set
the Communication Mode of the Server in a High Availability
System (Solaris, SUSE Linux).
l about how to set the communication mode for the U2000 server
and client in a SUSE Linux high availability system, see How to
Set the Communication Mode of the Server in a High
Availability System (Solaris, SUSE Linux).
NOTE
A client can log in to the U2000 server only when they work in the same
mode. If the client and server work in different modes, even if they are
installed on the same host, the client cannot log in to the server.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
35
3. In the Server List dialog box, select a server from the list and click OK.
Step 4 Enter valid user name and password, and click Login.
l The default user name is admin. The initial password of the admin user is
Changeme_123 (It is Admin_123 for a U2000 that comes preinstalled). The password must
be changed during the first login to ensure system security. Keep the password confidential
and change it regularly.
l If you attempt to connect to the server in a non-SSL mode, the client displays a dialog box
indicating security risks.
If you want to continue the connection, click Yes. If you do not want the client to display
the dialog box again upon subsequent logins, select Do not remind me next time.
NOTE
The IP address of the server being connected is saved to the allComServer.dat file in Client
installation directory\client\client\plugins\loginui\style\conf\loginui. Therefore, the Do not
remind me next time settings apply only to the connected server. If you want the client to display
the dialog box that indicates the security risks upon subsequent logins, delete the
allComServer.dat file.
If you want to terminate the connection, click No. The Login dialog box is displayed.
You can select the matched communication mode.
l If the client does not trust the server, you need to determine whether the server is trustworthy
using the server certificate.
If you confirm that the server is trustworthy, click Yes and log in to the client. If you do
not want the system to display the dialog box again, contact the system administrator to
configure a trust certificate.
If you confirm that the server is untrustworthy, click No to return to the Login dialog box
and contact the system administrator to process the issue.
l When you log in to the U2000 client, a message will be displayed asking you whether to
upgrade the client if the U2000 detects that the local computer version is earlier than the
server version.
To upgrade the client, click OK.
To return to the login window, click Cancel.
----End
Result
After the U2000 client is successfully logged in to, it automatically obtains associated data from
the U2000 server.
NOTE
After the U2000 client is successfully logged in to, if a certificate problem is prompted, accept this
certificate permanently. Click OK.
1.3 Shutting Down a U2000
This topic describes how to shut down the U2000 server and U2000 clients. The shutdown
procedure varies according to the deployment scheme.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
36
1.3.1 Shutting Down U2000 Clients
You must ensure that all U2000 clients are shut down before you shut down the U2000 server.
This topic describes how to shut down the U2000 clients.
Prerequisites
The U2000 clients must be started properly.
Procedure
Step 1 Choose File > Exit from the main menu.
Step 2 In the Confirm dialog box, click OK.
If certain operations are performed on the Main Topology but not saved, a prompt is displayed,
asking you whether to save them.
----End
1.3.2 Shutting Down the U2000 Server (Single Server System,
Windows)
Three steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, and power off the server safely.
1.3.2.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the Windows single-server system.
Prerequisites
Exit all running U2000 clients.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Ensure that the U2000 is not running.
1. Choose Start > Run. The Run window will be displayed.
2. Enter cmd and click OK.
3. In the CLI, run the daem_ps command to check whether the U2000 process is stopped.
l If no command output is displayed, the U2000 process has stopped.
l If information similar to the following is displayed, the U2000 process is not stopped.
In the CLI, run the D:\oss\server\platform\bin\stopnms.bat command to stop the
U2000 process.
imapwatchdog.exe 7672 Services 0 7,172
K
ResourceMonitor.exe 21280 Services 0 23,756
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
37
K
imapmrb.exe 29188 Services 0 32,760
K
imapsysd.exe 9968 Services 0 40,988
K
imapeventmgr.exe 2756 Services 0 18,452
K
imap_sysmonitor.exe 5124 Services 0 34,432
K
httpd.exe 4908 Services 0 13,476
K
httpd.exe 28900 Services 0 14,756
K
javaw.exe 24564 Services 0 72,036
K
NOTE
l D:\oss specifies the installation path of the U2000.
l Stopping the U2000 process takes about 3 minutes.
----End
Result
If no command output is displayed after the daem_ps command is executed, the U2000 process
has stopped.
1.3.2.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the Windows single-server system.
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Choose Start > All Programs > Microsoft SQL Server 2008 > Configuration Tools > SQL
Server Configuration Manager > SQL Server Services.
Step 3 Right-click SQL Server (MSSQLSERVER) and choose Stop to stop the database.
NOTE
If the SQL Server 2000 is installed in Windows Server 2003, choose Start > All Programs > Microsoft
SQL Server > Service Manager. The SQL Server Service Manager dialog box is displayed. Then, click
Stop. Then, click Yes.
----End
Result
Two methods are available for checking whether the SQL Server database can connect normally.
l Through the CLI:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
38
1. Choose Start > Run.
2. In the Run dialog box, enter cmd. A command line interface (CLI) is displayed.
3. Run the following commands:
> isql -Usa -SDBSVR
NOTE
l DBSVR specifies the database name.
l Enter the database sa user password as prompted.
l The prompt C:\> varies according to on-site conditions. If the system is logged in to as
the Administrator user, the default prompt is C:\Users\Administrator>. You can
run the cd command to switch the directory. A command example is
C:\Users\Administrator> cd c:\
The command prompt switches to c:\>.
If the displayed information includes 1>, you can connect to the database normally,
that is, the database is shutted down. Otherwise, the database is started.
l Through the GUI:
1. Click Start > All Programs > Microsoft SQL Server 2008 > SQL Server
Management Studio. The Connect to Server window is displayed.
2. Set parameters according to the following information and then click Connect.
Server type: Database Engine
Server name: DBSVR
Authentication: Windows Authentication
If the displayed SQL Server Management Studio window prompted, you can
connect to the database normally, that is, the database is started. Otherwise, the
database is shutted down.
1.3.2.3 Powering Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the Windows single-server system safely.
Prerequisites
l The U2000 server processes must have been stopped.
l The database must have been shut down.
Procedure
Step 1 Log in to the OS as a user with administrator rights.
Step 2 Choose Start > Shut down to shut down the Windows OS.
Step 3 If a KVM is equipped, power off the KVM switcher.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
39
1.3.3 Shutting Down the U2000 Server (Single Server System,
Solaris)
Three steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, and power off the server safely.
1.3.3.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the Solaris single-server system.
Prerequisites
Exit all running U2000 clients.
Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 To check the running status of the U2000 process, run the following command:
Run the following command to check whether the U2000 is running:
$ daem_ps
Information similar to the following is displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
NOTE
The U2000 is running if the displayed information contains imap_sysmonitor -cmd start. If no
introduction is displayed, the U2000 processes have been stopped.
Step 3 Run the following commands to stop U2000 if it is running:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
----End
Result
Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE
The process is stopped if the displayed information is empty.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
40
1.3.3.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the Solaris single-server system.
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Log in to the OS as the dbuser user.
NOTE
To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123.
Step 2 Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 793 1 0 Sep 16 ? 0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR
dbuser 802 801 0 Sep 16 ? 0:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/insta
dbuser 795 793 0 Sep 16 ? 118:30 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt
dbuser 926 795 0 Sep 16 ? 117:45 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:1,0,0x2005f917, 10000000000, 0xd4be
dbuser 927 795 0 Sep 16 ? 63:59 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:2,0,0x2005f917, 10000000000, 0xd4be
dbuser 930 795 0 Sep 16 ? 145:24 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:5,0,0x2005f917, 10000000000, 0xd4be
dbuser 929 795 0 Sep 16 ? 69:26 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:4,0,0x2005f917, 10000000000, 0xd4be
dbuser 801 1 0 Sep 16 ? 0:00 /usr/bin/sh /opt/sybase/ASE-15_0/
install/RUN_DBSVR_back
dbuser 932 795 0 Sep 16 ? 56:19 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:7,0,0x2005f917, 10000000000, 0xd4be
dbuser 931 795 0 Sep 16 ? 54:25 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:6,0,0x2005f917, 10000000000, 0xd4be
dbuser 928 795 0 Sep 16 ? 90:08 /opt/sybase/ASE-15_0/bin/dataserver
-ONLINE:3,0,0x2005f917, 10000000000, 0xd4be
dbuser 28591 28193 0 15:22:07 pts/1 0:00 grep sybase
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
Step 3 Run the following commands to stop the Sybase database if it is running:
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/OCS*/bin
$ ./isql -SDBSVR -Usa
NOTE
Enter the database sa user password as prompted.
1> shutdown SYB_BACKUP
2> go
1> shutdown
2> go
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
41
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l Enter the database sa user password as prompted.
l Information similar to the following is displayed. The error message does not affect the shutdown of
the database.
Server SHUTDOWN by request.
ASE is terminating this process.
CT-LIBRARY error:
ct_results(): network packet layer: internal net library error: Net-
Library operation terminated due to disconnect
----End
Result
Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
NOTE
The database is stopped if the displayed information does not contain /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
1.3.3.3 Power Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the Solaris single-server system safely.
Prerequisites
l The U2000 server processes must have been stopped.
l The database must have been shut down.
Procedure
Step 1 Log in to the Solaris OS as user root.
Step 2 Run the following commands to power off the server:
# sync;sync;sync;sync
# shutdown -y -g0 -i5
Step 3 If a KVM is equipped, power off the KVM switcher.
----End
1.3.4 Shutting Down the U2000 Server (Single Server System, SUSE
Linux)
Three steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, and power off the server safely.
1.3.4.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
42
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the SUSE Linux single-server system.
Prerequisites
All running U2000 clients have been stopped.
Procedure
Step 1 Log in to the OS of the server as the ossuser user.
Step 2 To check the running status of the U2000 process, run the following command:
$ daem_ps
A message similar to the following will be displayed:
ossuser 27069 1 0 10:31:39 ? 1:39 imapmrb
ossuser 27079 1 0 10:31:39 ? 0:00 imapwatchdog -cmd start
ossuser 27075 1 0 10:31:39 ? 0:50 imapsysd -cmd start
ossuser 27086 1 0 10:31:39 ? 0:09 imapeventmgr
ossuser 23679 1 1 17:57:06 pts/8 0:02 imap_sysmonitor -cmd start
ossuser 27116 1 0 10:31:40 ? 0:52 ResourceMonitor -cmd start
NOTE
The U2000 is running if the displayed information contains imap_sysmonitor -cmd start.
Step 3 Run the following commands to stop U2000 if it is running:
$ cd /opt/oss/server/platform/bin
$ ./stopnms.sh
----End
Result
Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE
The process is stopped if the displayed information is empty.
1.3.4.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the SUSE Linux single-server system.
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Log in to the OS as the dbuser user.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
43
NOTE
To switch to the dbuser user, run the su - dbuser command. After the U2000 is installed, the password
for the dbuser user is Changeme_123. For system security, modify the default password and remember
the new password. For details, see How to Change the OS User Password.
Step 2 Run the following command to check whether the Sybase database is running.
$ ps -ef | grep sybase
Information similar to the following is displayed:
dbuser 4989 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR
dbuser 5003 4989 0 Sep20 ? 00:00:14 /opt/sybase/ASE-15_0/bin/dataserver
-sDBSVR -d/opt/sybase/data/lv_master -e/opt/sybase/ASE-15_0/install/DBSVR.log -c/
opt/sybase/ASE-15_0/DBSVR.cfg -M/opt/sybase/ASE-15_0
dbuser 5012 1 0 Sep20 ? 00:00:00 /bin/sh /opt/sybase/ASE-15_0/install/
RUN_DBSVR_back
dbuser 5016 5012 0 Sep20 ? 00:00:00 /opt/sybase/ASE-15_0/bin/
backupserver -SDBSVR_back -e/opt/sybase/ASE-15_0/install/DBSVR_back.log -N25 -C20 -
M/opt/sybase/ASE-15_0/bin/sybmultbuf
...
NOTE
The database is running if the displayed information contains /opt/sybase/ASE-15_0/bin/dataserver -
sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
Step 3 Run the following commands to stop the Sybase database if it is running:
$ . /opt/sybase/SYBASE.sh
$ cd /opt/sybase/OCS*/bin
$ ./isql -SDBSVR -Usa
NOTE
Enter the database sa user password as prompted.
1> shutdown SYB_BACKUP
2> go
1> shutdown
2> go
NOTE
l Leave a space between the dot (.) and the command /opt/sybase/SYBASE.sh.
l Enter the database sa user password as prompted.
l Information similar to the following is displayed. The error message does not affect the shutdown of
the database.
Server SHUTDOWN by request.
ASE is terminating this process.
CT-LIBRARY error:
ct_results(): network packet layer: internal net library error: Net-
Library operation terminated due to disconnect
----End
Result
Run the following command to check whether the Sybase database is running:
$ ps -ef | grep sybase
NOTE
The database is stopped if the displayed information does not contain /opt/sybase/ASE-15_0/bin/
dataserver -sDBSVR and /opt/sybase/ASE-15_0/bin/backupserver -SDBSVR_back.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
44
1.3.4.3 Powering Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the U2000 single-server system (SUSE Linux) .
Prerequisites
l The U2000 server processes must have been stopped.
l The database must have been shut down.
Procedure
Step 1 Log in to the OS as the root user.
Step 2 Run the following commands to shut down the OS.
# sync;sync;sync;sync
# shutdown -h now
----End
1.3.5 Shutting Down the U2000 Server in a High Availability System
(Solaris)
Four steps are required to shut down the U2000 server in a high availability system (Solaris):
stop the U2000 server processes, shut down the database, stop the VCS service, and power off
the server safely.
1.3.5.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the Solaris HA system.
Prerequisites
Exit all running U2000 clients.
Procedure
Step 1 Log in to the OS of the active site as the root user.
Step 2 Stop the U2000 server processes.
l GUI mode:
1. Open a terminal window, run the following command:
# hagui&
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
45
NOTE
If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.
2. Click Connect to Cluster name.
NOTE
If you are logging in to the VCS for the first time, you need to create a new Cluster.
1. Click File > New Cluster.
2. Enter the IP address of application network.
3. Click OK.
3. Enter the user name and password for VCS login.
NOTE
The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.
4. Click OK.
5. Choose AppService from the navigation tree.
6. Click the Resources tab. Right-click NMSServer and choose Offline > Host name
from the shortcut menu. In the Question dialog box, click Yes.
Wait about 1 minute. If the NMSServer icon changes to grey, the U2000 processes
have been stopped.
l CLI mode:
# hares -offline NMSServer -sys hostname
Step 3 Ensure that the U2000 is not running.
1. Log in to the OS of the active site as the ossuser user.
2. Run the following command to check the running status of the U2000 process:
$ daem_ps
Information similar to the following is displayed:
ossuser 26225 1 0 09:16:02 ? 0:00 imapwatchdog -cmd start -type
standby
ossuser 26225 1 0 09:16:03 ? 0:01 ResourceMonitor -cmd start
3. Run the following commands to stop the U2000 processes:
$ su - root
Password: root user password
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
46
# hares -offline NMSServer -sys hostname
# exit
4. Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE
The process is stopped if the displayed information is empty.
----End
1.3.5.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the HA system.
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Perform the following operations to disable the Sybase database service at the primary site in
the HA system:
NOTE
By default, the Sybase database service at the secondary site is not running.
l GUI mode:
1. Log in to the primary site as user root.
2. Run the following command to start the VCS client at the primary site:
# hagui&
3. Choose File > New Cluster from the main menu. In the window that is displayed, enter
the IP address of the server and click OK.
NOTE
If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.
4. Enter the default user name admin and the initial password Changeme_123 for the
VCS client. For system security, modify the default password and remember the new
password. For detail, see How to Change the admin User Password for Logging In to
the VCS Client. Then click OK.
5. On the VCS client of the primary site, right-click the NMSServer node and choose
Offline > hostname from the shortcut menu.
6. In the confirmation dialog box, click Yes.
7. After the NMSServer node is dimmed, right-click the BackupServer node and choose
Offline > hostname from the shortcut menu.
8. In the confirmation dialog box, click Yes.
9. After the BackupServer node is dimmed, right-click the DatabaseServer node and
choose Offline > hostname from the shortcut menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
47
10. In the confirmation dialog box, click Yes.
l CLI mode:
1. Log in to the primary site as user root.
2. Run the following command to shut down the U2000:
# hares -offline NMSServer -sys hostname
3. Run the following command to disable the Sybase database service:
# hares -offline BackupServer -sys hostname
# hares -offline DatabaseServer -sys hostname
NOTE
hostname specifies the server name. You can run the hostname command to view the server name.
Run the following command to check whether the Sybase database service is disabled:
# ps -ef | grep sybase
If the following message is displayed, the Sybase database service has been disabled:
root 9629 14603 0 07:46:52 pts/3 0:00 grep sybase
----End
1.3.5.3 Stopping the VCS Service
This topic describes how to stop the VCS service.
Prerequisites
The U2000 and database must have been shut down.
Context
Before powering off the server safely, manually stop the VCS service; otherwise, the server may
fail to shut down properly.
Procedure
Step 1 Log in to the OS on the server as the root user.
Step 2 Run the following command to stop the VCS service:
# hastop -all -force
----End
1.3.5.4 Power Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the Solaris HA system safely.
Prerequisites
l The U2000 server processes must have been stopped.
l The database must have been shut down.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
48
l The VCS services must have been shut down.
Procedure
Step 1 Log in to the Solaris OS as user root.
Step 2 Run the following commands to power off the server:
# sync;sync;sync;sync
# shutdown -y -g0 -i5
Step 3 If a KVM is equipped, power off the KVM switcher.
----End
1.3.6 Shutting Down the U2000 Server in a High Availability System
(PC Linux)
Four steps are required to shut down the U2000 server: stop the U2000 server processes, shut
down the database, stop the VCS service, and power off the server safely.
1.3.6.1 Stopping the U2000 Server Processes
Do not stop the U2000 server processes when the U2000 server is managing NEs. Stop the
U2000 server processes only for some special purposes, for example, changing the system time
of the computer where the server is installed or upgrading the version. This topic describes how
to stop the U2000 server processes on the SUSE Linux HA system.
Prerequisites
Exit all running U2000 clients.
Procedure
Step 1 Log in to the OS of the active site as the root user.
Step 2 Stop the U2000 server processes.
l GUI mode:
1. Open a terminal window, run the following command:
# hagui&
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
49
NOTE
If the login dialog box is not displayed and a message appears indicating that the current status
is STALE_ADMIN_WAIT, run the # hasys -force host name of node command.
2. Click Connect to Cluster name.
NOTE
If you are logging in to the VCS for the first time, you need to create a new Cluster.
1. Click File > New Cluster.
2. Enter the IP address of application network.
3. Click OK.
3. Enter the user name and password for VCS login.
NOTE
The default VCS user name is admin and the default password is Changeme_123. To ensure
system security, change the default password in time. If the default password has been changed,
enter the new password.
4. Click OK.
5. Choose AppService from the navigation tree.
6. Click the Resources tab. Right-click NMSServer and choose Offline > Host name
from the shortcut menu. In the Question dialog box, click Yes.
Wait about 1 minute. If the NMSServer icon changes to grey, the U2000 processes
have been stopped.
l CLI mode:
# hares -offline NMSServer -sys hostname
NOTE
hostname specifies the server name. You can run the hostname command to view the server name.
Step 3 Ensure that the U2000 is not running.
1. Log in to the OS of the active site as the ossuser user.
2. Run the following command to check the running status of the U2000 process:
$ daem_ps
Information similar to the following is displayed:
ossuser 26225 1 0 09:16:02 ? 0:00 imapwatchdog -cmd start -type
standby
ossuser 26225 1 0 09:16:03 ? 0:01 ResourceMonitor -cmd start
3. Run the following commands to stop the U2000 processes:
$ su - root
Password: root user password
# hares -offline NMSServer -sys hostname
# exit
4. Run the following command to check the running status of the U2000 process:
$ daem_ps
NOTE
The process is stopped if the displayed information is empty.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
50
1.3.6.2 Shutting Down the Database
The U2000 can start properly only after the database is started. Before shutting down the
database, stop the U2000 server processes. This topic describes how to shut down the database
on the HA system.
Prerequisites
The U2000 server processes must have been stopped.
Procedure
Step 1 Perform the following operations to disable the Sybase database service at the primary site in
the HA system:
NOTE
By default, the Sybase database service at the secondary site is not running.
l GUI mode:
1. Log in to the primary site as user root.
2. Run the following command to start the VCS client at the primary site:
# hagui&
3. Choose File > New Cluster from the main menu. In the window that is displayed, enter
the IP address of the server and click OK.
NOTE
If you are not logging in to the VCS client for the first time, click a server record in the information
list in the Cluster Monitor window.
4. Enter the default user name admin and the initial password Changeme_123 for the
VCS client. For system security, modify the default password and remember the new
password. For detail, see How to Change the admin User Password for Logging In to
the VCS Client. Then click OK.
5. On the VCS client of the primary site, right-click the NMSServer node and choose
Offline > hostname from the shortcut menu.
6. In the confirmation dialog box, click Yes.
7. After the NMSServer node is dimmed, right-click the BackupServer node and choose
Offline > hostname from the shortcut menu.
8. In the confirmation dialog box, click Yes.
9. After the BackupServer node is dimmed, right-click the DatabaseServer node and
choose Offline > hostname from the shortcut menu.
10. In the confirmation dialog box, click Yes.
l CLI mode:
1. Log in to the primary site as user root.
2. Run the following command to shut down the U2000:
# hares -offline NMSServer -sys hostname
3. Run the following command to disable the Sybase database service:
# hares -offline BackupServer -sys hostname
# hares -offline DatabaseServer -sys hostname
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
51
NOTE
hostname specifies the server name. You can run the hostname command to view the server name.
Run the following command to check whether the Sybase database service is disabled:
# ps -ef | grep sybase
If the following message is displayed, the Sybase database service has been disabled:
root 9629 14603 0 07:46:52 pts/3 0:00 grep sybase
----End
1.3.6.3 Stopping the VCS Service
This topic describes how to stop the VCS service.
Prerequisites
The U2000 and database must have been shut down.
Context
Before powering off the server safely, manually stop the VCS service; otherwise, the server may
fail to shut down properly.
Procedure
Step 1 Log in to the OS on the server as the root user.
Step 2 Run the following command to stop the VCS service:
# hastop -all -force
----End
1.3.6.4 Power Off the Server Safely
Before shutting down the U2000 server, stop the U2000 server processes and the database. This
topic describes how to power off the U2000 HA System (SUSE Linux, PC Server).
Prerequisites
l The U2000 server processes must have been stopped.
l The database must have been shut down.
l The VCS services must have been shut down.
Procedure
Step 1 Log in to the OS as the root user.
Step 2 Run the following commands to shut down the OS.
# sync;sync;sync;sync
# shutdown -h now
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
52
1.4 Using the Workbench and Favorites Folder
This topic describes how to use the workbench and the favorites folder of commonly used
functions to rapidly locate the commonly used functions of the U2000.
1.4.1 Placing a Shortcut Icon on the Workbench
This topic describes how to place the shortcut icons of the commonly used functions on the
workbench and create function links. You can use the shortcut icons to improve operation
efficiency.
Context
If + is appended to a menu option on the main menu of the NMS, you can create the shortcut of
this menu option on the workbench.
Procedure
Step 1 In the main window of the U2000, click the drop-down arrow next to and select Style of
Desktop to access the workbench.
Step 2 Right-click Workbench and choose Create Shortcut from the shortcut menu.
Step 3 In the Create Shortcut dialog box, select the function to be added with a shortcut icon.
Step 4 Click Create. The shortcut icon of the function is displayed on the workbench.
----End
1.4.2 Adding a Common Function to the Favorites Folder
This topic describes how to add a common function to the favorites folder. You can easily open
a common function view using the customized favorites folder.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
53
Prerequisites
The U2000 client has been started successfully.
Context
When the NMS is started for the first time, the shortcut function view of the favorites folder is
displayed as a floating window on the Workbench. The default shortcut nodes, such as the alarm,
and Main Topology are displayed in the floating window.
Procedure
Step 1 Click the drop-down arrow next to on the toolbar.
Step 2 In the drop-down list that is displayed, select Style of Favorites Folder.
Step 3 In the Workbench window, right-click Default Workbench.
Step 4 Choose Add Menu Shortcut from the shortcut menu.
Step 5 The Add Menu Shortcut window is displayed.
Step 6 Select the node to be added to the favorites folder, and click Create.
----End
Result
The added node is displayed under Default Workbench in the favorites folder.
1.4.3 Viewing Common Functions
This topic describes how to view common functions on the workbench or in the favorites folder.
Prerequisites
The U2000 client has been started successfully.
Context
When the NMS is started for the first time, the shortcut function view of the favorites folder is
displayed as a floating window on the Workbench. The default shortcut nodes, such as the alarm,
and Main Topology are displayed in the floating window.
Procedure
Step 1 Click the drop-down arrow next to on the toolbar.
Step 2 In the drop-down list that is displayed, select Style of Desktop or Style of Favorites Folder.
Step 3 If Style of Desktop is selected, the Workbench window is displayed, and the common functions
are displayed as floating icons.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
54
Step 4 If Style of Favorites Folder is selected, the Workbench dialog box is displayed. If you click
+ in the front of Default Workbench or double-click Default Workbench, the common
functions are expanded.
----End
Follow-up Procedure
Right-click a common function and delete or modify it.
1.5 Setting the Character Set of an NE
To meet global requirements, the U2000 provides the function of setting or modifying NE
character sets to prevent garbled characters caused by language change.
1.5.1 Character Set
This topic describes the character sets on the U2000 and the precautions for setting character
sets.
If the character set that an NE transfers to the U2000 is different from the character set of the
internal data (NE source file) on the U2000, the data transferred to the U2000 is displayed as
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
55
garbled characters. The data that the U2000 applies to the NE is also displayed as garbled
characters, resulting in failure in reading the NE.
Introduction of Character Set on the U2000
Character Set Description
GBK Chinese character set which indicates that the
NEs support only Chinese characters.
ISO-8859-1 Latin character set which indicates that the
NEs support only western-Europe characters.
UTF-8 Unicode encoding mode which indicates that
the NEs support Chinese, English, Spanish,
Russian, German, Portuguese, Italian,
French, and Arabic characters.
Description of Character Sets on the U2000
l Modifying character sets is not allowed. Character sets are set only when garbled characters
are displayed. The setting rules are as follows:
U2000 Language Character Set
Chinese GBK
English ISO-8859-1
Spanish
Russian
German
Portuguese
Italian
French
Arabic
UTF-8
l In the case of the MSTP series, WDM series, RTN series, PTN series, router series, and
switch series NEs, if the character sets on an NE are changed, the U2000 refreshes the
character sets in real time so that the character sets on the U2000 are the same as those of
the NE. At the same time, the U2000 notifies the user by means of an event that the NE
character sets are changed.
l In the case of a new NE, if the data on the U2000 is displayed as garbled characters or the
language changes, you can query and modify the character set attribute of a single NE or
NEs in batches in the NE Character Set Management window.
l In the case of an old NE, the character set cannot be modified because an old NE does not
have the character set attribute interface. In the NE Character Set Management window,
if the queried NE is an old NE, the related record is dimmed.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
56
NOTE
l Modifying character sets is not a commonly performed operation. Generally, it is not allowed to modify
character sets. If you change the character set incorrectly, characters may be garbled. If you change the
character set to UTF-8, characters on the NE may be truncated.
l If there is a definite multi-language requirement and the character set needs to be changed to UTF-8,
convert the original character sets according to the guide for related NEs to ensure that the original
data is normally displayed.
Relationship Between Characters and Bytes
Generally, in user manuals, the description of the restrictions on entering characters in text boxes
is specific to English characters. For the restrictions on other languages, see the following table
and calculate the occupied bytes of each language.
