NMS AdminGuide 15 1
NMS AdminGuide 15 1
Administration Guide
Release 15.1
613-001999 Rev. B
Copyright © 2014 Allied Telesis, Inc.
All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesis, Inc.
Allied Telesis and the Allied Telesis logo are trademarks of Allied Telesis, Incorporated. All other product names, company
names, logos or other designations mentioned herein are trademarks or registered trademarks of their respective owners.
Allied Telesis, Inc. reserves the right to make changes in specifications and other information contained in this document
without prior written notice. The information provided herein is subject to change without notice. In no event shall Allied
Telesis, Inc. be liable for any incidental, special, indirect, or consequential damages whatsoever, including but not limited to
lost profits, arising out of or related to this manual or the information contained herein, even if Allied Telesis, Inc. has been
advised of, known, or should have known, the possibility of such damages.
This product contains copyright material licensed from Zoho Corporation, http://www.zoho.com. All rights to such copyright
material rest with Zoho Corporation.
Table of Contents
3 Starting Up - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -38
3.1 Logging In - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 40
3.2 Connecting to the NMS Server - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 41
3.3 The Application Screen - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 42
3.4 Password Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 47
3.5 Using the Logs Console - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 48
3.6 Broadcasting a Message - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 49
3.7 Restart / Shut Down the Server - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 50
3.8 Resource Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 51
3.9 CPE Traps - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 52
The AlliedView Network Management System (NMS) is a comprehensive tool to administer, operate and provision
networks. The NMS collects and displays performance metrics, both real-time and historical. Faults are identified and logged,
with alarm notification forwarded according to requirements. You can configure network elements remotely and maintain
security by controlling user IDs and resource access.
The NMS displays information about the network in two ways:
• A graphical map interface displays the network and its managed objects both physically and functionally. You can start at
the network level and drill down to the appropriate device.
• A set of forms lists the objects and their attributes.
• Software Updates - Download the latest software releases for your product.
For sales or corporate information, go to www.alliedtelesis.com/purchase and select your region.
The NMS discovers and manages devices in a network. The NMS provides different levels of support for devices and not all
devices are able to utilize all functions available in the NMS.
Latest Software
Family Devices Release Notes
iMAP 9000 9400 17.0.x
9101 17.2
9400-56
9700-56
iMAP 9000 9700 17.0.x These devices are supported in previous
9100 17.2 versions of the NMS. They have not been
tested with the current release.
9102
9103
iMAP 9000 9810 17.0.x
6.18.0.1
SwitchBlade SBx3112 17.0.x
SBx3106 6.18.0.1
2.1.2 iMGs
TABLE 2-2 iMG Devices Supported by the NMS
Latest Software
Device Release Notes
eDM1405 4.3.3
iMG1405 4.3.3 This model can also contain an RF
module backplate.
iMG1405W 4.3.3
iMG1425 4.3.3 This model can also contain an RF
module backplate.
iMG1425W 4.3.3
iMG1505 4.3.3
iMG1525 4.3.3 This model can also contain an RF
module backplate.
iMG2426F 4.3.3
iMG2504 4.3.3
iMG2522 4.3.3
iMG2524 4.3.3
iMG2524F 4.3.3 Supports 100M/1000 on the WAN
interface.
iMG2524H 4.3.3 Includes HPNA port.
iBG915FX 3-8-05
iMG606BD 3-8-05
iMG606BD-R2 3-8-05
iMG606LH 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG606SH 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG613RF 3.8.3-14 Use RG613 in the Boot Configurator
tool.
iMG616BD 3-8-05
iMG616BD-R2 3-8-05
iMG616LH 3-8-04 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG616RF 3-8-04 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG616RF+ 3-8-04 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG616SH 3-8-04 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
Latest Software
Device Release Notes
iMG616SRF+ 3-8-04 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG616W 3-8-05
iMG624A 3-8-05
iMG624A-R2 3-8-04 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG624B 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG626MOD 3-8-05
iMG634A 3-8-05
iMG634A-R2 3-8-05
iMG634B 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG634B-R2 3-8-05
iMG634WA 3.7.4-30
iMG634WA-R2 3-8-05
iMG634WB 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG634WB-R2 3-8-04 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG646BD 3-8-05
iMG646BD 3-8-04 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG646BD-ON 3-8-05
iMG646LH 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG646MOD 3-8-05
iMG646PX-ON 3-8-05
iMG646SH 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
iMG726BD 3-8-05
iMG726BD-ON 3-8-05
iMG726MOD 3-8-04 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
Latest Software
Device Release Notes
iMG746MOD 3-8-05
RG203TX-SIP/H323 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
RG203TX v2-SIP/H323 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
RG613BD 3-8-04 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
RG613LH 3-8-05
RG613SH 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
RG613TX 3-8-05
RG613TX 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
RG624A 3.5.0-83
RG634 3.5.0-83
RG656-LH 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
RG656-SH 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
RG656-TX 3-7 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
RG656BD 3-8-05
Comtrend NexusLink CT-5631 310.9.1 Basic provisioning only.
This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
Latest Software
Family Devices Release Notes
AT-8600 AT-8624POE 2.9.1-20
AT-8624T/2M
AT-8624XL
AT-8624PS
AT-8624EL
AT-8648T/2SP
AT-8700 AT-8724XL 2.9.1-20 The following releases are not supported
AT-8724XLDC by the NMS:
AT-8724XLDCNEBS • 2.6.1-04+
• 2.6.2
AT-8748XL • 2.6.3
AT-8748XLDC
AT-8748SL
AT-8748SL V2
AT-9600 AT-9606SX/SC These devices are supported in previous
AT-9606T versions of the NMS. They have not been
tested with the current release.
AT-9700 AT-9724TS 3.03 These devices are supported in previous
AT-9748TSXP versions of the NMS. They have not been
tested with the current release.
AT-9800 AT9812T 2.9.1-20 These devices are supported in previous
AT9812TDC versions of the NMS. They have not been
tested with the current release.
AT9812TF
AT9816GB
AT9816GBDC
AT9816GF
AT-9900 AT-9924SP 2.9.1-20 If an <AT-9900> is part of an EPSR
AT-9924T Domain, then to support EPSR
management from the NMS, the NMS
AT-9924T4SP must be set as an SNMPv2 trap host on
the device.
AT-9900s AT-9924Ts 3.2.1-03 If an <AT-9900s> is part of an EPSR
Domain, then to support EPSR
management from the NMS, the NMS
must be set as an SNMPv2 trap host on
the device.
This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
Latest Software
Family Devices Release Notes
x900 900-24XS 3.2.1-05 These devices are supported in previous
900-24XT versions of the NMS. They have not been
tested with the current release.
x900 - 48 x900-48FE 2.9.2-13
x900-48FS
Latest Software
Family Devices Release Notes
AT-x510 AT-x510-28GTX 5.4.4-0.0
AT-x510-52GTX
AT-x510-28GPX
AT-x510-52GPX
ATx510DP-52GTX
x600 AT-x600-24Ts 5.4.2-3.11 The AlliedWare Plus x600 Series does
AT-x600-24TsXP not allow the modification of the
Enhanced Recovery Mode if the EPSR
AT-x600-24Ts-POE domain is currently enabled. If a user
AT-x600-48Ts attempts to do this, an error message is
displayed.
AT-x600-48TsXP
If an x600 is part of an EPSR Domain,
AT-x600-24Ts-POE+
then to support EPSR management from
the NMS, the NMS must be set as an
SNMPv2 trap host on the device.
x610 AT-x610-24Ts 5.4.4-0.0 The AlliedWare Plus x610 Series does
AT-x610-24Ts-PoE+ not allow the modification of the
Enhanced Recovery Mode if the EPSR
AT-x610-24Ts/X domain is currently enabled. If a user
AT-x610-24Ts/X-PoE+ attempts to do this, an error message is
displayed.
AT-x610-48Ts
If an x610 is part of an EPSR Domain,
AT-x610-48Ts-PoE+
then to support EPSR management from
AT-x610-48Ts/X the NMS, the NMS must be set as an
AT-x610-48Ts/X-PoE+ SNMPv2 trap host on the device.
AT-x610-24SPs/X The Stack-XG card can be swapped
during operation (e.g. to replace a faulty
card), but for stacking to be activated the
unit must be rebooted. (Stacking will not
start unless the card is already inserted
and the unit is rebooted.)
TABLE 2-4 AlliedWare Plus Layer 3 Switches Supported by the NMS (Continued)
Latest Software
Family Devices Release Notes
x900 x900-12XT/S 5.4.4-0.0 The AlliedWare Plus x900 Series does
ATx900-24XS not allow the modification of the
Enhanced Recovery Mode if the EPSR
ATx900-24XT domain is currently enabled. If a user
ATx900-24XT-N attempts to do this, an error message is
displayed.
If an x900 is part of an EPSR Domain,
then to support EPSR management from
the NMS, the NMS must be set as an
SNMPv2 trap host on the device.
SwitchBlade AT-SBx908 5.4.4-0.0 The AlliedWare Plus SBx908 Series does
AT-SBx8112 not allow the modification of the
Enhanced Recovery Mode if the EPSR
AT-SBx8106 domain is currently enabled. If you
attempt to do this, an error message is
displayed.
If an SBx908 is part of an EPSR Domain,
then to support EPSR management from
the NMS, the NMS must be set as an
SNMPv2 trap host on the device.
AT-IX5-28GPX AT-IX5-28GPX 5.4.4-0.0
AT-IE200 AT-IE200-6GT 5.4.3-x.x
AT-IE200-6GP
AT-IE200-6FT
AT-IE200-6FP
Latest Software
Family Devices Release Notes
AT-8000S AT-8000S/16 3.0.0.x
AT-8000S/24
AT-8000S24/POE
AT-8000S/48
AT-8000S/48POE
AT-8000GS AT-8000GS/24 2.0.0.x
AT-8000GS24/POE
AT-8000GS/48
Latest Software
Family Devices Release Notes
AT-8100S AT-8100S/24C 2.2.5.x
(AlliedWare Plus) AT-8100S/24
AT-8100S/24POE
AT-8100S/48
AT-8100S/48POE
AT-8100L
AT-8100L AT-8100L/8POE 2.2.5.x
(AlliedWare Plus)
AT-8200 AT-8224XL These devices are supported in previous
AT-8224SL versions of the NMS. They have not been
tested with the current release.
AT-8216XL
AT-8216FXL/SC
AT-8216FXL/SMSC
AT-8900 AT-8948 2.9.1-20 If an AT-8900 is part of an EPSR Domain,
then to support EPSR management from
the NMS, the NMS must be set as an
SNMPv2 trap host on the device.
This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
AT-9000 AT-9000/28 2.1.8 Mode LED indicator is fixed in the ACT
AT-9000/28SP Mode. The NMS has no provision for
Mode Selection.
AT-9000/52
Provision/De-provision button under
Port Management is disabled since Profile
Management function is not supported.
AT-9100 AT-9108 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
AT-x200 AT-x200-GE-28T 5.4.4-0.0
AT-x200-GE-52T
AT-x210 AT-x210-9GT 5.4.4-0.0
AT-x210-16GT
AT-x210-24GT
AT-GS900M Series AT-GS908M These devices are supported in previous
AT-GS916M versions of the NMS. They have not been
tested with the current release.
AT-GS924M
AT-GS950 AT-GS950/48PS 1.0.0 Basic support only. The release number
displays as 0.0.0-0.
AT-MC2700 AT-MC2700 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
Latest Software
Family Devices Release Notes
AT-AR100 AT-AR160 These devices are supported in previous
AT-AR130 versions of the NMS. They have not been
tested with the current release.
AT-AR200 AT-AR250E 1.0.6 Use AT Loader for upgrade. For AT
Loader, contact your Allied Telesis
representative or go to http://
www.alliedtelesis.com/support.
This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
AT-AR260 AT-AR260S These devices are supported in previous
AT-AR260S v2 versions of the NMS. They have not been
tested with the current release.
AT-AR300 AT-AR300 Use AT Loader for upgrade. For AT
AT-AR300 v2 Loader, contact your Allied Telesis
representative or go to http://
AT-AR300L www.alliedtelesis.com/support.
AT-AR300L v2 These devices are supported in previous
versions of the NMS. They have not been
tested with the current release.
AT-AR450 AT-AR450S This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
MC2700 CentreCOM-MC2700 1.2.x This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
CentreCOM AR Series AR415S 2.9.2-13 LLDP configuration per port is not
AR550S supported and will return a ‘Function not
supported’ error.
AR560S
AR570S
CentreCOM 8000 Series 8324XL 2.7.9-x LLDP configuration per port is not
8316XLR supported and will return a ‘Function not
supported’ error.
8324XLR
8424TX
8424XL
CentreCOM 9400 Series CentreCOM-9424T 4.x
CentreCOM 9400 Series CentreCOM-9424T-SP 2.x
CentreCOM FS Series CentreCOM-FS926M 1.6.9 These devices are supported in previous
CentreCOM-FS917M versions of the NMS. They have not been
tested with the current release.
CentreCOM-FS909M
Latest Software
Family Devices Release Notes
CentreCOM FS Series CentreCOM-FS926M-PS 1.6.9 These devices are supported in previous
CentreCOM-FS917M-PS versions of the NMS. They have not been
tested with the current release.
CentreCOM-FS909M-PS
CentreCOM FS Series CentreCOM-FS808M 1.0.3 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
CentreCOM GS Series CentreCOM-GS924M 1.6.6 These devices are supported in previous
CentreCOM-GS916M versions of the NMS. They have not been
tested with the current release.
CentreCOM-GS908M
CentreCOM GS Series CentreCOM-GS924Mv2 2.1.0 These devices are supported in previous
CentreCOM-GS916Mv2 versions of the NMS. They have not been
tested with the current release.
CentreCOM GS Series CentreCOM-GS908Mv2 2.4.1 These devices are supported in previous
CentreCOM GS908v2-4PS versions of the NMS. They have not been
tested with the current release.
CentreCOM 9048XL CentreCOM 9048XL 2.1.0 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
Latest Software
Family Devices Release Notes
EDM EDM-S 1.0.0 Basic support only. The release number
displays as 0.0.0-0.
MEx MEx-244X-SE 1.0.0 Basic support only. The release number
displays as 0.0.0-0.
Latest Software
Family Devices Release Notes
AT-TQ2000 AT-TQ2450 2.0.2 Basic support only. The release number
displays as 0.0.0-0.
AT-TQ3000 AT-TQ3600 2.0.2 Basic support only. The release number
displays as 0.0.0-0.
Latest Software
Family Devices Release Notes
GenBand GB-G6 8-1-11 Supported for provisioning of MGCP
10-4-10 voice lines and configuration backup and
restore.
This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
GenBand GB-G2 1.3.4 Supported for provisioning of MGCP
voice lines and configuration backup and
restore.
This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
Extreme BD Extreme BD 8810 12.0 These devices are supported in previous
Extreme BD 8806 versions of the NMS. They have not been
tested with the current release.
Extreme Summit X250e X250e-24t 12.0 These devices are supported in previous
X250e-24p versions of the NMS. They have not been
tested with the current release.
X250e-24x
X250e-48t
X250e-48p
X250e-24tDC
X250e-24xDC
X250e-48tDC
Extreme Summit X450a X450a-24t 12.0 These devices are supported in previous
X450a-48t versions of the NMS. They have not been
tested with the current release.
X450a-24tDC
X450a-24xDC
X450a-24x
X450a-48tDC
Juniper SSG 550M 6.1.0r6.0 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
NetScreen NS-208 5.4.0r6.0 These devices are supported in previous
NS-50 5.4.0r10.0, versions of the NMS. They have not been
5.3.0r7.0 tested with the current release.
NS-5XT
A10 AX3200 A100-AX3200 This device is supported in previous
versions of the NMS. It has not been
tested with the current release.
2.2 End-of-Support
Some Allied Telesis devices have reached end-of-support. Allied Telesis no longer officially supports them and does not
guarantee they will continue to function correctly with this release of the NMS.
Devices that have reached end-of-support are organized into the following categories:
• Non-CPE Devices at End-of-Support
• CPE Devices at End-of-Support
Latest Software
Family Devices Release
AT-AR410 AT-AR410 2.7.1-x
AT-AR410 v2
AT-AR415 AT-AR415S 2.9.2-xx
AT-AR440 AT-AR440S 2.9.2-xx
AT-AR442 AT-AR442S 2.9.2
AT-AR700 AT-AR720
2.6.x-x
AT-AR740
AT-AR740DC
AT-AR725 2.9.1-x
AT-AR725DC
AT-AR745
AT-AR745DC
AT-AR750S 2.9.2-xx
AT-AR770S 2.9.2-xx
AT-8000 AT-8012M 3.3.x
AT-8012MQS
AT-8016FMT
AT-8016FSC
AT-8016FST
AT-8016XL
AT-8024
AT-8024GB
AT-8024M
AT-8026FC
AT-8026T
AT-8088MT
AT-8088SC
AT-8300 AT-8312 2.0.x
AT-8324
Latest Software
Family Devices Release
AT-8500 AT-8516FSC 1.4.x
AT-8524M
AT-8525
AT-8524POE
AT-8550GB
AT-8550SP
AT-8800 AT-8824 2.9.1-20
AT-8824DC
AT-8848
AT-8848DC
RG213 RG213-H323 6.x
RG213-MGCP
RG213-SIP
Rapier Rapier24 2.3.1-x
Rapier48 2.7.0-x
Rapier “G” RapierG6 2.7.3-09
RapierG6flx
RapierG6fmt
RapierG6fsx
Rapier “i” Rapier24i 2.9.1-20
Rapier24iDCNEBS
Rapier48i
Rapier 48W
SwitchBlade SB4104AC 2.7.5-09
(AlliedWare) SB4104DC
SB4108AC
SB4108DC
Telesis T1000 T1000 1.3.x
1.6.x
iMAP 7100 6.1.12
7101
7102
7103
7104
7105
7112
7115
7400
7700
Latest Software
Family Devices Release
DTM NM1000 -
AT-9400 AT-9408LC-SP -
AT-9424T
AT-9424T-GB
AT-9424T-POE
AT-9424TS
AT-9424T-SP
AT-9424TS-XP
AT-9448T-SP
AT-9448TS-XP
AT-8324XL AT-8324XL -
AT-8724SL -
AT-8748XL AT-8748XL -
AT-AR550S AT-AR550S -
TABLE 2-13 Feature Support for Allied Telesis, AlliedWare and AlliedWare Plus Products (Continued)
- QoS1 Y Y Y Y Y Y
- EPSR Y Y Y Y Y Y
- ESPR+ N N N N N N
- CES n/a n/a n/a n/a n/a n/a
LLDP Configuration Y Y Y Y Y Y
LAG Y N N N N N
VCS Monitoring N N N N N N
1. Profile Management and QoS are supported in release 2.5.1 and above.
2.4.3 AR and AT
TABLE 2-15 Feature Support for AR and AT Products
AT-
8100S
and
AR AR AR AT- AT- AT- AT- AT- AT- AT- AT-
Support Features 700 400 400s 8324 8000 8500 9700 8000S 8000GS 8100L 9000
View Chassis Y Y Y Y Y Y Y Y1 Y2
Provision
- Backup Y Y Y N N N N Y Y Y Y
- Restore Y Y Y N N N N N N Y Y
- Command Script Y Y Y N N N N N N N N
Mgmt.
- Configuration File Y Y Y N N N N Y Y N Y
Mgmt
- Device Information Y Y Y Y Y Y Y Y Y Y Y
- Device Log Y Y Y N N N N N N Y Y
Management
- SNMP Agent Y Y Y N N Y Y Y Y Y Y
- SNMPV2 Y Y Y Y Y Y Y Y Y Y Y
Configuration
AT-
8100S
and
AR AR AR AT- AT- AT- AT- AT- AT- AT- AT-
Support Features 700 400 400s 8324 8000 8500 9700 8000S 8000GS 8100L 9000
- SNMPV3 Y Y Y N N Y Y Y Y Y Y
Configuration
- Software Y Y Y N N N N Y Y Y Y
Configuration
- Text File Y Y Y - - N Y Y Y N Y
Comparison
- Configure VLAN - Y Y Y Y N N N N Y Y
- Card Management - - - - - - - N N N Y
- Port Management - - - - - - - Y Y Y N
- Syslog Y N N N N N N N N Y3 Y3
- SSH Y Y Y N N Y Y N N Y4 Y
Network Service
- Link Operations - Y Y Y Y N N Y Y Y Y
- VLAN - - - All All N N Y Y Y All
- Profile Mgmt. - Y Y N N N N N N N N
- QoS - Y Y N N N N N N N N
- EPSR - - - N N N - - - N N
- CES - - - - - N - - - - -
LLDP Configuration N N N N N Y N Y Y Y N
LAG N - - - - Y Y Y N N
VCS Monitoring N - - - - Y - Y Y Y N
Alarms/Events Y Y Y Y Y Y Y Y Y Y Y
Performance Y Y Y Y Y Y Y Y Y Y Y
Browse Device Y Y Y Y Y Y Y Y Y Y Y
Rediscover Device Y Y Y Y Y Y Y Y Y Y Y
1. If the devices are in stacked configuration and a SFP module is inserted to the stack member 2; the CLI command ‘show
system pluggable’ will not show SFP modules for stack members. If the device stack ID is not 0, Chassis View and Port
Management shows all ports are down. This is due to doing the SNMP GET of the ifOperStatus <portinterface> returns
the value '2', which means down. Finally, the incorrect LED turns green when an SFP module is inserted in the SFP port and
its corresponding redundant RJ-45 port is active.
2. Incorrect LED turns green when an SFP module is inserted in the SFP port and its corresponding redundant RJ-45 port is
active.
3. Supported, but unable to set device logs to disable. Syslog status cannot be disabled.
4. Open SSH prompts for the password twice.
8000 9400
Support Features AR Series Series MC2600 MC2700 Series GS Series FS Series 9048XL
View Chassis Y Y Y 12 Y3 4 Y Y Y Y
Provision
- Backup/Restore Y Y Y Y Y Y Y Y
- Command Script Mgmt. Y N - - - N N N
- Configuration File Mgmt Y Y Y Y Y Y Y Y
- Device Information Y Y Y Y Y Y Y Y
- Device Log Management Y Y Y Y Y Y Y Y
- SNMP Agent Y Y Y 5 Y5 Y 6 Y Y Y
- SNMPV2 Configuration Y Y Y Y Y Y Y Y
- SNMPV3 Configuration Y Y 7 - - Y - N -
- Software Configuration Y Y Y Y Y8 Y Y Y
- Text File Comparison Y Y Y Y Y Y Y Y
- Configure VLAN Y Y - - Y Y Y Y
- Card, Port Management Y 9
Y9 - - Y 9 N N N
- Syslog Y Y Y10 Y10 Y10 Y Y10 Y10
- SSH Y N11 - - Y - - -
Network Services
- Link Operations Y Y - - Y Y Y Y
- VLAN Y Y - - Y Y Y Y
- Profile Mgmt N N - - N N N N
- QoS N N - - N N N N
- EPSR N Y - - Y 12 Y Y 13 14 Y
- CES N Y - - - N N N
LLDP Configuration Y 15
Y 15 16 - - - N N N
Alarms/Events Y Y Y Y Y17 Y Y Y
Performance Y Y Y Y Y Y Y Y
Browse Device Y N Y Y - Y Y Y
Rediscover Device Y Y Y Y Y Y Y Y
1. There is no info via SNMP or CLI that shows the duplex mode. The duplex LED will always be gray.
2. The color of disabled port will not turn orange when module/port is disabled via CLI
3. There is no info via SNMP or CLI that shows the duplex mode. The duplex led will always be gray.
4. The color of disabled port will not turn orange when module/port is disabled via CLI
5. Can only have a maximum of two SNMP communities.
6. Disregard the SNMP Version parameter when creating and modifying SNMP Community.
7. 8748XL is not supported.
8. NMS will return the Application Software Version name which was shown when commands ‘show switch’ and
‘show system’ was executed on the device instead of the exact filename of the loaded release file.
Extreme G6/
Features Juniper Summit Extreme BD NetScreen G2
View Chassis - - - - N
Provision - - - -
- Backup/Restore Y Y Y - Y
Can specify Can specify
additional files additional files
for backup for backup
- Command Script Mgmt. - - - - Y
- Configuration File Mgmt - - - - N
- Device Information - - - - N
- Device Log Management - - - - Y
- SNMP Agent - - - - N
- SNMPV2 Configuration Y Y Y N N
- SNMPV3 Configuration Y Y Y N N
- Software Configuration - - - - N
- Text File Comparison - - - - N
- Configure VLAN - - - - N
- Card, Port Management - - - - N
- Syslog - - - - N
- SSH N Y Y Y N
Network Services - - - - N
- Link Operations - - - - -
- VLAN - - - -
- Profile Mgmt - - - - N
- QoS - - - - N
- EPSR - - - - N
- CES - - - - N
LLDP Configuration - - - - N
LAG - - - - N
VCS Monitoring - - - - N
Alarms/Events - - - - N
Performance - - - - N
Browse Device - - - - N
Rediscover Device - - - - N
The AlliedView Network Management System (NMS) offers a variety of startup methods, with each having its advantages:
• Application Client - This is used entirely on the AlliedView NMS server.
• Application Start (Web Start) - This is the preferred method when accessing the NMS from a remote location. It
requires Web Start (JRE: 1.6.0_nn) on the client. (This is also the first option on the Logon screen using a browser.) Refer
to Figure 3-2.
• Web Client (HTML) - All that is required is a browser that meets the criteria listed in Table 3-1. (This is the second
option on the Logon screen.)
• Applet Client - This involves loading of the correct applet and can be local or remote to the server. It requires the Java
Runtime Environment (JRE)1.6.0_nn. (This is a link at the bottom of the Logon screen.)
Note: The monitor used by the NMS client should have a resolution of 1280x1024 or better.
Table 3-1 lists the client types and the startup methods for each platform.
TABLE 3-1 User Interfaces and Startup Methods for the NMS
TABLE 3-1 User Interfaces and Startup Methods for the NMS (Continued)
3.1 Logging In
3.1.1 Using the Client
By choosing the Start NMS Client option from the Start menu, you get the AlliedView NMS Authentication dialog box. By
default, the username and password are root and public, respectively. You can also change the username and password based
on your requirements.
By default the form shows only the User ID and Password. If you select the Advanced button you see the figure below.
Included is the name of the host machine on which the NMS server is running, which is usually already filled in. The default
port number is 9090. If the Show Console option is checked, the Logs console will appear on the screen; otherwise it will
not be shown.
Enter the username and password, then click Connect to connect to the host server.
You can find the Panel-Specific Menu Bar, Toolbar, Map Toolbar, NMS Tree, Alarm Count Panel, Status Bar, and the NMS
Display Panel displayed in the user interface.
• Manage CLI Users - Provides Command Line Interpreter (CLI) user management functions
• System Log Configuration - Provides configuration functions for System Log Management
• NMS Database Backup - Provides NMS database backup functions
• Discovery Configurator - Provides configuration functions for NMS discovery
• Security Administration - Provides security administration functions
• Change Password - Allows you to change your password
• Application Manager - Provides application management functions
• Mib Browser - Provides Management Information Base (MIB) browsing functions
• Open Telnet - Allows you to telnet to another device
• Window - Provides control for the NMS client display windows. The items include:
• A radio-button list of the most recently accessed panels
• Cascade - Cascades the open windows in the NMS Display Panel
• Tile Horizontal - Tiles the open windows horizontally in the NMS Display Panel
• Tile Vertical - Tiles the open windows vertically in the NMS Display Panel
• Save Location and Size - Saves the current size and screen location of the NMS display
• Show Toolbar - Displays or hides the Toolbar
• Help - Provides Help information for the AlliedView NMS.
The context-specific menu items will be described later in this document.
3.3.2 Toolbar
The Toolbar displays a collection of actions, commands, or control functions. Toolbars are used to display frequently used
components. It is placed below the menu bar and has various tools for different nodes. A tool tip is provided for each tool.
The Toolbar is movable and floatable. The tools that appear on the Toolbar will vary depending on which NMS Tree node is
being displayed in the NMS Display Panel. The Toolbar for the Network Maps node is shown in the following figure.
Access the properties for the selected item or the currently displayed map. If no
object is selected in the map, the map properties are displayed. If multiple objects are
selected, a property sheet for each selected item will be displayed.
Detach the current display in the NMS Display Panel from the NMS Display Panel.
The display will appear in a separate window from the main NMS window.
Note: Not all of the icons listed in Table 3-2 are shown in Figure 3-5. The actual icons that appear will depend on which tree node
is being displayed in the NMS Display Panel.
In the example above, there is the default client to BE configuration. This has the following information:
• Resource Manager (in window title) - This is the server the client currently is connected to. (If the client is locally
connected to the server this will be localhost.)
• HostName - These are the servers currently deployed in the AlliedView NMS server configuration. In the default BE only
configuration, there is only one server and therefore only one row.
• Server Type - The BE server will have PRIMARY as the server type, while the FE servers will have STANDALONE.
• Connection Status - Working connections are Up. If a server fails this will change to Down.
• Web Server Port - This is the port used by the client to connect to the server.
• Enable Forwarding - This box is editable only when there is more than one server, and can only be activated for the FE
server when the client is connected to that FE server. The feature is explained above.
A Network Map is a graphical representation of networks and Network Elements (devices). Network elements, such as
desktops, workstations, storage devices, servers, notebooks, printers, switches, routers etc., which are connected in a
network, can be represented pictorially in a map. This ability of maps to expose logical relationships between devices and to
show small but significant changes in the state of the Managed Objects (MOs), combined with showing complex networks,
make maps an important component of NMS. The map panel consists of a background image and map symbols, which are
representations of the managed objects. An example is shown in the following figure.
Symbol Meaning
This symbol represents a network in an Internet Protocol (IP) network or Virtual
Local Area Network (VLAN).
This symbol is a solid line that interconnects objects on the map. It represents
physical or logical connectivity between the two objects.
This symbol represents a physical device on a network. The device type is reflected in
the symbol table (e.g. iMAP 7400).
This symbol is a dashed line that interconnects two VLAN interfaces in a VLAN. It
represents logical connectivity between the two VLAN interfaces (VLAN IFs).
Each symbol on a map depicts the state of the associated component with one of six colors. Each of these colors and its
meaning are listed in Table 3-3. Notice that all of the symbols shown in Table 4-1 reflect a no alarm state (green). Should
some other condition exist, the green shown in the affected symbol will be replaced with an appropriate color from Table 3-
3.
The Map Toolbar icons and their descriptions are given in the following table.
Zoom In Enlarges the view of the selected map. The selected map gets zoomed at the
center.
Zoom Out Reduces the view of the selected map that has been zoomed in. With every click
on the tool, the map retracts by one size.
Undo Undoes a performed action. That is, if an action, like deleting a map symbol, is
performed then you can retrieve the symbol in the map by clicking this tool.
The items specific to the individual maps are described later in this section.
• Operations - Appears when one or more router objects are selected or when a router object is right-clicked. This menu
is the same as the Operations menu in the Router Map (refer to "Router Map Panel-Specific Menus" on page 59).
• Linkmenu - Appears when one or more link objects are selected or when a link is right-clicked. This menu provides access
to information on the link. Items include:
• Properties - Displays the map symbol properties for the selected link
• Managed Object Properties - Displays the Managed Object Properties form for the selected link
• Delete Object and Traces - Deletes the selected link
• Add/Delete Property - Adds or deletes a property for the selected link
• UnManage/Manage - Sets the link set to unmanaged if it is currently managed, or managed if it is currently unmanaged
• Update Status - Updates the status information for the selected link
The VLAN Network submaps use the VLAN interface symbols and the VLAN connection symbols (dashed lines) to show
VLAN configurations.
Criteria for
Sorting Description for Sorting Criteria
name Sorts the map symbols based on their names. Order of sorting is ascending American Standard Code
for Information Interchange (ASCII).
label Sorts the map symbols based on the symbols' label values. Order of sorting is ascending ASCII.
objName Sorts the map symbols based on the name of the managed object that is represented by the symbol.
status Sorts the map symbols based on the status of the managed objects represented by the symbols.
Order of sorting is from critical to clear, meaning critical symbols will be positioned first followed by
symbols of lower severity.
objType Sorts the map symbols based on the type of the managed object represented by the symbols. (Node,
Network, Router, Switch etc.)
Note: The sorting of map symbols will not take place once you save the map. This is because sorting occurs only for the symbols
whose anchor property is set to False. When you save a map, the anchor property of all symbols is set to True and so the
sorting will not occur.
The Object Property form is the same for all network elements. The following figure shows a sample Object Properties
form.
Note: For a complete list of MO attributes and examples, refer to Object Properties to Define Objects and Custom Views.
The following table lists the map properties while the next table lists the map criteria properties that appear after clicking
Next on the properties form.
f
FIGURE 4-11 Link Symbol Properties Form
The Symbol Properties tab in the Object Properties form are shown in the following table.
The Network Inventory view is used to view, search, modify, and delete network objects, such as networks, nodes, and
interfaces. The Network Inventory view displays an inventory of all network entities, such as networks, nodes, ports,
interfaces, routers, and links. Under the Network Inventory node in the NMS Tree are the following default subviews:
• Networks
• Nodes
• Profile Association
• Discovery Status
• Cards
• Ports
• iMG/RGs
• Interfaces
• Routers
• VLAN Interfaces
• EPSR Domains
• Physical Links
Each of these subviews narrows the network inventory to a specific type.
When the Network Inventory view is displayed in the NMS Display Panel, items appear in the Panel-Specific Menu Bar that
are specific to the Network Inventory views. Some of the items are specific to the type of object that is selected in the view,
while others are common to all of the object types. The common items include:
• Edit - Provides editing functions for the view. Items include:
• Add Node - Adds a node.
• Add Network - Adds a network.
• Refresh Node - Updates the information on the selected node.
• Clear Alarms - Clears the alarms on the selected node.
• Delete Alarms - Deletes from the alarm database the alarms on the selected node.
• Search - Provides a search function for the view.
• Export Table Data - Provides an export function for all of the view data. The data may be exported to a file (in
delimited tabular form) or to a Web browser. The data may also be filtered.
• Export Selected Rows - Provides an export function for selected rows in the view data.
• View - Displays additional information. Items include:
• Details - Displays detailed information on the selected object.
• Events - Opens a Network Events view in which the events associated with the selected object are displayed.
• Alarms - Opens an Alarms view in which the alarms associated with the selected object are displayed.
• Performance - Opens a Configured Collection view in which the statistics for the selected object are displayed.
• Refresh - Updates the information on the selected object.
These menu items also appear for all of the Network View subviews. The object-type-specific menus include:
• Network - For network objects
• Operations - For nodes and routers on the network
• Port - For customer ports
• Interface - For Interfaces (This includes the Ping menu item.)
• VLAN Interface - For VLAN interface objects
• Link - For physical link objects
The object-type-specific menus are described in the following sections.
When the Nodes subview is displayed in the NMS Display Panel or when a node object is selected in the Network Inventory
view, the Operations menu appears in the Panel-Specific Menu Bar. In the Nodes subview, this menu appears when a node is
selected in the view.
Note: If multiple nodes are selected and the nodes are of different types (e.g. Rapier, 9400, etc.), the Object menu will appear
instead of the Operations menu.
The items in the Operations menu include:
• View Chassis - Displays the current chassis view for the selected device.
• View Device Log - Displays the Device Log Viewer.
• Provision - Provides provisioning functions for the selected device.
• Network Services - Provides network link and VLAN functions for the selected device.
• Alarms/Events - Displays the alarms or events, or a summary of the alarms and events for the selected device. Selecting
this and then choosing Alarms or Events will bring up the Alarms or Events view. Selecting Summary will bring up the
Events and Alerts display, which gives a summary of the Events and Alerts. Refer to the following figure.
FIGURE 5-4 Summary Display for Events and Alarms (One Device)
• Performance - Brings up the Configured Collection window for the selected device.
• View Config Comparison - Brings up the Config Comparison Form. This is used for only non-i MAP devices, and must be
text files.
• Discover Attached iMGS/RGs - If there are subtending iMGs/RGs, they are discovered. This is used in a variety of
provisioning scenarios.
• Display Switch FDB - For swith (layer 2) devices, lists the Port, MAC, and VLAN association, as well as the Status.
• Power over Ethernet Management
• Telnet To Device - Opens a Telnet session to the selected device.
• Browse Device - Brings up the HTML browser for the device.
• Rediscover Device - Re-discovers the device immediately.
• Managed Object Properties - Displays the Managed Object Properties form for the selected device.
• Delete Object and Traces - Deletes the selected object.
• UnManage/Manage - Sets the device to unmanaged if it is currently managed, or managed if it is currently unmanaged.
• Update Status - Updates the event and alarm information on the selected device.
• CES
These are explained in the following subsections.
Note: The Statistics tab and Log tag are common across these interfaces and show all statistics and logs for all ports in the Triple
Play service.
• PMON Thresholds -
• Device Data Collection - Configures buckets that will collect statistics and the interval at which they are filled
• IP Filters - Allows classifiers to be applied to the port
• Statistics
• PMON Stats - Collects traffic statistics over a specified time period (called the interval)
• RMON Stats - Tracks packet flows and highlights errors as well as overflows of packets.
• Graph Stats - Makes graphs both in real-time and for statistics that have been collected
• Port Log - Displays any log messages associated with the selected port
Views are used in the AlliedView NMS to display information related to a specific aspect of network management, such as
network events. The Fault Management view is a default view that displays information related to events, system logs, and
alarms. In addition to the Fault Management view are two other default views: Performance and Network Inventory. These
views display additional information on the network and are described later in this document. This section focuses on the
Fault Management view and how it is used.
Network Events are entities that represent the various happenings in the network devices. Events can convey general
information or the current status of the devices in a network. Working with the NMS, the user can know the history of a
device by browsing through the Event Viewer in the client. The Event Viewer provides a wide range of features to the user
in extracting the required information from the Network Events.
System logs are indications from individual devices that some change has occurred on the device. It may be a minor change
in which case the log merely provides information, or it may be a significant change that requires attention, such as an alarm
or failure. The System Log Events viewer, which is a subview of the Network Events view, provides a wide range of features
to the user in extracting the required information from the system logs.
Alarms are generated when a failure or fault is detected in the network devices. The generated Alarms are displayed in the
Alarm Viewer. The Alarm list containing alarms of various severity levels, such as critical, major, minor, clear, etc., can be
viewed in the Alarm Viewer. The Alarm Viewer provides a wide range of features to the user in extracting the necessary
information from the Alarms and viewing them in a specific way.
Note: The Node clear. No failures on this node event indicates the node was successfully polled and that the results show a previous
failure on the node has cleared. When this event occurs, if no other alarm conditions exist on the node, the alarm severity for
the node will change to green. However, if another alarm exists on the node, such as a Threshold Crossing Alarm (TCA), the
alarm severity of the Node clear. No failures on this node event and the node will reflect the severity of the persisting alarm
even though the event indicates no failures on the node. Please keep in mind that the Node clear. No failures on this node
event means that all failures have been cleared on the node and not that all alarms have been cleared.
- For the iMG/RG, the Triple Play Service Management Form appears
- For a port, brings up the Port Menagement Form
• Alarms - Provides alarm information specific to the selected event.
Note: Selecting this option will take you to the Alarms view.
• Refresh - Refreshes the view information.
• Actions -
• Save To File option, which saves the event information to a file.
• Export Events -
For example, the user may set a schedule to export of all critical events every day by selecting Recurring radio button and
every day of the week checkboxes and set the Days/Range option to 1 to export daily data every day. For every week by
the user would select one day in the Recurring schedule and set the Days/Range to 7 to export data for the past seven
days once every week.
• The output files generated by each export are very similar to those generated by on-demand Events/Alerts Table Data
Export. In the scheduled export there will be a new file every time the schedule is executed.
All schedule fields are the same as used in other schedule related operations such as NMS backup.
) in the Toolbar. This will display the search window shown in the figure, which will allow you to specify the search
criteria.
Panel-Specific Menu Bar or by clicking the Save icon ( ) in the Toolbar. This will display the Save Event file on Remote
Server window shown in the following figure.
When an event arrives into Web NMS, the event parsers list is checked to see whether the incoming event satisfies the
match criteria of the event parser. If the event parser matches, the event is passed through the corresponding event parser.
The outgoing event from the parser is then matched with the remaining set of parsers (if any, in sequence). If there are any
matches, the event will be passed through those parsers. This process will continue until there are no parsers left to be
scanned.
Configuring Event Parsers can be done by defining the Event Parser or the information or defining the configuration and
saving it to a file.
To configure an event parser, select Edit -> Configure > Event Parsers from the Panel-Specific Menu Bar for Network Events.
The Event Parser Configuration form will appear as shown in the following figure.
Many administrative tasks for the AlliedView NMS are done by adding, changing, and deleting files on the server. However,
directly accessing these files should not be attempted, since a loss of AlliedView NMS functionality could result.
The NMS provides GUI-based functions that make updating the AlliedView NMS files easy and less error-prone. Moreover,
the server does not have to be restarted for the changes to take effect. However, a few tasks do involve restarting the
server. These tasks are included and the point at which a restart is required is highlighted.
For AT and iMAP devices, you are able to change the default prompt to a custom string on the device. For AT devices, the
default “>” at the end of the prompt is required for the NMS to discover these devices.
In this document <NMS_HOME> refers to the directory where the NMS is installed. The default in the installation wizard is:
• Windows Server 2003/2008, XP, 7 (32-bit OS) - c:\Program Files\Allied Telesis\AlliedView NMS
• Windows Server 2003/2008, XP, 7 (64-bit OS) - c:\Program Files (x86)\Allied Telesis\AlliedView NMS
• Linux - /opt/AlliedTelesis/AlliedViewNMS
Directory names inside configuration files use the Internet standard of forward slashes (/) on both Windows and Linux
platforms.
Table 7-1 lists the tasks that are fully supported. Accessing a file on the server and changing a value without Allied Telesis
Support could result in a loss of AlliedView NMS functionality.
FIGURE 7-2
• Selecting Save and Apply Now restarts discovery and applies the changes immediately. This may slow down the NMS and
temporarily disrupt operations.
• Selecting Save Now but Wait to Apply postpones applying the schedule changes until the next discovery on the current
schedule completes. This avoids unnecessary disruptions to the NMS.
When you add a new network discovery happens immediately with either option since the network has not been previously
discovered.
7.2.2.1 SNMPv2
For most devices, only read communities are used during discovery. Some devices, including iMG/RGs, require discovering
write communities as well.
Communities will be attempted in the order displayed. The order may be modified by selecting a row and then clicking on
the up/down buttons.
Communities may be added, modified, or deleted with the Add, Modify or Delete Buttons. The Add button will add to the
list whatever is in the Read or Write text field. The Modify button will replace whatever is in the selected row with whatever
has been typed in the Read or Write text field.
The SNMP agent port, timeout, and retry count can be configured as well. The defaults are 161, 2, and 0 respectively.
Whereas 161 is the most commonly used SNMP agent port, others can be added as a space-separated list. Each port will be
tried in the given order.
7.2.2.2 SNMPv3
There is the option to enable SNMPv3 Discovery, which adds security and administration features. (For information on the
relationships between the SNMP versions refer to RFC 3416.)
The SNMP panel allows the addition of Users following the User-based security model defined in RFC 3414. As RFC 3416
states, only those principals (users) having legitimate rights can access or modify the values of any MIB objects supported by
that entity.
The SNMP panel includes the Enable SNMPv3 Discovery option, as shown in Figure 7-4. User Names are added by typing in
the User Name field, the Context Field, and then selecting Add. Names can continue to be added and the order changed
using the direction arrows. A name can be modified by selecting a name, changing the name in the User name field, and
selecting Modify. Selecting Save Changes writes the values to the NMS.
2. Click Delete.
To change the order of the credentials:
1. In the ACS or CPE list, select the row of the credential you want to move.
2. Click the up ( ) or down ( )arrow below the list to change the location of the credential in the list.
The Description field is a free format reminder of what each login entry represents.
There are 2 login types: User and Security Officer, which are specified by the radio buttons. The “user” type uses the User Id
and Password to initially log into the device. User login is all that’s required for iMAPs running without TACPLUS.
If an iMAP is running with TACPLUS enabled, the NMS also needs a Security Officer passcode (to enable securityofficer).
Security Officer passcodes can be designated by clicking on the Security Officer radio button. For Security Officer, the User
Id field is not applicable and will be disabled and set to “tacacs+”. (You can still define a user login with the user id tacacs+, if
necessary, by clicking on the User radio button instead of the Security Officer radio button) Security Officer passcodes will
be attempted as ordered in the list and as overridden by Hints. Since multiple Security Officer passcodes are permissible, be
sure to use the description field to keep track of which is which (since they will typically be indistinguishable without
displaying the passcode).
Buttons specific to the CLI Login Manager are:
• Add - Adds a new entry to the CLI User list—after the current position of the selected login. (Duplicates are allowed)
• Modify - Overwrites the currently selected login with what’s in the main dialog.
• Delete - Deletes the currently selected login from the CLI User list.
Note: Discovery uses the CLI logins in the order specified in the CLI Login Manager. There is a performance hit associated with each
failed login attempt. Use the up/down keys to order the list such that the most likely pair is listed first. (Use the Hints field to
help identify device)
Caution: One feature for AT and iMAP devices is the ability to change their default prompts to a custom string. (For AT devices the
default prompt is “>”, and for iMAP devices this feature begins with the default prompt “>>”.) Therefore, this default
prompt should not be changed.
There is also the option to select the protocol. The default is telnet, but here is also the option to choose SSH. These are
also added to the User ID list.
Most Allied Telesis devices support SSHv2. Using SSH involves configuring and enabling the SSH server. This involves:
• Server authentication, confidentiality, and integrity
• User authentication through the use of a password and/or public key
• Connection encryption for interactive login sessions
Refer to customer documents for Allied Telesis products for support of specific SSH features.
The “Entire Network” radio button, when selected means to use all addresses in the network, specified by the IP Address
and Net Mask fields. When “Set of Nodes” is selected instead, only the addresses from the Start IP to the End IP will be
discovered.
If SNMP discovery is enabled, network discovery will normally use the parameters configured on the SNMP tab, but they can
be overridden for specific networks and subnets by selecting the SNMP option on this tab.The properties to fill in depend on
the SNMP version selected.
A version of SNMP can be chosen to override what is configured for the network. After choosing the SNMP version,
selecting the Properties button allows the parameters to be filled in. Refer to the following figure.
FIGURE 7-11 Discovery Configurator – Other Discovery Tab - Translate Display Option
• Ping Timeout - Number of seconds the Configurator waits before assuming there will be no response.
• Rediscovery Schedule - Choose an hour and one or more days of the week. Nightly rediscovery is recommended
(default), but any number (including none) can be selected. No more than once every 24 hours is allowed.
respond will be added to the NMS database and will be monitored for status polling by periodically polling selected system
variables (such as sysDescr).
The NMS performs “SNMP Ping” operations with each of the given read communities until a device responds or all
communities have been tried and failed. (SNMP Pings are essentially SNMP get requests for selected system variables.
Devices that respond are considered “connected” and those that don't are considered “unreachable”)
7.3.2.1 SNMPv2
For most devices, only read communities are used during discovery. Some devices, including iMG/RGs, require discovering
write communities as well.
Communities will be attempted in the order displayed. The order may be modified by selecting a row and then clicking on
the up/down buttons.
Communities may be added, modified, or deleted with the Add, Modify or Delete Buttons. The Add button will add to the
list whatever is in the Read or Write text field. The Modify button will replace whatever is in the selected row with whatever
has been typed in the Read or Write text field.
The SNMP agent port, timeout, and retry count can be configured as well. The defaults are 161, 10, and 0 respectively.
Whereas 161 is the most commonly used SNMP agent port, others can be added as a space-separated list. Each port will be
tried in the given order.
7.3.2.2 SNMPv3
There is the option enable SNMPv3 Discovery, which adds security and administration features. (For information on the
relationships between the SNMP versions refer to RFC 3416.)
The SNMP panel allows the addition of Users following the User-based security model defined in RFC 3414. As RFC 3416,
states, it is up to the only those principals (users) having legitimate rights can access or modify the values of any MIB objects
supported by that entity.
The SNMP panel includes the Enable SNMPv3 Discovery option, as shown in Figure 7-14. User Names are added by typing in
the User Name field, the Context Field, and then selecting Add. Names can continue to be added and the order changed
using the direction arrows. A name can be modified by selecting a name, changing the name in the User name field, and
selecting Modify. Selecting Save Changes writes the values to the NMS
rejected. The login sequence generally follows the order of the logins in the table. The order may be modified by selecting a
row and then clicking on the up or down ( ) buttons.
The login sequence can be overridden by the Hints field. Hints are a comma-separated list of device category, sysLocation, IP
address, and subnets (in x.x.x.x/bits notation). Login parameters for a device that matches any of the hints will be attempted
before any other login parameters. If there are more than 1 login entry with matching hints, they will be attempted in the
sequence from the list.
If all login attempts with matching hints fail, all of the entries without hints will be attempted until one is accepted or all are
rejected. And if all of those fail, all of the rest (without matching hints) will be attempted.
The Description field is a free format reminder of what each login entry represents.
There are 2 login types: User and Security Officer, which are specified by the radio button. The “user” type uses the User Id
and Password to initially log into the device. User login is all that's required for iMAPs running without TACPLUS.
If a device is running with TACPLUS enabled, the NMS also needs a Security Officer passcode (to enable securityofficer).
Security Officer passcodes can be designated by clicking on the Security Officer radio button. For Security Officer, the User
Id field is not applicable and will be disabled and set to “tacacs+”. (You can still define a user login with the user id tacacs+, if
necessary, by clicking on the User radio button instead of the Security Officer radio button) Security Officer passcodes will
be attempted as ordered in the list and as overridden by Hints. Since multiple Security Officer passcodes are permissible, be
sure to use the description field to keep track of which is which (since they will typically be indistinguishable without
displaying the passcode).
There is also the option to select the protocol. The default is telnet, but here is also the option to choose SSH. These are
also added to the User ID list.
Most Allied Telesis devices support SSHv2. Using SSH involves configuring and enabling the SSH server. This involves:
• Server authentication, confidentiality, and integrity
• User authentication through the use of a password and/or public key
• Connection encryption for interactive login sessions
Refer to customer documents for Allied Telesis products for support of specific SSH features.
When “Set of Nodes” is selected, the DHCP option becomes available. Use this option if IP addresses are assigned
dynamically. The NMS will then use MAC addresses to identify hosts rather than IP addresses or host names.
If SNMP discovery is enabled, network discovery will normally use the parameters configured on the SNMP tab, but they can
be overridden for specific networks and subnets by selecting the SNMP option on this tab.The properties to fill in depend on
the SNMP version selected.
A version of SNMP can be chosen to override what is configured for the network. After choosing the SNMP version,
selecting the Properties button allows the parameters to be filled in.
Caution: It is not possible to delete a network from discovery once discovery begins on that network. Discovery begins any time
immediately after saving changes. Therefore, to permanently remove a network from the discovery configuration, shut down
the NMS to shut down the discovery process and use the standalone Discovery Configurator to delete the unwanted
network. Networks are successfully deleted, however, when deleted before saving changes.
This tab specifies specific nodes to discover (or exclude from discovery).
Nodes can be added, modified, or deleted with the Add, Modify, and Delete buttons.
The “Discover Node” toggle, when checked, means to discover the node. When unchecked, that node will be ignored
(excluded) from discovery.
The “Discover Parent Network” tab means to discover all the devices in the parent network as well. The parent network
will be considered to be all IP addresses in the same subnet as the node defined by its IP Address and its Net Mask. When
unchecked, only the one node will be discovered.
If SNMP discovery is enabled, node discovery will normally use the parameters configured on the SNMP tab, but they can be
overridden for specific nodes by selecting the SNMP option on this tab and supplying the version, community, and port
values.
The SNMP version used can be selected here as well, with the properties determined by the version.
Note: If nodes are failing initial discovery, you can (for SNMP) change the “Retries” parameter (default 0) and the “Timeout”
parameter from the SNMP v1/v2c Tab, and then use the Network Inventory / Edit -> Add Node to retry initial discovery.
If you are using ICMP, you can change the “Retries” parameter (default 0) and the Timeout parameter from the Basic Tab.
Clicking Submit brings up the Task Details window so that the task can be modified (if needed) and then added to other NMS
tasks. (Clicking Close on the Task Details window will add the task to the tasklist. This user can then view the task by
selecting Tools -> View Tasks and perform further actions. The tasklist is described in "Managing Tasks" on page 339.
Note: Changes made to AT_NmsBackupFiles.conf are enabled as soon as the file is changed, so a server restart is not
needed.
System
Device
Stack member
Board
Bay
Board Name
Rev
Serial number
Software version
License MAC
System Card
Device Device
Description Slot
Shelf Serial Number Type
Shelf CLEI Code State
Shelf MAC Model Number (Revision)
Hostname Serial Number
Location CLEI Code
Name Engineering Change Order
Engineering Change Order Deviation(s)
Deviation(s) Base MAC Address
(available for cards running
AlliedWareNSP release 6.18.x.x and
above)
Running Load
Preferred Load
Temporary Load
System
IP
Customer
Location
Type
Rev
Serial Number
Software Version
Recovery Version
You must have an application that reads comma-separated values (CSV) files installed on the NMS client machine to view the
spreadsheet correctly. Once the data is in the spreadsheet you can save it to a file for future use.
While the report is generating a progress box appears. Clicking Cancel interrupts report generation and the report opens
with what has been generated so far.
Figure 7-28 is an example of a Layer 2/3 Switch Report.
Figure 7-29 is a partial example of an iMAP Card Report. The example does not include all of the columns that appear in the
report.
Figure 7-30 is an example of an iMG Unit Report.
3. In the Select Criteria field, enter the match criteria for the iMAP 9810 CFCs in your network. For example, if they are all
in the same subnet, enter the subnet. If they follow a similar name pattern, enter the common part of the name.
4. In the Simultaneous #Devices field, enter the maximum number of devices to query concurrently.
5. Click OK.
6. When the report opens, delete all columns except Base MAC Address.
7. Delete any rows in the report that are not iMAP 9810 CFCs.
8. Save the report as a .csv file as required by Allied Telesis for license key generation.
cd <NMA_HOME>/bin
AT_LicenseInstaller.bat -help
Printing help: -help
a.The CFC loads are for the cfc24univ load type. Refer to the Allied Telesis Component
Specification for more details.
Before either type can be loaded onto devices, they must exist in the <NMS-Home>swdownload directory. Moreover, the
firmware and associated xml files must both be included. The process to achieve this for standard and custom loads is as
follows:
• Standard Loads
• The Load Import tool (explained in "Load Import GUI (Standard Loads)" on page 149), allows the user to place both
the firmware and xml files into the swdownload directory in a easy to use GUI format.
• The user can manually download the files and unzip them before placing them into the swdownload directory. This
method would be used when the NMS is on a Linux platform.
Note: For the manual download, ensure that the files are unzipped only once.
