100% found this document useful (1 vote)
87 views175 pages

UMC Lite User Manual

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
87 views175 pages

UMC Lite User Manual

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 175

UMC² Lite

Unified Management Control


Centre

User Manual
Version: 01

FiberHome Telecommunication Technologies Co., Ltd.

February 2023
Copyright © FiberHome Telecommunication Technologies Co., Ltd. All rights reserved.

No part of this document (including the electronic version) may be reproduced or transmitted in any form or by
any means without prior written permission from FiberHome.

Trademarks and Permissions

and other FiberHome trademarks are trademarks of FiberHome Telecommunication Technologies


Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.

General Disclaimer

All or part of the products, services and features described in this document may not be within your purchase
scope or usage scope. In case of inconsistency, the contract shall prevail.

The information in this document may contain predictive statements. Actual results may differ materially from
those expressed or implied in predictive statements due to numerous factors. Therefore, such information is
provided for reference purpose only and constitutes neither an offer nor an acceptance.

Information in this document is subject to change without notice due to upgrade or other needs.

FiberHome Telecommunication Technologies Co., Ltd.

Address: No.6, Gaoxinsilu, High-Tech Development Zone, Wuhan, Hubei Province, P. R. China
Postcode: 430205
Website: http://www.fiberhome.com
Tel: +86 800-8800787; +86 400-8890787
Preface

This manual introduces the UMC2 Lite Unified Management Control Centre in terms of
basic operations, online help and management functions, helping you get started with the
UMC2 Lite quickly.

This manual is intended for network management system engineers, network support
engineers, and network maintenance engineers.

Version

Version Description
01 Initial version for the UMC2 Lite

Symbol Conventions

Symbol Convention Description

Note Important features or operation guide.

Possible injury to persons or systems, or cause traffic interruption or


Caution
loss.

Warning May cause severe bodily injuries.


Operation Safety Rules

Item Description
Place the UMC² Lite computer away from direct sunlight, electromagnetic interference,
heat source, humidity and dust, and with at least 8 cm distance from other objects to keep
good ventilation.

Use UPS power supply for the UMC² Lite computer.

Ground the UMC² Lite computer case, UPS power supply and switch (or hub) reliably.

Keep the UMC² Lite computer dedicated for network management. Use secure memory

Dos devices only.

Exit the operating system before shutting down your UMC² Lite computer.

Grant permissions and passwords by levels, and keep passwords secret.

Perform service configuration or expansion through the UMC² Lite when service traffic is
at a relatively low volume.

Manage networks through either the UMC² Lite or the CLI system.

Pay attention to system prompts when performing risky operations.

Do not install operating systems incompatible with the UMC² Lite version.

Do not install unnecessary and unidentified third-party applications.

Do not change the system protocol, host name, and IP address without permissions.

Do not enable irrelevant or insecure services.


Do not install non-authorized anti-virus software such as 360.
Don'ts
Do not install databases incompatible with the UMC² Lite version.

Do not log into the database using tools and directly add, delete, or modify data in the
database.
Do not delete files of the UMC² Lite without permissions.

Do not change the license file in any form.


Contents

Operation Safety Rules ........................................................................................... III

1 Overview ........................................................................................................1

1.1 Positioning.........................................................................................1

1.2 Functions ...........................................................................................1

2 Installing the Software....................................................................................2

2.1 Configuration Requirements .................................................................2

2.2 Installing the UMC2 Lite ......................................................................2

2.3 Installing the UMC2 Lite Web ...............................................................6

3 Verifying the Installation .............................................................................. 10

4 Getting Started ............................................................................................. 12

4.1 Login and Logout.............................................................................. 12

4.1.1 Logging Into the UMC² Lite ................................................. 12


4.1.2 Logging Out of the UMC² Lite.............................................. 12

4.2 Updating a License............................................................................ 13

4.3 Viewing License Information .............................................................. 14

4.4 Viewing the Machine ID .................................................................... 14

4.5 Viewing the UMC² Lite Version .......................................................... 14

4.6 Setting the Time Zone and Time of the UMC² Lite Server....................... 15

4.7 Setting System Parameters.................................................................. 16

4.7.1 Setting Ping Parameters ....................................................... 16


4.7.2 Setting the Telnet / SSH Proxy Server .................................... 17
4.7.3 Setting the Default Page Displayed ........................................ 17
4.7.4 Setting the Personalization Switch ......................................... 18
4.7.5 Setting the Unit of Performance Values .................................. 18
4.7.6 Setting Alarm Colors ........................................................... 19
4.7.7 Setting New Alarm / Event Parameters................................... 20
4.7.8 Setting Other Parameters ...................................................... 20
4.7.9 Setting Definition of History Alarms...................................... 21
4.7.10 Setting Automatic Alarm Acknowledgment ............................ 22
4.7.11 Setting Automatic Alarm Synchronization .............................. 23
4.7.12 Setting Special Alarm Icons.................................................. 24
4.7.13 Setting Basic Alarm Parameters ............................................ 25
4.7.14 Setting an XFTP Server ....................................................... 25
4.7.15 Setting File Export .............................................................. 27
4.7.16 Setting a License Expiration Reminder................................... 28