Language Bytes occupied by a character
Chinese 3
English 1
Spanish 3
Russian 3
German 3
Portuguese 3
Italian 3
French 3
Arabic 2
List of New NEs
The NEs supporting the preceding nine languages are globalized NEs. The NEs that are
globalized are new NEs, whereas the NEs that are not planned with globalization are old NEs.
The following table lists the NEs that are globalized.
Field NE
Access MA5600T V800R008 and later versions, MxU
V800R308 and later versions, MA5600 V300R003 and
later versions, UA5000V100R019 and later versions
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
57
Field NE
Transport OSN 9800 U32/U64 V100R001 and later versions, OSN
8800 T16/T32/T64 V100R005 and later versions, OSN
6800/3800 V100R005 and later versions, OSN 6800A/
3800A V100R005 and later versions, OSN 1800
V100R002 and later versions, OSN 1600S V100R004
and later versions, OSN 7500/3500/2500/1500
V100R010 and later versions, Metro 1000 V300R007 and
later versions, OSN 500 V100R003 and later versions,
RTN 900 V100R002 and later versions, RTN 600
V100R004 and later versions
IP Router NE40E&80E V300R008 and later versions,
NE40E&80E V300R009 and later versions, NE5000E
V600R001 and later versions
PTN Chassis-shaped (PTN3900/1900) V100R002C02 and
later versions, Box-shaped (PTN950/910/912)
V100R002C01 and later versions
Switch Switch 93 V100R003 and later versions
1.5.2 Setting or Modifying Character Sets
If the character set that an NE transfers to the U2000 is different from the character set of the
internal data (NE source file) on the U2000, the data transferred to the U2000 is displayed as
garbled characters. The data that the U2000 applies to the NE is also displayed as garbled
characters, resulting in failure in reading the NE. The U2000 provides the function of querying
or modifying character sets of NEs to help users manage the NE data.
Prerequisites
You have logged in to the U2000 client as user admin.
Context
NOTICE
The setting of an error character set may cause garbled characters.
l If multiple languages are required when an NE is created, set the character set to UTF-8
to support multiple language entering.
l If multiple languages are required when an NE is upgraded, set the character set of the NE
to UTF-8 to support multiple language entering.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
58
l If garbled characters are displayed after an NE is upgraded and the character set is set on
the NE, you can restore the setting to the original character set.
Procedure
Step 1 Choose Configuration > NE Batch Configuration > NE Charset Management (traditional
style) from the main menu or select Fix-Network NE Configuration in Application Center
and choose Configuration > NE Batch Configuration > NE Charset Management
(application style) from the main menu.
Step 2 In the NE Character Set Management window, select one or more NEs in the left pane and
click .
Step 3 Click Close in the Result dialog box.
Step 4 Click the Query button in the lower right corner.
Step 5 Click Close in the Result dialog box.
Step 6 Select one or more NEs to be modified, right-click in the Character Set column and then choose
the desired character set from the shortcut menu.
NOTE
You can hold down Shift or Ctrl to select multiple NEs, and set or modify character sets in batches.
Step 7 After setting or modifying the character set, click Apply.
Step 8 In the Warning dialog box, click Yes.
Step 9 In the Result dialog box, click Close.
----End
1.6 Main Windows and Common Operations of the U2000
This topic describes the main windows of the U2000 client. Learning about the main windows
helps you locate entrances to operations quickly, which increase your operation efficiency.
1.6.1 Client GUI in the Application Style
The application style is a new GUI style. It improves usability of the U2000 as a whole and
facilitates common function search and management.
Initial Window
Figure 1-22 shows the GUI after you log in to the client.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
59
Figure 1-22 Initial window
NOTE
If you have added functions to the My Favorites tab, the My Favorites tab is displayed after you log in
to the client.
Figure 1-23 shows the GUI after you click . Table 1-2 describes Figure 1-23.
Figure 1-23 Application style window
1
2
3
4
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
60
Table 1-2 Application style window
No. Name Description
1 Menu Bar Shows the main menu of the system.
2 Toolbar Shows the shortcut icons for key operation tasks.
3 Output Pane Displays results of operations performed during the U2000
running.
4 Status Bar Displays the status information of the system, such as the current
user and the IP address of the connected server.
Menu Bar
The U2000 client menu bar consists of the File, My Favorites, Window, and Help menus.
Toolbar
The toolbar provides shortcut icons for system management. Table 1-3 describes the shortcut
icons for system management and their functions.
Table 1-3 Shortcut icons for system management
Icon Name Description
Application
Panel
Switches from the initial window to the application style
window. After you open the main window of a function from the
application window, you can click the application panel icon to
switch back to the application window.
Exit You can terminate client programs and exit the current U2000
client.
Log out You can log out of the current U2000 client without the
termination of client programs.
Lock Terminal If the client is locked, you are not allowed to perform operations
on the client. You must enter the correct password to unlock the
client.
Full Screen By using this icon, the menu bar, toolbar, output window, and
status bar can be hidden, and therefore the main window can
have more space. You can press Esc to exit the full screen mode.
Output Pane
The output pane displays the echo message of the operation performed when the U2000 is
running, such as the initialization message when you log in to the server.
Status Bar
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
61
The status bar displays the information such as the system status, the login users, and the IP
address of the connected server. The information displayed from left to right is as follows:
l Server: Displays the name and IP address used for logging in to the server.
l Login user: Displays the name of the login user.
l Connection duration: Displays the client time in real time.
l System pop-up pane: Displays a message in real time when an operation on the server
affects client operations. For example, after the user opens the Security Management
window, if a user, user group, or operation set is added or deleted on the U2000, the system
pop-up pane displays a message.
NOTE
To enable or disable the function of displaying a message, right-click the icon of the system pop-up
pane and choose Enable or Disable.
l Login mode: Displays the login mode. It can be single-user mode and multi-user mode.
l Connection status: Displays the status of the connection between the client and the server.
When the client is disconnected from the server, the icon on the status bar is changed from
to , and then to . When the status of the alarm indicator changes to , a
disconnection sound is available.
l Logo: Displays the logo of Huawei Technologies Co., Ltd..
Application Center
Figure 1-24 shows the GUI after you log in to the client. The application center provides
common applications, such as fault management applications. Table 1-4 describes the
operations that can be performed on the Application Center tab.
Figure 1-24 Application Center tab
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
62
Table 1-4 Operations on the Application Center tab
Operation Details
Accessing applications Double-click an application to open the main window of the
application.
Browsing application
functions and opening
function windows
Right-click an application to browse all functions of the
application listed on the shortcut menu. Choose a function to open
the main window of the function.
NOTE
You can click next to a function to add the function to the My
Favorites tab.
Table 1-5 shows the functions of applications in the application center.
Table 1-5 Function of the applications
Application Function
Alarm Monitor Allows you to manage alarms and events, for
example, monitoring, querying, and
collecting statistics on alarms and events.
These applications help you promptly
diagnose and troubleshoot network or device
faults.
Topo View Constructs and manages topologies of the
entire network to monitor its running status in
real time. The topology management enables
maintenance personnel to manage NEs and
links.
Fix-Network NE Configuration Configures NEs in batches, configures
profiles, manages access services, deploys
FTTx services, configures NE
communication parameters, manages
inventories, and manages network security.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.
Bearer Network Service Configuration Queries, configures, and manages E2E
services.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
63
Application Function
Fix-Network NE Software Management Backs up NE data, restores NE data, upgrades
NE software, downgrades NE software,
manages NE logs, and manages licenses.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.
System Settings Monitors NMS systems, backs up and
restores NMS data, manages centralized
tasks, manages licenses, and configures NMS
systems.
Security Management Manages NMS user rights, security policies,
NE security, NMS licenses, and logs.
Fix-Network Performance Collects historical performance data,
monitors performance data in real time,
displays statistics, and generates performance
NBI data.
NOTE
Applies to the MSTP series, WDM series, WDM
(NA) series, RTN series, PTN series, marine
series, Router series, Switch series, Access series
and Security NEs.
IMS&NGN Service Management Manages NGN test beds, query IMS users,
and manages NGN service configuration.
NOTE
Applies to the Core Network NEs.
CN Dual Homing Management Provides a disaster recovery mechanism. It
prevents network services from being
interrupted when softswitches break down or
an unexpected disaster occurs, and ensures
uninterrupted emergent communications.
NOTE
Applies to the Core Network NEs.
Operation Tools Provides O&M tools to manage NEs.
Configuration Views NE configuration and monitors NE
resource status.
NOTE
Applies to the Core Network NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
64
Application Function
Performance Provides the performance measurement and
management function and provides reliable
data for network measurement, design, and
operation management. Users can collect
data for verifying NE security, running status,
and system resource usage. Users can view
and analyze the data.
NOTE
Applies to the Core Network NEs.
Software Management Manages NE upgrades, files and licenses and
backs up files.
NOTE
Applies to the Core Network NEs.
My Favorites
Figure 1-25 shows the GUI after you click My Favorites.
Figure 1-25 My Favorites tab
You can add common functions to the My Favorites tab for quick access to the main windows
of the functions. You can also create folders on the My Favorites tab page to classify the
functions. To create a folder, perform the following steps:
1. On the My Favorites tab page, right-click the My Favorites node in the navigation tree
and choose New Folder from the shortcut menu.
2. In the Create Folder dialog box, enter a folder name and click OK.
NOTE
l You can right-click a function under the My Favorites node and choose Copy from the shortcut menu
to copy the function, and then right-click a function and choose Paste from the shortcut menu to paste
the function to the folder.
l You can right-click a folder and choose Delete or Rename from the shortcut menu to delete or rename
the folder respectively.
l Before deleting a folder under the My Favorites node, delete all the functions contained in the folder.
l You can open the main window of a function that has been added to the My Favorites tab page using
the My Favorites menu on the menu bar.
l You can add a maximum of 20 folders on the My Favorites tab page and the total number of favorite
functions can be 200.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
65
Function Search
On this tab, you can enter a keyword to search for functions. The U2000 supports fuzzy matching
by Function or Menu Path. Figure 1-26 shows the GUI displayed after you conduct a function
search.
Figure 1-26 Function Search tab
Either of the following results is achieved:
l No functions are found.
l Functions that meet the search criteria are listed.
: indicates that a function can be added to the My Favorites tab page. Click
next to the function. In the Add to Favorite dialog box, select a folder from the
Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab page.
NOTE
If no folder exists under the My Favorites node, the Add to Favorite dialog box does not appear
when you click .
: indicates that a function has been added to the My Favorites tab.
No icon next to a function indicates that the function cannot be added to the My
Favorites tab.
NOTE
You can double-click a function in the list to open the main window of the function.
1.6.2 Quick Start for Clients in the Application Style
This topic provides some suggestions on using clients in the application style the first time.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
66
Context
l If you have added functions to the My Favorites tab, the tab is displayed after you log in
to a client.
l My Favorites is recommended for quick access to the functions that you want. The legends
related to the My Favorites tab are described as follows:
: indicates that a function can be added to the My Favorites tab page. Click
next to the function. In the Add to Favorite dialog box, select a folder from the
Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab page.
NOTE
If no folder exists under the My Favorites node, the Add to Favorite dialog box does not appear
when you click .
: indicates that a function has been added to the My Favorites tab.
No icon next to a function indicates that the function cannot be added to the My
Favorites tab.
Procedure
Step 1 Log in to a client the first time. On the Application Center tab page, right-click an application
to display its functions on the shortcut menu. Click next to a function. In the Add to
Favorite dialog box, select a folder from the Location drop-down list and click Add.
The function is added to the folder on the My Favorites tab page.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
67
Step 2 Click the Function Search tab and enter a keyword to search for functions.
Click next to a function. In the Add to Favorite dialog box, select a folder from the
Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab page.
NOTE
You can double-click a function in the list to open the main window of the function.
Step 3 Optional: Open the main window of an application. Choose an item on the menu bar and click
next to a function listed on the menu. In the Add to Favorite dialog box, select a folder
from the Location drop-down list and click Add. The function is added to the folder on the My
Favorites tab page.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
68
Step 4 Log in to the client again. On the My Favorites tab, click a function to directly open its main
window.
You can choose My Favorites from the main menu and choose a function on the menu to quickly
launch the function.
----End
1.6.3 Client GUI in the Traditional Style
This topic describes the components of the client GUI in the traditional style.
Figure 1-27 shows the client GUI in the traditional style.
NOTE
For how to switch the client to other style, see 1.8.2 Setting the Client Display Style.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
69
Figure 1-27 Client GUI
1
2
3
4
6
5
1: Menu bar 2: Toolbar 3: Workbench list
4: Output pane 5: Status bar 6: Workbench
Menu Bar
The menu bar provides the entries to all the functions of the U2000 client. It consists of the
following menus: File, Edit, View, Fault, Performance, Configuration, Service, Inventory,
Administration, Window, and Help.
NOTE
The menu items and sub-items displayed on the U2000 vary according to the components deployed on the
U2000 server.
Toolbar
The toolbar provides the shortcut icons for major operation tasks. For details, see 1.6.6
Frequently Used Shortcut Icon.
Workbench list
You can create or modify a workbench using the shortcut icons.
Output Pane
The output pane displays the returned information and other relevant information.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
70
Status Bar
The status bar displays information such as the system status, the login users, and the IP address
of the connected server. The information displayed from left to right is as follows:
l Server and communication mode: Displays the name and IP address used for logging in to
the server and the communication mode between the client and server.
l Login user: Displays the name of the login user.
l Connection duration: Displays the client time in real time.
l System pop-up pane: Display a message in real time when the operation on the client is
affected. It can be disable and enable.
l Login mode: Displays the login mode. It can be single-user mode and multi-user mode.
l Connection status: Displays the status of the connection between the client and the server.
l Logo: Displays the logo of Huawei Technologies Co., Ltd..
Workbench
The shortcut icons on the workbench help you perform operations.
1.6.4 Key GUI Components
This topic describes the key GUI components. The key U2000 GUI components are as follows:
Component Example
Button
Shortcut icon
Radio button
Check box
Tab
Field
Drop-down
menu
Menu
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
71
Component Example
Function Tree
Dialog box
1.6.5 Frequently Used Buttons
This topic describes the frequently used buttons. The frequently used buttons on the U2000 GUI
are as follows:
Button Function
Selects the objects.
Selects the objects in a batch.
Expands all available options.
Collapses all available options.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
72
Button Function
Displays or hides a dialog box.
Selects the objects.
Selects the objects in a batch.
Increases the priority of the selected object.
Decreases the priority of the selected object.
Displays a dialog box.
Queries results from the NE.
Enables the current settings.
Displays the latest result(s).
Exports the selected scheduled tasks to the
browser of the operating system for printing.
Saves selected data to the specified file.
Enables the current setting and closes the
dialog box.
Cancels the current setting and closes the
dialog box.
Closes the operation wizard.
Views the selected data.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
73
Button Function
Deletes the selected data or icon.
/
Creates a new service, protection or physical
inventory information etc.
Adds existing data or objects.
Proceeds to the next step.
Returns to the previous step.
Closes the dialog box.
Expands the Object Tree.
Collapses the Object Tree.
Enables the current setting and closes the
dialog box.
Cancels the current setting and closes the
dialog box.
Search the related information.
Sets the related condition.
Sets filter criteria and views the filter result.
1.6.6 Frequently Used Shortcut Icon
This topic describes the frequently used shortcut icons on the U2000 client.
NOTE
You can customize the toolbar to display only the frequently-used shortcut icons. To customize the toolbar,
right-click the toolbar and choose a menu item from the shortcut menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
74
Table 1-6 The shortcut icons on the Main Topology
Button Name Description
Workbench l Style of Favorites Folder: By
selecting it, you can modify or
delete the workbench.
l Style of Desktop: By selecting it,
you can return to the workbench.
Exit Exits the U2000 client.
Log Out Logs out of the current user.
Lock Terminal Locks the current client.
Full Screen Displays the Main Topology in full
screen mode.
NMS User
Management
Manages user information on the
U2000.
Maintain SDH
Protection Subnet
Displays the Maintenance SDH
Protection Subnet window.
Manage SDH Trail Displays the Manage SDH Trail
window.
Create SDH Trail Displays the Create SDH Trail
window.
Manage WDM Trail Displays the Manage WDM Trail
window.
Browse Current
Alarm
Displays the Filter dialog box. After
the filter criteria is set, displays the
Browse Current Alarm window.
Browse Alarm Logs Displays the Filter dialog box. After
the filter criteria is set, displays the
Browse Alarm Logs window.
Stop the Current
Alarm Sound
Clicks this shortcut to stop the current
alarm sound on the U2000. The alarm
sound starts again when a new alarm
is generated. To permanently stop the
alarm sound, choose Fault > Stop the
Alarm Sound Permanently from
the main menu.
Main Topology Switches to the Main Topology.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
75
Button Name Description
NE Explorer Displays the NE Explorer window.
Create Fiber Creates fiber.
Browse SDH
Performance
Displays the Browse SDH
Performance window.
Browse WDM
Performance
Displays the Browse WDM
Performance window.
WDM Optical Power
Commissioning
Displays the WDM Optical Power
Commissioning window.
IPA Management Displays the presence of the IPA that
is in the disabled state. This icon
blinks if a disabled IPA exists. When
you click this icon, the IPA
Management window is displayed.
NM Tasks
Management
Progress
Displays the process of NMS tasks
management. When you click this
icon, the Configuration Data
Management Progress window is
displayed.
Networkwide
Maintenance Status
Performs centralized monitoring over
the maintenance and operating status
of the equipment managed by the
U2000, including:
l Alarm Reversion
l DCC Enabling Status
l Path Loading
l Alarm Suppression
l Alarm Insertion
l Optical (Electrical) Interface
Loopback
l Cross-Connection Loopback
l Laser Status
Show alarm panel Displays the Alarm Panel dialog
box. The statistics of all current
alarms are displayed by default.
Critical Alarm Dynamically displays critical alarms.
When you click this icon, all critical
alarm information is displayed.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
76
Button Name Description
Major Alarm Dynamically displays major alarms.
When you click this icon, all major
alarm information is displayed.
Minor Alarm Dynamically displays minor alarms.
When you click this icon, all minor
alarm information is displayed.
Warning/Not
Alarmed Alarm
Dynamically displays warnings/not
alarmed. When you click this icon, all
warning or /not alarmed alarm
information is displayed.
No new events Dynamically displays abnormal
events. This icon indicates that there
are no newly reported events. When
you click this icon, the Query Event
Logs window is displayed.
New events Dynamically displays abnormal
events. This icon indicates that there
are newly reported events. When you
click this icon, the Query Event
Logs window is displayed.
New To create a custom view, subnet, NE,
and link.
NOTE
The NE cannot be created in the custom
view.
Modify View To modify the name of custom view,
add NEs, subnets or links to the
custom view, and delete NEs, subnets
or links from the custom view.
NOTE
This shortcut icon is displayed only when
the current view is a custom view.
Delete View To delete a custom view.
NOTE
This shortcut icon is displayed only when
the current view is a custom view.
Previous To go back to view or subnet that you
viewed last time.
NOTE
The icon is not displayed by default. Set
this icon on the topology toolbar. For
details, see 1.8.18 Setting the Toolbar.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
77
Button Name Description
Next To go to the view or subnet before
you click .
NOTE
The icon is not displayed by default. Set
this icon on the topology toolbar. For
details, see 1.8.18 Setting the Toolbar.
Back to Parent To return the parent interface.
Select To select a topology object.
Move View To move the topology view.
Search Displays the Search dialog box. You
can locate objects in the topology.
Print To print the topology view.
Print Preview To preview the print effect of the
topology view.
Overview To provide a general view of
topology.
NE Statistics l To collect statistics on the NE
types and number of the objects
selected in the current topology
view.
l If no object is selected in the
current topology view, the system
collects statistics on the types and
number of all NEs in the current
topology view.
Refresh Refreshes the current view after you
click the button when the data in the
view is changed. For example, if an
IP link is changed in the link
management window, you can click
this button to display the latest IP link
data in the Main Topology.
Save Position To save the position information of
the topology objects in the current
Legend & Filter &
Attribute
To display the legend/filter/attribute
panel.
Current Alarm To display the current Alarms.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
78
Button Name Description
Layout To arrange the topology objects in the
topology view.
Zoom In Zooms in topology view.
Zoom Out Zooms out topology view.
Local Amplification To enlarge the selected area. In the
topology view, drag the mouse to
generate a rectangle. Topology
objects in this rectangle are
magnified.
Lock View/Unlock
View
Locks/Unlocks the current NE(s).
Ascending Lists the objects on the Object Tree
in an ascending or a descending
order.
NOTE
Topology objects in the navigation tree
are sorted according to the following
rules:
l No matter whether topology objects
are sorted in ascending or descending
order, the order of the types of
topology objects is unchanged,
namely, local NMS, subnets, NEs
with subnodes, and NEs without
subnodes. The local NMS is always
displayed on the top.
l The types of topology objects are
sorted by name alphabetically.
Object names are case insensitive.
Descending
Table 1-7 The shortcut icons on the other GUI
Button Name Description
Shrink all Shrinks Alarm/Event Name.
Classify by group id Classifies alarms by group ID.
Classify by severity Classifies alarms by severity.
Classify by type Classifies alarms by type.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
79
Button Name Description
Classify by
category
Classifies alarms by category.
NE Time
Synchronization
Synchronizes the NE time and NMS
time.
Synchronize
Current Alarms
Synchronizes the current alarms of an
NE.
Browse Current
Alarms
Browses the current alarms of an NE.
Clear Alarm
Indication
Clears the current alarm indications of
an NE.
Refresh NE Panel
Status
Refreshes the NE panel status to enable
the NE panel to display the latest data.
Back Up NE
Database To SCC
Backs up NE data to the SCC.
Display/Hide
Extended Slot
Displays or hides the extended slot on
the Extended Slot tab.
Legend Displays a legend and its description.
1.6.7 Keyboard Shortcuts
The U2000 client provides keyboard shortcuts for some operations. You can perform these
operations more quickly by using the keyboard shortcuts than using the mouse.
Keyboard Shortcuts of Controls on GUIs
Table 1-8 describes keyboard shortcuts of controls on GUIs. You can use keyboard shortcuts
instead of the mouse to perform operations on GUIs conveniently.
Table 1-8 Controls and corresponding keyboard shortcuts
Control Description
Menu For a menu whose name is followed by an underscore _, you can press
Alt+_ to choose the menu item.
Drop-down menu For a drop-down menu whose name is followed by an underscore _, you
can press Alt+_ to choose the menu item.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
80
Control Description
Button l For a button whose name is followed by an underscore _, you can
press Alt+_ instead of clicking the button.
l When a dialog box is open and the focus is on a button, this button is
the default button. If the focus is not on any button, OK is the default
button.
l When the focus is on a button, you can press Enter or space bar
instead of clicking the button.
l If the focus is on a control that does not respond when you press
Enter, then the effect is the same when you press Enter or when you
click the default button.
Drop-down list When the focus is on a drop-down list, you can press the Down arrow
key to expand the drop-down list. You can press the Up, Down arrow
keys to switch between the options in a drop-down list, and press
Enter to select the current option.
Option button If the focus is on an option button, you can press the space bar to select
the option button.
Check box If the focus is on a check box, you can press the space bar to select or
clear the check box.
Navigation tree When the focus is on the navigation tree, you can press the Down arrow
key or Up arrow key to switch between the nodes in the tree. And you
can press the Left arrow key or Right arrow key to expand or collapse a
node that contains subnodes.
Switching
between controls
When there are multiple controls in a window, dialog box, or tab page,
you can press Tab to switch from one control to another, and press Shift
+Tab to switch to the previous control.
Other Key Combinations
Table 1-9 describes other key combinations provided by the U2000 client. You can use these
key combinations to perform operations quickly.
Table 1-9 Shortcut keys
Operation Shortcut keys
Exit a dialog box or prompt Esc
Unlock a terminal Ctrl+Alt+U
Open the Help F1
Exit the system Alt+F4
Find Ctrl+F
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
81
Operation Shortcut keys
Cut Ctrl+X
Copy Ctrl+C
Paste Ctrl+V
Save Ctrl+S
Display full screen F11
Select all Ctrl+A
Close the current window Ctrl+F4
Restore down (when the service window in the
public window is maximized)
Ctrl+F5
Minimize the window (applied to the service
window in the public window)
Ctrl+F9
Maximize the window (when the service window
in the public window is restored)
Ctrl+F10
Zoom in the topology view Ctrl++
Zoom out the topology view Ctrl+-
NOTE
The common area is under the toolbar on the U2000 client interface.
1.6.8 Main Windows
This topic describes the main windows of the U2000 client.
1.6.8.1 Workbench
This topic describes the workbench. After a client is started, the system automatically accesses
the default workbench. The default shortcut icons are displayed on the workbench.
l In the main window of the U2000, click the drop-down arrow next to and select Style
of Desktop to access the workbench.
l You can click to hide the left list of the workbench, then click to display the left list of
the workbench.
l You can view the description of the function of the workbench in the background picture
of the workbench and press F1 to view the Help.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
82
l You can perform operations on the workbench. For details, see1.8.7 Setting the
Workbench.
1.6.8.2 Main Topology
All topology management functions can be accessed in the Main Topology of the U2000.
Topological relationships between NEs, subnets and connections are displayed in the Main
Topology of the U2000. You can browse, create, search for, configure, maintain and manage
NEs, subnets, connections and trails in the Main Topology.
Navigation Path
l In the Workbench Window, double-click the Main Topology icon.
l Choose View > Main Topology (traditional style) from the main menu or select Topo
View in Application Center and choose Topology > Main Topology (application style)
from the main menu.
l Click the shortcut icon to open the Main Topology.
GUI Description
l Open the Main Topology to ensure that main menu items are available.
l The U2000 provides multiple display modes of the client. For example, you can set an
alarm display mode for an object. For details about the meanings and setting methods of
display modes, see 1.8 Customizing the Client GUI Effect.
l The U2000 provides the focus display function. When the pointer stays over a shortcut
button for about 2 seconds, the U2000 will provide a focus display, presenting its meaning.
l The U2000 provides a variety of view windows according to different functions, and the
views can be switched.
Select Physical Root from the Current View drop-down list. For details, see Physical
Root.
Select Clock View from the Current View drop-down list. For details, see Clock
View. Alternatively, right-click in a blank area of the current subnet in the physical root
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
83
view and choose Switch to Clock View from the shortcut menu to switch to the subnet
in the clock view.
Select Custom View from the Current View drop-down list. For details, see 5.9.1
Creating Custom Views.
Main Topology
Figure 1-28 shows the Main Topology of the U2000.
Figure 1-28 Main Topology
3 4 5
6 7 8 9 10
1 2
12 13 11
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
84
1: Network management
system (NMS) name
2: Menu bar
You can perform operations on
the NMS and NEs with the
submenu bar, including
configuring and managing
tasks.
3&4: Shortcut icon
By clicking a shortcut icon, you
can:
l Perform a simple task
quickly. For example, exit
the NMS, lock terminals, log
out, manage NMS users,
stop the current alarm sound,
1.6.8.3 NE Explorer,
1.6.8.7 Browse Alarm, and
5.8 Creating Connections.
l Perform a simple task
quickly in the Main
Topology. For example,
zoom in or zoom out in the
view, refresh or save the
view, show or hide the
navigators, search for
objects, view object
attributes, and lock or
unlock the view.
For details, see 1.6.6
Frequently Used Shortcut
Icon.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
85
5: Alarm panel, Alarm
button bar and Event button
The Alarm panel collects
statistics on alarms of the
managed objects by alarm
severity and state according
to the current alarm
template. The alarm panel
provides the fault status of
the entire network. It can
work as a monitoring panel.
The Alarm buttons for
alarms with different
severities are in different
colors. You can click the
button to view the number
of the uncleared alarms
generated on the current
U2000. You can click the
button to view current
alarms.
When there are abnormal
events on the U2000, the
Abnormal event indicator
turns red from green. You
can click the indicator to
view current abnormal
events.