• Custom Loads - The user must download the files manually, and then use the Create Custom Load option that is part of
the Software Configuration application (refer to "Custom Load Software Configuration" on page 303).
Refer to the following figure that shows the steps that are followed.
Load Import (GUI)
(firmware+xml)
/ (bundled)
(firmware) (firmware+xml)
The FTP Server tab also contains Host, Username, and Password fields to designate the FTP server and login credentials. The
Connect and Disconnect buttons allow logging in and logging out of the FTP server. An initial directory can be entered into
the Path field before connecting. Then once logged in the tool will immediately change to that directory. Further directory
changes can be made the same way as in the CD / File System tab. Since FTP is remote, there may be delays updating the file
listings with each directory change.
Security administration refers to permitting or restricting access to views and operations within the NMS. You can set
permissions for individual users or assign users to groups and set permissions for each group. All users assigned to a group
inherit the group permission settings.
- Audit Trails Audit Trails for User Tab "Setting the User Profile"
on page 159
- Change Password
"Viewing Audit Trails" on
- Assign Operations Permitted Operations for User Tab page 161
- Delete "Changing the User
Password" on page 162
"Assigning Operations to
User" on page 162
"Delete User" on page 163
Add Group Groups Wizard "Adding a New Group" on
page 163
Configure Group
- Set Scope Scope Settings "Group and Scope
- Associate Users Select Users Wizard Settings" on page 165
- Set Authorized Scope for CVS Select Authorized Scopes "Adding an Authorized
Scope for a Custom View
- Set Scope Properties Scope Setting Wizard Scope" on page 167
- Delete Authorized Scope "Setting an Authorized
Scope for a Custom View
Scope" on page 167
"Setting Scope Properties"
on page 168
"Deleting Authorized
Scope" on page 169
Operations Tree
- Overview, Add / Delete Operation Tree Configuration "Assigning Permissions" on
- Default Operation Categories page 169
"Permissions Tree
Hierarchy" on page 170
Enter the username and password for the user in the corresponding text boxes. If no password is supplied, the username is
also used as the password.
Click Next to move to the next screen, which is shown in the following figure.
Icon Description
User Account is enabled
User is disabled and he cannot login any more until he or she is enabled by the administrator
User Password has been expired since the specified time and he or she has to change his password or reuse
it
User account has been forced out from logging in to the server similar to the disable status of a user
User's login has been denied due to continuous unsuccessful login attempts
Click Setting Profile, which will invoke the User Profile Wizard where you can set the user account expiry in days by clicking
the corresponding check box. After the account expiry period, the status of the user is disabled and the user will not be
allowed to log in on the network. Similarly, the user password expiry can be set in number of days, after which the user is
prompted to enter a new password. Finally, you can change the session inactivity timer. You can also set the user status as
either enable or disable by clicking the respective option. Refer to the following figure.
Each of these actions invokes the Groups wizard, shown in the following figure, where you can enter the new group name in
the text box.
operations of the groups, which are already present, and the right-side column displays the previously set Authorized Scopes
or the selected Custom View Scope name. Thus, you can select the respective scope to be set for the custom view in the left
and click > (Add). To remove the already existing authorized scope set for the Custom View, select the respective scope in
the right side column, and click < (Remove) button. Click OK to save the changes permanently in the server.
Scope changes take effect the next time a user logs in. Users in multiple groups will see the scope with the most restricted
settings of all the groups to which they are assigned.
Operator Description
* (Asterisk) This is used to match zero or more characters.
Example: If the names of all the objects starting with the name “test” is needed, then the property
Name - name and the Value test* is given.
! This is used for filtering the search using NOT operator.
(Exclamation Example: If all the objects whose name does not start with “test” is required, then property key -
Mark) name and value - !test* is given.
, (Comma) This is used for searching objects where a single property key has different values.
Example: If all the objects with names starting with “abc” or “xyz” are required, then property key -
name and value “abc*,xyz*”is given
&& This is also used for searching objects where a single value should be matched with many patterns.
Example: If all the objects with names starting with either “abc” and ending with “xyz” are required,
then property key -name and value “abc*&&*xyz” is given.
\ (Back Slash) This is used when the name of the object itself contains a comma. This character is called an escape
sequence, since it avoids searching of the objects, as if it were two different names.
Example: If an object with name “a, b” has to be searched, then the property key - name and the value
- “a\, b” is given. <between>”value1” and “value2” This is used to get objects with some numeric
values within a specific range.
<between>”v This is used to get objects with some numeric values within a specific range.
alue1” and Example: If object names with poll interval values ranging from 300 to 305 are required, then the
“value2” property key - pollinterval and the value as 300 and 305 is given.
Note that the first number is smaller than the second number. Only the values between the given
values, including the limits, will be matched.
To determine what custom view scope properties are available, see "Object Properties to Define Objects and Custom
Views" on page 1051.
Scope criteria values are limited to 50 characters. If your criteria exceed 50 characters, you must set up separate custom
view scopes. For example, instead of creating a single view scope to display multiple cards on an iMAP device, you can create
a view scope for each card. See "Extending the Two Service Provider Example" on page 202 for additional examples.
Operation Description
Services
Clear Discovery This operation is used when the Discovery process has stopped.
NMS Backup This Operation starts the backup process by setting BackUpInProcess variable to true and
suspends all NMS Schedulers. Once the backup process is over, automatically resets the
BackUpInProcess variable to false, to resume NMS Schedulers.
Resume NMS This Operation can be used to resume all the NMS Schedulers, if NMS hangs due to some
unforeseen problems during the backup process.
Shutdown server This Operation is used for shutting down the NMS Server with authentication.
Configure Log Events This Operation provides the link to view the present logging levels for the various modules.
The logging also can be set by using this Operation.
Security Administration Security Management involves work starting from authenticating a user when logging till
dictating all permissions for him and thus defining the access limits for every user.
System Administration This Operation is for getting the handle for all the Administrative Operations.
8.6.1.2 Events
Network Events are entities that represent the various happenings in the network devices. Events can either convey any
general information or the current status of the devices in a network. The groups of operations which are grouped under
Events are listed in the table given below.
Operation Description
Event Filters and Parsers
Get Event Parsers This Operation is for viewing the Event Parsers present in the server.
Set Event Parsers This Operation is for modifying the existing Event Parser or creating a new Event Parser.
Get Event Filters This Operation is for viewing the Event Filters present in the server.
Set Event Filters This Operation is for modifying the existing Event Filter or creating a new Event Filter.
Event User Operations
Save Events to File This Operation is for saving the events displayed either in Events Panel or the selected
events.
Print Event View This Operation is for printing either the selected events or events displayed in the Events
Panel.
8.6.1.3 Topology
Topology is used to add, update, delete and filter out the core Managed Objects from the database. The various operations
grouped under the topology module are listed in the table given below. All are under Modify Object.
Operation Description
Start and Stop Discovery This Operation is used to set the discovery status for the particular Object.
Manage and Unmanage This Operation is used to set the management status of the particular Object.
Objects
Add Network This Operation is used to add a new network in the Topology database.
Add Node This Operation is for adding a new node in the Topology database.
Delete Object This Operation is for removing a particular Object from the Topology database.
Refresh Node This Operation is for updating the status polling.
TABLE 8-7
Operation Description
User Configuration This Operation is used to get the link for 'User Administration'.
Add Users This Operation is used to create a new user.
Assign User to Group This Operation is used to assign the user to new or existing group.
Remove User This Operation is used to remove the user from the group.
Remove User from This Operation is used to remove the particular user from the particular group only.
Group
Get List of Users This Operation is used to view the list of users present in the database.
Operation Description
Get Trap Filters This Operation is for viewing the Trap Filters present in the server.
Set Trap Filters This Operation is for modifying the existing Trap Filter or creating a new.
Trap Filter.
Reload Trap Filters This Operation is used to update the changes of the filter, without restarting the Server.
Get Trap Parsers This Operation is for viewing the Trap Parsers present in the server.
Set Trap Parsers This Operation is for modifying the existing Trap Parser or creating a new Trap Parser.
8.6.1.6 Alerts
Alerts are generated when a failure or fault is detected in the network devices. The generated Alerts get displayed in the
Alert Viewer. The Alert list containing alarms of various severities like critical, major, minor, clear etc. can be viewed in the
Alert Viewer. The various operations available by default under User Administration are listed below.
Operation Description
Alert Filters
Get Alert Filters Operation is for viewing the Alert Filters present in the Server.
Set Alert Filters This Operation is for modifying the existing Alert Filter or creating a new Alert Filter.
Set Alert Annotation This Operation is for adding notes (annotation) to an alert.
Alert User Operations
Get Alert Details This Operation is for viewing the details of a particular alert.
Save Alerts to File This Operation is for saving either the selected alerts or the alerts displayed in the current
Alert Panel into a file.
Print Alert View This Operation is for printing either the selected alerts or the alerts displayed in the current
Alert Panel.
Clear Alerts This Operation is for changing the Alert Severity as Clear.
Get Alert Annotation This Operation is for viewing the particular existing alert annotation.
Get Alert History This Operation is for viewing the Alert History, i.e., the change in status of an Alert from the
first Alert to the latest Alert.
Alert Pickup This Operation is used to pick up the Alert. (To attach one’s ID to an alert so others know
the alert is being worked.)
Delete Alerts This operation is used to remove a particular alarm (usually because it has been solved).
8.6.1.7 Maps
A map is a graphical representation of networks and systems. Elements such as computer devices, printers, switches etc.
connected in a network can be represented in a map. The operations available under Maps are listed below.
Operation Description
Map Editing Operations This Operation is mainly used to configure the maps, like creation of new maps, customizing
of map hierarchy, map symbol layout and map symbol renderers through the client.
Operation Description
Add Polling Units This operation permits you to add new PolledData to devices, to collect data for particular
Data identifiers.
Remove Polling Units This operation permits you to modify the definition of PolledData to change Data collection
configuration.
Operation Description
Modify Polling Units This operation permits you to remove the PolledData objects from database so that no
more data is collected for the associated Data identifier.
Get Polling Unit Get Polling Unit This operation permits you to retrieve PolledData details from database. If
this operation is excluded in Operations Tree, you will not be able to see the PolledData
information in StatsAdminPanel of Client UI.
Operation Description
Add Polling Object This Operation is used to create a new Polling Object and add to database for monitoring a
new device or the existing device.
Delete Polling Object This Operation is used to remove the existing Polling Objects.
Modify Polling Object This Operation is used to modify the criteria of the existing Polling Object for making
performance analysis better.
Change Polling Object The Polling Object can be enabled or disabled by using the optional parameters called
Status “status”. The parameter can be changed as “True” or “False”. The Operation 'Change
Polling Object Status' is used to change the status of the polling Object.
Get Polling Object This Operation is used to view the criteria of the particular Polling Object.
Operation Description
Get Poll Filters This operation permits retrieval of Poll Filters from the database and display them. If
excluded will not allow you to view the Poll Filters list.
Update Poll Filters This operation permits to modify Poll Filter related details.
Reload Poll Filters This operation permits reloading to memory the modified Poll filter definitions specified in
Poll filters file.
generated when a particular condition is satisfied. The various default operations possible with Threshold Objects are
provided in the following table.
Operation Description
Add Threshold Object This Operation is used to create a new Threshold Object to create Threshold Events for a
new device or the existing device.
Modify Threshold This Operation is used to modify the existing Threshold Object for making performance
Object analysis better.
Delete Threshold This Operation is used to remove the existing Threshold Object.
Object
Get Threshold Object This Operation is used to view the particular Threshold Object.
Operation Description
Performance Operation
Monitor Collections Permits the Monitored Collections dialog for routers
Operations
Statistics Operation Permits the Performance/Configured Collections display
Configuration Operation
Configure SNMP Permits Configured SNMP MDTI operation
Operation
Device Backup/Restore Permits backup and restore operations
Operation
Software Configuration Permits software configuration operations
Operation
Device Information Permits the display of device information
Operation
SNMP Agent Operation Permits SNMP Agent operations
SNMP Community Permits SNMP Community operations
Operation
Configure VLAN Permits VLAN configuration operations (Includes EPSR)
Operation
Card Management Permits card management operations
Operation
Port View Operation Port Management Operation (complete control)
Port Provision Operation (view and provision/deprovision)
SysLog Management Permits access to syslog application
Operation
Command Script Mgmt Permits command script management operations
Operation
Operation Description
Configuration File Mgmt Permits file management operations
Operation
Profile and QoS Profile and QoS Policy Operations
Operation
Note: See "Permissions Tree Hierarchy" on page 170 for information on the operations available in the Permissions Tree Hierarchy.
5. To allow Provider #2 users to provision customers on the allowed interfaces, set the permissions as follows:
Allow all of the operations in the following categories:
• Alerts
• Events
Disallow all of the operations in the following categories:
• Administrative Operation
• Maps
• Poll Filters
• Polling Object
• Polling Units
• Threshold Object
• Trap and Parsers
• User Administration
In the Topology category, allow and disallow the following:
• Modify Object - Disallow
• Add Network - Disallow
• Add Note - Allow
• Delete Object - Allow
• Refresh Node - Allow
In the AT Object Operation category, allow and disallow the operations according to Table 8-16. In some cases, some
operations within a subcategory are allowed while others are disallowed.
The Value field contains the match criteria. In this example, Provider #2 users have access to all interfaces on device
10.52.30.39, card 10. Since this is an iMAP device and is discovered by its IP address, the match syntax for all interfaces on
card 10 is 10.52.30.39_10.*.
Note: The NMS normally assigns the upstream device port to the iMG’s sysLocation field. You can use sysLocation instead of
upstreamDevicePort as the property name for the iMG-Scope in the example, however, the sysLocation field is blank for iMGs
provisioned from TFTP boot configurations or MAC addresses. In these cases, alternative match criteria are required.
Note: See "Setting Scope Properties" on page 168 for information on specifying match criteria for custom view scopes.
8. Click Add to add the match criteria for the view scope, then click Ok to save the view scope.
The custom view scopes affect the following screens for the Users group:
The Value field contains the match criteria. In this example, Provider #1 users should not have access to all interfaces on
device 10.52.30.39, card 10. Since this is an iMAP device and is discovered by its IP address, the match syntax to exclude
all interfaces on card 10 is !10.52.30.39_10.*.
8. Click Add to add the match criteria for the view scope, then click Ok to save the view scope.
The custom view scopes affect the following screens for the Users group:
Since the match criteria value has a limit of 50 characters, you may need to break up a single view scope into multiple view
scopes, such as one view scope per card. To extend the example to include interfaces on cards 8 and 9 with multiple view
scopes, you would create the custom view scopes in Table 8-21 instead of those listed in Table 8-17:
If Provider #2 users require card management in addition to interface management, the Network Database view scopes need
to include match criteria for cards in addition to interfaces. In the example, the match criteria syntax for card 10 and its
interfaces is:
10.52.30.39_10,10.52.30.39_10.*
The wildcard character (*) means “match all characters following.” The syntax 10.52.30.39_10* (without the period after
“10”) would include card 10 and all of its interfaces. The syntax 10.42.30.39_1*, however, would include all of the interfaces
on card 1, as well as cards 11-19 and all of their interfaces.
If you are sharing cards across multiple chassis, reorganizing the cards can simplify the operation. See "Customer Cutover"
on page 352 for information on moving iMGs from one card to another while minimizing downtime.
The custom view scope in Table 8-22 selects all of the devices that are discovered on the subnet, not just provisioned iMGs.
of messages, the device grants or denies access for the session. RADIUS uses UDP/IP for transmitting information across the
network, while Tacacs+ uses TCP/IP.
Note: For complete information on the RADIUS / Tacacs+ protocol and how they are handled by Allied Telesis devices, refer to the
iMAP Software Reference Manual and AlliedWare Plus Reference Manuals.
When the AlliedView NMS is initially configured and logs in to a device that is configured with RADIUS/Tacacs+, only a user-
level privilege can be assigned. To allow for security officer level, the client must send a special “ENABLE SECURITY
OFFICER” command string (“ENABLE” for AlliedWare Plus devices) back to the server. The server prompts for a
“Passcode” (“Password for AlliedWare Plus devices). The client then transmits the appropriate passcode (password) after
which the session has a Security Officer level (level 15).
Note: Only iMAP (15.1 and up) and AlliedWare Plus (5.4.2 and up) devices support Tacacs+.
Note: Devices other than iMAPs supporting RADIUS provide a direct “SECURITY” access after first authentication, if discovered as
the “SECURITY” level user.
8.8.1 RADIUS
For devices that use the RADIUS, authentication is done on a per device basis that is datafilled for the device’s MO
properties. Refer to the following figure.
FIGURE 8-28 Filling out the MO Property Form for Remote Authentication
8.8.2 Tacacs+
For Tacacs+, the user can provision on a per-device basis as well, but the administrator can also provision this on a system-
wide basis, using the special User ID TACPLUS_USER, and then filling in the appropriate password.
When the user selects Tools -> Manage CLI Users, the Discovery Configurator with the CLI Logins tab appears.
Servers can be added via the fields on the lower part of the display. Notice the “Add” button becomes enabled when all the
necessary parameters have been entered:
Multiple servers can be added. Servers can be designated by IP addresses or valid host names. During login, the
authentication process will try each server in the order displayed, from top to bottom, until one server accepts the
authentication request or all servers have rejected it. The order can be changed with the arrow buttons. Note that:
• The Add button will not allow adding a server that already exists in the table.
• The Modify button will allow any change to any field as long as it won't change the server to one that already exists in the
table.
Note: This tool cannot tell when host names map to existing IP addresses or not. Therefore the Add button will allow adding
duplicate servers when they have different host names.
Note: There is no limit to the number of servers allowed, but more than 2 or 3 unreachable servers will cause long delays to users
trying to log in because each server is tried one at a time and must timeout before the next server is tried. Therefore, servers
with a history of unavailability should not be used for RADIUS authentication.
Whereas only one server may be added at a time and only one may be modified at a time, multiple servers may be deleted by
selecting multiple rows and clicking on the Delete button.
All changes won't take effect until the server is restarted. So after changing the State to ‘On” and selecting OK or Apply, the
modifications are completed and the tool displays the following message:
$ ./AT_ConfigureRadius.sh enable
Note: Admin and Users are the default groups on the NMS available for assignment, though custom groups may be added using the
Security Manager on the NMS client. When adding custom groups to a network of NMS servers, the same custom groups
must be added to each server individually to be usable by the same set of RADIUS-authenticated users. Refer to "Feature
Interactions (RADIUS Server De-activated or Unavailable)" on page 203.
Note: Users can optionally be assigned to multiple groups. If so, in some RADIUS servers group names must be separated by
commas, contain no white space, and the list must be enclosed by quotation marks. Refer to the server documentation. (The
FreeRadius example shows this.)
4. Configure the NMS to use this RADIUS server, either by itself or within a list of RADIUS servers. Using the
AT_ConfigureRadius tool, assuming the server location is 10.52.18.79, the auth and acct ports are 1812 and 1814
respectively (FreeRADIUS defaults), add the selected line to the NMS configuration, as shown in the following figure.
[ATI-avnms-group]
Type=STRING
Profile=OUT
2. Use CSUtil.exe -listUDV to list available slot numbers and identify one that is unassigned. If none are unassigned, this
RADIUS instance has reached its maximum and cannot be used. Either free one or get another server.
2. Add the NMS server as the RADIUS client.
1. Use CSUtil.exe -addUDV <slot> c:\ACS_Data\allied-telesis.ini to import the VSA file.
2. Use the Web interface to configure the AAA client (the NMS) and Users with the VSA:
3. Use “Interface Configuration” to enable RADIUS (Allied-Telesis) for Users.
4. Use “Network Configuration” to set authentication for the AAA client using RADIUS (Allied-Telesis)
3. Add users and permission groups.
1. Use “User Configuration” to create the users, assign their passwords, and, at the bottom, enable and assign the VSA
(ATI-avnms-group) to the user's permission group(s). Separate multiple group names with commas but do not
enclose the string with quotation marks.
2. Select any other relevant options and data fill as necessary.
3. Be sure all changes are submitted and applied where necessary.
4. Configure the NMS to use this RADIUS server, either by itself or within a list of RADIUS servers. Using the
AT_ConfigureRadius tool, assuming the server location is 10.52.18.110, the auth and acct ports are 1645 and 1646
respectively (Cisco defaults), add the selected line to the NMS configuration, as shown in the following figure.
A profile is a set of configuration parameters that is given a unique name. You apply profiles to devices, cards, ports and
iMGs in the network.
Profile management includes:
• Configuration - Creating, modifying and deleting profiles.
• Deployment - Applying profiles to network elements.
• Monitoring - Monitoring the network to ensure profiles are applied correctly.
• When a profile is part of provisioning, only devices that match the profile scoping value are available.
• When you provision a device to include profiles, only those profiles that match profile scoping will be available.
• When you deploy a profile with profile scoping, only devices within the profile scope will be available.
FIGURE 9-1 Create Profile for Ethernet Port - Product Type Tab
The GE40CSFP and GE40RJ cards support a separate rate limit for each traffic type. The GE24SFP, XE4, XE6SFP, GE24POE
and GE24RJ cards support one rate limit for all traffic types. This is represented by the Aggregate Rate field in the profile
box. The aggregate rate represents the total allowed rate for all traffic types that have storm control enabled.
Caution: Most Ethernet services rely heavily on the flooding of broadcast and unknown unicast packets. Filtering egress traffic may
cause service outages.
To enable storm control in a profile:
1. In the Network Objects panel, select Network Service Data > Profiles to open the Profiles screen.
2. Do one of the following:
• To create a new profile, in the menu bar, go to Network Services > Profile > Port Profiles > Create Etherlike Port.
• To modify an existing profile, select the profile, right-click and select View Profile.
3. Select the Product Type tab.
4. Select the iMAP tab if it is not already selected.
5. Under Storm Control, enter values for the following fields:
2. The NMS prompts the user whether the changes should be deployed to the objects (devices or port) in the network
currently using that Profile.
3. If yes, the profile will be redeployed.
Note: When a profile is out of sync with what has been defined on the device, a “*” is next to the profile name in the Profile column
of the Port or Device table.
When a port is activated from the Ports Inventory table, a message such as the following will be displayed if the profile name
and external profile name do not match exactly:
Configuring QoS capabilities on the various iMAP device types is fairly detailed and complex. Since the same QoS
configuration is often applied across multiple devices, it is convenient for the network manager to define QoS Policies
(configuration information) in the NMS and then separately deploy the policies to a specific set of devices and their ports.
QoS configuration interacts with the profile management, particularly with respect to activation of QoS Policies. The Profile
Management Feature manages Port Profiles which include references to the QoS Policies that are to be associated with a
device port.
Note: There are also Device Policies that allow for the setting of switch-wide QoS parameters to a set of devices.
The following table lists the major areas for configuring traffic management and should help the user find the appropriate
information or task.
• SwitchBlade
• iMAP
• AT8900
• ATRouter
• iMAP_EPON
• AlliedWare Plus
Device classes may or may not share certain QoS capabilities.
• QoS Policy Action - A QoS policy action is specifically for a Rapier or Switchblade device. It involves actions that apply to
all flows on the port.
• QoS Policy Flow - A QoS flow refers to a substream of packets on a port that satisfies a set of classification conditions.
For example, a stream of packets classified by the condition that their destination TCP port is 80 (i.e., TCPDPORT=80) is
considered a QoS flow.
• QoS Priority Action - A QoS priority action prioritizes a QoS policy flow according to the 802.1 VLAN priority fields or
the IP DSCP/TOS fields.
• QoS Traffic Action - A QoS traffic action refers to policing or conditioning of a flow, such as limiting the maximum
bandwidth or guaranteeing a minimum bandwidth.
• QoS Policy Rule - A QoS policy rule is the association of a flow, priority action, and traffic action. To apply traffic
conditioning to aggregate flows where the individual flows have different priorities, multiple flow-priority pairs can be
entered with a single traffic action.
Note: The NMS will only allow traffic conditioning on multiple flows if all of the target device classes specified support this capability.
• QoS Policy - A QoS policy is the result of combining the QoS policy rules into a set so that, taken as a whole, it can be
applied to a port or set of ports.
To create a QoS policy, you create the attributes of the policy and then associate them together to create the policy. For a
detailed discussion of traffic attributes and classifier management, see the Software Reference for iMAP Series Switches and
Software Reference for SwitchBlade x3100 Series user guides.
Option Purpose
Target The device classes to be included in this flow.
Device
Classes
Set Targets Brings up the Edit QOS Device Class List, allowing the user to select any combination of device
classes to include.Press and Hold the SHift key to select more than one device class.
Targets can also be added/removed by clicking the “Target” checkbox.
Device Class Table of the Device Classes, Targets, and a description of the device class. Supported indicates
table there are no detected errors.
Flow Name A pull-down of all existing flows.If selected, the parameters of the selected flow appear in the form.
Device Class A pull-down of the device classes that are included in this policy. This reflects the tic boxes chosen
in the Device Class table.
New Flow Brings up the Select New Name window. The user can choose to copy the parameters from the
flow currently displayed.
Copy Saves the parameters from the current Device Class target so they can be 'pasted' to another
target device class by the “translation” feature.
Paste Translates and applies the parameters that were “copied”. If there is no translation for a parameter
it will appear with square brackets around it, and be colored red. If there is similar parameter but
the value cannot be translated the value will be enclosed in square brackets and the entry will again
be colored red.
Flow A table of the current classifiers. Delete removes the selected classifier. The Up and Down buttons
Classifiers change the order of classifiers (and so the logical OR), but not the selection.
Classifier # The number of the classifier in the list. The order determines the precedence of the rules
Clear All Delete all classifiers in the Flow Classifier table and return to the default classifier and value
Classifiers (ETHFORMAT=ANY).
New Adds a classifier to the Flow Classifier table with the default classifier and value
Classifier (ETHFORMAT=ANY). This classifier appears in the Classifier Parameter list and can be modified or
replaced
Classifier A list of the parameters for the selected classifier. If more than one parameter is listed, the Up,
Parameters Down, and Delete buttons are active. The Up and Down buttons change the order of classifiers
(and so the logical AND), but the order does not affect the function
Parameter A pull-down of the available parameters. As each one is selected, the associated value field appears.
pull-down Values may be selected from a list of values, where each element of the list can be a Name, an IP or
and value MAC address, an integer range, a fixed point decimal range, or hexadecimal value. One parameter
field TCPFLAGS is a list of named values selected with a drop-down menu.
For example, selecting VID will bring up a value field with 500, a default value. The user can then
overwrite this value of 500.
Click Here to If the parameter is not in the Flow Classifier table, it is added to the parameter list for that classifier
Add or (and creating another AND condition). If the parameter has already been chosen, it replaces what is
Replace already there with the new value.
Parameter The available Parameters and Values change as parameters are added, reflecting the
interdependencies between the parameters. For example if TCPDPORT is selected, PROTOCOL
is added with a value of IP and it range is restricted to only IP
Delete Flow Deletes the flow entry for all Target Device Classes. To remove the flow for a single Device Class
uncheck its “target” checkbox. When the flow is saved the entry for that Device Class will be
removed from the database.
Option Purpose
Save Flow If a new flow has been defined, an existing been has been changed, or targets have been removed,
makes the changes permanent.
If the parameters for some device classes are incomplete, a message box will appear with options to
Fix, Skip, or Cancel. The Fix button will take you to the in error device class entry.
Note: If the flow (or action) is used by a policy that is already deployed, the Deployment
Record will be marked out of sync. This takes into account what device classes actually
changed.
Close Closes the form. If any changes have been made a Verify Close window asks to make these changes
permanent.
A QoS flow requires a name and a defined set of classifier conditions that is device-specific. You can define multiple
parameters within the set to create an AND condition. To add a logical OR to the flow definition, you can add another set of
classifier conditions.
Table 10-3 lists the flow conditions for the various device classes, highlighting which parameters are the same, different, or
the same but with slightly different parameter names. When you copy and paste flows parameters are automatically
translated between devices.
To access the Priority Action Form, select QoS -> Action -> Priority Action. Figure 10-2 shows an example QoS Priority Action
Form. Table 10-5 describes the fields
Option Purpose
Target Device The device classes to be included in this Flow.
Classes
Set Targets Brings up the Edit QOS Device Class List, allowing the user to select any combination of device
classes to include.Press and Hold the SHift key to select more than one device class.
Targets can also be added/removed by clicking the “Target” checkbox.
Option Purpose
Device Class table Table of the Device Classes, Targets, and a description of the device class. Supported indicates
there are no detected errors.
Priority Action A pull-down of all existing actions. If selected, the parameters of the selected action appear in
Name the form.
Device Class A pull-down of the device classes that are included in this policy. This reflects the tic boxes
chosen in the Device Class table.
New Action Brings up the Select New Name window. The user can choose to copy the parameters from the
action currently displayed.
Copy Saves the parameters from the current Device Class target so they can be 'pasted' to another
target device class by the “translation” feature.
Paste Translates and applies the parameters that were “copied”. If there is no translation for a
parameter it will appear with square brackets around it, and be colored red. If there is similar
parameter but the value cannot be translated the value will be enclosed in square brackets and
the entry will again be colored red.
Priority Action A list of the parameters for the selected action. If more than one parameter is listed, the Up,
Parameters Down, and Delete buttons are active.
Parameter For the parameter chosen in the Priority Action Parameters list, a description of what the
Description parameter is and what it does.
Parameter pull- A pull-down of the available parameters. As each one is selected, the associated value field
down and value appears. For example, selecting SETVPRIORITY will bring up a value field with 0, a default value.
field The user can then overwrite this value of 1 to 7. For other parameters, such as MARKVALUE,
the value field is another pull-down of the available values.
Click Here to Add If the parameter is not in the Priority Action list, it is added. If the parameter has already been
or Replace chosen, it replaces what is already there with the new value.
Parameter The available Parameters and Values change as parameters are added, reflecting the
interdependencies between the parameter
Delete Action Deletes the Priority Action entry for all Target Device Classes. To remove the action for a
single Device Class uncheck its “target” checkbox. When the action is saved the entry for that
Device Class will be removed from the database.
Save Priority If a new action has been defined, an existing action has been changed, or targets have been
Action removed, makes the changes permanent.
If the parameters for some device classes are incomplete, a message box will appear with
options to Fix, Skip, or Cancel. The Fix button will take you to the in error device class entry.
Note: If the Action is used by a policy that is already deployed, the Deployment Record will
be marked out of sync. (Takes into account what device Classes actually changed)
Close Closes the form. If any changes have been made a Verify Close window asks to make these
changes permanent.
To access the Traffic Action Form, select QoS -> Actions -> Traffic Actions. Figure 10-3 shows an example QoS Policy Rule
Form. Table 10-7 describes the fields.
Note: For the iMAP_EPON interface, refer to "Example of an EPON/ONU Interface Policy" on page 253
Option Purpose
Target The device classes to be included in this Traffic Action.
Device
Classes
Set Targets Brings up the Edit QOS Device Class List, allowing the user to select any combination of device
classes to include.Press and Hold the SHift key to select more than one device class.
Targets can also be added/removed by clicking the “Target” checkbox.
Device Class Table of the Device Classes, Targets, whether the parameters chosen are supported by the device
table class, and a description of the device class.
Traffic Action A pull-down of all existing Traffic Actions. If selected, the parameters of the selected action appear
Name in the form.
Device Class A pull-down of the device classes that are included in this policy. This reflects the tic boxes chosen
in the Device Class table.
New Action Brings up the Select New Name window. The user can choose to copy the parameters from the
action currently displayed.
Copy Saves the parameters from the current Device Class target so they can be 'pasted' to another
target device class by the “translation” feature.
Paste Translates and applies the parameters that were “copied”. If there is no translation for a parameter
it will appear with square brackets around it, and be colored red. If there is similar parameter but
the value cannot be translated the value will be enclosed in square brackets and the entry will again
be colored red.
Traffic Action A list of the parameters for the selected action. If more than one parameter is listed, the Up, Down,
Parameters and Delete buttons are active.
Parameter For the parameter chosen in the Traffic Action Parameters list, a description of what the parameter
Description is and what it does.
Parameter A pull-down of the available parameters. As each one is selected, the associated value field appears.
pull-down For example, selecting RATE will bring up a value field with 1, a default value. The user can then
and value overwrite this value. For other parameters, such as BURSTSIZE, the value field is another pull-
field down of the available values.
Click Here to If the parameter is not in the Traffic Action Parameters list, it is added. If the parameter has already
Add or been chosen, it replaces what is already there with the new value.
Replace The available Parameters and Values change as parameters are added, reflecting the
Parameter interdependencies between the parameter
Delete Deletes the entire Priority Action and its associated parameters.
Action
Save Traffic If a new action has been defined, an existing action has been changed, or targets have been
Action removed, makes the changes permanent.
If the parameters for some device classes are incomplete, a message box will appear with options to
Fix, Skip, or Cancel. The Fix button will take you to the in error device class entry.
Note: If Action is used by a policy that is already deployed, the Deployment Record will be
marked out of sync. (Takes into account what device Classes actually changed)
Close Closes the form. If any changes have been made a Verify Close window asks to make these changes
permanent.
Option Purpose
Target The device classes to be included in this Flow.
Device
Classes
Set Targets Brings up the Edit QOS Device Class List, allowing the user to select any combination of device
classes to include.Press and Hold the Shift key to select more than one device class.
Targets can also be added/removed by clicking the “Target” checkbox.
Device Class Table of the Device Classes, Targets, and a description of the device class. Supported indicates
table there are no detected errors.
Policy Action A pull-down of all existing Policy Actions. If selected, the parameters of the selected action appear
Name in the form.
Device Class A pull-down of the device classes that are included in this policy action. This reflects the tic boxes
chosen in the Device Class table.
New Action Brings up the Select New Name window. The user can choose to copy the parameters from the
flow currently displayed.
Copy Saves the parameters from the current Device Class target so they can be 'pasted' to another
target device class by the “translation” feature.
Paste Translates and applies the parameters that were “copied”. If there is no translation for a parameter
it will appear with square brackets around it, and be colored red. If there is similar parameter but
the value cannot be translated the value will be enclosed in square brackets and the entry will again
be colored red.
Policy Action A list of the parameters for the selected action. If more than one parameter is listed, the Up, Down,
Parameters and Delete buttons are active.
Parameter For the parameter chosen in the Policy Action Parameters list, a description of what the parameter
Description is and what it does.
Parameter A pull-down of the available parameters. As each one is selected, the associated value field appears.
pull-down
and value
field
Click Here to If the parameter is not in the Policy Action Parameters list, it is added. If the parameter has already
Add or been chosen, it replaces what is already there with the new value.
Replace The available Parameters and Values change as parameters are added, reflecting the
Parameter interdependencies between the parameter
Delete Deletes the entire Policy Action and its associated parameters.
Action
Save Policy If a new Policy Action has been defined, an existing Policy Action has been changed, or targets have
Action been removed, makes the changes permanent.
If the parameters for some device classes are incomplete, a message box will appear with options to
Fix, Skip, or Cancel. The Fix button will take you to the in error device class entry.
Note: If the Action is used by a policy that is already deployed, the Deployment Record will be
marked out of sync. (Takes into account what device Classes actually changed)
Close Closes the form. If any changes have been made a Verify Close window asks to make these changes
permanent.
Option Purpose
Target The device classes to be included in this Policy.
Device
Classes
Set Targets Brings up the Edit QOS Device Class List, allowing the user to select any combination of device
classes to include.Press and Hold the SHift key to select more than one device class.
Note that if a device class is chosen that does not support the existing rules in a Policy, an error
message appears and the device class cannot be added.
Policy Name A unique name to identify the policy. Refer to the Note above.
New Policy Brings up a window to enter a new unique name. If this is accessed from an existing Policy, there is
the option to copy the attributes from the existing policy to the new Policy.
Description A way to provide more detail.
Policy Action This is available for Rapier and Switchblade device classes only, and lists those that have been
created.
Policy Rules The Policy Rules associated with the Policy. There are five columns:
table # - The number of the Policy Rule. Click on this to Edit, Delete, or move rules up/down.
Flow - The current policy flow, which can be changed by selecting the cell.
Priority - The Priority Action, which can be changed by selecting the cell.
Traffic - The Traffic Action, which can be changed by selecting the cell.
Target Support
Flows, Priority Actions, and Traffic Actions for single flow rules can be edited directly in the table,
Multi-flow rules can only be edited with the Rule Form
Analyze Rules Goes through the defined flows and actions and applies a logic tree for the device types selected so
that conflicts from a previous flow are highlighted.
Flow Brings up the Policy Flow Form for the selected Flow. Note that this is the standard Policy Flow
Descriptions Form, and so other Flows can be modified and new Flows can be created.
Priority Brings up the Priority Action Form for the selected Action. Note that this is the standard Priority
Actions Action Form, and so other Actions can be modified and new Actions can be created.
Traffic Brings up the Traffic Action Form for the selected Action. Note that this is the standard Traffic
Actions Action Form, and so other Actions can be modified and new Actions can be created.
Reset Undo any changes that have been made by rereading the Policy from the database.
Delete Delete the Policy and all its attributes. If the Policy has been applied to any port, an error message
appears and the policy cannot be deleted.
Save Policy Makes permanent all the changes that have been made. If the policy has already been deployed as
part of Profile Management, the associated ports in the Ports table will have their Profile names
marked with a “*” to indicate they are currently out-of-sync with the modified policy. To redeploy
these changes, redeploy the profile as described in "Redeploying a Profile" on page 213.
The Analyze Rules button follows a logic tree to highlight potential conflicts between the flows and actions for the device
types. The following figure is an example.
Option Purpose
Target The device classes that are included in this policy. This value is read-only.
Device
Classes
Priority Two pull-downs that have the available Flow Descriptions and Priority Actions. Select one from
Action Pairs each to include in the rule.
Note that each flow name can only be used once in a policy. The combo-box values for Flow
Descriptor reflect this constraint.
Traffic Action One pull-down to select the Traffic Action associated with he Flow Description/Priority Action
pair.
Add Adds the selected Flow-Descriptor pair to the Pair Table.
Add Rule Add the rule to the Policy. The QOS Policy Maintenance form appears with the rule included.
Up, Down, Remove, would you want these since each rule should have one of each?
Note: In using this form, the user must be aware that it is a two-step process; the user first selects the flow and priority and clicks on
Add to add them as a Priority/Action pair. The user then chooses a traffic action and selects Add Rule to actually add the rule
to the policy form as a row.
Note: Names that are enclosed in square brackets, [Name], are set by Allied Telesis and cannot be changed.
• For qos_voice, the subscriber is set up on a VLAN with the VID 701, and the voice traffic is the only incoming stream
with a VLAN tag; all other traffic is untagged and is given a tag by its port association.
• For qos_data the subscriber is set up on a VLAN with VID 501.
• For qos_video the subscriber is set up on a VLAN with VID 301, and will connect to the subscriber’s Set Top Box (STB).
1. Rate and Burstrate parameters are initially in square brackets and colored red. This is because the default values will
not work for both 7000 and 9000 devices, but the parameters are required. This keeps the user from inadvertently
saving the Actions without looking at these parameters and consciously setting their values
2. With the RATE parameter, select RATE from the pull-down. In the blank filed, enter 1000.
3. Click on Click Here to Add or Replace Parameter. The default RATE is replaced with the new value.
4. Repeat these steps with the BURSTSIZE parameter, selecting the pull-down 32KB.
5. In the pull-down of parameters, select NCCOUNT. The option ON or OFF appears in a pull-down. Select ON.
6. Click on Click Here to Add or Replace Parameter. This adds the NCOUNT parameter to the list.
6. Click on Save Traffic Action and OK to confirm. This saves the Traffic Action name qos_voice, and this will appear in pull-
downs of Traffic Action Names where appropriate.
7. Since there are no other traffic actions to create for this flow, Close the Form.
• All other traffic is placed in the lowest priority queue and has, like web-based traffic, a maximum bandwidth of 64Kbps. It
therefore uses the same traffic action.
Figure 10-10 through Figure 10-14 shows how the forms are datafilled to define the flows, priorities, and actions.
Following are notes on using these forms:
• A flow, priority, or action can be defined first and made applicable to all device types. In creating a policy, the user can
control which device types a flow, priority, or action will apply to.
• The user can create the flows, priorities, and actions first, and then in creating the policy create the rules that associate
these together.
• The user can create a policy first, and then use the Flow Descriptors, Priority Actions, and Traffic Actions buttons to
create new flows, priorities, and actions before defining the Rule Table.
• The Copy and Paste buttons are useful when, in defining a flow, priority, or action, the user needs to copy over the
attributes to the other devices. An example would be in defining the flow CRM server; the user could define the
attributes for one device type, and then copy and paste these for the other device types.
• EPON Interface - The EPON interface is one-to-one with the physical EPON port on the card. Like other interfaces the
system can raise alarms on it, collect statistics on it, enable/disable it, etc. It will host ONU interfaces but it does not
support any ETH interfaces directly.
The EPON interface is always present when the card is present (i.e. they are not created/deleted by the user). The EPON
interface is identified as an interface like epon:4.1 with the slot and physical port as the indices.
The EPON interface has IGMP-specific attributes for video multicasting:
• The VLAN for IP Multicast
• IP Source Address for IGMP Proxy (0.0.0.0 is the default; refer to the Software Reference for iMAP Series Switches on
using other addresses).
• ONU (Included with iMG/RG)
The ONU interface supports/hosts one (and only one) ETH interface, which is actually an Ethernet port inside the iMG/RG.
The ONU interface is identified like “onu:4.1.7” with the EPON's slot and physical port as the first two indices. The last
index is a logical identifier.
• SLA / QOSPOLICY (VLAN basis)
The SLA provides attributes to ensure that a traffic flow is given adequate bandwidth to support a service on an ONU. Since
the service may involve downstream only or upstream/downstream data flows, the QOSPOLICY has both upstream and
downstream attributes.
The QOSPOLICY is associated with a VLAN as well, and so to configure the QOSPOLICY, the user must understand the
VLANs associated with a service and the traffic flows (upstream/downstream and downstream only) for each type of service.
There are two types of traffic flows on which QOSPOLICYs are configured:
1. Upstream/Downstream Links
• There is one or more per ONU
• Each one carries one VLAN to one ONU.
• Downstream, they carry known unicast packets to the ONU
• Upstream, they carry unicast, broadcast, multicast, and unknown MAC packets.
• The first one provisioned on the ONU carries some control and management traffic upstream
2. Downstream Only Link
• One is for all ONUs
• Carries two types of traffic, with each having a separately defined SLA (and therefore QOSPOLICY)
- Multicast traffic for only the IP Multicast (IPMC) VLAN
- Broadcast, Unknown Unicast, and flooded Multicast (BRUUM). This downstream link is shared for all VLANs on all
ONUs on the EPON.
When the AlliedView NMS is first loaded, a set of polices (with their flows, priorities, and traffic actions) are included. These
profiles as well as the relevant VLAN can then be included with EPON and ONU port profiles.
The following figure shows the default profiles, followed by a table that describes the attributes of these policies.
TABLE 10-15 Default QoS Policies for EPON and ONU Interfaces
With these policies, the administrator can these include these with the profiles for the EPON and ONU ports.
Note: In release 10.0 SP2, the EPON supports VLAN translations. As a result, the translated VLAN ID is also included as part of
setting the QOS policies.
• The QOS Traffic Action form appears with its list of attributes. For the FX20 queue, only four are used, so select these
and edit the values.
Note: Although not necessary, you should delete the other attributes so that only the key attributes are highlighted. Refer to the
following figure.
• Click on Save Traffic Action, and click OK on the confirmation window.
• Click on New Action, enter another Traffic Action name, and select the tic box to copy the attributes from the Traffic
Action you just created. You will only need to modify the four attributes and select Save to save the second Traffic
Action.
• Repeat these steps for each Traffic Action, up to eight.
• Select Network Services -> QoS -> Policy - This brings up the QoS Policy Maintenance Form.
Note: You can also go to the Network Service data node and select QoS policies -> Actions, and select an existing Policy
• Select the New Policy button, and enter the New Policy Name, following the Policy naming conventions. Do not select
the Copy from ... tic box.
• At the Edit QoS Device Class List, click on Telesyn and then the Select button
• The QOS Traffic Policy form appears with its list of attributes. Since this is a new policy, only the two default rules
appear. If they are highlighted, select Remove (under Ip Filter Rules), and the result is a policy with no rules. (If they are
not highlighted, select a rule and select Delete Rule.) Refer to the following figure.
not attempt to re-deploy policies that are determined to be in-sync. As a result, if underlying CLI QoS component changes
are suspected, you must force the NMS to redeploy the NMS policy.
To redeploy the NMS policy can be done in one of several ways:
• If the redeployment is only required on a single device, then right-click on the desired row of the QoS Deployment table
and select Undeploy Policy. This will remove the corrupt QoS components from the device. At this point redeploying the
port Profile will automatically update the QoS Policy on the device.
• If, on the other hand, you would like to update the QoS Policy on all devices, the simplest way to force the NMS to
redeploy the policy is to modify the QoS Policy definition and resave it. This will cause all deployments of that policy to
be flagged with a status of “policy_changed”, which will force all policies to be redeployed on the next Profile
deployment.
After the Update Deployment Status operation is performed, if the Deployment Status indicates a policy or device change
has been detected, then this may be the source of the problem. If so, go to the Network Services Data -> Profiles table, select
the associated Profile that assigns the desired QoS Policy and right-click to redeploy the profile to all of its assigned ports.
This will bring the devices back in-sync with the NMS Policy.
You can provision a single device or a set of devices together. Provisioning options include:
• Backup/Restore
• Command Script Management
• Configuration File Management
• Device Information
• Syslog Management
• SNMP Agent
• SNMP Community
• SNMPv3 USM Configuration
• Software Configuration
• LLDP Configuration
• Configure VLAN
• Card Management
• Port Management
When multiple devices are selected, only those operations that can be performed on more than one device are active.
The following subsections go through all of the menu options available for the AT Network Elements. Separate subsections
highlight the provisioning tasks.
Use the following table to locate the task you wish to perform.
The NMS supports all cards that can be configured with the various CFC cards, and this is reflected in the chassis view as
well as the various types of management. Refer to the iMAP Component Specification for the available CFC cards and the
products they support.
For iMAP devices, alarm LEDs for the chassis view are known by polling the device for alarms, not by querying the
AlliedView NMS database that has the results of the AlliedView NMS Management system (described in Section 8).
Therefore, alarm LEDs produced as a result of the Fault Management system (such as thresholds or traps) are not are known
by the chassis view and are not displayed.
For the EPON2 card, the port LED is lit when there is a discovered link on the EPON interface. (The link does not have to
be authenticated.). Also for the EPON2 card, you can click on the ONU button and a pop-up will show the status of the
ONU ports. To close the pop-up, click on the square labeled Port <no.> ONUs, as highlighted in Figure 12-2.
Abort While data is being collected, this stop sign icon is red. Clicking on the
icon at that point will stop the data collection.
Time in 24-hour format Collection Time Once an application is run, the date and/or the time it was run
(next to Rows)
CPE versus Network Toggles between the Allied Telesis Network Devices (iMAP, Rapier,
Device AT) and iMG/RG devices.
At this point, you would normally click Add/Remove Devices at the bottom of the window and create a set of devices to
include in the application. You can also go to the pull-down menus and select Application Manager, which lists all the
applications available for the device, as shown in the following figure.
If the user clicks Add/Remove Devices, which is at the bottom of every application window, the set of devices that are to be
included in the application can be controlled, as shown in Figure 12-9.
TABLE 12-2 Options for the Add / Remove Devices for an Application
Option Description
Available Devices Available devices for the application are in black.
Clear Clear all devices from the Selected Devices list.
Add / Remove Sends a device from one column to another.
Show Changes Brings up a window that shows which devices were added or removed from when the
window was first invoked.
Save As... Saves the currently displayed Selected Devices list to be recalled at a later time.
Saved Lists Is a drop-down list of saved lists created with the Save As button. Selecting a saved list
and then clicking Copy will copy the devices in the saved list to the Selected Devices
panel. The number of devices in each list is indicated in square brackets to the right of
the list name. The saved list also contains the list for each application so they can be
copied to other applications.
Copy Copies the devices in a saved list to the Selected Devices panel.
Delete Delete the selected Saved List
Done Makes the changes and puts the devices in the application window.
Another option to control the set of devices to be included in an application occurs when moving from one application (or
the AppManager) to another, and the target Applications List is different (but not empty) from the source Applications List.
The Copy Device List window appears, as shown in Figure 12-10.
FIGURE 12-11 Collected Data for Selected Devices for Device Backup Restore (Network Selected)
Note: If for any devices the data cannot be collected, the row is dark; the Tooltip for that row will include the reason, such as
“Unable to Connect.”
Field Meaning
Listed Device(s) Device(s) that will have a backup created.
Devices in subnet Backs up all devices for the specified subnet. The query is done when the
task is executed, so that for a recurring task, new devices added since that
task was created will be backed up during the next execution of the task.
Backup File Name Descriptive name for the backup file. If the filename is not specified, the
filename is generated by the NMS and will include the date and time of the
backup.
Backup identical configuration When checked, backs up and saves configuration files for devices where the
files have not changed. The default is not to save identical configuration files
(the tic box is not checked).
Overwrite boot config with running Make the current configuration (reflected in the configuration database) the
config (for Rapier and CPE devices) default. This applies to Rapier and CPE devices only.
Note: If you have modified your network configuration for Rapier or CPE devices, such as adding or modifying VLANs, you should
back up your configuration information as soon as possible. Make sure the Overwrite boot configuration file with running
configuration checkbox is checked.
If the backup is to occur now, click Finish. For scheduled or Recurring backups, click Next, and the Recurring Schedule
window will appear, as shown in the following figure.
Note: It is highly recommended that you configure your device configuration backup to run on a recurring schedule to preserve
configuration changes made by the NMS. If a device reboot or, in the case of iMAP devices, a database purge occurs, any
configuration data that is not backed up will be lost. With regularly scheduled backups, should such an event occur, you can
restore your configuration changes from the backup files.
For iMAP and Rapier/Switchblade devices, the Rapier/Switchblade filename option is enabled but checkboxes are disabled, as
shown below.
FIGURE 12-16 Restore Configuration for iMAP and Rapier / SwitchBlade Devices
For iMG/RGs only, these cannot be selected with iMAPs, Rapiers, etc, and the entire lower panel is removed, as shown
below.
Option Description
Backup File A list of files from which you choose the one to send to the device.
Filename to Use This field is filled in as you select a backup file. If the user didn’t specify a filename for the
on Rapier backup, the entry will be “Backup from <date time>. Applies to all devices except iMG/RG.
Make Default Checkbox that makes the selected file the default file (when device restarts, it will use this file).
Configuration For Rapier / SwitchBlade devices only.
Restart Device If the Make Default Configuration checkbox is checked, the Rapier device will restart
immediately with the default file when the Apply button is pressed.
Apply Applies the Changes.
Close Closes the window. If the Apply button was not pressed, the options will not take effect.
Button/Field Description
Upload Retrieves a file from the device. The user has to pick a file name from a list retrieved from
the device. It can be stored either under the user's scripts path or under the user's device-
specific in the server-side file system. Refer to "Upload File Form (Script Mgt)" on page 286.
Download Brings up a file chooser so a file can be selected from the server file system to be downloaded all the
highlighted devices. If a file already exists with the same name, it will be overwritten. This button
allows files to be downloaded without being executed as a script. One use of this button is to create a
login banner file, as shown in "Creating a Login Banner on a iMAP Device" on page 290.
Download/ Brings up a file chooser. A script can be selected from the server file system for execution on all the
Execute highlighted devices. After the user chooses a script, it can be downloaded on all the target devices and
executed. Command feedback from the devices will be displayed in a scrolling panel.
Upon completing execution, the device needs to be rediscovered in case any configuration
changes were made that may affect other NMS features, like VLAN. Refer to "Download/
Execute" on page 287.
Edit Files Brings up the unloaded multi-paged editor. The editor has open and save as buttons that
work with either the local file system or the server file system, determined by a toggle on
the file chooser. (Local file system is not supported in rev. 2.0) Save uses whichever file was
opened, whether local or server-side. The editor also have find, find next, and cut/copy/
paste. Refer to "Edit Files" on page 289.
Delete Files Brings up a file chooser from which the user chooses one or more files to delete. Refer to
"Download Config File Window" on page 291.
Compare Compares and displays two text files for comparison. Refer to "File Comparison (Text Files)" on page
Files 342
12.2.3.2 Download/Execute
To download and then execute script files, select one or more devices in the Command Script Mgmt window and click
Download/Execute.
Option Description
Upload This brings up the Upload Config Files Form, which allows the user to back up the file to a
directory on the AlliedView NMS server. Refer to "Upload Config Files Window" on page 291.
Download/Restart This brings up the Download Config File form, which allows the user to restore a
configuration file. Refer to "Download Config File Window" on page 291.
Edit Files This brings up the multi-paged text editor Refer to "Edit Window" on page 292.
Delete Files This brings up a directory window, which allows the user to delete a file. Refer to "Delete
Window" on page 292.
Compare Files This brings up the File Comparison tool. Refer to "File Comparison (Text Files)" on page 342
• The Source directories option determines whether they are downloaded form the backup subtree or from the user's
(root) device subtree. When the source directory is changed, the list of files will change accordingly. Whenever such a
change results in an empty list, a warning message will appear.
Note: If one or more iMAPs are included in the device selection, the backup option is unavailable, since Configuration File
Management is for text-based files, and iMAP backup files are database files in binary format. The user’s subtree will contain
the text config files that were uploaded using this application.
• If Make default configuration is selected, the downloaded files will become the default configurations on the devices
(applied the next time the devices are rebooted).
• If Restart is selected, the device will be rebooted upon completion of the download
Note: Once the download is complete, rediscover the device to ensure the data in the configuration file is communicated to the
AlliedView NMS.
Option Description
Agent status A checkbox to enable or disable the device(s). A dark check means all selected devices have this
feature enabled, an unchecked box means no devices have this feature enabled, and a gray
checkbox means some devices have this feature enabled and some devices do not.
Authentication A checkbox to enable or disable the create traps when an unauthorized attempt has been made.
failure traps status
Link up/down trap A checkbox to set each interface to send (checked) or not send (not checked) a trap when its
generation (all up/down state changes. A gray box means no changes are made.
interfaces)
OK Applies the changes.
Cancel Cancels the changes made in this window.
Help Invokes online help.
When the Copy button is clicked, a two-page form appears. Both pages are shown in the following figures.
Option Description
Community Name A text box when adding (creating) a community name, a drop-down of community names when
modifying a community name. When adding a community, clicking on the Add/Remove button
adds the community. If a community is already highlighted, clicking on the Add/Remove button
will remove the community for the device.
Use this community Make this community be used for SNMP communication.
for NMS
Open Access Checkbox to allow Open Access or not for this community.
Status Enabled Checkbox to enable or disable status messaging for this community.
Traps Enabled Checkbox to enable or disable the ability for this community to produce traps.
Write Access Checkbox to enable Read-Only or Read-Write Access for this community.
Enabled
Manager The IP address of the snmp Manager. If Open Access is not enabled (not checked), then GETs
Destination are only accepted from this IP address. If Open Access is checked, this field is not used.