5 Security Management .................................................................................. 29

5.1 Initial Authorization .......................................................................... 29

5.1.1 Initial Authorization Flow .................................................... 29


5.1.2 Customizing Object Sets ...................................................... 30
5.1.3 Customizing Operation Sets.................................................. 31
5.1.4 Customizing User Groups .................................................... 32
5.1.5 Creating and Authorizing Users ............................................ 34

5.2 Querying Authority ........................................................................... 38

5.2.1 Viewing the Management Domain of a User or User Group ...... 38


5.2.2 Viewing Operation Authority of a User or User Group ............. 38
5.2.3 Viewing User Groups to Which a User Belongs....................... 39
5.2.4 Viewing Users / User Groups Bound to an Operation Set .......... 40
5.2.5 Viewing Operations Included in an Operation Set .................... 40
5.2.6 Viewing Objects in an Object Set .......................................... 41

5.3 User Security Management................................................................. 42

5.3.1 Logging Out Users .............................................................. 42


5.3.2 Modifying User Passwords ................................................... 42
5.3.3 Reminding Users to Modify Expired Passwords ...................... 43
5.3.4 Resetting User Passwords..................................................... 43
5.3.5 Unlocking Users ................................................................. 44
5.3.6 Locking User Groups........................................................... 45
5.3.7 Unlocking User Groups ....................................................... 46
5.3.8 Monitoring User Activities ................................................... 46

5.4 Log Management .............................................................................. 47

5.4.1 Log Management Policies .................................................... 47


5.4.2 Querying System Logs......................................................... 47
5.4.3 Querying Operation Logs ..................................................... 48
5.4.4 Querying Security Logs ....................................................... 50
5.4.5 Setting Log Templates ......................................................... 51

6 Alarm Management ...................................................................................... 53

6.1 Setting Alarm Rules .......................................................................... 53

6.1.1 Setting Alarm Reporting Rules.............................................. 53


6.1.2 Setting Alarm Masking Rules ............................................... 54

6.2 Managing Alarm / Event Templates ..................................................... 57

6.2.1 Alarm / Event Templates ...................................................... 57


6.2.2 Managing Alarm Templates.................................................. 58
6.2.3 Managing Event Templates................................................... 62

6.3 Managing Alarm Configurations ......................................................... 63

6.3.1 Managing Alarm Reporting Templates ................................... 63


6.3.2 Binding Alarm Reporting Templates ...................................... 65

6.4 Monitoring Network Alarms............................................................... 65

6.4.1 Synchronizing Alarms Automatically..................................... 65


6.4.2 Viewing Current Alarms ...................................................... 66
6.4.3 Viewing History Alarms....................................................... 69
6.4.4 Viewing Reported Alarms .................................................... 71
6.4.5 Querying Reported Events.................................................... 71

6.5 Handling Alarms............................................................................... 72

6.5.1 NE Alarm Reporting Flow.................................................... 73


6.5.2 Alarm Handling Flow .......................................................... 75
6.5.3 Viewing Alarm Details......................................................... 76
6.5.4 Viewing Alarm Maintenance Information ............................... 77
6.5.5 Viewing Alarm Correlation Analysis...................................... 77
6.5.6 Acknowledging Alarms ....................................................... 78
6.5.7 Locating Alarms ................................................................. 79
6.5.8 Masking Alarms on the UMC² Lite........................................ 79
6.5.9 Viewing Current Alarms of an NE ......................................... 83
6.5.10 Viewing History Alarms of an NE ......................................... 84
6.5.11 Clearing Alarms Manually.................................................... 84
6.5.12 Acknowledging and Clearing Alarms..................................... 85
6.5.13 Clearing Alarms From a Device ............................................ 85
6.5.14 Modifying Alarm Levels ...................................................... 85
6.5.15 Editing Alarm Remarks........................................................ 86
6.5.16 Outputting Alarm Information............................................... 86
7 Resource Management................................................................................. 88

7.1 Opening NE Managers....................................................................... 88

7.2 Detecting Physical Configurations ....................................................... 89

7.3 Managing Logical Domains................................................................ 90

7.3.1 Creating Logical Domains .................................................... 90


7.3.2 Deleting Logical Domains .................................................... 91
7.3.3 Setting Attributes of a Logical Domain................................... 91

7.4 Managing Access NEs ....................................................................... 92

7.4.1 Creating Access NEs ........................................................... 92


7.4.2 Modifying Attributes of an Access NE ................................... 93
7.4.3 Deleting NEs ...................................................................... 94
7.4.4 Searching for an NE in a Browse Tree.................................... 95

7.5 Managing Switch NEs ....................................................................... 96

7.5.1 Creating Switch NEs ........................................................... 96


7.5.2 Modifying Attributes of a Switch NE ..................................... 98

7.6 Deleting NEs .................................................................................... 99

7.7 Moving Topology Objects .................................................................. 99

7.8 Searching for an NE in a Browse Tree................................................ 100

7.9 Managing Cards.............................................................................. 101

7.9.1 Adding Cards Manually ..................................................... 101


7.9.2 Replacing Cards................................................................ 102
7.9.3 Deleting Cards.................................................................. 103