6: Legend, Filter and Attribute
In this area, you can set the
display modes of the objects in
a view, view the descriptions
of legends and NE attributes in
the view. For details about how
to locate an operation object
quickly, see 1.6.9.1 Filtering
Operation Objects in a
View.
7: Displays the client time in
real time.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
86
8: Views the name of the
logged-in U2000 user.
9: Views the name which is set
by the current U2000 client,
the IP address of the current
U2000 server and the
communication mode between
the client and server.
10: Main Topology
Views NEs.
In the Main Topology, you can
perform operations such as 5.6
Creating NEs, 5.7
Configuring the NE Data, 5.8
Creating Connections, 5.10.2
Browsing Fibers/Cables, 5.9.5
Deleting Topology Objects,
7.8.10 Browsing the Current
Alarms, and 1.19 Starting the
NE Data Collection; enter the
1.6.8.3 NE Explorer to
configure the service for the NE
and so on.
You can check the NE status
and communication status in the
Filter Tree or on the Legend tab.
11: Displays the mouse
coordinate in the Main
Topology.
12: Topology navigation tree
In this area, all NEs managed
by the U2000 are displayed.
You can locate the desired NE
quickly.
NE types and quantity are
displayed in the NE Statistics
table below the navigation tree.
13: Browse Current Alarm
In this area, you can browse the
alarms that require attention and
processing by setting the
filtering criteria of the current
alarm.
1.6.8.3 NE Explorer
The NE Explorer is the main user interface used to manage equipment. In the NE Explorer, a
user can configure, manage and maintain the NE, boards, and ports on a per-NE basis. The NE
Explorer is the main user interface for commissioning and configuration on a per-NE basis. The
NE Explorer contains a Function Tree that makes the operations easy. To display the
configuration window for an object, select the object and choose a desired function in the
Function Tree.
NOTE
l For NEs of MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except PTN 6900
series) and marine series NEs, you can open a maximum of ten NE Explorer windows at the same time.
l Currently, NEs such as the OptiX OSN 1800, OptiX OSN 1832, OptiX OSN 6800, OptiX OSN 8800
series, OptiX OSN 9800 series can be managed individually or in optical NEs.
Navigation Path
l Right-click an NE in the Main Topology and choose NE Explorer from the shortcut menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
87
l In the left-hand pane of the Main Topology, right-click an NE and choose NE Explorer
from the shortcut menu.
l In the Main Topology, select an NE and click .
l Double-click an optical NE in the Main Topology. In the window that is displayed, right-
click an NE in the left-hand pane and choose NE Explorer from the shortcut menu.
Related Operation
l Click in NE Explorer window to display the 1.6.8.5 NE Panel.
l Click in NE Explorer window to switch to other NEs.
1.6.8.4 Clock View
The clock view provides a visualized platform to enable users to set NE clocks, query network-
wide clock synchronization status, trace and search for clocks. Physical clock, PTP clock, PON
clock and ACR clock are supported. The functions provided by the clock view apply to MSTP
series, RTN series, NG WDM series, PTN series NEs, OLT series NEs, ONU series NEs, MxU
series NEs, router NE40E V600R002/V600R003 NEs, ATN series, CX600 series, and their REG
NEs, REG logical systems and REG boards.
Navigation Path
In the Main Topology, select Clock View from the Current View drop-down list. Select the
NE to be queried or configured from the Object Tree. Figure 1-29 shows the clock view.
NOTE
For optical NE, in the clock topology right-click the NE and choose Browse WDM Clock Graph. You
can query clock NEs, clock tracing relationships, and clock synchronization status in the displayed window.
Figure 1-29 Clock view
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
88
Clock link
NOTE
l Green lines represent PTP, PON or ACR clock links.
l Blue lines represent physical clock links.
l Solid lines represent working clock links.
l Dashed lines represent standby clock links.
l External Clock Source: the origin of network-wide clocks. This icon is displayed only for one or two
NEs (one active and the other standby), such as BITS NEs.
l Local Clock Source: a local physical clock or PTP clock. This icon is displayed only for the clock
sources that have been configured as local clock sources and are currently being traced. NEs trace local
clock sources only when clock links and external clock sources are faulty.
l Clock Alarm: This icon is displayed for the NE with a clock alarm. You can right-click this NE and
choose View Current Clock Alarm from the shortcut menu to view and handle the alarm.
l Physical clock contains SDH clock, PDH clock, Synchronous ETH clock, NTR clock, Radio clock and
WDM clock.
Legends
l After you choose View > Display Setting > Legend from the main menu, various legends
are displayed in different colors in the clock view.
l After you choose View > Display Setting > Filter from the main menu, the required
elements are displayed in the clock view based on the filter function. Virtual clock devices
cannot be filtered by clock type.
l After you choose File > Preferences > Topology Display Settings from the main menu,
the Preferences window is displayed and you can set the width of clock link by modifying
Link distance (pixels).
l The clock view uses continuous lines to represent the tracing relationships between NEs.
The number displayed on the continuous line indicates the priority of the traceable clock.
The smaller the number, the higher the priority. The clock view displays the line clock
source IDs only. Internal clock sources are numbered, but their IDs are not displayed in the
clock view.
l The arrow direction in the clock view indicates the clock tracing direction. For example,
if NE(9-722) points to NE(9-218), NE(9-218) traces the clock information transmitted from
NE(9-722).
l In the clock view, you can search for clock tracing relationships.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
89
NOTE
The rule of verifying an invalid clock tracing relationship is as follows: Verify whether a clock source
is in the SSM protocol mode.
l In the non-SSM protocol mode, verify the status of a clock source. The status determines whether
a clock tracing relationship is valid.
l In the SSM protocol mode, verify the status of a clock source. If the status is unavailable, the
clock tracing relationship is invalid. If the status is available, you also need to verify the S1 byte
(clock quality). When you manually cancel settings of the quality of the S1 byte and the quality
of the S1 byte is unknown, the clock tracing relationship is invalid.
l In the clock view, there are indicators on an NE to indicate the time or lock lockout status.
When the lockout status of an NE is changed, you can search for clock links to update the
status.
l The clock view can display NEs copied in the physical root view and their clock tracing
relationships. NEs copied from an NE own the same clock tracing relationships as the NE.
l When you move the pointer over a clock NE, a tooltip pops up, displaying the NE's clock
mode, master clock ID, port status, and other information.
NOTE
The following modes are private working modes of PTP clocks:
l OC mode: In this mode, the communication with the network is performed through only one
IEEE 1588 port.
l BC mode: In this mode, the communication with the network is performed through multiple IEEE
1588 ports, which can be used for connections to multiple subdomains.
l TC mode: In this mode, a device that measures the time taken for a PTP event message to transit
the device and provides this information to clocks receiving this PTP event message. That is, the
clock device functions as an intermediate clock device to transparently transmit the clock and
process the delay, but does not recover the clock. It can effectively deal with the accumulated
error resulted from the master and slave hierarchical architecture. In this manner, the TC ensures
that the clock/time synchronization precision meets the application requirement.
l TC+BC mode: In this mode, the NE has the BC feature and handles only the delay, instead of
time synchronization.
l TC+OC mode: In this mode, the NE can transmit PTP packets transparently and process PTP
packets. The TC+OC mode is a combination of the TC and OC modes.
Related Concepts
Clock link: A clock link represents the clock tracing relationships between clock NEs. For
example, a clock link from NE A to NE B represents that NE B follows the clock signal from
NE A.
Related Operations
In the clock view, you can query and configure NE clocks network-wide. For details about the
clock operations, see Table 1-10.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
90
Table 1-10 Querying and configuring clocks network-wide
Operation Navigation Path Description
Querying clock topology Clock View In the clock topology, you
can query clock NEs, clock
tracing relationships, and
clock synchronization status.
You are advised to search
clock link before querying
clock topology.
Creating a virtual clock
device
In the clock view, right-click
in the blank area and choose
Create Virtual Clock
Device from the shortcut
menu.
You can create a virtual clock
device to identify a device
that is outside the managed
domain.
A virtual clock device
represents a clock device that
exits on the network but not
within the local managed
domain. Generally, virtual
clock devices are relevant to
NEs in the local managed
domain in terms of tracing
relationships. In this case,
you need to create virtual
clock links on the U2000 to
help engineers view and
identify the clock tracing
relationships between NEs.
Creating a virtual clock link In the clock view, right-click
in the blank area and choose
Create Virtual Clock Link
from the shortcut menu.
You can create a virtual clock
link to identify the tracing
relationships between a local
NE and a device that is
outside the managed domain.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
91
Operation Navigation Path Description
Searching for clock links In the clock view, right-click
in the blank area and choose
Search Clock Link from the
shortcut menu.
You can search for clock
links of NEs network-wide to
learn the clock tracing
relationships between NEs.
By using this function, you
can specify the search scope
based on the NE or clock link
types.
When the clock source traced
by an NE has changed, re-
search for the clock trace
relationship.
NOTE
To search for clock links, you
must obtain the license for the
clock management function.
Querying Clock-
Unsynchronized/Unlocked
NE
In the clock view, right-click
in a blank area and choose
Query Clock-
Unsynchronized/Unlocked
NE from the shortcut menu.
You can search for the clock
NEs in the unsynchronized or
unlocked state. Such NEs are
listed in the lower pane. In
this list, you can select
desired NEs and export their
data.
NOTE
l If the Display NEs in the
current subnet only check
box is selected, the search is
performed within the
current subnet.
l You can click Filter to set
the search scope.
l This operation applies to
ATN series, CX series, NE
series, PTN series, and
access NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
92
Operation Navigation Path Description
Synchronize with Physical
View
In the clock view, right-click
in the blank area and choose
Synchronize with Physical
View from the shortcut
menu.
You can synchronize the
coordinate positions of NEs
and subnets in the clock view
with the corresponding
coordinate positions in the
Physical View.
In addition, after the
synchronization:
l The subnets that have
clock NEs are
synchronized from the
Physical View to the
clock view.
l The empty subnets in the
clock view are deleted.
Configuring clocks Right-click an NE and
choose Configure Clock
from the shortcut menu.
In the NE Explorer, you can
configure NE clocks on the
GUI for configuring clocks.
The NE clocks can be the
IEEE 1588 clock, SDH
clock, synchronous Ethernet
clock, and PON clock, but
different clocks are
supported by different NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
93
Operation Navigation Path Description
Browsing real-time or
historical clock performance
Right-click an NE and
choose View Clock Real-
time Performance or View
Clock History
Performance from the
shortcut menu.
You can query clock
performance status in the
performance monitoring
window displayed.
On live networks, when the
clock performance of an NE
deteriorates, service
transmission quality is
affected. However, the clock
tracing relationship of the NE
may still exist. You can check
the clock performance of
each NE traversed by the
clock link based on the CSG
in the clock view to find the
fault point.
NOTE
l To perform this operation, a
clock tracing relationship
must have been correctly
configured, and a clock link
must have been searched
out in the clock view.
l IP NEs, PTN6900 can
query the real-time and
historical performance of
Physical Clock and PTP
Clock.
l PTN series NEs (excluding
PTN6900) can only query
the historical performance
of System Clock.
Switching between clock
links
Right-click the standby clock
link and choose Switch to
this Clock Link from the
shortcut menu.
By switching between clock
links, you can change the
current clock tracing
relationships between NEs.
This operation applies only to
transport and PTN series
NEs.
Clearing Switching In the clock view, right-click
a clock link and choose Clear
Switching from the shortcut
menu.
Cancels clock link switching
so that NEs can select clocks
to trace based on the clock
source priority.
This operation applies only to
transport and PTN series
NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
94
Operation Navigation Path Description
Clock Attribute Right-click an NE and
choose Clock Attribute
from the shortcut menu.
You can query the type of the
clock that the current NE
traces, hop count of the clock
tracing path, and the clock
compensation setting at the
clock tracing port.
View Clock Status Right-click an NE and
choose View Clock Status
from the shortcut menu.
You can view specific
configurations of the NE. If
the NE is in the abnormal
state, this operation helps you
diagnose and troubleshoot
the fault.
Query Clock Loop In the clock view, right-click
in the blank area and choose
Query Clock Loop from the
shortcut menu.
You can query clock loops
for network-wide NE clock
tracing relationships. In the
query results, you can view
loop information.
If there are clock loops,
double-click a record in the
query result list to locate it on
NEs in the clock view. Then,
you can modify incorrect
configurations on the NEs.
Switch to Physical View In the clock view, right-click
in the blank area and choose
Switch to Physical View
from the shortcut menu.
The GUI switches to the
corresponding subnet in the
physical view. If the subnet
does not exit in the physical
view, the GUI will switch to
the root of physical view.
Synchronize the physical
view before performing this
operation.
Querying the clock tracing
path
In the clock view, right-click
an NE and choose Display
Current Tracing Path.
The U2000 highlights the
current clock tracing paths of
clock NEs. When a fault
occurs, users do not need to
draw the clock tracing path
between NEs manually. This
improves fault diagnosis
efficiency.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
95
Operation Navigation Path Description
View Cable Transmitting
Warp Report
Choose Inventory > Clock
Report > Cable
Transmitting Warp
Report (traditional style)
from the main menu or select
Fix-Network NE
Configuration in
Application Center and
choose Inventory > Clock
Report > Cable
Transmitting Warp
Report (application style)
from the main menu.
In routine maintenance, users
often need to measure clock
delays on chain and ring
networks. However,
instrument-aided onsite
measurement is costly. To
address this issue, the
U2000 allows users to query
cable transmission warp
values for PTP clock links
between NEs. Users can
easily find the sites with large
warp values and perform
measurement only for these
sites. This function
effectively reduces site visits
and costs.
1.6.8.5 NE Panel
The NE Panel displays boards and ports in different colors indicating their current status. On
the U2000, most operations such as equipment configuration, monitoring, and maintenance are
performed in the NE Panel window.
Navigation Path
Double-click an NE in the Main Topology to display the NE Panel.
GUI Description
l For the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except
PTN 6900 series) and marine series NEs, click on the toolbar to view the legends of
the boards and ports on the right of the Slot Layout.
l For the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except
PTN 6900 series) and marine series NEs, right-click the NE Panel window and choose
Always On Top, the NE Panel window to always remain on top.
l When a board occupies multiple slots, the slot ID of the main slot is displayed in boldface,
and the slot ID of the slave slot is dimmed.
l In the NE panel, when you click the processing board equipped with an interface board,
the slot ID of this interface board is orange.
l For the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series (except
PTN 6900 series) and marine series NEs, when you move the cursor to the installed board,
the board remarks is displayed. For the WDM series, WDM (NA) series, and Marine
series NEs, if you configure the wavelength informations on the installed board, when you
move the cursor to the board, the optical ports, band type, and wavelength is displayed.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
96
l To perform an operation related to an installed board, right-click the installed board and
choose the corresponding submenu item from the shortcut menu. For example, you can add
a remark of the board in the Modify Remark dialog box by right-clicking the installed
board and choosing Remark.
1.6.8.6 WDM NE Signal Flow Diagram
WDM NE signal flow diagram provides a signal flow diagram for the optical layer trails of each
WDM NE. The signal flow diagram is one of the views where you configure, monitor and,
maintain the WDM equipment.
Navigation Path
l Double-click an optical NE in the Main Topology. In the window that is displayed, select
an NE and click Signal Flow Diagram. See Figure 1-30.
l Double-click an NE in the Main Topology. In the displayed window, click Signal Flow
Diagram. See Figure 1-30.
Figure 1-30 Signal flow diagram
Menu on the Board Menu on the View Menu on the Fiber/Cable
GUI Description
l As in the NE Panel, you can perform operations on each board such as viewing alarms,
viewing WDM performance data, querying versions, and configuring a WDM NE in the
signal flow diagram. More importantly, the signal flow diagram provides the relationship
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
97
of fiber connections between each board of the ONE. It visually shows the direction of
traffic and improves the ability of the U2000 to maintain optical NEs.
l In the signal flow diagram, you can also create a fiber connection, query information about
the wavelength and port of each board, and rotate a board icon by 90, 180 or 270 degrees.
You can classify the same boards into a group, and print the signal flow diagram and so
on. The smallest unit of the signal flow diagram is a board. Boards of different types have
different icons. See legends for more information.
l Signal flow diagram is not applied to idle resource optical NEs.
l You can add a remark of the board in the Modify Remark dialog box by right-clicking the
installed board and choosing Remark.
l After an OSC board reports an R_LOS alarm, the fiber connected to the IN port of the FIU
board that is connected to the OSC board turns red. After the OSC board reports the
notification of clearing the R_LOS alarm, the fiber turns green.
1.6.8.7 Browse Alarm
This topic describes the user interface for viewing the current and historical alarms and Alarm
Logs. In this user interface, buttons are provided, such as Filter, Synchronize, Refresh, and
Acknowledge, to help you quickly locate the alarm cause.
Context
l Current alarm displays the merged alarms. The rules for merging alarms are as follows:
The alarms whose alarm group IDs, alarm IDs, alarm location information, and alarm
sources are the same, and whose maintenance status is Normal are merged into another
current alarm record.
The alarms whose alarm group IDs, alarm IDs, alarm location information, and alarm
sources are the same, and whose maintenance status is not Normal are merged into a
current alarm record.
l For a newly reported alarm, if the current alarm contains the record that meets the alarm
merging rule, the alarm is merged into the previous record in the current alarm regardless
of the acknowledgment and clearance status of the record. After merging, the frequency of
the record is added by 1. The displayed acknowledgment and clearance status of the record
is subject to that of the latest alarm. After the current alarm is changed to historical alarms,
the frequency recorded for the current alarm is reduced by 1.
l You can query details of each alarm log in the Browse Alarm Logs window.
l Alarm log records all the alarms received by the U2000. In the alarm log, each alarm is
displayed as a record.
l Alarms are not displayed in the current alarm list after they are acknowledged and cleared
and their life cycles end. However, you can query these alarms in the alarm logs and
historical alarms. For details about how to set the lifecyle of an alarm, see 7.5.11 Setting
the Lifecycle of the Current Alarm.
Navigation Path
l Choose Fault > Browse Current Alarm (traditional style) from the main menu or select
Fault Management in Application Center and choose Browse Alarm > Browse Current
Alarm (application style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
98
l Choose Fault > Browse Historical Alarm (traditional style) from the main menu or select
Fault Management in Application Center and choose Browse Alarm > Query
Historical Alarm (application style) from the main menu.
l Choose Fault > Browse Alarm Logs (traditional style) from the main menu or select Fault
Management in Application Center and choose Browse Alarm > Query Alarm Logs
(application style) from the main menu.
Figure 1-31 shows the alarm window.
Figure 1-31 Browsing alarms
1.6.8.8 Browse Event
In the Browse Event Logs window, you can view events at different levels. This window
provides buttons, such as Filter by Template, Filter and Refresh, to help you quickly locate
the alarm cause.
GUI
Choose Fault > Browse Event Logs (traditional style) from the main menu or select Fault
Management in Application Center and choose Browse Alarm > Query Event Logs
(application style) from the main menu.
Figure 1-32 shows the window of Event.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
99
Figure 1-32 Browse Event Logs
1.6.9 Operations Frequently-Performed on the User Interface
This topic describes the operations that are frequently performed on the U2000 user interface.
1.6.9.1 Filtering Operation Objects in a View
The topology view displays objects such as subnets, links, and NE nodes. When a large number
of objects are displayed in the topology view, these objects may be overlapped. In this case, you
can set filter criteria to filter some of the objects. After the filtering, the topology view displays
only the required objects.
Context
l The topology view displays the objects selected in the Topology Filter navigation tree,
such as subnets, NEs, background images.
l When the U2000 is started, the filter criteria are blank by default, and all the topology
objects are displayed.
l When you deselect a filter criterion, the objects matching the criterion are not displayed.
l Parent nodes in the Topology Filter navigation tree have three types of icons. indicates
that some topology filter items under a parent nodes are selected; indicates none of the
topology filter items under a parent nodes is selected; indicates that all topology filter
items under this node are not displayed in the topology view.
l Modified topology filter criteria take effect for the current user only. After this user logs
in next time, the settings still take effect.
Procedure
Step 1 Choose Topology > Main Topology (application style) or View > Main Topology (traditional
style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
100
Step 2 Choose View > Show > Filter (application style) or View > Display Setting > Filter (traditional
style) from the main menu, or click on the toolbar. Click the Filter tab in the right pane.
Step 3 In the Topology Filter navigation tree, select the topology objects to be displayed in the topology
view.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
101
NOTE
l Topology objects that are not selected are unavailable in the topology view.
l Click Other Conditions. In the displayed panel, specify the values for NE Name, Link Name, or
Subnet Name, and click Filter to filter objects again. The NEs, links, or subnets containing this string
(case insensitive) are displayed.
After the operations are successful, current view displays topology objects based on the filter
criteria.
Step 4 Optional: Click Filter Tree and select Switch. In the Switch a Filter Tree dialog box, select
the filter tree template, and click Open.
NOTE
Filter tree templates displayed in the Switch a Filter Tree dialog box indicate that filter trees have been
used and saved as filter tree templates. If no filter tree has been saved, no filter tree template is available
in the dialog box. To save a filter tree as a template, click Filter Tree and choose Save As. In the displayed
dialog box, enter a template name and click OK.
Step 5 Optional: To close the Legend/Filter/Properties panel, choose View > Show > Filter
(application style) or View > Display Setting > Filter (traditional style) from the main menu,
or click on the toolbar.
----End
1.6.9.2 Searching for NEs in a View
This operation enables you to search for NEs quickly.
Context
l If you search for NEs in the Physical Root or Clock View navigation tree in the Main
Topology, the search operation applies to the current view.
l If you search for NEs in the window outside the Main Topology, the search operation
applies to the Physical Root navigation tree.
l You can search out only the NEs for which you have management rights.
l During NE search, the U2000 searches for NEs in dynamic and fuzzy matching mode. That
is, the Search window displays search results in real time as you specify the search criteria.
l Transport NEs can be also searched out in Remarks mode.
Procedure
Step 1 Choose File > Find (traditional style) from the main menu or select Topo View in Application
Center and choose Topology > Search (application style) from the main menu.
The Search dialog box is displayed.
NOTE
You can also perform he following operations to access the Search dialog box.
l Press Ctrl+F in the Main Topology.
l Right-click in the Main Topology, and choose Find from the shortcut menu.
l Click .
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
102
Step 2 Select the search criteria, which are Search Type and Search Mode.
Step 3 Enter a keyword in the Keyword combo box or choose a keyword record from the drop-down
list.
Step 4 Optional: You can select Match whole word only, Case Sensitive or Auto search with
specified keyword as required.
NOTE
l Match whole word only: If you select this check box, only the results that exactly meet the conditions
are displayed.
l Case Sensitive: If you select this check box, the keyword is case-sensitive during search.
l Auto search with specified keyword: If you select this check box, when you enter the keyword, the
result is displayed dynamically.
Step 5 Click Search.
All the found records are displayed in the Search window.
Step 6 The NE is located in the topology view and navigation tree.
l click Locate and select Locate to NE Panel from the menu to directly locate the NE panel.
l Click Locate and select Locate to Topo from the menu or double-click in the query result
area to search for NE to locate the Main Topology.
l click Locate and select Locate to NE Partition from the menu to directly locate the NE
partition.
Step 7 Optional: Select the Minimized after locating check box, the Search window is minimized
after the location.
----End
1.6.9.3 Collecting Statistics on the Number of NEs
By collecting statistics on the number of NEs, you can learn the number of NEs that are created
on the U2000. The NEs contain real, preconfigured, and virtual NEs.
Context
l By default, the NE Statistics list is displayed on the left lower corner of the Main Topology
view of the client. If it is not displayed, Choose View > Display Setting > NE Statistics
(traditional style) from the main menu or select Topo View in Application Center and
choose View > Show > NE Statistics (application style) from the main menu.
l If certain objects are selected in the current topology view, the system collects statistics on
the NE types and quantity of the selected objects.
l If no object is selected in the current topology view, the system collects statistics on the
types and number of all NEs in the current topology view.
Procedure
Step 1 Choose View > Display Setting > NE Statistics (traditional style) from the main menu or select
Topo View in Application Center and choose View > Show > NE Statistics (application style)
from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
103
Step 2 Check the number of NEs in the NE Statistics list displayed on the left lower corner of the Main
Topology view.
----End
1.6.9.4 Customizing Parameter Display
The U2000 provides the function of customizing the layout of tables. Users can customize the
sequence and width of columns, and whether to display or hide a column in the table. When a
user reopens some windows, the table layout, including the column sequence and width, is the
same as that specified by the user.
Procedure
l Right-click on the top of a parameter list, and choose the desired items from the shortcut
menu. The unselected items are not shown in the parameter list.
l Choose Column Settings from the shortcut menu. The Column Settings dialog box is
displayed. You can set whether to show a column in the parameter list, set the sequence of
columns and the column width.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
104
----End
1.6.9.5 Copying Table Texts Quickly
The U2000 allows you to copy and paste table text. You can copy text from a table to other
programs quickly.
Procedure
Step 1 Select the text in a table, and press Ctrl+C.
NOTE
l Select all texts in the table by pressing Ctrl+A. Only the current screen of the table is supported.
l To view all data in the current table, click Print or Save As.
Step 2 Switch to another program, and press Ctrl+V. The selected text is copied to the system clipboard.
----End
1.6.9.6 Monitoring Alarms
You can learn about the number of alarms of specified severities on NEs using the alarm panel
on the U2000 client. In addition, you can learn about the current alarm by using the alarm panel
or alarm indicator. In Alarm Panel, you can double-click an alarm template to open the window
for browsing alarms.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
105
Procedure
Step 1 Choose Browse Alarm > Display Alarm Panel (application style) or Fault > Display Alarm
Panel (traditional style) from the main menu or click the icon on the toolbar to open the
alarm panel.
The U2000 displays the Alarm Panel window, as shown in Figure 1-33. You can add a current
alarm template to the alarm panel if you want to monitor the alarms of specified severities on
NEs. For details, see 7.6.2 Setting the Alarm Panel. The alarm panel then displays alarm
information according to the preset template.
Figure 1-33 Alarm panel
NOTE
l The bar charts in the Query Alarm Bar Chart window correspond to the template displayed on the
alarm panel. When you add or delete an alarm bar chart (alarm template) in the Query Alarm Bar
Chart window, the corresponding alarm template is automatically added to or deleted from the alarm
panel. In the same way, when you perform the add or delete operation on the alarm panel, the bar chart
in the Query Alarm Bar Chart window is modified accordingly.
l If a user changes the name, status, or search criteria of a template in the alarm panel on client B, the
changes can be synchronized to client A only after the user restarts client A.
Step 2 Double-click specific current alarm templates on the alarm panel.
The U2000 displays the Browse Current Alarm window. In the Browse Current Alarm
window, you can query alarm occurrence time, alarm source, and alarm logs. In addition, you
can acknowledge and clear alarms. For details, see 7.8.10 Browsing the Current Alarms.
NOTE
You can click an alarm indicator to view an alarm of a corresponding severity. For details about the alarm
indicator, see 7.6.1 Introduction to the Alarm Panel.
----End
1.7 How to Obtain Version Information About the U2000
This topic describes how to obtain version information about the U2000.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
106
Procedure
l View the U2000 SPC version on the System Monitor.
1. Log in to the U2000 System Monitor.
2. Click the Component Information tab to view the component version information
about the U2000.
NOTE
Only the U2000 SPC version number can be viewed on the System Monitor. To view more version
information about the U2000 software, perform View the CP version of the U2000.
l View the U2000 SPC version on the U2000 client.
1. Log in to the U2000 client.
2. Choose Help > About from the Main Menu.
3. Click the About or Component tab to view the component version information about
the U2000.
NOTE
Only the U2000 SPC version number can be viewed on the U2000 client. To view more version
information about the U2000 software, perform View the CP version of the U2000.
l View the U2000 CP version on the U2000 server.