When the check mark is black, all Managers in the list are added to the devices. When the
check mark is gray, only the new Managers in the list are added to the devices. If unchecked, no
changes are made.
Option Description
Trap Destination The available trap host. This is the IP address where traps are to be sent, and the SNMP
version (pull down) of which version. When the check mark is black, all trap hosts in the list
are added to the devices. When the check mark is gray, only the new trap hosts in the list are
added to the devices. If unchecked, no changes are made.
Help Invokes context-sensitive online help.
OK Activates changes.
Cancel Cancels changes.
To delete a community, select one or more devices and click on Delete.
Note: If a custom load has been built (refer to "Custom Load Software Configuration" on page 303), it will be added to Loads pull-
down.
Option Description
Loads A pull-down menu for choosing the software release for the device.
For iMAP devices, the user can select loads that assume Annex A or Annex B cards are being loaded.
Delete old A checkbox that tells the device to delete old release files before loading the chosen release file.
release files if (Note that you may need to check this box if a previous download of a release file to the device has
space needed failed.)
Option Description
Delete A checkbox that is active only after choosing the checkbox to delete old release files, it tells the
current device to delete the current release file as well as old release files. (Note that you may need to check
release files if this box if a download of the release file using the first checkbox has failed.)
space needed
Load releases This option appears whenever any of the target devices is an iMAP. iMAP devices may support
for installed numerous card types, and checking this option will only load the release files for currently installed
card types card types, saving memory.
only If a new card type is installed afterwards, the downloads will have to be re-executed to update the
release for the new card.
Operation A set of radio buttons for choosing which download method to use.
Download new image(s) only places the selected image(s) on the device.
Apply new image(s) places the selected image(s) on the device and restarts the device with the
downloaded image(s) only if necessary. When the device restarts again, it will revert to the previous
image(s).
Apply new image(s) and set as preferred places the selected image(s) on the device and restarts the
device with the downloaded image(s) only if necessary. When the device restarts again, it will keep
the downloaded images as the active ones and not revert to the previous image(s).
Next Brings up the schedule panel for recurring backups.
Finish Submits the Task name and all options for processing immediately.
Cancel Closes the window. If the Submit button has not been pressed, any changes to the form are lost.
Help Invokes online help.
Note: When a device cold starts and sends a cold trap, the device will be automatically rediscovered within two minutes, so after a
software download the information for a device will be automatically updated (although it may be out of synch for a short
time).
Note: In the unlikely event of getting an “NMS File System Error”, see the trace log for more detailed and more specific error
message. This error only occurs when NMS was not installed properly, the FTP service is not configured properly, the NMS file
system is full or corrupt, or the NMS server account has been changed to revoke required read/write/delete file access
privileges.
12.2.9.4 Using a MTAC Account and WebGen (Manual) to Enable Software Upgrades
To enable software upgrades for Rapier devices, a two-step process is used that involves tasks at an Allied Telesis website as
well as a AlliedView NMS feature:
1. The Multi-Time-Access-Code (MTAC) is a website where customers can register themselves and then set up for their
devices (based on the serial numbers) the OSs that will be loaded.
2. The WebGen Import Form tool (on the AlliedView NMS) is then brought up, and the results from the MTAC account
are copied either directly into the form or are copied into a file so that it can be copied into the form later.
To access your MTAC account, go to https://licence.alliedtelesis.co.nz/mtac/fusebox.cfm.
Note: Before accessing this site, you will need to obtain a valid user ID and password from your authorized Allied Telesis
representative or reseller.
Once you have accessed the site, you will go through a series of forms where you enter your id, password, give general
customer details, and correlate an OS with the serial numbers of your devices. You must also fill in details on the device for
each serial number. (Note that you do not have to enter information for all your devices and can revisit your account later.)
After clicking Generate, a list of ENABLE commands is produced that selects the OS for the devices and include the
passwords.
Note: For detailed instructions on using your MTAC account to generate licences, see www.alliedtelesis.co.nz/webgen/pdf/webgen-
customer-guide.pdf.
Once you have this list of commands generated with the account, you can use the results in one of two ways:
• Save the html form as a filename. This file can then be transferred to the NMS if there is no internet access from the NMS
server. The WebGen Import form is then used to access this file so it can be imported.
• The WebGen Import form is brought up and the results are pasted directly into the form and imported.
To access the WebGen Import Form, use the Start Menu and Select Programs -> <NMS Load> -> Tools. This will bring up the
WebGen Import form shown in the following figure.
Loads are groups of device configurations that can be selected when downloading software releases to devices. Loads types
are:
• Standard - The standard loads are pre configured in the NMS release and can be viewed in detail but neither modified nor
deleted.
• Custom - Custom loads are created by users and can be added, modified, viewed, and deleted, which are the tasks that
make up this feature.
The Modify button allows modifying a description. Select a custom load from the table, modify the description, and then
press the Modify button. (Names cannot be modified after creation)
The Delete button allows deleting a load. Select a custom load from the table and press Delete. If the load contains any
detailed data, the user will be prompted to confirm the deletion.
The Details button brings up the Load Details form for the selected load. Select a load from the table, either standard or
custom, and press Details. Details can also be brought up by double-clicking a row. Refer to Figure 12-44.
The Close button closes the dialog and saves all the changes. If for any reason communication is lost to the NMS server, the
user will be prompted to confirm closing (and lose any changes) or cancel closing. The message is:
Cannot Save Custom Load File. Do you want to continue exiting (and possibly lose any changes)?
After resolving the communications problem, the dialog can be closed and the data will be saved.
The Delete button allows deleting a type from the load. Select the type to delete using either the combo box or the table,
then push Delete.
More than one Details dialog can be displayed at the same time so Load contents can be compared and values can be copied
and pasted from one load to another (using ctl-c and ctl-v).
Note: Displaying details and modifying the same load in more than one simultaneous dialog, however, is not recommended. The
changes to the load will occur as they're made, but all the dialogs will not be refreshed as they occur.
FIGURE 12-48 Details Display for Standard Load (Used to Create Custom Load of Only Certain Files)
Figure 12-49 shows a Custom Device Loads window in which a custom load has been built that supports only the ADSL24A,
CFC6, and POTS24 card types on a 7400.
FIGURE 12-51 SysLog Management Application Modify Log Properties Window - File
This window allows you to apply or remove system log filters to or from each device. The Available Filters list box lists the
log filters that may be applied to the selected devices. The Selectively Applied Filters list box lists filters that are applied to
some of the selected devices, but not all. The Apply Filters list box lists the filters that are applied to all of the selected
devices.
For information on configuring the AlliedView NMS system logs, refer to "Configuring System Logs" on page 1017.
FIGURE 12-53 LLDP MultiDevice Wizard for Multiple iMAP Devices - First Panel
Note the Re initialization Delay attribute has Mixed rather than a numeric value. This means there are different values of the
devices. Inputting a New Value (such as 2) will change the value to 2 for all the selected devices.
The second panel brings up a panel that controls the options for the multiple devices. The following figure shows an example
where LLDP is set to All OFF.
FIGURE 12-54 LLDP MultiDevice Wizard for Multiple iMAP Devices - Second Panel
The pull-downs are as follows:
• LLDP Mode - The options are TX, RX, BOTH or OFF. Note that to activate LLDP so that the links are drawn on the
physical map, this must be set to BOTH. The specific attributes for the ports can then be set.
• LLDP Notification - This can be set to ON or OFF.
For the options, the Current Value shows how the option is currently being applied. The user has the following actions to
choose from:
• ALL Row
• Add to All - make all options apply to all ports if the option is not applied to any or some ports
• Delete from All - delete all options from all ports if the option is applied to any or some ports.
• Other options
• Add to All - make the one option apply to all ports. This would take priority over the ALL Row.
• Delete from All - make the one option be deleted for all ports. This would take priority over the ALL Row.
• No Change - Keep the current value regardless of any changes made with the ALL option. This would only apply if the
current value was not All ports on All devices.
The user can then select Finish to bring up the Task Details window or Next to bring up the Task Schedule wondow.
FIGURE 12-55 LLDP MultiDevice Wizard for One iMAP Device - First Panel
The current values for the selected device is shown, and the user can change the values within the range shown. Selecting the
Finish button brings up the Task Window to show the progress of the changes taking effect. Selecting the Next button brings
up the Configure LLDP Options panel, as shown in the following figure.
FIGURE 12-56 LLDP MultiDevice Wizard for Single Device Options - Second Panel
To configure the many possible options, the following concepts are used:
• ALL Ports row - This row controls multiple actions as follows:
• Mode - Selecting this cell brings up a pull-down of Modes, and selecting one means selecting the Mode for all ports on
the device, including OFF, which disables LLDP for all ports.
• Notify - Selecting this tic box toggles the Notify option for all ports between All On (with all ports in the column
having the tic boxes checked) and All Off (with all tic boxes in the column blank).
• All options - This allows the user to add all options to all ports or delete all options from all ports.
• Specific option - For each option, selecting the tic box will Add or Delete the option for all ports.
• Row for each port - This row controls the options for each port as follows:
• Mode - Selecting this cell brings up a pull-down of Modes, and selecting one means selecting the Mode for only that
specific port.
• Notify - Selecting this tic box toggles the Notify option on the port between ON and Disable.
• All options - This tic box controls the state of all the options on the port
• Specific Option - selects the specific option for the specific port.
Note: Setting any specific option for a will override a global options.
The user can then select Finish to bring up the Task Details window or Next to bring up the Task Schedule window.
FIGURE 12-57 Icons for Stacked Devices - SBx908 has member of stack unavailable
• LAG - If two or more links are aggregated, forming a LAG connection, the LAG link is rendered as two parallel lines.
Moreover, if both links are rendered as green, all links are available. If one of the two links is orange, then:
• One or more links of the LAG is unavailable.
• The neighboring port is not configured for LAG.
• (AlliedWare type devices) - The port is not associated to any LACP channel.
Refer to the following figure.
FIGURE 12-59
• Show LAG Links option - Right click on the LAG links icon and select Show LAG Links to bring up the LAG/VCS screen.
Refer to the following figure.
The “Combine Device Data” Radio button combines all the data from each iMG/RG into a single row entry, as shown below.
FIGURE 12-68 Results of MPEG Network Test Execution - Combine Device Data
The “Combine Channel Data” Radio button combines all the data from each multicast into a single row entry, as shown
below.
FIGURE 12-69 Results of MPEG Network Test Execution - Combine Channel Data
To delete the test results, select one or more tests form the Test Results panel, right click, and select Delete Test Result.
(Note that View Test Result is grayed out.) Refer to the following figure.
FIGURE 12-74 Files Available for Edit from Server File System (List View)
FIGURE 12-75 Files Available for Edit from Server File System (Details View)
Once a file is opened and edited, it can be saved on the Server File System. Files can be saved as templates for future script
writing. Refer to Figure 12-76.
Note: Since files are being saved to the server (rather than a device), unrestricted filenames and extensions are allowed.
FIGURE 12-81 Delete File Window for Multiple File and Properties
The current directory is displayed at the top. Just below is a pull-down combo box that can be used to jump between file
system roots-in this case /NMS-SERVER/root/scripts and /NMS-SERVER/root. The folder and home icons can be used to
navigate up in a directory tree or to jump to the “home” directory, which is usually the user's home directory. File
properties (size, type, and date last modified) are always displayed. File types can be filtered with the pull-down combo box
at the bottom.
The Delete button will prompt to confirm the files to delete, as shown in the following figure.
The following table gives an overview of the fields, graphics, and buttons available.
Note: To change the status for a set of ports, select and hold the SHIFT key and then click and drag the left mouse button over
multiple ports.
Caution: The FE/FX10 cards have certain restrictions on VLAN translations, and the user must be aware of these so as not to
compromise service. Refer to "Restrictions" on page 566.
12.5.2 Performance
Right-clicking the device and choosing the Performance menu option will bring up the Performance View (statistics) for the
device.
The following table lists the scenarios where the File Comparison feature is used and the main steps that ar performed.
Following this is an overview of the feature screens and examples.
This will display the latest two text backup files from the selected device, side-by-side, with their differences highlighted. See
the following figure.
Differences are indicated by highlighting text. Plain text shows lines that are the same in both files. Red text shows lines on
the left which are not on the right while blue shows lines on the right which are not on the left. Missing lines are padded with
blanks. If a line is simply modified, it shows up red on the left and blue on the right. Extra lines on the left are red and
corresponding lines on the right are padded with blanks. Extra lines on the right are blue and corresponding lines on the left
are padded with blanks.
When the user enters other files into the file-selection boxes at the bottom of the display (explained below), they will not
take effect until the Diff button is pushed. Therefore the bottom file names may not match the displayed data.
Note: If the devices are set to create backups on a schedule, a large number of backup files may be created. The administrator
should check the backup/device directories and delete any files that are not needed.
• No files found in user’s subdirectory - When brought up from Config File Management, config files are searched for in the
user's config file subdirectory instead of the backup directory. This message is displayed if no files are found for the device
in the user's subdirectory.
• Rejection of binary file - This application has made a best effort to recognize and then reject binary files which are not
valid for text file comparison.
• Device Backup/Restore stores iMAP configurations as binary databases - These files are not valid for text file comparison.
Config File Mgmt, however, can upload text config files for iMAP devices starting at release 3.0 and these files are
available for text file comparison, however Config File Mgmt does not provide recurrent backups, so each file has to be
uploaded on demand.
Using this option allows the administrator to perform the discovery immediately and not have to wait for the 24-hour
Discovery interval. Any changes made to the iMG/RG, such as profile changes, will be made and reflected in the iMG/RG
node in the Network Inventory view as well as the Triple Play Service Management Form.
Note: The user can also right click on an individual iMG/RG and perform a rediscovery using the RGMgmt VLAN.
Note: For iMGs attached to AlliedWare Plus devices, iMGs will be discovered as long their management IPs haven't aged out of the
router's ARP table. In the rare case where the ARP table has not been refreshed, you can use Add Network to rediscover all of
the iMGs, or Add Node to discover by specific IP(s).
12.5.10 Manage/Unmanage
To toggle between having the AlliedView NMS monitor the device choose UnManage (or if the device is not being managed,
Manage). This will repoll the device and updated all related information.
ADSL16B The NMS does not validate matching annexes for the non-
annexed version of the ADSL24 card.
ADSL16C
ADSL24
ADSL24A/B
ADSL48A/B
ADSL48B
ADSL24AE
FE FE10
FX FX10, FX20 FX10 and FX20 cards support customer cutover to the
GE24BX and GE24SFP cards. See "FX to GE" on page 354.
VDSL VDSL24A The annex of the destination card must match the source card
VDSL24B for all ADSL and VDSL cards.
12.7.2 Restrictions
The following restrictions apply:
• Only provisioned ports can be cut over.
• Customer cutover involves interaction, and cannot be scheduled or executed from a task.
• You cannot cut over interface types with non-transferable or context-sensitive parameter settings. Interfaces of this type
include:
• CES ports, which depend on card IP configuration and PSPAN configuration
• NTE ports, which depend on PPP and DS1/DS0 configuration
• POTS ports
• You can only cut over ports of the same interface type, such as ADSL to ADSL, to ensure source port parameter settings
map to destination port parameter settings.
• To ensure parameter compatibility, customer cutover is restricted to destination ports on devices running the same or
higher version of software as the source device, and for ADSL and VDSL, the same annex (A, B, or C).
• When the new ports are provisioned, they are initially provisioned with the port profile. This ensures the creation of
classifiers as well as parameters that may not be present on the source card and are introduced by an upgraded card.
• The cutover must occur within the same Access Island. The NMS assumes the VLAN configuration is unchanged.
12.7.4 FX to GE
The NMS supports customer cutover from FX10 or FX20 cards to either the GE24BX card on iMAP devices or the
GE24SFP card on SBx3100 devices. When you cut over an iMG from an FX to a GE card, the iMG may or may not support
the 1000 Mbps speed the GE card supports (depending on the iMG). To minimize potential iMG downtime in case the iMG
does not support the higher speed, the NMS ignores the port profile and automatically sets the following parameters on GE
interfaces during the cutover:
• autonegotiation=OFF
• speed=100Mbps
• duplex=FULL
If these settings do not match the port profile for the GE interfaces, the next time the NMS discovers the device it flags the
settings as mismatched. To modify the settings after the cutover, you can reapply the port profile or view the device and
modify the settings.
6. The Dest column lists the destination ports. If the default port is not the correct port, select the port in the Dest column,
then select a new port from the drop-down list.
7. Select all of the rows and click Provision Destination. The NMS validates the the source and destination ports and
displays the status of the transfer as the task completes.
Card Management is for iMAP and SBx3100 devices. You can view all cards in a device and configure each card. The Card
Management table updates in real-time as changes occur.
You can perform the following tasks with Card Management:
• Using Card Management
• Creating a Card
• Enabling a Card
• Disabling a Card
• Restarting a Card
• Destroying a Card
• Downloading Card Software
• Viewing Recent Commands
• Viewing Card Details
• PAC24AH
• PAC24C
• SHDSL24
• CES8
• GE8
• GE24BX
• EPON2
• VDSL24A
• VDSL24B
Network modules:
• GE3
• GE4
• NTE8
• GE2RJ
• GE8
• XE1
• XE1S
• XE6
Control modules:
• CFC100
• CFC100GX
• CFC56
• CFC24
• CFC12
• Go to Network Inventory > Nodes. In the Nodes screen, select the device.
2. Go to Operations > Provision > Card Management. The Card Management window appears.
Field Description
Device Name The name of the device.
Slot The slot in the device that contains the card.
Card Type The type of card. See Supported Cards.
Field Description
Status The current status of the card displayed as
<Administrative State>-<Operational State>-<Status>
Administrative State - Reflects whether the card is UP (available for service) or Down. You
control the Administrative State by enabling or disabling the card.
Operational State - UP (providing service) or Down. The Operational State is dependent on
the Administrative State as follows:
• If the Administrative State of a card is UP, the Operational State will be UP if the card/
port can provide service.
• If the Administrative State is Down, the Operational State will always be Down.
Status - The current status of the card as Online, Offline, Not Installed, Degraded or Failed.
Current Load The load currently in the card’s flash memory.
Preferred Load The primary load that the card will use when it restarts.
Profile Shows whether the card is in Auto-Provisioning or Manually Provisioned mode. See Overview
of Provisioning Data, Profiles, and Card States for a description of provisioning modes.
View Details Displays the current attributes of the type card. Refer to Overview of Provisioning Data,
Profiles, and Card States.
Download Views the files currently on the FLASH memory of the cards and allows files to be deleted or
downloaded. The available load can then be downloaded using the Download button. This
button is also available on the Card Details window. Refer to Controlling Card Software
(Download and Restart).
5. In the Type drop-down list, select the type of card you want to provision. The types of cards available will depend on the
device.
6. In the Profile drop-down list, select Manual or AutoProv. If you select AutoProv for a card that is not installed yet the
card will automatically provision when you insert it in the slot.
Note: When you select AutoProv for the Profile the rest of the fields in the Create Card window are grayed out.
7. If you selected Manual for the Profile, in the Admin State drop-down list, select Up or Down for the Administrative State.
• Up - The card is automatically enabled and will attempt to go into service. When the card is in service its Operational
State will change to UP.
• Down - The card is created and disabled.
8. If you selected Manual for the Profile, in the Preferred Load drop-down list, select the software load that will load when
the card restarts. In most cases the preferred load should be the same as the current running load. This option is only
available for cards that utilize a software load.
9. The following cards have additional settings:
• CES8 and NTE8 - In the Ports Type drop-down list, select DS1 or E1 as the port type.
• POTS24 - In the POTS Protocol drop-down list, select MGCP or SIP as the POTS protocol.
• SHDSL24 - In the Annex Type drop-down list, select A or B.
10. Click Create to create the card. The Card Management window is updated with the new card.
3. Select one or more cards you want to restart. The cards must be provisioned and physically present to restart.
4. Click Restart Card(s), then click Yes to confirm the action and restart the cards.
Field/Button Description
Device The device name and the slot number for the card (0 or 1 for the iMAP 9400, 10 or 11
for the iMAP 7700.
Admin. State If UP, the GE3 is capable of providing service. If DOWN, can Run Diags.
Oper. State The GE3 is providing service. This state is not controllable but depends on the Admin.
State.
Status The current state of the card. States can be static or dynamic (transition of state such as
Initializing or Running Tests).
Profile The template for provisioning data. The default is AutoProv. If the blank pull-down is
chosen, there is no profile (manually provisioned).
Field/Button Description
Modify Activated when the Profile is changed.
Disable Disables the card. Active only when the Admin State is UP.
Enable Enables the card. Active only when the Admin State is DOWN.
Restart Reboots the card. For the GE1, there is no software load.
Run Diags Runs diagnostics. Active only when the Admin state is DOWN, so must Disable first.
Field/Button Description
Device The device name and the slot number for the card (5-11 for the iMAP MAP 9400, 0-7, 14-21
for the iMAP MAP 9700 in duplex mode.
Admin. State If UP, the ADSL is capable of providing service. If DOWN, can Run Diags.
Oper. State The ADSL is providing service. This state is not controllable but depends on the Admin. State.
Status The current state of the card. States can be static or dynamic (transition of state such as
Initializing or Running Tests).
Profile The template for provisioning data. The default is AutoProv. If the blank pull-down is chosen,
there is no profile (manually provisioned).
Preferred Load This is the software that will load when the card restarts. In normal operation this should be
the same as the running load. This is used during software upgrades.
Temporary Load This is software that will load the next time the card restarts, and is part of the software
upgrade process.
Running Load The software that is currently on the FLASH of the card.
Modify Activated when the Profile, Preferred Load, or Temporary Load is changed, is changed.
Disable Disables the card. Active only when the Admin State is UP.
Enable Enables the card. Active only when the Admin State is DOWN.
Restart Reboots the card. The load used will be the Running Load unless the preferred or temporary
load has been specified, such as during an upgrade.
Run Diags Runs diagnostics. Active only when the Admin state is DOWN, so must Disable first.
Download‘ Brings up the Download Software window. Refer to Controlling Card Software (Download and
Restart).
• CFC200
CFC cards can be in either simplex or duplex mode. To view a CFC card in simplex mode:
1. In the Physical Network screen, select the device.
2. Go to Operations > Provision > Card Management to bring up the Card Management form.
3. Select the card you want to view and click View Details. The Card Details window appears.
Field/Button Description
Device The device name and the slot number for the card.
Admin. State If UP, the CFC is capable of providing service. In duplex mode both CFCs should be UP. If
DOWN, can Schedule Diags.
Oper. State The CFC is providing service. The operational state depends on the Admin. State. In duplex
mode both CFCs should be UP.
Status The current state of the card. States can be static or dynamic (transition of state such as
Initializing or Running Tests). In normal operation CFC cards should be ONLINE for both
simplex and duplex.
Profile The profile used to provision the card. The only selection is manual, since when a profile for
a card type is set to AutoProv, the card will automatically provision itself when inserted in
that slot.
Preferred Load This is the software that will load when the card restarts. In normal operation this should be
the same as the running load and includes the software that will download to the other
cards. This load will be different during software upgrades.
Temporary Load Software that will load the next time the card restarts. This is part of the software upgrade
process.
Alternate Load An alternate load file.
Running Load The software that is currently in the card’s flash memory. For duplex CFCs in normal
operation, the loads should be the same.
Field/Button Description
Diags. Result The status and results of diagnostics set by using the Schedule Diags. button. For an iMAP in
simplex mode, these are run with the card in service.
Diags Schedule States whether the Schedule Diags. button has been used to schedule diagnostics on the
active (simplex) or inactive (duplex) CFC card.
Modify Activated when the Profile, Preferred Load, or Temporary Load is changed.
Disable Disables the card. Available only when the Admin State is UP. In duplex mode, you cannot
disable the ACTIVE CFC.
Enable Enables the card. Available only when the Admin State is DOWN.
Restart Reboots the card. The load used will be the Running Load unless the preferred or
temporary load has been specified, such as during an upgrade.
Schedule Diags. Schedules diagnostics. Active only when the Admin state is DOWN, so must Disable first.
Download Brings up the Download Software window. Refer to Controlling Card Software (Download
and Restart).
Swap Activity Available on the ACTIVE CFC only. Swaps activity from one CFC to the other. For a
description of what is involved when you swap CFC activity, see the Software Reference for
iMAP Series Switches.
Field/Button Description
Device The device name and the slot number for the card.
Admin. State If UP, the FE10 is capable of providing service. If DOWN, can Run Diags.
Oper. State The FE10 is providing service. This state is not controllable but depends on the Admin.
State.
Status The current state of the card. States can be static or dynamic (transition of state such as
Initializing or Running Tests).
Profile The template for provisioning data. The default is AutoProv. If the blank pull-down is
chosen, there is no profile (manually provisioned).
Preferred Load This is the software that will load when the card restarts. In normal operation this should
be the same as the running load. This is used during software upgrades.
Temporary Load This is software that will load the next time the card restarts, and is part of the software
upgrade process.
Running Load The software that is currently on the FLASH of the card.
Field/Button Description
Modify Activated when the Profile is changed.
Disable Disables the card. Active only when the Admin State is UP.
Enable Enables the card. Active only when the Admin State is DOWN.
Restart Reboots the card. For the FE10, there is no software load.
Run Diags Runs diagnostics. Active only when the Admin state is DOWN, so must Disable first.
Field/Button Description
Device The device name and the slot number for the card.
Admin. State If UP, the POTS24 is capable of providing service. If DOWN, can Run Diags.
Oper. State The POTS24 is providing service. This state is not controllable but depends on the
Admin. State.
Status The current state of the card. States can be static or dynamic (transition of state such as
Initializing or Running Tests).
Profile The template for provisioning data.
Note: The profile is Manually Provisioned. Refer to the above Note.
POTS Protocol Whether the card is using MGCP or SIP.
Note: If the card is enabled, this pull-down is not available.
Preferred Load This is the software that will load when the card restarts. In normal operation this should
be the same as the running load, and includes the software that will download to the
POTS24 card. This load will be different during software upgrades.
Note: Loads that support SIP have the label POTS24S (versus POTS24).
Temporary Load This is software that will load the next time the card restarts, and is part of the software
upgrade process, so this is usually empty.
Running Load An alternate load file.
Modify Activated when the Profile is changed.
Disable Disables the card. Active only when the Admin State is UP.
Enable Enables the card. Active only when the Admin State is DOWN.
Restart Reboots the card. If there is a Temporary Load, this will be loaded onto the card.
Run Diags Runs diagnostics. Active only when the Admin state is DOWN, so must Disable first.
Download Brings up the Download Software window. Refer to Controlling Card Software
(Download and Restart).
Field/Button Description
IP
VLAN vid (2..4094): Specification of the interface in terms of VLAN id. A logical representation of a port. An
id must be a VID number
IP Address IP address of the interface.
Subnet Mask Subnet mask of the interface.
Gateway Optional gateway address for the interface.
DNS Server Domain name server (DNS) for the card. Use only when the MGCP Call Agent is a DNS
host name.
Domain Name Optional domain name for the interface.
Field/Button Description
RTP
DSCP Settings The DSCP (Differentiated Services Code Point, RFC 2474) value for RTP packets
transmitted from the POTS24 card.
The default value is 46.
VLAN P bits (0..7) The 802.1p priority bit setting for RTP packets transmitted from the POTS24 card.
The default value is 6.
Modify Activated when a value has been changed. WHen selected, makes the changes to the card.
Clear Entry Fields Clears all changed values
Download Brings up the Download Software window. Refer to Controlling Card Software
(Download and Restart).
Field/Button Description
Profile The profile that has been applied to the card.
Call Agent (or None) The IP address of the network call agent that the card will communicate with.
Call Agent Profile Generic or vendor-specific call agent profile.
TABLE 13-7 POTS24 Card Details - Protocols Tab for MGCP (Continued)
Field/Button Description
Disconnect Threshold Also known as Max2 in RFC 3435, this is the number of unacknowledged packet
retransmissions towards the call agent before beginning a disconnect procedure if there
are no other call agent addresses available.
Once this threshold is exceeded, the POTS24 card will be in the FAILED state.
The default value is 7.
Suspicion Threshold Also known as Max1 in RFC 3435, this is the number of unacknowledged packet
retransmissions toward the call agent that are allowed before suspecting that the call
agent is unreachable, which triggers the MGCP application running in the POTS24 card to
use alternate addresses for the agent or initiate a new DNS query to verify the call agent
address.
The default value is 5.
Retransmit Delay The initial delay before any packet retransmission is done towards the call server.
(100..4000 ms) The default value is 200 milliseconds.
Max. Retransmit Delay Also known as RTO-MAX in RFC 3435, this is the maximum amount of time to wait for
(100..4000 ms) an acknowledgement from the call agent before retransmitting a packet.
The default value is 4000 milliseconds.
UDP Port Specifies the UDP (User Datagram Protocol) port the MGCP application in the
POTS24 card will use for receiving packets.
The default value is 2427.
DSCP Settings (0..63) The DSCP (Differentiated Services Code Point, RFC 2474) value for MGCP packets
transmitted from the POTS24 card
The default value is 34.
VLAN P bits (0..7) The 802.1p priority bit setting for MGCP packets transmitted from the POTS24 card.
The default value is 5.
Modify Activated when a value has been changed. WHen selected, makes the changes to the card.
Clear Entry Fields Clears all changed values
Download Brings up the Download Software window. Refer to Controlling Card Software
(Download and Restart).
Field/Button Description
MGCP Statistics Statistics supported for the MGCP application running on the POTS24 card are defined in
the ATN SNMP Enterprise MIB.
SentMessages: The total number of messages sent. This includes both commands and
responses.
RcvdMessages: The total number of messages received. This includes both commands and
responses.
LostMessages: The number of command messages for which responses were not
received.
CmdsRetransmitted: The number of commands that had to be retransmitted.
RcvdBadVersionMessages: The number of messages received that were discarded due to
the presence of an unsupported MGCP version number in the message.
UnrecognizedMessages: The number of messages received that were discarded because
they were unrecognizable as MGCP messages.
Interface Statistics These are the statistics from the Interface MIB. Refer to the Software Reference for iMAP
Series Switches.
RMON Statistics These are the standard Ethernet-based statistics
Name Defined in the High Capacity RMON MIB (RFC3273 - etherStatsHighCapacityTable)
High Capacity Counts Name of high capacity counts, for example 63 Octet packets is the total number of
packets (including bad packets) received that were 64 octets in length (excluding framing
bits but including FCS octets).
Overflow The number of times the associated counter has overflowed. In iMAP MAP 4.1 these
should always be 0.
Reset MGCP Statistics Resets the MGCP statistics to 0.
Enable RMON Statistics Activated when the RMON statistics are disabled.
Disable RMON Statistics Activated when the RMON statistics are enabled.
Reset RMON Statistics Resets the RMON statistics to 0.
Download Brings up the Download Software window. Refer to Controlling Card Software
(Download and Restart).
Field/Button Description
SIP Statistics Statistics supported for the SIP application running on the POTS24 card are defined in the
ATN SNMP Enterprise MIB.
Invites Received / Retransmitted: The total number of invite messages received and
retransmitted.
Non-Invites Received / Retransmitted: The total number of non-invite messages sent and
retransmitted.
Responses Received / Retransmitted: The number of responses messages received and
retransmitted.
Invites Sent / Invite Retransmits Sent: The total number of invite messages sent and
retransmitted.
Non-Invites Sent / Non-Invite Retransmits Sent: The total number of non-invite messages
sent and retransmitted.
Responses Sent / Responses Retransmit Sent: The number of responses and
retransmitted Responses sent
Interface Statistics These are the statistics from the Interface MIB. Refer to the Software Reference for iMAP
Series Switches.
RMON Statistics These are the standard Ethernet-based statistics
Name Defined in the High Capacity RMON MIB (RFC3273 - etherStatsHighCapacityTable)
High Capacity Counts Name of high capacity counts, for example 63 Octet packets is the total number of
packets (including bad packets) received that were 64 octets in length (excluding framing
bits but including FCS octets).
Overflow The number of times the associated counter has overflowed. These should be 0.
Reset SIP Statistics Resets the SIP statistics to 0.
Enable RMON Statistics Activated when the RMON statistics are disabled.
Disable RMON Statistics Activated when the RMON statistics are enabled.
Reset RMON Statistics Resets the RMON statistics to 0.
Download Brings up the Download Software window. Refer to Controlling Card Software
(Download and Restart).
13.28 GE24POE
The GE24POE card is unique to the SBx3100, and can be loaded in any slot in the SBx3100 chassis except for the CFC slots.
Refer to Power Over Ethernet (POE) Management on SBx3100.
Field/Button Description
Available Loads This panel lists the loads available and their size. Selecting a load activates the Download
button to allow a file to be downloaded. Once a file is downloaded, the user returns to the
Card Details window and presses the Restart button to reboot the card and make the
downloaded file the current load.
Note: Before downloading a file, ensure there is enough space on the card to accept
the new load. Otherwise an error message will appear. Also, the user must have
the Preferred Load or (usually for upgrade) Temporary load set on the card to
make the card load with the desired load file.
Controlling files requires a knowledge of how software loads are controlled on the CFC
and Service Module (SM) cards. In most cases the SM loads are on the CFC cards, and when
the CFC restarts the SM loads are downloaded to the SM cards. Refer to the Software
Reference for iMAP Series Switches for more details.
Note: The NMS cannot distinguish annex A from annex B for ADSL24 cards (It can
distinguish between them for ADSL16 however and it doesn't need to for other
card types). Users need to know which annex their cards are. (Files have to be
downloaded before they will appear in the preferred load and temporary load
picklists.) The annex a file is adsl24_*.tar and the annex b file is
adsl24xb_*.tar.
Files on Device This panel lists the files currently on the device and their size. Below this list is the space still
available in FLASH memory. Clicking on a file activates the Delete Device File button and,
after a confirmation, deletes the file from the FLASH memory.
Delete Device File This deletes a file that has been highlighted in the Files on Device panel.
Deleting a file from FLASH requires knowledge of the status of files (Preferred, Temporary),
and must be coordinated with the Details window to ensure the correct load is used when
the card restarts.
Download This downloads a file that has been highlighted in the Available Loads panel.
In Automatic Provisioning Mode, when hardware is discovered in a slot where there is no prior provisioning, the cards and
ports are automatically provisioned. This discovery occurs when:
• The card is inserted into a slot
• The card is already inserted and the device reboots
• The system mode is changed from manual to automatic
Note: The default mode for the iMAP devices is Automatic Provisioning Mode, and the mode can be changed through the Card
Details screen.
A profile is a template that contains the provisioning data. There is one only one profile, called AUTOPROV (for Auto-
provisioning), which contains at first the factory defaults, but any or all attributes can be changed. This is the profile used for
the Auto Provisioning Mode.
When the system is first initialized, the system’s PROVMODE is set to AUTO. Profiles can then be created, viewed, and set.
Note: Modification of a profile does not change the attributes of a card/port that has already been provisioned.
Administrative and Operational States determine whether the card or port is available for service and if so whether service
is being provided;
• The Administrative State is controlled by the user and can be set to either UP (available for service) or DOWN (Not
available for service). Control of this state is through the Create Card window.
• The Operational State is either UP (providing service) or DOWN (not providing service). This state is not user
controllable but does depend on the Administrative State:
• If the Administrative State of a card is UP, the Operational State will be UP if the card/port can provide service.
• If the Administrative State is DOWN, the Operational State will always be DOWN.
Note: The one exception to these rules is the FC7 and FM7, which are always in an operational state of UP.
Port Management for iMAP devices provides a of a device’s configuration in table format. The table is updated in real-time as
you make changes to the device’s ports. You can provision a device’s ports directly from the Port Management window.
The following buttons always appear on the Port Management window:
• Recent Commands - Opens the Recent Commands window, a listing of the CLI commands and responses for the
previous operation in the Port Management application. The user has the option to copy this to a Clipboard and then
paste it into another file for record keeping.
• Close - Closes the window.
• Help - Opens the context-sensitive help file.
To access Port Management:
1. Do one of the following in the Network Objects panel:
• Go to Network Maps > Physical Network. In the Physical Network screen, select the device.
• Go to Network Inventory > Nodes. In the Nodes screen, select the device.
2. Go to Operations > Provision > Port Management. The Port Management window appears.
Field/Button Description
Device Name The name given to the device in the Managed Objects property table.
Port The slot.port in the iMAP device.
Type Allowed port types are ADSL, SHDSL, Ether-like, POTS, DS1, E1, VDSL, and ATMBOND.
Customer ID A unique ID to identify the port. For example, the subscriber’s telephone number.
For rules on DS1/E1 customer IDs, refer to "Circuit Emulation Service" on page 623.
Note: Do not use the asterisk (*) character in customer IDs. Customer IDs with * in the
string will not appear properly in searches.
Status The status of the port that follows from the boolean AND of the Administrative State and
Operational State (only if both are UP is the Status UP).
Provision New Enabled when you select a port that does not have a Customer ID. Opens the Provision New
Customer/Port Triple Play Customer form.
De-Provision Deletes the Customer ID and sets the Administrative State to DOWN. The status becomes
Customer/Port OFFLINE. This operation also sets the port back to the AutoProv settings, removes any
classifiers on the port, removes VCs 1-3 from the port, and sets the VLAN back to Untagged:1
Tagged None.
View/Modify Details Enabled when a port is selected. Opens the Port Management details form.
There are three versions of the Port Management window and Port Management details form:
1. View Only
• The Port Management screen excludes the Provision and De-Provision buttons.
• The Port Management details form excludes the fields/buttons that allow values or states to be changed.
2. Provision - The same as View Only, but includes the Provision and De-Provision buttons.
3. Setting - The same as Provision, but includes the fields/buttons that allow values or states to be changed.
Control of these versions is though the NMS Security Manager settings.
Note: Provisioning ports can involve defining the attributes of a single port or more than one port. With the CES8 and NTE8 card,
two ports are provisioned on the same form when configuring the two endpoints of a DS1/E1 connection. Provisioning dual
DS1/E1 ports is explained in more detail in "Circuit Emulation Service" on page 623 and "NTE8 Dual Circuit Provisioning" on
page 653.
Note: Although many types of ports can be provisioned, they are all done through the two forms that define the services for a port,
the Provision New Triple Play Customer Form, and the Provision New DS1/E1 Port Form, which can apply to the CES8 or the
NTE8. This section explains these form and their fields; for an overview of the panels and fields that are used for various
services, refer to "Customer Management" on page 615.
Note: For the ADSL48A card, the port numbers go from 0 to 47, and the card number remains at the lower slot number for ports
24 to 47.
Note: In the Port Management window, an AtmBond shows up as type “ATMBOND”. The bonded port does not appear in this
window.
FIGURE 14-3 Display Preferences for the Provision New Triple Play Customer Form
Preferences are on a per-client basis and are automatically saved. Unless you want to change which panels display in the
Provision New Triple Play Customer form, you do not need to reset them with each new session of the NMS.
Note: To provision the NTE8 efficiently, use this Provisioning Dialog; this will prevent errors that can occur when changing certain
attributes on the DS1 Port Management form.
The following figure shows the Port Management Form for a device and how the EPON ports are shown. The EPON2 port
is 5.0.
FIGURE 14-12 Port Management Form for Device with EPON2/ONU Ports
The user can then select Provision New Customer Port to bring up the Triple Play form, as shown in the following figure.
FIGURE 14-15 Example Status Form (POTS24 and Derived Voice using GenBand)
14.12 Add Derived Voice Line for GenBand (on Status Tab Form)
When the GenBand configuration is being used, the administrator can add a voice line immediately on the Status form by
clicking Add Genband Derived Voice Line. The following form appears:
6. Double-click the cell in the Registration Name column. Enter the registration name you want to use for the line. You can
use a combination of numbers, alphabetic characters, and the hyphen (-), underscore (_) and plus (+) characters. Other
special characters and spaces are not allowed.
7. Click Modify to save the changes to the line.
TABLE 14-5 Ether-like Port Management for iMAP Devices - General Tab
Field/Button Description
Admin. State/Status The Administrative State can be controlled and determines the Operational State.
Oper. State/Link State The ability of the port to provide service. The Administrative State must be up and
then the system determines if the port can provide service.
Port Up-Time Amount of time the physical interface has been in the UP-UP-Online state.
Status The status of the port that follows form the Administrative State and Operational
State. For meanings, refer to the Software Reference for iMAP Series Switches.
- ONLINE
- IN TEST
- FAILED
- OFFLINE
- DEPENDENCY
- DEGRADED
- NOT INSTALLED
- INITIALIZATION REQUIRED
- TERMINATING
Port Type For these Ethernet ports, Optical Fast Ethernet
TABLE 14-5 Ether-like Port Management for iMAP Devices - General Tab
Field/Button Description
Actual Flow Control Whether flow control is on, regardless of how it was provisioned.
Interface Profile Name The initial port profile name when the port was provisioned.
Broadcast State/Rate Whether storm control is enabled for broadcast traffic and the rate associated with it.
See Configuring Storm Control.
Multicast State/Rate Whether storm control is enabled for both known and unknown multicast traffic and
the rate associated with it. See Configuring Storm Control.
Unknown Multicast State/ Whether storm control is enabled for unknown multicast traffic only and the rate
Rate associated with it. See Configuring Storm Control.
Unknown Unicast State/Rate Whether storm control is enabled for unknown unicast traffic and the rate associated
with it. See Configuring Storm Control.
Aggregate Rate The percentage (rate) of operational bandwidth of the interfaces that will be usable by
all traffic types that have storm control enabled. See Configuring Storm Control.
Egress Filter Whether egress traffic filtering is enabled. Options are as follows:
- None
- Broadcast
- Unknown Unicast
- All
See Configuring Storm Control.
Profile The port profile that is applied to the device.
Description (Customer ID) An ID that can be given to uniquely identify the port.
Auto Negotiation Whether certain port attributes are auto-negotiated with the remote peer.
Flow Control The provisioned flow control.
Speed The configured port speed.
Duplex The configured duplex mode.
Actual Port Speed The measured port speed versus what was actually configured.
Actual Duplex Mode The duplex mode actually attained.
Egress Rate Limiter Whether egress rate limiting has been applied.
Untagged VLAN The VLAN that is applied if the packet has no VLAN id.
Tagged VLANs The VLANs that are allowed on the port (packet has one of the VLAN IDs).
Direction Whether the interface is towards the network or customer.
Modify Enables the any changes have been made to the settings, makes them
Clear Entry Fields Clears the writable fields of any values.
Disable Disable the port (after a confirmation window). This makes the overall state DOWN.
Enable Enable the port. This makes the overall state UP if the port can be brought into
service.
Alarms Brings up the Alarm view for the selected port.
Recent Commands Views the CLI commands and responses for the operations performed in the Port
Management application. This is the same for all tabs.
Close Closes the View Details application (the window as well as the tab). This is the same
for all tabs.
Note: The Autonegotiation, Flow Control, Speed, and Duplex Mode fields appear according to the port type. (FX has Flow Control,
GE has Autonegotiate and Flow Control, FE has Flow Control, Speed and Duplex Mode.
FIGURE 14-19 Ether like Port Management Window - Port Statistics Tab
TABLE 14-6 Provision Port Form for Port Management - Port Statistics Tab
Field/Button Description
RMON Statistics: Lists the standard RMON statistics. For an explanation, refer to the Software Reference
for iMAP Series Switches.
Interface Statistics: Lists the standard faults for an ethernet port. For an explanation of what these mean
and what actions to take (if any), refer to the iMAP Log / Troubleshooting Manual.
Enable Statistics If the port is UP, this button starts the collection of both RMON and Fault statistics.
Disable Statistics Discontinues the collection of both RMON and Fault statistics.
Reset Fault Statistics Resets to 0 the Fault Statistics
Reset RMON Statistics Resets to 0 the RMON statistics
Command History Views the CLI commands and responses for the operations performed in the Port
Management application. This is the same for all tabs.
Close Closes the View Details application (the window as well as the tab). This is the same for
all tabs.
FIGURE 14-20 Ether like Port Management Window - Port Thresholds Tab
TABLE 14-7 Provision Port Form for Port Management - Port Thresholds Tab
Field/Button Description
Name One of the RMON statistics
Interval Interval in number of seconds, from 2 to 3600 (one hour)
Rising Threshold The number at which an alarm/log is raised when the number is exceeded.
Falling Threshold The number at which an alarm/log is raised when the number falls above this number.
Note that only when this threshold is crossed can another Rising Threshold alarm be
raised when the number crosses the Rising Threshold.
Type The type of threshold to be defined:
- ABSOLUTE - The statistic must be reset before the threshold can be crossed again
and a log produced.
- CHANGE - The logs for thresholds are produced multiple times as the thresholds
are crossed. (See Falling Threshold above to understand how this works.)
Add Threshold Bring up the Add RMON Threshold to Port Form. The fields match what will be
displayed.
Modify Threshold Modify the values for an already created threshold.
Command History Views the CLI commands and responses for the operations performed in the Port
Management application. This is the same for all tabs.
Close Closes the View Details application (the window as well as the tab). This is the same
for all tabs.
FIGURE 14-21 Ether like Port Management Window - Device Data Collection Tab
TABLE 14-8 Provision Port Form for Port Management - Device Data Collection Tab
Field/Button Description
Interval The period of time in seconds statistics will be gathered for a bucket, from 2 to 3600
(one hour)
Buckets Requested The number of buckets that will be filled before the first bucket is overwritten, from 1
to 2700.
Buckets Granted The actual number of buckets the device allows.
Valid Whether the interval and bucket combination are valid. If they are, the column is
Valid.
Add Entry Add an interval and bucket combination row.
Modify Entry Modify a selected interval and bucket combination row.
Delete Entries Delete the selected entries.
Command History Views the CLI commands and responses for the operations performed in the Port
Management application.
Close Closes the View Details application (the window as well as the tab).
FIGURE 14-22 Ether like Port Management Window - Stats Graph Tab
TABLE 14-9 Provision Port Form for Port Management - Stats Graph Tab
Field/Button Description
Hidden Statistics: Statistics not added to the resulting graph
View Statistic: Enabled when a statistic is chosen form Hidden Statistics, clicking this button adds it
to the graph/
Hide Statistic: Enabled when a statistic is chosen form Graphed Statistics, clicking this button deletes
it from the graph/
Display The attribute that controls the display:
- Absolute Values
- Rate Per Second
- Million Per Second
Polling Interval: Current Polling Interval in seconds
New Interval: Sets a new interval for polling. This is set with the Reset Polling Interval button.
Enable Statistics Enables the graph for the statistics chosen.
Disable Statistics: Disables the graph
Add Historical Data from Adds the data collected previously from NMS port management
NMS:
Add Historical Data from Adds the data collected previously (buckets) from the device
Device:
Command History Views the CLI commands and responses for the operations performed in the Port
Management application. This is the same for all tabs.
Close Closes the View Details application (the window as well as the tab). This is the same
for all tabs.
TABLE 14-10 Provision Port Form for Port Management - IP Filters Tab
Field/Button Description
Rank The precedence of the classifier
Classifier Name The name of the classifier that has already been defined.
Field Match(es) The matching rules for the classifier.
Action(s) The actions to occur when there is a match
Port IP Filter Counters: The counter for packets set against this classifier
- Match Count
- Filter Count
- Policed Count
Add Classifier Bring up the Add Classifier to Port Form. The data filled classifiers are listed, and the
user can chose one of these and can define the precedence.
Delete Classifier Deletes the classifier from the port
Reset Counters Reset the counters to 0
Command History Views the CLI commands and responses for the operations performed in the Port
Management application. This is the same for all tabs.
Close Closes the View Details application (the window as well as the tab). This is the same
for all tabs.
Field/Button Description
Admin. State The Administrative State can be controlled and determines the Operational State.
Oper. State/Link State The ability of the port to provide service. The Administrative State must be up and then
the system determines if the port can provide service.
Port Up-Time Amount of time the physical interface has been in the UP-UP-Online state.
Status The status of the port that follows form the Administrative State and Operational State.
For meanings, refer to the Software Reference for iMAP Series Switches.
- ONLINE
- IN TEST
- FAILED
- OFFLINE
- DEPENDENCY
- DEGRADED
- NOT INSTALLED
- INITIALIZATION REQUIRED
- TERMINATING
Connection State The connection state, such as Idle or Showtime
Field/Button Description
Actual Line Std. The line standard that was actually chosen.
Actual Databoost Whether the DATABOOST feature has been implemented
Actual Line Type The line type that was actually chosen.
Actual Upstream/ The upstream/downstream rate that was actually attained.
Downstream Rate
Max. Attainable Upstream/ The possible upstream/downstream rate according to dsl type and mode.
Downstream Rate
Actual SNR (Near End/Far The signal-noise ratio for near end/far end that was actually attained.
End)
Actual Attenuation (Near The attenutation for near end/far end that was actually attained.
End/Far End)
Actual Output Power The output power achieved for near end/far end.
(Near End/Far End)
Actual Software Annex The Annex (A, B, or C) that is being used
Actual Power Mgmt State The state the interface is in for power reduction (Full On, Low Power, Idle)
Actual Power Mgmt Status Whether the power management feature has been activated for the interface
Actual Upstream INP The actual impulse noise protection value for upstream
Actual Downstream INP The actual impulse noise protection value for downstream
Profile Which profile is being used (AutoProv or none, which uses default values).
Description (Customer ID) An ID that can be given to uniquely identify the port. In most cases, the subscriber’s
telephone number is used. Refer to "Naming Convention for Customer IDs (Triple Play
Form)" on page 780.
Max. Upstream Rate The maximum upstream rate that is provisioned.
Min. Upstream Rate The minimum upstream rate that is provisioned.
Max. Downstream Rate The maximum downstream rate that is provisioned.
Min. Downstream Rate The minimum downstream rate that is provisioned.
Target SNR Margin Specifies the target signal-to-noise ratio (in dB) to achieve on an ADSL port.
ADSL Line Type Specifies the ADSL line type as per ITU G.992. Allowed values are FAST and
INTERLEAVE, although FAST is not allowed if the MODE is GLITE. Refer to the iMAP
User’s Guide, Section 4.
ADSL Mode Specifies the ADSL line mode standard. Refer to the Software Reference for iMAP Series
Switches.
ADSL Databoost Whether the Databoost feature has been provisioned
Line Quality Monitor The level the line quality monitor has been set at. Refer to the Software Reference for iMAP
Series Switches.
Max. Interleave Delay Specifies the maximum interleave delay in milliseconds used when the ADSL linetype is set
to INTERLEAVE. Refer to the Software Reference for iMAP Series Switches.
Echo Cancel Specifies whether echo cancellation is utilized on ADSL ports running G.DMT mode as per
ITU-T. Refer to the Software Reference for iMAP Series Switches.
Max. # of Learned MAC Depending on feature provisioning, the number of MAC addresses that can be learned (or
Addresses Off)
Minimum Upstream INP Sets the minimum impulse noise protection value for upstream.
Minimum Downstream INP Sets the minimum impulse noise protection value for downstream.
Field/Button Description
Power Management Changes the current power management state.
Power Mgmt Reentry The amount of time that must elapse before re-entering the Low Power state after a
Delay transition to the Full On state. (Should not be set to a value less than 120 seconds)
Power Mgmt Trim The maximum aggregate transmit power reduction (trimming) that can be performed with
each power trim operation in the Low Power state.
Power Mgmt Trim Delay The amount of time that must elapse before an additional reduction (trimming) of power
occurs in the Low Power state.
Low Power Min Rate The minimum net data rate for the bearer channel while operating in the Low Power
state.
The value for LOWPOWERRATE must be between MAXDOWNSTREAMRATE and
MINDOWNSTREAMRATE
Max. Upstream Nominal VDSL/ADSL power spectrum density limits are defined by the band plan and determine
PSD this value.
Max. Downstream VDSL/ADSL power spectrum density limits are defined by the band plan and determine
Nominal PSD this value.
Modify Enabled when a value in New Value field has been entered, modifies the attributes
according to the updated values.There is an error message if a value is invalid.
Clear Entry Fields Clear any fields that have been datafilled but not yet Modified
Enable Enabled if the port is in an Administrative State of DOWN, enables the port and so brings
the Administrative State to UP. If possible (for example, the ADSL card must be enabled),
the Operational State will change to UP.
Disable Enabled if the port is in an Administrative State of UP, disables the port and so brings the
Administrative State to DOWN. The Operational State will also change to DOWN.
Alarms Invokes the Alarm table of the Fault Management Object.
The values on this form can be modified as follows:
Note: This requires that the port be disabled, which will interrupt service on the port.
1. Click Disable to disable the port. A dialog box will appear warning you that service on the port will be interrupted. If you
wish to proceed, click Yes.
2. Modify the information as needed.
3. Click Modify to save the changes.
4. Click Enable to re-enable the port.
For an ADSL Bonded port, the General Tab of the Port Details window contains information about the ATMBond. Each
ADSL port that belong to the bond group has its own tab. There is the button on the panel “Add Bonded Port.”, to allow
adding another port to the group. This button is disabled when the group is full. Refer to the following figures.
Note: Currently only two pairs can be bonded, but a group can be created with only one pair.
figu
FIGURE 14-29 ADSL General Tab with ATM Bond - Single Port Attributes
FIGURE 14-30 ADSL General Tab with ATM Bond - Single Port Rate Attributes
Field/Button Description
Current VC The current values for all attributes of the VC configuration. These fields are view-only.
Configuration
New VC Configuration Initially this has a copy of the current configuration, but the fields are editable.
The best strategy to fill in a new VC is to click on the Exists tic box and the appropriate
values for the other columns are filled in.
Valid Attribute Values Guidelines for valid attributes values or ranges.
Modify Makes the changes made in the New VC Configuration Fields. Error messages appear if
there are any invalid values.
Reset Changes Reverts to the current VC configuration.
Field/Button Description
Port IP Filters Rank - Also called precedence, it is the rank a precedence a classifier has in a port. The highest
rank is 1, and then in descending order. IP Filtering should have a precedence of 51-69.
Classifier Name - This is the name given to the grouping of IP addresses or range of addresses.
Field Match(es) - The range of IPSOURCE addresses is specified as a subnet and a mask.
Action(s) -Perform actions when the incoming packet address matches what is set in the
classifier:
- DROP - Discard the packet.
- FORWARD - Allow the packet to be forwarded.
- COUNT starts the counting of the actions (DROP or FORWARD) for the classifier(s).
Port IP Counters Match Count
Filter Count
Policed Count
Add Classifier Associates a classifier with a port and give it a precedence.
Note: A port cannot have more than one rank number, even if the rank numbers belong
to different classifiers.
Delete Classifier Delete the classifier for the port.
Reset Counters Reset all the counters on the port to 0.
Field/Button Description
Interface Statistics Counts of input and output octets as well as errored input and output packets.
RMON Statistics RMON error statistics
QOS Statistics Shows the number of packets sent and dropped for each queue.
Enable RMON If disabled, enables the statistics
Statistics
Disable RMON If enabled, disables the statistics
Statistics
Reset RMON Resets the RMON statistics to 0.
Statistics
Reset QOS Statistics Resets the QOS statistics to 0.