7.10 Setting UMC² Lite Attributes ............................................................ 103

7.11 Searching for Objects....................................................................... 104

7.12 Querying Abnormal ONUs............................................................... 105

7.13 Querying ONUs.............................................................................. 106

7.14 Querying ONUs in Batches .............................................................. 107

7.15 Querying Card SNs ......................................................................... 108

7.16 Unauthorized ONU List ................................................................... 109

8 Configuration Management ........................................................................ 110

8.1 Managing SNMP Parameter Templates .............................................. 110

8.1.1 Creating and Using SNMP Parameter Templates ................... 110


8.1.2 Modifying / Deleting SNMP Parameter Templates ................. 112

8.2 Managing NE Communication Routes ............................................... 113

8.2.1 Managing NE Managers..................................................... 113

8.3 ONU Capability Set Template........................................................... 116

8.3.1 Creating ONU Capability Set Templates............................... 116


8.3.2 Modifying ONU Capability Set Templates............................ 117

8.4 Configuring NEs in Batches ............................................................. 118

8.4.1 Calibrating Time in Batches................................................ 119


8.4.2 Synchronizing Alarms in Batches ........................................ 119
8.4.3 Saving Configurations to Flash in Batches ............................ 120
8.4.4 Configuring VLANs for OLTs in Batches ............................. 121

8.5 Synchronizing Configurations........................................................... 122

9 Access NE Management and Maintenance ................................................. 124

9.1 Configuring Local Services .............................................................. 124

9.2 Viewing the ONU List ..................................................................... 125

9.3 Managing ONUs............................................................................. 126

9.3.1 Copying / Pasting Port Service Configurations ...................... 126


9.3.2 Resetting ONUs................................................................ 127
9.3.3 Replacing ONUs............................................................... 127

9.4 Setting Card Authorization ............................................................... 128

9.5 Authorizing ONUs .......................................................................... 129

9.5.1 Configuring an ONU Whitelist............................................ 129


9.5.2 Managing ONU Authentication Modes ................................ 130
9.5.3 Managing PON Port Authentication Modes .......................... 131
9.5.4 Replacing ONU Logical Identifiers...................................... 132
9.5.5 Viewing Authorized ONU Information................................. 133
9.5.6 Enabling / Disabling Automatic ONU Discovery on PON
Ports................................................................................ 135

9.6 Synchronizing ONUs Manually ........................................................ 135

9.7 Obtaining Unauthorized ONU Data ................................................... 136

9.8 Authorizing ONUs Manually ............................................................ 136

9.9 Managing Configuration Export Tasks ............................................... 137

9.9.1 Viewing Configuration Export Tasks.................................... 137


9.9.2 Creating Configuration Export Tasks ................................... 138
9.9.3 Executing Configuration Export Tasks ................................. 139

10 System Maintenance and Management ...................................................... 141

10.1 How to Use the NMS Management Tool ............................................ 141

10.1.1 Login .............................................................................. 141


10.1.2 Logout............................................................................. 142
10.1.3 Switching Languages......................................................... 143
10.1.4 Modifying Passwords ........................................................ 143
10.1.5 Checking Browser Compatibility......................................... 144
10.1.6 Resetting the Password of a Query User ............................... 144
10.1.7 Managing Account Policies ................................................ 145
10.1.8 Managing Processes .......................................................... 146
10.1.9 Managing Resources ......................................................... 148
10.1.10 Managing History Data ...................................................... 149
10.1.11 Managing Logs................................................................. 150
10.1.12 Setting Parameters............................................................. 151
10.1.13 Importing / Exporting Configuration Files ............................ 152

10.2 Network Detection .......................................................................... 158

10.2.1 Ping ................................................................................ 158


10.2.2 Telnet .............................................................................. 159
10.2.3 SSH ................................................................................ 160

Appendix A Abbreviations ......................................................................... 162


1 Overview

This chapter introduces the positioning and functions of the UMC2 Lite.

1.1 Positioning

The UMC2 Lite Unified Management Control Centre is a small-scale terminal software
product developed by FiberHome Telecommunication Technologies Co., Ltd. (hereinafter
referred to as FiberHome) to manage and maintain FiberHome optical network access
devices locally. It features

u Lightweight design catering for enterprise users, able to manage 500 equivalent NEs or
less.

u Minimal hardware configuration requirements (general PC standalone installation and


operation) through cutting out subsystems or modules not needed by enterprise users.

u Added management capabilities for AC / AP devices.

u Optimized UI style and color scheme.

1.2 Functions

The UMC2 Lite provides the following functions:

u NE configuration management

u Security management

u Alarm management

u Resource management

u Configuration management

u Log management

u System monitoring and maintenance

u Current performance management

Version: 01 1
2 Installing the Software

This chapter introduces how to install the UMC2 Lite.

2.1 Configuration Requirements

Before installing the UMC2 Lite, make sure the hardware and software configurations of the
computer concerned meet the requirements.

Hardware Configuration

The UMC2 Lite is installed on a portable computer. Table 2-1 shows the recommended
hardware configurations of the computer concerned.