The version information is stored on the U2000 server as a configuration file named the
version number. Access the following directory to view all version information:
In Windows: %IMAP_ROOT%\patch, such as D:\oss\server\patch
In Solaris and Linux: $IMAP_ROOT/patch, such as /opt/oss/server/patch
NOTE
The CP version number can be obtained only by accessing the directory. One version can have either
0 patch or multiple CP patches.
For example, if the directory contains the V100R009C00CP3011.cfg,
V100R009C00CP3013.cfg, and V100R009C00SPC301.cfg files, the version has been
installed with two CP patches and one SPC patch.
----End
1.8 Customizing the Client GUI Effect
You can customize the GUI effect of the U2000 client as required.
Context
The ranges of client GUI effect are for Current User and for Client. On the setting page, the
effect range is displayed on the topics of all items.The two types of ranges are described as
follows:
l for Current User: The current user can view the GUI effect after logging in to the
configured server from any client.
l for Client: All users can view the GUI effect after logging in to any server from the current
client.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
107
1.8.1 Setting the Client Skin
The U2000 client provides the gray and green skin colors. You can set the skin color as required.
Context
l After setting the skin color, you need to restart the U2000 client for the setting to take effect.
l The setting takes effect for all the users that log in to different clients.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences window, choose Skin in the navigation tree on the left.
Step 3 In Skin color, select a skin color for the client.
Step 4 Click OK.
----End
1.8.2 Setting the Client Display Style
The U2000 client provides the function of setting the client display style. You can set the client
display style as required.
Context
l Users can switch the client display style to change the overall usability of the client and the
way client is launched. User can use either of the following two styles to launch the client:
Application style
Traditional style
l After setting the client display style, you must re-log in to the U2000 client for the settings
to take effect.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
NOTE
The U2000 displays the navigation path of the Online Help in the Traditional style.
The Table 1-11 table describes the differences between the traditional style and application style.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
108
Table 1-11 Differences between the traditional style and application style
Traditional Style Application Style
Menu items cannot be searched for. Users can search for menu items.
The Favorites feature is not supported. You can add functions and menu items that
are frequently used to the Favorites tab.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences window, choose Client Display Style in the navigation tree on the left.
Step 3 Select Application style or Traditional style for the client.
Step 4 Click OK.
----End
1.8.3 Setting the Main Window Title
This topic describes how to set the main window title displayed in the title bar.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree on the left of the Preferences window, select Main Window Title.
Step 3 In Main Window Title, enter the title you want to display.
Step 4 Click OK.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
109
Result
The title that you set is displayed as the main window title.
1.8.4 Setting the Topology View Display
In the Topology Display Settings dialog box, you can set the view background color, subnet
display effect, link display mode, node icon, and node label displayed in the Main Topology.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, choose the Topology Display Settings node in the left navigation
tree.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
110
Step 3 In the Topology Display Settings dialog box, set Background Color, Subnet, Link, Node
Icon, and Node Label.
NOTE
Only the Label items settings in the Node Label area are synchronized to the topology tree. Other settings
do not take effect in the topology tree. Other settings are invalid for the topology tree.
The Display each label item in separate lines in the topology view option allows you to quickly
view the node information such as node name, IP address, and alias in the topology view. You
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
111
can refer to Table 1-12 to set Abridged label and Display each label item in separate lines
in the topology view.
Table 1-12 Set the Abridged label and Display each label item in separate lines in the
topology view check boxes
Operation Display Effect for the Topology View
Select Abridged label and
Display each label item in
separate lines in the topology
view.
l If you do not select any topology objects or if you right-
click a topology object, the labels of all topology
objects are displayed in abridged mode. The items in
each node label are separated by colons (:).
l If you click a node, the node label is completely
displayed. This indicates that the items in the node
label are displayed in separated lines.
l If you click a link, the link label is completely
displayed in one line, regardless of the length of the
link label.
l If you press Ctrl to select multiple topology objects at
the same time, the items in the node label for the first
topology object are displayed in separated lines, but
the node labels for the remaining topology objects are
displayed in abridged mode.
Deselect Abridged label but
select Display each label item
in separate lines in the
topology view.
The labels for each node and link are completely
displayed. This indicates that the items in each node label
are displayed in separated lines.
Select Abridged label but
deselect Display each label item
in separate lines in the
topology view.
l If you do not select any topology objects or if you right-
click a topology object, the labels of all topology
objects are displayed in abridged mode. The items in
each node label are separated by colons (:).
l If you click a node, the node label is completely
displayed. If the label length exceeds the abridged
label length, the node label is displayed in new lines.
l If you click a link, the link label is completely
displayed in one line, regardless of the length of the
link label.
l If you press Ctrl to select multiple topology objects at
the same time, the items in the node label for the first
topology object are displayed in separated lines, but
the node labels for the remaining topology objects are
displayed in abridged mode.
Deselect Abridged label and
Display each label item in
separate lines in the topology
view.
The labels of each node and link are displayed in one line,
and the items in each node label are separated by colons
(:).
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
112
Step 4 Click OK.
Open the Main Topology and view the display effect.
----End
1.8.5 Setting the Font Size
You can set the font size on the U2000 client.
Context
l After setting the font size, you need to restart the U2000 client for the settings to take effect.
l The setting takes effect for all the users that log in to different clients.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree on the left of the Preferences window, select Font.
Step 3 Select an option in Font Size.
NOTE
Font Size can be as follows:
l Small: The font size is 11 points.
l Medium (Default): The font size is 12 points.
l Large: The font size is 13 points.
Step 4 Click OK.
----End
1.8.6 Setting the Output Information
The output window is at the bottom of the U2000 client. It displays the prompt messages and
feedback information of the events that affect the running of the U2000.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
113
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree on the left of the Preferences window, select Output Window.
Step 3 Set relevant parameters in the Output Window area.
Step 4 Click OK.
----End
Follow-up Procedure
You can perform the following operations in the information output area at the bottom of the
interface.
Operations Description
Copy 1. Choose the displayed output information.
2. Right-click and choose Copy to copy the information to the clipboard.
Select All 1. Right-click in the output window and choose Select All.
2. Right-click again and choose Copy to copy all the displayed output
information to the clipboard.
Clear Right-click in the output window and choose Clear to clear all the displayed
output information.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
114
Operations Description
Find 1. Right-click in the output window and choose Find.
2. In the Find dialog box, type the key words to be searched for in Find
what.
NOTE
l Match case: To set whether the search content is case sensitive. The default is case
insensitive.
l Match whole word only: To perform a fuzzy search, clear Match whole word
only. To perform a precise search, select Match whole word only.
l Direction: To set the direction for a key word search.
Save As Right-click to choose Save As. In the Save dialog box, save the current output
to a .txt file.
NOTE
Code formats ISO-8859-1 and UTF-8 are supported. The default encoding format is
ISO-8859-1. You are advised to use the default encoding format if the saved file does
not need to support multiple languages; otherwise, UTF-8 is recommended.
For .txt files, code formats ISO-8859-1 and UTF-8 are supported. The default encoding
format is ISO-8859-1. You are advised to use the default encoding format if the saved
file does not need to support multiple languages; otherwise, UTF-8 is recommended.
AutoScroll Right-click in the output window and choose AutoScroll. The output
information scrolls automatically to the latest information. Right-click in the
output window again and choose AutoScroll, the auto scroll is disabled.
Parameter
Settings
Right-click in the output window and choose Parameter Settings. The
Output Window pane is displayed in the Preferences window.
1.8.7 Setting the Workbench
This topic describes how to set the workbench display for the client. In addition, you can create
function links on the workbench to access operation GUIs quickly.
Prerequisites
You have logged in to a client in the traditional style.
Context
l After setting the workbench display, you must re-log in to the U2000 client for the settings
to take effect.
l The maximum number of links on the workbench is 100.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
Procedure
l You can perform the following operations on the workbench.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
115
Option Description
Enable/disable the workbench Enable/disable the workbench
1. Choose File > Preferences from the main
menu.
2. In the Preferences window, choose
Workbench in the navigation tree on the left.
3. Select or deselect Enable workbench.
4. Click OK.
NOTE
l After enabling the workbench, the workbench
page is directly displayed when you log in to the
U2000 client next time.
l After disabling the workbench, the workbench
page is not displayed when you log in to the
U2000 client next time. In this case, you can
choose Help > Workbench from the main menu
to enable the workbench.
Create workbench 1. Log in to the U2000 client to go to the workbench
operation interface.
2. Right-click in a blank area of the workbench list
and choose Create Workbench from the
shortcut menu.
3. In the Create Workbench dialog box, enter the
workbench name and description, and select a
workbench icon and background.
NOTE
Clients support a maximum image size of 100 KB.
However, you are advised to use the default icon size
of 4 KB.
4. Click Create.
Modify workbench 1. Right-click a workbench in the workbench list
and choose Modify Workbench from the
shortcut menu.
2. In the Modify Workbench Link dialog box,
modify the workbench information such as the
workbench name, description, and icon.
NOTE
Clients support a maximum image size of 100 KB.
However, you are advised to use the default icon size
of 4 KB.
3. Click Modify.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
116
Option Description
Remove workbench 1. Right-click a workbench in the workbench list
and choose Remove Workbench from the
shortcut menu.
2. In the Confirm dialog box, click Yes.
Import Workbench The U2000 provides the function of importing the
workbench data from a file. You can import the
workbench data from a file to a new workbench of
the U2000. This facilitates workbench creation.
1. Right-click a workbench in the workbench list
and choose Import Workbench from the
shortcut menu.
2. In the Import Workbench dialog box, select the
workbench file to be imported, and then click
Import.
Export Workbench The U2000 provides the function of exporting the
workbench data. You can export the data on the
workbench to a file on the local client for future
maintenance and browse.
1. Right-click a workbench in the workbench list
and choose Export Workbench from the
shortcut menu.
2. In the Export Workbench dialog box, set the
name and format of the export file, and click
Export.
Create a shortcut for U2000
function
In the Workbench window, you can create
shortcuts for U2000 functions.
1. In the right pane of the Workbench window,
right-click in a blank area and choose Create
Shortcut from the shortcut menu.
2. In Create Shortcut dialog box, select a function.
3. Click Create.
Modify a shortcut of U2000
function
1. In the right pane of the Workbench window,
right-click the shortcut icon of an U2000
function and choose Modify from the shortcut
menu.
2. In the Modify Shortcut dialog box, change the
name, description, icon or move to.
3. Click Modify.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
117
Option Description
Arrange Icons by Name In the right pane of the Workbench window, right-
click in a blank area and choose Arrange Icons by
Name from the shortcut menu to sort shortcut icons.
After sorting, icons are listed horizontally.
Delete a shortcut of U2000
function
1. In the right pane of the Workbench window,
right-click the shortcut icon of an U2000
function and choose Remove from the shortcut
menu.
2. In the Confirm dialog box, click Yes. The
function link icon is deleted from the
Workbench window.
Copy an icon Copy the selected workbench icon to the clipboard.
Choose the shortcut menu Paste to copy the icon to
another workbench.
Cut an icon Cut the selected workbench icon to the clipboard.
Choose the shortcut menu Paste to move the icon to
another workbench.
Drag an icon to another position In the Workbench window, drag an icon to a proper
position.
----End
1.8.8 Setting the Menu Collapse
This function allows you to display the frequently used menu items and hide the seldom used
menu items. This helps you quickly find the menu to perform common operations.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences window, choose Menu Settings in the navigation tree on the left.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
118
Step 3 Select Enable folding menus to enable the menu folding feature.
NOTE
By default, menu folding is enabled after the U2000 client is installed.
Step 4 Set the parameters for menu folding.
Table 1-13 Parameters for menu folding
Parameter Description Setting
Default number of
visible menu items
Default number of visible menu
items in each main menu.
Within the configured login times,
if the number of used menu items
exceeds this value, menus are
displayed based on the actual
number.
Value range: 1-50
Default value: 5
Hide menu items if
they are not used for X
consecutive logins
- Value range: 1-50
Default value: 10
Step 5 Click OK.
----End
1.8.9 Setting the Colors of Alarms
You can set a color for each alarm severity. This helps you browse the alarms of different
severities clearly.
Context
l After setting, the alarm icon in the topology view, the alarm record you have queried, and
the alarm indicator on the alarm panel are displayed in the specified colors.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
119
l By default, the U2000 provides four types of colors for alarms. critical: , major:
, minor: , and warning: .
l The settings take effect immediately. They are valid on your other logged-in clients after
you log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, choose Color Settings in the navigation tree on the left.
NOTE
For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.
Step 3 In the Color Settings area, click in each row to select the colors of alarms.
Step 4 Click OK.
----End
1.8.10 Setting the Alarm Highlighting
After you set the alarm highlighting, alarms that are not cleared within a specified period of time
are highlighted in the query result window. The highlighting prompts you to pay attention to the
alarms.
Context
l For the alarm that meets the highlighting condition, if the difference between the local time
of the client and the alarm occurrence time reaches the threshold time for highlighting, the
alarm is highlighted.
l The settings take effect immediately. They are valid on your other logged-in clients after
you log in again. The settings are invalid for other users.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
120
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, expand the Alarm Local Terminal Settings node and choose
Highlighting in the navigation tree on the left.
NOTE
For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.
Step 3 In the Highlighting area, set the time and alarm status for alarms of a certain severity, and then
select Enable.
NOTE
The validity period ranges from 1 to 1000000 minutes.
Step 4 Click OK.
----End
1.8.11 Setting the Alarm Font
You can set font, size, style, and color for alarms displayed in the current alarm, alarm logs,
event logs, and other windows to distinguish alarms that are not viewed from alarms that are
already viewed.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, in the navigation tree on the left, expand the Alarm Local
Terminal Settings node, and then select Alarm Fonts.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
121
Step 3 In the Alarm Fonts area, set fonts, sizes, styles, and colors for alarms that are not read and that
are already read.
Step 4 Click OK.
----End
1.8.12 Setting the Alarm Display Mode
You can set the alarm and event background colors of windows such as the current alarm, alarm
log, and event log windows.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, expand the Alarm Local Terminal Settings node and choose
Alarm Display Mode in the navigation tree on the left.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
122
NOTE
For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.
Step 3 In the Alarm Display Mode area, select an alarm display mode, and set background colors for
different alarm states.
Table 1-14 Alarm background colors in different display modes
Display Mode Field Alarm Background Color
Icon Severity The background color is displayed based on the
state. The severity icon is displayed in the
Severity field, and the color of the severity icon
is displayed based on the severity.
All the other fields The background colors of all the other fields are
displayed based on the state.
Cell Background Severity The background color is displayed based on the
severity.
All the other fields The background colors of all the other fields are
displayed based on the state.
Row Background Severity The background color is displayed based on the
severity.
All the other fields The background colors of the unacknowledged
and uncleared alarms are displayed by severity,
and users cannot change the color. Whereas the
background colors of the alarms in other states
are displayed based on the state.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
123
NOTE
The first column of the current alarm is not rendered, because it is not affected by the setting of the alarm
display mode.
Step 4 Click OK.
----End
1.8.13 Setting the Display Properties of New Alarm/Event
You can set the display properties of new alarms or events to view newly reported alarms or
events clearly.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, expand the Alarm Local Terminal Settings node and choose
New Alarm/Event in the navigation tree on the left.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
124
NOTE
For NA NEs, alarms in the U2000 has the following four severities: Critical, Major, Minor, Not Alarmed.
Step 3 In the New Alarm/Event group box, select Alarm Severities Shown at Top of Screen and the
alarm severity.
Step 4 In the New Alarm/Event group box, select Display at the top or Display at the bottom.
Step 5 In the Alarm Severities Shown in Alarm Lamps group box, select the severity to be displayed
on the alarm indicator.
Step 6 In the Others group box, set the display properties.
Step 7 Click OK.
----End
1.8.14 Setting the Alarm Display in the Topology View
After you set the alarm display in the topology view, when the devices in the network generate
alarms, the alarms of the highest severity will be displayed on the corresponding topology objects
in the topology view. This helps you learn about the device faults timely.
Context
l Acknowledged and cleared alarms are not displayed in the topology view, because they
indicate that the faults are already rectified. For details about the meaning of each alarm
state, see 7.1.3 Alarm Status.
l A subnet does not generate alarms. However, when the NEs or links in the subnet generate
alarms, the subnet displays the alarms of the highest severity. The alarm display mode for
subnets is the same as that for NEs.
l A container NE can generate alarms. The alarm status display mode for a container NE is
the same as that for an NE. When an NE in a container NE generates an alarm, an alarm
icon appears on the container NE in the topology view. For details, see Icons Indicating
That Alarms Are Contained.
l The settings take effect immediately. They are valid on your other logged-in clients after
you log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the navigation tree in the Preferences dialog box, choose Topology Status Display.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
125
Step 3 In Topology Status Display, set the alarm display properties in the topology view.
Set the Alarm Display in the
Topology View
Operations
Display Style of Alarm States In Display Style of Alarm States, set the display style of
alarm states.
NOTE
Links support only the Use icon colors display style regardless of
the value of Display Style of Alarm States.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
126
Set the Alarm Display in the
Topology View
Operations
Alarm States to Display in the
Topology View
In Alarm States to Display in the Topology View, set the
alarm state to be displayed in the topology view.
l If you select only Unacknowledged alarms, only the
unacknowledged alarms of the highest severity are
displayed.
For NEs, if Use icon colors is selected, the alarm
state is displayed in the color of NE icon frame. If
Use state icons is selected, the alarm state is
displayed in the round icon.
For links, the links are rendered.
l If you select only Uncleared alarms, only the uncleared
alarms of the highest severity are displayed.
For NEs, if Use icon colors is selected, the alarm
state is displayed in the color of NE icon. If Use state
icons is selected, the alarm state is displayed in the
triangle icon.
For links, the links are rendered.
l If you select both Unacknowledged alarms and
Uncleared alarms, for NEs, unacknowledged alarms of
the highest severity and uncleared alarms of the highest
severity generated on NEs are displayed; for links,
unacknowledged alarms and uncleared alarms of higher
severity generated on links are displayed.
NOTE
The unacknowledged alarms and uncleared alarms generated
on links are displayed by rendering the links. Therefore, if you
select both Unacknowledged alarms and Uncleared
alarms, you cannot determine the whether generated alarms
are unacknowledged alarms or uncleared alarms. To check
whether unacknowledged alarms or uncleared alarms are
generated on a link, you can select this link, click on the
topology toolbar, and check the alarm information displayed
on Properties tab page on the Legend & Filter &
Properties panel.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
127
Set the Alarm Display in the
Topology View
Operations
Additional Display Effects In Additional Display Effects, set additional display
effects.
l When you select only Show alarm prompt, for NEs, a
pop-up message that contains the number and highest
severity of alarms is displayed if uncleared alarms are
generated on NEs, for links, no pop-up message is
displayed even if uncleared alarms are generated on
links.
l When you select only Blink, the icon that displays the
alarm status blinks.
l You can select Show alarm prompt and Blink at the
same time.
NOTE
Show alarm prompt is available only when Display Style of
Alarm States is set to Use icon colors.
Example In Example, check the display effect of the alarm state.
Step 4 Click OK.
----End
1.8.15 Setting the Number Format of the Client
You can customize the number display format of the client, such as, the display mode of the
system monitoring data.
Context
l After setting the number format, you must re-log in to the U2000 client for the settings to
take effect.
l After you modify the number settings, the display of the number may be changed. You can
view the display effect in the Positive number text box and Negative number text box.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, select Number Format from the navigation tree on the left.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
128
Step 3 Set the number display format in the Number Format area.
NOTE
l Digits after decimal point: To set the number of digits after the decimal point. The value ranges from
0 to 3, and the default value is 2.
l Number separator: To select the separator for the integer part of a number. The value can be empty
or comma (,), and the default value is comma (,).
l 0 before decimal point: whether to add 0 before the decimal point. By default, 0 is added before the
decimal point.
Step 4 Click OK.
----End
1.8.16 Setting Board Color
On the U2000, you can customize a board color, which indicates that the board works in the
normal state.
Context
The U2000 provides two colors, which indicate that a board works in the normal state: gray and
green.
Procedure
Step 1 Choose Administration > NE Software Management > FTP Settings (traditional style) from
the main menu or select Fix-Network NE Software Management in Application Center and
choose NE Software Management > FTP Settings (application style) from the main menu.
Step 2 In the Preferences window, choose Board State from the navigation tree.
Step 3 In Normal State, select a skin color for the board.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
129
Step 4 Click OK.
----End
1.8.17 Setting the Time and Date Formats of the Client
You can set the time format, time mode, and date format that are displayed on the client.
1.8.17.1 Setting the Time Format of the Client
This topic describes how to set the time format of the client.
Context
l After setting the time format, you must re-log in to the U2000 client for the settings to take
effect.
l Next time when you log in to the client, the U2000 client automatically uses the settings
that you set last time.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 From the navigation tree on the left of the Preferences window, expand the Region Settings
node and choose Time.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
130
Step 3 In the Time group box, set the time format. The time display effect that you set is displayed in
the Time example.
Step 4 Click OK.
----End
1.8.17.2 Setting the Date Format of the Client
This topic describes how to set the date format of the client.
Context
l After setting the date format, you must re-log in to the U2000 client for the settings to take
effect.
l Next time when you log in to the client, the U2000 client automatically uses the settings
that you used last time.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the navigation tree on the left of the Preferences window, expand the Region Settings node
and select Date.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
131
Step 3 In the Date group box, set the date format.
NOTE
l Date separator: symbol to separate the date. There are three symbols for you to select: "/", "-", and
".". The default is "/".
l Date format: display format of the date. It can be set to "yyyy/MM/dd", "MM/dd/yyyy", or "dd/MM/
yyyy". The default is "MM/dd/yyyy".
Step 4 Click OK.
----End
1.8.17.3 Setting the Time Mode of the Client
After you set the time mode of the client, the time on the U2000 is displayed based on the
specified time mode (U2000 server time mode or U2000 client time mode).
Context
l After setting the time mode, you must re-log in to the U2000 client for the settings to take
effect.
l Next time when you log in to the client, the U2000 client automatically uses the settings
that you used last time.
l The settings take effect for the current user that logs in different clients, but is invalid for
other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the navigation tree on the left of the Preferences window, select Time Mode.
Step 3 In the Time Mode group box, select Time Mode.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
132
NOTE
l Server time mode: If you select this option, the time on the U2000 client is displayed based on the
time zone where the server is located. For example, if the time of the client in UTC +08:00 is 10:00,
and the server is in the UTC +07:00, the time displayed on the U2000 client is 9:00. Server time
mode is used by default.
l Client time mode: If you select this option, the time on the U2000 client is displayed based on the
client OS time.
Step 4 Click OK.
----End
1.8.18 Setting the Toolbar
You can set toolbars and shortcut buttons that are displayed on the toolbar tray and the positions
of the toolbars.
Procedure
Step 1 Choose File > Customize Toolbar from the main menu.
Step 2 In the Customize Toolbar dialog box, select System, Security, Fault or Main Topology in the
Toolbars group box.
Step 3 Click Advanced.
The Customize Toolbar dialog box displays the Toolbar Buttons group box.
NOTE
l Click Advanced again. The Toolbar Buttons group box is hidden.
l The Toolbar Buttons group box consists of two parts: Available Tools and Customized Tools. All
the buttons in Customized Tools are displayed on the toolbar, and the buttons in Available Tools are
not displayed on the toolbar.
Step 4 In the Toolbar Buttons group box, set the buttons you want to display on the toolbar.
l In the Available Tools group box, select one button or hold down Ctrl or Shift to select
multiple buttons you want to display. Click to move the selected buttons to the
Customized Tools group box.
l In the Customized Tools group box, select one or hold down Ctrl or Shift to select multiple
buttons you do not want to display. Click to move the selected buttons to the
Available Tools group box.
NOTE
You can click Reset or Reset All to restore the selected or all toolbars to their initial state. These operations
help you adjust the display mode of buttons on the toolbar based on the initial state.
Step 5 Click OK.
The selected toolbars are displayed in the toolbar tray based on your settings.
Step 6 Optional: Adjust the positions of the toolbars in the toolbar tray.
1. Right-click in the blank area and choose Lock Toolbar from the shortcut menu. If Lock
Toolbar is not selected, you can skip this step.
2. Drag the toolbars to change their positions.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
133
3. After that, right-click in the blank area and choose Lock Toolbar from the shortcut menu.
The toolbars are locked, which prevent the toolbars from being moved by mistake.
NOTE
Right-click in the blank area and choose Reset Toolbar from the shortcut menu. The toolbars are restored
to their initial states.
----End
1.9 Setting the Alert at Network Disconnection
After you set the disconnection alert on the U2000 client, the sound box connected to the client
plays the sound if the U2000 client is disconnected from the server.
Context
l The audio files used for prompting network disconnection support only the audio files of
the WAV type in the PCM format. The audio files of the WAV type can be recorded in two
formats: PCM and Microsoft ADPCM.
l The setting takes effect for all the users that log in to different clients.
l Some computers in the sleep mode may close network connections automatically, the
U2000 plays the sound. You can change the sleep mode to solve the problem.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, select Disconnection Alert from the navigation tree on the left.
Step 3 In the Disconnection Alert group box, select Sound an alert when the client is disconnected
from the server.
Step 4 Click . In the Open dialog box, select an audio file, and then click Open.
Step 5 Click to play the sound.
Step 6 Click OK.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
134
1.10 Checking Whether the Client Needs Upgrade
You can perform this operation to check whether the version of the client matches that of the
server. If the versions do not match, you must upgrade the client.
Context
If the U2000 server is upgraded but the client is not upgraded, it may cause the version of the
client does not match that of the server.
Procedure
Step 1 Choose OSS Security > Check for Upgrades (application style) or Help > Check for
Upgrades (traditional style) from the main menu to check whether the client version matches
the server version.
l When the versions match, the client does not need to be upgraded. In this case, click OK.
l When the versions do not match, you must upgrade the client. In this case, perform the
following operations to upgrade the client:
1. Click OK.
2. In the Update Wizard: Update Applications window, click Continue. The upgrade
progress is displayed.
3. In the Update Wizard: Update Applications window, click Finish.
----End
1.11 Setting the Interval of Client Upgrade Check
After the server is upgraded, the server version and the client version do not match. Therefore,
the client has to be upgraded accordingly. After the interval for upgrade checking is set, the
U2000 periodically checks whether the client needs to be upgraded.
Context
The settings take effect immediately. They are valid on your other logged-in clients after you
log in again. The settings are invalid for other users.
Procedure
Step 1 Choose File > Preferences from the main menu.
Step 2 In the Preferences dialog box, in the navigation tree on the left, select Upgrade.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
135
Step 3 Select the interval for upgrade checking in the Interval drop-down list box.
Step 4 Click OK.
----End
1.12 Locking the Client
You can lock the U2000 client to prevent unauthorized operations.
Prerequisites
The U2000 client is not locked.
Context
In the Preferences dialog box, select Show main window when terminal locked in the Lock
Settings area. Thus, after the client is locked, the main window of the client is visible.
Procedure
l The following table describes how to set the client to be locked manually or automatically.
Lock Mode Operations
Automatically After you set the client to be locked automatically, the client is
automatically locked if it does not receive any operation
instructions in the specified period.
To set the client to be locked automatically, see 3.3.1.8 Setting
Auto-Locking for a Client.
Manually To ensure U2000 system security, if you do not perform operations
on the U2000 client for a period, you can lock the client to prevent
others from performing illegal operations on the U2000 client. You
can lock the client manually by using the following method:
l Choose File > Lock Terminal from the menu bar.
l Click on the toolbar.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
136
1.13 Unlocking the Client
After a client is locked by the current login user or by the system automatically, the current user
can unlock it, or ask a user in the SMManagers group to reset the password and then log in
again, or ask a user in the Administrators group to unlock the client.
Prerequisites
The U2000 client is locked.
Procedure
The following table describes how to unlock the client in different scenarios.