Field/Button Description
Hidden Statistics These are all the ATU-C and ATU-R statistics; form this set the ones to display are chosen.
Graphed Statistics These are the ATU-C and ATU-R statistics that are currently displayed.
Polling Interval This is the current polling interval, in seconds.
New Interval This is used when changing the polling interval. When a new one is entered, the Reset Polling
Interval Button is enabled, to allow the interval to be changed.
Add Historical Data Include ADSL data that has been previously saved on the NMS
from NMS
Add Historical Data Include ADSL data that has been previously saved from the historical data (buckets) of the
from Device device
Save Stat. List Take a snapshot of the statistics chosen. A window appears to input a name.
Field/Button Description
Load Stat. List Load a previously saved statistic list
Delete Stat. List Delete a statistic list that is chosen in the Saved Statistics List panel
• VCs/VLANs
• Video
• DHCP
• FDB
• PMON Thresholds
• Device Data Collection
• IP Filters
Field/Button Description
WireMode Whether the port is 2-wire (Normal) or 4-wire (Bonded)
Admin. State/Status The Administrative State can be controlled and determines the Operational State. For a
bonded pair, the Admin State determines the Oper. State of both wire pairs.
Oper. State/Link State The ability of the port to provide service. The Administrative State must be up and then
the system determines if the port can provide service.
It is possible, in a bonded configuration, that one wire pair will be Up while the other pair
is Down. The line can still provide service, although at a lower rate. The user should check
for events/logs and fix the problem.
Port Up-Time Amount of time the physical interface has been in the UP-UP-Online state.
Status The status of the port that follows form the Administrative State and Operational State.
For meanings, refer to the Software Reference for iMAP Series Switches.
- ONLINE
- IN TEST
- FAILED
- OFFLINE
- DEPENDENCY
- DEGRADED
- NOT INSTALLED
- INITIALIZATION REQUIRED
- TERMINATING
Wire Mode Normal (2-wire) or Bonded (4-wire)
Connection State The connection state, such as Idle or Showtime
Actual Connect Rate The data rate that was actually attained.
Field/Button Description
Actual Receiver Gain Receiver Gain in db.
Actual SNR (STU-C, The signal-noise ratios that were actually attained.
STU-R)
Actual Attenuation The attenutation that was actually attained.
(STU-C, STU-R)
Actual Output Power The power outputs that were actually attained
(STU-C, STU-R)
PSD Mask PSD (Power Spectral Density) is a measure of how power in a signal changes over
frequency, and is expressed in dBms per Hz bandwidth. Values for SHDSL16 are:
Symmetric Region 1 (Annex-A)
Symmetric Region 2 (Annex-B)
Tip Ring Configuration Values are Normal and Reversed
Profile Which profile is being used (AutoProv or none, which uses default values).
Description (Customer An ID that can be given to uniquely identify the port. In most cases, the subscriber’s
ID) telephone number is used.
Max. Rate The maximum upstream rate that is provisioned.
Min. Rate The minimum upstream rate that is provisioned.
Target SNR Margin Specifies the target signal-to-noise ratio (in dB) to achieve on an ADSL port.
Line Quality Monitor Specifies the ADSL line type as per ITU G.992. Allowed values are FAST and
INTERLEAVE, although FAST is not allowed if the MODE is GLITE. Refer to the iMAP
User’s Guide, Section 4.
VPI Specifies the value for the ATM virtual path identifier on an ADSL port. Refer to the iMAP
User’s Guide, Section 4.
VCI Specifies the value for the ATM virtual channel identifier on an ADSL port. Refer to the
iMAP User’s Guide, Section 4.
MAC Learn Limit Depending on feature provisioning, the number of MAC addresses that can be learned (or
Off)
Modify Enabled when a value in New Value field has been entered, modifies the attributes
according to the updated values.There is an error message if a value is invalid.
Enable Enabled if the port is in an Administrative State of DOWN, enables the port and so brings
the Administrative State to UP. If possible (for example, the ADSL card must be enabled),
the Operational State will change to UP.
Disable Enabled if the port is in an Administrative State of UP, disables the port and so brings the
Administrative State to DOWN. The Operational State will also change to DOWN.
Alarms Invokes the Alarm table of the Fault Management Object.
FIGURE 14-44 Example POTS24 Voice Configuration Tab - POTS (SIP Protocol)
Field/Button Description
Admin. State/Status: The Administrative State can be controlled and determines the Operational State.
Oper. State/Link State: The ability of the port to provide service. The Administrative State must be up and
then the system determines if the port can provide service.
Port Up-Time Amount of time the physical interface has been in the UP-UP-Online state.
Field/Button Description
Status: The status of the port that follows form the Administrative State and Operational
State. For meanings, refer to the Software Reference for iMAP Series Switches.
- ONLINE
- IN TEST
- FAILED
- OFFLINE
- DEPENDENCY
- DEGRADED
- NOT INSTALLED
- INITIALIZATION REQUIRED
- TERMINATING
POTS Protocol Whether the card is using MGCP or SIP protocol
Profile: Profile used that pre-populates many of the port attributes.
Description (Customer ID): Customer ID for the port. Refer to "Naming Convention for Customer IDs (Triple
Play Form)" on page 780.
Prioritized Codecs Specifies the Codec capabilities advertised to the Call Agent:
- PCMU: G.711 mu law (specified in CCITT/ITU-T recommendation G.711)
- G726-32: CCITT/ITU-T recommendation G.726
- T38 - Use this mode to digitize the media for reliable transmission over IP networks
- All: all of the above
Min. Packetization: The minimum number of milliseconds of voice data that can be encoded in a data
packet. This value is advertised to the Call Agent. The default is 20 msec.
Note: To support Call Waiting with Caller ID, this attribute should be set to 10
milliseconds.
Max. Packetization The maximum number of milliseconds of voice data that can be encoded in a data
packet. This value is advertised to the Call Agent. The default is 20 msec.
Note: To support Call Waiting with Caller ID, this attribute should be set to 10
milliseconds
Jitter Buffer Delay: Used with jitter buffering, this is the amount of time that the first packet is delayed.
This delay is then used to smooth out jitter on subsequent arrivals.
The default is 30 msec
Jitter Buffer Mode: The jitter buffer mode. A jitter buffer is used to compensate for the jitter in packet
arrival and out-of-order packets. A large jitter buffer causes increase in the delay and
decreases the packet loss. A small jitter buffer decreases the delay but increases the
packet loss.
DYNAMIC - This mode minimizes delays and is the default.
Voice Activity Detection: Specifies whether to advertise Voice Activity Detection (VAD) capability to the Call
Agent. VAD is used for silence suppression, and will reduce the transmission rate
during inactive speech periods while maintaining an acceptable level of output quality.
ON: VAD is supported. This is the default
Echo Cancellation: Echo Cancellation in ms for period capability is advertised to the Call Agent.
Field/Button Description
Modem Jitter Buffer Delay Used with jitter buffering, this is the amount of time that the first packet is delayed.
Note: The default in release 8.0 was changed from 30ms to 10ms
Packet Loss Concealment: Specifies whether Packet Loss Concealment is enabled. Packet Loss Concealment is a
technique used on the receive side of the voice packet stream to mask the effects of
lost or discarded packets. If not used, users may report difficulty in understanding
speech due to short gaps. Default is ON.
Comfort Noise Generation: Specifies whether or not to generate Comfort Noise (RFC 3389). To generate
background noise to fill silent gaps during calls if voice activity detection (VAD) is
activated; The parameter should be ON.
Transmit Pre-Echo The gain applied on the transmit side before echo cancellation is applied.
Cancellation Gain Values are:-9.0 to +3.0
Transmit Post-Echo The gain applied on the transmit side after echo cancellation is applied.
Cancellation Gain Values are:-9.0 to +3.0
Receive Pre-Echo The gain applied on the receive side before echo cancellation is applied.
Cancellation Gain Values are:-9.0 to +3.
Sip User Name This is used to identify the user and is usually a DN.
Sip Password Used with the User Name to authenticate an endpoint to a server.
Sip Digit String Has rules for how digits are parsed.
Sip Display Name Name that appears on the display of the SIP-enabled VoIP device.
Modify Enabled when a field has been entered or changed.
Disable Disables the port, which must be done before attributes can be changed
Enable Enables the port
Alarms Brings up the Alarm view for the selected port.
Clear Entry Fields Clears the writable fields of any values.
Field/Button Description
Hidden Statistics: Statistics not added to the resulting graph
View Statistic: Enabled when a statistic is chosen form Hidden Statistics, clicking this button adds it
to the graph/
Hide Statistic: Enabled when a statistic is chosen form Graphed Statistics, clicking this button deletes
it from the graph/
Display The attribute that controls the display:
- Absolute Values
- Rate Per Second
- Million Per Second
Polling Interval: Current Polling Interval in seconds
New Interval: Sets a new interval for polling. This is set with the Reset Polling Interval button.
Enable Statistics Enables the graph for the statistics chosen.
Disable Statistics: Disables the graph
Add Historical Data from Adds the data collected previously from NMS port management
NMS:
Field/Button Description
Diagnostic Results Refer to the Software Reference for iMAP Series Switches for an explanation of these test
functions.
Diagnostic: Result For each test, there is a Result field that says PASS or FAIL and a Details field that
gives the specific test result.
Modify Test Tone For making changes to Test Tone settings. When changing state to ON, there is a
service warning.
Diagnose Interface This runs the diagnostics listed and gives the test results
Clear Diagnostic Results Clears any previous diagnostic results
FIGURE 14-51 CES DS1 Port Tab (For E1, Label and Type are E1)
Field/Button Description
Device: / Port: Non-editable, this is the port (or ports) that are being displayed.
Admin. State/Status: Administrative State of the port. This depends on the state of the associated card.
Oper. State/Link Status Operational State of the port. This depends on the Administrative state of the port.
Status The same attributes as for other cards
Type: DS1 or E1
Interface Profile Name: The port profile being used. This is the first editable field.
Note: A profile must have been previously created.
Description (Customer ID) If an active DS1 port, the customer ID that was assigned
Timing Reference Where the port receives its clocking source from (SELF, CONNECTION, or CARD).
Profile The profile that was created and applied.
Line Encoding Either B8ZS or AMI (DS1), or AMI or HDB3 (E1). This should not be changed, unless
the card is being re configured.
Line Build Out: The line build out, either in db (long-haul) or feet (short-haul)
Field/Button Description
Framing Always Unframed, since that is the only type of CES currently supported.
Direction Whether the DS1 interfaces a customer or the network.
Loop Back: Whether to set the port for loopback, and if so either LINE or INWARD (This is
normally done before putting the port in service.
The DS1/E1 port is considered operationally DOWN when a loopback is configured,
because no “thru service” can be provided. Therefore, when a loopback is configured
on the interface, an administratively UP interface would be “UP-DOWN-Loopback”,
while an administratively DOWN interface would be DOWN-DOWN-Loopback
Runtime Attribute What the line is currently processing for alarms
Modify If any values are changed, this button is enabled.
Disable / Enable A toggle to enable (if disabled) or disable (if enabled) the port. If the user is disabling the
port, there is a warning.
Alarms... Goes to the Alarm window for the port.
Clear Entry Fields If any values have been added, they are cleared (including pull-downs).
Field/Button Description
PSPAN ID: This ID is the format vlan:subinterface:pspanid. Note that the subinterface and pspanid
are provided by the AlliedView NMS as part of CES provisioning.
Admin. State/Status: Administrative State of the PSPAN. This depends on the state of the associated port.
Oper. State/Link Status Operational State of the PSPAN. This depends on the administrative state of the
PSPAN.
Status The status of the PSPAN
Encapsulation: SAToP over IPv4. This is the only one used for release 5.0
Timing Reference: Where the PSPAN receives its clocking source from (SELF, CONNECTION, or
CARD).
RTP: Real Time Protocol. RTP must be used if the PSPAN is being used as the timing
reference.
Note: This must have the same setting for both sides of a connection.
IP Address: IP Address of the connection, In this release, it is for the CES8 card.
Field/Button Description
Peer IP Address: The IP address for the other end of the connection. \
Note: By filling in the peer values, the user is explicitly defining the connection;
filling in the attributes for the port may define the port but does not actually
set up the path through the network.
UDP Port: The UDP port for this end of the connection. This must be unique within an IP address
on a card
Peer UDP Port: The UDP at the other end of the connection.
Bytes per Packet: The default is 193 for DS1, 256 for E1.
Note: Refer to "Circuit Emulation Service" on page 623 on how this is controlled in
a dual configuration.
Jitter Buffer Size: The size of the jitter buffer.
VLAN Priority The 802.1p priority bit setting.
IP DiffServ Code Point: the DSCP (Differentiated Services Code Point) value
RunTime Attributes The current status of the line.
Modify If a value has been changed, this button is activated.
Disable / Enable A toggle to enable (if disabled) or disable (if enabled) the PSPAN. If the user is disabling
the PSPAN, there is a warning.
Alarms... Goes to the Alarms window.
Clear Entry Fields If any values have been added, they are cleared (including pull-downs).
Field/Button Description
Hidden Statistics: Statistics not added to the resulting graph
View Statistic: Enabled when a statistic is chosen form Hidden Statistics, clicking this button adds it to
the Graphed Statistics (Maximum of 6), which is the current list of statistics being
graphed.
Hide Statistic: Enabled when a statistic is chosen form Graphed Statistics, clicking this button deletes it
from the Graphed Statistics/
Load Stat. List After choosing one of the names from the Saved Statistic list, the user clicks on this
button to make it the current Graphed Statistics
Save Stat. List The user is prompted to save the current list with a name. Once saved, it is added to
the Saved Statistics Lists.
Field/Button Description
Delete Stat. List After choosing one of the names from the Saved Statistic list, the user clicks on this
button to delete this name.
Display The attribute that controls the display:
- Absolute Values
- Rate Per Second
- Million Per Second
Polling Interval: The Current Polling Interval in seconds
New Interval: Sets a new interval for polling. This is set with the Reset Polling Interval button.
Add Historical Data from Adds the data collected previously from NMS Performance Management
NMS:
Add Historical Data from Adds the data collected previously from the associated device.
Device:
Field/Button Description
Device: / Port: Non-editable, this is the port (or ports) that are being displayed.
Admin. State/Status: Administrative State of the port. This depends on the state of the associated card.
Oper. State/Link Status Operational State of the port. This depends on the Administrative state of the port.
Status The same attributes as for other cards
Type: NTE-DS1 or NTE-E1
Framing Always ESF
Timing Reference Where the port receives its clocking source from (SELF or CARD).
Profile: The port profile being used. This is the first editable field.
Note: A profile must have been previously created.
Description Where the user can add an appropriate description for what the port provides
Line Encoding Either B8ZS (DS1) or HDB3 (E1). This should not be changed, unless the card is being
re configured.
Line Build Out: The line build out, either in db (long-haul) or feet (short-haul)
Loop Back Status The DS1/E1 port is considered operationally DOWN when a loopback is configured,
because no “thru service” can be provided. Therefore, when a loopback is configured
on the interface, an administratively UP interface would be “UP-DOWN-Loopback”",
while an administratively DOWN interface would be “DOWN-DOWN-Loopback”
Field/Button Description
Loop Back Type The types of loopback:
- NONE
- INWARD - Not supported for the NTE8
- LINE - The entire signal is looped from external equipment only through the DS1/E1
port.
Loop Back Location
Modify If any values are changed, this button is enabled.
Disable / Enable A toggle to enable (if disabled) or disable (if enabled) the port. If the user is disabling the
port, there is a warning.
Alarms... Goes to the Alarm window for the port.
Clear Entry Fields If any values have been added, they are cleared (including pull-downs).
FIGURE 14-58 NTE DS1 Port Management Form - PPP Tab (Linked Connection)
For information on the parameters, refer to the Software Reference for iMAP Series Switches.
FIGURE 14-59 NTE DS1 Port Management Form - Eth Interface Tab (General)
For information on the parameters, refer to the Software Reference for iMAP Series Switches.
FIGURE 14-60 NTE DS1 Port Management Form - Eth Interface Tab (IpFIlters)
TABLE 14-24 NTE DS1 Port Management - Eth Interface - IP Filters Tab
Field/Button Description
Allowed Addresses
Other Classifiers
Port IP Filter Counters For the Eth interface the traffic management counters:
- Match - Number of packets that match any of the criteria
- Filter - Number of packets dropped because they do not match any of the criteria
- Policed - Number of non-conforming packets
Add Classifier Add a Classifier to those that are associated with the interface. The Add Classifier to
Port form appears. In this form the user can select a classifier that already exists or
create a new classifier with an IP range and Precedence
Delete Classifier Deletes a classifier chosen from the Classifier (Other Classifiers) list.
Reset Counters Sets to 0 the Port IP Filter Counters
FIGURE 14-61 NTE DS1 Port Management Form - PMON Statistics Tab
• Enable Statistics - Activates all the statistics
• Disable Statistics - Deactivates all the statistics
• Reset Statistics - Sets all the statistics to 0
FIGURE 14-62 NTE DS1 Port Management Form - Stats Graph Tab
Field/Button Description
Hidden Statistics: Statistics not added to the resulting graph
View Statistic: Enabled when a statistic is chosen form Hidden Statistics, clicking this button adds it to
the Graphed Statistics (Maximum of 6), which is the current list of statistics being
graphed.
Hide Statistic: Enabled when a statistic is chosen form Graphed Statistics, clicking this button deletes it
from the Graphed Statistics/
Load Stat. List After choosing one of the names from the Saved Statistic list, the user clicks on this
button to make it the current Graphed Statistics
Save Stat. List The user is prompted to save the current list with a name. Once saved, it is added to
the Saved Statistics Lists.
Delete Stat. List After choosing one of the names from the Saved Statistic list, the user clicks on this
button to delete this name.
Field/Button Description
Display The attribute that controls the display:
- Absolute Values
- Rate Per Second
- Million Per Second
Polling Interval: The Current Polling Interval in seconds
New Interval: Sets a new interval for polling. This is set with the Reset Polling Interval button.
Add Historical Data from Adds the data collected previously from NMS Performance Management
NMS:
Add Historical Data from Adds the data collected previously from the device.
Device:
FIGURE 14-63 NTE DS1 Port Management Form - Stats Graph Tab
FIGURE 14-66 Triple Play Form for SHDSL with Bonding Option
Using the Triple Play form, individual even numbered ports can be bonded to the next higher odd port. Therefore, when the
user selects an even numbered port, the “Bond To:” selector is enabled. Either the next port, or a blank entry, can be
selected. Provisioning will set the wire mode appropriately.
Note: Provisioning will first deprovision a port, which will automatically unbond it, then if necessary it will be rebonded.
As ports are bonded (or unbonded), the following occurs:
• When changing a port on the TriplePlay form, the odd port is removed from the list of ports that can be selected.
• Configuration changes are reflected in the Customer Ports table in Network Inventory.
Field/Button Description
Admin. State/Status Whether the EPON2 can go into service and therefore pass traffic
Oper. State/Link State When the Admin State is up, whether the link is passing traffic
Availability Status Dependency, meaning the state of the upstream component determines this
component’s status.
Control Status
Procedural Status
Port Type Always EPON
Profile The user can create a profile for the EPON2 port and apply it to this port.
Description (Customer ID) Unique way to identify the port
IPMC VLAN Id (1..4094) The VLAN that carries downstream multicast traffic
IP Address Set this to an address that is appropriate for the IPMC subnet. The default 0.0.0.0 may
not work as some STBs (such as Amino) require the IPMC IP Address to be set on the
EPON interface.
IPMC Policy The SLA Policy that control the downstream attributes for the IP Multicast VID.
(Any upstream attributes are ignored.) This SLA therefore applies to all the
ONUs on the EPON2 interface.
Field/Button Description
BRUUM Policy This policy is for the same VID as the downstream-only video stream, but it applies to
all upstream traffic from that ONU, and known/learned unicast downstream traffic to
that ONU. The ONU/VLAN association and corresponding SLA must be provisioned if
unicast or broadcast traffic is required for operation (e.g. DHCP is used for IP address
assignment).
Minimum Loop Length Allow for setting the allowed distances. The value entered is added to the minimum
(0..60 km) value of 20, so the maximum is 80 (60 +20). Note that the OLT must be disabled to
change this value.
configured for Triple Play, with three for the services, one for the RGMgmt VLAN, and one for a class of traffic called
BRUUM.
The user can see the VLAN id and QoS Policy as highlighted in the figure. The default QoS policy is named “NONE” and can
be associated with one or more VLANs. The user has the option of selecting one of the VLANs as the untagged VLAN, and
so the selection uses a radio button.
Note: Refer to "Example of an EPON/ONU Interface Policy" on page 253 for details on policies for the EPON/ONU.
Note: Refer to "Provisioning iMGs" on page 763 for complete information on provisioning the iMG/RG.
As with other port type configuration tabs, the Video Tab includes the IGMP / multicast information.
Field/Button Description
Admin. State/Status The Administrative State can be controlled and determines the Operational State.
Oper. State/Link State The ability of the port to provide service. The Administrative State must be up and then
the system determines if the port can provide service.
Port Up-Time Amount of time the physical interface has been in the UP-UP-Online state.
Status The status of the port that follows form the Administrative State and Operational State.
For meanings, refer to the Software Reference for iMAP Series Switches.
- ONLINE
- IN TEST
- FAILED
- OFFLINE
- DEPENDENCY
- DEGRADED
- NOT INSTALLED
- INITIALIZATION REQUIRED
- TERMINATING
Field/Button Description
Connection State The connection state, such as Idle or Showtime
Actual Line Std. The line standard that was actually chosen.
Actual Databoost Whether the DATABOOST feature has been implemented
Actual Line Type The line type that was actually chosen.
Actual Inv G994 Vendor ID To Be Supplied
Actual Inv System Vendor To Be Supplied
ID
Actual Inv Version Number To Be Supplied
Actual Inv Serial Number To Be Supplied
Actual Self Test Result To Be Supplied
Actual Power Mgmt State The state the interface is in for power reduction (Full On, Low Power, Idle)
Actual Power Mgmt Status Whether the power management feature has been activated for the interface
Interface Profile Name Which profile is being used (AutoProv or none, which uses default values).
Profile Enter another VDSL Profile Name
Description (Customer ID) An ID that can be given to uniquely identify the port. In most cases, the subscriber’s
telephone number is used. Refer to "Naming Convention for Customer IDs (Triple Play
Form)" on page 780.
VDSL Mode Specifies the mode for the VDSL port.
For the VDSL24A and VDSL24B cards, VDSL2 is the default.
The parameters that are provisionable depend on whether the VDSL2 or ADSL mode is
chosen
VDSL Line Type Defines the type of VDSL physical line entity that exists, by defining whether and how the
line is channelized.
VDSL Databoost Whether the Databoost feature has been provisioned
Line Quality Monitor The level the line quality monitor has been set at. Refer to the Software Reference for iMAP
Series Switches.
Band Plan Profile Band plan profile for frequency settings. The band plan determines the transmission
frequencies used when transmitting and receiving data between the interface and the
modem
PSD Limit Mask VDSL/ADSL power spectrum density limits are defined by the band plan. The various
standard bodies have defined a number of band plans that have regional significance.
The masks define shaping parameters for the signal, including Annex A or Annex B
RFI Bands Specifies the radio frequency interference bands to filter from the VDSL link.
To avoid interference it is necessary to introduce power control (notching) in one or
more of these bands.
Transport Protocol Used to specify the type of transport used when operating in VDSL mode. When running
in ATM mode, the VDSL interface can automatically toggle to ADSL if the modem at the
other end of the connection is ADSL. PTM (Packet Transport Mode) requires both ends
of the connection to be VDSL compliant
If the Transport Protocol is changed from ATM to PTM, there is a warning that VCs are
not supported, and any existing VCs will be removed from the port.
Max. # of Learned MAC Depending on feature provisioning, the number of MAC addresses that can be learned (or
Addrs. Off)
Power Management Changes the current power management state.
Field/Button Description
Power Mgmt Reentry The amount of time that must elapse before re-entering the Low Power state after a
Delay transition to the Full On state. (Should not be set to a value less than 120 seconds)
Power Mgmt Trim The maximum aggregate transmit power reduction (trimming) that can be performed with
each power trim operation in the Low Power state.
Power Mgmt Trim Delay The amount of time that must elapse before an additional reduction (trimming) of power
occurs in the Low Power state.
Low Power Min Rate The minimum net data rate for the bearer channel while operating in the Low Power
state.
The value for LOWPOWERRATE must be between MAXDOWNSTREAMRATE and
MINDOWNSTREAMRATE
Modify Enabled when a value in New Value field has been entered, modifies the attributes
according to the updated values.There is an error message if a value is invalid.
Clear Entry Fields Clear any fields that have been datafilled but not yet Modified
Enable Enabled if the port is in an Administrative State of DOWN, enables the port and so brings
the Administrative State to UP. If possible (for example, the VDSL2 card must be enabled),
the Operational State will change to UP.
Disable Enabled if the port is in an Administrative State of UP, disables the port and so brings the
Administrative State to DOWN. The Operational State will also change to DOWN.
Alarms Invokes the Alarm table of the Fault Management Object.
Field/Button Description
Actual Connect Rate The upstream/downstream rate that was actually attained.
Max. Attainable Rate The possible upstream/downstream rate according to dsl type and mode.
Actual SNR (Near End/Far The signal-noise ratio for near end/far end that was actually attained.
End)
Actual Attenuation (Near The attenutation for near end/far end that was actually attained.
End/Far End)
Actual Output Power The output power achieved for near end/far end.
(Near End/Far End)
Actual Upstream/ The actual transmit upstream PSD setting.
Downstream PSD
Actual Upstream/ The actual impulse noise protection value for upstream
Downstream INP
Max. Upstream Rate Specifies the maximum upstream bit rate to attain for a VDSL port. The valid range for this
parameter is from 32Kb to 14848. Leaving this rate to the default of 10000 (10Mbps)
ensures the higher downstream rates (50 Mbps) for VDSL
Min. Upstream Rate Specifies the minimum upstream bit rate to attain for a VDSL port.
The MINUPSTREAMRATE must be equal or less than the MAXUPSTREAMRATE
Max. Downstream Rate Specifies the maximum downstream bit rate to attain for a VDSL port. The valid range for
this parameter for VDSL is from 32Kb to51200Kb
Min. Downstream Rate Specifies the minimum downstream bit rate to attain for a VDSL port. The valid range for
VDSL is from 32Kb to51200Kb.
The MINDOWNSTREAMRATE must be less than the MAXDOWNSTREAMRATE.
Field/Button Description
Max. Downstream Specifies the maximum interleave delay in milliseconds used when the VDSL linetype is set
Interleave Delay to INTERLEAVE.
Max. Upstream Interleave Specifies the maximum interleave delay in milliseconds used when the VDSL linetype is set
Delay to INTERLEAVE.
Target SNR Ratio Margin Specifies the target signal-to-noise ratio (in dB) to achieve on a VDSL port.
The valid range is 0 to 30 for a VDSL interface, with the default 0 for a VDSL interface.
This allows the operator to adjust the signal characteristics to account for such things as
known noise in the binder group, extreme length of a loop, or other issues in the copper
plant
Max. SNR Margin Used to set the maximum signal-to-noise ratio supported by the interface. The value for
this parameter must be greater than the value for Target SNR Margin.
Optionally, this parameter can be set to 'OFF' which eliminates any maximum limit for
SNR.
Min. SNR Margin Sets the minimum signal-to-noise ratio supported by the interface. The value for this
parameter must be less than the value for Target SNR Margin.
Optionally, this parameter can be set to OFF which eliminates any minimum limit for SNR.
Max. Upstream Nominal VDSL/ADSL power spectrum density limits are defined by the band plan and determine
PSD this value.
Max. Downstream VDSL/ADSL power spectrum density limits are defined by the band plan and determine
Nominal PSD this value.
Max. Receive Power Specifies the maximum received power level in dBm received from the modem before the
interface is alarmed and disabled.
Minimum Upstream INP Sets the minimum impulse noise protection value for upstream.
Minimum Downstream INP Sets the minimum impulse noise protection value for downstream.
Modify Enabled when a value in New Value field has been entered, modifies the attributes
according to the updated values.There is an error message if a value is invalid.
Clear Entry Fields Clear any fields that have been datafilled but not yet Modified
Enable Enabled if the port is in an Administrative State of DOWN, enables the port and so brings
the Administrative State to UP. If possible (for example, the VDSL2 card must be enabled),
the Operational State will change to UP.
Disable Enabled if the port is in an Administrative State of UP, disables the port and so brings the
Administrative State to DOWN. The Operational State will also change to DOWN.
Alarms Invokes the Alarm table of the Fault Management Object.
Field/Button Description
Hidden Statistics: Statistics not added to the resulting graph
View Statistic: Enabled when a statistic is chosen form Hidden Statistics, clicking this button adds it
to the graph/
Hide Statistic: Enabled when a statistic is chosen form Graphed Statistics, clicking this button deletes
it from the graph/
Display The attribute that controls the display:
- Absolute Values
- Rate Per Second
- Million Per Second
Polling Interval: Current Polling Interval in seconds
New Interval: Sets a new interval for polling. This is set with the Reset Polling Interval button.
Field/Button Description
Add Historical Data from Adds the data collected previously from NMS port management
NMS:
Add Historical Data from Adds the data collected previously (buckets) from the device
Device:
Field/Button Description
System-wide Information These are the IGMP attributes that have been set for the device.
Unknown Multicast Packets Mode: Supported on iMAP 9810 and SBx3100 devices. Values
are as follows:
• iMAP devices running software release 17.0 and higher and SBx3100 devices running
software release 17.l and higher: All, None or Control Packets Only
• iMAP and SBx3100 devices running software release 16.x and lower: Drop or Flood
Card Information The attributes for the ADSL/VDSL card, such as the Multicast Group Limit for iMAP
devices. The Multicast Group Limit display is not present for SBx3100 devices running
software release 17.x.x or higher.
Port IGMP Statistics The good vs. errored number of IGMP Reports/Leaves/Queries for the port
IGMP Snooping Whether IGMP is enabled on the port. For devices running software release 17.x.x or
higher, IGMP must be enabled directly on individual VLANs.
Mode The type of IGMP snooping to perform (Internal, External, MCPassthrough).
Field/Button Description
Multicast VLANs VLANs that are currently carrying multicast traffic - This is included in the l;earned STB
Multicast Info table.
Multicast IP Addresses The IP addresses being used for the multicast traffic.
Learned STB Multicast Info VID - The multicast VLAN
MAC - The STB MAC Addresses that were learned and are in the FDB
IP - The IP addresses being used for the multicast traffic
Note: These three attributes are placed in a table to allow the user to see the association
between a VLAN ID, MAC address, and its associated IP addresses.
Locked STB MAC Address: The set of unicast MAC addresses associated with this port.
The New Value pull-down allows the user to enter a new valid unicast address. This will
overwrite a Current Value if it exists.
The Remove option removes the current value and leaves the current Value field blank.
Note that several changes (add, change, remove) can be done for the MAC address rows.
These changes are activated when the Modify button is pressed.
Clear Entry Fields Clear any fields that have been datafilled but not yet Modified
Reset IGMP Counters Enabled if the port is in an Administrative State of DOWN, enables the port and so brings
the Administrative State to UP. If possible (for example, the card must be enabled), the
Operational State will change to UP.
14.29.1 Status
The status tab includes the status of the ATM Bond as well as the associated ports. Refer to the following figure.
• Add Port - This retrieves all ports that are not provisioned with a customer (no Customer ID) and opens a window to
allow adding another port to the group. You should select a port that has the same settings as the principle port (which
uses the settings of a bonded Profile). Once the port is added, the port will go to Up-Up. Click Enable to enable the
modified group.
FIGURE 14-77 Port is Added to Bonding Group and Deleted in Port Management Table
Note: Removing a port from an ATM Bonding Group does not change the ATMBOND Name listed on the ATMBOND tab. This
name is set during the original bonding provisioning and does not change when the ATM Bonding Group is modified.
3. In the Port Management table, select the now freed secondary port and select View/Modify Details.
4. In the ADSL tab, select Disable.
At this point, the port is released from the Group and is added back to the Port Management table, retaining all of its
previous settings.
Note: The port retains all of its settings, and so you will need to change the settings (preferably through a Profile), if another
application requires different settings.
FIGURE 14-78 Secondary Port is Released, can be Provisioned for other Applications
14.29.7 Diagnostics
DELT (Dual End Line Test) and SELT (Single End Line Test) can be run on each ADSL port when they are in the appropriate
state:
• For DELT that is Up/Up/Showtime
• For SELT Up/Down
Note: These tests may not actually work with the particular modems being used
Port management is provided for the Rapier and Switchblade devices, including the the 8700 and 9800 series.
Note: For complete information on Rapier and Switchblade devices, go to http://www.alliedtelesis.co.nz/documentation/.
FIGURE 15-1 Ether like Port Management (Rapier Device) - General Tab
TABLE 15-1 Ether-like Port Management for Rapier and SwitchBlade Devices - General Tab
Field/Button Description
Admin. State/Status: The Administrative State can be controlled and determines the Operational State.
Note: The possible values are ENABLED/DISABLED (rather than the Up/Down
for iMAP devices).
Oper. State/Link State: The ability of the port to provide service. The Administrative State must be Up and
then the system determines if the port can provide service.
Note: There is no Status field as in iMAP devices. Only the Up/Down values are
used.
Other fields For details on all other fields refer to Allied Telesis documentation.
Modify Enables the any changes have been made to the settings, makes them
TABLE 15-1 Ether-like Port Management for Rapier and SwitchBlade Devices - General Tab
Field/Button Description
Disable Disable the port (after a confirmation window). This makes the overall state DOWN.
Enable Enable the port. This makes the overall STATE UP if the port can be brought into
service.
Alarms Brings up the Alarm view for the selected port.
Clear Entry Fields Clears the writable fields of any values.
FIGURE 15-2 Ether like Port Management (Rapier Device) - Port Statistics Tab
This form lists the standard RMON statistics.
FIGURE 15-3 Ether like Port Management (Rapier Device) - Stats Graph Tab
TABLE 15-2 Provision Port Form for Port Management (Rapier Device) - Stats Graph Tab
Field/Button Description
Hidden Statistics: Statistics not added to the resulting graph
View Statistic: Enabled when a statistic is chosen form Hidden Statistics, clicking this button adds it
to the graph/
Hide Statistic: Enabled when a statistic is chosen form Graphed Statistics, clicking this button deletes
it from the graph/
Display The attribute that controls the display:
- Absolute Values
- Rate Per Second
- Million Per Second
Polling Interval: Current Polling Interval in seconds
New Interval: Sets a new interval for polling. This is set with the Reset Polling Interval button.
Add Historical Data from Adds the data collected previously from NMS port management
NMS:
Add Historical Data from Adds the data collected previously (buckets) from the device
Device:
For Switchblade devices, the ether-like port attributes are similar except for the General tab. Refer to the following figure.
FIGURE 15-4 Ether like Port Management (SwitchBlade Device) - General Tab
Refer to Table 15-1 for a description of the main buttons. For details on all other fields refer to Allied Telesis documentation.
Note: The ability for the iMAP to run DELT is from release 9.0, while the NMS DELT feature is for NMS release 10.0. Therefore,
this NMS feature can be run on an iMAP running a 9.0 load, although there are some additional DELT feature for iMAP 10.0.
the graphed parameter name. (To remove a parameter, select one or more in the “Graphed Parameters” list and click the
Remove Parameter button.
The same parameters are available for both upstream and downstream directions, though different numbers of sub carriers
are available based on the actual mode of the port. Selecting a different direction will clear the graph, move all parameters
back the available list, and switch the data to the selected direction.
Clicking the Refresh Data button will recollect the data from the iMAP just as it does on the DELT tab. This will only have
an effect if the mode of the port changes or if a new DELT was run, or the results cleared, outside of the NMS.
Card Types Actual Standard Actual Annex Upstream Carriers Downstream Carriers
VDSL24A, VDSL24B 512 512
ADSL24A/B, ADSL24AE ADSL2, ADSL2M ANNEXB, 64 256
ADSL48A, ADSL48B, ANNEXM
others 32 256
ADSL2+ ANNEXB, 64 512
ADSL2+M ANNEXM
32 512
• Bit Loading - Bits allocated per sub channel. Range is 0 to 15.
• Gain - Range is 0 - 4093/512.
• Quiet Line Noise - Noise on quite line. Range is -150 to -23 db/MHz.
• Signal/Noise Margin - The signal-to-noise ratio margin per band is the maximum increase in dB of the noise power
received at the xTU-R, such that the BER requirements are met for all bearer channels. The range is from -64 dB to +63
dB with 0.1 dB steps.
• Hlog(f) - The log of the characteristic function
• H(f) Imaginary - The imaginary component of the characteristic function.
• H(f) Real - The real component of the characteristic function.
• H(f) Amplitude - The amplitude of the characteristic function. This is computed from the real and imaginary components.
Amp = sqrt( r*r + i*i) where r is the real component and i the imaginary component.
• H(f) Phase - The phase of the characteristic function. This is computed from the real and imaginary components. Phase =
atan( i/r ) where r is the real component and i the imaginary component.
For accurate results, loops up to 9000 feet can be tested. Using the FULL options allows loops up to 12,000 feet can be
tested. Limits are as follows:
Annex B support is limited to 24 AWG loops. 26 AWG wiring is not supported and will produce erroneous results
The port/interface to be tested must be in operationally down: UP-DN-Failed. The state life-cycle for the port/interface
under test will be: UP-DN-Failed to start the test, UP-DN-In Test for the duration of the test and will be transitioned back
to UP-DN-Failed once testing has completed.
Refer to the Software Reference for iMAP Series Switches for details on SELT testing.
15.6.1 Overview
Support of CWMP with TR-069 provides:
• The CPE Wan Management Protocol (CWMP) TR-069 framework is supported.
• Basic support for the Comtrend 5631 CPE device.
This Comtrend device supports bonded ports where multiple ADSL lines are combined (bonded) together and connected to
one CPE device to allow higher throughput rates for the individual customer using the CPE. This feature is expected to be
used to configure the iMAP ports where the Comtrend CPE is connected. Refer to the following figure, keeping in mind the
following provisioning guidelines:
• The G.bond feature requires support for up to two (2) ADSL bonded ports.
• Unlike the SHDSL wire-pair bonding implementation which requires the bonded ports to be adjacent, G.bond allows for
any two ports to bond together as long as they exist on the same card.
FIGURE 15-17 Menu Items Available for Comtrend (Provision added in SP5)
2. Existing iMG/RG profiles (General, Internet and Video) can be used, but not all values in these profiles will apply. Non-
applicable parameters will be skipped when the profile is deployed or used to provision the CPE.
3. When provisioning the Triple Play form, the CPE MAC address is required because it cannot be correctly determined
automatically and mapped with device port when needed.
Note: With the Comtrend provisioned with a specific MAC address, it cannot simply be swapped with another unit when performing
provisioning or maintenance and having the NMS automatically provision the new unit. The old unit would need to be
deprovisioned, then the provisioning process would need to start again.
4. The Comtrend CPE only allows one CLI login session at a time (for example, if CLI is used to initiate TFTP to the device).
Therefore, login to the CPE device will fail if another user is already logged in.
Caution: While an administrator is logged into the CPE, the NMS cannot login, and so some features will not work.
• Inform Interval - How often (in seconds) the CPE contacts the ACS with identification information. The default is 300
(five minutes).
• ACS User and Password - The User ID and password to access the ACS server. The CPE uses this to communicate with
the ACS.
• CPE User and Password - User ID and password to access the CPE. The NMS uses this to communicate with the CPE.
• Config File Name - The name of the configuration file on the TFTP server that includes the values selected here.
• Save Only - If checked, the settings for the configuration file are saved but are not uploaded to the CPE (there is no
physical connection between the ACS and CPE).
Column Description
VLAN Interface The name of the VLAN interface on the device, which can be specified when creating a
Name Network VLAN using the GUI wizard. Refer to "Creating Initial VLAN Information" on page
533.
ID The VLAN interface ID (device name and VLAN ID).
Type The type of interface. Always VlanInterface in this inventory table.
IPAddress If the VLAN Interface is IP-based, its subnetwork.
NetMask The net mask for the subnetwork.
VID The VLAN ID number.
Status Alarm Status. If no alarms, the status is Clear.
Untagged Ports On the device, the ports that are labeled as untagged for the VLAN.
Tagged Ports On the device, the ports that are labeled as tagged for the VLAN.
Device The device name.
Network VLAN The network VLAN to which this VLAN interface belongs.
When the VLAN Interfaces Inventory table is the active panel and one row is selected, the VLAN Interface menu pull-down
appears and the following options are available:
• Configure VLAN Interface - This brings up the VLAN Interface Configuration form, and allows VLANs to be configured on
the individual device. This is the same form displayed when provisioning a device, and is described in "Configure VLAN
(Chassis View)" on page 335.
• Extend VLAN - This is described in "Extending Network VLANs" on page 539.
• Alarms/Events - This will invoke the Fault Management tables for Alarms and Events specific to the VLAN IF.
• Managed Object Properties - The base properties of the interface, including the IP address and netmask if it is part of a
VLAN.
• Delete Object and Traces - This will delete the VLAN IF and all its sub-elements, so there is a confirmation window.
• Manage/UnManage - The interface will (or will no longer) be polled by the AlliedView NMS. The color of the row icon
turns to gray.
• Update Status - The AlliedView NMS polls the device for its status.
Column Description
Link Name The name given when creating a Network VLAN using the GUI wizard.
ID The physical link ID (device names and port numbers at each end of the link).
Source Device The name of the source device.
Source Port The physical port on the source device.
Dest. Device The name of the destination device.
Dest. Port The physical port on the destination device.
Status Alarm Status. If no alarms, the status is Clear.
Column Description
Link Type Specifies if the link provides a feature, such as LAG
Discovery The protocol used to discover the link, such as LLDP
When the Physical Links table is the active panel, the Link menu pull-down appears and the following options are available:
• Managed Object Properties - The base properties of the physical link.
• Alarms/Events - This will invoke the Fault Management tables for Alarms and Events on the selected link.
• Manage/UnManage - The link may be set to unmanaged to indicate that it is not a real link, but rather a modelled link. The
color of the link will be gray and the link will not change status based on alarms.
Note: As mentioned in "Physical Network Map" on page 527, when creating a model physical link (does not actually exist), it is
recommended to go to the Physical Links table in Network Inventory and UnManage that link. Doing this will unmanage any
associated model VLAN links.
• Update Status - The AlliedView NMS checks the alarm database for its status. The status is updated automatically, so this
update status request should not be necessary for links.
Column Description
Working Nodes that are to be included in the Network VLAN. Nodes not in the original working nodes can
Nodes be included in a VLAN by following an existing or newly created link to a new node. This is not
recommended, though, as the auto-selected VLAN ID and VLAN Name may clash with entries
already on these new nodes. To add or delete nodes, select Edit List.
Vlan Name The name for the Network VLAN. This is usually descriptive text and includes the VID. The default
is Vlan and a number selected by the AlliedView NMS.
Vlan ID (VID) The VLAN ID number. This VID will be applied to each device VLAN interface during creation.
subNet If this Network VLAN is to be IP-based, enter the subnetwork and the mask bitset, such as
172.16.32.0/24. If this field is left blank, an island-based Network VLAN is being created.
Next If there are Working Nodes and at least the Vlan and VID fields are filled, clicking this button goes to
the next form. (The Back and Finish buttons are always disabled in this initial form.)
Cancels Dismisses the form and saves no data.
FIGURE 16-14 Test Network VLAN Form (with error and option to ignore)
Select one of the available physical links to activate the Next button. The form that shows the available VLAN IFs on this
physical link is displayed, as shown in Figure 16-17.
The IP address and network mask can be entered in cells IP Address and Network Mask respectively by clicking the cell and
entering the value.
Note: When you click the IP Address cell, the cell will be filled with the subnet address, and when you click the Network Mask cell
(or any other cell), the cell will be filled with the network mask for the subnet.
Clicking Finish button will invoke the Task Details form and list the subtasks to be done. The Task Status field gives the state
of the task, and if the Execution state is Failed, double-clicking the row will display the reasons for the failure in an Error
Details pop-up.
Right clicking on the Network VLAN, VIF Device, or LINKPORT Node node allows the administrator to perform various
tasks, listed in the following table
Note: The last selection, View Protection Domains, is covered in the EPSR subsection, "Protection Switching-EPSR" on page 567.
the devices that have service ports. In the example the service ports would be 11.0 Untagged for 172.16.33.11 and 0.6
Untagged for 172.16.33.18.
Click Next, and the Test Network VLAN form appears. This will test the connectivity between all three devices.Click Finish
and the Task Details form will show the tests and if they are successful, as shown in Figure 16-35.
To add the island-based Network VLAN for Sales, the same steps would be followed that would match Figure 16-29.
Select the link and click Next.The Select/Create VLAN Interface form appears. Since the Training VLAN is not yet created
on the .13 device, click Create VIF. The Create New VLAN form appears, with the Training VLAN with the VLAN ID of 30
already filled in. Click OK and the VLAN Interface will be added, as shown in Figure 16-38.
FIGURE 16-38 Creating the VLAN IF on the extended Network VLAN Device
Select the row and click Next. The VLAN Operations form appears and shows what will be done to finish extending the
Network VLAN. Clink Finish and the Task Details window will perform the operations and give the results.
With the Training Network VLAN now extended, VLAN interfaces on the .13 device can be added that use the Training
Network VLAN.
To trim the network VLAN, perform these steps:
1. Go to the specific Network VLAN map. Right-click the device that will no longer have a VLAN IF and select Configure
VLAN Interface.
2. Select the Training Network VLAN from the pull-down menu, and then put all the tagged and untagged ports back to
blank (neither T nor U). Click Apply.
3. If any physical links need to be reconfigured since a device is no longer part of this Network VLAN, go to the Physical
Network map and delete/add/change links to match the trimmed configuration.
FIGURE 16-39 Updating the VLAN IF on the Extended Network VLAN Device
FIGURE 16-43 Configure Vlan Interfaces Form (iMAP 9000 Devices are Type HVLAN)
Now that the Vlan Interfaces are configured, it can be tested. Clicking on Next brings up the Test Network Vlan form,
(Figure 16-44), and then clicking on Finish runs the test and provides the results, as shown in Figure 16-45.
If a test does not succeed, an error window appears with a message as to why the test failed.
Clicking on Next would bring up the Select/Create Vlan Interface Form, and the user would select the Create VIF button.
The VlanID (502) would be given the type HVLAN. After pressing OK, the form would have the new HVLAN502 added to
the list. The user would then select this Vlan and select Next. The Vlan Operations Form appears with the CREATE
operation for the HVLAN502. Selecting Finish will run the tests to check if the configuration is valid.
16.9.3.2 Restrictions
Keep the following configuration guidelines in mind when provisioning Translation VLANs:
Note: For more details on the VLAN Translations feature, refer to the Feature Guide.
• The following cards support VLAN translation:
port and is allowed to flow through, because the control messages originate either at a master node or transit node but
always terminate at the master node.
When the master node detects a physical link break in the ring, it unblocks its SP port and allows the flow of non-control
traffic through the EPSR domain. Once the master node determines that the break in the ring has been restored, it goes back
to its normal operating procedure.
• Protected Control Ring - The network VLAN once it is configured with all the control VLAN attributes.
• Protected Data Ring - The network VLAN once it is configured with all the protected VLAN attributes.
• Control VLAN Interface - The unique vlan VID which will be used as the control vlan for the EPSR domain.This VLAN is
a Network VLAN and can be created as described in "Creating Initial VLAN Information" on page 533.
Note: Although the network VLAN configured as a loop can be created before configuring an EPSR topology, it is recommended to
use the Network VLAN Manager application, since it makes control Vlans easier to create with fewer possible errors,
especially since the control VLAN must be configured to form a loop.
• Protected VLAN Interface – The vlan VIDs which require protection on the EPSR domain.
• VLAN Protection Scheme - Type of protection you wish for your data network VLANs
Note: Currently, EPSR is the only protection scheme used.
• Control Data (part of the TAPS protocol)
• HelloTime – The rate at which the protocol Health control message is sent by the master node for this EPSR domain.
• FailOverTime – Time for which the master node waits before declaring that it has detected a break in the ring for this
EPSR domain.
• RingFlap Time – The minimum number of seconds that a master node must remain in the failed state (before moving
to the complete state), even if the ring has recovered from its fault condition. This delay is to limit unnecessary
blocking and unblocking of the secondary port when a link in the ring is flapping (intermittently recovering from its
fault). The default is 0.
• Link Ports – The two ports that are members of the EPSR domain.
• EPSR+ - Enhanced Recovery, this is defaulted to the recommended settings, and is disabled if unavailable on the node
software release.
Note: Refer to the Allied Telesis Software Manuals for detailed information about the EPSR+ feature.
Finally, the user clicks Apply Protection Domain. This configures the devices to support the control ring. The Task Details
window appears and the control ring is configured for each device. (If there is an error, the Task Details window can be used
to determine the error condition.)
Once the Protection Domain is applied, a map of the control ring is created that can be viewed, as shown in subsection
"Show EPS Control Ring Map" on page 575.
Table 16-7 summarizes the fields for the Configure EPS Control Ring Panel
TABLE 16-7 Fields for the Configuration of the EPS Control Ring Panel
Option Purpose
Network Object List Network VLAN Object that is being used to configure the control ring. The format is:
NVLAN:<name of network vlan>[ID]<MID:Vlan[ID]
The ID is the way to uniquely identify the network VLAN.
Create Protection Brings up the Create New Protection VLAN Domain Dialog.
Domain
Create New Protection Domain - The name of the domain that will include all of the devices that are
Protection VLAN part of the Network VLAN. Naming conventions are up to 15 characters (spaces not
Domain Dialog allowed).
Hello Time and Failover Time - Refer to "Summary of EPSR Configuration Data" on page
568.
RingFlap Time:
TABLE 16-7 Fields for the Configuration of the EPS Control Ring Panel
Option Purpose
EPSR Protection Lists the relevant information for the control ring: Have control over columns that are
Domain panel enabled. (Controllable fields in bold.)
Device: The name of the device as defined in the Managed Object Properties
Domain Name: The domain name that applies to this specific Network VLAN and all of its
associated nodes.
Control VID: The VID of the network VLAN that is being used to create the protection
ring.
Interface #1/Primary - Can toggle between Primary and Secondary.
Interface #2/Secondary
Is Master: Selects which device is to be the master node. This is usually the node that is
connected to upstream devices. (This cannot be modified if you are modifying an existing
control ring.)
Operation Type: The operation (such as Create) that is being applied to the ring
configuration.
Is Enabled: Checked by default, allows the user to disable the EPS domain for that device.
Note the ring (master node) should be disabled only to perform a configuration change.
If the master is disabled, the ring will not provide protection. It appears that the device
blocks both ports so it no longer is connected to the other devices (and the ring is
broken).
If the transit is disabled it also appears that the device blocks both ports for protected
traffic so it no longer is connected to other devices (although the ring except for that
device will still function).
EPSR+ - Enhanced Recovery, this is defaulted to the recommended settings, and is
disabled if unavailable on the node software release.
Device Operations Options to perform on the created control VLAN:
Apply Protection Domain - Configures the devices to support the control ring. Brings up
the Task Details window.
Delete Protection Domain -Activated only when the EPS Control Ring has already been
created, allows the user to delete the protection domain for the network VLAN. Note
that the network VLAN itself is not deleted. Refer to "View/Modify/Delete EPS Control
RIng" on page 573.
Modify Protection Domain - Activated only when the EPS Control Ring has already been
created, allows the user to modify the protection domain for the network VLAN. Refer to
"View/Modify/Delete EPS Control RIng" on page 573.
Enable/Disable - Activated only when the EPS Control Ring has already been created,
allows the user to disable the protection domain after it has been applied, and vice versa.
Refer to "Enable/Disable EPS Control Ring" on page 574.
If Apply Protection Domain is chosen, the devices that use the Network VLAN are included in the Configure EPS Control Ring
window, and in configuring the Control Ring the AlliedView NMS will complete the loop.
• LINKS-DOWN is red
• PRE-FORWARDING is orange
FIGURE 16-54 Creating an EPS Data Protection Ring by Copying a Control Network VLAN
In the Protection Ring Configuration Panel, the user selects Configure Protection Scheme The Network VLAN Manager
creates a “copy” of the control network VLAN (meaning creates a network VLAN that follows the same path as the selected
Control VLAN), and brings up the create data ring dialog to assign a data VID. Refer to the following figure.
Finally, the user selects Configure Protection Scheme. The Task List window appears as the data ring attributes are applied
to the devices. The data ring is now included in the protection domain of the associated control ring.
Table 16-8 lists the fields of the Configure EPS Data Ring panel.
TABLE 16-8 Fields for the Configure EPS Data Ring Panel
Option Purpose
Configure Protection Applies (CREATE operation) the EPS data ring attributes (control ring domain, VID, etc.)
Scheme to the devices listed.
New VLAN Protection Lists the relevant information for the created data protection ring (No fields are editable)
Domains... panel Device: The name that has been given to the device
Domain: The domain of the associated EPS control ring
Data VID: The VID that will be used to define the VLAN interfaces for the devices
Interface #1/Pri: The ports that make up the primary interface
Interface #2/Sec: The ports that make up the secondary interface
Operation: The next logical operation that can be performed.
Device Operations Options to perform on the protected data VLAN
Protect - Will create the protection ring over the domain of the control ring.
Unprotect - Activated only when the EPS Data Ring has already been created, allows the
user to delete the protection domain for the network VLAN. Note that the network
VLAN itself is not deleted. Refer to "Unprotect Data Protection Ring" on page 578.
• For option 2, an existing Data Networked VLAN is selected to become a Protected Data Network VLAN. The Network
VLAN Manager shows the map for the VLAN Interface. The user then selects Create/Protect EPS Data Ring, and the
Protection Data Ring Configuration Panel appears with the same options as shown in Figure 16-56. Once Configure
Protection Scheme is selected, the application will complete the data protection ring (and create any additional VLAN
Interfaces) as well.
• Option 3 is similar to Option 2, but since the network data VLAN has already been configured as a ring, completion of
the data network VLAN to form a ring by the application is not needed.
• EPSR and other protection schemes (STP/RSTP) are mutually exclusive; ports that use EPSR will have STP disabled.
• Ensure that a loop is not created while provisioning the protected VLANs (or ensure that there is no traffic on the
protected VLANs until the VLAN is added to the EPSR domain).
• Provisioning can be done in two ways:
• Pre-provision - The AlliedView NMS allows the administrator to pre-provision the cards, links, and network VLANs.
This does not affect current traffic since the hardware does not actually exist. Once the configuration is tested (GUI
maps are checked), the hardware can be installed, links actually connected between devices, and the states of the
devices will change so they are ready to pass traffic as pre-provisioned.
• Post-provision - All the hardware is already provisioned, allowing the administrator to provision the EPSR control
ring, add existing traffic-live network VLANS, and protect them.
Keeping in mind the rules above, the administrator should plan out the following:
• The devices, ports, and links between the ports that will be included in the EPSR configuration.