Table 2-1 Hardware Configuration Requirements

Item Recommended Configuration

CPU Intel Core i5 / AMD Ryzen5


Memory 16G
Hard drive 500G
Graphics card Integrated graphics card

Network card GE

Software Configuration

Table 2-2 shows the recommended software configuration of the computer to be installed
with the UMC2 Lite.

Table 2-2 Software Configuration Requirements

Item Recommended Configuration


Operating system Windows 7 / 10 / 11

2.2 Installing the UMC2 Lite

This section introduces how to install the UMC2 Lite.

2 Version: 01
2 Installing the Software

Background

u The UMC2 Lite is incompatible with the UNM2000 client. If the current computer
already has the UNM2000 client installed, uninstall it and enter the ie4uinit-show
command in the CLI to clear the icon cache. Then install the UMC2 Lite.

u The database is built into the UMC2 Lite, and can be used directly after the UMC2 Lite
is installed. Automatic database clearing and startup is allowed.

Prerequisite

u The hardware and software configurations of the computer concerned meet the
requirements.

u Firewall rules have been set, or the system firewall and anti-virus software have been
disabled.

Procedure

1. Double-click the installation program for the UMC2 Lite. In the dialog box that appears,
click Next.

2. Select I accept the agreement and click Next.

Version: 01 3
UMC² Lite Unified Management Control Centre User Manual

3. Select an installation directory for the UMC2 Lite and click Next.

4. Select an installation language.

4 Version: 01
2 Installing the Software

5. Confirm the local ID obtained automatically by the installation program, and click
Next.

Note:

The local IP address is obtained by default. In presence of multiple network


cards, this IP address should be set to the one used for communication with
devices.

6. Click Finish in the prompt box when the installation is completed.

Version: 01 5
UMC² Lite Unified Management Control Centre User Manual

2.3 Installing the UMC2 Lite Web

This section introduces how to install the UMC2 Lite Web.

Prerequisite

u The UMC2 Lite has been installed.

u The UMC2 Lite services have all been started, and the UMC2 Lite Web can access the
database directly.

Procedure

1. Double-click the installation program for the UMC2 Lite Web. In the dialog box that
appears, click Next.

2. Select I accept the agreement and click Next.

6 Version: 01
2 Installing the Software

3. Select an installation directory for the UMC2 Lite Web and click Next.

4. Select an installation language.

Version: 01 7
UMC² Lite Unified Management Control Centre User Manual

5. Confirm the local ID obtained automatically by the installation program, and click
Next.

Note:

The local IP address is obtained by default. In presence of multiple network


cards, this IP address should be set to the one used for communication with
devices.

6. Click Next.

8 Version: 01
2 Installing the Software

7. Click Finish in the prompt box when the installation is completed.

Version: 01 9
3 Verifying the Installation

This chapter introduces how to verify the installation of the UMC2 Lite and the UMC2 Lite
Web.

Prerequisite

u The UMC2 Lite client and the UMC2 Lite Web have been installed.

u All services have been started as required.

Note:

Start UMC2 Lite services UnmBus, UnmNode, UnmServiceMonitor,


WebSwingService, UNMCMSerivce and UNMCMAgent in sequence. After
these services are all started successfully, start unm_sso_service.

Procedure

1. Double-click the shortcut icon of the UMC2 Lite client to open the login dialog box.

2. Enter your username and password (both are admin by default), and the master server
IP address. Then click Login. If you can log in successfully, the UMC2 Lite has been
installed correctly.

3. Enter https://IP/ in the address bar of your browser, and press Enter to open the
UMC2 Lite Web page.

10 Version: 01
3 Verifying the Installation

Note:

Here IP refers to the IP address of the UMC2 Lite server.

4. Enter your username and password (same as those used on a client), and click Login.
If you can log in successfully, the UMC2 Lite Web has been installed correctly.

Version: 01 11
4 Getting Started

This chapter introduces common operations and GUIs of the UMC2 Lite to help you get
started quickly.

4.1 Login and Logout

This section introduces how to log into and out of the UMC² Lite.

4.1.1 Logging Into the UMC² Lite

This section introduces how to log into the UMC² Lite.

Prerequisite

u The UMC2 Lite server has been installed successfully and all services have been
started properly.

u A Chrome browser has been installed.

Procedure

1. Enter https://IP/ in the address bar of your browser, where IP is the IP address of the
UMC2 Lite server.

2. Enter your username and password, and click Login to log into the main screen of the
UMC2 Lite.

Note:

A password can be pasted in the text box.

4.1.2 Logging Out of the UMC² Lite

This section introduces how to log out of the UMC2 Lite.

12 Version: 01
4 Getting Started

Procedure

1. Mouse over at the upper-right corner of the UMC2 Lite main screen.

2. Select Exit from the drop-down menu, and click OK in the displayed alert box to log
out.

4.2 Updating a License

A license controls available functions and management capabilities on the UMC 2 Lite.
Without a license, you cannot log into a UMC2 Lite client.

Background

u Currently, a default license is provided for one month.

u After the UMC2 Lite is installed, you should apply for an official license.

Note:

u A license is calculated by encrypting the MAC addresses of all NICs,


including virtual NICs, on the PC concerned. If NICs are changed, the
current license will become invalid and need to be updated.

u A default license has limited permissions. For example, it allows adding no


more than 500 NEs.