Operation
Scenarios
Operation Method
If the current user
remembers the
password
1. Press Ctrl+Alt+U or click .
2. Enter the current user name and password, and click OK.
If the current user
forgets the password
l A user in the SMManagers group need to reset the current user
password. For details, see 3.3.3.2 Resetting the Password of an
NMS user. Then log in to the client again using the user name and
the new password.
NOTE
A user in the SMManagers group cannot reset the password of the
admin user. If the current user is admin, only a user in the
Administrators group can unlock the client.
l The current user must ask a user in the Administrators group to
unlock the client. After the client is unlocked, the current user is
logged out.
1. Press Ctrl+Alt+U or click .
2. Enter the user name and password of the user in the
Administrators group, and click OK.
NOTE
If the number of password retries reaches the upper limit (3 by default), the user account is locked for a
specified period (30 minutes by default). The U2000 user is automatically unlocked after the auto-unlocking
duration. The U2000 user can also be unlocked by security administrators manually. For details, see 3.3.4.4
Unlocking Users.
1.14 Setting the Level of Operation Logs Recorded by the
Client
You can set the level of operation logs recorded by the client, which enables you to focus on
desired operation logs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
137
Context
l The settings take effect only for the current client. You need to set the log level again if the
client is restarted.
l The log file records the client running information, such as user login and logout time,
helping the maintenance personnel locate the problems on the live network.
Procedure
Step 1 Press Ctrl+Alt+Shift+L.
Step 2 Select Enable Logging in the Log Settings dialog box.
NOTE
If you clear the Enable Logging check box, the log level cannot be set and the client does not record logs.
Step 3 In the Log Settings dialog box, click the drop-down icon next to Log Level and select the level.
NOTE
The available log levels are described as follows:
l Detail: This is the lowest and default log level. It indicates that the client records all operation logs.
l Debug: This log level is higher than Detail, and it indicates that the client records all operation logs
except those at the Detail level.
l Warning: This log level is higher than Debug, and it indicates that the client records operation logs
at the Warning and Error/Exception levels.
l Error/Exception: This is the highest log level, and it indicates that the client records logs only at the
Error/Exception level.
Step 4 Click OK.
----End
Result
After you set the log level, the client record operation logs in Client installation directory\client
\client\var\log.
1.15 Setting a Scheduled Task
The U2000 can automatically execute certain tasks in a scheduled time without manual
intervention. You can set and modify these scheduled tasks as required.
Prerequisites
You are an NMS user with Operator Group authority or higher.
Context
If a large number of performance data need to be collected, this may cause communication
congestion and thus the communication between the U2000 and NEs stops. Hence, observe the
following rules to collect the performance data:
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
138
l When creating a single performance data collection task, the number of NEs related to the
same GNE does not exceed 5.
l Run the performance data collection task when network traffic is low.
Procedure
Step 1 Choose Administration > Task Schedule > Task Management (traditional style) from the
main menu or select System Management in Application Center and choose Task
Schedule > Task Management (application style) from the main menu.
Step 2 Optional: Create a scheduled task.
1. Click New and the New Task is displayed.
2. Enter a task name and select the task type of the scheduled task and the run type. Then,
click Next.
3. Set the Time Setting or the Period Setting. Click Next.
NOTE
If the Run now check box is selected, a scheduled task will run immediately.
At other time except DST, the option DST is unavailable.
4. Follow the task creation wizard to set the parameters of the scheduled task and click
Next for several times until the Finish button is displayed.
5. Click Finish. A scheduled task is successfully created.
Step 3 Optional: Double-click a scheduled task to modify the parameters of the task.
Step 4 Optional: Right-click a scheduled task and choose Suspend/Resume Schedule to set the
suspend time or the resume time for the task. Click OK.
Step 5 Optional: Right-click a scheduled task and choose Run now to start executing the task.
NOTE
Run now means to immediately execute the task, no matter the scheduled time comes or not. Resume
means to start the scheduled task. The task is executed at the scheduled time.
----End
1.16 Broadcast Messages
The broadcast message function includes setting the broadcast parameters and sending the
broadcast messages. The broadcast message function of the U2000 enables you to send messages
to other users with ease.
1.16.1 Setting Broadcast Parameters
You can set the number of historical broadcast messages displayed on the client and the number
of messages stored in the buffer on the server as required.
Procedure
Step 1 Choose System > Broadcast Message (application style) or Administration > Broadcast
Message (traditional style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
139
Step 2 In the Broadcast Message dialog box, click Options.
Step 3 In the Options dialog box, enter the values in Max. messages to display and Max. messages
to save, click Save.
NOTE
l Max. messages to display is valid only for the current client, not for the server.
l Max. messages to save is valid for all clients that are connected to the same server. The parameter
configured by a user affects the experience of other users.
l You are advised to set Max. messages to display only for your computer, and Max. messages to
save is set by the administrator of the U2000 server.
l The displayed messages are read from the buffer on the server, therefore, you need to set Max. messages
to display to a value that is less than or equal to Max. messages to save.
Step 4 In the Information dialog box, click OK.
----End
1.16.2 Sending Broadcast Messages
You can send broadcast messages so that online users on other clients can view messages sent
from the local client.
Context
l The client can receive its own broadcast messages. The output area in the lower part of the
U2000 client displays corresponding prompts.
l You have both permissions to set broadcast message parameters and send broadcast
messages.
l Only the online U2000 client can receive the broadcast messages.
Procedure
Step 1 Choose System > Broadcast Message (application style) or Administration > Broadcast
Message (traditional style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
140
Step 2 In the Broadcast Message dialog box, enter the message content in the New Message field.
CAUTION
Do not enter important information such as passwords.
NOTE
The U2000 automatically adds line feeds according to the length of broadcast messages.
Step 3 Click Send.
Step 4 In the Information dialog box, click OK.
----End
Result
When the sending is complete, the Information dialog box is displayed on other clients. Users
can click Detail to view the message.
1.17 Applying for and Updating the U2000 License
This topic describes the license file of the U2000, and how to apply for, install, and use the
U2000 license.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
141
1.17.1 U2000 License Precautions
This topic describes the U2000 license file. The license file is used to control the functions and
management capabilities of the U2000. If the U2000 license file is unavailable, you cannot log
in to the U2000 client.
l The U2000 license file naming format is: xxxxxxx.dat.
l On Solaris/SUSE Linux OS, the encoding format of the U2000 license file must be UNIX,
not DOS. For details about how to confirm the encoding format of the U2000 license file,
see How to Confirm the Encoding Format of the U2000 License File.
l One license file corresponds to the equipment serial number (ESN) in an NMS computer
and can be used only on the corresponding computer.
l Do not disable the NIC whose corresponding ESN is bound to the U2000 license file.
l The formal U2000 licenses are not OS-specific. That is, U2000 licenses do not need to be
applied for according to OS (SUSE Linux, Solaris, or Windows) differences.
l Do not make any change to the license file. Otherwise, the license becomes invalid.
l The U2000 provides a grace period of 60 days for commercial permanent licenses. No grace
period is specified for other types of licenses.
Within the grace period, overloaded license items are allowed, and the associated
resources can be added and used. The MTOSI XML NBI can be used to synchronize
NE inventory and alarm information on the entire network.
When the grace period ends, the associated message or alarm information will be
displayed. In this case, new access services, including adding NEs or service objects,
are not allowed. You must apply for a license as soon as possible. Otherwise, some
functions may be unavailable. The MTOSI XML NBI can be used to synchronize
network-wide NE inventories and the alarm information indicating that the number of
equivalent NEs exceeds the license restriction.
1.17.2 Applying for a U2000 License
This topic describes how to apply for a U2000 license.
Context
l The license file is not delivered to customers along with the U2000 installation DVD.
Contact Huawei engineers to apply for the licenses according to the contract number and
the equipment serial numbers (ESNs) of the oss server.
l To prevent the failure in finding the license file for possible U2000 reinstallation, save the
license application email and the license file properly.
l Before using the U2000, apply for a formal U2000 license (recommended) or a temporary
U2000 license. The application of a U2000 license takes a long time. Therefore, apply for
it in advance.
l An ESN is a string consisting of 40-digit numerals or letters obtained by encrypted
calculation on the MAC addresses of the U2000 server network interface. The number of
ESNs is the same as the number of network interfaces on the U2000 server. To avoid
applying for a new license due to replacing certain network interface cards (NICs), save
all the ESNs to ensure proper use of the U2000 license.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
142
Generally, the ESN for a server does not change. It can be used for the U2000 license
that is normally applied for.
If the ESN for a U2000 license is changed due to NIC or server replacement or ESN
application error, apply for a U2000 license again and contact Huawei technical support
engineers.
l The requirements for the ESNs of the server to which a license needs to be bound vary
according to the installation scheme. You must obtain ESNs of the server based on the
installation scheme.
In a centralized single-server system scheme, the license needs to be bound to the ESNs
of the server.
In a centralized high availability system (Veritas hot standby) scheme, the license needs
to be bound to the ESNs of the servers on both the primary site and the secondary site.
Procedure
Step 1 Obtain the contract number.
Step 2 Use the ESN tool provided by the U2000 to view ESNs of the server.
NOTE
If the U2000 has been installed, using the ESN tool of the U2000 to view the ESN is recommended.
Mode 1: View the ESN using the ESN tool of the NMS after installing the U2000.
On Solaris OS or SUSE Linux, perform the following steps to obtain ESNs:
1. Log in to the OS of the U2000 server as the root user.
NOTE
When a high availability system scheme is used, you must log in to the OSs of the primary and
secondary sites as the ossuser user.
2. Run the following commands to view ESNs:
# cd /opt/oss/server/platform/bin
# ./esn
A message similar to the following will be displayed:
ESN0:EBB74B99612CEDC82AD0A59886EC5018CE44DDD4
ESN1:BDA706C825FE0543DC028209778AA66396545412
ESN2:E1B00EEF6947DD95687AA5C608B72ACC532AB2BD
ESN3:F72F9EC08AEE78AA05A42EFD7BFD89F5E03139C4
.....
NOTE
If a high availability system scheme is used, you must respectively save the ESNs for the primary and secondary
sites. During the application for a formal license, you must provide the ESNs of the network interfaces of the
primary and secondary sites for external communication.
On Windows, perform the following steps to obtain ESNs:
1. Log in to the OS as a user with administrator rights.
2. Choose Start > Run.
3. In the Run dialog box, enter cmd. A command line interface (CLI) is displayed.
4. Run the following commands:
>esn
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
143
A message similar to the following will be displayed:
ESN0:EBB74B99612CEDC82AD0A59886EC5018CE44DDD4
ESN1:BDA706C825FE0543DC028209778AA66396545412
ESN2:E1B00EEF6947DD95687AA5C608B72ACC532AB2BD
ESN3:F72F9EC08AEE78AA05A42EFD7BFD89F5E03139C4
.....
Mode 2: Use the ESN tool to generate ESNs before installing the U2000.
NOTE
Make the following preparations:
l Contact Huawei engineers to obtain the ESN tool package. Huawei engineers can go to http://
support.huawei.com to download the ESN tool delivered with the version. The ESN tool is named as
follows:
l Solaris OS: U2000version_ESN_solaris_SPARC.tar
l SUSE Linux OS: U2000version_ESN_sles_x64.tar
l Windows OS: U2000version_ESN_win32_x86.zip
l Copy the ESN tool package to the computer.
Solaris or SUSE Linux is used as an example to describe how to use the downloaded ESN tool
to generate ESNs.
1. Use SFTP to upload the ESN tool to the U2000 server as the root user. For example, upload
the ESN tool to the /opt path. For details, see How to Use the FileZilla to Transfer Files by
SFTP.
2. Run the following commands to decompress the ESN tool package:
# cd /opt
# tar xvf U2000version_ESN_solaris_SPARC.tar
3. Run the following command to view the ESN:
# ./esn
Information similar to the following is displayed:
ESN0:EBB74B99612CEDC82AD0A59886EC5018CE44DDD4
ESN1:BDA706C825FE0543DC028209778AA66396545412
ESN2:E1B00EEF6947DD95687AA5C608B72ACC532AB2BD
ESN3:F72F9EC08AEE78AA05A42EFD7BFD89F5E03139C4
...
Step 3 After the esn command is executed, the system automatically generates the Esn.txt path. Send
the contract number and the server ESNs to Huawei engineers or the local Huawei office.
NOTE
Huawei engineers access http://license.huawei.com to obtain the license based on the contract number
and ESNs.
Step 4 Huawei engineers send the license file to you after obtaining it.
NOTE
The license file provided with the U2000 exists as a .dat file.
----End
1.17.3 Updating the U2000 License
This topic describes how to update the U2000 license.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
144
Prerequisites
l The OS and database must run properly. For details on how to start the OS and database,
see 1.2 Starting the U2000 System.
l The processes of the U2000 must be properly started. For details on how to start the
U2000 processes, see 1.2 Starting the U2000 System.
l You must log in to the U2000 client as the admin user.
l The license file of the U2000 must be obtained. The license file name can contain digits,
letters, and special characters excluding the space or \ /:*?"<>|.
Through the GUI of the client: Save the new U2000 license to the server where the
U2000 client is located.
Through the CLI: The new license file must be transferred to the U2000 server through
SFTP.
In the Solaris OS, upload the license file to the /export/home/ossuser path on the
server as the ossuser user.
In the SUSE Linux OS, upload the license file to the /export/home/ossuser path on
the server as the ossuser user.
In the high availability system, upload the new U2000 license file to the /export/
home/ossuser path on the server on the primary site through SFTP.
l After the U2000 is installed, you must load the U2000 license to ensure that the U2000 is
available.
For details, see the updated contents about the U2000 license in this topic.
l Confirm that the license file is transferred in text mode, that is, in ASCII mode.
Context
l If the U2000 license file is unavailable, you cannot log in to the U2000 client. Update the
U2000 license file in time.
l During the update of the U2000 license file, you can replace the formal U2000 license file
with the temporary one; It is recommended to use the formal U2000 license as soon as
possible.
l The licenses of different R versions of the U2000 are incompatible. For example, the license
of V100R001 cannot be used by V100R002.
l Determine whether to update the U2000 license file based on the U2000 license use
conditions.
In the case that the device types supported by the new license are different from those
supported by the original license, the license is updated as follows:
If the device types supported by the new license are more than the device types
supported by the original license and the added device types are supported by the
current version, the license can be updated. If the added device types are not
supported by the current version, the license cannot be updated.
If the device types supported by the new license are less than the device types
supported by the original license and no NEs of the reduced device types are created
in the NMS, the license can be updated. If certain NEs of the reduced device types
are created in the NMS, the license cannot be updated.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
145
For IP domain, if the function items supported by the new license are less those
supported by the original license, the license cannot be updated.
In the case that the number of clients supported by the new license is different from that
supported by the original license, the license is updated as follows:
If the number of clients supported by the new license is less than that supported by
the original license but the number of online clients is less than the number of clients
supported by the new license, the license can be updated. If the number of online
clients is greater that the number of clients supported in the new license, the license
cannot be updated.
If the number of clients supported by the new license is greater than that supported
by the original license, the license can be updated.
NOTE
If NE license items for the IP domain are deleted from the updated license, restart the license service
after license update. The service and process names are LicenseService and lic_agent respectively.
For details about how to restart the service, see chapter Starting and Stopping a Process in U2000
Administrator Guide.
l In scenarios where you can change the license, you can update the U2000 license and then
restart the server.
You can update the U2000 license through the GUI or CLI.
Restart the client after you replace a license. Then, the client automatically reloads the
menu items according to the control items defined in the new license.
Through the GUI of the Client:
Application scenario: This method is recommended if you can log in to the
U2000 client and access the GUI.
Operation method: Log in to the U2000 client, and then click Update License
to update the license.
Restart the client after you update the license. Then, the client automatically
reloads GUI elements according to control items defined in the new license.
Through the CLI:
Application scenario: This method is applicable to the scenario where you need
to remotely update the license through commands because logging in to the
U2000 client is not allowed and the client does not provide any GUI.
Operation method: Check that the processes of the U2000 are properly started,
and then run the updateLicense -file filename command to update the license
file.
It is recommended that you update the U2000 license through the GUI of the client.
If the license updated through the GUI of the client requires deploying the NE Explorer
or other processes, a message will be displayed when you start the U2000 processes
after updating the license. Viewing the process startup status on the System Monitor
client and performing operations after all the processes have been started are
recommended.
To ensure the normal running of the U2000, do not manually replace the license file.
NOTE
To make both the U2000 commercial and temporary licenses take effect, use the GUI mode.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
146
Procedure
l Through the GUI of the Client
For the single-server system:
1. On the U2000 workstation, back up the original license file.
In the Windows OS: Create the backup folder in the default directory D:\oss
\server\etc\conf\license. Copy the original license file to the created folder.
In the Solaris or SUSE Linux OS:
run the following commands to back up the any other license file to the /opt/oss/
server/etc/conf/license path.
$ mkdir -p /opt/oss/server/etc/conf/license_backup
$ cd /opt/oss/server/etc/conf/license
$ cp license_file_name /opt/oss/server/etc/conf/license_backup
NOTE
After SetSolaris is enabled, only the SSH service for the ossuser user has the login right. The
SSH login mode is recommended for your system security. To use another login mode such as
Telnet, you must enable the access right for the Telnet service and the login user. For details,
see How to Start/Stop the FTP, SFTP, and Telnet Services and How to Enable and Disable the
FTP/Telnet Authority of user root on Solaris OS.
2. Update the U2000 License file through the GUI of the U2000 Client.
a. Choose Help > License Management > License Information (traditional style)
from the main menu or select System Management in Application Center and
choose License Management > License Information (application style) from
the main menu.
b. In the License Information dialog box, click Update License.
c. Select the new license file and click Open.
d. Click Next.
e. Select a scenario and perform the associated operations as required:
If Incremental is unavailable, click Next.
If Incremental is available and only the new U2000 license needs to be
effective, select Full and click Next.
If Incremental is available and both the new and in-use U2000 licenses need
to be effective, select Incremental and click Next. If the in-use U2000 license
has a commercial license and a temporary license, the new license will replace
the license of the same type. For example, if the new license is a commercial
license, the commercial license in the in-use U2000 license will be replaced.
f. Click Finish.
g. Click Yes and confirm the updated license.
h. Click Yes to close all windows.
i. Click Yes to log out of the system.
3. Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.
For the HA system:
1. Log in to the U2000 server on the primary and secondary sites.
2. Back up the original U2000 license file on the primary and secondary sites.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
147
Create the backup folder in the default path. Then, copy the original license file to
this folder.
NOTE
l The default path of U2000 license file in the Solaris or SUSE Linux OS is /opt/oss/server/
etc/conf/license.
l The default path of U2000 license file in the Windows OS is D:\oss\server\etc\conf
\license.
3. Update the license file on the primary site.
a. Log in to the OS where the U2000 client is installed.
In Windows, log in to the OS as a user with administrator rights.
In Solaris, log in to the OS as the ossuser user.
b. Save the license to be loaded to the server where the U2000 client is installed.
c. On the desktop, double-click U2000 Client. The Login dialog box is displayed.
d. In the Server drop-down list, select the server (server on the primary site) to be
logged in to. Then, set User Name and Password to the valid values, and click
Login. The initial password of the admin user is Changeme_123 (It is
Admin_123 for a U2000 that comes preinstalled). The password must be
changed during the first login to ensure system security. Keep the password
confidential and change it regularly.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
148
NOTE
l If a message indicating that no license is available is displayed when you log in to
the U2000 client.
1. In the Confirm dialog box, click Yes. The Open dialog box will be displayed.
2. In the Open dialog box that is displayed, select the new license file and click
Open. The License Comparison Results dialog box will be displayed.
3. Click OK.
4. Click Yes and confirm the loaded license.
5. Click OK.
l If U2000 license is loaded before.
1. Choose Help > License Management > License Information (traditional style)
from the main menu or select System Management in Application Center and
choose License Management > License Information (application style) from
the main menu.
2. In the License Information dialog box, click Update License.
3. Select the new license file and click Open.
4. Click Next.
5. Select a scenario and perform the associated operations as required:
l If Incremental is unavailable, click Next.
l If Incremental is available and only the new U2000 license needs to be
effective, select Full and click Next.
l If Incremental is available and both the new and in-use U2000 licenses need
to be effective, select Incremental and click Next. If the in-use U2000
license has a commercial license and a temporary license, the new license
will replace the license of the same type. For example, if the new license is
a commercial license, the commercial license in the in-use U2000 license
will be replaced.
6. Click Finish.
7. Click Yes and confirm the updated license.
8. Click Yes to close all windows.
9. Click Yes to log out of the system.
4. Update the license file on secondary site.
a. On the primary site, log in to the VCS client.
b. Right-click the AppService resource group and choose Switch to > Remote
switch from the shortcut menu.
NOTE
During data synchronization between the primary and secondary sites, do not perform
this operation.
c. Select the Clusters and Systems to be switched.
d. Click OK.
e. In the Confirm dialog box, click Yes to switch U2000 services to the secondary
site.
f. Use the U2000 client to reconnect to the system IP address of the secondary site.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
149
NOTE
l If a message indicating that no license is available is displayed when you log in to
the U2000 client.
1. In the Confirm dialog box, click Yes. The Open dialog box will be displayed.
2. In the Open dialog box that is displayed, select the new license file and click
Open. The License Comparison Results dialog box will be displayed.
3. Click OK.
4. Click Yes and confirm the loaded license.
5. Click OK.
l If U2000 license is loaded before.
1. Choose Help > License Management > License Information (traditional style)
from the main menu or select System Management in Application Center and
choose License Management > License Information (application style) from
the main menu.
2. In the License Information dialog box, click Update License.
3. Select the new license file and click Open.
4. Click Next.
5. Select a scenario and perform the associated operations as required:
l If Incremental is unavailable, click Next.
l If Incremental is available and only the new U2000 license needs to be
effective, select Full and click Next.
l If Incremental is available and both the new and in-use U2000 licenses need
to be effective, select Incremental and click Next. If the in-use U2000
license has a commercial license and a temporary license, the new license
will replace the license of the same type. For example, if the new license is
a commercial license, the commercial license in the in-use U2000 license
will be replaced.
6. Click Finish.
7. Click Yes and confirm the updated license.
8. Click Yes to close all windows.
9. Click Yes to log out of the system.
5. Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.
l Through the CLI
For the single-server system:
1. On the U2000 workstation, back up the original license file.
In the Windows OS: Create the backup folder in the default directory D:\oss
\server\etc\conf\license. Copy the original license file to the created folder.
In the Solaris or SUSE Linux OS:
run the following commands to back up the any other license file to the /opt/oss/
server/etc/conf/license path.
$ mkdir -p /opt/oss/server/etc/conf/license_backup
$ cd /opt/oss/server/etc/conf/license
$ cp license_file_name /opt/oss/server/etc/conf/license_backup
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
150
NOTE
After SetSolaris is enabled, only the SSH service for the ossuser user has the login right. The
SSH login mode is recommended for your system security. To use another login mode such as
Telnet, you must enable the access right for the Telnet service and the login user. For details,
see How to Start/Stop the FTP, SFTP, and Telnet Services and How to Enable and Disable the
FTP/Telnet Authority of user root on Solaris OS.
2. Update the U2000 license.
In the Windows OS:
a. Log in to the OS as a user with administrator rights.
b. Run the following command to update the U2000 license file:
> updateLicense -file License_file_name
NOTE
In the command, License_file_name indicates the combination of an absolute path
and a file name. For example, if the license fine is named license123.dat and stored
in d:\, the command to rename the U2000 license file is > updateLicense -file d:
\license123.dat.
If illegible characters are displayed, set the environment variable:
FILEIO_LOCAL_CHARSET=1.
Information similar to the following is displayed:
state product feature item name
old value new value
no change: U2000 COMMON LSW1CAPA01
Client 500 500
no change: U2000 COMMON LSW1CAPA01
Client 1 1
no change: U2000 COMMON LSW1FMCLT01 Alarm
Export 1 1
no change: U2000 COMMON LSW1RENOTI01
Client 1 1
Are you sure to update the license?(Y/N)
c. Enter Y, and then press Enter.
In the Solaris OS:
a. log in to the OS of the U2000 server as the ossuser user.
b. Run the following command to update the U2000 license file:
$ cd /export/home/ossuser
$ updateLicense -file License_file_name.dat
NOTE
In the command, License_file_name indicates a file name or the combination of an
absolute path and a file name.
Information similar to the following is displayed:
state product feature item name
old value new value
no change: U2000 COMMON LSW1CAPA01
Client 500 500
no change: U2000 COMMON LSW1CAPA01
Client 1 1
no change: U2000 COMMON LSW1FMCLT01 Alarm
Export 1 1
no change: U2000 COMMON LSW1RENOTI01
Client 1 1
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
151
Are you sure to update the license?(Y/N)
c. Enter Y, and then press Enter.
In the SUSE Linux OS:
a. log in to the OS of the U2000 server as the ossuser user.
b. Run the following command to update the U2000 license file:
$ cd /export/home/ossuser
$ updateLicense -file License_file_name.dat
Information similar to the following is displayed:
state product feature item name old
value new value
used value
new: iManager U2000 VALUET LNSDAASC01 Alarm
Application Software license-Transmission
Network 1
new: iManager U2000 VALUET LNSDAEASC01 SDH-ASON
Management Function Component-Transport
Network 1
new: iManager U2000 VALUET LNSDAEASC02 license Per
Equivalent VC4 for SDH ASON Service 10
new: iManager U2000 VALUET LNSDAEASC03 ASON NG WDM
Application Software license-Transmission Network
1
...
Are you sure to update the license?(Y/N):
c. Enter Y, and then press Enter.
3. Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.
For the HA system:
1. Log in to the U2000 server on the primary and secondary sites.
2. Back up the original U2000 license file on the primary and secondary sites.
Create the backup folder in the default path. Then, copy the original license file to
this folder.
NOTE
l The default path of U2000 license file in the Solaris or SUSE Linux OS is /opt/oss/server/
etc/conf/license.
l The default path of U2000 license file in the Windows OS is D:\oss\server\etc\conf
\license.
3. Run the updateLicense command to update the license file on the primary site. For
details, see Step 2.
4. Transfer the updated license file on the primary site to the /opt/oss/server/etc/conf/
license path on the server on the secondary site in text mode, that is, ASCII mode.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
152
NOTE
l The default path of U2000 license file in the Solaris or SUSE Linux OS is /opt/oss/server/
etc/conf/license.
l The default path of U2000 license file in the Windows OS is D:\oss\server\etc\conf
\license.
l In the Solaris or SUSE Linux OS: You should transfer the updated license file on the
primary site to the server on the secondary site in text mode, that is, ASCII mode. In the
Windows OS: Copy and paste the updated license file on the primary site to the server on
the secondary site.
5. Restart the client after you replace a license. Then, the client automatically reloads
the menu items according to the control items defined in the new license.
----End
Result
After the preceding operations are performed, the license file is automatically loaded to the /opt/
oss/server/etc/conf/license path.
1.17.4 Checking the Status of the U2000 License
This topic describes how to check the status of the U2000 license. By checking the license status,
you can learn the usage of the license, so as to apply for a new license file from Huawei in time
before the NMS needs to be expanded or the validity of the license is due.
Context
By checking the U2000 license status, you can learn whether the U2000 license control items
are correct. If a license control item is incorrect, the related functional module is unavailable.
For example, if the license control item for the U2000 E2E module is absent, tunnels cannot be
created.
Procedure
Step 1 Log in to the U2000 Client.
Step 2 Choose Help > License Management > License Information (traditional style) from the main
menu or select System Management in Application Center and choose License
Management > License Information (application style) from the main menu.
Step 3 In the License Information dialog box that is displayed to view the condition of the license.
----End
1.17.5 Revoking a License on the U2000
The U2000 supports the function of revoking a License. You can revoke the License that is not
in use to obtain the revocation code and then use the code to apply for a new License.