• The name and number of the control VLAN.
• The name of the domain that will include the master and transit devices, and for the master device which interfaces
(ports) will be initially primary and secondary.
• The name and number of the protected VLAN(s) to be added to the EPSR domain.
16.10.5.2 Create a Closed Network VLAN that will become the Control Ring
Using the Network VLAN Manager, create a new networked-VLAN, as shown in Figure 16-59
FIGURE 16-67 Creating the Protection Ring Network VLAN (from the Control Ring)
Input the VID (always a number) and Vlan Name and click on OK. The configuration that results from this is shown in
Figure 16-68.
FIGURE 16-73 GUI for Network VLAN no Longer with a Protection Scheme
• The device is not part of the domain (there are no Master/Transit indicators on the VLAN Interfaces.
• There is an incomplete loop (usually a missing link or device.
In Figure 16-74, a control ring has been configured following the example in Figure 16-57. The .80 device is the master node
and the .30 node is a transit node and both are configured (and connected) with the Ctrl300 as the network VLAN. The .20
device is also connected to the ring but is not protected by the Control VLAN Ctrl300. Note that these Ctrl300 labels are in
red. Moreover, there are question marks in red on the links coming form the ports. Finally, note that the .20 device has no
transit label above it.
16.10.6.2 EPSR Activated (SP Port Now Used for Data Flow)
When any link in the ring is broken, except the link connected to the master's secondary port, the secondary port link is
unblocked so data can travel on the alternate path. Details of what is happening to the control messaging are explained in the
Software Reference for iMAP Series Switches. At the AlliedView NMS, there are several windows that show pictorially what is
happening.
Note: The following figures assume that port 11.1 on the .20 device has been disconnected or disabled.
• Control Ring - The following figure shows that the link between the .20 and .30 device is now blocked. The link between
.30 and .80, which was previously blocked, has now been opened so that traffic that used to go from .30 to .20 and then
to .80 is now going directly to the .20. Moreover, the Master and Transit labels are now red.
• Alarms - Viewing the alarms shows all of the associated alarms, as highlighted below.
At the end of the procedure, all created rings are part of the SuperRing, and any Protected VLANs created on the original
ring will be protected by the SuperRing domain.
Additional Protected VLANs can be added after the Super-Ring is created by selecting any one of the control ring maps and
creating a protected VLAN on it. The NMS will automatically extend that data VLAN to all of the peer domains. This permits
creation of protected VLANs without disabling the Super-Ring, since the iMAP requires the protection to be configured on
all peer domains of a device at the same time.
16.11.2.1 Create a Network VLAN and with it Create an EPSR Control VLAN
These steps are similar to those described in "Creating Network VLANs" on page 533 and "Protection Switching-EPSR" on
page 567. The user selects one or more nodes on the Physical Network map and by using the Create VLAN Net Form
creates a loop VLAN that includes the appropriate nodes and interfaces. The user then turns this Network VLAN into an
EPSR Control VLAN (creating the EPSR domain) by right clicking on the GUI of the Network VLAN that is a ring and
selecting “Configure EPS Control Ring”.
Note: The user can also choose the VLAN Operations menu pull-down.
Making this choice brings up the Configure EPS Control Ring Panel, as shown in the following figures.
Note: When a network VLAN has been configured as a ring, the icon for a ring appears as the leaf in the VLAN Network tree
hierarchy.
The figure above shows the components of the EPSR Domain that are to be created at each node. After the Domain is
created, then the VLAN interfaces of the selected loop NVLAN (top left) will be added to the Domain as control VLANs.
Click on the “Apply Protection Domain” button to activate the tasks. AlliedView NMS will execute these tasks on each
device (called Sub-Tasks) in parallel, and provide progress messages for each Sub-Task, as shown in the following figure.
FIGURE 16-89 Task Progress for Creating EPS Ring (part of SuperRing)
When finished, an EPS Ring is created in which all the associated devices have the control VLAN configured on the relevant
interface, and one node designated as the Master, as shown in the following figure.
16.11.2.2 Create Second EPS Ring that is a Peer of First EPS Ring
The steps to create the second, peer EPS Ring are similar to the first. In choosing a looped Network VLAN where there is a
shared link with another EPS Ring, the user must put in a non-zero value for the EPSR Priority, and this value must be
different than the first ring.
Select the Network VLAN and click on Create Protection Domain. As with the first EPS Ring, the Control VLAN is
configured on all of the interfaces and the resulting GUI shows the EPS Ring and which node is Master, as shown in the
following figures.
FIGURE 16-91 Configure Peer EPS Ring (to form SuperRing Configuration)
FIGURE 16-92 Configuring the Second EPS Ring with Different EPSR Priority
Finish by selecting OK, and the system will show how the devices will be configured. The user can change the node which will
be Master at this point. Refer to the following figure.
FIGURE 16-93 Configure EPS Control Ring Panel for Second Ring
The VLAN Link from Port 7.5 on Node 10.52.30.37 to Port 9.5 on Node 10.52.30.35 is now a Shared EPSR Link, since it is
also a link of Ring jptCtrl710. Since the rings jptCtrl720 and jptCtrl710 share a link and both have priorities greater than 0,
they are peers forming a Super-Ring. Also, note that the Transmit Domains are disabled, and they cannot be enabled until the
entire SuperRIng has at least one Protected VLAN on it.
FIGURE 16-95 Selecting Create/Protect EPS Data Ring for the Control VLAN
Since the VLAN being created will be protected by multiple peer rings of a Super-Ring, the following warning is displayed:
FIGURE 16-102 View one EPS Control VLAN (used to enable Protection Domain)
Click on the tic boxes under Is Enabled, and then Modify Protection Domain. When this is done this and the other domains
become enabled as well, as shown below.
FIGURE 16-109 Task List showing Protected VLAN extends to all Nodes in SuperRing
Selecting the Control VLAN in the left panel and then Configure Protection Scheme will take the Second Protected VLAN
(816) and extend it over the entire SuperRing. When the Protected VLAN is created and the user clicks on the leaf for
VLAN 816, all the nodes of the two EPS Rings are included, as shown in the following figure.
FIGURE 16-110 Protected VLAN across Multiple EPS Control VLANs (816)
1. POTS24 for analog voice only - This is for an analog phone or modem.
2. POTS24 and ADSL for analog voice and video/data- This is using a Residential Gateway and the ADSL/POTS24 cards.
3. Ethernet - This is using a Residential Gateway and the FE10 card for digital voice and data/video
4. ADSL - This is for analog voice and data.
Following this figure are the Provision New Triple Play Customer Forms and how they would be filled out for each
configuration.
[
FIGURE 16-115 Triple Play Form - POTS24 and ADSL Card, Analog Phone Only
16.12.2.3 Configuration 3 - FE10 Card, Digital Phone Only, Video and Data
In this configuration, an iMAP 9000 is used, and using the FE card video and data are configured as well as a digital phone. The
top and bottom panels are used, with the Gateway for the Derived Voice the IP Address on the Gateway Device.
FIGURE 16-116 FE10 Card, Digital Phone Only, Video and Data
16.12.2.4 Configuration 4 - ADSL for Data and Analog Phone with Splitter
In this configuration, only the top panel is filled out for the data service, since the phone service is split off from the iMAP
device and goes to the Class 5 device.
The CES configuration can be either single or dual port; in a dual port configuration both ends of the CES circuit are
iMAP DS1/E1 ports managed by the NMS, while in a single port configuration, only one DS1/E1 port is configured on an
iMAP device managed by the NMS.
• iMG6x6MOD - With the iMG6x6MOD, a circuit emulation service can also be provided. The DS1/E1 port on the iMG
can connect to either a CES8 card or another iMG6x6MOD.
The first part of this section will focus on the CES8 to CES8 card configurations, and includes connections between CES8
cards on the same iMAP as well as different iMAPs.
The second part of this section will focus on the iMG6x6MOD and highlights an iMG6x6MOD with connections to ports on
the CES8 card, with one port to the public voice switching and the other to a PBX/Channel Bank.
Note: At this point, the card attribute Ports Type for the General Tab can be changed, but the card would need to be disabled, and
there is a warning about the need to disable the card. The Profile can also be changed, and there is a warning that such a
change will destroy existing provisioning data.
10.52.30.35,
Note 1 Port 7.1
Note 2
Common Timing
Domain
10.52.30.36
PSTN Switch 10.52.31.116
SFP
BD Fiber
Card 16 PBX/Channel B
CES8 T1 Port
(connection)
(self )
A 3
PSPAN: _x_____
50.16.3
A (self ) (connection)
UDP:50003 IP IP
PSPAN: x
P-IP: 10.10.10.16 VLAN 50 50.1
P-UPD: 50001 10.10.36.16/24 VLAN 50
(TDM data)
B (TDM data) 10.10.10.16/24 UDP: 50001
P-IP: 10.10.36.16
1 A
(card) P-UPD: 50003
(card) PSPAN: y ____
50.16.6
6 T1 Port
B UDP: 50006
P-IP: 10.10.10.16
P-UPD: 50002 (self ) (connection)
PBX/Channel Bank IP
PSPAN: _y
50.2
10.10.10.16/24 UDP: 50002
P-IP: 10.10.36.16
2 B
P-UPD: 50006
PBX/Channel B
FIGURE 16-142 Triple Play Form - Selecting General Profile brings up CES Service Config
Selection of the CES Service Profile permits entry of the following parameters.
• CES Service Profile (an RG CES Service Profile - for required module and port attributes)
• Local CES IP and mask (for the CES module being provisioned - Module specific)
• CES Port 1: will need LocalUDP, PeerIP, and PeerUDP (customer specific)
• CES Port 2: will need LocalUDP, PeerIP, and PeerUDP (customer specific)
The Provision Button becomes active after specifying the required parameters and the CustomerID (at the top).
The provision tasks are run when the Provision Button is pressed. Refer to the following figure.When finished, the user has
the option of Provisioning a new subscriber.
FIGURE 16-144 iMG/RG Inventory Table with Provisioned iMG646MOD and CES Service
The IMG/RG -> Mgmt Info tab now shows the CES VLAN, similar to the other services.
FIGURE 16-150 CES-DS1 PMON Statistics Parameter Form - Port 2 on the iMG6x6MOD
FIGURE 16-151 CES-DS1 Graph Statistics Parameter Form - Port 2 on the iMG6x6MOD
Note: Only the CES8 Stats are currently available in graph format. Use the PMON Statistics tab for iMG statistics.
FIGURE 16-152 CES-DS1 Port Thresholds Parameter Form - Port 2 on the iMG6x6MOD
Note: Only the CES8 thresholds appear. The iMG does not support thresholds that can be set.
FIGURE 16-153 CES-DS1 Port Log Parameter Form - Port 2 on the iMG6x6MOD
Note: Only the CES8 port logs appear. The iMG port does not support the Port Log feature.
FIGURE 16-154 CES-DS1 Port and PSPAN Parameter Form - Port 1 on the iMG6x6MOD
Note: In the example configuration, the peer end of Port 1 is not managed by the NMS. In this case, the one-sided screens will
appear with the iMG supported tabs only.
The NTE8 configuration always has dual endpoints, since there must be an iMAP 9000 device at each end. Moreover, each
end must be correctly provisioned for the logical hierarchy (DS1, PPP, MLPP, ETH) of the NTE8. Finally, the hierarchy for
each endpoint in a pair must be the same.
Configuring an MLPPP interface and its associated ETH interface is less straight-forward than the PPP interface, since the
MLPPP can be associated with one or more ports. Since the MLPPP/PPP relationship has to be consistent at both ends of the
DS1/E1 circuit, the user should configure both ends of the MLPPP (and its DS1/E1) connections at the same time.
The following figure shows an example configuration using DS1 ports. It includes a PPP-only as well as an MLPPP/PPPs
configuration.
FIGURE 16-158 Viewing DS1 Profile - DS1 Thresholds Tab (Note non-0 values)
• When the user clicks on Provision, the task completes, and the user selects Yes to continue data filling the form, the
Customer ID field is cleared and the just provisioned ports are no longer available in the Port pull-down. Refer to the
following figures.
Note: Any specified QoS Policy is applied tot he common Ethernet interface.
FIGURE 16-162 Viewing Dual Endpoints on Port Management - Same Customer ID on Different Devices
This shows that ports 14.0 and 21.0 are the endpoints of one pair (Customer ID NTE_DS1_0) and ports 14.1 and 21.1 are
the endpoints of the other pair (Customer ID NTE_DS1_1). By double-clicking on either of these rows, the DS1 Port
Management tabbed form appears, with the selected port on the left. One can then view/modify the details of the
configuration.
Note: In this tabbed form, it is possible to change the attributes of the endpoints, However, in most cases the user should plan the
dual endpoints so that configuration is easy and less prone to error.
FIGURE 16-173 UCP Status in the Network Inventory Table for the VLAN Interfaces (Highlighted)
Note: To ensure that the status of the VLANs/interfaces is correct, the user can rediscover the relevant devices. This will appear in
the Event view as a rediscovery, but if there are UCP-related changes, they will appear in the VLAN submap and Network
Inventory table.
FIGURE 16-179 Modify Device Software Configuration Window - Select Load for Multiple Devices
When the user selects Next, the AlliedView NMS checks the EPSR configuration and, using the configuration rules listed
above, determines the order in which the devices should be loaded. In this example, as the user clicks Next, the following
screens appear, as shown in the following figures:
• EPSR Precedence Order is Ambiguous - If the user selects Next, the AlliedView NMS determines which of the two nodes
to upgrade first.
• Remove Conflicting EPSR Loops - If the user selects Next, the AlliedView NMS determines which VLAN to ignore.
• Additional EPSR Successor Nodes Detected - A successor node must be included in the upgrade procedure. The user
should ensure all the listed devices are checked and select Next.
• Additional EPSR Predecessor Nodes Detected - A predecessor node must be included in the upgrade procedure. The
user should ensure all the listed devices are checked and select Next.
FIGURE 16-188 Accessing the Audit CES Circuit Panel for iMG6x6MOD
After selecting the Audit CES Circuits in the pull-down, the Diagnostic Audit panel appears, as shown in the following figure.
FIGURE 16-194 Profile for Port Authentication - SBx3100 (Includes MAC Authentication)
FIGURE 16-195 Profile for Port Authentication - AlliedWare Plus Devices (Includes MAC Authentication)
TABLE 16-9 Port Authorization Parameter Values - SBx3100 and AlliedWare Plus
The NMS requires an anonymous FTP server if you are managing Genband or iMG devices. This section describes how to
install an FTP server for the NMS.
17.1 Windows
To install an FTP server on Windows, you must install and configure Internet Information Services (IIS), the web server
software included with Windows. To install IIS, follow the documentation included with your Windows platform.
17.2 Linux
The NMS has been tested with the vsftpd FTP server on the Linux platform.
anon_max_rate=2048000
xferlog_enable=YES
# listen_address=10.52.18.230
listen_port=21
chown_uploads=YES
chown_username=ftp
ftp_username=ftp
log_ftp_protocol=YES
anon_umask=0022
chown_upload_mode=0755
FIGURE 18-1 Network Hierarchy Model for Large Deployment of RGs - Access Islands
For each service provider’s wiring center exchange, there can be a Provider Edge-Access Network (PE-AN), and these can
be divided into Multi-service Access Island Networks. These Access Islands are basically one leaf of the larger network, and
can be the initial configuration when a small number of RGs are initially deployed. With growth, a PE-AN could service, for
example, 15,000 customers, which each island supporting 1000.
Note: So with this configuration, there can be up to 15 Access Island networks. This concept is used during provisioning.
Usually, one or two GbE or 10GbE Level-3 routers (PE-R) can be used to service the entire PE-AN; with this design the
number of anticipated advanced subscriber services will determine the size and capabilities of the required provider edge
router.
Note: Each Access Island uses a set of VLAN numbers unique to that Access Island; the next Access Island uses VLAN numbers that
are usually the next number up. For example, Access Island one (AI01) could use a set of VLANs (201, 301, 401, 501, and
601) for DHCP discovery and the subscriber services. The next Access Island would use 202, 302, etc. The exception would
be when the PE Router (L3) supports a Virtual Routing Function (VRF) and therefore sufficient multicast routing capabilities.
Then each Access Island could have the same VLAN configuration (mirror configuration). The one-hundred level VLANs (200,
300 etc.) could be for testing with the prefix TEST.
Note: When provisioning with Profiles for each Access Island, the only Profiles that are unique to each Access Island are the General
Profiles, since the General Profile contains the VLAN and L3 static route information. The other Profiles (for service types) are
usually the same for RGs in any Access Island since the service offered would have the same attributes.
iMG634
= 10.56.7.224
FXS FXS
= IP Subnet
= 172.16.33.18 10 Video to
40 Ethernet
Set Top Box
= voice VLANs for VOIP_SP (VID 10, 11)
xDSL xDSL
= data VLANs for ISPs (VID 20, 21)
21
= video VLANs for VSPs (VID 40, 41) Ethernet Data to PC
Video
Heads
iMG646
= IP Subnet = 10.56.7.230
Customer
Data to PC
20
Ethernet
SFP FX BD Fiber
XE/GE NM card Video to
11 41
Ethernet Set Top Box
ISPs IP
Gateways
Video to
Set Top Box
FXS FXS Ethernet
10
10
Video to
EPON BD Fiber 40 Set Top Box
= 172.16.33.18 Ethernet
Video to
Set Top Box
Ethernet
Video
Head
iMG646
Customer
40 = 10.56.7.224
40 Video to
Ethernet Set Top Box
SFP FX BD Fiber
XE/GE NM card iMG646 Video to
Set Top Box
10 10 Ethernet
Data to PC
Ethernet
FXS FXS
iMG634
Video to
= 10.56.7.225 Set Top Box
Ethernet
Video to
40 Set Top Box
Ethernet
xDSL xDSL
10 Data to PC
Ethernet
FXS FXS
POTS
3_play_Video_Shared
The NMS allows you to create seven types of iMG service profiles. Each profile contains settings and attributes for a
particular service. The seven profile types are:
• iMG General Profile
• iMG Internet Profile
• iMG Video Profile
• iMG Voice Profile
• iMG CES Profile
• iMG CES-DS1 Port Profile
• iMG CES-E1 Port Profile
Note: The terms “RG” and “iMG” are used interchangeably in both the NMS client user interface and in this document. Unless
explicitly stated, anything that applies to an iMG applies to an RG, and vice versa.
19.1 Prerequisites
Before Profiles can be created, the administrator has already done the following:
• The DHCP servers and DNS servers have been set up
• Routing has been set up
• The G6 setup and if required with the IP address of BBI and AI's default router IP for voice subnet
• Knowledge of the “back office” management subnets
• Knowledge of the vpn “back office” management subnet
Note: These “back office” subnets are separate subnets that ensure that it is possible to communicate with the RG. These require
separate routes as well. Refer to "iMG General Profile" on page 702.
• The service VLANs have been set up on the relevant iMAPs.
• Set of RG Profile names that will be used. For General RG Profiles the following shows the naming convention.
For Access Island 1 (AI01)
• SPSI-AI00-P_1I_1V (Phone, 1 Internet, 1 video)
• SPSI-AI00-P_1I_2V (Phone, 1 Internet, 2 video)
For Access Island 1:
• SPSI-AI00_1I_2V (1 Internet, 2 video)
• SPSI-AI00_1I_3V (1 Internet, 3 video
• etc....
Note: Because rate limiting may be a factor the name may need to highlight this as well.
Note: “Packaged” marketing terms may also be appropriate names here, such as “DVLK-AI01-DSLPro+VVid”
Attribute Value
Profile Name A descriptive name that should match the service/function provided
The prefix of profile name should start with a short but meaningful name that
indicates the routing function and the Access Island and the service potential of the
general profile, with the number of ports. Refer to Prerequisites. This is used for
scoping.
SPSI-AI01-1I_2V_3T (VoIP Telephone, 1 Internet, 2 Video, 3TLS)
Profile names can only be up to 20 characters. To include all services, the
administrator may need to delete an underscore. This is OK as long as the prefix
works for scoping.
Profile Scoping When used in conjunction with the Triple-Play form, controls the profiles available
after selecting the device.port, or controls the device.port available after selecting the
Profile.
iMG/RG Bootstrap VLAN Id The default VLAN on the RG that is used when sending the original Discover
Message. This is “out of the box” (factory configuration). This is used only through
bootstrap.
Persist Checkbox Used to retain the bootstrap VLAN at the end of triple play provisioning to aid in the
replacement of faulty CPE. It can also put the bootstrap VLAN on the port when the
profile (with Persist checked) is applied to the port from the View/Modify screen or
deployed from the deploy profile tool.
iMG/RG Mgmt VLAN ID The VLAN used for subsequent downloads once communication is established with
the AlliedView NMS. It is derived from the im.conf file.
Include Service VLANs in Controls which network model is to be used.
Profile True - Access Island model is being used, and service VLAN fields are activated.
False - Open Access model is being used, and service VLAN fields are de-activated.
Modify VLANs during Allows you to set customer-specific VLAN IDs.
Provisioning True - Enables fields on the Provision New Triple Play Customer box to enter
customer-specific VLAN IDs. If services are assigned to ports and this setting is true,
the VLAN ID fields on the Triple Play form are required for the assigned services.
False - Customer-specific VLAN IDs are not required. If Include Service VLANs in
Profile is set to True, the NMS uses the default VLAN ID values.
iMG/RG Internet VC/VLAN The VLAN used for internet type service
ID
iMG/RG Video VC/VLAN ID The VLAN used for video type service
iMG/RG Voice VC/VLAN ID The VLAN used for voice type service
iMG/RG CES VC/VLAN ID The VLAN used for CES type service
iMG/RG Additional VLAN Shows VLAN IDs for custom VLANs. Use the Add/Remove button to open the
IDs Additional VLANs panel. Note that port service must be set to “None” to add an
additional VLAN to the iMG. Refer to Provisioning Custom VLANs.
System Power Management Enabled or disabled. Refer to System Power Management.
Attribute Value
Loop Detection Loop detection is intended to detect layer-2 loops in subscriber networks. When
enabled, loop detection will disable the port where the symptom is detected before
the loop does damage to the service provider's network.
Loop detection is available on all switch interfaces on iMGs running software release
4.3 and above. On iMGs running software release 2.x or 3.x, loop detection is
supported on 10M half-duplex links and is intended to support Ethernet links that
have baluns connected.
SNTP Server The IP address for the SNTP server, used to derive the correct time and time
settings. (Default is None.)
Daylight Saving Enables or Disables the Daylight Savings Feature for the iMG/RG. Note that this is
only for devices on release 3-7 and up. This is also available on the Services
Management Window.
Time Zone Time Zone for the iMG, for example EST for Eastern Standard Time.
For TR-069 CPEs, this is determined by the SNTP server setting, and so SNTP Server
must be filled in first. If no SNTP server is provisioned, the iMGs default to
“clock.fmt.he.net”.
Limited User Login User ID of user with limited capabilities
New Limited User Password Password for the Limited User
New Manager Password Password for the user that the AlliedView NMS uses when it provisions the device.
The userID is part of AlliedView NMS, has super user privileges, and cannot be
changed.
Super User Login The super user that can be created and changed by the administrator.
New Super User Password The password for the Super User.
Split Management A subscriber (rather than an NMS administrator) can configure wireless parameters
on wireless iMG devices. Refer to Split Management for Wireless iMGs.
DHCP Client Options DHCP client options for the service. Options 3 and 121 are supported. Option 3 is
enabled by default in the iMG.
Use Add/Remove to open the DHCP Client Options box. You can enable or disable
each option listed.
Mgmt. Subnets Controls what IP addresses are allowed to log into the iMG/RG using CLI or the iMG/
RG’s web-based GUI.
If no values are entered, any IP address can access the iMG/RG (using a login ID and
password).
Once at least one value is entered, the AlliedView NMS will add its own entry.
Name - A name to identify the subnet. This cannot being with a digit.
Subnet Address - An IP address. Used with the Mask Field to define a range.
Mask - The mask used with the Subnet Address to define a range.
Start Address - The first address in a range
End Address - The last address in a range.
Copy values from profile To create a new profile based on values from an existing profile, select an existing
profile from the drop-down list. The fields will pre-populate with the values from the
selected profile. Modify any fields as necessary for the new profile.
Create Creates the profile.
Cancel Closes the window without creating the profile. The values are not saved.
Note: To configure the network as depicted in Figure 18-1, the RG General Profile should represent a specific Access Island (a group
of iMAPs sharing a common set of VLANS and router[s]), so the Profile is defining Level-3 details and the VLAN values
associated with it. Therefore if you had 4 access Island you would have 4 general profiles. This is assuming Virtual Routing is
not in use.
Note: For the RG613, RG656, and the iMG646, only the manager password should be changed. (This is because a password can
only be changed by switching to the user for that password. If the administrator changes the password for the Limited User
(with the switching to the Limited User), the RG cannot switch back to Manager User. As a result, if the password for the
Limited User is changed first, and then the Manager User password is changed within 5 minutes, there will be a time-out and
the Manager User password will not be changed. (Waiting 5 minutes between these actions, or changing the Manager User
first allows both changes to be made.)
Attribute Value
Port Assignment The selection made here controls which fields appear on the Provision New Triple
Play Customer form.
Settings - Port assignments will not be displayed when provisioning a new customer.
The values as set in the profile will be used.
Defaults - Port assignments from the profile will be displayed on the provisioning
screen for review and can be modified when provisioning a new customer.
After the customer is provisioned, you can view and modify port assignments from
the Port Management view/modify screen.
Port The ports associated with the device.
Ports 1-6 - The LAN ports on the device.
Wireless - This port is available on wireless devices only.
HPNA - This port is available on the iMG6x6MOD. Refer to Configuration 7 -
iMG7x6MOD with HPNA.
RF -
G-Lan 1-2 - These ports are available with the 1 Gigabit WAN with RJ-45 LAN card
to provision services on the G-Lan ports.
Service The type of service to configure on the port during provisioning.
None - No service will be configured on the port.
Internet - A data service (type not determined here) will be configured on the port.
TLS - Transparent LAN Service will be configured on the port.
Video - A video service (type not determined here) will be configured on the port.
Voice - A VoIP phone is connected to the LAN port (configured on Voice VLAN)
This service is not available on the HPNA port.
Internet/Video - For Media Room. In this configuration, a new service is configured
for a LAN port called “'Internet/Video” to indicate that the port can be used for video
or data traffic.
Management -
Speed The following speed settings are available:
• Autonegotiate - The line will chose the maximum speed and direction it can
support.
• Coax - Used for P2P RG59 + RG6 coax (10 Meg Full Duplex) in a star/hubspoke
top with software loop detection.
• 1G Full
• 1G Half
• 100M Full
• 100M Half
• 10M Full
• 10M Half
Upstream Rate Limit (kbps) Speed in kbps for the maximum upstream rate.
Downstream Rate Limit (kbps) Speed in kbps for the maximum downstream rate.
TABLE 19-3 Create iMG General Profile - Port Assignment Tab (Continued)
Attribute Value
Admin. State These are set in the General Profile. As with other parameters in the profile, if the
admin state in the profile differs from that on the iMG, then a profile out of sync alarm
is generated on re-discovery.
For profiles that existed before this enhancement, the admin state for ports that have
a service is set to enabled, and for those ports without a service, the admin state is
set to disabled.
Advanced Port params Brings up specific features:
- Disable on Power Failure feature for the port. Refer to "LAN Ports Power
Management" on page 899.
- Flow Control - Refer to "Flow Control" on page 902
- DSCP Status - Enables the support of DSCP IP field on the incoming frames. Refer to
the Allied Telesis Gateway Product Family Software Reference, command SWITCH SET
SUPPORT DSCP.
- Protect - Refer to "Protected Ports" on page 905.
- Additional Untagged VLAN IDs - Refer to "Provisioning Custom VLANs" on page
818.
- Additional Tagged VLAN IDs - Refer to "Provisioning Custom VLANs" on page 818.
Copy values from profile To create a new profile based on values from an existing profile, select an existing
profile from the drop-down list. The fields will pre-populate with the values from the
selected profile. Modify any fields as necessary for the new profile.
Create Creates the profile.
Cancel Closes the window without creating the profile. The values are not saved.
Attribute Value
IP Route IP Routes that are available for the RG
The user should always create a route to the “back office” management subnets.
(The AlliedView has one as well that is unavailable to the user.)
Enabled Activates the other IP Route Fields
Subnet Subnet address
Mask Mask over the subnet address, usually 255.255.255.0
Gateway IP address for the Gateway server
Copy values from profile To create a new profile based on values from an existing profile, select an existing
profile from the drop-down list. The fields will pre-populate with the values from the
selected profile. Modify any fields as necessary for the new profile.
Attribute Value
Create Creates the profile.
Cancel Closes the window without creating the profile. The values are not saved.
Note: The administrator should also add route(s) that include the entire scope of management subnets that will require “direct”
access to RGs. (The AlliedView NMS will always have direct access but TAC/NOC Staff with their PCs/workstations may not
unless specifically included in a route.
Note: For Media Room, the routes table in General profile allows up to 10 different routes in the iMG because media room devices
connected to the iMG may request services configured in separate subnets on the upstream network.
• Firewall - The Firewall feature ensures that only traffic that has been already defined is allowed to access the internal
network. This is done by provisioning the following:
• Port Filters - These are port attributes that define:
- What protocol type is allowed (specified using the protocol number or the protocol name)
- The range of source and destination port numbers allowed
- The direction that packets are allowed to travel in (inbound, outbound, neither, or both)
• Validators - How the Firewall handles packets based on the source/destination IP address.
• Intrusion Detection System (IDS) - This protects the system from the following kinds of attacks:
• DOS (Denial of Service) attacks - a DOS attack is an attempt by an attacker to prevent legitimate hosts from
accessing a service.
• Port Scanning - an attacker scans a system in an attempt to identify any open ports.
• Web Spoofing - an attacker creates a 'shadow' of the World Wide Web on their own machine, however legitimate
host sees this as the 'real' WWW. The attacker uses the shadow WWW to monitor the host's activities and send
false data to and from the host's machine.
There are parameters that are filled out to configure each type.
• Network Address Translation (NAT) - The basic NAT feature is that the devices in the internal network have their own
IP addresses and yet access the external network using a separate internet address, and this is the only address devices
on the external network see. Doing this provides both a conservation of public IP addresses and security. Security is
provided by keeping an internal table of the source IP address and source port as well as a substitute source port
number. Packets coming from the external network must include the substitute port number or the packet is dropped.
In some cases, you need to set up static IP addresses/port mappings. This is done using Global Pools and Reserved
Mappings.
• A Global Pool is a range of external IP addresses that are available, rather than one. The reason global pools are used is
so that you can map an outside address to a specific internal interface. This is called reserve mapping.
• Reserved Mapping is used for mapping an IP address from the Global Pool to an individual address of a device in the
internal network. When NAT receives a message, it uses its internal interface to forward the packet to the same port
number on a selected internal computer, as well as any responses from the internal computer that are forwarded to the
requesting external computer. Reserved mappings can also be used so that different internal hosts can share the same
global address by mapping different ports to different hosts. For example, Host A is an FTP server and Host B is a Web
server, and by mapping the FTP port to host A and an http port on Host B, both hosts can use the same external address.
• Internet Key Exchange (IKE) - To support NAT IPSec traversal, you specify how Internet Key Exchange (IKE) packets are
translated. IKE establishes a shared security policy and authenticates keys for services that require keys, such as IPSec.
Before any IPSec traffic can be passed, each router/firewall/host must verify the identity of its peer. The user specifies
whether the source port will be translated for IKE packets, or IKE cookies are used to identify IKE sessions.
• PPPoE - You must enable PPPoE on an iMG 1000 or iMG 2000 series device from the Internet profile. Once an iMG 1000
or iMG 2000 series device is provisioned to use PPPoE, you can modify the PPPoE username and password, but you
cannot disable PPPoE without deploying a new Internet profile or deprovisioning and reprovisioning the iMG.
Note: You cannot use the Deploy Profile menu command to apply an Internet profile with PPPoE enabled to iMGs. You must apply
these profiles from the iMG View/Modify screen, or when you initially provision an iMG with a new triple play customer.
TABLE 19-5 Create iMG Internet Profile General Internet Info Tab
Attribute Value
Profile Name A descriptive name that should match the service provided.
Profiles that use the Access Island (AI) concept have the ‘Include Internet VLAN in
Profile’ set to False. For the Open Access (OA) model, the field is set to True and a
VLAN number can be entered in the ‘iMG/RG Internet VLAN ID’ field (2..4094).
Example Names:
• BasicHomeInetAI (Security, and therefore Firewall and NAT disabled)
• BasicHomeInetOA (same as above but includes internet VLAN ID)
• BusinessInetAI (Security and Firewall are Enabled but any attributes datafilled
are not included as part of the Profile)
• BusinessInetOA (same as above but includes internet VLAN ID)
• BusinessStatic (Routed Service)
• HomeNetworkingAI (Security, Firewall, and NAT are Enabled and any
attributes datafilled are included as part of the Profile)
• HomeNetworkingOA (same as above but includes internet VLAN ID)
• Bridged Int Srv (Bridged Service)
Internet Service Type Bridged Service
Routed Service
Include Internet VLAN in Profile The value entered here depends on the network model:
False - The Access Island model is used, and the Internet VLAN Id field is blank.
True - The Open Access model is used, and the Internet VLAN Id field is activated.
iMG/RG Internet VLAN ID The VLAN that supports internet service.
(2..4094) If the ‘Include Internet VLAN in Profile’ is set to True, this field is activated.
Use PPPoE Determines whether the iMG will use PPPoE to connect to the ISP.
False - The PPPoE protocol will not be used to establish the connection between
the iMG and the ISP.
True - The PPPoE protocol will be used to establish the connection between the
iMG and the ISP.
To activate the PPPoE field, the Internet Service Type must be set to Routed
Service.
When Use PPPoE is set to True, the Use DHCP to obtain WAN IP Address field is
deactivated.
TCP MSS Clamp When using the PPPoE client on the iMG, either the iMG or the PPPoE
concentrator/RAS should be configured to clamp the maximum TCP MSS value. For
PPPoE the maximum mss is 1452. Without this clamp, connectivity issues could
occur, and access to some websites could fail. Refer to the Allied Telesis Gateway
Product Family Software Reference.
Internet MTU This does not appear on the Profile, but does show up on the Service Management
form. The MTU is the Maximum Transmission Unit - the maximum packet size (in
bytes) an interface can handle. The MTU should be set to a value appropriate for
the transport attached to the interface (typically from 576 to 1500 bytes). Refer to
the Allied Telesis Gateway Product Family Software Reference for more information.
iMG/RG Local Customer VLAN VLAN that is local to the iMG only.
ID (2..4094)
Use DHCP to Obtain WAN IP If True, use DHCP Discovery to obtain the network-side IP address for the RG. If
Address False, static IP provisioning and IP/masks must be manually entered.
TABLE 19-5 Create iMG Internet Profile General Internet Info Tab (Continued)
Attribute Value
DHCP Client Options DHCP client options for the service. Options 3 and 121 are supported. Option 3 is
enabled by default in the iMG.
Use Add/Remove to open the DHCP Client Options box. You can enable or
disable each option listed.
DNS Servers (list of IP Addrs. or DNS servers associated with the DHCP discovery
None)
Local IP Address The IP address of the iMG/RG for the LAN that it services.
This and the remaining fields are activated only when NAT is enabled on the NAT
tab.
Local Mask The masking for the local IP addresses. Usually this is 255.255.255.0 so that the
local addresses can range from 1 to 255.
Local DHCP Start IP Address The first address in the range for a local device in the local network. This possible
range must be derived from the local IP address and the local mask.
Local DHCP End IP Address The last address in the range for a local device in the local network.
Local DHCP Server Options DHCP server options for the service. Options 66 and 67 are supported. Both
options are disabled by default in the iMG.
Use Add/Remove to open the DHCP Server Options box. You can enable or
disable and set a value for each option listed.
Rate Limiting Enable or disable rate limiting.
When enabled, the upstream and downstream attributes (Rate Limit, Burst Size and
Scalar) are editable.
The downstream rate limiting applies to Internet VLAN traffic and is used for
wireless traffic because the downstream rates are applied on WAN port when the
traffic enters the iMG.
Upstream rate limiting applies to Local VLAN traffic which applies to LAN ports but
not wireless because classifiers are applied on the transport and the wireless
transport is not the same as LAN transport.
Scalar represents the weight of each byte of data coming over the channel. The
higher the scaler value the lower the worth each byte of data is counted for rate
limiting purposes. This allows a more precise reflection of actual network traffic.
For certain wireless IMG devices running software release 3.8 or higher, you can
configure the upstream rate limits. Note that the NMS will use the same rate limit
values that are currently set for wired ports on wireless. The devices that support
this are:
• iMG616-W
• iMG634-A-W-R2
• iMG634-B-W-R2
These fields can also be changed on the Service Management form for these
wireless devices.
Up. Rate Limit (1..50000 kbps) The upstream rate limit.
Up. Burst Size (1..67108 bps) The upstream burst size.
Up. Scalar (1..100) The upstream scalar weight.
Down. Rate Limit (1..50000 kbps) The downstream rate limit.
Down. Burst Size (1..67108) The downstream burst size.
TABLE 19-5 Create iMG Internet Profile General Internet Info Tab (Continued)
Attribute Value
Down. Scaler (1..100) The downstream scalar weight.
UPnP Enable or disable UPnP on the iMG.
You can enable UPnP for either Internet or video service, but not both
simultaneously. If UPnP is enabled on the Internet service it must be disabled on the
video service, and vice versa.
Copy values from profile To create a new profile based on values from an existing profile, select an existing
profile from the drop-down list. The fields will pre-populate with the values from
the selected profile. Modify any fields as necessary for the new profile.
Create Creates the profile.
Cancel Closes the window without creating the profile. The values are not saved.
Attribute Value
Security Whether the feature is Enabled or Disabled. This option is activated only for
Routed Service. Moreover, it controls whether the Enable/Disable fields for Firewall
and NAT are activated.
Note: Security does not have to be enabled to enter Triggers and Mgmt.
Stations, although this would not usually be done.
Include Security Info as part of Whether Triggers or Mgmt. Stations are included in the profile.
Profile
Rapid Route Used to configure the iMG for Media Room support. This enhances NAT routing
functionality in CPE for better throughput of routed traffic.
Attribute Value
Triggers A set of attributes that allows an application to open a secondary port to transport
packets. A trigger opens a secondary port dynamically, and allows you to define the
length of time the port can be inactive before it is closed.
- Trigger Name - a label that helps identify the trigger. It cannot start with a digit.
- Type - protocol for the application, tcp or udp
- Start Port - First port in the range for the control session.
- End Port - Last port in the range for the control session.
- Max. Act. Interval - the amount of time (in milliseconds) the secondary port is
allowed to pass traffic before it is closed. The default is 3000 (3 seconds).
Copy values from profile To create a new profile based on values from an existing profile, select an existing
profile from the drop-down list. The fields will pre-populate with the values from
the selected profile. Modify any fields as necessary for the new profile.
Create Creates the profile.
Cancel Closes the window without creating the profile. The values are not saved.
FIGURE 19-7 iMG Internet Profile - Security tab - Advanced Trigger Attributes
TABLE 19-7 Create iMG Internet Profile Security Tab - Advanced Trigger Attributes
Attribute Value
Secondary Start Port The start of the secondary port range for an existing trigger.
Secondary End Port The end of the secondary port range for an existing trigger.
Allow Multiple Hosts Controls whether a secondary session can be initiated to/ from same or different
remote hosts on the same trigger.
Session Chaining - Session Chaining - Whether TCP dynamic sessions can also become triggering
sessions, which allows multi-level session triggering.
UDP Session Chaining Whether both UDP and TCP sessions also become triggering sessions, which
allows multi-level session triggering.
TABLE 19-7 Create iMG Internet Profile Security Tab - Advanced Trigger Attributes
Attribute Value
Binary Address Replacement Enables/disables binary address replacement on an existing trigger. You can then set
the type of address replacement (TCP, UDP, both or none)
Address Translation Type Specifies what type of address replacement is set on a trigger. Incoming packets are
searched in order to find their embedded IP address. The address is then replaced
by the correct inside host IP address, and NAT translates the packets to the
correct destination. You can specify whether you want to carry out address
replacement on TCP packets, on UDP packets, or on both TCP and UDP packets.
Attribute Value
Firewall Whether the feature is Enabled or Disabled. This option is activated only for
Routed Service.
Security does not have to be enabled to enter IDS and Port Filters.
Include Firewall Info as part of Whether IDS and Port Filters are included in the profile. If False, the attributes are
Profile configured on the iMG/RG but not activated.
IDS Whether IDS is Enabled or Disabled. If Enabled, the IDS Parameters window is
activated.
IDS parameters can be datafilled and enabled regardless of whether the FIrewall
feature is enabled, since IDS applies to the iMG, and is not associated with specific
Firewall attributes.
Port Filters Rules that determine what kind of traffic can pass between the external and internal
network.
- Port Filter Name - A label to help identify the filter. It cannot start with a digit.
- Status - Enabled or Disabled
Validators Blocks the traffic to/from the IP addresses/masks defined. All other traffic is
allowed.
- Validator Name - A label to help identify the validator. It cannot start with a digit.
- Direction - Can be one of the following:
- Inbound (Validator blocks incoming traffic based on IP address/mask)
- Outbound (Validator blocks outgoing traffic based on IP address/mask)
- Both (Validator filters both incoming and outgoing traffic based on IP address/
mask.
- IP Address - The IP address to be filtered.
- Mask - The mask, such as 255.255.255.0 or 255.255.255.255 (single address)
Copy values from profile To create a new profile based on values from an existing profile, select an existing
profile from the drop-down list. The fields will pre-populate with the values from
the selected profile. Modify any fields as necessary for the new profile.
Create Creates the profile.
Cancel Closes the window without creating the profile. The values are not saved.
TABLE 19-9 Create iMG Internet Profile Firewall Tab - IDS Attributes
Attribute Value
IDS Blacklist Enabled or Disabled - Blacklisting denies an external host access to the system if
IDS has detected an intrusion from that host. Access to the network is denied for
ten minutes.
IDS Victim Protection Enabled or Disabled - This protects the system against broadcast pings with a
spoofed source address. Packets are blocked for a specified duration (600 minutes
by default, can be changed using Duration field below)
IDS DOS Attack Block A DOS attack is an attempt by an attacker to prevent legitimate users from using a
Duration service. If a DOS attack is detected, all suspicious hosts are blocked for a set time
limit. Default is 1800 seconds (30 minutes)
IDS Scan Attack Block If hosts are blocked, sets the duration of the block time limit.
Duration
IDS Victim Protection Block If victim protection is enabled, specifies the duration of the block
Duration
Max. TCP Open Handshaking The maximum number of unfinished TCP handshakes allowed before a flood is
Count detected.
The attacker is blocked by the time defined in the IDS DOS Attack Block Duration
field.
Max. Ping Count The maximum number of pings allowed before an echo storm is detected.
The attacker is blocked by the time defined in the IDS DOS Attack Block Duration
field.
Max. ICMP Count The maximum number of ICMP packets allowed before a flood is detected.
The attacker is blocked by the time defined in the IDS DOS Attack Block Duration
field.
FIGURE 19-10 iMG Internet Profile - Firewall tab - Port Filter Attributes
TABLE 19-10 Create iMG Internet Profile Firewall Tab - Port Filter Attributes
Attribute Value
Protocol udp, tcp, or icmp. For ICMP, there are no Start and Destination Port attributes.
Only these three protocols are supported.
Direction Inbound (allows packets from the external to the internal network), Outbound
(allows packets from the internal to the external network) or Both.
Source IP Addr. The IP address from which packets of the protocol can be sent out. This is used in
conjunction with the Source Mask.
Source Mask The mask for the Source IP Address.
Source Start Port The start of a source port range for udp or tcp packets.
Source End Port The end of a source port range for udp or tcp packets.
Destination IP Addr. The IP address to which packets of the protocol can be sent. This is used in
conjunction with the Destination Mask.
Destination Mask The end of a destination port range for udp or tcp packets.
Destination Start Port The start of a destination port range for udp or tcp packets.
Destination End Port The end of a destination port range for udp or tcp packets.
Attribute Value
NAT Whether the feature is Enabled or Disabled. This option is activated only for
Routed Service.
IKE Translation Specifies how Internet Key Exchange Packets are translated.
- Ports - Source port is translated for IKE packets.
- Cookies - IKE cookies are used to identify IKE packets.
Include NAT Info as part of Whether Global Pools and Reserved Mappings are included in the profile.
Profile
Copy values from profile To create a new profile based on values from an existing profile, select an existing
profile from the drop-down list. The fields will pre-populate with the values from
the selected profile. Modify any fields as necessary for the new profile.
Attribute Value
Create Creates the profile.
Cancel Closes the window without creating the profile. The values are not saved.
Attribute Value
Enable Wireless Enable or disable the wireless interface on the device. When the wireless network
is disabled, the wireless network can be seen but connections are not allowed.
Country The 802.11d country string for the wireless card.
Standard Specifies the wireless standard for the device.
-B
-G
- G Only
-N
- N Only
Channel The default channel to use.
- Auto - Automatically select the best channel when the device starts up.
- 1-11 - The specific channel to use.
Wireless Settings - Enabled - Enables or disables the SSID.
- SSID - The SSID for the wireless network.
- Hidden - Prevent the SSID from being broadcast.
- Disabled - The SSID is broadcast.
- Enabled - The SSID is hidden.
- Isolated - Specifies whether Client Isolation is implemented in the wireless
network.
- Enabled - Use Client Isolation in the network.
- Disabled - Do not use Client Isolation in the network.
- Clients - The maximum number of clients that can connect to the iMG’s wireless
network.
- Authentication - The type of authentication to use in the network.
- Open
- WPA-PSK
- WPA2-PSK
- Mixed WPA2/WPA-PSK
- Passphrase - The wireless network password.
Copy values from profile To create a new profile based on values from an existing profile, select an existing
profile from the drop-down list. The fields will pre-populate with the values from
the selected profile. Modify any fields as necessary for the new profile.
Create Creates the profile.
Cancel Closes the window without creating the profile. The values are not saved.
Attribute Value
Profile Name A descriptive name that should match the service/function provided
Example Names:
• Flood - This would match the NONE for IGMP Mode (IGMP Snooping turned
off)
• Snoop (646 and 656) - Note that all RG600 series RG/IMG will support
snooping in the next sw release.
• Proxy - The RG performs the IGMP function. Possible Names are:
• (These are for ADSL only)
• ManualSec2/Proxy (up to two STBs and must specify STN MAC address)
• ManualSec3/Proxy (up to three STBs)
• AutoSec2/Proxy (up to two STBs and STB sends its MAC address)
• AutoSec3/Proxy (up to three STBs)
(These will be available in future releases as they are supported.)
• ManualSec2/Snoop
• ManualSec3/Snoop
• AutoSec2/Snoop
• AutoSec3/Snoop
Include Video VLAN in Profile The value entered here depends on the network model:
False - The Access Island model is used, and the Internet VLAN Id field is blank.
True - The Open Access model is used, and the Internet VLAN Id field is activated.
iMG/RG Video VLAN Id The VLAN that supports internet service.
If the ‘Include Video VLAN in Profile’ is set to True, this field is activated.
Use DHCP to obtain WAN IP - Used for the Media Room feature.
Address
DHCP Client Options DHCP client options for the service. Options 3 and 121 are supported. Option 3 is
enabled by default in the iMG.
Use Add/Remove to open the DHCP Client Options box. You can enable or disable
each option listed.
Attribute Value
IGMP Security Enabled or Disabled
When “learning” is enabled the RG will only allow those trusted hosts (STB) if
specified in the Triple Play screen to participate in IGMP (ask for broadcast channels
When “autolearning” is enabled as well as “learning” the RG when booting up will
automatically learn “X” number of trusted hosts (STB) as specified in the video
profiles “trusted host limit” field.
Note: IGMP Security, Autolearning, and Trusted Host Limit are currently valid
only for ADSL versions of the RG. Release 2.4 will include these features
for Ethernet-based iMG/RGs (613, 613, etc.)
IGMP Security Autolearning Enabled or Disabled
Trusted Host Limit Number of hosts (STBs) that the RG can support.
IGMP Default Fast Leave Enables or Disables the default to keep track of Multicast Group membership by
MAC address, so Leaves are processed imme-diately and the interface is removed
from the Multicast Group (no timers).
UPnP Enable or disable UPnP on the iMG.
You can enable UPnP for either Internet or video service, but not both
simultaneously. If UPnP is enabled on the video service it must be disabled on the
Internet service, and vice versa.
Copy values from profile To create a new profile based on values from an existing profile, select an existing
profile from the drop-down list. The fields will pre-populate with the values from the
selected profile. Modify any fields as necessary for the new profile.
Create Creates the profile.
Cancel Closes the window without creating the profile. The values are not saved.
Attribute Value
Profile Name A descriptive name that should match the service/function provided.
The prefix of profile name could include the string that identifies the Access Island as
well as the service potential, such as:
SPSI-AI01-UpTo4Line
The user would give this name to the profile because it would have four voice lines
filled in; if the user had one voice line provisioned and needed to provision an
additional voice line, the same profile could be used.
Profile Scoping When used in conjunction with the Triple-Play form, controls the profiles available
after selecting the device.port, or controls the device.port available after selecting the
Profile.
VOIP Type The protocol/server configuration to provide VOIP service:
- MGCP
- SIP
Specific types for each are selected in the Advanced VOIP Attributes panel.
Include Voice VLAN in Profile The value entered here depends on the network model:
False - The Access Island model is used, and the Voice VLAN Id field is blank.
True - The Open Access model is used, and the Voice VLAN Id field is activated.
iMG/RG Voice VLAN Id The VLAN that supports voice service.
If the ‘Include Voice VLAN in Profile’ is set to True, this field is activated.
Use DHCP to obtain WAN IP False - Do not use DHCP to obtain the network side address for the iMG.
Address True - Use DHCP to obtain the network side address for the iMG.
The default is False.
DHCP Client Options DHCP client options for the service. Options 3 and 121 are supported. Option 3 is
enabled by default in the iMG.
Use Add/Remove to open the DHCP Client Options box. You can enable or disable
each option listed.
iMG/RG Domain The critical component of provisioning voice, this is used in the following ways:
- the domain that is added to the fully qualified domain name for the voice subnet.
Refer to Dynamic DNS Naming for Voice Subnets.
- When using MGCP and not using a GenBand device, this can have the VoIP
endpoint. The value specified must start with a @. Note that this value must match
the endpoint provisioned in the other MGCP device in the configuration.
The NMS supplies the “aaln/<telport number>”at the beginning of the string, and then
the user continues the value with @. Therefore, values from vendors that do not
follow this format are not supported, such as “$MAC:aaln/0@[$IP]”. Modifying the
end-point syntax is an advanced setting and should not be used unless required by the
MGCP server.
This value can also be changed on the iMG/RG->Voice Service tab of the service
management form. Refer to Changing VoIP Endpoint Syntax.
Attribute Value
MGCP Endpoint Syntax Begins This field applies to iMG 1000 and iMG 2000 series devices.
with The MGCP call agent uses MGCP endpoint identifiers to address the iMG analog
telephone ports. Select '0' or '1' to map the endpoint identifiers to the telephone
ports on the iMG sequentially starting with either aaln/0 or aaln/1.
MGC or SIP Proxy Server Proxy Server for MGCP or SIP
Secondary SIP Proxy Server This field applies to iMG 1000 and iMG 2000 series devices.
A secondary SIP proxy server for redundancy and failover. A secondary proxy server
will not function without a primary server.
SIP Location Server Activated when SIP is chosen as the Voip Type
Advanced VOIP Params Sets attributes for RTCP (Control parameters for RTP) or SIP. Also includes the type
of MGCP/SIP to be used in the profile:
iMG/RG MGCP Profile (for example Genband)
iMG/RG Admin Profile (for example Sonus)
For LCFO, see LCFO.
For SIP Subscribe Message Summary, which controls how the iMG receives
notifications for events such as Message-Waiting Indication (MWI) from the SIP call
server, see SIP Subscribe Message Summary.
Line - Enabled Activates the other fields, with defaults of EC=8, Caller ID and Call Fwd=None
EC Echo Cancellation - 0m 8, 16 (default), 32
Caller ID Appears when SIP is chosen as the type of Voip
SIP Domain Appears when SIP is chosen as the type of Voip.
All Lines Configured Identically After choosing one line and its attributes, when the user checks this tic box all other
lines will be enabled and have the same attributes.
Attribute Value
Advanced Line Params When at least one line is chosen, this button is active, and the window that appears
depends on whether the SIP or MGCP type of profile is being created. Refer to the
Allied Telesis Gateway Product Family Software Reference for details on all of these
attributes.
The following parameters are for specific features:
• Disable on Power Failure - When the System power Management feature is
enabled for a device, this controls that the voice port will be disabled when
there is a power failure and the iMG is using a battery. Note that some of the
iMGs with 3-8 do not support this feature. This will also appear in the Service
management window under the Voice Service tab. Refer to System Power
Management.
• Fax/Modem Detection - This field will only apply to 3-7 and 3-8 devices that
support this feature. For 3-8 devices the option Enhanced is added, when
software will determine which mode to select. This will also appear in the
Service management window under the Voice Service tab.
• Call Waiting Active Prefix - Two fields are added for setting the prefix to use to
activate and deactivate call waiting. Since call waiting does not require these
prefixes to be set, they are set as a default to ‘None’ and only used if values
(such as *70 to deactivate). This will also appear in the Service management
window under the Voice Service tab, but only if the service is SIP and Call
Waiting is enabled.
• On-No-Answer Timeout (secs) - This is used to calculate the Call forward on-
no-answer ring count that is used on the iMG. The number of seconds is divided
by 3 to get the ring count. The timeout in seconds that appears on the device
details form (from the Voice Service tab) is calculated by multiplying the ring
cadence by 3, and so may be different than what is in the profile.
Note: The attributes already have defaults filled in, and should not be changed unless
for a specific reason. If the user tries to change these values and these are not
allowed, the change will fail, and the user must look in the console file to review
recent commands to find the failure (webserver: Conflict failure).
Copy values from profile To create a new profile based on values from an existing profile, select an existing
profile from the drop-down list. The fields will pre-populate with the values from the
selected profile. Modify any fields as necessary for the new profile.
Create Creates the profile.
Cancel Closes the window without creating the profile. The values are not saved.
FIGURE 19-16 Setting the Business Group ID for SIP (Lucent of SONUS)
Note: If there is a SIP Voice Profile for SIP, with type Lucent of Sonus, the user could also choose a Voice Service Profile that matched
(such as Profile SIP_SONUS), and the Bus. Group ID field would appear after selecting another tab and then re-selecting
Voice Service to refresh the page.
The following descriptions isolate each service. In most cases services are bundled, but describing each service and its
specific Profile(s) allows key fields/values to be highlighted.
The following subsections include a figure that includes the main components involved in each type of RG service and their
variants. Example profiles are then shown so that the user can understand the relationship between the service type and the
values that are data filled in the profile.