Prerequisite

u You have logged into the UMC2 Lite as an administrator.

u A UMC2 Lite license has been obtained.

Procedure

1. Back up the original license.

Create a backup folder in the D:\unm2000\server\etc\license directory and copy


the original license file unm2000_license.lic to that folder.

2. Select Help→License Management from the main menu.

3. In the displayed License Information dialog box, click Update License.

Version: 01 13
UMC² Lite Unified Management Control Centre User Manual

4. In the Open dialog box, select a desired license file and click Open.

5. In the License Comparison dialog box, check control items of the original and new
license files and then click Confirm to Update License.

6. Click OK in the Message alert box.

7. Click Close in the License Information dialog box.

4.3 Viewing License Information

This section introduces how to view license information.

Procedure

1. Select Help→License Management from the main menu.

2. View license control items in the License Management dialog box that appears.

4.4 Viewing the Machine ID

You need to obtain the machine ID before applying for a license.

Background

A machine ID is the serial number of a device. It is a character string that uniquely


identifies a device and ensures that a license is granted to the designated device.

Procedure

1. Select Help→License Management from the main menu to open the License
Management dialog box.

2. Click Machine ID to view the machine ID.

4.5 Viewing the UMC² Lite Version

This section introduces how to view the UMC² Lite version.

14 Version: 01
4 Getting Started

Procedure

1. Select Help→About UMC² from the main menu.

2. View the UMC2 Lite version in the displayed window.

4.6 Setting the Time Zone and Time of the UMC²


Lite Server

This section introduces how to modify the time zone and time of the UMC² Lite server.

Operation steps may vary slightly with operating systems. Here Windows Server 2012 R2
OS is taken for example.

Procedure

1. Stop the UMC² Lite services and database services.

2. Select Start→Control Panel→Date and Time.

3. In the Date and Time dialog box, click Change time zone or Change date and
time to modify the time zone and time of the server.

Version: 01 15
UMC² Lite Unified Management Control Centre User Manual

4.7 Setting System Parameters

This section introduces how to set the GUI display effect according to preferences.

Procedure

1. Select System→Parameter Settings from the main menu to open the Parameter
Settings dialog box.

2. Set the desired parameters in the left pane.

4.7.1 Setting Ping Parameters

You can send consecutive ping commands or forward ping commands through the server to
check whether the UMC² Lite can communicate with an NE.

Prerequisite

You have the Operator Group authority or higher.

Background

u When Consecutive Ping is not selected, the UMC² Lite sends ping commands four
times at most.

u When a client cannot ping an NE, you can select Forward Ping Packet via the
Server to further check whether the UMC² Lite can communicate with the NE.

u After ping parameters are set on a client, they take effect immediately.

Procedure

1. In the left pane of the Parameter Settings dialog box, select Local Settings→
Param Settings→Ping Parameter Config to open the Ping Parameter Config
dialog box.

2. Set ping parameters as required and click Apply. Then these settings take effect
immediately.

4 If Consecutive Ping is selected, the UMC² Lite will send ping commands
consecutively to an object after you right-click it and select Ping from the
shortcut menu.

16 Version: 01
4 Getting Started

4 If Forward Ping Packet via the Server is selected, ping commands are
forwarded by the server.

4 Set PING Time_Out, which is 4000 ms by default and ranges from 0 to 9999 ms.

4.7.2 Setting the Telnet / SSH Proxy Server

When a UMC² Lite client cannot access devices directly, it can access them via Telnet /
SSH or access a Telnet / SSH proxy server to perform operations through CLI.

Prerequisite

You have the Operator Group authority or higher.

Background

The settings of a Telnet / SSH proxy server take effect immediately.

Procedure

1. In the left pane of the Parameter Settings dialog box, select Local Settings→
Param Settings→Telnet/SSH Proxy Server to open the Telnet/SSH Proxy
Server dialog box.

2. Select Enable Telnet/SSH Proxy Server, set the information of a proxy server as
required and click Apply. These settings take effect immediately.

4.7.3 Setting the Default Page Displayed

You can customize the default page displayed after an NE manager is opened.

Background

This setting takes effect immediately on the current client. After logging into the server
from the current client, all users can see the setting result.

Version: 01 17
UMC² Lite Unified Management Control Centre User Manual

Procedure

1. In the left pane of the Parameter Settings dialog box, select Local Settings→
Switch Settings→Default Page Open Setting to open the Default Page Open
Setting dialog box.

2. Set the default page displayed after an NE manager is opened.

3. Click Apply after all settings are done. Then the settings take effect immediately.

Other Operations

Click Restore Default Configurations to restore default settings.

4.7.4 Setting the Personalization Switch

You can set the personalization switch to show vendor information in the ONU list.

Background

This setting takes effect immediately on the current client. After logging into the server
from the current client, all users can see the setting result.

Procedure

1. In the left pane of the Parameter Settings dialog box, select Local Settings→
Switch Settings→Personal Style Setting to open the Personal Style Setting
dialog box.