Prerequisites
You have logged in as a user who belongs to the Administrators or SMManagers user group.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
153
Context
The Revoke License dialog box displays only available License files and does not display
revoked and invalid Licenses.
Procedure
Step 1 Choose License Management > Revoke License (application style) or Help > License
Management > Revoke License (traditional style) from the main menu.
Step 2 In the Revoke License dialog box, select the License that is not used any more, and then click
Revoke License.
NOTE
l Product: Name of the product.
l License SN: SN of a License file.
l License File: Name of a License file.
Step 3 In the Confirm dialog box, click Yes.
The License file is revoked.
----End
Result
If you revoke a License file but do not apply a new License, the U2000 displays a dialog box
every hour, prompting you to update the License. The U2000 also displays License SN,
Revocation Time, Valid Date (indicating the date before which the revoked License can still
be used) of the License, and License File.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
154
1.17.6 Querying the License Revocation Code on the U2000
This topic describes how to view the License revocation code on the U2000 client. When
applying for a new License, you need to provide the revocation code of the old License.
Procedure
Step 1 Choose License Management > Query License Revocation Code (application style) or
Help > License Management > Query License Revocation Code (traditional style) from the
main menu.
Step 2 In the Query License Revocation Code dialog box, view the License SN, License revocation
code, and revocation setting time.
NOTE
l License SN: SN of a License file.
l License Revocation Code: A string generated after a License file is revoked. According to this unique
string, you can check that its corresponding License file is revoked. When changing the equipment
serial number (ESN) or License capacity, you need to provide the License revocation code.
l Revocation Time : Time when you set a License file to be revoked.
Step 3 Right-click the information about the revocation code and choose Copy to copy the information.
The copied information about the revocation code can be used to apply for a certificate.
NOTE
You can also select the information about the queried revocation code, and then press Ctrl+C to copy the
information.
----End
1.17.7 Setting Periodic Export of the U2000 License
When the upper-layer NMS needs to collect statistics on Licenses used by U2000 recently (for
example, usage of License items and License update time), you can perform U2000 License
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
155
export tasks periodically or instantly to dump the Licenses information used by the U2000, and
save them as an XML file to the specified folder.
Context
If the current License file used by the U2000 becomes invalid due to the License initialization
failure, the exporting task is not executed, and users need to contact Huawei technical support
to update the License.
Procedure
Step 1 Choose Task Schedule > Task Management (application style) or Administration > Task
Schedule > Task Management (traditional style) from the main menu.
Step 2 In the Take Type navigation tree, choose File Interface > OSS License Export.
Step 3 In the task list on the right, double-click the OSS License Export task.
Step 4 In the Attribute dialog box, set the parameters on the Common Parameters and Extended
Parameters tab pages, and then click OK.
Step 5 Perform the OSS License Export task.
l If Status of the task is Suspend, right-click the task and choose Resume from the shortcut
menu. Then right-click the task again and choose Run Now from the shortcut menu.
l If Status of the task is Idle, right-click the task and choose Run Now from the shortcut
menu.
----End
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
156
1.17.8 Setting the NE Capacity Threshold for the U2000 License
When the number of accessed NEs reaches the threshold of the License capacity, the U2000
generates alarms and displays an Information dialog box periodically.
Procedure
Step 1 Choose Settings > Management Capacity Alarm Settings (application style) or
Administration > Settings > Management Capacity Alarm Settings (traditional style) from
the main menu.
Step 2 In the Management Capacity Alarm Settings dialog box, enter the License threshold in
Threshold.
Step 3 Optional: Select the Display periodical warning check box. In Warning interval(minutes),
set the interval.
Step 4 Click OK.
----End
Result
When the proportion of the number of accessed NEs to the License capacity reaches the threshold
specified for the License capacity, the U2000 generates The NE Capacity Reached the
Threshold Alarm and periodically displays an Information dialog box. When the proportion
is less than the threshold specified for the License capacity, the U2000 clears The NE Capacity
Reached the Threshold Alarm and the Information dialog box is not displayed any more.
1.17.9 Collecting Port Statistics of Service Licenses
This topic describes how to use the U2000 to collect port statistics of service licenses
automatically. The number of service license items that are consumed and charged is measured
by the number of ports that network services occupy. The automatic statistics collection enables
you to quickly obtain the service license usage.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
157
Prerequisites
This operation applies only to the service licenses that are consumed and charged based on ports.
Context
l License items are subtracted when you add a board rather than when you create a service.
The number of service license items is subtracted by the number of ports on the new board.
l The U2000 checks the number of service license items at scheduled time every day and
enters the grace period when the number of remaining license items reaches the threshold.
During the grace period, there is no restriction on your operations. When the grace period
expires, you cannot create services. However, existing services are still functioning
properly. Because the deleted services cannot be recreated, excise caution when deleting
the services.
l The grace period ends for the U2000 when you update the service license with a new valid
one. If resources are still insufficient, the start and end time of the grace period are
recalculated.
l The U2000 reports ALM-801 OSS License Beyond Limitation when it enters the grace
period. Contact your Huawei engineers for new licenses.
l Service licenses do not restrict NE functions. That is, NE licenses are not affected by service
licenses.
Procedure
Step 1 Choose Help > License Management > Statistics of Service Ports (traditional style) from the
main menu or select System Management in Application Center and choose License
Management > Statistics of Service Ports (application style) from the main menu.
Step 2 In the Statistics of Service Ports dialog box, view the number of ports consumed in each service
license.
NOTE
Choose Help > License Management > License Information (traditional style) from the main menu or
select System Management in Application Center and choose License Management > License
Information (application style) from the main menu. In the License Information dialog box, click the
Resource Control Item tab and view Capacity, Consumption, and Overflow Time of different resource
control items in the current licenses.
Step 3 Optional: Click Advanced. In the Advanced Settings dialog box, view the number of free
inventory resources.
Step 4 Optional: Click Export and save the port statistics to a TXT, CSV, HTML, or XLS file.
----End
1.18 Starting the Web Client
Certain NEs must be configured by using the Web LCT. Before you configure services for these
NEs, you need to first start the Web LCT client.
Prerequisites
l You are an NMS user with Operator Group authority or higher.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
158
l It is applicable to the OptiX OTU 40000, and OptiX OSN 900A.
Procedure
Step 1 Optional: Double-click an optical NE on the topology. The NE Panel is displayed. Select an
NE from the object tree on the left.
Step 2 Right-click an NE and choose Start WEB Client from the shortcut menu. The Web LCT user
interface is displayed.
NOTE
Enter the default user name proxyuser and password Changeme_123. If the user name and password need
to be changed, see Security Management > User Security Policy Management > Managing Web Proxy
Users in the U2000 System Administrator Guide.
----End
1.19 Starting the NE Data Collection
When an NE is faulty, you can collect the NE data for fault identification and analysis. There
are fast fault collection and full fault collection.
Prerequisites
l You are an NMS user with Guests authority or higher.
l It is applicable to the MSTP series, WDM series, WDM (NA) series, RTN series, PTN
series (except PTN 6900 series) and marine series NEs.
Context
NOTE
The product feature you have purchased may use personal information of users when providing services
or maintenance. Therefore, you are obligated to take considerable measures, in compliance with the laws
of the countries concerned and the user privacy policies of your company, to ensure that the personal data
of users is fully protected.
Procedure
Step 1 In the Main Topology, right-click an NE and choose Collect NE Data from the shortcut menu.
The Datacollector window is displayed.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
159
NOTE
In the Datacollector window, press F1 to display the Online Help topic relevant to data collection
operations and troubleshooting methods of common problems.
----End
1.20 Customizing Naming Rule
When you create fibers or trails, the U2000 automatically creates the names of the fibers, trails,
ASON trails, Tunnel, Tunnel protection group PWE3 Service and Native Ethernet E-Line
Service based on the naming rule. The settings can be modified according to actual requirements.
This section takes the fiber naming rule as an example to illustrate how to customize the naming
rule.
Context
l Applies to the MSTP series, WDM series, WDM (NA) series, RTN series, PTN series,
ATN series, Marine series, NE series, CX series and Access series NEs.
l The naming rule is a string that comprises a series of fields. The U2000 provides some
fields by default. The user can add new fields, modify or delete the existing fields and adjust
the field position according to the actual requirements, to customize the naming rule.
Procedure
Step 1 Choose Administration > Settings > Naming Define Rule (traditional style) from the main
menu or select System Management in Application Center and choose Settings > Naming
Define Rule (application style) from the main menu.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
160
The Naming Define Rule dialog box is displayed.
Step 2 Choose the fiber or trail which want to be named from the Function Tree of Function
Configuration. The naming rule is displayed on the right-hand pane.
Step 3 Optional: Click Refresh to obtain the latest naming rule customized by other users.
Step 4 Click Create Rule and enter the name of the newly created rule in the first row.
Step 5 Add new fields.
1. Right-click on the Field Descriptions list, and choose Add Field from the shortcut menu
to add a new field.
2. Select the field type in the Type list and define its value.
There are four types of fields.
l Fixed Field: This type of field defines fixed strings contained in all names. Enter the
string in Fixed Field field.
l Connector Field: This type of field defines the connector used in the name. Select the
connector in the Connector Field field.
l Dynamic Field: In this type of field, you can select some attributes of the fiber or cable
and add the value to the name, for example, contain the name of Source NE in the
naming rule. Select the attributes in the Dynamic Field field.
l Digital Field: In this type of field, the numerals contained in the naming rule can be set
to change regularly so that the names of fibers or cables following the same rule is not
repeated. In the Digital Field field, set Current Value, Min. Value, Max. Value and
Step Length.
NOTE
It is recommended that there is only one Digital Field in the naming rule. If there are multiple digital
fields, it is recommended to set others to Fixed Field.
3. Define the field name in the Name list.
4. Define the field length in the Length list.
Step 6 Optional: Delete fields. Select the field to delete in the Field Descriptions list. Right-click it
and choose Delete Field from the shortcut menu.
Step 7 Optional: Set how the field is sequenced in the naming rule. Select the field and click
to move the field forward and click to move it backward.
Step 8 Click Apply to set the current naming rule as the default rule on the client.
Step 9 In the Such As field, you can preview the current naming rule.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
161
Step 10 Click Save to save the current naming rule and set it as the default rule.
Step 11 Click Apply to set whether to apply the current naming rule as the naming rule of the current
client.
----End
1.21 U2000 Process List
This topic describes the information about U2000 processes,such as the functions and dependent
processes of each process and the port occupied by each process.
l The name of a multi-instance process contains numbers to distinguish from a process with
the same function. Table 1-15 shows a process with numbers omitted. For example,
ds_agent refers to the ds*_agent process, with the asterisk character (*) indicating a number.
l Every instance is responsible for some independent service data. Stopping an instance will
certainly affect related services.
Table 1-15 shows the description of U2000 services and processes. Required Process specifies
the processes that a specified process depends on during startup. The System Monitor displays
the direct and indirect dependencies.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
162
Table 1-15 U2000 process list
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Activ
eMQ
ActiveMQ ST_ActiveM
Q,server/
platform/
sacscript/
standalone
None 816
1,
616
16,
616
17,
615
5
TCP,
TCP,
TCP,
UDP
serv
er/
cbb/
nbi/
nbic
bb_3
p/
activ
emq/
data/
activ
emq.
log.*
ActiveMQ
Service. Provides
the northbound
interface which
supports JMS
notifications.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
163
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Agent
_COR
BA
Agent_CORB
A
Agent_CORB
A,server/nbi/
corba/bin
Licen
seSer
vice,
Secur
itySe
rvice,
LogS
ervic
e,mc
120
03,
220
03
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nbi/
Age
nt_C
ORB
A/
unbi
_cor
bade
bug_
%y
%m
%d_
%H
%M
%
S_*.
*
serv
er/
var/
logs/
Dev
elop/
nbi/
Age
nt_C
ORB
A/
unbi
_cor
bano
tify_
%y
%m
%d_
%H
CORBA Service.
This process
provides the
CORBA NBI
management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
164
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
%M
%
S_*.
*
serv
er/
var/
logs/
Dev
elop/
nbi/
Age
nt_C
ORB
A/
unbi
_cor
basy
s_%
y%
m%
d_%
H%
M%
S_*.
*
serv
er/
var/
logs/
Dev
elop/
nbi/
Age
nt_C
ORB
A/
unbi
_deb
ug_
%y
%m
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
165
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
%d_
%H
%M
%
S_*.
*
serv
er/
var/
logs/
Dev
elop/
nbi/
Age
nt_C
ORB
A/
unbi
_sys
_%y
%m
%d_
%H
%M
%
S_*.
*
Agent
Integr
ate
AgentIntegrat
e
java,server/$
{IMAP_JAV
A_HOME}/
bin
None No
ne
None Non
e
Integrate
Interface Service.
Provide integrate
interface service
to other systems
in U2000
solution.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
166
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
agt_cs
t_xml
agt_cst_xml java,server/$
{IMAP_JAV
A_HOME}/
bin
None 301
02
TCP serv
er/
var/
logs/
Dev
elop/
nbi/
xml2
tl1/
xml2
tl1.*
XML northbound
interface (non
MTOSI). This
process provides
XML NBI
Management
service for
Access NE(non
MTOSI).
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
167
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsA
ccess
BmsAccess BmsAccess,se
rver/nemgr/
nemgr_access
/bin
mc 131
62,
161
TCP
UDP
serv
er/
var/
logs/
Dev
elop/
Bms
Acce
ss_*/
Bms
Acce
ss_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Bms
Acce
ss_*/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
Access Device
Manager. This
process provides
the equipment
management of
the access
domain.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
168
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
Bms
Acce
ss_*
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
169
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsA
tur
BmsAtur BmsAtur,serv
er/nemgr/
nemgr_access
/bin
mc 161 UDP serv
er/
var/
logs/
Dev
elop/
Bms
Atur
_*/
Bms
Atur
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Bms
Atur
_*/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
Access Device
ATUR Manager.
This process
provides the
xDSL terminal
management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
170
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Bms
Atur
_*_p
86_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
171
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsC
ommo
n
BmsCommon BmsCommon
,server/
nemgr/
nemgr_access
/bin
mc,Li
cense
Servi
ce
131
62,
161
TCP
UDP
serv
er/
var/
logs/
Dev
elop/
Bms
Com
mon/
Bms
Com
mon
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Bms
Com
mon/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
Access Device
Common
Service. This
process provides
license, task
scheduling,etc.
management of
the access
domain.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
172
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
iMA
PBas
e_p2
42_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
173
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsH
GMP
Dm
BmsHGMPD
m
BmsHGMPD
m,server/
nemgr/
nemgr_access
/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Bms
HG
MP
Dm/
Bms
HG
MP
Dm_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p2
34_
%y
%m
%d_
%H
%M
%
S.*
HGMP Manager
Process. HGMP
manager service
provides the
function of
managing HGMP
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
174
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsP
onAla
rmTL
1
None BmsPonAlar
mTL1,/
nemgr/
nemgr_access
/bin
mc,Li
cense
Servi
ce
130
28
TCP serv
er/
var/
logs/
Dev
elop/
Bms
Pon
Alar
mTL
1
serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p4
008_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
PON TL1 Alarm
Process. This
process provides
PON TL1 Alarm
NBI
Management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
175
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
176
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsP
onEm
sTL1
BmsPonEms
TL1
BmsPonEms
TL1,server/
nemgr/
nemgr_access
/bin
mc,Li
cense
Servi
ce
130
27
TCP serv
er/
var/
logs/
Dev
elop/
Bms
Pon
Ems
TL1
serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p4
007_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
Access PON TL1
Process. Provides
service
provisioning and
fault diagnosis
for PON TL1
services.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
177
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
178
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsT
est
BmsTest BmsTest,serv
er/nemgr/
nemgr_access
/bin
mc 161 UDP serv
er/
var/
logs/
Dev
elop/
Bms
Test
serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p7
9_%
y%
m%
d_%
H%
M%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
Access Device
Line Test. This
process provides
line test of the
access domain.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
179
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BmsT
iming
Task
BmsTimingT
ask
BmsTimingT
ask,server/
nemgr/
nemgr_access
/bin
mc No
ne
None serv
er/
var/
logs/
Dev
elop/
Bms
Timi
ngTa
sk/
Bms
Timi
ngTa
sk_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Bms
Timi
ngTa
sk/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
TL1 Timing Task
Manager. This
process provides
TL1 timing task
management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
180
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
var/
logs/
mrbl
og/
iMA
PBas
e_p3
8_%
y%
m%
d_%
H%
M%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
181
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BoxS
WMg
rDm
BoxSWMgrD
m
BoxSWMgrD
m,server/
nemgr/
nemgr_switch
mgr/
switchmgr_bo
x/bin
eam_
agent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Box
SW
Mgr
Dm/
Box
SW
Mgr
Dm_
%y
%m
%d_
%H
%M
%
S.*
Case-shaped
Switch NE
Management.
Manages case-
shaped Quidway
switches.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
182
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
BulkC
ollect
orDm
BulkCollector
Dm
BulkCollector
Dm,server/
common/
pmscollector/
bin
None 21 TCP serv
er/
var/
logs/
Dev
elop/
Bulk
Coll
ector
Dm_
1/
Bulk
Coll
ector
Dm_
%y
%m
%d_
%H
%M
%
S.log
Bulk Collector.
This process
provides the
function of
collecting
performance data
in batches.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
183
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
CFM
SiDm
CFMSiDm CFMSiDm,se
rver/common/
access_comm
on/pccw112/
bin
mc 800
1,
900
1
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
CF
MSi
Dm/
CF
MSi
Dm_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
CF
MSi
Dm/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
Customer Feature
Management
NBI. This process
provides
Customer Feature
Management
NBI service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
184
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
iMA
PBas
e_p8
1_%
y%
m%
d_%
H%
M%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
185
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
cltsi None cltsi,server/
common/
access_comm
on/pccw112/
bin
mc 900
0
TCP serv
er/
var/
logs/
Dev
elop/
cltsi/
cltsi
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
cltsi/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
Access 112 Test
(CLTSi). This
process provides
the CLTSi 112
test.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
186
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
dam dam dam,server/
common/
frame/dam/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
dam/
dam
_%y
%m
%d_
%H
%M
%
S.*
Device Access
Manager. Creates
SNMP NEs.
dataco
llector
svr
datacollectors
vr
datacollectors
vr,server/
tools/
datacollector/
bin
None No
ne
None serv
er/
tools
/
data
colle
ctor/
log/
Data
colle
ctorl
og/
*.*
serv
er/
tools
/
data
colle
ctor/
log/
Scri
ptLo
g/*.*
NE Data
Collector
Process. The
Datacollector is
mainly used for
collecting the
complete and
correct fault data
in case of NE
failure and helps
to locate faults
quickly
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
187
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
DCSe
rver
DCServer DCServer,ser
ver/common/
dc/bin
None 22,
69,
23,
140
0
TCP,
UDP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
DCS
erver
*.log
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
Boot
Log
*.log
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
Bms
_ne*
_%y
%m
%d_
%H
%M
%
S.*
DC. This process
provides the
function of NE
software
management and
disaster recovery
management.
The detailed
functions are NE
software
upgrade, patch
installation, data
backup and
recovery for
disaster recovery,
and plug-andplay
automatic
upgrade of case-
shaped
equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
188
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
Dms
_ne*
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
tkdll
_log/
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
back
up*/
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
189
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
DmsB
aseD
m
DmsBaseDm DmsBaseDm,
server/
common/ip/
base/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Dms
Base
Dm/
*.log
Basic IP Service.
Provides basic IP
services, such as
link search,
system log,
interface
inventory, and
change audit.
DmsN
etAcl
Dm
DmsNetAclD
m
DmsNetAclD
m,server/
common/ip/
base/acl/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Dms
Net
Acl
Dm/
Dms
Net
Acl
Dm_
%y
%m
%d_
%H
%M
%
S.*
NetACL.
Configures ACLs
for multiple NEs
in batches.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
190
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
DrlD
m
DrlDm DrlDm,server
/common/
syslog/bin/
None No
ne
None serv
er/
var/
logs/
iMA
P.log
_age
nt.tra
ce
serv
er/
var/
logs/
mrbl
og/
DrlD
m_p
499_
%y
%m
%d_
%H
%M
%
S.*
NE Run Log. NE
Run Log
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
191
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
ds_ag
ent
DesktopServi
ce
None None 310
37,
310
38,
310
39,
310
40,
310
41~
310
50,
308
00~
308
49
TCP,
TCP,
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
ds/
ds*/
desk
top_
ds*_
YY
YY
MM
DDh
hmm
ss*.l
og
serv
er/
var/
logs/
ds/
ds*/
desk
top_
start
up_d
s*.lo
g
Desktop Service
Process. Supports
data presentation
and operations on
various types of
client interfaces,
such as Java and
Web interfaces.
Multiple DSs can
be deployed to
reduce pressure
on the server to
connect to a large
number of clients.
eam_a
gent
EAMService imapsvcd,serv
er/platform/
bin
None 310
49,
310
99
TCP,
TCP
serv
er/
var/
logs/
iMA
P.ea
m_a
gent.
trace
EAM Process.
Maintains a
global NE list for
NE management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
192
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
eam_a
gent
TopoService imapsvcd,serv
er/platform/
bin
EAM
Servi
ce
No
ne
None serv
er/
var/
logs/
iMA
P.ea
m_a
gent.
trace
serv
er/
var/
logs/
mrbl
og/
eam
_age
nt_p
51_
YY
YM
MD
D_h
hmm
ss.lo
g
Topology
Process. Provides
the functions of
creating and
deleting subnets,
nodes, topology
nodes, links, and
topology links,
and moving
nodes among
subnets.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
193
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
EmfG
nlDev
Dm
EmfGnlDevD
m
EmfGnlDevD
m,server/
common/
topo/lbin
None No
ne
None var/
logs/
iMA
P.E
mfG
nlDe
vDm
.trac
e
var/
logs/
mrbl
og/
iMA
PGnl
Dev
_p48
_YY
YM
MD
D_h
hmm
ss.lo
g
General Device
Process. Provides
the function of
managing third-
party NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
194
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Eml_
DCC
View
Eml_DCCVie
w
Eml_DCCVie
w,server/
tools/
dccview/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Eml
_DC
CVi
ew/
Eml
_DC
CVi
ew_
%y
%m
%d_
%H
%M
%
S.*
DCC View Tool.
Transmit Ne
communication
DCC view
Management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
195
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Eml_f
aultdi
ag
Eml_faultdiag java,$
{IMAP_JAV
A_HOME}/
bin/java
None No
ne
None serv
er/
var/
logs/
Dev
elop/
uflig
ht_n
emgr
_dia
gnos
is/
com
muni
cate-
%y.
%m.
%d-
%H.
%M.
%
S.*
serv
er/
var/
logs/
Dev
elop/
uflig
ht_n
emgr
_dia
gnos
is/
uflig
ht-%
y.%
m.%
d-%
H.%
M.%
S.*
Diagnosis of
transport packet
services.
Provides fault
diagnosis for
transport packet
services,
covering the
PWE3 E-Line
services of the
OptiX RTN 905,
OptiX RTN 910,
OptiX RTN 950,
OptiX RTN 980,
OptiX OSN 500,
OptiX OSN 550,
OptiX OSN 3500,
OptiX OSN 7500,
OptiX OSN
7500II, and
OptiX OSN 8800,
and the Native
Ethernet E-Line
services of the
OptiX RTN 310,
OptiX RTN 905,
OptiX RTN 910,
OptiX RTN 950,
OptiX RTN 980,
OptiX OSN 500,
and OptiX OSN
550.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
196
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Eml_f
aultdi
agtsk
Eml_faultdiag
tsk
java,server/$
{IMAP_JAV
A_HOME}/
bin/java
None No
ne
None serv
er/
var/
logs/
Dev
elop/
trans
_faul
tdiag
/
com
muni
cate-
%y.
%m.
%d-
%H.
%M.
%
S.*
serv
er/
var/
logs/
Dev
elop/
trans
_faul
tdiag
/
uflig
ht-%
y.%
m.%
d-%
H.%
M.%
S.*
---. Provides the
function to
diagnose
transport packet
services. Only
PWE3 E-Line
service of the
Optix RTN910,
RTN950 and
RTN980
equipment is
supported.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
197
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Eml_
mml
Eml_mml Eml_mml,ser
ver/nbi/mml/
bin
None 150
00,
150
01
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
Eml
_mm
l/
Eml
_mm
l_%
y%
m%
d_%
H%
M%
S.*
MML Service.
This process
provides the
MML NBI
service.
Eml_
PerfS
vr
Eml_PerfSvr Eml_PerfSvr,
server/
common/
trans_core/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Eml
_Per
fSvr/
Eml
_Per
fSvr
_%y
%m
%d_
%H
%M
%
S.*
Transmit
Performance
Service. This
process provides
the transfer-
domain
performance
management
function.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
198
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Eml_
PubSv
r
Eml_PubSvr Eml_PubSvr,s
erver/
common/
trans_core/bin
None 101
62
UDP serv
er/
var/
logs/
Dev
elop/
Eml
_Pub
Svr/
Eml
_Pub
Svr_
%y
%m
%d_
%H
%M
%
S.*
Transmit
Common
Service. This
process provides
the function of
inter-NE
management on
transferdomain
NEs and reports.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
199
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Enpo
werD
m
EnpowerDm EnpowerDm,s
erver/
common/env/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Enp
ower
Dm/
back
up*/
serv
er/
var/
logs/
Dev
elop/
Enp
ower
Dm/
Enp
ower
Dm_
%y
%m
%d_
%H
%M
%
S.*
Access
environment and
power monitor.
This process
provides the
function of
centralized
monitoring on the
access NE
environment
status and the
power supply
status.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
200
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Frame
SWM
grDm
FrameSWMg
rDm
FrameSWMg
rDm,server/
nemgr/
nemgr_switch
mgr/
switchmgr_fr
ame/bin
eam_
agent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Fra
meS
WM
grD
m/
Fra
meS
WM
grD
m_
%y
%m
%d_
%H
%M
%
S.*
Chassis-Shaped
Switch NE
Management.
Manages chassis-
shaped Quidway
switches.
ftpd None ftpd,/usr/sbin None No
ne
None /var/
logs/
vsftp
d.log
/var/
log/
vsftp
dlog
bak/
*.*
FTP Service. This
process provides
the FTP service.
Gcli Gcli java,server/$
{IMAP_JAV
A_HOME}/
bin/java
None 130
61,
130
62
TCP,
TCP
Non
e
IP Graphical CLI.
Provides GUI
command line
functions for
switches and
routers.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
201
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Healt
h_che
ck
Health_check java,server/$
{IMAP_JAV
A_HOME}/
bin/java
None No
ne
None serv
er/
var/
logs/
Dev
elop/
uflig
ht_h
ealth
_che
ck/
com
muni
cate-
%y.
%m.
%d-
%H.
%M.
%
S.*
serv
er/
var/
logs/
Dev
elop/
uflig
ht_h
ealth
_che
ck/
uflig
ht-%
y.%
m.%
d-%
H.%
M.%
S.*
PTN Health
Check. PTN
Health Check,
support Optix
PTN 905, Optix
PTN 910, Optix
PTN 910-F,
Optix PTN 950,
Optix PTN 960,
Optix PTN 1900,
Optix PTN
3900-8, Optix
PTN 3900.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
202
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
hedex
_agen
t
None None None No
ne
None var/
logs/
hede
x/
hede
x*.lo
g
Help Process.
Provides help
document.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
203
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
httpd apache httpd,server/
3rdTools/
apache/bin
None 130
80,
808
0
TCP,
TCP
serv
er/
var/
logs/
apac
he/
apac
he.lo
g
serv
er/
var/
logs/
apac
he/
moni
torap
ache.
log
serv
er/
var/
logs/
apac
he/
apac
hectl
.log
serv
er/
3rdT
ools/
apac
he/
logs/
*.log
Apache Http
Service.