FIGURE 20-7 Internet Routed Service - Profile “Routed custSec” - General Tab
FIGURE 20-8 Internet Routed Service - Profile “Routed custSec” - Security Tab
FIGURE 20-10 Internet Routed NAT Service - Profile “Routed/all security” - General Tab
FIGURE 20-11 Internet Routed NAT Service - Profile “Routed/all security” - Security Tab
FIGURE 20-12 Internet Routed NAT Service - Profile “Routed/all security” - Security Tab
FIGURE 20-13 Internet Routed NAT Service - Profile “Routed/all security” - NAT Tab
cannot be shared on the same RG. (In most cases, an ISP has one main strategy for providing voice service and so applies the
same service to all RGs.) Refer to Figure 20-18.
FIGURE 20-22 The RG General and ADSL Port Profile to Support VLAN/VC Configuration
When the user then fills out the Triple-Play form for the ADSL-based iMG/RG, and uses these profiles, the VLAN/VC
settings will be set immediately on the iMAP, and on the iMG/RG when it placed into service (connected and powered on).
The following figure shows a Triple-Play form that uses the profiles that will have the iMG/RG come up with the internet
VLAN having a different VC and transmit rate, as shown in Figure 20-22.
Note: The attributes on the iMG/RG General Profile, Port Profile, and Service Profile must match. Otherwise, when the user fills out
and submits the Triple Play form, it will fail with the error message that the profiles don’t match. (If these profiles were to be
applied, traffic would not pass on the internet VLAN.) This is shown next.
FIGURE 20-23 Triple Play Form with Profiles to Configure VLAN/VC for Internet Service
The user also must be aware that when provisioning an ADSL iMG/RG, the profiles must be aligned so that the services can
be provisioned. The main guidelines are:
• When specifying the VC in an iMG/RG profile, and the profile is applied to a non-DSL iMG/RG, the VPI, VCI, and Framing
attributes are ignored.
• If the user fills out the Triple-Play form and uses profiles that do not match up with each other for VLAN/service
configuration, the NMS will not allow the subscriber to be provisioned and will display an error message. Refer to the
following figure.
Allied Telesis Residential Gateway (RG) and intelligent Multiservice Gateway (iMG) products provide advanced IP Triple Play
voice, video and data services to subscribers.
Note: The terms “RG” and “iMG” are used interchangeably in both the NMS client user interface and in this document. Unless
explicitly stated, anything that applies to an iMG applies to an RG, and vice versa.
Provisioning involves:
• DHCP Discovery: DHCP discovery ensures that an iMG is configured with the correct software and IP address as part of
the DHCP messaging that takes place between the iMG, DHCP server, and the NMS with its TFTP server.
• Profiles: Profiles provide a set of templates you can apply to one or more iMGs to ensure they are provisioned with the
correct attributes for a specific service type. There are two main types of profiles:
• General: General profiles are associated with iMGs regardless of the types of services the iMG provides.
• Service: Service profiles contain attributes that are service-specific. They are associated with a device to configure a
specific service.
• Triple-Play: The Triple-Play form streamlines upstream port provisioning and includes iMG attributes. The fields that
appear and are data filled are driven by the profiles that are included with the form.
Attribute Value
CCCCSS-AInn-LLnTTnn General format for Remote ID (See below)
CCCC 4 character name for the serving area
SS- 2 character name for the state the serving area is located in.A dash at the end helps to
identify the Access Island, which is next in the string. This is optional.
AInn- The Access Island that this device belongs in, so AI0I 1 would be Access Island 1. For
a test Access Island, a 00 or T instead of a number would be used.
Note there is a dash (-) after the Access Island. This allows the user to more easily
discern the digits that identify the Access Island
These make up the10-digit prefix that identifies the Access Island.
Also, this is used to scope Profiles.
nnnn.... Characters that help identify the device and any attributes for its location, type, etc.
Examples iMAP 1 9700 = SPSI-AI00-MAP1x7
iMAP 2 9400 = SPSI-AI00-MAP2x4
iMAP 5 9810 = SPSI-AI00-MAP5x8
x3112 NCSU = SPSI-AI00-x3112-NCSU
21.4.2 Summary
The Summary tab lists the existing configurations. Release 2 snd 3 configurations are grouped as SNMP types and Release 4
configurations are grouped as CWMP types. The Refresh button, which is only enabled on the Summary tab, refreshes the
display and adds any new configurations you create.
FIGURE 21-2 iMG Boot Load Configurator Tool - Release 2 and Release 3 tabs
TABLE 21-3 iMG Boot Load Configurator - Release 2 and Release 3 Tabs
Attribute Value
Mgmt VLAN ID The VLAN identifier that will be placed into the configuration file. This is the final RG
Mgmt VLAN that the RG will use while it is in service for a particular customer in a
particular access island.
(If the same customer moves and takes the RG it will not work if the new residence is
not serviced from the same Access Island. The RG must go through bootstrap again
and then it will work again.)
Note that this can be the same for all Access Islands, as long as the SNMP Community
values are the same (see below).
Read Community the read SNMP community (default public) that will go into snmpinit.
Note: snmp community strings for all iMG/RG should be the same for the entire
network.
TABLE 21-3 iMG Boot Load Configurator - Release 2 and Release 3 Tabs
Attribute Value
R/W Community the read/write SNMP community (default friend) that will go into snmpinit.
Note: snmp community strings for all iMG/RG should be the same for the entire
network.
Trap Host The SNMP trap host (default none) that will go into snmpd.cnf. This will allow
configuring multiple trap destination IP addresses separated by a comma. Multiple IP
addresses should only be used when creating boot configuration for devices that
support it.
Release Load File This is the zip file that will be unpacked from the NMS’s built-in RG/iMG software
repository. The files are named after their releases. The Browse button pops up a file
chooser from the software repository. (The path of the software repository will be
displayed in the beginning of the Messages window)
Recovery Load File Another zip file, like the release load file, but contains the recovery software, which
will also be unpacked from the software repository.
New Load Name This is the name of the directory path that will be added to the TFTP server directory
to contain the new load. The TFTP root path will be displayed in the beginning of the
Messages window. Names should not begin with a slash since these directories will be
placed under the TFTP root. Subdirectories relative to the TFTP root can be specified
by including slashes in the name. (Forward slashes work on both Windows and Linux,
but backslashes only work on Windows) If the directory already exists, its contents
will be overwritten (after user confirmation), which can be used for correcting
mistakes. (In the example, for ADSL iMG/RGs the path could be ADSL/AI01.) The
load name must match what is in dhcpd.conf (refer to DHCP Server File
(dhcpd.conf)).
Configuration Type This specifies which type of configuration file to use in the new load. There is a pull-
down for devices for the user to select when creating the correct configuration for
that release.
The Configuration Type drop-down list is confined to devices supported on that
software release. On the Release 2 tab, the list contains devices that support software
release 2-x. On the Release 3 tab, devices that support software release 3-x are listed.
TFTP Discovery When selected, after the RG reboots it sends a DHCP discovery message to the
DHCP server (over the RGMgmt VLAN). The iMG/RG then sends a tftp request to
the NMS, containing its MAC and IP address. The NMS uses its tftp listener to
discover the iMG/RG with this IP and MAC Address. With the IP and MAC Address,
the AlliedView NMS can proceed with discovery and provisioning.
Messages Messages show the progress and status of each load creation, including any processing
errors. The initial messages include the path to the software repository (where the
zip files reside), the path to the TFTP server root (where the loads will be placed),
and a summary of any existing loads already residing in the TFTP directory tree. All
messages should be reviewed carefully.
Refresh Only valid for the Summary tab.
TABLE 21-3 iMG Boot Load Configurator - Release 2 and Release 3 Tabs
Attribute Value
OK The OK button creates the load from the parameters entered and also creates a new
MD5SUM file for all the files in the load. After successfully creating one load,
additional loads can be creating by editing the parameters and selecting OK
repeatedly.
Not applicable to the Summary tab.
Close Exits the tool. All messages from the Messages window will be saved to a log file in
the logs directory (logs/boot_configurator.txt). If the log file gets too big, the oldest
entries will be deleted from the log. If, for some reason, saving the log should fail, the
user will be prompted to exit anyway or not, and will have a chance to at least copy
and paste the contents of the Messages window for future reference, if necessary.
21.4.4 Release 4
The Release 4 tab is for iMG 1000 and iMG 2000 series devices.
Attribute Value
Mgmt VLAN ID The VLAN identifier that will be placed into the im.conf file. This is the final RGMgmt
VLAN that the RG will use while it is in service for a particular customer in a
particular access island.
(If the same customer moves and takes the RG it will not work if the new residence is
not serviced from the same Access Island. The RG must go through bootstrap again
and then it will work again.)
Note that this can be the same for all Access Islands, as long as the SNMP Community
values are the same (see below).
Read Community The read SNMP community (default public) that will go into snmpinit.
Note: snmp community strings for all iMGs should be the same for the entire
network.
Attribute Value
R/W Community The read/write SNMP community (default friend) that will go into snmpinit.
SNMP community strings for all iMGs should be the same for the entire network.
Trap Host The SNMP trap host (default none) that will go into snmpd.cnf. This allows configuring
multiple trap destination IP addresses separated by a comma. Multiple IP addresses
should only be used when creating boot configuration for devices that support it.
Inform Interval TR69 inform interval - the interval at which the iMG checks for updates. The default is
300 seconds (5 minutes).
This value is used by the iMG only in the bootstrap configuration. When the NMS
provisions the iMG, the NMS may set the TR69 inform interval on the iMG to 24
hours.
Release Load File The zip file that will be unpacked from the NMS’s built-in iMG software repository.
The files are named after their releases. The Browse button pops up a file chooser
from the software repository. (The path of the software repository will be displayed
in the beginning of the Messages window)
New Load Name This is the name of the directory path that will be added to the TFTP server directory
to contain the new load. The TFTP root path will be displayed in the beginning of the
Messages window. Names should not begin with a slash since these directories will be
placed under the TFTP root. Subdirectories relative to the TFTP root can be specified
by including slashes in the name. (Forward slashes work on both Windows and Linux,
but backslashes only work on Windows) If the directory already exists, its contents
will be overwritten (after user confirmation), which can be used for correcting
mistakes. (For example, the path could be iMG1405\4_3_3.) The load name must
match what is in dhcpd.conf (refer to DHCP Server File (dhcpd.conf))
ACS Authentication Username and Password iMGs will use to connect to the Auto Configuration Server
(ACS).
CPE Authentication Username and Password ACS will use to connect to iMGs.
ACS IP Address Normally this is the NMS server IP. If the server has more than one IP, this will be a
drop down list.
Configuration Type This specifies which type of bootstrap file to use in the new load. This is a pull-down
for devices for the user to select when creating the correct configuration for that
release. This is because some of the releases do not use a configuration compatible to
other releases of same type.
LAN 1 Uplink Enables or disables uplink functionality on the LAN 1 interface. When the uplink is
enabled, the LAN 1 interface functions as the WAN interface for the iMG. The LAN
interface takes the place of the WAN interface for management and all services are
provided over the LAN interface.
Messages Messages show the progress and status of each load creation. The initial messages
include the path to the software repository (where the zip files reside), the path to
the TFTP server root (where the loads will be placed), and a summary of any existing
loads already residing in the TFTP directory tree. All messages should be reviewed
carefully per the cautionary note stated above. Errors will be reported here, as well.
Refresh Only valid for the Summary tab.
Attribute Value
OK The OK button creates the load from the parameters entered and also creates a new
MD5SUM file for all the files in the load. After successfully creating one load,
additional loads can be creating by editing the parameters and selecting OK
repeatedly.
Not applicable to the Summary tab.
Close Exits the tool. All messages from the Messages window will be saved to a log file in
the logs directory (logs/boot_configurator.txt). If the log file gets too big, the oldest
entries will be deleted from the log. If, for some reason, saving the log should fail, the
user will be prompted to exit anyway or not, and will have a chance to at least copy
and paste the contents of the Messages window for future reference, if necessary.
class "SPSI-AI00-iMG1525Boot" {
class "SPSI-AI00-RG634ABoot" {
Note 1: The VLAN VID is in decimal and the value in the DHCP server in this example mst be in HEX, i.e.:
• 200 = C8 for TEST, so string is "\x00\xC8"
• 201 = C9 for AI01, so string is "\x00\xC9"
-------------------------
Name Vid
list
--------------- ----- ------------ ----------------- ----------------- -------
MAIN RELAY AUTO 00:0C:25:1F:80:10 00:0C:25:1F:80:10 None
RGBoot RELAY AUTO 00:0C:25:1F:80:10 SPSI-AI00-MAP5x4 200
RGMgmt RELAY AUTO 00:0C:25:1F:80:10 SPSI-AI00-MAP5x4 300
RGVoice RELAY AUTO 00:0C:25:1F:80:10 SPSI-AI00-MAP5x4 400
Internet RELAY AUTO 00:0C:25:1F:80:10 SPSI-AI00-MAP5x4 600
Video RELAY AUTO 00:0C:25:1F:80:10 SPSI-AI00-MAP5x4 500
-------------------------------------------------------------------------------
The iMAP should be provisioned with a unique DHCP “Remote ID” so that the DHCP server can clearly identify where
DHCP messages are coming from. Refer to Naming Conventions to Identify Components (DNS) for an overview of naming
conventions that should be followed so that administrators can easily label and configure the iMG/RG configuration.
Caution: Ensure that DHCP Relay is enabled on the iMAP network (upstream) interfaces, as well as the interfaces to the iMG/RG.
Otherwise, DHCP will not work.
Note: For each Access Island, a unique RGMgmt VLAN and subnet must be provided. All DHCP-related configurations for each
Access Island are placed in separate configuration files. SInce each file must declare shared networks, all iMAPs (relay agents)
that are in the same Access Island must be declared in the same configuration file. (Includes are supported by dhdpd
configuration.) Refer to the Appendix for an example.
ip address 10.52.110.209/28
ip dhcp-relay agent-option
ip dhcp-relay information policy replace
ip dhcp-relay server-address 10.52.201.36
!
interface vlan501 //video
ip address 10.52.110.225/28
ip igmp
ip igmp querier-timeout 1
ip igmp query-max-response-time 1
ip igmp query-interval 25
ip igmp version 2
no ip igmp source-address-check
ip pim dr-priority 100
ip pim sparse-mode passive
ip dhcp-relay agent-option
ip dhcp-relay information policy replace
ip dhcp-relay server-address 10.52.201.36
!
interface vlan601 //internet
ip address 10.52.110.241/28
ip dhcp-relay agent-option
ip dhcp-relay information policy replace
ip dhcp-relay server-address 10.52.201.36
!
Note: Customers on each switch must be in non-shared subnets, because the AlliedWare Plus devices do standard DHCP Relay with
option 82 as circuit ID only (no remote ID) and do not perform DHCP Snooping.
Refer to the following figure, which shows what must be configured and how the process works.
Before VoIP can work, the following must have already been done, or voice service will not work:
1. Profiles have been filled out correctly to support voice service. In particular, in the Voice profile for the RG, the voice
domain name must be filled out, and the voice VLAN that is filled in for the RG General profile has already been created.
Also, the route to the Genband must be filled out in the RG General Profile if the Genband is on a separate subnet.
2. The Genband (G6, G2) has been provisioned to support voice (Line Profile, Interface Group, CRV)
3. The GenBand has the routing information for the RG; moreover, the routing table in the GenBand must use the BBI
interface.
4. On the Triple Play form, the Genband (G6, G2) information for the GenBand (in Step 2) has been filled in for the
customer.
5. There is Dynamic DNS (DDNS) between the DHCP server(s) and the DNS server (usually one is reserved only for
voice). This is needed since the DNS tables, which correlate the RG’s voice IP interface address with the domain name,
are updated dynamically.
Note: The Genband/RG configuration can be statically configured, but this is very difficult to maintain administratively since the IP
addresses must be tracked/changed manually.
When all of the prerequisite steps have been performed and the RG is plugged in, the following occurs:
1. The NMS puts together the FQDN for the RG voice interface (i.e. rgvoip-<MAC addr.>.domain) and the port of the
iMAP (as <ip addr of connected iMAP>_slot.port). The AlliedView NMS also adds the line entries that were filled out in
the Triple-Play form.
2. The NMS configures each voice line that has been set up for the RG (creates the voice VLAN, creates the voice IP
interface, enables DHCP)
3. The RG sends a DHCP discover to the DHCP server. After an exchange of DHCP messages, the DHCP server has the
MAC address (sent by the RG) and the IP address (assigned by the DHCP server) associated.
4. The DHCP updates the DNS server to include the DNS entry between the RG’s voice IP interface (the rgvoip string) and
actual IP address.
5. The MGCP protocol is run between the GenBand and the RG, and the result is a dial tone.
Object Properties to Define Objects and Custom Views describes all the relevant managed objects and their properties
so that the user can control how the MO is provisioned. This is especially helpful in understanding how MO properties
can be filtered in Custom Views.
• Custom Views
An Access Island is a group of up to eight iMAPs (with one hub) that are used for a Service Location. In most cases, being
able to identify the components specific to an Access Island helps in provisioning current and future subscribers as well as
troubleshooting problems.
The example Custom Views in Creating Custom Views for an Access Island should be created for each Access Island.
Custom Map
MO Form Property Description for Nodes View Property Example
Name The device name, which is a unique name that name 172.16.33.11 or
is used as the key in the database. This name DVLKND-AI01* (sets
cannot be changed. scope for Access Island
01)
Type The type of the object, such as whether it is a type 9700
network, node, or an interface object, or 9400
something user specified, like router, switch,
etc. Rapier*
(all Rapier devices)
RG*
(all RG devices)
Managed A checkbox that indicates whether the managed true
managed object is managed by the NMS. (would not include
When checked, the object is being managed devices that were
by the NMS. Otherwise, it is not. discovered and
unmanaged)
IpAddress The unique address assigned to each and ipAddress 172.16.33.11
every object.
Netmask The netmask that is specified for this managed netmask 255.255.255.0
object. Network masking is a methodology by
which the elements in a network can be
meaningfully categorized.
ParentNet The ID of the network that contains this node parentNet 172.16.33.0
or a list of network numbers if this is a router
connecting two or more networks.
InterfaceList A non modifiable drop-down list of all InterfaceList 172.16.33.20 172.16.33.21
interfaces on this device. (The value all would
select all nodes.)
Tester The type of testing to run when checking the
status of the device.
Community The community string of the corresponding community
SNMP agent associated with the link
SysName The system name as reported by the SNMP
(Internal) agent
SysDescr The value of the system description associated sysDesc Telesis 9700
with the type of managed object to be filtered.
all
SysOID The system object identifier of the device as sysOID .1.3.6.1.4.1.207.1.15.3
reported by the SNMP agent of the device.
Login The CLI username to use when the NMS login officer
executes CLI commands on the device. It is
defaulted but it should be changed.
Password The password to use when NMS logs in with klk3kdr3
the CLI username.
Custom Map
MO Form Property Description for Nodes View Property Example
SysLocation A string value to identify where the device is sysLocation Building_A
located (This would assume the
device was located in
Building_A)
Category The family of the device category Telesis
(includes all MAP devices)
Rapier*
(all Rapier devices)
RG*
(all RG devices)
Release The release ID of the device software. release
InetProfileMOName The unique DB names of the Internet profiles
associated with this RG
RgGenProfileMOName The unique DB names of the General profiles
associated with this RG
VoipProfileMOName The unique DB names of the voice profiles
associated with this RG
VoipProfileName Display names of the RG Voice profiles
currently associated with this RG
RgGenProfileName Display names of the RG General profiles
currently associated with this RG
VideoProfileName Display names of the RG Video profiles
currently associated with this RG
InetProfileName Display names of the RG Internet profiles
currently associated with this RG
SysContact A string to identify the owner of the device sysContact Company_A
ConfigChanged The time that a change to the device's configChanged
configuration has been detected by the Device
Backup operation. Config changes will be
detected automatically when recurring
backups are scheduled.
This property is included in the Nodes custom
view under the Network Inventory by default.
LastBackupTime The time of the last backup performed for this lastBackupTime Wed Aug18 2004*
device via the Device Backup/Restore MDTI
Operation.
MacAddr The MAC Address of the RG
RgCustomerID The unique customer ID for the RG
Source DVLKND-mgc1* (G6)
Note: The attributes ending in ProfileName are the display names of the profiles currently associated with this RG. The attributes
ending in ProfileMOName are the unique DB names of the profiles associated with this RG.
Custom Map
MO Form Property Description for Ports View Property Example
Name The device name, which is a unique name that name 172.16.33.11 or
is used as the key in the database. This name DVLKND-AI01* (sets
cannot be changed. scope for Access Island
01)
Type The type of the object, such as whether it is a type 7700
network, node, or an interface object, or (Only 7700 would be
something user specified, like router, switch, included
etc.
Other values are:
9700
9400
(all Rapier devices)
RG*
(all RG devices)
UpstreamDevicePort The <Map Name>_slot.port of the port that
the RG is connected to.
SubType *Gigabit*
FIGURE 21-10 Custom Views for iMG/RG Management (Access Island 01)
4. Click on the More button and the Select Additional Criteria to include more attributes that will filter this form. The
following figure shows which attributes are used, ClassName (RgMO), and UpstreamDevicePort, with a criteria that
selects all the subtending nodes in the Access Island.
Note: You must create or “manage” all rgmgmt IP subnets beforehand; The NMS learns of RG's via “DHCP” or “Discover Attached
iMG/RG” otherwise they will not show up in the any IP subnet MAP.
FIGURE 21-12 Creating a Custom View for all iMAPs in an Access Island
Note: Sorting or ordering of these views is not supported, so the creation order is important.
1. create a view of all unprovisioned ports
2. Create two views (unprovisioned/provisioned) per Access Island.
FIGURE 21-18 iMG/RGs in a Network with Multiple Providers for each Service
Once the Open Access model is configured, the Service Management Form is similar to the Access Island model; on the
Mgmt. Info tab, the service VLANs are read only, and so the user must go to the individual service tabs to change a VLAN.
Refer to the following figure.
FIGURE 21-19 Service management screen for an iMG 1000 or iMG 2000 device
• Prior to release 10.0, if Bridged Internet service was configured, the DHCP and IP address/mask fields were grayed out,
now they are not, since you may want to add another service such as voice.
The user can view the performance metrics between each pair of stations in the HPNA network. The tab will show a
table where each row is a different from-station/to-station pair and each column is a metric. The user then presses the
“Collect Performance Metrics” buttons to start the data collection. Refer to the following figure.
FIGURE 21-24 HPNA Testing - Confirmation Window since will affect Service
6.The user then presses the No button to cancel the operation before service is affected.
21.14.4 iBG915-FX
With the iBG915-FX, the main difference between this CPE and CPE already supported is that the iBG915-FX supports 8
VoIP lines, four more than any previous iMG/RGs. Also, the iBG915-FX supports 5 LAN ports, rather than 3, 4 or 6 LAN
ports.
The NMS provides the same support as other iMG/RGs (discovery support, triple play provisioning/de-provisioning and
management support, iMG/RG profile support, GenBand interworking support, backup/restore support, software download
support, and “Device Info” support.
Note: CPU-based rate limiting is supported, as with the iMG MOD devices. This feature is included in the following subsections.
The iMG/RG Voice Service Tab of the Triple Play Service Management window is updated to show the current
configuration of all eight voice lines on the iBG915-FX. In addition, the user can make updates to those additional lines.
Refer to the following figure.
The following iMAP GE ports should have new profiles set with the direction of Customer when connecting with with a 1G
WAN card
• GE8 on the 9x00 iMAP
• GE4 (5.0-5.3) on the iMAP 910x
• GE24BX on 9000 series iMAP
• GE24SFP and GE40CSFP on SBx3100
Caution: Modifying an existing ethernet port profile is possible but carries risks, since you will now set the port direction. Setting it to
‘Customer’ for an existing Ethernet port may stop service. Setting it to ‘Network’ on an FE/FX port with an iMG/RG (where
the administrator could set the port direction to ‘Customer’ at the CLI) will cause the DHCP to no longer function.
Refer to the following figures.
FIGURE 21-33 Provision New Triple Play Form for GE8/GE24BX/AW+/GE24SFP Port
• Have an iMG/RG General Profile with a name such as “DVLK-AI01-Vacant” and include scoping so that when it is used
only iMAPs from AI01 are accessible. Refer to Figure 21-45, Figure 21-46, and Figure 21-47.
Note: For Open Access, the Profile Name could be “DVLK-Vacant” since the Access Island number is not used as part of Scoping.
• Have a port profile available that reflects the type of port and the capabilities desired, such as “DVLK-AI01-100Mbps”.
Note: In this profile, the VLAN Configuration is not included.
• Have a customer ID ready that reflects administrative naming conventions for this type of provisioning. An appropriate
ID would be the residence address.
FIGURE 21-50 Service Management Form - iMAP Port Configured, no iMG/RG Configured
Note the following:
• The Video/Data Port Configuration Panel includes the upstream port and card/port status
• The Voice Configuration Panel includes the Voice Endpoint (needed for DNS lookup for DHCP) and the Voice Endpoint
Port (TEL1, which is the port the customer will plug the phone into).
• The Alerts Panel has any alarms. There should be no alarms.
14. Review the iMG/RG table, as shown in Figure 21-51.
for a service is accomplished using only a few GUI screens. Finally, removing the voice service and going (back) to double play
involves (re)applying the profile for double-play.
FIGURE 21-57 Two MGC Tabs (one for each Voice Line)
5. Click Remove.
6. When the Confirmation window appears, click on Yes.
7. Note the results. The MGC tab is removed and only one MGC tab remains.
FIGURE 21-59 Customer Using Profile for Double Play (no Voice)
8. Select Save iMG/RG Configuration.
9. As the changes takes effect, any phone connected to the RG will no longer have dial tone.
Note: Do not make changes to the IGMP values, or the video service will be out of synch with the video profile. (If you do so, and *
will appear next to the Profile Name.)
12. Return to the Mgmt. Info sub-tab.
13. Click on Save iMG/RG Configuration.
14. Back on the Status tab, click on Update Customer Info.
15. Note the results. Video should no longer be available.
Note: For the Open Access Model, the same procedure would be used, with the administrator ensuring that there was no conflict in
VLAN configuration between the iMG/RG General Profile and the Video Service Profile.
FIGURE 21-63 Applying Different RG General Profile for Triple-Play (Second VIdeo)
6. Click Modify.
7. Click Save iMG/RG Configuration.
8. Back on the Status tab, click on Update Customer Info.
9. Note the results: On the iMG/RG Port Assignments tab, there are two ports for Video, 1 and 3, as shown in the
following figure.
10. Restart cpe (iMG/RG).
FIGURE 21-65 Applying Different RG General Profile for Triple-Play (Remove Second VIdeo)
6. Click Modify.
7. Click on Save iMG/RG Configuration.
8. Back on the Status tab, click on Update Customer Info.
9. Note the results. In the Port Assignments tab, there is only one video port. Refer to the following figure.
10. At the iMG/RG/Mgmt. Info tab, select Save iMG/RG Configuration.
11. Restart the CPE (iMG/RG)
FIGURE 21-68 Customer Using Profile for Double Play (no Video)
8. Select Save iMG/RG Configuration.
9. Back on the Status tab, click on Update Customer Info.
10. Note the results: any video connected to the RG will no longer work.
11. END OF PROCEDURE
Moreover, choosing these options depends on what the user is trying to do:
• The user wishes to de-provision the RG (put back in the box), and then be able to re-provision the RG on the same
Access Island. In this case, the RG, when taken out of the box and re-provisioned, would be using the same RGMgmt
VLAN.
• The user wishes to de-provision the RG (put back in the box), and then be able to re-provision the RG on a different
Access Island. In this case, the RG, when taken out of he box and re-provisioned, would need to start with the default
(bootstrap) VLAN for DHCP discovery.
• The user has an open access model, and so he strategy depends on whether the same RGMgmt VLAN is used for all iMG/
RGs in the network.
• If the iMG/RG is to be reconfigured where the same RGMgmt VLAN is used, the iMG/RG would not be set back to its
factory settings before re-provisioning, similar to De provision the iMG/RG (same Access Island).
• If the iMG/RG is to be reconfigured where a different RGMgmt VLAN is used, the iMG/RG would be set back to its
factory settings before re-provisioning, similar to De-provision the iMG/RG (Different Access Island).
21.15.8.1 Overview
Section Naming Convention for Customer IDs (Triple Play Form) listed the naming conventions to follow for Customer IDs.
To change a Customer ID, the administrator must enter the changed ID for all three configuration areas (tabs) on the Triple
Play Service Management form.
• Connection Type - Ether-like, ADSL, or ONU
• iMG/RG
• Voice
All three are filled in the Service Management form.
Caution: The customer ID value must be filled in for all three areas before the form is closed, and the value must be the same for all
three areas. Otherwise, the value will not be propagated to all three areas correctly.
21.15.8.2 Procedure
1. Bring up the Triple Service Management Form for the Customer ID. To do this, select and right click on View/Modify
Details with one of the following:
• The row with the current Customer ID from the Ports Inventory table.
• The row with the current Customer ID from the iMG/RG Inventory table
• The iMG/RG icon from the relevant IP Network MAP
2. Select the connection type tab, such as Ether-like Configuration -> General, and fill in the changed Customer ID.
3. Select the iMG/RG -> Mgmt. Info tab, and fill in the changed Customer ID.
4. Select the Voice Configuration - > protocol Info tab, and fill in the changed Customer ID.
Note: The customer ID is not on the CPE sub-tab for the Voice Configuration.
5. Click on the Modify button to make the changes take effect.
6. You can now close the Form.
Note: For information on the Windows Loader, refer to the Software Reference Manual for the AT-RG600. This document can be
found on the Allied Telesis website.
4. The RG should then reboot and go back to Normal mode, with the bootstrap loading on the RG-mgmt VLAN.
5. Using the AlliedView NMS application (Device Backup/Restore), restore the last saved configuration file for the RG.
6. The bootstrap VLAN can now be removed from the subscriber’s port.
21.15.10.1 Prerequisites
• Ensure iMG hardware model of new unit matches model of unit to be replaced (old unit).
• Ensure the new iMG unit has not been previously managed by the target NMS, to prevent possible complications.
• Ensure iMG software boot load release matches release of iMG to be replaced.
• Ensure the new iMG unit contains only the “factory” system configuration file.
• Ensure the old iMG configuration has been backed up recently. If a current backup is not available, do not use the
procedure in Procedure. Instead, do the following:
1. Record all subscriber configuration information
2. Deprovision the subscriber (refer to De-Provision iMG/RG from AlliedView NMS).
3. Provision using a new iMG hardware unit, and the recorded information (refer to Triple Play Examples).
21.15.10.2 Procedure
1. Add the Bootstrap VLAN to the subscriber’s iMAP port.
2. Swap the existing iMG/RG with a new one.
1. Power off the old iMG unit, and replace with new unit, connecting all cables.
2. Power on the new unit.
3. The iMG/RG should be able to contact a DHCP server and get an IP address and go through the bootstrap process.
4. The AlliedView NMS should discover the new iMG/RG and restore the last saved config file automatically.
5. The AlliedView NMS should then remove the bootstrap VLAN automatically.
6. Verify iMG management and all provisioned services.
iMG646PX-ON
= IP Subnet = voice VLAN (VID 10) = 10.56.7.223
ONU 4.0.0
= shared (video, data) VLAN (VID 40) ETH 4.0.0
Data to PC
FXS FXS Ethernet
10 10
Video to
EPON BD Fiber 40 Set Top Box
= 172.16.33.18 Ethernet
iMG646
Customer
40 = 10.56.7.224
40
Data to PC
Ethernet
SFP FX BD Fiber
XE/GE NM card Video to
Ethernet Set Top Box
10 10
Video to
IP Set Top Box
Ethernet
Gateway
FXS FXS
Class 5
Switch
iMG634
= 10.56.7.225 Data to PC
Ethernet
Video to
40 Set Top Box
Ethernet
xDSL xDSL
10
Video to
Ethernet Set Top Box
FXS FXS
POTS
3_play_Voi ce_Shared
FIGURE 21-76 General Form for Multi-service VLAN - Mgmt. Info Tab
FIGURE 21-77 General Form for Multi-service VLAN - Port Assignment Tab
FIGURE 21-78 Internet Form for Multi-service VLAN - General Internet Info Tab - Configuration 1
Video to
10 10 Set Top Box
Ethernet
ISP
iMG646
Customer
= 10.56.7.224
Data to PC
20 20 Ethernet
SFP FX BD Fiber
XE/GE NM card
Video to
10 Set Top Box
10 Ethernet
Video to
Set Top Box
FXS FXS Ethernet
iMG634
= 10.56.7.225 Data to PC
20 Ethernet
Video to
Ethernet Set Top Box
xDSL xDSL 10
Video to
Ethernet Set Top Box
FXS FXS
POTS
3_play_Data_Shared
FIGURE 21-85 Internet Form for Multi-service VLAN General Internet Info Tab - Configuration 2
TABLE 21-11 Triple Play Forms for Voice, Video/Data VLAN Configuration
iMG Type Attributes Reference
EPON (iMG646PX-ON) Figure 21-88
FX (iMG646) Figure 21-89
ADSL (iMG634) Figure 21-90
10
10
Video to
EPON BD Fiber 40 Set Top Box
= 172.16.33.18 Ethernet
Video to
Set Top Box
Ethernet
Video
Head
iMG646
Customer
40 = 10.56.7.224
40 Video to
Ethernet Set Top Box
SFP FX BD Fiber
XE/GE NM card iMG646 Video to
Set Top Box
10 10 Ethernet
Data to PC
Ethernet
FXS FXS
iMG634
Video to
= 10.56.7.225 Set Top Box
Ethernet
Video to
40 Set Top Box
Ethernet
xDSL xDSL
10 Data to PC
Ethernet
FXS FXS
POTS
3_play_Video_Shared
FIGURE 21-92 Internet Form for Multi-service VLAN General Internet Info Tab - Configuration 3
3,4
1,2
6,7 8
iMG/RG
9
5
Step 1 iMG/RG request for Boot IP Address and TFTP Server IP Address
Step 2 DHCP Server returns information
Step 3,4 iMG/RG downloads new software and base config file ( includes ZTC Enabled and Mgmt VLAN configured)
Step 5 iMG/RG reboots using new configuration
Step 6 iMG/RG requests Mgmt IP Address and NMS IP Address (=ZTC Server Address) from DHCP Server
Step 7 DHCP Server returns information
Step 8 iMG/RG sends ZTC-like TFTP request to NMS (includes IP and MAC address)
Step 9 NMS has IP/MAC Address mapping, begins provisioning
Figure 21-99 shows an example from a dhcpd.conf file. The option bootfile-name points to NMS IP address, to which the
iMG/RG will send a tftp request.
FIGURE 21-102 Service Details Display for iMG/RG without iMAP Interface
21.17.1 Setting a LAN Uplink for iMG 1000 and iMG 2000 Devices
iMG 1000 and iMG 2000 series devices use the iMG Boot Load Configurator to configure a LAN uplink.
To set a LAN uplink for an iMG 1000 or iMG 2000 device:
1. Do one of the following to launch the iMG Boot Load Configurator:
• On Windows, go to Start > Allied Telesis > AlliedView NMS > Tools > RG Boot Configurator.
• On Linux, navigate to the <NMS_Home>/bin directory, where <NMS_Home> is the directory where the NMS is
installed. Run /AT_BootConfigurator.sh.
The iMG/RG Boot Load Configurator screen appears.
2. Select the Release 4 tab.
FIGURE 21-104
3. Enter the Boot Load Parameters as required. See Table 21-4 for a description of each field.
4. Next to LAN 1 Uplink, select Enabled.
5. Click OK to create the boot load files.
FIGURE 21-107 iMG 1000 or iMG 2000 series iMG with LAN uplink
21.17.5 Example: Installing an AT-624 or AT-634 Series iMG with a LAN Uplink
In this example, an AT-iMG634B-R2 iMG is pre-provisioned with the NMS. The customer connects the LAN4 port as the
uplink and powers up the iMG.
1. Ensure the correct firmware and bootstrap files available and are loaded using the iMG Boot Load Configurator. The
following figure is an example of how the configurator should be data filled.
21.17.6 Example: Deprovisioning an AT-624 or AT-634 Series iMG and Reprovisioning with the ADSL
Uplink
In this example, an iMG that currently uses LAN4 for the uplink is deprovisioned and then reprovisioned using the ADSL
port as the uplink.
1. Right click on the iMG and select De-provision Customer iMG/RG. Select all of the options, as shown in the following
figure.
21.17.7 Creating Custom Views for AT-624 and AT-634 iMGs with a LAN Uplink
You can set up a custom view to show which iMG is running on ADSL vs. LAN 4. This is done by right clicking on the iMG/
RGs entry in the Network Inventory, and selecting Custom Views -> Add Custom View. In the Custom View wizard under the
“Properties” tab, choose the “Select Props To View” button, as shown in the following figure.
The end result of apply this custom view is shown below. The top two RGs show an ADSL managed 634B-R2 box and a
LAN4 managed 634B-R2 device, as shown in the following figure.
21.18.1 LCFO
The Loop Current Feed Open option is used to indicate that the calling/called party has gone onhook and is a useful feature
for businesses that have key systems that transfer calls. This is available on all iMGs that are 3-7 and up. Both MGCP and SIP
are supported.
The LCFO option is displayed from the Advanced VOIP Params button that is on both the Port Management View/Modify
“Voice Service” tab, and the iMG/RG Voice Service Profile display. When LCFO is enabled, it applies to all VoIP lines on the
iMG/RG.
• Disabled - Applies to call servers that do not require SIP Subscribe. Notifications are enabled.
• Enabled - Applies to call servers that require SIP Subscribe. Notifications are enabled.
For iMGs running software release 4.2.3 and later, the options for SIP Subscribe Message Summary are:
• Disabled - Support for notifications is disabled on the iMG.
• Enabled/Passive - Applies to call servers that do not require SIP Subscribe. Notifications are enabled.
• Enabled/Active - Applies to call servers that require SIP Subscribe. Notifications are enabled.
FIGURE 21-122 Voice Diagnostics panel for MOD iMGs and iMG726-BD-ON
FIGURE 21-123 Voice Diagnostics panel for R4.3 and higher iMGs
The Line Status table displays each enabled voice port on the iMG and its current status.
TABLE 21-14
These are polled from the device and updated approximately every 30 seconds while the panel is active.
5. To select a row, check the box in the Test column. Check the All box to select all of the rows at once.
Caution: Testing all of the interfaces at once will increase the duration of the test and interrupt CPE voice service.
A confirmation box appears.
FIGURE 21-125 LAN Diagnostics Tab for iMG726-BD-ON and MOD-type iMG
Initially the table displays each LAN port on the iMG and its current status.
Not all modules include a Glan interface; if the Glan interface is not present, the Glan row will be omitted from the table.
The current status consists of ID, Speed, Status (enabled/disabled), and Connected (true/false). These are polled from the
device and updated approximately every 30 seconds while the tab is displayed.
With each port is a “Test” button and a “Test Result” field. The Test buttons can be checked or unchecked to select
individual ports for diagnosis. The “All” button is a shortcut to conveniently check or uncheck all interfaces.
The selected ports will be diagnosed when the “Diagnose Interface” button at the bottom of the panel is activated. The
operation will take several seconds.
Note: Testing all interfaces at once will increase the duration of the test and possibly interrupt CPE LAN service, so normally test one
interface at a time or small groups at a time rather than all interfaces at one time.
Since CPE LAN service may be interrupted during diagnosis, user confirmation is required before the operation will be
performed, as shown in the following figure.
TABLE 21-15 iMG/RG Power Management Feature and Port State Support
FIGURE 21-133 Controlling power Management for Voice Lines on Service Management Form
6. Click Advanced Port Params.... The Advanced Port Attributes box appears.
7. In the Protect drop-down list, select Enabled.
Ni-210 Processor
Fiber B rg656BD, LH, SH RG6x6E 4/16 Meg Flash/Ram More efficient
iMG606BD, LH, SH Broadcom Switch routing when
VLANs
iMG646BD, LH, SH Ni-210 Processor configured.Similar
iMG646BD-ON/PX-ON service offering to
Modular Devices
This type of iMG is highlighted because of the flexibility in provisioning both the WAN and LAN cards. Refer to the following
figure.
Customer
2:1 Media
Converters
HPNA Network
= data_VLAN (VID 20,) = video_VLAN (VID 40)
= voice_VLAN (VID 10) = Physical Link Note 1
20 40 20 40
Note 2
HPNA
Video
Head = IP Subnet
40 40 Video to
Set Top Box
Note 1 Ethernet
20 20 Data to PC
SFP FX BD Fiber Ethernet
The NMS allows you to manage wireless routers as subtended devices attached to a LAN port on an iMG. Wireless routers
act as a wireless access point, extending subscribers’ private network capabilities.
The NMS supports the following wireless routers:
• AT-WR2304N
Figure 23-1 illustrates the position of a wireless router in a network.
service. The forwarding service directs traffic to the iMG’s Internet interface and the configured external port number to the
private management IP address and default web server port of the wireless router.
By default, the NMS uses 5080 for the first external port and increments the port by one for each additional device. The
NMS uses 80 for the internal port. You can modify these settings if necessary.
When the NMS opens the tunnel, a dialog box opens to control the process and associate the tunnel in the iMG with the
management session. The Close When Finished dialog box also serves as a reminder that the tunnel through the iMG is not
secure and should only remain open while you are actively browsing to the wireless router. While the tunnel is open you
cannot perform any other task in the NMS on the iMG screen. When you close the dialog box, the NMS terminates the
connection with the wireless router web page and removes the tunnel from the iMG.
Configuring a wireless router to be managed by the NMS requires the following four procedures:
• Provisioning the iMG
• Configuring the AT-WR2304N Wireless Router
• Connecting the AT-WR2304N Wireless Router to the iMG
• Browsing to the Wireless Router from the NMS
TABLE 23-2 iMG Profile Settings for Managing a Wireless Router from the NMS
3. Open a browser and browse to http://192.168.1.1, then log into the device. The default username and password are:
username: manager
password: friend
4. In the drop-down list in the upper right corner of the screen, select AP Mode.
5. In the pop-up box that appears, click OK to restart the system.
6. On the System page, select the LAN tab.
7. In the Bridge Type drop-down list, select Dynamic IP.
2. Connect a CAT5 cable from the AT-WR2304N WAN port to the iMG port you configured for Internet or Internet/
Video service.
To confirm the wireless router is connected correctly, see Browsing to the Wireless Router from the NMS.
10. In the Action drop-down list, select Browse. The Browse to Device dialog box appears.
username: manager
password: friend
13. When you are finished managing the wireless router, in the Close When Finished dialog box, click Done. The NMS closes
the connection to the wireless router and removes the tunnel from the iMG.
Column Description
Model The wireless router model number.
MAC Address The MAC address of the wireless router.
IP Address The IP address for the wireless router.
Interface The iMG port the wireless router is subtended off of.
External Port The WAN TCP port the iMG uses to listen for incoming requests. Connections made
to this port from the public network to the iMG are forwarded to the wireless
router. The default is 5080 for the first external port. The port number increments by
one for each additional device.
Column Description
Internal Port The WAN TCP port the wireless router uses to listen for incoming connections. The
default is 80.
Action The action to take to connect with the wireless router.
Browse - Open the device’s management web page in a browser.
Before you fill out the Triple-Play form make sure you perform the following:
• Create the relevant iMG profiles.
• Create the relevant iMAP port profiles.
• If voice service is being provided, configure the initial voice handling (such as G6).
Refer to Provision a New Triple Play Customer for an overview of the Triple Play form and its fields. Once the profiles have
been defined, they are included in datafilling the triple play form. The form includes a pull-down where the administrator
chooses which RG General profile will be applied to the RG that interfaces the iMAP port. The fields that appear depend on
the RG General Profile chosen and the services that are going to be configured on the RG.
The Provision New Triple Play Customer Form is used to provision on one form most of the attributes needed for one
Triple Play customer. The fields of the Provision New Triple Play Customer Form are described in Provision a New Triple
Play Customer.
The form is divided into four main panels: RG, Video/Data Configuration, Video/Data Configuration and Derived Voice.
Using this form is an efficient and error-free method to data fill a customer, and this becomes even more true when used in
conjunction with Profiles and the use of Scoping. Following are examples:
1. An iMG624A with the following services and components: (Configuration 1 Example - POTS, Derived Voice, Internet,
Video, TLS)
• A PC with internet service
• Two video LAN ports for video service (two STBs)
• A Transparent LAN Service (TLS that provides a secure and isolated VLAN for customers (802.3).
• Two levels of phone service
- POTS24 based phone
- Derived phone service
2. An RG646 with the following services and components: (Configuration 2 - Multiple Video, Data, Derived Voice)
• Five videos for video service (five STBs)
• A pc with internet service
• A phone that is provisioned but not configured, so it can be easily done later.
3. A statically configured RG, usually for demonstration only. (Configuration 3 - Static Provisioning (no DHCP))
4. An EPON/ONU interface connected with the iMG646PX-ON. (Configuration 4 - EPON/ONU Interface Connected
with iMG646PX-ON)
5. An RG634 similar to example 1, but with SIP being used for Voice Service. (Configuration 5 - Voice Service Provided by
SIP)
6. A multi-service VLAN (more than one service on one VLAN). (Configuration 6 - Multi-Service VLAN)
7. An iMG6x6MOD configuration (Configuration 7 - iMG7x6MOD with HPNA)
8. An AlliedWare Plus Device (Configuration 8 - AlliedWare Plus Device)
9. Microsoft© Mediaroom™ with the iMG/RG (Configuration 9 - Microsoft Mediaroom with the iMG/RG)
10. Video with static IP Address (Configuration 10 - Video with static IP Address (iMG 1000 and iMG 2000 Series))
Following each figure is the Provision New Triple Play Customer Form filled out for each configuration.
FIGURE 24-1 Example Configuration 1 - Internet Routed/NAT, Video Proxy, Lifeline POTS, TLS
FIGURE 24-2 Triple Play Customer Form for RG 634 - Two Voice, Two Video, TLS, and One Internet
Video Video to
Head = IP Subnet Ethernet Set Top Box
Video to
301 301
Ethernet Set Top Box
The following figure shows how the Triple Play form is filled out to reflect these profiles, since most of the values are
automatically datafilled when the Profiles are included.
Note the use of Scoping for both the RG General and the RG Voice Profiles, as shown in Figure 24-7. The Profile Scoping
field is set to the Access Island Prefix (AI01) with the wildcard (*). When the user brings up the Triple Play form and chooses
a device, the available General and Voice profiles are based on the scope set.
• VOIPPhone - StaticIP - Note that the Use DHCP to Obtain IP Address is set to False and the iMG/RG Domain is set to
None.
3. While the modem is powering up/reconnecting, hold the reset button of the RG for ~30 seconds.
4. The ADSL modem now has the following:
- IP Interface of ip0
- VLAN=1 untagged
- IP address = 192.168.1.1
- DHCP=Off
5. telnet into the ADSL modem using the 192.168.1.1 address.
6. Change the IP address to the unique IP address.
7. Save the configuration and set this as the default - You can now take the RG to the customer site if not already there.
Derived Voice Svc. Profile VOIPPhone-StaticIP Refer to Prerequisites (Profiles and Hard-
coded Values).
IP Addr 10.10.144.123 Voice Subnet
Mask 255.255.255.0
GenBand Configuration Line Profile: g711
Interface Group: gr303 format is: name (type)
(gr303)
CRV: 1
FIGURE 24-12 Adding the RG to. the Network Manually (Add Node Form)
When the user clicks on Add Node, the AlliedView NMS immediately begins configuring the RG. In the iMG/RG table (under
Network Inventory), the RG with the ID “Static Customer” at first has no columns filled in since it has not been discovered.
Once discovered, the columns begin to fill in. The IP address value from the Add Node form appears, and finally the Profiles
appear. Refer to the following figure.
FIGURE 24-18 Service Management Window -> iMG/RG Tab for EPON/ONU
Figure 24-18 shows the Service Management Form once the iMG/RG is configured. The iMG/RG-> Mgmt. Info tab provides a
summary of all the main attributes.
FIGURE 24-19 Service Management Window -> ONU Configuration Tab for EPON/ONU
Figure 24-19 shows the Service Management Form with the ONU Configuration tab. On this form the user can change the
VLAN-QoS policy association. The available VLANs and policies are included in the pull-down menus.
Note: The EPON supports translations. When the user clicks on the New Value field for the VLAN Info, a pop-up includes the VID,
translation, and QOS Policy that are to be associated. These are the same values that can be datafilled with the ONU profile.
As with other profiles, the user should be aware that if the ONU was configured with a profile and changes are made here,
the ONU will be out of sync with the Profile.
Video
Head = IP Subnet
40 40 Video to
Set Top Box
Ethernet
20 20 Data to PC
SFP xDSL xDSL Ethernet
SIP
FIGURE 24-20 Configuration 5 - VoIP using SIP
Note: This example is included because a phone is included that connects to the SIP network using the POTS24 that has been
configured to support SIP.
Refer to the following figure to show how the Triple Play form is filled out to support SIP.
iMG646PX-ON
= IP Subnet = voice VLAN (VID 10) = 10.56.7.223
ONU 4.0.0
= shared (video, data) VLAN (VID 40) ETH 4.0.0
Data to PC
FXS FXS Ethernet
10 10
Video to
EPON BD Fiber 40 Set Top Box
= 172.16.33.18 Ethernet
iMG646
Customer
40 = 10.56.7.224
40
Data to PC
Ethernet
SFP FX BD Fiber
XE/GE NM card Video to
Ethernet Set Top Box
10 10
Video to
IP Set Top Box
Ethernet
Gateway
FXS FXS
Class 5
Switch
iMG634
= 10.56.7.225 Data to PC
Ethernet
Video to
40 Set Top Box
Ethernet
xDSL xDSL
10
Video to
Ethernet Set Top Box
FXS FXS
POTS
3_play_Voi ce_Shared
24.6.1 RG Forms
Customer
2:1 Media
Converters
HPNA Network
= data_VLAN (VID 20, 201) = video_VLAN (VID 40, 901) Note 1
40 901 Video to
Set Top Box
Note 4 Ethernet
20 201 Data to PC
SFP FX BD Fiber Ethernet
24.7.1 RG Forms
The iMG6x6MOD product, when using the HPNA LAN interface card, can have devices connected to the residence coax
network. Since there is now a set of devices associated with the HPNA as well as the LAN ports, the user must ensure that
the VLAN configuration matches the system configuration. Moreover, the media converter used between the coax and
ethernet interfaces has untagged VLANs on the ethernet interfaces, numbered 201 and 901. The VLANs used on the LAN
ports must also have these two VIDs configured.
Note: The HPNA could also be configured to support an untagged VLAN, but this needs to be configured on the default VLAN (1),
and the HPNA could support only one service.
Since the upstream network might not be using VLANs 201 and 901 as their VLANs for data and video, the VLAN must be
translated to another VID that matches what the network is using. In release 10.0, this translation feature for iMAP interfaces
is available on the Port Profile Form. Refer to Figure 24-28.
Customer
Video
Head
SBx908
40 40 Video to
Set Top Box
Ethernet
20 20 Data to PC
SFP SFP BD Fiber Ethernet
Class 5
Switch
= IP Subnet
= data_VLAN (VID 20) = mgmt_VLAN (VID 40)
= voice_VLAN (VID 10) = video_VLAN (VID 30)
DHCP
ip_mgmt
172.16.1.100
Video
Head Ethernet
DHCP NAT
40 ip_video
10.100.1.100 ip_local
192,168.1.1
30 Ethernet
static
WAN DHCP NAT
ip_internet Note 2
SFP 20
SFP Note 1 66.52.37.129
Ethernet
GE (Etherlike)
XE/GE card
10 DHCP Note 1 - cpu rate limit
ISP ip_voip
Note 2 - cpu rate limits
10.1.1.100 Ethernet
IP
Gateway
Mediaroom configuration differs depending on the type of device you are configuring. Some of the fields utilized by the iMG
600, iMG 700, and iBG 910 series devices do not apply to the iMG 1000 and iMG 2000 series devices.
FIGURE 24-42 Video Profile for Proxy Mode (Use DHCP Option = False)
When filling out the Triple-Play form, the administrator should select Display Preferences and select the tic-box VideoIP
Address Panel. The user can then fill in a static Video IP Address and Mask, which allows video to work. Refer to the
following figure.
FIGURE 24-43 Showing the Video IP Address Panel (Display Preferences Option)
Once configured, the iMG/RG -> Video Service tab shows the Video IP Address and Video IP Mask, as shown below.
Performance monitoring collects useful data from network devices and determining how efficiently the network is
functioning. Performance is measured based on various factors, such as:
• The number of bytes of data received (over a period) by a particular interface of a device
• The number of bytes of data sent (over a period) by a particular interface of a device
• An estimate of the interface's current bandwidth in bits per second
The data pertaining to a network device are collected based on the definition of performance variables (otherwise called
statistics and polled data).
Use the following table to locate the task you wish to perform. If you are using AlliedView NMS, use the screen name or
form name as well to locate the relevant section.
Note: The green colored branch-like image adjacent to the Statistic name denotes the type of Statistic. Statistics are of three types:
Node, Interface, and Multiple. The symbol with multiple branches denotes that the statistic is of type Multiple (one node
and all associated interfaces).
If no data are to be collected for a Statistic, the data are disabled temporarily by the Administrator. In such a case, you will
see the Statistic row displayed in blue color. Once it is activated, the row color changes to green.
• Allow the data to be stored in the database for later viewing (for long-period trend analysis).
• View the Data in the form of a graph.
• View the Data in the form of a report.
Note: You might get an error message such as Time out, which indicates that the agent has been delayed in responding or the agent
is down.
Assume, for steady performance, that you might need the value of the statistic ifInErrors to be between 13000 and 13500.
You can monitor it in real time in this graph, and if the value goes beyond these limits, you can monitor it for another time
period and decide on an appropriate action.
The Current Statistic graph (also referred to as a Runtime chart) provides two advantages when you do real-time
monitoring:
1. You can change the Data Collection interval
By default, the data collection interval shown in the graph is 15 seconds. You can specify the required polling interval in
seconds. Decrease the value if very close monitoring of a statistic is needed. This helps you in analyzing the effect of
changes in intervals on data collection. But every time you change the interval, follow these steps:
1. Click the Stop button.
2. Change the interval.
3. Click Restart. This helps you analyze the effect of change of time over data collection.
4. Change Graph type.
2. You can choose to view the data as a bar or line graph as you monitor the collected data. When small values are plotted,
line graphs can be difficult to view. In such cases, you can immediately change to a bar graph.
Follow these steps to view Current Statistic Graph:
1. In the Configured Collection panel, select the Statistic for which you want to monitor in real time.
2. Select View -> Plot -> Current Statistic from the Panel-Specific Menu Bar. You will see the following figure.
25.4.2 Example
Assume a Statistic called Interface_in_octet for the switch named switch_vg3w. For efficient performance of the switch, the
value of this statistic must be between 1300 and 1370. This means that you should have some notification mechanism to
inform you when the statistic value is not within this limit.