2. Select ONU vendor info show setting and click Apply. This setting takes effect
immediately.

Other Operations

Click Restore Default Configurations to restore default settings.

4.7.5 Setting the Unit of Performance Values

You can set the unit of performance values to MBit or MByte as needed.

18 Version: 01
4 Getting Started

Background

This setting takes effect immediately on the current client. After logging into the server
from the current client, all users can see the setting result.

Procedure

1. In the left pane of the Parameter Settings dialog box, select Local Settings→
Switch Settings→PM Show Unit Setting to open the PM Show Unit Setting
dialog box.

2. Select the unit of performance values and click Apply. This setting takes effect
immediately.

Note:

It is recommended to use the default setting Show MBit by MByte.

Other Operations

Click Restore Default Configurations to restore default settings.

4.7.6 Setting Alarm Colors

You can set colors for different alarm levels to identify them easily.

Background

u After colors are set for different alarm levels, alarm icons in topology views, alarm
entries queried and indicators on the alarm panel are displayed in the set colors.

u The UMC2 Lite provides four alarm prompt colors by default: critical alarms ,
major alarms , minor alarms , and warning alarms .

u This setting applies to all users at any client.

Procedure

1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Local Settings→Alarm Color to open the Alarm Color dialog box.

Version: 01 19
UMC² Lite Unified Management Control Centre User Manual

2. In the Set a Color for the Alarm Level combo box, click the button on the right
side of each alarm level to select a desired color.

3. In the Set the Background Color of the List combo box, click the button on the
right of each alarm level to select a desired background color.

4. Set parameters as needed and then click Apply. This setting takes effect immediately.

Other Operations

Click Restore Defaults to restore parameters to the defaults.

4.7.7 Setting New Alarm / Event Parameters

You can set display modes of new alarms or events to get informed conveniently.

Background

This setting takes effect on the current client only.

Procedure

1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Local Settings→New Alarm / Event to open the New Alarm / Event dialog box.

2. Set parameters as needed and then click Apply. This setting takes effect immediately.

Other Operations

Click Restore Defaults to restore parameters to the defaults.

4.7.8 Setting Other Parameters

You can set the maximum number of monitoring / startup templates and the automatic alarm
report window to get alarm information quickly.

Background

u This setting takes effect on the current client only.

20 Version: 01
4 Getting Started

u Startup template: After you log in, the UMC2 Lite will query alarms according to a
startup template and display a query result window automatically. You can set up to
five startup templates by default.

u Monitoring template: After you log in, the UMC2 Lite will collect alarms according to
a monitoring template. Only a current alarm query template can be selected as a
monitoring template. You can set up to five monitoring templates by default.

Procedure

1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Local Settings→Others to open the Others dialog box.

2. Set the parameters as needed and then click Apply. The settings take effect
immediately.

Other Operations

Click Restore Defaults to restore parameters to the defaults.

4.7.9 Setting Definition of History Alarms

You can set a delay for converting current alarms to history alarms as needed.

Prerequisite

You have the Administrators authority or higher.

Background

After being acknowledged and cleared, current alarms are converted to history alarms when
the set delay time expires.

Procedure

1. Select Alarm Settings→Server Settings→Alarm History Definition from the left


pane of the Parameter Settings dialog box.

2. Set a delay for converting current alarms to history alarms as needed. Click Apply, and
the settings will take effect immediately.

Version: 01 21
UMC² Lite Unified Management Control Centre User Manual

Note:

Value range: 1 to 30 days / 1 to 720 hours / 1 to 43200 minutes. When the delay
is set to 1 minute, current alarms are immediately converted to history alarms.

4.7.10 Setting Automatic Alarm Acknowledgment

For easy maintenance, the UMC2 Lite allows automatic acknowledgment by alarm level or
by custom rule for unacknowledged but cleared alarms. You can set automatic
acknowledgment rules for cleared alarms as needed.

Prerequisite

You have the Administrators authority or higher.

Background

u The system default automatic acknowledgment rule cannot be deleted. You can only
modify its acknowledgment mode.

u After being automatically acknowledged, cleared alarms will turn to history alarms
when the preset delay time expires. For setting the delay time, see Setting Definition of
History Alarms.

u When an alarm meets both immediate acknowledgment rules and delayed


acknowledgment rules, the UMC2 Lite acknowledges the alarm immediately.

Procedure

1. Select Alarm Settings→Server Settings→Auto Confirm from the left pane of the
Parameter Settings dialog box.

2. Set automatic alarm acknowledgment rules referring to the following table.

22 Version: 01
4 Getting Started

Operation Procedure
1. Select the Enable check box of an automatic alarm acknowledgment
rule and set Confirmation Mode.
Setting automatic 2. To set Delay Confirmation, you need to set the acknowledgment time
acknowledgment by and delay in the Delay Confirmation area. It is advised to set the
alarm level acknowledgment time to 02:00, and the delay to 1-2 days.
3. Click Apply.
4. Click OK.
1. Click New to open the Create Alarm Auto Confirmation Rule dialog
box.
2. Set parameters on the Basic information, Confirming Condition and
Setting automatic Alarm Source tabs respectively, and then click OK.
acknowledgment by 3. To set Delay Confirmation, you need to set the acknowledgment time
rule and delay in the Delay Confirmation area. It is advised to set the
acknowledgment time to 02:00, and the delay to 1-2 days.
4. Click Apply.
5. Click OK.