Distribute Http
Request.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
204
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
ifms_
agent
FaultService imapsvcd,serv
er/platform/
bin
None 310
11,
310
61
TCP,
TCP
var/
logs/
iMA
P.if
ms_
agen
t.trac
e
var/
logs/
iMA
P.if
ms_
agen
t_pr
oduc
t.trac
e
var/
logs/
iMA
P.if
ms_
agen
t_db
err.tr
ace
var/
logs/
mrbl
og/
ifms
_age
nt_p
56_
YY
YY
MM
DD_
hhm
mss.l
og
Fault Process.
Collects and
saves fault
information from
managed devices
using NE
engines, and
queries and
analyzes the fault
information.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
205
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
imap_
sysmo
nitor
None imap_sysmon
itor,server/
platform/bin
None No
ne
None serv
er/
var/
logs/
iMA
P.im
apsy
smo
nitor
_per
f.trac
e
serv
er/
var/
logs/
iMA
P.im
ap_s
ysm
onito
r.trac
e
serv
er/
var/
logs/
iMA
P.im
apsy
smo
nitor
_per
f.trac
e
serv
er/
var/
logs/
mrbl
og/
imap
System Monitor.
Provides service
to monitor the
process of the
system. This
process monitors
resources, which
include CPUs,
memory, hard
disks, services,
processes,
databases, and
generates alarms
when faults
occur.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
206
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
_sys
moni
tor_
p66_
%y
%m
%d_
%H
%M
%
S.log
imape
ventm
gr
None imapeventmg
r,server/
platform/bin
None No
ne
None serv
er/
var/
logs/
iMA
P.im
apev
entm
gr.tr
ace
serv
er/
var/
logs/
iMA
P.im
apev
ents.
trace
Daemon Process
(Event Manager
Process). This
process forwards
events.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
207
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
imap
mrb
None imapmrb,serv
er/platform/
bin
None 310
30,
310
80
TCP,
TCP
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.log
Daemon Process
(mrb Process).
This process
forwards
messages. This
process is a
daemon process.
imaps
ysd
None imapsysd,serv
er/platform/
bin
None 310
50,
310
00
TCP,
TCP
var/
logs/
iMA
P.im
apsy
sd.tr
ace
var/
logs/
mrbl
og/
iMa
pSys
d_p6
5_Y
YY
MM
DD_
hhm
mss.l
og
Daemon Process.
This process is a
daemon process.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
208
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
imap
watch
dog
None imapwatchdo
g,server/
platform/bin
None No
ne
None Non
e
Daemon Process
(watchdog
Process). This
process monitors
daemons.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
209
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
inTL1
NBiD
m
inTL1NBiDm inTL1NBiDm
,server/
nemgr/
nemgr_access
/bin
mc 982
0
TCP serv
er/
var/
logs/
Dev
elop/
inTL
1NB
iDm/
inTL
1NB
iDm
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
inTL
1NB
iDm/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
TL1 Proxy Inner
Interface. This
process provides
the XML NBI
Proxy,Service
Provisioning
Profile
management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
210
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
iMA
PBas
e_p2
37_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
211
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Invent
oryD
M
InventoryDM InventoryDM,
server/
common/
inventory/bin
eam_
agent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Inve
ntor
yD
M/
Inve
ntor
yD
M_
%y
%m
%d_
%H
%M
%
S.*
Inventory
Manager.
Provides the
management of
inventory data,
such as physical
resources, fibers/
cables, and
customers.
ipcom
mon
ipcommon ipcommon,ser
ver/common/
ip/common/
bin
Secur
itySe
rvice
No
ne
None serv
er/
var/
logs/
Dev
elop/
ipco
mmo
n/
ipco
mmo
n_%
y%
m%
d_%
H%
M%
S.*
Common IP
Application
Management.
Provides
common IP
services, such as
the diagnosis
function.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
212
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
ipfpm
_cfg
ipfpm_cfg ipfpm_cfg,ser
ver/common/
pms/bin
None 130
81
TCP Non
e
IP Flow
Peformance
Management
Configuration.
Provide
configuration for
IPFPM (IP Flow
Peformance
Management).
itm_a
gent
ItmService imapsvcd,serv
er/platform/
bin
None 310
15,
310
65
TCP,
TCP
serv
er/
var/
logs/
iMA
P.it
m_a
gent.
trace
serv
er/
var/
logs/
mrbl
og/
itm_
agen
t_p9
992_
%y
%m
%d_
%H
%M
%
S.*
Integrated Task
Management.
Provides the
functions of
integrated task
management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
213
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
javaw tomcat startup,server/
3rdTools/
tomcat/bin
None 800
9,
800
5,
130
29
TCP,
TCP,
TCP
3rdT
ools/
tomc
at/
logs/
*.log
var/
logs/
tomc
at/
*.txt
Tomcat Service.
This process
provides the web
application
deployment
function.
lic_ag
ent
LicenseServic
e
imapsvcd,serv
er/platform/
bin
None 310
01,
310
51
TCP,
TCP
serv
er/
var/
logs/
iMA
P.lic
_age
nt.tra
ce
License Process.
A service
interface is
provided to check
the validity of the
license file of the
current version
log_a
gent
DolService imapsvcd,serv
er/platform/
bin
LogS
ervic
e
310
05,
310
55,
310
06
TCP,
TCP,
TCP
serv
er/
var/
logs/
iMA
P.log
_age
nt.tra
ce
Log Process.
Records
operation logs of
devices.
log_a
gent
LogService imapsvcd,serv
er/platform/
bin
None No
ne
None serv
er/
var/
logs/
iMA
P.log
_age
nt.tra
ce
Log Process.
Records and
manages
operation logs,
system logs, and
security logs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
214
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
log_a
gent
ForwardingSe
rvice
imapsvcd,serv
er/platform/
bin
LogS
ervic
e
No
ne
None serv
ervar
/
logs/
iMA
P.log
_age
nt.tra
ce
serv
er/
var/
logs/
mrbl
og/
log_
agen
t_p4
6_Y
YY
YM
MD
D_h
hmm
ss.lo
g
Syslogagent
Process.
Forwards OSS
logs to third-party
Syslog servers
over the BSD
Syslog protocol.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
215
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
mana
ger_a
gent
SystemServic
e
imapsvcd,serv
er/platform/
bin
None 310
13,
310
63
TCP,
TCP
serv
er/
var/
logs/
iMA
P.ma
nage
r_ag
ent.tr
ace
serv
er/
var/
logs/
mrbl
og/
man
ager
_age
nt_p
9990
_%y
%m
%d_
%H
%M
%
S.log
System
Management
Process. Provides
OSS
management
functions, for
example, version
checks for CAU
and management
of preferences
and broadcast
messages.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
216
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
mc mc mc,server/
common/
frame/mc/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
mc/
mc_
%y
%m
%d_
%H
%M
%
S.*
Distribution
Manager.
Provides basic
NE distribution
services.
msser
ver
msserver msserver,/opt/
OSSENGR
None 122
15,
122
13,
122
14,
122
12,
122
12,
122
13,
122
14,
122
15
TCP,
TCP,
TCP,
TCP,
TCP,
TCP,
TCP,
TCP
Non
e
Engineering
Process. This
process provides
the function of
component
installation,
package
deployment,
system upgrade,
patch installation,
data backup and
recovery for
iManager
System.
Nami
ng_Se
rvice
Naming_Serv
ice
Naming_Serv
ice,server/
cbb/nbi/
nbicbb_3p/
share/bin
None 120
01,
220
01
TCP,
TCP
serv
er/
var/
logs/
tao.tr
ace
CORBA Naming
Service(TAO).
Provides Naming
Service for
CORBA
interface(TAO)
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
217
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nelicS
erver
nelicServer neLicServer,s
erver/
common/
nelic/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
neLi
cSer
ver/
back
up*/
serv
er/
var/
logs/
Dev
elop/
neLi
cSer
ver/
neLi
cSer
ver_
%y
%m
%d_
%H
%M
%
S.*
NE License
Management.
Provide the
function of NE
license
Management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
218
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_bits
nemgr_bits nemgr_bits,se
rver/nemgr/
nemgr_bits/
bin
None 161 UDP serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p2
36_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_b
its/
BITS NE
Manager. This
process provides
the equipment
management of
BITS.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
219
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nem
gr_b
its_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_b
its/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
220
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_ext
nemgr_ext nemgr_ext,ser
ver/nemgr/
nemgr_ext/
bin
mc,li
c_age
nt
No
ne
None serv
er/
var/
logs/
Dev
elop/
nem
gr_e
xt_*/
nem
gr_e
xt_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_e
xt_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
EXT NE
Manager. This
process provides
the function of
managing the
OSN900A and
OTU40000.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
221
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_mari
ne
nemgr_marin
e
nemgr_marin
e,server/
nemgr/
nemgr_marin
e/bin
mc,li
c_age
nt
110
00~
111
00,
140
0,
543
2,
131
01~
131
50
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_
mari
ne_*
/
nem
gr_
mari
ne_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_
mari
ne_*
/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
MARINE NE
Manager. This
process provides
the function of
managing
submarine cable
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
222
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_naot
n
nemgr_naotn nemgr_naotn,
server/nemgr/
nemgr_naotn/
bin
mc,li
c_age
nt
110
00~
111
00,
131
01~
131
50
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_n
aotn
_*/
nem
gr_n
aotn
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_n
aotn
_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
OTN(TL1). This
process provides
the function of
managing North
America OTN
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
223
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_naw
dm
nemgr_nawd
m
nemgr_nawd
m,server/
nemgr/
nemgr_nawd
m/bin
mc,li
c_age
nt
110
00~
111
00,
131
01~
131
50
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_n
awd
m_*/
nem
gr_n
awd
m_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_n
awd
m_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
WDM(TL1).
This process
provides the
function of
managing North
America WDM
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
224
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_otn
nemgr_otn nemgr_otn,ser
ver/nemgr/
nemgr_otn/
bin
mc,li
c_age
nt
110
00~
111
00,
140
0,
543
2,
131
01~
131
50
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_o
tn_*/
nem
gr_o
tn_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_o
tn_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
OTN NE
Manager. This
process provides
the function of
managing OTN
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
225
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_ptn
nemgr_ptn nemgr_ptn,ser
ver/nemgr/
nemgr_ptn/
bin
mc,li
c_age
nt
110
00~
111
00,
543
2,
131
01~
131
50
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_p
tn_*/
nem
gr_p
tn_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_p
tn_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
PTN NE
Manager. This
process provides
the function of
managing Metro
Ethernet PTN
frame-shaped and
caseshaped NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
226
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_rtn
nemgr_rtn nemgr_rtn,ser
ver/nemgr/
nemgr_rtn/bin
mc,li
c_age
nt
110
00~
111
00,
140
0,
543
2,
131
01~
131
50
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_rt
n_*/
nem
gr_rt
n_%
y%
m%
d_%
H%
M%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_rt
n_*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
RTN NE
Manager. This
process provides
the function of
managing RTN
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
227
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_sdh
nemgr_sdh nemgr_sdh,se
rver/nemgr/
nemgr_sdh/
bin
mc,li
c_age
nt
110
00~
111
00,
140
0,
543
2,
131
01~
131
50
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_s
dh_*
/
nem
gr_s
dh_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_s
dh_*
/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
SDH NE
Manager. This
process provides
the function of
managing SDH/
MSTP/OSN
series equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
228
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nemg
r_vmf
Nemgr_vmf Nemgr_vmf,s
erver/nemgr/
nemgr_vmf/
bin
None 131
54,
131
52,
131
53,
22
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
uflig
ht_n
emgr
_vm
f_ser
ver/.
*
Router
Management
(VRP V8).
Manages VRP
V8 routers.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
229
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nemgr
_wdm
nemgr_wdm nemgr_wdm,s
erver/nemgr/
nemgr_wdm/
bin
mc,li
c_age
nt
140
0,
543
2
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nem
gr_w
dm_
*/
nem
gr_w
dm_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
nem
gr_w
dm_
*/
alar
m_
%y
%m
%d_
%H
%M
%
S.*
WDM NE
Manager. This
process provides
the function of
managing
LHWDM/Metro
WDM series
equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
230
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
nepro
xy
neproxy neproxy,serve
r/tools/
datacollector/
bin
None No
ne
None serv
er/
tools
/
data
colle
ctor/
log/
nepr
oxyl
og/
*.*
Data Collector
NE Proxy
Process. Data
Collector NE
Proxy Process
Nml_
ason_
otn
Nml_ason_ot
n
Nml_ason_ot
n,server/nml/
ason_otn/bin
Eml_
PubS
vr,lic
_age
nt
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_aso
n_ot
n/
Nml
_aso
n_ot
n_%
y%
m%
d_%
H%
M%
S.*
OTN ASON
Network
Manager. This
process provides
the OTN ASON
network
management
function.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
231
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
ason_
sdh
Nml_ason_sd
h
Nml_ason_sd
h,server/nml/
ason_sdh/bin
Eml_
PubS
vr,lic
_age
nt
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_aso
n_sd
h/
Nml
_aso
n_sd
h_%
y%
m%
d_%
H%
M%
S.*
SDH ASON
Network
Manager. This
process provides
the SDH ASON
network
management
function.
Nml_
comm
on
Nml_commo
n
Nml_commo
n,server/nml/
nmlcommon/
bin
Secur
itySe
rvice
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_co
mmo
n/
Nml
_co
mmo
n_%
Y%
m%
d_%
H%
M%
S.log
Network
Common
Service. This
process provides
the E2E common
management
service. The other
E2E processes all
depend on this
process.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
232
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
cps
Nml_cps Nml_cps,serv
er/nml/
nmlcps/bin
lic_a
gent,s
m_ag
ent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_cps
/
Nml
_cps
_%Y
%m
%d_
%H
%M
%
S.log
Composite
Service Manager.
Supports
management of
composite
services and
Router/Switch/
PTN/MSTP/
MSTP NEs.
Nml_
eow
Nml_eow Nml_eow,ser
ver/nml/
nmleth/bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_eo
w/
Nml
_eo
w_%
Y%
m%
d_%
H%
M%
S.*
EoW and EoO.
Provides the end-
to-end Ethernet
service
management
function for the
EoW/EoO
equipment,
which helps to
quickly configure
or maintain EPL,
EVPL, EPLAN,
RPR EVPL, RPR
EVPLAN, and
ATM services.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
233
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
eth
Nml_eth Nml_eth,serv
er/nml/
nmleth/bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_eth/
Nml
_eth
_%Y
%m
%d_
%H
%M
%
S.*
MSTP ETH and
ATM. Supports
end-to-end
configuration of
EPL, EVPL,
EPLAN, RPR
EVPL, RPR
EVPLAN, and
ATM services.
Nml_i
p
Nml_ip Nml_ip,server
/nml/nmlip/
bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_ip/
Nml
_ip_
%Y
%m
%d_
%H
%M
%
S.log
IP Service
Manager.
Supports
management of
IP services and
Router/Switch/
PTN/MSTP+/
RTN NEs.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
234
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
native
eth
Nml_nativeet
h
Nml_nativeet
h,server/nml/
nmlvlan/bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_vla
n/
Nml
_vla
n_%
Y%
m%
d_%
H%
M%
S.*
Nativeeth Service
Manager.
Provides the end-
to-end nativeeth
management.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
235
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
otn
Nml_otn Nml_otn,serv
er/nml/
nmlotn/bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_otn/
Nml
_otn
_%Y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Nml
_otn/
Nml
_otn
_wd
mtra
ilsea
rchlo
g*.*
OTN Network
Manager.
Supports end-to-
end configuration
of WDM services
of OCh, ODUk
and Client levels.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
236
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nml_
sdh
Nml_sdh Nml_sdh,serv
er/nml/
nmlsdh/bin
Nml_
com
mon
No
ne
None serv
er/
var/
logs/
Dev
elop/
Nml
_sdh
/
Nml
_sdh
_%Y
%m
%d_
%H
%M
%
S.*
SDH Network
Manager.
Supports end-to-
end configuration
of microwave
services and SDH
services of VC12,
VC3, VC4, and
VC4-Xc levels.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
237
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nmsl
ogzip
Dm
NmslogzipD
m
NmslogzipD
m,server/
common/
nmslogzip/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Nms
logzi
pDm
/
Nms
logzi
pDm
_dis
kPro
t.log
serv
er/
var/
logs/
Dev
elop/
Nms
logzi
pDm
/
Nms
logzi
pDm
_tran
sfer.l
og
serv
er/
var/
logs/
Dev
elop/
Nms
logzi
pDm
/
Zip Server.
Provides the
function of
compressing
files.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
238
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Nms
logzi
pDm
_unn
orma
l.log
serv
er/
var/
logs/
Dev
elop/
Nms
logzi
pDm
_1/
Nms
logzi
pDm
_%y
%m
%d_
%H
%M
%
S.*lo
g
Notify
_Servi
ce
Notify_Servic
e
Notify_Servic
e,server/cbb/
nbi/
nbicbb_3p/
share/bin
None 120
02,
220
02
TCP,
TCP
serv
er/
var/
logs/
tao.tr
ace
CORBA
Notification
Service(TAO).
Provides Notify
Service for
CORBA
interface(TAO)
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
239
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
oams oams oams,server/
tools/
oamsserver/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
oam
s/
oam
s_%
y%
m%
d_%
H%
M%
S.*
Optical fiber line
Automatic
Monitoring
System. Monitor
fiber connect
state
PathV
iewer
Dm
PathViewerD
m
PathViewerD
m,server/
common/ip/
path/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Path
Vie
wer
Dm/
Path
Vie
wer
Dm_
%y
%m
%d_
%H
%M
%
S.*
Visualized IP
Trail. Provides
visualized IP
service trails.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
240
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
PMDa
taRefi
ner
PMDataRefin
er
PMDataRefin
er,server/
common/pms/
bin
None No
ne
None /var/
logs/
Dev
elop/
PM
Data
Refi
ner/
PM
Data
Refi
ner_
%Y
%m
%d_
%H
%M
%
S.log
Performance
Data Refiner.
This process
provides the
function to
generate big
time-granularity
performance data
through
aggregating small
time-granularity
performance
data.
PMS
Dm
PMSDm PMSDm,serv
er/common/
pms/bin
None 302
00
TCP serv
er/
var/
logs/
Dev
elop/
PMS
Dm/
PMS
Dm_
*.log
Performance
Service. This
process provides
the collector
management
function.
PMS
Web
PMSWeb com.huawei.p
msweb.frame
work_1.0.0,se
rver/common/
pms/pmsweb/
plugins/
com.huawei.p
msweb.frame
work_1.0.0
mc 130
42
TCP Non
e
Performance
Web Service.
Provide web
access to browse
performance data
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
241
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
porttr
unk_a
gent
PortTrunking
Service
imapPortTrun
kSvc,server/
platform/bin
None 310
35
TCP serv
er/
var/
logs/
iMA
P.Po
rtTru
nkSe
rvice
.trac
e
serv
er/
var/
logs/
mrbl
og/
imap
Port
Trun
kSvc
_p98
98_
%y
%m
%d_
%H
%M
%
S.log
Port Trunk
Service . The port
trunking service
is used to have the
ports of
independent
services converge
at one port.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
242
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
profil
e
profile profile,server/
common/
frame/profile/
bin
mc No
ne
None serv
er/
var/
logs/
Dev
elop/
profi
le/*_
%y
%m
%d_
%H
%M
%
S.*
Global Profile
Manager.
Manages
profiles..
Quick
Displa
y
QuickDisplay java,server/$
{IMAP_JAV
A_HOME}/
bin
None 134
43
TCP Non
e
QuickDisplay.
Provides
QuickDisplay
web service.
Resou
rceMo
nitor
None ResourceMon
itor,server/
platform/bin
None 230
01
UDP var/
logs/
iMA
P.res
ourc
emo
nitor
.trac
e
Daemon Process
(Resource
Monitor). This
process is a
resource
monitoring agent
used to monitor
resources. This
process must be
deployed on
nodes whose
resources are to
be monitored.
This process is a
daemon process.
It is not
monitored by the
System Monitor.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
243
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Route
rMgr
Dm
RouterMgrD
m
RouterMgrD
m,server/
nemgr/
nemgr_router/
routermgr/bin
eam_
agent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Rout
erM
grD
m/
Rout
erM
grD
m_
%y
%m
%d_
%H
%M
%
S.*
Router NE
Management.
Manages
Quidway routers.
secde
vregd
m
secdevregdm secdevregdm,
server/vsm/
seccomm/
secdevreg/bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
secd
evre
gdm/
secd
evre
gdm
_%y
%m
%d_
%H
%M
%
S.*
Security Device
Register
Manager.
Security Device
Register Manager
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
244
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
secpol
icymg
r
secpolicymgr secpolicymgr,
server/vsm/
secpolicymgr/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
secp
olicy
mgr/
secp
olicy
mgr
_%y
%m
%d_
%H
%M
%
S.*
Policy Manager.
This process
provides the
functions such as
centralized policy
configuration and
attack defense
configuration.
Securi
tyMgr
Dm
SecurityMgr
Dm
SecurityMgr
Dm,server/
nemgr/
nemgr_securit
ymgr/bin
eam_
agent
No
ne
None serv
er/
var/
logs/
Dev
elop/
Secu
rity
Mgr
Dm_
180/
Secu
rity
Mgr
Dm_
%y
%m
%d_
%H
%M
%
S.*
Security NE
Manager. This
process provides
the function of
managing FW/
USG, SIG, and
SVN series
security
equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
245
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
secvp
nmgr
secvpnmgr secvpnmgr,se
rver/vsm/
secvpnmgr/
bin
None 161 UDP serv
er/
var/
logs/
Dev
elop/
secv
pnm
gr/
secv
pnm
gr_
%y
%m
%d_
%H
%M
%
S.*
VPN Manager.
This process
provides the
IPSec/L2TP VPN
management
function.
sm_ag
ent
SecurityServi
ce
imapsvcd,serv
er/platform/
bin
Licen
seSer
vice,
EAM
Servi
ce
310
08,
310
58
TCP,
TCP
serv
er/
var/
logs/
iMA
P.sm
_age
nt.tra
ce
Security Process.
Manages OSS
users, OSS user
rights, and NE
user rights.
smlda
p_age
nt
SMLDAPSer
vice
sm_ldapServe
r,server/
platform/bin
Secur
itySe
rvice
No
ne
None serv
er/
var/
logs/
iMA
P.sm
_lda
pSer
ver.t
race
SMLDAPService
. Provides the
LDAP
northbound
interfaces for
managing OSS
accounts.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
246
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
snmpa
gent
SnmpAgent ST_SNMPAg
ent,server/
platform/
sacscript/
standalone
Secur
itySe
rvice
666
6,
981
2,
310
62,
310
12
UDP,
UDP,
TCP,
TCP
serv
er/
var/
logs/
nbi/
snm
p/
Snm
pAg
ent*.
log
serv
er/
var/
logs/
nbi/
snm
p/
Snm
pAg
ent*.
zip
SNMP
Northbound
Interface.
Provides the
northbound
interface which
adopts the SNMP
protocol.
SNM
PColl
ector
Dm
SNMPCollect
orDm
SNMPCollect
orDm,server/
common/
pmscollector/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
SN
MP
Coll
ector
Dm/
SN
MP
Coll
ector
Dm_
*.log
SNMP Collector.
This process
provides the
function of
collecting
performance data
through SNMP.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
247
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
SNM
PServ
er
SNMPServer SNMPServer,
server/
common/ip/
base/bin
None No
ne
None Non
e
SNMP Service
(H3C). Forwards
SNMP services
for H3C switches.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
248
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
StdClt
siDm
StdCltsiDm StdCltsiDm,s
erver/
common/
access_comm
on/std112/bin
Bms
Test
900
2,
900
3
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
StdC
ltsiD
m/
StdC
ltsiD
m_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
StdC
ltsiD
m/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
Access 112 Test .
This process
provides the 112
test.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
249
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
iMA
PBas
e_p8
8_%
y%
m%
d_%
H%
M%
S.*
Syslo
gColl
ector
DM
SyslogCollec-
torDM
SyslogCollect
orDM,server/
common/
syslog/bin
None 514 UDP serv
er/
var/
logs/
mrbl
og/
Sysl
ogC
ollec
torD
m_p
3021
_%y
%m
%d_
%H
%M
%
S.log
System Log
Collector. This
process provides
the function of
collecting NE
operation and
running log data,
and managing
files.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
250
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
textag
ent
textagent textagent,serv
er/nbi/text/bin
None 21,
120
04,
302
02
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
nbi/
texta
gent/
text_
debu
g-%
y.%
m.%
d-%
H.%
M.%
S.*
serv
er/
var/
logs/
Dev
elop/
nbi/
texta
gent/
com
muni
cate
_text
-%y.
%m.
%d-
%H.
%M.
%
S.*
serv
er/
var/
logs/
Text Service.
This process
provides the Text
NBI management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
251
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Dev
elop/
nbi/
texta
gent/
dom
ain_
debu
g_te
xt-%
y.%
m.%
d-%
H.%
M.%
S.*
serv
er/
var/
logs/
Dev
elop/
nbi/
texta
gent/
uflig
ht_te
xt-%
y.%
m.%
d-%
H.%
M.%
S.*
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
252
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
TL1N
BiDm
TL1NBiDm TL1NBiDm,s
erver/nemgr/
nemgr_access
/bin
Licen
seSer
vice,
mc
981
9
TCP serv
er/
var/
logs/
Dev
elop/
TL1
NBi
Dm/
TL1
NBi
Dm_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
TL1
NBi
Dm/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
mrbl
TL1NBiDm
Process. This
process provides
TL1 NBI
Management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
253
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
og/
iMA
PBas
e_p4
7_%
y%
m%
d_%
H%
M%
S.*
serv
er/
var/
logs/
mrbl
og/
iMA
PMr
b_p2
_%y
%m
%d_
%H
%M
%
S.*
toolkit ToolkitServic
e
toolkit,server/
common/
toolkit/server
None 899
9,
130
06,
23,
140
0
TCP,
TCP,
TCP,
TCP
serv
er/
var/
logs/
Dev
elop/
DCS
erver
/
tkser
ver_l
og/
debu
g*.lo
g
Toolkit. This
process provides
the service of
upgrading
boardlevel
transmission
equipment.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
254
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
trapdi
spatch
er
trapdispatcher trapdispatcher
,server/
common/
trapdispatcher
/bin
None 163
~16
5,
321
62,
162
,
134
43
UDP,
UDP,
UDP,
TCP
serv
er/
var/
logs/
iMA
P.Tr
apDi
spatc
her.t
race
serv
er/
var/
logs/
mrbl
og/
iMA
PBas
e_p4
5445
_%y
%m
%d_
%H
%M
%
S.log
Trap Dispatcher.
Receives and
dispatches traps.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
255
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
trapr_
agent
TrapReceiver EmfTrapRece
iver,server/
common/
trapreceiver/
bin
Fault
Servi
ce
163
~16
5,
321
62,
162
,
111
01~
111
04
UDP,
UDP,
UDP,
TCP
var/
logs/
iMA
P.E
mfTr
apRe
ceiv
er*.t
race
var/
logs/
mrbl
og/
iMA
PTra
pRec
eiver
_p10
000_
r*_Y
YY
YM
MD
D_h
hmm
ss.lo
g
Trap Receiver
Process.
Receives traps
that are sent to the
server over
SNMP.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
256
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
TrapT
ransPr
oxy
TrapTransPro
xy
TrapTransPro
xy,server/
nemgr/
nemgr_access
/bin
None 131
62
TCP serv
er/
var/
logs/
Dev
elop/
Trap
Tran
sferP
roxy
/
Trap
Tran
sPro
xy_
%y
%m
%d_
%H
%M
%
S.*
serv
er/
var/
logs/
Dev
elop/
Trap
Tran
sferP
roxy
/
Boot
Log
_%y
%m
%d_
%H
%M
%
S.*
Access Trap
Transfer Proxy
Service. This
process provides
trap transfer
proxy
management
service.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
257
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
TXT
NBID
m
TXTNBIDm TXTNBIDm,
server/
common/pms/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
TXT
NBI
Dm/
TXT
NBI
Dm_
*.log
Text Export. This
process provides
the NBI function.