Define three thresholds for this statistic:
switch_vg3w-critical, switch_vg3w-major, and switch_vg3w-minor, as shown in the following table.
Threshold
Property Switch_vg3w-minor Switch_vg3w-major Switch_vg3w-critical
value 1320 1350 1371
type max max max
threshold Has entered violation stage Monitor the value; it might exceed Reached critical point.
message critical threshold Immediate attention required.
reset value 1319 1349 1369
In short, if the Statistic value is 1350, the threshold switch_vg3w-major is exceeded. The message “Monitor the value; it
might exceed critical threshold” will be generated. But if the statistic value goes below 1369, the threshold will be reset and,
again, data collected for the Statistic will be monitored.
• If another threshold exists of a lower severity and if the collected data falls in its limits, that threshold will generate the
message.
• If another threshold exists with higher severity, the higher severity threshold will take precedence and its message will be
displayed. The threshold with lower severity loses its importance and will not be generated until the threshold with the
higher severity reaches its reset value.
Performance monitoring basically means collecting useful data from network devices and determining how efficiently the
network is functioning. Performance is measured based on factors such as:
• Number of bytes of data received (over a period) by a particular interface of a device.
• Number of bytes of data sent (over a period) by a particular interface of a device.
• An estimate of the interface's current bandwidth in bits per second.
The data pertaining to a network device are collected based on the definition of performance variables (called Statistics).
Note: During startup, the AlliedView NMS server creates a set of default statistics that are inactive. Figure 26-1 shows these default
Statistics.
Once the AlliedView NMS server starts, data collection starts automatically. Data is collected from the devices listed under
the Hosts list in the Configured Collection panel, as shown in Figure 26-1. Data is collected only for those Statistics listed in
the panel that have been defined.
Performance configuration involves a series of steps that must be understood in sequence so that the Administrator can
ensure that all devices in the network are operating efficiently and that any degradation in performance is reported to users
as quickly as possible. Once the purpose of these steps is explained, the specific tasks can be shown.
Overall, performance management involves three main areas:
1. Data Collection
To configure data collection means to define from which devices (managed objects) data will be collected, what data to
collect, and how the data will be filtered before it is stored in the database.
2. Threshold Configuration
As the data is collected and scored, it needs to be checked against threshold values to provide a method to see that the
device performance is degrading.
3. Reporting
As the data is collected and thresholds are checked, users must be notified.
The settings for Performance Management are in a set of configuration files (.conf) in Extended Markup Language (XML)
format.
Warning: Editing configuration files directly should only be done under the supervision of Allied Telesis support personnel, since it is very
easy to delete or change data collection that would result in a loss of performance monitoring for devices. Use the forms
and menus described in this section to set up Performance Management.
Use the following table to locate the task you wish to perform. Use the screen or form name to locate the relevant section.
• Poll Filter - The Polled Data for the Managed Object is filtered so that existing polled data can be modified/deleted, or
new polled data can be added.
When the server starts up, the definitions in the AlliedView NMS internal files are used as follows:
1. Polling Objects are created based on a AlliedView NMS internal file. Each Polling Object has the two criteria, Match and
Data Collection.
2. When Topology creates a Managed Object, the MO is passed through the Polling Object, where the properties of the
MO are compared to the match criteria of the Polling Object.
3. If there are match criteria, PolledData is created for entry in the Data Collection criteria.
4. If there are no Polling Filters, the PolledData goes directly to the database.
5. If there are Polling Filters, the PolledData is passed through the Polling Filter one by one and is modified as specified by
the filter. Then the data can be sent to the database.
The following subsections show how to add these Performance Management modules.
Field Description
OID Normally the Data identifiers are lengthy. For the identifiers that have in common the starting n digits,
Prefix you can specify that as prefix. For example, assume two Statistics, IfSpeed and IfinOctect. The
corresponding Data identifiers are
.1.3.6.1.2.1.2.2.1.5.1 and .1.3.6.1.2.1.2.2.1.10.1.
You can see the first part .1.3.6.1.2.1.2.2.1 is common to both, so you can specify the common prefix as
.1.3.6.1.2.1.2.2.1. Even if you do not specify the prefix, Performance module will add the prefix to the
identifier.
Default The time interval for periodic data collection. For example, if set to 5, then for all the Data identifiers,
Polling data will be collected once in every 5 seconds. Default value: 300 seconds.
Interval
Name Any meaningful string for the Data identifier. Required
OID A unique Object Identifier string that represents a MIB entry. Data is collected for this identifier. An
SNMP-specific Data identifier is called an OID. For example . 2.2.1.16.1 refers to IfInOctects interface
instance 1. Required.
Type This can be set to interface, node, multiple, or none.
Node - Used when Data identifier is of type Scalar. If you choose the type to be Node you must specify
the full OID. For example to collect data for Interface_in_octets instance 1 then choose this type and
specify the data identifier as 2.2.1.10.1.
Interface - Exclusively for IF table entries of RFC 1213 MIB, only. This is used when the data identifier has
many instances.When you want to collect data for all the instances of an OID choose the type to be
Interface. Enter the data identifier as 2.2.1.10. For every instance of the OID, a PolledData will be
created.
Multiple - This type can be used to collect data for OIDs that have multiple instances. As Interface type is
specific to IF table entries for other OIDs that have multiple instance you can choose the type as
Multiple. Only one PolledData will be created for the OID specified but data collection will be done for
all the instances.
None - Used when other protocols are used for data collection apart from SNMP.
Default value: None.
Polling The time interval for periodic data collection. For e.g. if set to 2, it indicate that for all the Data
Interval identifiers, data will be collected once in every 2 seconds. Default: 300 seconds.
Field Description
Active If you uncheck the checkbox, data collection will be temporarily stopped for this Data identifier. To
resume data collection you will have to check this checkbox. Default: True (checked).
Save If unchecked, specifies data will not be stored, and can be viewed only by the Real Time monitoring using
Collected Current StatisticGraph you do not want to store the collected data, “uncheck” this check box. Default:
Data True (Checked).
Save This option is applicable only for Counter type OIDs. By default, data collected for Counter type OIDs is
Absolute not stored as it is. The difference between the previous data and latest data is collected and stored. If the
exact value (absolute value) of collected data has to be stored for Counter type OIDs then this check
box should be checked.Data collected for OIDs of other data types are saved as absolute values. Default:
False.
Time If you check this checkbox then the Time Average will be calculated as (Latest collected value + Previous
Average value) / Difference in Data collection Time value.This is mostly calculated for Counter type and Gauge
type Data identifiers where the data collected will be an incremental value and at one point will reach the
final value and reset to Zero. As this reset may happen soon and very often, it is preferred that a Delta
value is derived from two consecutive Polls. Default: false.
Use Check to apply threshold for this Identifier. Default: False (unchecked).
Threshol
d
Threshol A list of thresholds to apply to this data. Click the ellipses (...) to get a pop-up list of applicable
d List thresholds. Select the desired thresholds from the pop-up list (Shift+click to select multiple thresholds),
and then click OK in the pop-up window.
Failure Number of consecutive failures after which the threshold event should be generated. This can be used
Threshol where a single Poll (Datacollection for the Data identifier) is not stable. For example, assume the Data
d identifier has a threshold associated and it is predicted that the data collected can be crosschecked 3
times. If the collected value still exceeds the Threshold value then it means that the collected data is
stable and this may result in Performance degradation. Default: 1.
Log This option allows the polled data to be saved directly to a text file (comma-separated). The text file will
Directly be located in the NMS Server installation directory on the NMS host machine and will be named <device
name or IP address>_<polled data name>.txt (e.g. 172.16.33.2_ifInOctets.txt).
Note: This option is useful for quickly viewing the raw values as they are collected form polling but
should not be used for long term data collection to avoid filling up the NMS server disk
storage.
After filling in these fields for an Identifier, click Apply and it will be added to the Data Identifier List. Once added, you can
click Modify to modify the Identifier or Remove to remove it.
Once all the Identifiers have been configured, click Apply. This adds the Polling Object to the database and the statistic to the
Configured Collection Panel.
2. Under Polling Properties, change the Active and Update Managed Objects checkboxes, if desired.
Note: The information under Device Match Criteria is not editable.
3. Under Collection Statistics, select a Data Object from the list and change the field values as needed.
Note: Check the Advanced checkbox to enable all of the fields and checkboxes, if necessary.
Repeat for each Data Object you need to change.
4. When you are done, click Apply to make the change to the database.
Property Description
Name Any meaningful string for the Data Identifier. Required.
SnmpVersion One of the three SNMP versions - VI, V2 or V3. Required.
Read Enter the string with which the devices are identified in a network. Most of the equipment vendors set
Community the Community value as public for their devices, so it is usually used here. Otherwise you have to
check the string used for the particular device.
Note: The community specified must be enabled on the device.
OID A unique Object Identifier string that represents a MIB entry. Data is collected for this identifier. An
SNMP specific Data identifier is called an OID. For example, 2.2.1.16.1 refers to IfInOctects interface
instance 1. Required.
Agent Normally a device will have one agent in it to collect device data, and the device name and agent name
will be the same. Required.
DNS Name Name of the device from which data have to be collected.
Property Description
Active If you uncheck the check box, the data collection will be stopped for this OID. (The statistic row once
created will be blue.) To activate data collection, check the box.
Default value: True (checked).
Period The time interval for periodic data collection. For example, if set to 2, for all the Data identifiers, data
will be collected once in every 2 seconds.
Default value: 300 seconds.
Threshold Checking means the Threshold will be applied on this Data identifier. Unchecked means no Threshold
will be applied.
Default value: False (unchecked).
ThresholdList Name of the Thresholds in comma separated format, thus associating them to this Data identifier for
monitoring data collection.
Failure Threshold at which a failure is declared.
Threshold
isMultiple Checking means the data identifier is of type multiple.
Policy Name The name of the polling policy.
Snmp Port Specify the Port No over which device data is passed to the AlliedView NMS by the device agent. The
default SNMP agent port is 161. Required.
Advanced Allows the optional values to be modified.
Protocol SNMP, TL1 or any other protocol used by you for data collection.The default protocol SNMP will be
assumed for data collection.
Save Whether to view the data only by Real Time monitoring using Current Statistic Graph. To specify that
you do not want to store the collected data, uncheck this check box.
Default value: True (Checked).
saveAbsolute This option is applicable only for Counter type OIDs. By default, data collected for Counter type
s OIDs is not stored as it is. The difference between the previous data and latest data is collected and
stored. If the exact value (absolute value) of collected data has to be stored for Counter type OIDs,
then this check box should be checked. Data collected for OIDs of other data types are saved as
absolute values.
Default value: False (Unchecked).
SaveOn Possible values are true and false. If true the collected data is saved only when it exceeds the
Threshold threshold.
Default value: false
Time Average Checking means the Time Average will be calculated as follows:
(<Latest collected value> + <Previous collected value>) / <Difference in data collection Time value>
This is mostly calculated for counter type and gauge type OIDs where the data collected will be an
incremental value and at one point will reach the final value and reset to zero. As this reset may
happen soon and very often, it is preferred that a delta value is derived from two consecutive polls.
Default value: false.
Last Counter The counter value last read.
Value
Last Time The time the counter was last read.
Value
Next Time The next time the counter will be read.
Value
Property Description
Log Directly Checking means to store the collected data in flat files rather than storing them in database.
Default value: false (unchecked).
Log File The log file name with a full path (the location on the hard disk as where the log file has to be stored).
parentObj Name of the Managed Object which acts as the parent for this Data Identifier.
Poll ID A unique number associated with each Statistic to identify the Statistic. Poll ID is automatically
generated so no two Statistics will have the same Poll ID.
Advanced Allows the optional values to be modified.
• Type
• Max - When collected data exceeds a value, report an error
• Min - When collected data drops below a value, report an error
• Equal - When collected data equals a value, report an error
• What message should be generated when the threshold is exceeded.
• At what value should this threshold get reset.
Thresholds are defined and associated with statistics. A single statistic can have many thresholds indicating a severity such as
Critical, Major, Minor, etc. Whenever data is collected for the statistic, it is cross-checked with the associated thresholds. If
the collected value exceeds the thresholds, then the threshold message is displayed.
Refer to the following figure.
• Percentage Values
Assume you want to set the number of pages to be loaded in a printer to depend on the Toner level. Moreover, when
the toner level is 80% of the number of pages to be printed, you wish to be notified. To achieve this, you create a
Percentage Threshold with a value 80. Collect data for two Statistics, Toner level and Number of pages in the printer.
Divide the first by the second to find the percentage. If the resulting value exceeds the Threshold value (80), then you will
receive notification. The steps are:
1. Data will be collected for first statistic.
2. When compared with Threshold value, if Threshold type is percentage, for the associated statistic (second statistic)
data will be collected.
3. Both will be divided and result multiplied by 100, thus giving a percentage.
The notification that you receive when the collected value exceeds the Threshold value is in the form of a Threshold Event.
An event is an occurrence of some action. Hence, whenever the Threshold value is exceeded, a Threshold event will be
generated, which will be handled by AlliedView NMS Fault module. Also, every Threshold event is associated with a Severity
to denote the criticality of the situation. For example, a severity of Critical should indicate that immediate attention is
needed on data collection.
You can associate multiple thresholds with a single Statistic. Doing so allows you to control every value collected. For
example, you can say if the collected value is above 10, the severity is minor. If the collected value is above 20, severity is
major. In such a case the following will happen:
1. Until a threshold reaches it's reset value, it will be in that severity state itself. As soon as it reaches the reset value, the
threshold gets reset and waits for the collected data to again exceed its limit.
2. If another threshold exists of lower severity and if the collected data falls in its limits then that threshold will generate the
message.
3. If a threshold exist with higher severity, the higher severity threshold will take precedence and its message will be
displayed. The threshold with lower severity loses its importance and will not be generated until the threshold with a
higher severity reaches reset state.
Property Description
Name Any action in a network can be captured and an appropriate name can be given to the event
generated on such actions.
For example, when ManagedObjects are added into the database an event can be generated. This
event may be named as AddMOevent. Similarly generated Threshold events can be named which is
decided by the Administrator. This name will be used by the Fault module for Event handling and for
appropriate notification.
Severity String to emphasize the importance of the event generated when the Threshold value is exceeded. By
(Trigger default, the following severity strings have been defined
Severity) Critical, Major, Minor, Warning, Clear.
Category By default, the word Threshold is used for identifying Threshold events.
Property Description
Threshold Type of Threshold value you are going to specify. Possible values are Max, Min or Equal:
Type Max - If Collected value exceeds Threshold value, an event will be generated.
Min - If Collected value is less than Threshold value, an event will be generated.
Equal - If Collected value is equal to Threshold value, an event will be generated.
Threshold Integer value which can be interpreted in two ways:
Value 1. In the case of a Threshold defined for Long values, the data collected for the OID is compared with
this value.
2. In the case of Percentage Thresholds, the result of (first OID / secondOID) * 100, a percentage
value, is compared with this value.
Rearm Value Integer which denotes that when the collected value (or calculated value in case of percentage
thresholds) reaches the Rearm value, the violated Threshold is brought back to normal and a clear
event will be generated.
Reset When the Threshold is reset, by what severity it should be denoted.
Severity
Allowed String value which will be compared with the string data collected. If both match then a Threshold
Values event will be generated. The string which you can specify here can be:
- simply a string, for example router5.
- a comma separated list, for example router1, router2.
- using wild card characters, for example router* where * indicates any number of characters and any
character.
Disallowed String which will be compared with the string data collected. If both match then a Threshold event will
Values be generated denoting a reset of Threshold. You can enter strings as specified above.
ObjectID The Object Identifier for which data will be collected in case of PercentageThresholds.For example,
2.2.1.16.1.
Object ID Type of Data identifier whether it is Node, Interface or Multiple.
Type
Message String that will be displayed in the Event panel of Fault module when Threshold value is exceeded.
Clear String that will be displayed in the Event panel of Fault module when Threshold is reset (cleared).
Message
Send Clear Only when this check box is checked, Clear events will be generated on Threshold reset.
Otherwise the Threshold will be reset and you will not know, as no information will be
displayed in Event panel of Fault module.
Network Events are entities that represent the various happenings in the network devices. Events can convey general
information or the current status of the devices in a network.
There are many powerful tools that allow an Administrator to control how managed objects (specific aspects of a device)
report changes in their state. Through parsing and filtering, the Administrator can ensure that any change of state in a device
or set of devices is reported in such a way that users can easily pinpoint the problem (or potential problem).
Note: Trap parsers are critical to alarm correlation and should only be changed under the supervision of Allied Telesis Technical
Support personnel.
To configure the Trap parser, select Edit -> Configure -> Trap Parsers from the main menu of the Network Events Panel.
The Trap Parser Configuration form is shown in the following figure.
Option Description
Trap Port Port that receives the trap. You must provide at least one, or the traps will not be received. More
than one port can be entered, separated by commas.
Name Name of the trap. The name should match the event.
Nodes Specific nodes for this trap parser. Since most trap parsers are for general conditions or device
types, this field is usually not used.
Option Description
Groups Grouping of nodes.
TrapOID A TrapOID uniquely identifies an SNMP v2c or SNMPv3 trap and comes along with the Trap PDU.
The TrapOID can be a match criteria.
When the TrapOID has a value that starts with the Object Identifier the match criteria is met.
Wildcard (*) can be used. When the Trap Object Identifier of the incoming trap must match exactly
the TrapOID, put the value in brackets (<>).
Enterprise Used to specify the enterprise OID of the SNMP v1 trap. If this field is specified, then the
parser will be applied only if the trap enterprise field starts with the value you have
specified. For example, when an enterprise OID is specified as .1.3.6.1.2.1.11, then all the
OID's under this tree will be matched for traps. To avoid this kind of matching, the
enterprise OID value should be given in angular brackets like <.1.3.6.1.2.1.11>. In this case,
only the trap with this OID will be matched. If the value is given as *, then all the OID's will
be matched.
The enterprise field should not be left empty.
Generic Type Each SNMP v1 trap has a Generic type number. This number can used for specifying the
match criteria. You can specify the Generic Type (GT) number in this field, so that the
trap parsers will be applied if the incoming trap has a GT value equal to the one specified
in this field.
Specific Type Each SNMP v1 trap has a Specific Type number as well. You can also use this as a match
criteria for the incoming trap. When the incoming trap matches this criteria, then the trap
parsers will be applied.
Severity Severity of the resulting alarm, ranging from info to Critical.
Message Click on the click to Edit Message button to type in what will appear in the text field of the alarm.
Failure The most important field, it must reflect the actual problem.
Object
Domain The domain name for the Event.
Category The category for a set of events or alerts.
Network Network name associated with the event.
Node Node value for the event.
Source Source name for the event. If the status of the Managed Object is to be updated with the severity of
the event, the Source should match the Managed Object name.
Group Name The group name if alarms or events are to be grouped.
Help URL The help file, which is this document.
More After selecting this button you can include additional properties for the Event. This is explained in
more detail below.
Add Trap Create a new trap parser with all fields editable. The Update button adds it to the Trap Parser list. If
Parser all of the fields are the same as an existing Trap Parser, an error message appears. If the name you
choose already exists in a file (config directory) or the MIB (mibs directory), an error message
appears.
Modify Trap Change an already existing trap parser.
Parser
Delete Trap Delete the selected trap parser. If the parser exists in the config or mibs directory, it will be deleted
Parser from the directory.
Update Update the modified trap parser. The change will not take effect until the Apply to Server button is
selected.
Option Description
Apply to Make the changes permanent.
Server
Load from Loads the trap file from the mibs directory so the traps can translated to a trap parser. This is
MIB explained in more detail below.
Load from Loads the trap file from the conf directory. This is explained in more detail below.
File
Save to File Brings up the Save <type of information> to File form. Save the trap parsers as a file. The default
path is to the conf directory. This allows the configured trap parser to be used again and as a
backup.
Note: When saving these files, the AlliedView NMS sets as the default directory the
<AlliedView NMS Home>/state directory, so for example the file path:
../conf/trap.parsers
is being saved in the conf directory by going up one level from the state directory
(..) and then down to the conf directory. If the user enters in the form only a file
name, that file is being saved in the default state directory.
Cancel Cancels the update.
Help Brings up this section of this document.
Close Closes the form. If no changes were applied to the server, they are lost. If changes have been made,
there is a prompt on whether to apply the changes.
Token Description
$Agent SNMP V1 Traps: If the device corresponding to the agent address returned by the trap has already
been discovered by Web NMS, then this token will fetch the name of the parent Managed Object,
corresponding to the interface object matching the agent address of the trap received. If the device
corresponding to the agent address of the trap has not been discovered, then this token will return
the corresponding IP address of the agent address from which the trap has been received.
For example, if a trap is received from an agent and if the corresponding device has already
been discovered by AlliedView NMS, then the interface object will be IF-web server and the
name of the parent managed object will be web server. In this scenario, $Agentwill return
webserver. In case the device is not yet discovered, then $Agent will return the IP address
(192.168.1.30.).
SNMP V2c & v3 Traps: If the device corresponding to the source address contained by the
trap received has already being discovered by AlliedView NMS, then this token will fetch
the name of the parent Managed Object, corresponding to the interface object matching
the source address of the received trap. If the device corresponding to the source address
of the trap has not yet been discovered, then this token will return the IPaddress of the
Source of the Trap.
$Community This token will be replaced by the community string of the received trap.
TABLE 27-3 Tokens to Access the Properties of the Trap PDU (Continued)
Token Description
$Enterprise This token will be replaced by the enterprise id of the received trap. Applicable only in the case of
SNMP traps, or else replaced with a blank.
$GenericTyp This token will be replaced by the generic type of the received trap. Applicable only in the case of
e SNMP v1 traps, or else replaced with a blank.
$Source If the device corresponding to the source address contained by the trap received, has already been
discovered by AlliedView NMS, then this token will fetch the name of the parentManaged object,
corresponding to the interface object matching the source address of the received trap. If the device
corresponding to the source address of the trap received has not yet been discovered then the
corresponding IP address of the source address will be returned.
$SpecificType This token will be replaced by the specific type of the received trap. Applicable only in the case of
SNMP v1 traps, or else replaced with a blank.
$Uptime This token will be replaced by the uptime value in the received trap.
$TrapOID This token will be replaced by the trap OID of the received trap. Applicable only in the case of SNMP
v2C traps, or else replaced with a blank.
$* This token will be replaced by all the variable bindings (both OID and variable values) of the received
trap. for example, for the following varbinds,
2.2.1.1.221 INTEGER 30 .1.3.6.1.2.1.1.1 STRING abc 2.2.1.1.1 INTEGER 10
the result will be: ifIndex: 30, sysDescr: abc, ifIndex: 10
$# This token will be replaced by all the variable binding values (only variable values and not OIDs) of the
received trap. For example, for the following varbinds,
2.2.1.1.221 INTEGER 30 .1.3.6.1.2.1.1.1 STRING abc 2.2.1.1.1 INTEGER 10
the result will be: 30, abc, 10
$N Here N is a non-negative integer. This token will be replaced by the (N+1)th SNMPvariable value in
the variable bindings of the received trap. The Index N starts from 0. For example, for the following
varbinds,
2.2.1.1.221 INTEGER 30 .1.3.6.1.2.1.1.1 STRING abc 2.2.1.1.1 INTEGER 10
and for %1, the result will be: abc
@* This token will be replaced by all the OID labels in the variable bindings of the received trap.
Example:
For the following varbinds,
2.2.1.1.221 INTEGER 30 .1.3.6.1.2.1.1.1 STRING abc 2.2.1.1.1 INTEGER 10
the result will be: ifIndex: sysDescr: ifIndex
@N This token will be replaced by the (N+1)th OID value in the variable bindings of the received trap.
The index count starts from 0. This token will be replaced by the (N+1)thOID label in the variable
bindings of the received trap. The index starts from 0. For example, for the following varbinds,
2.2.1.1.221 INTEGER 30 .1.3.6.1.2.1.1.1 STRING abc 2.2.1.1.1 INTEGER 10
and for @1, the result will be: sysDescr
$IP-Source This token will be replaced by the IP address corresponding to the source address of the trap
received.
$IP-Agent This token will be replaced by the IP address corresponding to the agent address of the trap received.
Special Purpose Tokens - The associated Managed object should have been discovered already by Web NMS for using
the following special purpose tags (or tokens). This is applicable for all special purpose tags (or tokens) listed in this
section.
TABLE 27-3 Tokens to Access the Properties of the Trap PDU (Continued)
Token Description
$AgentMO This tag (or token) facilitates the accessing of managed object properties.The tag can be used to
access any properties of the Parent managed object for the interface object corresponding to the
agent address of the received trap. (Fetching the Managed Object is similar to the $Agent tag
mechanism). For example, if the user wants to access the “pollInterval” property of the Parent
Managed object corresponding to the agent address of the received trap and then assign it to some
property of the Eventobject generated, the user should specify the tag as $AgentMO(pollInterval)
against the specific property of the Event.
Usage:- $AgentMO(PropertyName)
$IF-AgentMO This tag is similar to $AgentMO, except that the properties of the interface managed object’s
corresponding agent address of the received trap could be accessed using this tag. In the case of
SNMP V2c traps, it will be exactly the same as $IF-SourceMO.
Usage:- $IF-AgentMO(PropertyName)
$IF-Agent This is similar to $Agent, except for that it results in the interface managed object name
corresponding to the agent address of the trap received. In the case of SNMP V2c traps, it will be
exactly the same as $IF-Source.
Usage:- $IF-Agent
$SourceMO The tag can be used to access any properties of the Parent managed object for the interface object
corresponding to the source address of the received trap. (Fetching the Managed Object is similar to
the $Source tag mechanism). For example, if the user wants to access the “pollInterval” property of
the Parent Managed object corresponding to the source address of the received trap, in order to
assign it to some property of the Event, the user has to specify the tag as $SourceMO(pollInterval)
against the specific property of the Event.
Usage:- $SourceMO(PropertyName)
$IF- This tag is similar to $SourceMO, except that the properties of the interface managed object
SourceMO corresponding to the source address of the received trap could be accessed using this tag.
Usage:- $IF-SourceMO(PropertyName)
$IF-Source This is similar to $Source, except that it results in the interface object name corresponding to the
source address of the trap received.
Usage:- $IF-Source
stored in <Web NMS Home>/conf/trap.parsers. Clicking Load will load the trap parsers from the file. Parsers with the
same matching criteria are replaced. If the Trap Parser name is the same, there is confirmation prompt to replace the
existing one. Once loaded, the Apply to Server button makes the changes permanent. The trap parsers in the
trap.parsers file will load the next time the AlliedView NMS server starts.
[
FIGURE 27-4 Event Parser Configuration Form
Option Description
Name Name of the event. The name should match the type of event.
Match String The match criteria determine whether the Event will be parsed by the given Event parser or not. If a
field is left blank, it is automatically matched. Otherwise all fields (AND condition applied) must
match the input event.
To specify a match criteria, the following may be used in expressions.
Wild Card - Asterisk (*): To signify match 0 or more characters of any value. e.g., *Failed* will match
any String with Failed somewhere in it.
Negation - Exclamation (!): This can be used at the start of a field, to specify exclusion of Events
matching the succeeding expression. e.g., !Failed will exclude Strings with Failed anywhere in them.
Note: Expressions like *Failed, Fai*d and * have the expected meanings in the match criteria.
Tokenizer Allows you to break up the input field into a series of tokens that can then be used in the output
String Event object. The tokenizer definition is a string with the tokens represented by $1, $2, etc. Only
positive integers are allowed following '$'.
Example:
Consider the case, where you expect an event message text string as:
Line Card 31 failed on Shelf 54: No Response - (Match String).
The Line Card Number (31) and the Shelf Number (54) may be required while defining other
properties of event, so they will be tagged as tokens with a token number.
Line Card $1 failed on Shelf $2: No Response - (Tokenizer String).
After such tokenization, the token number is used in the output event definition. Specifying $text$1
for any field in the output event definition will be replaced with the value 31, while specifying
$text$2 will be replaced with 54.
Note: To identify the Replaceable parameter of a specific field, the token number should be
preceded by the field, for example $text$1 indicates the first tokenized string of the field
Message.
The tokens of any field can be used in any other field, provided this Note is followed.
Option Description
Output String The output of the event parser is an Event object, which will be the modified instance of the
incoming event. The attributes of the Event object are defined by what are specified in the event
parser, so it is necessary to select correct values for important attributes such as failure object
(affected Entity), severity, and message text.
The properties that should remain unchanged must be specifically noted by placing a dollar followed
by that property name. For example, if the text field should not be modified, then the value $text
should be entered in the Output String.
When specifying the output values in the definition column, to use the values of the incoming event
properties, you should specify the exact property name (case sensitive) with a prepended $. For
example to use the event property source, the definition should be $source. If the particular property
has been tokenized and if user intends to use the value of the token, then the format should be
$propertyname$N, where N should be the count of the token starting with 1.
When it is necessary to deliberately have a null value for a specific property of the Output Event,
then the Output String for that property should be left blank.
The default properties of event that can be used in the definition column following $ are: category,
domain, entity, groupName, helpURL, network, node, source, severity, text, WebNMS. Apart from the
listed default properties of the event, user property names can also be used.
For the list of the various Event Properties and their description, refer to Event Properties.
More Configure additional criteria based on other properties of the event, which could also include the
User properties, apart from the given default set of Event properties.
In the first column of the dialog, specify the “name of the property”, which could be any valid
property of the Event including its user property. While giving the name, ensure that the name has
the same case as given in the event properties. The second column specifies the matching criteria. In
the third column, user can specify the pattern in which the incoming event property has to be
tokenized. The fourth column is for defining the output value of the corresponding property in the
resultant event.
Note: You should note that if a criteria is configured, based on the Event user property and if
no definition is given against that property, then the user property will be dropped in the
resulting Event. The event properties id and time are not configurable using the event
parsers. These fields will be copied to the values as that of the incoming event object.
Note: When user properties are added to events, they can be used in additional event parsers
or custom views.
Add Event Add a new Event parser. All the fields in the screen are editable. Ensure the name is unique. If the
Parser entered name matches the existing one, then an error message will pop up with the message “Event
parser of the given name already exists. Should that be replaced?” Clicking “Yes” will overwrite the
existing criteria. Clicking “No” will quit the add operation.
Modify Event Modify an existing Event Parser. All fields are editable.
Parser
DeleteEvent Deletes the selected Event Parser. You can also click on the Event Parser and use the Del Key, or
Parser Control + Del or more than one.
Option Description
Save to File To reuse the configured event parsers and to save the event parser configuration as a backup. These
files can later be loaded in to the same or another event manager. This will enable sharing of the
event parser data by other users. When this option is chosen, a dialog window will be brought which
will prompt you to enter a filename (the default being event.parsers). Enter the name of the file and
choose Save option to save the trap parser.
When saving these files, the AlliedView NMS sets as the default directory the <NMS Home>/
state directory, so for example the file path:
../conf/event.parsers
is being saved in the conf directory by going up one level from the state directory (..) and then
down to the conf directory. If the user enters in the form only a file name, that file is being saved in
the default state directory.
Load from To load a set of event parsers previously saved with the Save To File option and add them to the
File existing list of event parsers. This option brings up a dialog box to specify the filename on the server,
which contains the event parsers. Choosing the Load option will complete loading event parsers
from the specified file. The parsers with the same matching criteria as that of the existing ones will
be replaced with the new ones.
Update Update the modified Event Parser. The change will not take effect until the Apply to Server button is
selected.
Apply to Makes and changes permanent.
Server
Cancel Cancels the update.
Help Invokes this table.
Close Closes the form. If no changes were applied to the server, they are lost. If changes have been made,
there is a prompt on whether to apply the changes.
If the event object contains the trap pdu information, you can make use of the trap pdu information while defining the output
events. The methodology of using the properties of the trap using symbolic notations is similar as in Trap Parsers, except for
the following:.
• To access the values of the SNMP OID in the SNMP Variable bindings, the notation should start with % and not with $ as
in trap parser.
• To access the SNMP OID in the SNMP Variable bindings, the notation should start with @ which is same as in trap
parser.
The values of the trap pdu can be used in any of the columns, except in Tokenizer in the parser defined.
Note: If the trap pdu symbolic notation, such as %Agent, is used in the property column (while configuring Additional Criteria) when
the value has also been tokenized by specifying a tokenizer string, then to refer to a token of this field use the notation as
$%Agent$N, where N specifies the count of the token to be used.
FIGURE 27-5 Setting the Event Parser to Produce Alarms for SYSLOG
The usual scenario would be the device in the Physical Network view would show the device has a major alarm. Right
clicking Alarms/Events -> Alarms on the affected device would show Figure 27-6. (This would also show up in the Events view
as a network event.). The user could then double click the alarm row to further process the alarm, or Edit -> Clear to clear
the alarm.
For default events (such as status update failure), the severity of the event is already set, but can be changed by creating an
Event Parser that outputs a different Severity Alarm. Following is an overview of status update and the steps to change the
severity of a status node failure from Major to Critical.
27.4.4.1 Overview
The AlliedView NMS periodically tests connectivity to all managed devices by polling their interfaces. By default, the period is
300 seconds, which can be modified with the Managed Object Properties dialogue (by changing the pollInterval parameter).
By default, when connectivity is lost a major event is created, which in turn generates a major alarm. This example shows
how to make the event critical instead of major.
The process involves creating an Event Parser that examines all events, identifies the ones pertaining to lost connectivity, and
changes their severity from Major to Critical.
FIGURE 27-7 Viewing Major Level Severity for Node Failure Event
4. Double-click the major event and view its details. Refer to Figure 27-8.
FIGURE 27-11 Testing the Changed Severity for the Event Parser (now Critical)
3. If it changed to green instead of red, either connectivity was re-established while you were creating the Event Parser,
or you accidentally selected Clear on the Severity Output-String where you meant to select Critical.
4. If it goes to Orange, you misspelled the Message text, you selected Major instead of Critical, or you misspelled the
type name.
Note: A critical event will also be generated for the network to which the failed device belongs.
27.4.4.8 Delete the Event Parser (if non-default behavior no longer needed)
To delete the new Event Parser (and return to the default behavior), go back to the Event Parser Configuration window,
select the parser you added, click on Delete Event Parser, Apply, and then Close.
Note: As mentioned in Configuring Event Parsers, there are a number of pre configured event parsers already defined by AlliedView
NMS. If you delete any of those you may degrade or destroy existing NMS functionality.
FIGURE 27-15
7. Select the tab for the action type you want to add. See Event Filter Actions for information on each action type.
Note: The fields on the Advanced tab are required for every Trap, Email and Run Command event filter action, including existing
event filters carried over from previous versions of the NMS. The tables in Event Filter Actions identify the values you need to
enter in the Advanced tab fields.
8. Click the top Add button to add the action to the Filter Action List.
9. To add another action, click Reset.
10. Click the bottom Add button to add the action
11. In the Event Filters screen, click OK.
Note: You must restart the NMS server for changes to take effect.
Load/Save Loads or saves a set of filters from/to a file. When you save a file, the default directory is the <NMS
Home>/state directory.
• Suppress: Suppress events that match the filter criteria. You can suppress all events or multiple events of the same type
within a given interval.
• Run Command: Run a command on the server for events matching particular filter criteria. Commands can be used to
send a page to someone, email or any other desired command.
• Custom: Write your own Java code to filter events and perform actions based on filter criteria.
Tips to keep in mind when creating event filter actions:
• The fields on the Advanced tab are required for every Trap, Email and Run Command event filter action, including
existing event filters carried over from previous versions of the NMS. The tables below identify the values you need to
enter in these fields.
• After you create or modify an event filter, you must restart the NMS server for the changes to take effect.
The following tables list the fields available for each action type.
Note: On Linux, upon server startup if there is a default unix syslogd running, then it will be shutdown so the port 514 is used by the
NMS to run its own Syslog Process.
• Enable System Log Daemon - Enables or disables the Log Daemon, so that events can be logged.
• Log to Database - Enables or disables storing of logs in the NMS database.
• Log to Local File - Enables or disables storing of the logs to a local file, <NMS-Home>/logs/syslog.txt
• Include Non-Discovered Devices - Enables or disables the including of system events from non-discovered devices
Note: Various combinations of checkboxes are possible, so for example the administrator may wish to rinclude syslogs from non-
discovered devices and send these only to the local file.
• Logging by Event Type - a list of the types of logs that may be received from the devices. A checkbox is provided for each
to allow you to enable or disable the log as needed. When checked, logs of that type are stored in the database or local
file (or both) as they are received. What is selected here, as well as any log filters that are applied, control what is shown
in the System Log Events table.
At the bottom of the form, the Apply button applies any changes you make to the form, while the Cancel button cancels the
operation without making any changes and closes the form.
Note: Logging a large number of event types may affect the performance of the AlliedView NMS Server. To ensure optimum
performance, select only the event types that you need to monitor and disable any event types that are not needed.
Note: The administrator should be aware that non-discovered devices are not managed/controlled by the NMS, and are therefore
not part of NMS applications.
27.8.1.1 Example 1 - Parent Object set to Max for Polling-Based Alarms (default)
• The administrator sets the Tester attribute for interfaces (IF) in the MO Property Form to PING or SNMPPING, so if an
interface fails, a major alarm is reported by the interface.
• For the parent node, the administrator sets the Tester attribute to Max.
The result of this set up is as follows:
• If an interface fails, the alarm is reported at the node level, with the text of the alarm “one or more interfaces have
failed.”
• Since an alarm at the interface level will result in an alarm at the node level, the node level alarm is not cleared until all
interface alarms have been set to CLEAR by the AlliedView NMS.
• If the parent node has a failure of higher severity, the parent node will take precedence.
Note that this concept of propagating alarms up the hierarchy works at both the Node and Network level; the node reports
among the interfaces the highest level of alarm, while at the network level, MAX means the network reports among the
nodes the highest level of alarm. Alarms at the node level would be propagated to the network object with the text “One or
more Nodes have a Major Alarm.”
27.8.1.2 Example 2 - Parent Object set to PING/SNMPPING (not Max) for Polling-Based Alarms
In this scenario, the higher level object is not set to Max, but to PING/SNMPPING. The following occurs:
• The higher level object will only poll the primary IP interface of its child object.
• There is less “sensitivity” of the higher level object to lower level alarms, since other alarms at the lower level are not
reported to the higher object.
At least one action needs to be associated with the incoming filtered alarm. For an alarm filter, click under filter action
to add one of the action types. These types are explained in Event Filter Actions.
3. Click in the Alert Filter Action panel to activate the Action Type panel.
4. Click one of the buttons for each action type and select New or Edit.
5. Fill in the Action Details panel, and then click Update Action. The Update Action button changes to Update Filter.
6. To add more actions, click Add in the Alert Action panel and add more action types and details.
7. Cancel any filters or actions by clicking Cancel as they appear in context.
8. If desired, reorder the resulting alert filters and actions by dragging and dropping.
To modify an alert filter, select a filter from the list and make any changes, and then click Apply to make the changes
permanent.
To delete an alert filter, select a filter and click the Delete icon from the Alert Filter panel. Any associated action will also be
deleted. To delete a filter action, select an action from the Configured Filter List, and then click the Delete icon from the
Alert Filter action panel.
To load a set of alert filters from a file, click Load/Save. A dialog box prompts for the file path to read the filters from. Click
Load to load the filters.
To save a set of alert filters (for later use or as a backup), click Save. A dialog box prompts for the file path to write the filters
to. Click Save to save the filters.
When saving these files, the AlliedView NMS sets as the default directory the <NMS Home>/state directory, so for
example the file path:
../conf/alert.filters
is being saved in the conf directory by going up one level from the state directory (..) and then down to the conf
directory. If the user enters in the form only a file name, that file is being saved in the default state directory.
If any changes are made and the window is closed without clicking Apply, a prompt will appear asking whether to make the
changes.
3. To create a criteria beyond the Source and Severity, select Advanced. The Match Criteria Properites sceen appears.
4. In this example we will setup a filter to eliminate an alarm that comes in with the message “Unable to login to this
device….”. Enter this using a wildcard in the Message field as shown in Figure 27-24, then select OK.
on the add button (next to the Actions List). This brings up the Add action screen, as shown in Figure 27-25.
8. Back on the Add Action screen, select the Noticfication Type you created (here Suppress_Alarm) and Select Add, as
shown in Figure 27-27.
10. With the attributes for the Alert Filter complete, click on Apply. The new filter name (Filter_iMG_LoginFailure) is now
added to the list of Alert Filters, and this filter will be applied when processing alarms. Refer to the following figure.
Option Description
Enable retrieve alarms Enables alarm retrieval on iMAP devices.
Display retrieved Info alarms Displays retrieved alarms with a severity of
“Info”.
Maximum alarms retrieved Number of retrieved alarms per device to
process and display. If this number is lower
than the number of retrieved alarms the
lowest severity alarms will be ignored.
3. Select the desired options, then click OK.
When you are done the following four files should be present in the directory:
• AT_Trap.forward
• trap.forwarder
• trap.filters
• trap.filtersOriginal
<TRAP-REDIRECTION
Dest_Addr="192.168.4.50"
Dest_Port="162"/>
</TRAP-FORWARDER>
3. Modify the Dest_Addr and Dest_Port lines to include the destination IP address and port for your implementation.
4. To forward traps to multiple destinations, add and modify additional <TRAP-REDIRECTION sections:
<TRAP-REDIRECTION
Dest_Addr="192.168.1.49"
Dest_Port="162"/>
<TRAP-REDIRECTION
Dest_Addr="192.168.1.179"
Dest_Port="162"/>
5. If necessary, modify Refresh_Time="10" to a different interval value. This is the interval, in seconds, that the NMS checks
the file for updates.
Note: If you set Refresh_Time="0", the NMS will only read the file when you start the NMS server. For the NMS to capture changes
while the NMS is running, the refresh time must be 1 or greater.
6. Save and close the file.
<FILTER
name="RedirectionTrapFilter"
classname="com.telesyn.nms.fault.server.traps.RedirectionTrapFilter"
enable="true"
GT="*"
ST="*"
enterprise="*"/>
<FILTER
name="RedirectionTrapFilterv2c"
classname="com.telesyn.nms.fault.server.traps.RedirectionTrapFilter"
enable="true"
trapoid="*"/>
4. Save and close the file.
The compiled MIB files reduce the loading time, leading to performance improvement. The applications and the applets have
the option of loading the MIB files directly or as compiled MIB files. The Load MIBs from compiled File option is provided in
the dialog box to decide whether to load MIB from compiled MIBs or not. By default, this option is enabled. If this is
unchecked, the user can directly load the MIB file as provided.
When Load MIBs from compiled File is selected, the Mib Browser tries to load the .cmi and .cds files, if they are present.
Otherwise, this parses the MIB file and writes the output in .cmi and .cds files, and then loads the MIB file. For example, for
the RFC1213-MIB the compiled MIB files are RFC1213-MIB.cmi and RFC1213-MIB.cds. The advantage of using this option is
that the MIB need not be parsed each time it is loaded, which reduces the load time.
To load the compiled MIBs, load the .cmi file alone. The .cmi file will have reference to the .cds files. The mib_file_name.cds
file should not be loaded directly.
Multi-var checkbox before doing a SNMP operation for multiple varbind SNMP request. Otherwise, it will do a request for
the OID in the Object Identifier field.
To do multiple-variable SNMP SET, ensure that the proper OIDs and values are given in the text fields before adding them to
the list. Check the Multi-Var check box before doing the multiple variable SET.
To delete the varbind(s) from the list select the varbind(s) from the list and click Delete to delete the varbind(s) from the list.
To edit the varbinds added in the list, select a varbind and click Edit. This shows an OID and the Value of the varbind in the
TextFields to edit the OID and the Value. Edit it and press OK button to modify the OID and the value or click Cancel to
restore the old values.
• To perform a GET operation, click the GET icon ( ) or select the Operations -> Get menu item. If the MIB node and
instance are specified, this gets all objects under the selected MIB object or the specific object.
• To perform a GETNEXT operation, click the GETNEXT icon ( ) or select the Operations -> GetNext menu item. If a
MIB node is specified, this gets the next object after the specified object or the specific object instance.
• To perform a GETBULK operation, click the GETBULKicon ( ) or select the Operations -> GetBulk menu item. This gets
a sequence of Next Objects immediately after the specified object. The number of Object instances returned is equal to
the Max-Repetitions field v2 & v3.
Note: Max Repetitions cannot exceed 200.
• To perform a SET operation, click the SET icon ( ) or select the Operations -> Set menu item. This enables setting the
value of the specified object, based on the value in the Set Value field. To do a SET for Octet String Type in hex format,
enter the bytes in hex format with each bytes separated by a colon and the entire string within single quotes. For
example, to give 0xff0a3212 enter 'ff:0a:32:12' in the SetValue field.
5. Right-click the table header, and then select the add a new row to the table option. This displays a window for entering the
values of the table.
6. Set the value for the column with RowStatus syntax to 4 for creating a new row, and then enter the values.
Note: If the RowStatus is not present in the table definition, then you can only modify the existing row by double-clicking the
corresponding cell in the table.
7. Click OK after entering all the values.
The Trap Viewer can filter incoming trap according to certain criteria called the Parser Criteria. The Trap Viewer shows only
those traps that matches the Trap Criteria. The rest are dropped and is not shown to the user. The Criteria can be
configured using the Trap Parser Editor.
• Enterprise OID - The enterprise field is the SNMP enterprise identifier in the trap, which is used to uniquely identify traps
for a particular application. The parser is applied only when the trap enterprise field starts with the enterprise field you
specify. The only exception is that when the enterprise field is left blank, the trap is allowed to be parsed.
• OID and Value - This extends the match criteria. There must be a match for all the OID:Value pairs (specified in the list
box) in the Trap PDU of the receiving trap.
• Agent and Port - This also extends the match criteria. The trap must be sent by an Agent specified in the Agent:Port list
box. If the Port is 0, then the source can send the trap from any port.
For each match criterion, a name is given called the Trap Name. The fields in the event details are configured in the Output
Event Parameters section. Once the Trap is matched by the match criteria, the trap is added to the Trap Table. The Output
Event parameters are shown as the Trap Details, which gives more specific information regarding the trap.
By default, some of the field of the Output Event parameters are filled by a variable called parser variables, usually starting
with $. These variables substitute a specific characteristic of the parser in the Trap Details.
Values for field are:
• $Community - This token is replaced by the community string of the received trap.
• $Source - This token is replaced by the source name/address of the received trap.
• $Enterprise - This token is replaced by the enterprise ID of the received trap.
• $Agent - This token is replaced by the agent address of the received trap.
• $SpecificType - This token is replaced by the specific type of the received trap.
• $GenericType - This token is replaced by the generic type of the received trap.
• $Uptime - This token is replaced by the uptime value in the received trap.
• $* - This token is replaced by all the variable bindings of the received trap, including the OID and the variable values of
each variable binding.
• $# - This token is replaced by all the SNMP variable values in the variable bindings of the received trap.
• $N - This token is replaced by the (N-1) SNMP variable value in the variable bindings of the received trap.
• @* - This token is replaced by all the OID values in the variable bindings of the received trap.
• @N - This token is replaced by the (N-1) OID value in the variable bindings of the received trap.
• Oid - .1.3.6.1.2.1.1.1.0
• Value - xyz
• Agent - 192.168.1.1
• Port - 4001
The TrapParser gets trap from any trap originator and parses the trap event.
28.9 Graphs
The MIB Browser enables a real-time plotting of SNMP data on a graph. Currently, two types of graph are supported: line
graph and bar graph. The SNMP data to be polled should be of integer or unsigned integer data type. Typically, the values
that are plotted are of type Counter, Gauge, or Timeticks.
The steps listed below should be followed for plotting the SNMP data in the graph:
1. Ensure the appropriate MIBs have been loaded.
2. Specify the proper agent host name or IP address in the host field of the Mib Browser.
3. Specify a valid variable. The variable needs to be an integer or unsigned integer (Counter, Gauge or Timeticks). The
variable can be chosen by browsing the MIB in the MibTree.
After selecting the variable from the MibTree, click the GRAPH icon or select the menu item Line Graph or Bar Graph from
the View menu. This brings an automatically updated graph, showing the results of periodically polling the specified agent for
the specified OID. By default, polling for the graph is done every 5 seconds.
The following options can be configured for the graph:
• Polling Interval - Default value is 5 seconds: editable, can be given any value.
• Average over Interval - By default, the graph shows the actual values of a variable for different hosts. In other words, the
values of the specified OID are plotted for different hosts for the given polling interval. This option is used to take the
average of the values at a given polling interval for plotting the graph.
• X axis scale - Allows to set the X axis scale; the minimum is 300 secs.
• Show Absolute Time - If selected, it shows the time in hrs:secs otherwise in seconds.
• Max X value - Allows to set the maximum time the graph can plot. The default maximum value is 3600 secs.
• Show Polled Values - If selected, it shows all the polled values in a particular time period. By default, it is disabled.
• Log File Name - The filename for the log file can be set here. By default, the log filename is graph.txt. If Log Polled Values
is selected, all the polled values are logged in this file. This option is not enabled when the MibBrowser runs as an applet
because of security restrictions.
• Log Polled Values - If selected, it logs the polled values. By default, it is disabled.
• Show absolute counters - To enable the plotting of the absolute value. By default, the graph plots only the difference
between the two values.
• The Stop button can be used to stop the polling of the variable. The Restart button can be used to restart the polling.
The Close button is used to close the graph window.
The Mib Browser can plot multiple graphs showing values for different variables from different hosts.
28.10 CWMP
The CPE WAN Management Protocol (CWMP) is a messaging protocol designed for communication between the CPE
devices and the management system. Specifications for this protocol are written by The Broadband Forum (formally DSL
Forum) in technical reports. The TR-069 specification defines the messaging format based on XML for communicating using
CWMP.
Previously, the discovery process and all NMS-supported operations used CLI or SNMP to communicate with the devices.
Now TR-069 operations can be performed on Comtrend CPEs and AT-iMG devices. Although not all operations are
implemented, there is a generic TR-069 client application implemented that can be used to execute any of the operations
described in the TR-069 specification.
To access this tool, select Tools > CWMP Browser. Refer to the following figure.
Once you have filled in the map properties, click More, and the UI shown in the following figure will pop up. In this UI, you
can specify a Managed Object and the criteria that will filter what will appear in the map. Note that the match criteria can
only be the properties of the managed object.
Caution: The property name on the left is case-sensitive. Property names usually have medial capitalization (“camel-case”), for
example ipAddress. If you enter the case incorrectly, no criteria will be used, and the new map will contain all managed
objects in your network. For the correct property name to use, refer to the tables in Section "Managed Object Properties and
Custom Views" on page 1063.
Note: The property value on the right may contain the wildcard character “*”, and may contain comma separated values, for
example “10.1.1.*, 10.1.2.*”. For more information, refer to Section "Matching Criteria" on page 1059.
To create a custom view, you first define the criteria for the view, and then specify how to view the filtered data. The
options for custom views are as follows:
• Add/Modify the Custom View
When creating a custom view, the user fills out a Specify Event Filter Criteria form, which contains Properties and Tree
Node Properties. Once created, the view can be seen in the node tree on the left. The user can then select the view and
modify the criteria if need.
• Remove Custom View
The user can select the view in the NMS Tree and choose Remove Custom View from the either the Panel-Specific Menu
Bar or from the pop-up menu accessed by a right clicking the view in the tree. This option will remove the view form the
tree.
• Save Custom View Data
After sorting and selecting a range of items, the user can save that specified list by selecting Save Custom View State from
the either the Panel-Specific Menu Bar or from the pop-up menu accessed by a right clicking the view in the tree.
Object Reference
Network "Networks" on
page 1063
Device (Node) "Devices (Nodes
and Routers)" on
page 1065
Customer Port "Customer
Ports" on page
1068
IP Interface (IP) "Interfaces (IP)"
on page 1069
Profile "Profiles " on
page 1071
Vlan Interface (VIF) "VLAN
Interfaces " on
page 1072
Physical Links "Physical Links"
on page 1074
PMs "Performance
Monitoring" on
page 1075
Events "Events" on page
1077
Object Reference
Alerts "Alarms" on
page 1080
Links "Adding Links to
Existing Custom
Physical Map" on
page 1083
• The time to filter may vary, depending on the total number of objects, the complexity of the filter criteria, and the mode
of storage.
• Custom Views, once created, continue to be updated and navigable for additions/deletions till the client is closed or the
custom view is removed using Remove Custom Views option.
Note: Use the Custom Views with caution and remove the unnecessary ones. This allows quicker updates and clearing of resources
associated with each Custom View, both on the client and server side.
Note: If all the above parameters (except filter view name) are left blank, then the default value all is assigned. For Date/Time
properties by default will show the current date and time, requires data in the order of month, date, year, hour, minute,
second and AM / PM which can be chosen by using the up and down arrows.
In the properties form, you can also click Select Props to View, which opens a window with the default properties to be
shown in the selected table (as shown in the following figure).
29.2.3 Default User Properties Added by the NMS and Custom Views
To view information for the devices, user properties have been added to the tree node tables that show relevant
information. When the NMS is first configured, they are grouped as follows:
• Alarms – sysLocation
• Network – discover
• Nodes - SerialNumber
• Ports – customerID, ethIfIndex, portType, deviceID, adslIfIndex, slotID, portID
• VLAN Interface – parentkey, vlanparentnetwork, valnuntaggedports, vlantype, vlaninterfacevid, vlantaggedports
• Physical Links – Snode, DNode, DPort, SPort
These properties show up by default when the NMS is first configured, and the user can change the displayed column name if
desired, in either the default view or a Custom view.
Caution: Although in the default View or Custom View these properties can be made not to display, the user should not do this since
these properties were created to provide relevant information about a component. For example, for Physical links, the DPort
property (Destination Port) would need to be shown to understand the configuration. These properties are therefore useful
when creating custom views. However, even if a property is not displayed, a criteria can be set for the view based on that
property.
MO Form Property
(Label) Description for Tree Node Properties
Frame Title The information to be displayed on the title bar of the Custom View's internal frame is
specified here.
Menu File Name The panel-specific menu's file name is given here. If you have not specified this then the
default menu is displayed.
Icon File The icon to indicate the custom view is taken from this property. This icon is visible in the
tree as well as in the title bar of the internal frame.
Table Popup Menu The menu filename for displaying a contextual menu for the objects displayed in the table of
the newly added custom view.
MO Form Property
(Label) Description for Tree Node Properties
Tree Popup Menu The menu filename for displaying a contextual menu for the newly added custom view node
in the client tree.
Node Index The position of the this new custom view in the node tree when this view is added as a child
to an existing view that already has one or more child nodes. If the value is not entered, then
the custom view is appended.
29.3.1 Networks
29.3.1.1 Properties
The following table lists the properties for a network node. All the properties can be viewed by using the Next and Back
button at the bottom of the form.
Custom View
MO Form Property (input Examples for Custom
Property Description for Network Objects this text) Views
Name The device name, which is a unique name that name 172.16.33.0
is used as the key in the database. This name Note: The name for a
cannot be changed. device should not include
an ‘&’ or Rediscovery will
fail.