Other Operations

u Select a custom automatic alarm acknowledgment rule and click Edit to modify it.

u Select a custom automatic alarm acknowledgment rule and click Delete to delete it.

u Click Restore Default Configurations to restore the parameters to default values.

4.7.11 Setting Automatic Alarm Synchronization

With automatic alarm synchronization, alarms will be automatically synchronized after the
UMC2 Lite restarts or recovers from an NE communication interruption. This keeps
consistent alarm data on the UMC2 Lite and NEs.

Prerequisite

You have the Administrators authority or higher.

Procedure

1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Server Settings→Auto Synchronization.

Version: 01 23
UMC² Lite Unified Management Control Centre User Manual

The options All alarms will be synchronized when network management


service starts up and Auto Synchronize Equipment Alarm after
Communication Interruption is Restored are selected by default.

Note:

u All alarms will be synchronized when network management service starts


up: After UMC2 Lite services are started, the UMC2 Lite synchronizes
alarms with NEs and alarm services.

u Auto Synchronize Equipment Alarm after Communication Interruption is


Restored: After recovering from a communication interruption, the UMC 2
Lite issues polling commands to synchronize alarms with NEs.

u For IPRAN and POTN devices, the UMC2 Lite issues forcible
synchronization commands to synchronize alarms with them.

4.7.12 Setting Special Alarm Icons

Special alarm icons are displayed at the upper right corner of an NE icon. You can
configure special alarm icons for alarms of concern to identify them easily.

Prerequisite

You have the Administrators authority or higher.

Background

If multiple special alarms occur simultaneously, the alarms with higher priority (larger value)
will be displayed first.

Procedure

1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Server Settings→Special Icon of the Alarm.

2. Set display rules of special alarm icons and customize special alarms as needed.

3. Click Apply→OK. Then these settings take effect immediately.

24 Version: 01
4 Getting Started

4.7.13 Setting Basic Alarm Parameters

Setting basic alarm parameters allows you to acknowledge and clear alarms with one click.

Background

After setting basic alarm parameters, you can acknowledge and clear current or history
alarms with one click. This makes OAM more efficient.

Procedure

1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Server Settings→Alarm Basic Setting to open the Alarm Basic Setting dialog
box.

2. Select the Show Confirming and Clearing Alarm Function check box and click
Apply. Then this setting takes effect immediately.

Operation Result

On the Current Alarm and History Alarm tabs, select one or more alarms, right-click
them and select Confirm and Clear Alarm from the shortcut menu to acknowledge and
clear them.

4.7.14 Setting an XFTP Server

Set an XFTP server and its parameters to transmit data between the UMC 2 Lite server and
clients.

Background

An XFTP server is used for NE software management. The UMC² Lite server and clients
transfer files such as NE software packages and NE configuration files by FTP via this
server.

Prerequisite

You have the Administrators authority or higher.

Version: 01 25
UMC² Lite Unified Management Control Centre User Manual

Configuring an XFTP Server

1. In the left pane of the Parameter Settings dialog box, select Service
Configurations→XFTP Server Settings to open the XFTP Server Settings tab.

2. Click Add to add a blank row on the tab. Then set XFTP server parameters according
to the following table.

Parameter Description

Host Name Name of the host running the XFTP server, which can be customized.

Host IP IP address of the host running the XFTP server.

Click the Protocol Type field and select FTP (default), SFTP or TFTP
Protocol Type
from the drop-down list.

User Name User name for logging into the XFTP server.

Password Password for logging into the XFTP server.

Number of the port for logging into the XFTP server. It varies with protocol
types.
Port Number u Port 21 for FTP
u Port 22 for SFTP
u Port 69 for TFTP
Path for storing files on the XFTP server.
Path format:
u The symbol / denotes the root directory and ./ denotes the current
Path
directory.
u The path cannot contain a drive letter (e.g., D:) and illegal characters (?
>|"*:).

3. After all settings are done, click Apply. The new XFTP server appears on the tab.

4. Select the new XFTP server and click Test XFTP. If the prompt XFTP testing
succeeded appears, the XFTP server is properly connected.

Configuring an FTP User

1. In the left pane of the Parameter Settings dialog box, select Service
Configurations→XFTP Server Settings to view XFTP server settings.

2. Select the FTP User Management tab to view existing FTP user information.

3. Click Add to add a blank row on the tab and set FTP user parameters.

4. Enter the information of the new FTP user referring to the table below.

26 Version: 01
4 Getting Started

Parameter Description
Required. It is a string of 1 to 32 characters, which supports ASCII codes
User Name ranging from 0x21 to 0x7e.
You can add up to 50 FTP users.

Required. It is a string of 1 to 32 characters, which supports ASCII codes


Password
ranging from 0x21 to 0x7e.

Required. It is a string of 1 to 32 characters, which supports ASCII codes


Confirm Password
ranging from 0x21 to 0x7e.

Required. It is a string of 4 to 128 characters, which can only contain letters,


User Path
numerals, :, / and \.