It is used to
transmit
performance data
in the text format
through FTP.
ufligh
t_disp
atcher
uflight_dis-
patcher
java,server/$
{IMAP_JAV
A_HOME}/
bin/java
None 131
54,
301
01,
130
31,
130
61
TCP,
TCP,
TCP,
TCP
serv
er/
com
mon/
uflig
htdis
patc
her/
log/
*-%
y.%
m.%
d-%
H.%
M.%
S.*
Java Application
Server
Dispatcher.
Dispatches
UFlight web
requests.
UTraf
ficAd
apter
UTrafficAdap
ter
java,server/$
{IMAP_JAV
A_HOME}/
bin/java
None 131
70
TCP Non
e
Unisight adapter.
Support data
adapter interface
Between the
U2000 and
Unisight
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
258
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
Unite
UitlD
M
UniteUitlDM UniteUitlDM,
server/
common/
unitedmgr/bin
None 130
05
UDP serv
er/
var/
logs/
Dev
elop/
Unit
eUitl
DM/
Unit
eUitl
DM
_%y
%m
%d_
%H
%M
%
S.*
United Manager.
Provides basic
functions for the
inter-domain
NMS, such as
importing and
exporting scripts,
managing NE
time,
synchronizing
NEs, and
managing NE
objects.
VmfD
iag
VmfDiag VmfDiag,serv
er/nemgr/
nemgr_vmf/
bin
None No
ne
None serv
er/
var/
logs/
Dev
elop/
Vmf
Diag
/
Vmf
Diag
_%y
%m
%d_
%H
%M
%
S.*
Router (V8) NE
Test and
Diagnosis.
Provides
diagnosis
functions for
VRP V8 routers.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
259
Proce
ss
Nam
e
Service
Name
Executable
Files and
Path
Req
uire
d
Proc
ess/
Serv
ices
Por
t
Prot
ocol
Type
Log
File
s
Function
Description
xmlag
ent
XMLAgent ST_XMLAge
nt,server/
platform/
sacscript/
standalone
Secur
itySe
rvice
999
7,
310
29,
310
79
TCP,
TCP,
TCP
serv
er/
var/
logs/
nbi/
xml/
fram
e*.lo
g
serv
er/
var/
logs/
nbi/
xml/
fram
e*.zi
p
XML
Northbound
Interface.
Provides the
northbound
interface which
adopts the SOAP
protocol.
1.22 GUI Input and Display Conventions
The topic describes the input conventions for the text boxes and display conventions for GUI
elements on the U2000. These rules specify the typing requirements for the text boxes in the
U2000 operation interface. These text boxes are used to enter character strings, file names, IP
addresses, MAC addresses, numerals, passwords, dates, time, and so on.
Types of Character Strings
The character string is a kind of descriptive text and usually there is no limitation for the
characters typed in. But, when you enter the names in the U2000 (including the names of the
PDH path, MSTP path, NE, subnet, virtual NE board, telecommunications room, subrack, card,
Transmission NM, optical fiber, NE user, protection subnet, circuit, logical system, J0, J1, PM
(C)U relay, DIP switch, EMU input and output paths and Ethernet user) and all remarks, or when
some functions involve typing in characters that are subject to naming rules, you are
recommended to use the standard characters listed as follows:
l Languages used in nine countries, namely, China, America, Italy, Spain, France, UAE,
Germany, Russia, and Portugal.
l Input of various types of characters.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
260
NOTE
l The name of a rule, trail, fiber, subnet, or customer can contain "+" and ":",
l The name of an NE or a subnet can contain "+".
l The Tab key input cannot be contained in the above names or the values of overheads J0, J1, and J2.
l These rules are made in order to avoid database operation errors or errors occurred when an HTML
report is generated. The Tab key input cannot be contained in command lines.
NOTICE
When you enter characters in Microsoft Pinyin IME and keep pressing a key, too many characters
will be typed in. This leads to the exit of the U2000 client.
Directory
l When files are transferred between different OSs, both Chinese and English directories are
supported.
l When performance data is dumped at the server end, both Chinese and English directories
are supported. In other cases, only English directories are supported.
File Name
The general rule is file name + extension name. The extension name consists of letters, numerals
or underscores, and should not exceed three characters.
The naming rule is that a file name consists of letters, numerals or underscores. It cannot exceed
eight characters. A file name cannot contain spaces or any of the following characters: \ " . * ;
> [ ] ( ) ! $ { } < >. If you need to separate two characters, you may use "_".
Nine languages are supported, with each language corresponding to a naming rule.
Folder Name Language
zh_CN China
en_US America
it_IT Italy
es_ES Spain
fr_FR France
ar_SA Saudi Arabia
de_DE Germany
ru_RU Russia
pt_PT Portugal
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
261
IP Address
The IP address is decimal, for example, 129.9.0.254:9801 (9801 is the port ID, and can be
omitted).
MAC Address
The MAC address is hexadecimal, for example, 00-06-5B-84-50-84.
Types of Numerals
Integer type: In this mode, only integral numbers can be typed in.
Decimal fraction type: In this mode, besides numerals, characters f and e, as well as the decimal
point are allowed.
Password
Each time you enter a character in the password text box, a dot is displayed instead. The password
cannot be copied.
Date and Time
Generally, the date and time can be selected from or typed in the Time/Date Attribute dialog
box.
To navigate to the window for customizing the type of the date and time, choose File >
Preferences > Region Settings from the main menu and click the Time or Date tab.
The default format of time and date is as follows:
l Time: 16:06:06 (Hour:Minute:Second)
l Date: 06-06-2000 (Month-Day-Year)
Table
The parameters on the GUI are presented in tables to display parameter values of different
objects.
l If -- or - is displayed in the table cell of a selected record, it indicated that the parameter is
not supported. This type of table cell in not editable.
l If / or Unknown is displayed in the table cell of a selected record, the parameter is supported
but the parameter value is unavailable for a certain reason at the moment.
1.23 Mutual Exclusion List for Multiclient Operations
The mutual exclusion list for multiclient operations is given below.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
262
Figure 1-34 Mutual exclusion list for multiclient operations
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
263
Figure 1-35 Mutual exclusion list for multiclient operations on ASON SDH trails
Figure 1-36 Mutual exclusion list for multiclient operations on ASON WDM trails
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
264
Example
The "script import" and "upload" operations are mutually exclusive. If "script import" is being
performed on one client, "upload" cannot be performed on another client.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 1 Getting Started
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
265
2 Network Management Process
About This Chapter
This topic describes the process of managing network equipment on the U2000.
2.1 MSTP Network Management Process
The MSTP network management process describes the operation tasks of managing an MSTP
network by using the U2000, and the relationships between the operation tasks.
2.2 WDM Network Management Process
The WDM network management process describes the operation tasks of managing a WDM
network by using the U2000, and the relationships between the operation tasks.
2.3 RTN Network Management Process
The RTN network management process describes the operation tasks of managing a RTN
network by using the U2000, and the relationships between the operation tasks.
2.4 PTN Network Management Process
The PTN network management process describes the operation tasks of managing an PTN
network by using the U2000, and the relationships between the operation tasks.
2.5 Router and Switch Network Management Process
This topic describes the operation tasks of managing a router and switch network with the
U2000 and the relationships between these operation tasks.
2.6 Access Network Management Process
This topic describes the operation tasks of managing an access network with the U2000 and the
relationships between these operation tasks.
2.7 Core Network Management Process
This topic describes the operation tasks of managing a core network with the U2000 and the
relationships between these operation tasks.
2.8 Security NE Network Management Process
This topic describes the operation tasks of managing a security NE network with the U2000 and
the relationships between these operation tasks.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
266
2.1 MSTP Network Management Process
The MSTP network management process describes the operation tasks of managing an MSTP
network by using the U2000, and the relationships between the operation tasks.
Configure and manage the MSTP network by referring to the processes as shown in Figure
2-1.
NOTE
The landscape orientation of the configuration flow chart shows the main phases of managing the MSTP network
by using the U2000. The phases include network deployment, service configuration, network maintenance, and
SDH ASON feature management. In the case of the service configuration, the end-to-end service configuration
mode requires a license that supports the end-to-end SDH management, and the SDH ASON feature management
requires a license that supports the SDH ASON feature.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
267
Figure 2-1 MSTP network management process
Deploying a
Network
Maintaining a
Network
Managing the
Optical Power
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Topology
Management
DCN
Management
Configuring
Board
Parameters
Configuring
Orderwire
Configuring
Protection
Configuring
Feature
Configuring SDH
Services
Configuring
Ethernet
Services
Configuring RPR
Services
Configuring ATM
Services
Configuring
Broadcast Data
Port Services
Configuring DDN
Services
Configuring SAN
Services
Configuring F1
Data Port
Services
Configuring Built-
in WDM
Configuring
QoS
Configuring
LPT
Configuring
LCAS
Configuring
QinQ Service
Configuring
STP and RSTP
Configuring
LAG/DLAG
Configuring
BPS/RPS
Configuring
SNCTP
Configuring
Transmux
Configuring
TCM
Configuring
AU3
Configuring
IPA
Configuring
SDH ASON
Networks
Routine
Maintenance
for an ASON
Network
Handling ASON
Network
Failures
Manage SDH
Protection
Subnet
Manage SDH
Trail
Configuring
Data Test
Frame
Configuring
IGMP Snooping
Configuring
OAM
Configuring
BPS/RPS/PR
BS
Adjusting
Networks
Configuring Services
Configuring Services
on a Per-NE Basis
Configuring End-
to-End Services
Deploying
VPLS Services
Deploying
PWE3 Services
Deploying E-
AGGR Services
Customer
Management
Deploying a
Tunnel
Deploying
Composite
Services
Configuring
CES/ATM
Services
Configuring
MSTP
Configuring
MPLS Tunnel
Configuring PW
APS/MS-PW
Configuring
Ethernet
Services
2.2 WDM Network Management Process
The WDM network management process describes the operation tasks of managing a WDM
network by using the U2000, and the relationships between the operation tasks.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
268
Configure and manage the Metro WDM&LH WDM network by referring to the processes as
shown in Figure 2-2.
NOTE
The landscape orientation of the configuration flow chart shows the main phases of managing the WDM network
by using the U2000. The phases include network deployment, service configuration, WDM feature
configuration, network maintenance, and WDM ASON feature management. In the case of the service
configuration, the end-to-end service configuration mode requires a license that supports the end-to-end WDM
management, and the WDM ASON feature management requires a license that supports the WDM ASON
feature. The WDM ASON feature is unique to the NG WDM. An NG WDM NE can use the WDM ASON
feature management function only after the WDM ASON feature is enabled.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.
Figure 2-2 Metro WDM&LH WDM network management process
Configuring Services
Deploying a
Network
Maintaining a
Network
Configuring
WDM Features
Managing the
Optical Power
Configuring Fiber
Link Check
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Creating a
Network
Configuring DCN
Configuring
Orderwire
Configuring Services
on a Per-NE Basis
Configuring Optical
Cross-Connections
Configuring WDM
Services
Configuring
Overhead
Configuring
Ethernet Services
Configuring
Broadcast Data
Port Services
Configuring F1 Data
Port Services
Configuring End-
to-End Services
Customer
Management
Configuring
EAPE
Configuring
ROADM
Configuring IPA
Configuring ALC
Configuring APE
Manage WDM
Protection
Subnet
Manage WDM
Trail
Configuring
Protection
Configuring
Board
Parameters
For the detailed process for managing the OptiX OSN 6800, refer to Figure 2-3.
NOTE
The procedure for managing the OptiX OSN 3800 is similar to the procedure for managing the OptiX OSN
6800.
For the detailed process for managing the OptiX OSN 6800A, refer to Figure 2-3.
NOTE
The procedure for managing the OptiX OSN 3800A is similar to the procedure for managing the OptiX
OSN 6800A.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
269
Figure 2-3 OptiX OSN 6800/6800A equipment management process
Deploying a
Network
Configuring Services
Maintaining a
Network
Configuring
WDM Features
Managing the
Optical Power
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Creating a
Network
Configuring
DCN
Configuring
Orderwire
Configuring
Services on a Per-
NE Basis
Configuring
Optical Cross-
Connections
Configuring WDM
Services
Configuring
Overhead
Configuring
Ethernet Services
Configuring
End-to-End
Services
Customer
Management
Configuring
EAPE
Configuring
ROADM
Configuring IPA
Configuring
ALC
Configuring
APE
Manage WDM
Protection
Subnet
Manage WDM
Trail
Configuring WDM
ASON Networks
Configuring
Protection
Configuring
Board
Parameters
Routine
Maintenance for an
ASON Network
Handling ASON
Network Failures
Deploying a
Network
Configuring Services
Maintaining a
Network
Configuring
WDM Features
Managing the
Optical Power
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Creating a
Network
Configuring
DCN
Configuring
Services on a Per-
NE Basis
Configuring
Optical Cross-
Connections
Configuring WDM
Services
Configuring
Overhead
Configuring
Ethernet Services
Configuring
End-to-End
Services
Customer
Management
Configuring
EAPE
Configuring
ROADM
Configuring IPA
Configuring
ALC
Configuring
APE
Manage WDM
Protection
Subnet
Manage WDM
Trail
Configuring
Protection
Configuring
Board
Parameters
For the detailed process of managing the OptiX OSN 8800 series equipment, see Figure 2-4.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
270
NOTE
The OptiX OSN 8800 T32 V100R001 does not support orderwire and Ethernet service configuration.
The OptiX OSN 8800 T32 V100R002 or a later version supports the SDH-related functions, including
configuring SDH protection, SDH features, and SDH-ASON feature management.
Figure 2-4 OptiX OSN 8800 series equipment management process
Deploying a
Network
Configuring WDM Services
Maintaining a
Network
Configuring
WDM Features
Managing the
Optical Power
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Creating a
Network
Configuring
DCN
Configuring
Orderwire
Configuring
Services on a Per-
NE Basis
Configuring
Optical Cross-
Connections
Configuring WDM
Services
Configuring
Overhead
Configuring
Ethernet Services
Configuring
End-to-End
Services
Customer
Management
Configuring
EAPE
Configuring
ROADM
Configuring IPA
Configuring
ALC
Configuring
APE
Manage WDM
Protection
Subnet
Manage WDM
Trail
Configuring WDM
ASON Networks
Routine
Maintenance for an
ASON Network
Handling ASON
Network Failures
Configuring
Board
Parameters
Configuring
SDH Protection
Configuring
WDM Protection
Configuring
SDH Features
Configuring
SDH Services
Configuring
Ethernet Services
Configuring
Overhead
Configuring SDH
ASON Networks
Configuring Packet Services
Configuring the
Ethernet
Boards
Configuring
Ethernet Services
Configuring MPLS
Tunnel
Configuring
Configuring the
QoS Policy
Configuring
Services on a Per-
NE Basis
Configuring
End-to-End
Services
Deploying a
Tunnel
Deploying PWE3
Services
Deploying VPLS
Services
Deploying
Composite
Services
For the detailed process for managing the OptiX OSN 1800, refer to Figure 2-5.
For the detailed process for managing the OptiX OSN 1800(NA), refer to Figure 2-5.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
271
Figure 2-5 OptiX OSN 1800/1800(NA) equipment management process
Deploying a
Network
Configuring Services
Maintaining a
Network
Managing the
Optical Power
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Creating a
Network
Configuring
DCN
Configuring
Services on a Per-
NE Basis
Configuring WDM
Services
Configuring
Overhead
Configuring
End-to-End
Services
Customer
Management
Manage WDM
Protection
Subnet
Manage WDM
Trail
Configuring
Protection
Configuring
Board
Parameters
2.3 RTN Network Management Process
The RTN network management process describes the operation tasks of managing a RTN
network by using the U2000, and the relationships between the operation tasks.
Configure and manage the RTN network by referring to the processes as shown in Figure 2-6.
NOTE
The landscape orientation of the configuration flow chart shows the main phases of managing the RTN network
by using the U2000. The phases include network deployment, service configuration, and network maintenance.
In the case of the service configuration, the end-to-end service configuration mode requires a license that supports
the end-to-end RTN and SDH management.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
272
Figure 2-6 RTN network management process
Deploying a
Network
Maintaining a
Network
Alarm
Management
Performance
Management
Software
Management
Report
Management
Configuration
Data
Management
Configuring the
NE Time
Configuring
Clocks
Topology
Management
DCN
Management
Configuring
Board
Parameters
Configuring
Orderwire
Configuring
Protection
Configuring
Feature
Configuring SDH
Services
Configuring
Packet-Based
Ethernet
Services
Configuring
MPLS Tunnel
Configuring
EoS/EoPDH-
Based Ethernet
Services
Configuring
PWE3 Services
(CES/ATM/ETH)
Configuring LPT
Configuring
Physical LAG
Deploying a
Tunnel
Deploying
VPLS Services
Deploying
PWE3 Services
Configuring
LAG
Configuring
The Ethernet
Port OAM
Configuring
Radio Links
Configuring IF
Protection
Configuring
ATPC
Configuring
XPIC
Configuring
Hybird/AM
Configuring Services
Configuring Services
on a Per-NE Basis
Configuring End-
to-End Services
Diagnosis &
Maintenance
Configuring QoS
Deploying
Composite
Services
Configuring
The Ethernet
Service OAM
Deploying
Native Ethernet
Services
2.4 PTN Network Management Process
The PTN network management process describes the operation tasks of managing an PTN
network by using the U2000, and the relationships between the operation tasks.
Configure and manage the PTN network by referring to the processes as shown in Figure 2-7.
NOTE
The landscape orientation of the configuration flow chart shows the main phases of managing the PTN network
by using the U2000. The phases include network deployment, service configuration, configuring feature and
network maintenance.
The portrait orientation of the flow chart shows the relationships between operation tasks in each phase.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
273
Figure 2-7 PTN network management process
Deploying a
Network
Configuring
Feature
Configuring
the MSTP
Configuring
the BFD
Configuring
the LPT
Configuring
the IGMP
Snooping
Configuring
the NE Time
Configuring
Clocks
Creating
Network
Configuring
Communicatio
ns
Configuring
Interfaces
Hop
Management
Maintaining a
Network
Configuring
End-to-End
Services
Configuring
Services on a
Per-NE Basis
Configuring the
Control Plane
Configuring the
QoS Policy
Configuring
CES Services
Configuring
Services for
the Offload
Solution
Configuring an
ATM Service
Configuring an
Ethernet
Service
Configuring
Tunnel
Configuring
PWE3
Service
Configuring
VPLS Service
Configuring
L3VPN
Service
OAM
Management
Configuring
Orderwire
Configuring
Inband DCN
Configuring
PTP Clock
Configuring a
TOP Clock
Configuring the
Equipment-
Level Protection
Configuring
MPLS /IP/GRE
Tunnel
Configuring
Network Level
Protection
802.1X/
RADIUS
Authentication
Port Mirror
Configuring Services
Configuring
Composite
Service
Common
Maintenance
Operations
2.5 Router and Switch Network Management Process
This topic describes the operation tasks of managing a router and switch network with the
U2000 and the relationships between these operation tasks.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
274
IP Network Deployment
Figure 2-8 IP network deployment flowchart
Service
deployment
Deploy tunnels.
Deploy service
guarantee.
Software commissioning engineers
Network planning
engineers
Network
planning
Generate the port
information table
Generate the NE
information table
Import the
BoQ
Deploy VPN
services.
Scenario
stage
Role
Tool and
module
UniStar U2000
Network
deployment
Method 2: Deploy the network
using the plug-and-play
management.
Method 1: Deploy the network
using the NE Explorer.
NOTE
After network planning engineers obtain the LLD document (including the port information table and NE
configuration table) based on the Bill of Quantity (BoQ) list, software commissioning engineers can use the
U2000 to complete IP network deployment. This topic does not contain network planning information. For
details about network planning, see the network planning guide associated with the solution used by the site.
Table 2-1 Quick navigation for deployment tasks
Task Descri
ption
Function Module and
Usage Scenario
Navigation Path Reference
Chapter
Netw
ork
deplo
ymen
t
Deploy
basic
configur
ations,
such as
configur
ations
for the
manage
ment
channel,
device
interfac
e, IGP
and
Deployment scenario: Use the
U2000 Plug-and-Play
Management to deploy
configurations.
The U2000 Plug-and-Play
Management can be used to
remotely launch multiple NEs
and perform basic
configurations for multiple
NEs; therefore, on-site software
commissioning is not required
and this greatly improves the
deployment efficiency.
Configuration >
Router/Switch/
Security
Configuration >
Plug-and-Play
Management
Router and
Switch
Network
Management >
Network
Deployment >
Deploying a
Network Using
the Plug-and-
Play
Management
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
275
Task Descri
ption
Function Module and
Usage Scenario
Navigation Path Reference
Chapter
BGP
route,
MPLS,
tunnel
policy,
and
routing
policy.
Applies to the following
scenarios:
l Deploy configurations
during network deployment
or routine maintenance
when not so many devices
are located on the live
network.
l Check configurations. After
the U2000 Plug-and-Play
Management is used to
deploy basic configurations,
the U2000 NE Manager can
be used to check whether the
deployed configurations are
correct.
l Modify basic configuration
for a single NE.
Right-click a
desired NE in the
Main Topology and
choose NE
Explorer from the
shortcut menu.
Router and
Switch
Network
Management >
Network
Deployment >
Deploying a
Network Using
the NE
Explorer
Servi
ce
deplo
ymen
t
Rapidly
deploy
services
on the
U2000
accordi
ng to the
service
plan.
Applies to the following
scenarios:
l Deployment scenario in
which tunnels and VPN
services need to be created.
The service management
module provides a
simplified GUI for you to
complete all configuration
operations in this GUI.
l Routine maintenance
scenario in which VPN
services need to be
monitored, diagnosed, or
tested and checked.
l Service >
Tunnel >
Manage
Tunnel
l Service >
L3VPN
Service >
Manage
L3VPN
Service
l Service >
VPLS Service
> Manage
VPLS Service
l Service >
PWE3 Service
> Manage
PWE3 Service
l Service >
Composite
Service >
Manage
Composite
Service
l Router and
Switch
Network
Managemen
t > Service
Deployment
> Deploy
Tunnel
l Router and
Switch
Network
Managemen
t > Service
Deployment
> Deploy
VPN
Service
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
276
IP Network Maintenance
Figure 2-9 IP Network Maintenance Process
Table 2-2 Monitoring and maintenance process
Task Description Reference Chapter
Perfor
mance
monito
ring
The U2000 supports real-time network
quality monitoring. The monitoring
results can be used for trend analysis and
identifying areas and nodes where
network quality deteriorates, helping
monitoring engineers proactively respond
to network faults.
Router and Switch Network
Management > Network Monitoring
and Maintenance > Performance
Monitoring
Alarm
monito
ring
The U2000 supports alarm monitoring for
immediate identification of network
faults and rapid response to the faults.
Router and Switch Network
Management > Network Monitoring
and Maintenance > Monitoring
Network Status
Report
statisti
cs
collecti
on
The U2000 allows you to analyze and
collect statistics about network running
status in different ways.
l Router and Switch Network
Management > Network
Monitoring and Maintenance >
NE Routine Maintenance >
Collecting Network Resource
Statistics > Using the U2000
Report System to Collect
Network Resource Statistics
l Router and Switch Network
Management > Network
Monitoring and Maintenance >
NE Routine Maintenance >
Collecting Performance
Monitoring Results
NE
config
uration
file
backup
The U2000 backs up NE configuration
files on a regular basis to provide
assistance in fault rectification.
Router and Switch Network
Management > Network
Monitoring and Maintenance > NE
Routine Maintenance > Backing Up
NE Configuration Files
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
277
Task Description Reference Chapter
U2000
mainte
nance
The U2000 is maintained on a regular
basis, which ensures healthy U2000
operation.
Router and Switch Network
Management > Network
Monitoring and Maintenance >
U2000 Routine Maintenance
Table 2-3 Fault diagnosis process
Task Descri
ption
Usage Scenario Navigation
Path
Reference
Chapter
Locate
faults
based
on
alarm
inform
ation.
If the
U2000
receive
s an
alarm
from an
IP NE,
rectify
the
fault
accordi
ng to
the
alarm
inform
ation.
The U2000 receives alarms
from IP NEs.
Fault > Browse
Current Alarm
Fault Diagnosis
> Locating
Faults Based on
Alarm
Information >
Common Alarm
Locating
Performance alarms or TCAs
are generated on the U2000.
NOTE
The names of these alarms
contain Performance or
threshold, for example, Port
Performance Minor Alarm or
The number of BRAS accesses
exceeds the threshold.
Fault > Browse
Current Alarm
Fault Diagnosis
> Locating
Faults Based on
Alarm
Information >
Locating
Performance
Faults
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
278
Task Descri
ption
Usage Scenario Navigation
Path
Reference
Chapter
NOTE
This
task is
applic
able to
the
NEs
for
which
the
value
of
Alar
m
Sourc
e is the
name
of an
NE
\CX
\ATN
\PTN
6900
\ME\S
series
NE.
Service-related alarms are
generated on the U2000.
Refer to the Trail Domain to
check whether the alarm
affects services, as shown in
Figure 2-10.
Fault > Browse
Current Alarm
Fault Diagnosis
> Locating
Faults Based on
Alarm
Information >
Locating Service
Faults
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
279
Task Descri
ption
Usage Scenario Navigation
Path
Reference
Chapter
Locate
faults
based
on IP
networ
k
trouble
shootin
g.
If the
U2000
does
not
receive
any
alarm
but the
voice
service
quality
on the
manage
d
mobile
bearer
networ
k
deterior
ates,
locate
and
resolve
the
quality
deterior
ation
issue.
IP network troubleshooting
can be used to locate and
troubleshoot faults including
incontinuous calls or voice
services of poor quality caused
by packet loss or delay.
Fault > IP
Network
Troubleshooting
Fault Diagnosis
> Locating
Faults Based on
IP Network
Troubleshooting
Figure 2-10 Viewing the trail domains of faults
2.6 Access Network Management Process
This topic describes the operation tasks of managing an access network with the U2000 and the
relationships between these operation tasks.
It is recommended that you configure and manage an access network in accordance with the
flowchart shown in Figure 2-11.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
280
NOTE
The horizontal direction of the flowchart shows the primary stages of managing an access network with the
U2000, which include:
l Network deployment
l Feature configuration
l Network maintenance
l Bulk network configuration
The vertical direction of the flowchart shows the relationships between the operation tasks of these stages.
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
281
Figure 2-11 Flowchart of managing an access network
Network deployment
Network
maintenance
Feature
configuration
Bulk network
configuration
Alarm
management
Inventory
management
Performance
management
NE software
management
Test diagnosis
FTTx pre-
deployment
Topology
management
General
configuration
template
Device
management
Interface
management
Ethernet feature
management
Ethernet OAM
management
GPON
management
EPON
management
xDSL management
Multicast
management
TDM management
VoIP management
PWE3
management
ACL management
BFD management
QoS management
DHCP Relay
management
MSTP
management
iManager U2000 Unified Network Management System
Operation Guide for Common Features 2 Network Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
282
2.7 Core Network Management Process
This topic describes the operation tasks of managing a core network with the U2000 and the
relationships between these operation tasks.
It is recommended that you configure and manage a core network in accordance with the
flowchart shown in Figure 2-12.
NOTE
The horizontal direction of the flowchart shows the primary stages of managing a core network with the U2000,
which include:
l Network deployment
l Feature configuration
l Network maintenance
l Bulk network configuration
The vertical direction of the flowchart shows the relationships between the operation tasks of these stages.
Figure 2-12 Flowchart of managing a core network