DisplayName The name by which the device is identified on displayName Site_A
the Graphical User Interface (GUI).This is (This would assume the
intended to be more intuitive regarding the network was contained in
identification of the network, whereas the Site_A)
name can be any string with the only constraint
being that it is unique.
Custom View
MO Form Property (input Examples for Custom
Property Description for Network Objects this text) Views
Type The type of the object, such as whether it is a type Network
network, node, or an interface object, or (In a network view, this
something user specified, like router, switch, would be the default, in
etc. other views this would set
the criteria as showing only
networks)
Managed A checkbox that indicates whether the managed true (rather than a
managed object is managed by the NMS. checkbox)
When checked, the object is being managed by
the NMS. Otherwise, it is not.
IpAddress The IP address assigned to the object. ipAddress 172.16.33.0
(This would be for the
network)
InterfaceList The interfaces contained within the network. In InterfaceList 172.16.33.20 172.16.33.21
the Properties form this is a drop down list. The value all would select
all nodes.
NodeList The devices contained within the network. In NodeList 172.16.33.20 172.16.33.21
the Properties form this is a drop down list. The value all would select
all nodes. The DNS name
can also be used.
DiscoveryStatus The current status of the discovery process. DiscoveryStatus 2
The possible values are as follows:
1 = YET_TO_BEGIN - Discovery of network
yet to begin.
2 = IN_PROGRESS - Discovery if network is
in progress.
3 = FINISHED - Discovery of the network is
finished.
4 = DISCOVERY_DISABLED - Takes this
value if either discover is 'false' or managed is
'false' for this network.
StatusPollEnabled A boolean that indicates whether the object DiscoveryStatus
status polling has been enabled for the object.
It is set to true if status polling is enabled for
the object, false otherwise.
Tester The type of testing to run when checking the DiscoveryStatus
status of the device.
(More...) subNets 172.16.33.20 172.16.33.21
(The value all would select
all nodes.)
(More...) stringstatus Critical Major Minor Clear
(separated by comma when
choose more than one)
1. Select the Network node in the Inventory view and right-click Custom View -> Add Custom View.
2. In the Filter View Name field, type Network_Alarm
3. Click Next to access the Additional Criteria, and type in status and Critical,Major, as follows.
4. Click on OK, and a network_alarm view is formed that shows only networks with a critical or major alarm. Refer to the
following figure.
29.3.2.1 Properties
The following table lists the managed object properties for Node devices. All the properties can be viewed by using the Next
and Back button at the bottom of the form.
Note: The classname for Nodes is !RgMO (not RG devices) and this should not be changed..
4. Click on OK, and a iMAP_devices view is formed that shows only Allied Telesis Map devices, as follows.
29.3.3.1 Properties
The following table lists the properties for customer ports. All the properties can be viewed by using the Next and Back
button at the bottom of the form.
4. Click on OK, and a Ports_adsl view is formed that shows only adsl ports, as follows.
29.3.4.1 Properties
The following table lists the properties for interfaces. All the properties can be viewed by using the Next and Back button at
the bottom of the form.
4. Click on OK, and an Interfaces_255_255_255_0 view is formed that shows only interfaces with the 255.155.155.0 mask,
as follows.
29.3.5 Profiles
29.3.5.1 Properties
The following table lists the properties for profiles. All the properties can be viewed by using the Next and Back button at
the bottom of the form.
Custom Map
MO Form View Property
Property Description for Profiles (input this text) Example
name The name for each type of profile is a default and name Profile_POTS_test
the name given by the user. Default names are:
Profile_POTS
Profile_Etherlike_Port
Profile_ADSL
Profile_Rapier_Device
Profile_Telesyn_Device
Profile_SwitchBlade_Device
type type of object. This is always Profile. type Profile
(More...) profileName Test_Profile
(More...) profileType Profile
29.3.6.1 Properties
The following table lists the properties for VLAN interfaces. All the properties can be viewed by using the Next and Back
button at the bottom of the form.
Custom Map
MO Form View Property
Property Description for Interfaces (input this text) Example
DisplayName The name by which the device is identified on the displayName Default_VLAN
GUI.This is intended to be more intuitive regarding
the identification of the device, whereas the name
can be any string with the only constraint being that
it is unique.
Name The VIF name, which is a unique name that is used name vlan999
as the key in the database.
pollInterval The polling interval in seconds, which is the time pollInterval 300
gap between two successive status pollings of
managed objects.
stringstatus The status of the VLAN interface stringstatus Critical Major
Minor Warning
Clear Unknown
(separated by
comma when
choose more than
one)
type The type of the object, such as whether it is a type VlanInterface
network, node, or an interface object, or something (Default)
user specified, like router, switch, etc.
vlanepsrtype vlanepsrtype Master
Transit
Data (All others)
vlangrouplist The domain name for the vlan group, usually vlangrouplist dom1,dom2
associated with an EPSR configuration
vlaninterfacevid The VLAN ID associated with a Vlan interface. It vlaninterfacevid 500
is always set. The range: 1-4096.
vlantaggedports A compact list of tagged ports on a VlanInterface. vlantaggedports 11.1-9,12.1 -
The list will be empty if none exist. None
The format is card.port delimited by commas. (no ports are
tagged)
Vlan Type The type of VLAN (VLAN or HVLAN) vlantype VLAN
HVLAN
UnTagged Ports A compact list of untagged ports on a VLAN vlanuntaggedport 11.1-9,12.1 -
interface. The list will be empty if none exist. s None
(no ports are
tagged)
1. Select the VLAN Interfaces in the Inventory view and right-click Custom View -> Add Custom View.
2. In the Filter View Name field, type VLAN_500.
3. Click Next to access the Additional Criteria, and type in vlaninterfacevid and 500, as follows.
4. Click on OK, and a VLAN_500 view is formed that shows only interfaces with the 255.155.155.0 mask, as follows.
29.3.7.1 Properties
The following table lists the properties for physical links. All the properties can be viewed by using the Next and Back button
at the bottom of the form.
4. Click on OK, and a Links_172_16_33_1 view is formed that shows only interfaces with the 255.155.155.0 mask, as
follows.
29.3.8.1 Properties
A complete list of the object properties for a polling object is in the AlliedView NMS Administration Guide. The following
table lists the properties that are used when creating a custom map view.
29.3.9 Events
29.3.9.1 Properties
You can set the match criteria by using the Specify Event Filter Criteria form. This form can be accessed by selecting Custom
Views -> Add Custom Views from the Panel-Specific Menu Bar. Refer to the following figure.
Custom View
Property Name
MO Form Property Description for Match Properties (input this text) Example
Severity The severity of the object. Severity is a severity Major (if multiple,
property in the event object that indicates the separate with
criticality of the event. The severity of the commas)
event to be filtered can be assigned using the
combo box. Multiple severities can also be
assigned by separating them using a comma.
Category A value that can help in useful categorization category Port
of the alarm. (Port has been
Note that the default is !SYSLOG-*, since affected)
the SYSLOG events are listed in the System
Log Events leaf node.
Custom View
Property Name
MO Form Property Description for Match Properties (input this text) Example
Failed Object Information about the specific entity within entity ADSL_172.16.33.
the source of the event, which is primarily 19;adslAtucUASL
responsible for the occurrence of this alarm. _Port0.15
The name of the failure object to be filtered (Separated with
can be given in this field. semicolons, these
are objects affected
by the alarm)
customerID The Customer ID assigned when customerID 746*
provisioning for triple-play
4. Click on OK, and a view is formed that shows only events associated with customer IDs that include 626, as follows.
(Click on each event for details.)
29.3.10 Alarms
29.3.10.1 Properties
The following table lists the properties for Alarms and the ones used for setting up criteria for custom alarm views.
Property for
MO Form Custom View (input
Property Description for Criteria - Alarms this text) Example
Severity The level of the alarm. The severity of the severity Critical Major Minor
alarm to be filtered can be assigned using the Warning Clear
combo box. Multiple severities can also be (separated by comma
assigned by separating them using a comma. when choose more than
one)
Previous severity The match criteria based on the previous previousSeverity Critical Major Minor
severity of the alarm. Warning Clear
(separated by comma
when choose more than
one
Owner The name of the owner of the alarm. owner Paul
Category The category for the alarm. category Telesyn
(for MAP devices)
Message Any additional information. To use, fill the message Unavailable seconds-line
message in and alarms with the 15-minute threshold
corresponding message are displayed.
Failure object Information about the specific entity, within entity ADSL_172.16.33.19;adslA
the source of the alarm, which is primarily tucUASL_Port0.15
responsible for the alarm. When filled in, it (Separated with
provides a filter. semicolons, these are
objects affected by the
alarm)
Source Information about the source of the alarm. source 172.16.33.19
When filled in, it provides a filter.
From Date/Time The date and time after which alarms that are Form has GUI
(modified) modified are displayed.
Format is month, date, year, hour, minute,
second and AM / PM
To Date/Time The date and time before which alarms that Form has GUI
(modified) are modified are displayed.
Format is month, date, year, hour, minute,
second and AM / PM
From Date/Time The date and time after which alarms that are Form has GUI
(Created) generated are displayed.
Format is month, date, year, hour, minute,
second and AM / PM
Property for
MO Form Custom View (input
Property Description for Criteria - Alarms this text) Example
To Date/Time The date and time before which alarms that Form has GUI
(created) are generated are displayed.
Format is month, date, year, hour, minute,
second and AM / PM
Alarm Age The age of the alarm for filtering purposes. Form has GUI
(modified time) The age of an alarm is the time lapsed since
the last modification of the alarm in the NMS
system. The alarm age property can be age in
min, age in hrs, age in days, today, yesterday
and so on.
id The id number given to the alarm id 41931
(More...) notes Unavailable seconds-line
15-minute threshold
(More...) priority 0
(More...) sysLocation see "Example of Custom
Alarm Filter (Alarms by
Location)" on page 1081.
a single Custom Map. Specifically, if the devices RAL1, RAL2, …, RAL30 are to be put on a single Custom Map, then use the
criteria “name=RAL*” for that map.
If not using DNS, then the names will look like IP addresses, and a subnet map can be matched by a pattern like
“name=172.16.33.*”.
You can also use “type” to separate-off by device type (e.g., 9700, 9400, 9*, …).
The classname should be CLISNMPNodeMO to pick up iMAP devices only; otherwise many Port objects can appear on the
custom map.
To create a custom map that looks like the Physical Map and also has links, do the following:
1. Custom Views-> Add New Map
2. Set topology to
“grid(isActualIconSize=true;gapX=20;gapY=20;cellWidth=100;cellHeight=100;scroll=vertical),star,ring,flow”
3. Set mapSymbolRenderer="com.adventnet.nms.mapui.ATIMapSymbolRendererImpl_3"
4. Add criteria by selecting "more" at the bottom of the window.
• Only use the following criteria names if Links are to be added later:
- name (e.g. name = 172.16.33.*)
- classname (e.g. classname = CLISNMPNodeMO)
- type (e.g. type = 9700)
Note: These can be updated to also include linksets, which is what the Add Links operation will do.
• The map will be created looking like the Physical Map but the background is gray (instead of white) and no links will
show. (To update the background, double-click the background and in the Map Properties tab add an ImageName.)
5. While the custom map is active, select the View -> Add Links to Map and the map will now have link lines drawn.
6. Refer to the following figures.
Note: The system Physical Map and custom Physical Map have the same features and interact; When new links are created or old
links deleted on the system Physical Map they will now be automatically updated on the Custom map, and vise versa.
Data displayed in tabular form in the AlliedView NMS can be exported to a file on the NMS server or to your Web browser
for viewing. Tabular data appears in the following views:
• Fault Management
• Performance
• Network Inventory
The procedure for exporting tabular data is the same for all of these views.
Note: The one exception is the Performance view; this is explained separately, in "Exporting Performance Data" on page 1089.
To demonstrate the procedure, the data in the Alarms subview will be exported in this section. The Alarms subview is
shown in the following figure.
Note: Click Fewer to remove the last qualifier that you added.
3. Click OK to export the data. A confirmation dialog box will appear indicating that the data export was successful. Click
OK in the confirmation dialog box.
The following figure shows an example of how to export all major alarms on device to file alarms_major using the percent
sign (%) as the data separator. The resulting data file is described in "Viewing a Data Export File" on page 1092.
Following is a complete example of a dhcpd file, with comments highlighted. There are five files, since DHCP-related
configurations for each Access Island are placed in separate configuration files.
31.1 dhcpd.conf
# dhcpd.conf for Service Provider Solutions Interop (SPSI) lab
# Jul-12-08 JWS: removed subnets AI01, L2Supp, YKTA
# Jul-8-10 JWS: added subnets spsi-ai00-awplus
log-facility local7;
######################################################################
# In addition to setting this value, you may need to modify your
# syslog.conf file to configure logging of the DHCP server.
# For example, you might add a line like this:
# local7.* /val/log/dhcpd.log
# local7.info @10.52.110.4
######################################################################
server-name "dhcp1";
server-identifier dhcp1.spsi.lab.telesyn.corp;
authoritative;
ddns-update-style interim;
#option domain-name-servers 166.163.129.19,166.163.128.15,166.163.128.5;
default-lease-time 86400;
max-lease-time 86400;
# To identify the network that this machine is physically on.
#subnet 10.52.110.32 netmask 255.255.255.240 {
subnet 10.52.201.0 netmask 255.255.255.0 {
}
if exists agent.circuit-id
{
if ((substring(option vendor-class-identifier,0,8)="iMG646PX") or (substring(option vendor-class-identifier,0,9)="iMG646MOD"))
{
log (info, concat(
" PX INCOMING> ",binary-to-ascii(10, 8, ".", leased-address),
" MAC: ",binary-to-ascii(16,8,":",hardware),
" offered to iMAP: ",(option agent.remote-id),
" INTERFACE: ",binary-to-ascii(10, 8, ".", substring(option agent.circuit-id, 0, 3)),
", VLAN: ",binary-to-ascii(10, 16, "", substring(option agent.circuit-id, 3, 2))
));
}
else
{
log (info, concat(
" INCOMING> ",binary-to-ascii(10, 8, ".", leased-address),
" MAC: ",binary-to-ascii(16,8,":",hardware),
" offered to iMAP: ",(option agent.remote-id),
" INTERFACE: ",binary-to-ascii(10, 8, ".", substring(option agent.circuit-id, 0, 2)),
", VLAN: ",binary-to-ascii(10, 16, "", substring(option agent.circuit-id, 2, 2))
));
}
}
on commit
{
if ((substring(option vendor-class-identifier,0,8)="iMG646PX") or (substring(option vendor-class-identifier,0,9)="iMG646MOD"))
{
log (info, concat(
" LEASE ACK>> ",binary-to-ascii(10, 8, ".", leased-address),
" MAC: ",binary-to-ascii(16,8,":",hardware),
" linked & associated to iMAP: ",(option agent.remote-id),
" INTERFACE: ",binary-to-ascii(10, 8, ".", substring(option agent.circuit-id, 0, 3)),
", VLAN: ",binary-to-ascii(10, 16, "", substring(option agent.circuit-id, 3, 2))
));
}
else
{
log (info, concat(
" LEASE ACK>> ",binary-to-ascii(10, 8, ".", leased-address),
" MAC: ",binary-to-ascii(16,8,":",hardware),
" linked & associated to iMAP: ",(option agent.remote-id),
" INTERFACE: ",binary-to-ascii(10, 8, ".", substring(option agent.circuit-id, 0, 2)),
", VLAN: ",binary-to-ascii(10, 16, "", substring(option agent.circuit-id, 2, 2))
));
}
}
on expiry
{
if ((substring(option vendor-class-identifier,0,8)="iMG646PX") or (substring(option vendor-class-identifier,0,9)="iMG646MOD"))
{
log (info, concat(
" LEASE EXPIRE>> ",binary-to-ascii(10, 8, ".", leased-address),
" MAC: ",binary-to-ascii(16,8,":",hardware),
" associated to iMAP: ",(option agent.remote-id),
" INTERFACE: ",binary-to-ascii(10, 8, ".", substring(option agent.circuit-id, 0, 2)),
", VLAN: ",binary-to-ascii(10, 16, "", substring(option agent.circuit-id, 2, 2))
));
}
else
{
log (info, concat(
" LEASE EXPIRE>> ",binary-to-ascii(10, 8, ".", leased-address),
" MAC: ",binary-to-ascii(16,8,":",hardware),
" associated to iMAP: ",(option agent.remote-id),
" INTERFACE: ",binary-to-ascii(10, 8, ".", substring(option agent.circuit-id, 0, 2)),
", VLAN: ",binary-to-ascii(10, 16, "", substring(option agent.circuit-id, 2, 2))
));
}
}
on release
{
if ((substring(option vendor-class-identifier,0,8)="iMG646PX") or (substring(option vendor-class-identifier,0,9)="iMG646MOD"))
{
log (info, concat(
" RELEASE> ",binary-to-ascii(10, 8, ".", leased-address),
" MAC: ",binary-to-ascii(16,8,":",hardware),
" released on iMAP: ",(option agent.remote-id),
" INTERFACE: ",binary-to-ascii(10, 8, ".", substring(option agent.circuit-id, 0, 2)),
" VLAN: ",binary-to-ascii(10, 16, "", substring(option agent.circuit-id, 2, 2))
));
}
else
{
log (info, concat(
" RELEASE> ",binary-to-ascii(10, 8, ".", leased-address),
" MAC: ",binary-to-ascii(16,8,":",hardware),
" released on iMAP: ",(option agent.remote-id),
" INTERFACE: ",binary-to-ascii(10, 8, ".", substring(option agent.circuit-id, 0, 2)),
", VLAN: ",binary-to-ascii(10, 16, "", substring(option agent.circuit-id, 2, 2))
));
}
}
######################################################################
######################################################################
class "SPSI-AI00-RG613TXMgmt" {
class "SPSI-AI00-RG624AMgmt" {
class "SPSI-AI00-RG634AMgmt" {
class "SPSI-AI00-iMG606BDMgmt" {
class "SPSI-AI00-iMG606BD-R2Mgmt" {
class "SPSI-AI00-iMG613RFMgmt" {
class "SPSI-AI00-iMG616BDMgmt" {
class "SPSI-AI00-iMG616BD-R2Mgmt" {
class "SPSI-AI00-iMG616WMgmt" {
class "SPSI-AI00-iMG624AMgmt" {
class "SPSI-AI00-iMG624A-R2Mgmt" {
class "SPSI-AI00-iMG634AMgmt" {
class "SPSI-AI00-iMG634A-R2Mgmt" {
class "SPSI-AI00-iMG634WAMgmt" {
class "SPSI-AI00-iMG646BDMgmt" {
class "SPSI-AI00-iMG646BD-ONMgmt" {
class "SPSI-AI00-iMG626MODMgmt" {
class "SPSI-AI00-iMG646MODMgmt" {
class "SPSI-AI00-iMG646PX-ONMgmt" {
class "SPSI-AI00-iMG726BD-ONMgmt" {
class "SPSI-AI00-iMG726MODMgmt" {
class "SPSI-AI00-iMG746MODMgmt" {
class "SPSI-AI00-iBG915FXMgmt" {
class "SPSI-AI00-iMG1505Mgmt" {
class "SPSI-AI00-iMG1525Mgmt" {
class "SPSI-AI00-iMG2504Mgmt" {
class "SPSI-AI00-iMG2524Mgmt" {
class "SPSI-AI00-ComtrendMgmt"
{
match if
(substring
(option agent.remote-id,0,9)
="SPSI-AI00")
and
(substring
(option agent.circuit-id,2,2)
="\x01\x2c")
and
(substring
(option vendor-class-identifier,0,5)
="uDHCP")
;
# option bootfile-name "10.52.201.4";
}
class "SPSI-AI00-RG613TXBoot" {
filename "FIBER/AI00/RG613TX";
class "SPSI-AI00-RG624ABoot" {
filename "ADSL/AI00/RG600A";
class "SPSI-AI00-RG634ABoot" {
filename "ADSL/AI00/RG600A";
class "SPSI-AI00-iMG606BDBoot" {
filename "FIBER/AI00/IMG6XX";
class "SPSI-AI00-iMG606BD-R2Boot" {
filename "FIBER/AI00/IMG606BD-R2";
class "SPSI-AI00-iMG613RFBoot" {
filename "FIBER/AI00/IMG600";
class "SPSI-AI00-iMG616BDBoot" {
filename "FIBER/AI00/IMG616";
class "SPSI-AI00-iMG616BD-R2Boot" {
filename "FIBER/AI00/IMG616BD-R2";
class "SPSI-AI00-iMG616WBoot" {
filename "FIBER/AI00/IMG616W";
class "SPSI-AI00-iMG624ABoot" {
filename "ADSL/AI00/IMG624A";
class "SPSI-AI00-iMG624A-R2Boot" {
filename "ADSL/AI00/iMG624A-R2";
class "SPSI-AI00-iMG634ABoot" {
filename "ADSL/AI00/IMG634A";
class "SPSI-AI00-iMG634A-R2Boot" {
filename "ADSL/AI00/IMG634A-R2";
class "SPSI-AI00-iMG634WABoot" {
filename "ADSL/AI00/IMG634WA";
class "SPSI-AI00-iMG646BDBoot" {
filename "FIBER/AI00/IMG6XX";
class "SPSI-AI00-iMG646BD-ONBoot" {
filename "FIBER/AI00/IMG6XX";
class "SPSI-AI00-iMG626MODBoot" {
filename "FIBER/AI00/IMG626MOD";
class "SPSI-AI00-iMG646MODBoot" {
filename "FIBER/AI00/IMG646MOD";
class "SPSI-AI00-iMG646PX-ONBoot" {
filename "FIBER/AI00/IMG6XX";
class "SPSI-AI00-iMG726BD-ONBoot" {
filename "FIBER/AI00/IMG726BD-ON";
class "SPSI-AI00-iMG726MODBoot" {
filename "FIBER/AI00/IMG726MOD";
class "SPSI-AI00-iMG746MODBoot" {
filename "FIBER/AI00/IMG746MOD";
class "SPSI-AI00-iBG915FXBoot" {
filename "FIBER/AI00/IBG915FX";
class "SPSI-AI00-iMG1505Boot" {
filename "FIBER/AI00/IMG1505";
class "SPSI-AI00-iMG1525Boot" {
filename "FIBER/AI00/IMG1525";
class "SPSI-AI00-iMG2504Boot" {
filename "FIBER/AI00/IMG2504";
class "SPSI-AI00-iMG2524Boot" {
filename "FIBER/AI00/iMG2524";
class "SPSI-AI00-VoIP" {
match if (
(substring(option vendor-class-identifier,0,8)="iMG646BD")
or
(substring(option vendor-class-identifier,0,2)="RG")
or
(substring(option vendor-class-identifier,0,8)="iMG613RF")
or
(substring(option vendor-class-identifier,0,8)="iMG616BD")
or
(substring(option vendor-class-identifier,0,11)="iMG616BD-R2")
or
(substring(option vendor-class-identifier,0,8)="iMG616W")
or
(substring(option vendor-class-identifier,0,7)="iMG634A")
or
(substring(option vendor-class-identifier,0,8)="iMG634WA")
or
(substring(option vendor-class-identifier,0,8)="iMG646PX")
or
(substring(option vendor-class-identifier,0,9)="iMG626MOD")
or
(substring(option vendor-class-identifier,0,9)="iMG646MOD")
or
(substring(option vendor-class-identifier,0,11)="iMG726BD-ON")
or
(substring(option vendor-class-identifier,0,9)="iMG726MOD")
or
(substring(option vendor-class-identifier,0,9)="iMG746MOD")
or
(substring(option vendor-class-identifier,0,8)="iBG915FX")
or
(substring(option vendor-class-identifier,0,7)="iMG1525")
or
(substring(option vendor-class-identifier,0,7)="iMG2524")
);
class "SPSI-AI00-Video" {
match if (
(
(substring (option agent.remote-id,0,9)="SPSI-AI00") and
(
(substring(option vendor-class-identifier,0,11)="iMG606BD-R2") or
(substring(option vendor-class-identifier,0,11)="iMG616BD-R2") or
(substring(option vendor-class-identifier,0,11)="iMG726BD-ON") or
(substring(option vendor-class-identifier,0,7)="iMG1505") or
(substring(option vendor-class-identifier,0,7)="iMG1525") or
(substring(option vendor-class-identifier,0,7)="iMG2504") or
(substring(option vendor-class-identifier,0,7)="iMG2524")
)
)
or
(
(substring (option agent.remote-id,0,9)="SPSI-AI00") and
(
(substring(option vendor-class-identifier,0,9)="iMG726MOD") or
(substring(option vendor-class-identifier,0,9)="iMG746MOD")
)
)
);
}
class "SPSI-AI00-Internet" {
match if (
(substring(option agent.circuit-id,2,2)="\x02\x58")
or
(substring(option agent.circuit-id,3,2)="\x02\x58")
);
lease limit 5;
31.2.2 spsi-ai00-awplus-class
# spsi-ai00-awplus-class for Service Provider Solutions Interop (SPSI) lab Access Island 0,
# AlliedWare Plus access ports for provisioning 3play iMGs
# Jul-7-10 JWS: copied from spsi-ai00-class, modified for AW+
# Jul-23-10 JWS: changed for aw+ dhcp snooping
# Apr-3-12 JWS: added img1505
######################################################################
######################################################################
class "SPSI-AI00-AWPLUS-iMG646MODBoot" {
match if ((option agent.circuit-id="vlan201") or (substring(option agent.circuit-id,2,2)="\x00\xc9"))
and (option vendor-class-identifier = "iMG646MOD");
filename "FIBER/AWPLUS/IMG646MOD";
option tftp-server-name "10.52.201.4";
option vendor-class-identifier "iMG646MOD";
}
class "SPSI-AI00-AWPLUS-iMG746MODBoot" {
match if (option agent.circuit-id="vlan201") and (option vendor-class-identifier = "iMG746MOD");
filename "FIBER/AWPLUS/IMG746MOD";
option tftp-server-name "10.52.201.4";
option vendor-class-identifier "iMG746MOD";
}
class "SPSI-AI00-AWPLUS-iMG1505Boot" {
match if (option agent.circuit-id="vlan201") and (option vendor-class-identifier = "iMG1505");
filename "FIBER/AWPLUS/IMG1505";
option tftp-server-name "10.52.201.4";
option vendor-class-identifier "iMG1505";
}
class "SPSI-AI00-AWPLUS-iMG646MODMgmt" {
match if ((option agent.circuit-id="vlan301") or (substring(option agent.circuit-id,2,2)="\x01\x2d"))
and (option vendor-class-identifier = "iMG646MOD");
option vendor-class-identifier "iMG646MOD";
# For TFTP discovery method
# option bootfile-name "10.52.201.4";
}
class "SPSI-AI00-AWPLUS-iMG746MODMgmt" {
match if (option agent.circuit-id="vlan301") and (option vendor-class-identifier = "iMG746MOD");
option vendor-class-identifier "iMG746MOD";
}
class "SPSI-AI00-AWPLUS-iMG1505Mgmt" {
match if (option agent.circuit-id="vlan301") and (option vendor-class-identifier = "iMG1505");
option vendor-class-identifier "iMG1505";
}
class "SPSI-AI00-AWPLUS-VoIP" {
match if ((option agent.circuit-id="vlan401") or (substring(option agent.circuit-id,2,2)="\x01\x91"))
and ((option vendor-class-identifier = "iMG646MOD")
or (option vendor-class-identifier = "iMG746MOD"));
}
class "SPSI-AI00-AWPLUS-Internet" {
match if ((option agent.circuit-id="vlan601") or (substring(option agent.circuit-id,2,2)="\x02\x59"));
}
31.2.3 spsi-ai00-subnet
# spsi-ai00-subnet for Service Provider Solutions Interop (SPSI) lab Access Island 0
# Jul-15-08 JWS: modified for migration of nms server ip from 10.52.110.4 to 10.52.201.4
# Aug-11-08 JWS: modified for migration of dns domain from stelar.net to spsi.lab.telesyn.corp
# Feb-12-09 JWS: modified to add iMG613RF, iMG616BD
# Feb-13-09 JWS: modified to add iMG606BD
# Mar-31-09 JWS: modified to add iMG726MOD, iMG746MOD
# Jul-22-09 JWS: modified to add iMG616W
# Aug-7-09 JWS: modified to add domain server option in inet pool
# Oct-9-09 JWS: modified for iMG624A-R2
# Oct-22-09 JWS: modified for Comtrend NexusLink 5631 ADSL bonded CPE
# Feb-12-10 JWS: modified to completely add iMG634WA
# Sep-14-10 JWS: added dns options to rgboot, rgmgmt
# Apr-7-11 JWS: added iMG726BD-ON
# May-4-11 JWS: added iMG606BD-R2
# May-19-11 JWS: added iMG616BD-R2
# Aug-1-11 JWS: added iMG2504
# Aug-4-11 JWS: added iMG1525
# Oct-6-11 JWS: added iMG1505
# Dec-2-11 JWS: added iMG2524
######################################################################
######################################################################
shared-network SPSI-AI00 {
# RG/iMG voice vlan subnet (/26 = ~60 subscriber voice RG/iMG devices)
authoritative;
ddns-updates on;
ddns-update-style interim;
ddns-domainname "rgvoip.spsi.lab.telesyn.corp";
allow client-updates;
ddns-rev-domainname "in-addr.arpa.";
include "/etc/rndc.key";
zone rgvoip.spsi.lab.telesyn.corp. {
primary 10.52.201.36;
key rndckey;
zone 111.52.10.in-addr.arpa. {
primary 10.52.201.36;
key rndckey;
pool {
authoritative;
# default-lease-time 86400;
default-lease-time 300;
# max-lease-time 86400;
max-lease-time 300;
pool {
authoritative;
default-lease-time 600;
max-lease-time 600;
pool {
authoritative;
default-lease-time 86400;
max-lease-time 86400;
pool {
authoritative;
default-lease-time 1200;
min-lease-time 1200;
max-lease-time 3600;
pool {
authoritative;
default-lease-time 86400;
max-lease-time 86400;
31.2.4 spsi-ai00-awplus-subnet
# spsi-ai00-awplus-subnet for Service Provider Solutions Interop (SPSI) lab Access Island 0,
# AlliedWare Plus access ports for provisioning 3play iMGs
# Jul-7-08 JWS: copied from spsi-ai00-subnet, modified for AW+
# Apr-3-12 JWS: added img1505
######################################################################
######################################################################
shared-network SPSI-AI00 {
# Use with the following in named.conf, adjusting the allow list as needed:
key "rndc-key" {
algorithm hmac-md5;
secret "VBd+VWbItNu5ZtKJbRKgqQ==";
};
controls {
inet 0.0.0.0 port 953
allow {127.0.0.1;} keys{"rndc-key";};
};
logging {
channel normal_logs {
severity info; // level 3 debugging to file
file "/var/log/named"; // /var/adm/named
print-time yes; // timestamp log entries
print-category yes; // print category name
print-severity yes; // print severity level
};
/**/
/*DDNS STUFF*/
/**/
zone 1.85.10/.in-addr.arpa." {
type master;
allow-update { dhcp-srvr; };
file "ddns/10.85.1.ndb";
};
zone "1.48.10.in-addr.arpa." {
type master;
allow-update { dhcp-srvr; };
file "ddns/10.48.1.ndb";
};
zone "2.48.10.in-addr.arpa." {
type master;
allow-update { dhcp-srvr; };
file "ddns/10.48.2.ndb";
};
zone "3.48.10.in-addr.arpa." {
type master;
allow-update { dhcp-srvr; };
file "ddns/10.48.3.ndb";
};
zone "4.48.10.in-addr.arpa." {
type master;
allow-update { dhcp-srvr; };
file "ddns/10.48.4.ndb";
};
zone "5.48.10.in-addr.arpa." {
type master;
allow-update { dhcp-srvr; };
file "ddns/10.48.5.ndb";
};
zone "6.48.10.in-addr.arpa." {
type master;
allow-update { dhcp-srvr; };
file "ddns/10.48.6.ndb";
};
zone "7.48.10.in-addr.arpa." {
type master;
allow-update { dhcp-srvr; };
file "ddns/10.48.7.ndb";
};
/**/
/*END OF DDNS*/
/**/
zone "3.1.10.in-addr.arpa." {
type master;
file "networks/10.1.3.ndb";
};
zone "4.1.10.in-addr.arpa." {
type master;
file "networks/10.1.4.ndb";
};
zone "5.1.10.in-addr.arpa." {
type master;
file "networks/10.1.5.ndb";
};
zone "6.1.10.in-addr.arpa." {
type master;
file "networks/10.1.6.ndb";
};
zone "0.3.10.in-addr.arpa." {
type master;
file "networks/10.3.0.ndb";
};
zone "0.4.10.in-addr.arpa." {
type master;
file "networks/10.4.0.ndb";
};
zone "1.6.10.in-addr.arpa." {
type master;
file "networks/10.6.1.ndb";
};
zone "2.6.10.in-addr.arpa." {
type master;
file "networks/10.6.2.ndb";
};
zone "1.40.10.in-addr.arpa." {
type master;
file "networks/10.40.1.ndb";
};
zone "map" {
type master;
file "master/map.ndb";
};
zone "net" {
type master;
file "master/net.ndb";
};
A northbound interface on an NMS/EMS allows other software applications (higher level network management systems) to
communicate with (or manage) the lower level NMS without the user acting on the lower level NMS directly. In many cases
this interface is intended for higher level network management systems communicating with devices from different vendors
(with vendor specific device communication interfaces) using element management systems from those vendors that provide
a well known interface that can be used by the higher level network management software.
There are several platform-independent technologies of software communication used to implement the northbound
interface (e.g. CORBA, XML, RMI, etc.) and Apache Axis will be used to provide the northbound interface in AlliedView
NMS. Axis is an implementation of SOAP (Simple Object Access Protocol) which is not only XML based but also provides
APIs that support web services standards.
The following table lists the capabilities for the northbound interface APIs.
Capability Detail
Retrieve network inventory objects Provide APIs for retrieving network inventory data based on type and allow
from NMS based on criteria set by the client application to specify other criteria. In addition the API will allow
client. clients to retrieve any other network inventory data from the NMS by
specifying the matching criteria.
Retrieve network events available in Allow clients to retrieve network events from the NMS. The client can
NMS database based on criteria set by specify criteria of the network events to be retrieved. Only events that
the client. match the selected criteria will be retrieved.
Retrieve alarms available in NMS Allow clients to retrieve alarms from the NMS. The client can specify
database based on criteria set by the criteria of the alarms to be retrieved. Only alarms that match the selected
client. criteria will be retrieved.
Retrieve network events and alert Allow clients to retrieve all event and alert filters configured in NMS. These
filters that are currently configured in filters in NMS could be setup to perform certain operations when a new
NMS. event or alert is received.
Retrieve trap and events parsers that Allow clients to retrieve all trap and event parsers configured in NMS.
are currently configured in NMS. These parsers in NMS are used to modify any properties of the trap or
event in NMS (by default these are used to set the severity)
Retrieve the number of network Allow clients to retrieve total counts for all events and alarms from the
events or alarms in the NMS. NMS. Alarm counts can also be retrieved for the specified severity.
Retrieve the history of an alarm The NMS maintains the history of an alarm based on failure object (entity)
which will be available through this API. The client will specify the failure
object of the alert to get the history.
Autonomous events configuration for allow clients to receive network events from the NMS immediately without
clients the need for the client to poll the NMS every time. The client will configure
the NMS with the information required (including criteria if only specific
events are needed) and the NMS will forward all events that match the
criteria
Capability Detail
Retrieve device information from the All other operations in this release operate on the NMS with the results
device through the NMS available in the NMS server. This operation will use the NMS to retrieve the
data from the device. Device data is retrieved using CLI or SNMP. The main
purpose for this is to evaluate how other device operations can be
supported
Users accessing northbound interface Operations done through the northbound interface will have access to the
must be authenticated and denied NMS database and devices, therefore access should be restricted using the
access if not authorized. users in NMS security database
Retrieve stored customer information Once the configuration is complete the northbound interface is expected to
from device have an API to retrieve the configured information from the device. This can
be used to allow clients to validate parameters or display subscribed
services.
Provision a triple play customer. Allows northbound interface clients to provision triple play services for a
customer using iMAP device and RG or iMG device.
Provision a customer port on device Allows northbound interface clients to provision a customer port on iMAP
device without provisioning the RG or iMG device.
Provision a customer RG or iMG Allows northbound interface clients to provision services on the RG for a
device customer when the port where the RG is connected was provisioned
separately.
De-provision a triple play customer. Allows northbound interface clients to de-provision triple play services for a
customer on iMAP device and RG or iMG device through the API. The
iMAP port and RG can also be de-provisioned separately.
Modify Customer provision Allows northbound interface clients to modify selected provision
information. information for the customer. Configuration information that can be
modified is similar to what was used in provisioning.
Perform a bulk provision task Allows provision, de-provision or modify configuration of many customers
(provision many customers from by loading the information from a file. The client in NMS that has limited
saved data) bulk provision operations is currently using RMI and is updated to use
northbound operations.
Note: With a standard northbound interface, the higher level NMS would not have to implement different clients to communicate
with NMS/EMS from different vendors. However, specific interfaces may be more useful to the client because operations will
be specific to clients' needs.
32.1.2 WSDL
WSDL is a language used to describe the services published by an interface. When publishing Axis web services, the server
will include interfaces and implementations and publish the WSDL file which will include descriptions of all available
operations, parameters and return types.
Note: The WSDL in Axis/SOAP is considered equivalent of the IDL in CORBA.
On the client side the implementation can start by looking at the WSDL file to determine available services, generate stub
code from WSDL then implement the client to use the services. As an alternative client implementation can skip client code
generation and manually implement client code that calls Axis directly (this can be complicated if the developer is not familiar
with Axis/SOAP core classes). There are tools already available that can be used to parse WSDL files and generate stubs and
skeleton code for different language implementations.
For the WSDL path for AlliedView NMS, use http://<nmsserver-IP>:9090/axis/services
Client programs intended for performing operations on NMS using this interface can be implemented in any language that
supports SOAP; however languages that do not support HashMaps will be limited to operations that do not take a HashMap
as a parameter or return it as results. The WSDL file provided contains all operations available and the client program
developer will need to use it to get the correct syntax of operations and details provided here will be useful explaining object
contents.
32.2.3.1 Activate
Create (or edit) a file NMS_HOME/conf/AT_tmp_conf.properties and specify the properties, then restart the NMS server:
• WS_PROCESS_COUNT=<number> - (for operations count)
• WS_INTERVAL=<number> - (for time interval in seconds)
32.2.3.2 Deactivate
To deactivate, comment out the entries in the file above by using the # character in the beginning of the line (or delete the
file if those are the only two entries), then restart the server
Faults/ getEventTargets None HashMap of event targets Returns the configured event
which also shows counts target hosts and ports.
Faults/ None Total alarms count Returns total number of
getTotalAlertsCount (integer) alarms
Faults/ getAlertsCount Severity string (e.g. Alarms count with the Returns the number of alarms
Critical, Major, etc.) severity. matching the specified severity
Faults/ getAlerts HashMap of alarm List of alarm properties Returns a list of alarm
properties match criteria (list of HashMaps) properties matching the
criteria
Faults/ getAlertFilters None HashMap of alarm filters Returns a HashMap of alarm
with each filter containing filters. This Map contains other
a HashMap that has HashMaps for criteria and
criteria and actions. actions and also actions
Criteria contain strings contain other HashMaps for
and an action contains a each action.
HashMap with different
actions.
Faults/ Failure object (entity) of List of annotation Returns a list of annotations
getAlertAnnotation the alarm properties for the alarm for the alarm with the specified
(list of HashMaps) entity.
Faults/ getAlertHistory Failure object (entity) of List of history properties Returns a list of history for the
the alarm for the alarm (list of alarm with the specified entity.
HashMaps)
Provision/ Provision parameters Status of the operation Status returned can indicate
deprovisionPort the operation has started or
completed if time-out is
specified.
Provision/ Provision parameters Status of the operation. Status returned can indicate
modifyPort the operation has started or
completed if time-out is
specified
Provision/ - MO match criteria (RGs) Status of the operation Status returned can indicate
modifyRG - Provision parameters the operation has started or
completed if time-out is
specified.
Use the following table to locate the most common tasks you wish to perform. If you are using the NMS, use the screen
name or the form name as well to locate the relevant section.
33.1 Starting Up
You can view the HTML interface through any web browser, such as Mozilla or Internet Explorer. Open the web browser
and type the machine name and port number of the server in the address bar, as shown below:
http://<machine name>:<port number>
For example:
http://nms-server:9090
In the above example, nms-server is the name of the machine in which the server is running, and 9090 is the port number on
which the server is listening.
Note: The NMS HTML interface does not have all the features and functions of the Java interface, and is therefore more suitable
for query and report functions that can be accessed over any compatible browser. There are administrative tasks that can be
done, but these should be done by authorized personnel only.
TABLE 33-2 Actions available from Network Map and Device Icons
TABLE 33-3 Properties Form for Network Map Objects (Editable fields are in bold)
TABLE 33-3 Properties Form for Network Map Objects (Editable fields are in bold)
TABLE 33-4 Properties Form for Device Map Objects (Editable fields are in bold)
TABLE 33-4 Properties Form for Device Map Objects (Editable fields are in bold)
• Actions - Using the icons, the user can acknowledge the alarm and annotate the alarm for future reference.
• Alarm Details - The text for the alarm.
• Date/Time - The date and time the alarm occurred.
• Alarm Group - ALarms can be assigned to a group when a parser is created. Groups are not used in the base NMS and
are not shown in the HTML interface.
• Owner - The name of the login filled in the Alarm Details form.
• System Location - This is the value that was filled in the Managed Object Properties form.
The alarms are grouped by default for sets of 25 alarms in a page. This can be changed using the pull-down.
By clicking on a column header name, you can sort the list by the selected column information. When you click the name, an
arrow shows the direction of the sort (up descending, down ascending). Each time you click the name, the sort direction
toggles.
The following figure shows the alarm view.
Property Description
Custom View The name of the custom view. This is a mandatory parameter. If you try to submit the form without
Name mentioning the name, the message “No Custom View is mentioned” is displayed.
Severity The severity of the event object, which indicates the criticality of the event. You can choose one of
the severity (All, Major, Minor, Warning, Clear, Info, or Unknown) from the list box.
Previous The matching criteria based on the previous severity of the alarm.
Severity
Owner The name of the owner with whom the alarm is associated.
Group A group value based on which alarms are grouped in the client.
Message An Alarm message for the particular custom view.
Category The name of the category to which the alarm belongs. This could be used for better organization of
alarms.
Property Description
Failure Information about the specific entity within the source of the event, which is primarily responsible for
Object the occurrence of this event. The name of the failure object which caused the event to occur can be
given in this field.
Source Information about the source of the alarm. Alarms matching a particular source can be filtered out
using this criterion.
From Date/ A from date and time for filtering out alarms modified from a particular date/time onward.
Time
(Modified
Time)
To Date/ A to date and time for filtering out alarms modified before a particular date/time.
Time
(Modified
Time)
From Date/ A from date and time for filtering out alarms generated from a particular date/time onward.
Time (Create
Time)
To Date/ A to date and time for filtering out alarms generated before a particular date/time.
Time (Create
Time)
GroupViewM The mode of grouping. It could be max, latest, or none. If max is selected, then alarms are grouped
ode with the alarms of maximum criticality being shown at the top of the group. If latest is selected, then
alarms are grouped with the latest alarm in a group shown at the top of the group. If GroupViewMode
selected is none, then the alarms are not grouped.
Alarm Age An age for filtering alarms based on the age of alarms. Age of an alarm denotes the time lapsed since
the occurrence of the alarm in the NMS system.
Refresh The frequency at which the latest alarms should be updated in the alarm browser from the database.
Period
(in Min.)
33.4.2.3 Search
The search option allows the user to further refine a view by listing columns and the criteria the column must match. The
More button allows more that one column to be used, and the Match radio buttons allow an OR (any) or AND (all) criteria
to be set. Refer to the following figure, which shows a search based on the severity of Clear.
33.4.2.5 Operations
After checking the tic box for one or more alarms the user can choose one of the following actions:
• View Events - displays the list of events for the object that had created the alarm.
• Clear - This will set the status to Clear and show what the previous status was.
• Delete - Deletes the alarm (after a confirmation window).
• Pickup - Allows a user to be associated with an alarm.
• Unpick - Disassociates a user with an alarm.
Note: If any of the parameter fields (except Custom View Name) is left blank, the default value all is assigned.
33.5 Performance
To control statistics that are collected and reported the user can select a host and then add, modify, or delete a statistic.
Refer to the following figure.
Column Meaning
Name The object name. The icon to the left of the name ( ) is the icon for a network object, which is the
object type, where the icon color depicts current criticality state of the object.
Left-clicking the name brings up the Object Details form.
The arrow to the right of the name ( ) brings up a menu of appropriate actions (Manage/
Unmanage). Left-clicking the arrow brings up the menu.
IPAddress The object IP address. Every object has a unique IP address.
Status The alert status.
Type One of the types listed in the Network Inventory tree
NetMask The object subnetwork or network category.
Column Meaning
Name
The object name. The icon to the left of the name ( ) is the icon for a network node object,
which is the object type, where the icon color depicts current criticality state of the object.
Left-clicking the name brings up the Object Details form.
The arrow to the right of the name ( ) brings up a menu of appropriate actions (Manage/
Unmanage). Left-clicking the arrow brings up the menu.
SysLocation The MO property to identify a location
Type The device type (the type of AT device).
Release The software release the device is running.
Serial Number The unique name given by AT to identify the device.
IPAddress The object IP address.
NetMask The object subnetwork or network category.
Status The alert status.
Last Status Time The date and time at which the object information was last updated.
Change
Config Changed The last time the device configuration was changed.
Column Meaning
Name
The object name. The icon to the left of the name (such as ) is the icon for a network node
object, which is the object type, where the icon color depicts current criticality state of the
object.
Left-clicking the name brings up the Object Details form.
The arrow to the right of the name ( ) brings up a menu of appropriate actions (Manage/
Unmanage). Left-clicking the arrow brings up the menu.
Type The device type (the type of AT device).
IPAddress The object IP address.
Profile The associated Profile
Column Meaning
Device The device that contains the card
Slot The slot number of the card
Type The type of card.
IP Address For cards that require an IP interface (POTS24, CES8)
CLEI Code For cards that have a CLEI code
Column Meaning
Device The node name
Port The port number on the card. Typically, the port number is the customer’s telephone number
Type The interface for the port
Customer ID An ID number that uniquely identifies the port.
Status The current status of the port.
Profile The profile the port has been associated with. If there is an *, the data on the port and the
associated profile do not match.
ADSL IfIndex Index number created for the ADSL port
ifIndex Index number created for the ethernet port
Column Meaning
Name
The object name. The icon to the left of the name ( ) is the icon for an interface object, which is the
object type, where the icon color depicts current criticality state of the object.
Left-clicking the name brings up the Object Details form.
Column Meaning
Name
The object name. The icon to the left of the name ( ) is the icon for a router object,
which is the object type, where the icon color depicts current criticality state of the object.
Left-clicking the name brings up the Object Details form.
The arrow to the right of the name ( ) brings up a menu of appropriate actions (Manage/
Unmanage). Left-clicking the arrow brings up the menu.
Type The object type (AT device).
IPAddress The object IP address.
NetMask The object subnetwork or network category.
Version The version of SNMP (v1 or v2) in the object.
System Descr The detailed name of the device and software load running.
Status The alert status.
Last Status Time The date and time at which the object information was last updated.
Change
Column Meaning
Display Name Matches the name given for the associated VLAN
Name
The object name. The icon to the left of the name ( ) is the icon for an interface object (VLAN
interface, in this case), which is the object type, where the icon color depicts current criticality state
of the object.
Left-clicking the name brings up the Object Details form.
VLAN Type Default is VLAN
ID The object (interface) ID.
Type The object type (AT device).
IPAddress The object IP address.
NetMask The object subnetwork or network category.
VID The version of SNMP (v1 or v2).
Status The object status.
UnTagged The ports on the VLAN interface object that are untagged.
Ports
Tagged Ports The ports on the VLAN interface object that are tagged.
Device The device on which the VLAN IF resides
Network Vlan The name of the VLAN if crosses multiple devices.
Forwarding For the UFO VLAN interface, the type of Forwarding used. (Standard VLANs do not have
Mode Forwarding configured.)
Node Type Whether the Node is a Primary Upstream Node (into the upstream network), Secondary Upstream
Node, or Non-Upstream
Pri UP Node The status of the Primary Upstream Node (should be active)
Status
Sec UP Node The status of the Secondary Upstream Node (if configured, should be standby)
Status
Column Meaning
Display Name Matches the name given for the associated VLAN
Name The domain name that applies to this specific Network VLAN and all of its associated nodes.
Domain State The overall state of the EPSR domain. LINK DOWN means one (or more) of the data VLANs
has been broken.
Type Whether the Domain is a Master or Transit
Ctrl VID The VID of the network VLAN that is being used to create the protection ring
Pri Ifc The interface for the associated VLAN with a state of Primary
PI State The state of the Primary interface (BLOCKED or FORWARDING)
PI Prio The priority number for the Primary Interface,
Sec Ifc The interface for the associated VLAN with a state of Secondary
SI State The state of the Secondary interface. (BLOCKED or FORWARDING
SI Prio The priority number for the Secondary Interface,
Status The overall state of the domain (whether it is ENABLED or DISABLED)
Column Meaning
Display Name Matches the name given to the link.
Name The name supplied when the link was created (optional) The icon to the left of the name (such as
) is the icon for a link object, which is the object type, where the icon color depicts current
criticality state of the object.
Left-clicking the name brings up the Object Details form
Source Device The source node name
Source Port The port on the source device to which the link is attached
Dest. Device The destination node name
Dest. Port The destination port
Status The alert status
Link Type The link type, especially if used for a feature, such as LAG
Discovery The protocol used for discovery, usually LLDP
Action Meaning
Load MIB Load the MIB files in the HTML UI MIB Browser.
UnLoad MIB Unload the MIB files in the HTML UI MIB Browser.
Parameters Sets the values for port, version, time-out, retries and max-repetitions. This displays a
dialog where the Snmp Version, Snmp Port, Time-out, Retries, Max-Repetitions can be
specified
Get Performs a GET operation. This gets all the objects under the selected MIB object, or
the specific object if the MIB node and instance are specified
GetNext Performs a GETNEXT operation. This gets the next object after the specified object, or
the specific object instance if a MIB node is specified.
GetBulk Performs a GETBULK operation. This gets a sequence of Next Objects immediately
after the specified object. The number returned Object instances are equal to the Max-
Repetitions field.
Set performs a SET operation. This enables setting the value of the specified object, based on
the value in the Set Value field. To do a SET for Octet String Type in hex format enter
the bytes in hex format with each bytes separated by a colon and the entire string within
single quotes. For example to give 0xff0a3212 enter 'ff:0a:32:12' in the SetValue field
Table Allows you to view the SNMP Table. This brings the display of SnmpTable, if the selected
OID is a table
Clear Clears the text area. It clears the QUERY RESULTS, which sometimes overflow its
capacity and needs to be cleared
The select button, in the right-side frame, is used to select the MIB to be displayed in the tree-view of HTML Client.
Apart from these, there are text fields for displaying Syntax, Access, Status, Index, and MIB Node Description, which give a brief
description of the selected MIB file
Note: The UI of HTML UI MIB Browser is not the same as that of Java UI MIB Browser. Apart from the difference in the UI, some
of the features present in the Java UI MIB Browser such as v3 support, graphing, etc., are not available in the HTML UI MIB
Browser
The MIB Browser allows loading of compiled MIB files. To store the compiled information, there are two file types are used
for storing the MIB information in a formatted structure:
• cmi - This file type contains MIB information such as MIB node, MIB module, naming hierarchy, etc.
• cds - This file type contains the description and reference of the nodes in the MIB.
The compiled MIB files reduce the loading time leading to performance improvement. The Load MIBs from compiled Files
check box can be checked/unchecked to load the MIB files directly or as compiled MIB files. By default, this option is
unchecked. If this is unchecked, you can directly load the MIB file, as provided.
When Load MIBs from compiled File is enabled, the MIB Browser tries to load the .cmi and .cds file, if they are present.
Otherwise, this parses the MIB file and writes the output in .cmi and .cds files and then loads the MIB file. For example, for
RFC1213-MIB, the compiled MIB files are RFC1213-MIB.cmi and RFC1213-MIB.cds. The advantage of using this option is that
we need not parse the MIB each time we load it, thus optimizing the loading time.
While loading the compiled MIBs it is enough if we load the .cmi file alone. The .cmi file has reference to the.cds files. The
<mib_file_name>.cds file should not be loaded directly.
After loading the MIB file as a compiled MIB file, any change done in the MIB file doesn't get reflected in the loaded MIB file.
You have to remove the existing .cmi and .cds files, and then load the MIB to get the latest changes done. The Overwrite
existing compiled MIB files check box can be enabled to overcome this. If this option is set to True, the .cmi and .cds files are
created each time the MIB is loaded.
Enabling this option is recommended only if you have changed the contents of the MIB file. Otherwise, this unnecessarily
increases the load time of the MIBs.
The MIB files displayed in the list box (as shown in the above screen) are provided in the <NMS Home>/mibs directory. It
may be convenient to copy your MIB files to be loaded, into the <NMS Home>/mibs directory.
Choose the MIB to be loaded from the list box displayed and choose the Load button.
You can also load multiple MIBs, which get displayed in the list box provided, as shown in Figure 33-26. Select one of the
listed MIBs from the list box. Use the Load button to display it in the tree-view of HTML Client. When any MIB module is
selected, the root node for that MIB becomes the current OID.
Note: The tree-view of HTML UI MIB Browser displays only one MIB at any time. To view the objects of another MIB file, you need
to select the respective MIB file from the list box which gets overwritten in the tree-view.
To unload the loaded MIB, select the node from the MIB Tree and then choose the Unload option from the MIB Toolbar.
This removes the MIB and its reference from the tree.
Field Meaning
User Name Required, the name must be unique with up to NEED INFO characters.
Password Required, the password must be unique with up to NEED INFO characters. The Re-type
Password must match or there is an error message.
Available group names The option to add the user to a group, so that the user inherits the privileges of the
group.
Add this user to a new Checking the tic box activates the field, and a new group can be defined that includes the
group new user. NEED INFO - what privileges does the new user have? always admin?
Password expires in Checking the tic box activates the field, how many days the password is valid.
Account expires in Checking the tic box activates the field, how many days the user name is valid.
Field Meaning
Current and New Password Checking the tic box activates the field, and a new password can be defined.
Groups Which groups the user can belong in. The user must belong in at least one group.
More than one group can be chosen using the right and left arrows.
Modify password expiration Checking the tic box activates the field, how many days the password is valid.
Modify password expiration Checking the tic box activates the field, how many days the user name is valid.
The name of the node is one of the node’s managed object properties. The Netmask is one of the pull-down options, and the
SNMP port has the 161 default.
The refresh button, when selected, starts the rediscovery process immediately and updates the system with the most
current node information.