5. Click OK to add the FTP user.

Other Operations

Select an XFTP server no longer needed and click Delete to delete it.

To modify or delete an FTP user, do as follows:

u To modify an FTP user, click Modify to update his / her information.

Note:

To modify a user path, disconnect the current FTP server and log in again;
otherwise, the changes will not take effect.

u To delete an FTP user, click Delete.

4.7.15 Setting File Export

You can set the volume size of exported files and split a large exported file into multiple
volumes of the set size.

Background

This setting takes effect immediately on the current client. After logging into the server
from the current client, all users can see the setting result.

Version: 01 27
UMC² Lite Unified Management Control Centre User Manual

Procedure

1. In the left pane of the Parameter Settings dialog box, select Service
Configurations→File Export Setting to open the File Export Setting dialog box.

2. Select the Enable check box.

3. Select a volume size from the drop-down list and click Apply. This setting takes effect
immediately.

Other Operations

Click Restore Default Configurations to restore default settings.

4.7.16 Setting a License Expiration Reminder

The UMC2 Lite provides license expiration prompts, reminding you to update your license
in time.

Prerequisite

You have the Administrators and Security Administrator Group authority.

Procedure

1. In the left pane of the Parameter Settings dialog box, select License Settings→
License Expired Tip Setting.

2. Set The remaining days of the license according to the system reference value and
click Apply→OK.

28 Version: 01
5 Security Management

Security management prevents unauthorized network access and keeps network data secure.
It covers user security policies, authorization, logs and so on.

5.1 Initial Authorization

This section introduces how to create and authorize users according to authority planning.

5.1.1 Initial Authorization Flow

After authority planning, create users by referring to Figure 5-1.

Figure 5-1 Flow of Creating a User

The UMC2 Lite provides default user groups, object sets, and operation sets. If these default
groups and sets can be applied directly, skip the first three steps.

Version: 01 29
UMC² Lite Unified Management Control Centre User Manual

5.1.2 Customizing Object Sets

If custom object sets are planned, you should create them before authorizing user groups.

Prerequisite

u You have the Security Administrator Group authority.

u Object sets have been planned.

Procedure

1. Choose Security→NMS User Management in the main menu. Right-click Object


Set in the left pane and select Create Object Set from the shortcut menu.

2. Set basic information of an object set.

Set the name and description of an object set on the Basic Information tab of the
Create Object Set dialog box.

3. Set members of the object set.

1) On the Member tab, click Select to open the Select Management Domain
dialog box.

2) In the Object to be Selected area, select members as planned, click to


add them to the Selected Object area, and click OK.

Note:

u Members in an object set are classified by global logical domain, NE or NE


type.

u For easy authority maintenance, you are advised to copy members from an
existing object set to a new one as follows. Nesting an object set into a new
one should be avoided.

1) Click Copy Member from Object Set in the Create Object Set
dialog box.

2) Select one or more existing object sets in the Select Object Set
dialog box, and copy their members to the Member tab of the current
object set.

30 Version: 01
5 Security Management

Other Operations

To adjust members of an existing object set, click Select at the lower right corner of its
Member tab. In the displayed dialog box, adjust its members.

5.1.3 Customizing Operation Sets

If custom operation sets are planned, you need to create them before authorizing user
groups.

Prerequisite

u You have the Security Administrator Group authority or higher.

u Operation sets have been planned.

Procedure

1. Select Security→NMS User Management from the main menu. Right-click


Operation Set in the left pane and select Create Operation Set from the shortcut
menu.

2. Set basic information of an operation set.

On the Basic Information tab of the Create Operation Set dialog box, set the name,
type, and description of an operation set. Its type is NMS Application by default.

NMS Application: Includes various network management application operations


corresponding to UMC2 Lite functions irrelevant to NEs.

3. Set members of the operation set.

1) On the Member tab of the Create Operation Set dialog box, click Select to
open the Select Operation dialog box.

2) In the Operation to Be Selected area, select members as planned, click


to add them to the Selected Operation area, and click OK.

Version: 01 31
UMC² Lite Unified Management Control Centre User Manual

Note:

For easy authority maintenance, you are advised to copy members from an
existing operation set to a new one as follows. Nesting an operation set into a
new one should be avoided.
1. Click Copy Member from Operation Set in the Create Operation Set
dialog box.

2. In the Select Operation Set dialog box, select one or more existing
operation sets, and copy their members to the Member tab of the current
operation set.

Other Operations

To adjust members of an operation set, click Select at the lower right corner of its Member
tab. In the displayed dialog box, adjust its members.

5.1.4 Customizing User Groups

If custom user groups are planned, you need to create them before authorizing new users.

Prerequisite

u You have the Security Administrator Group authority or higher.

u User groups have been planned.

Procedure

1. Select Security→NMS User Management from the main menu. Right-click User
Group in the left pane and select Create User Group from the shortcut menu.

2. Set basic information of a user group.

1) In the Create User Group dialog box, set the name, type, description and
maximum session count of a user group on the basic information tab.

32 Version: 01
5 Security Management

Note:

User group types include ordinary user groups and subdomain security
administrator groups. The latter only has security management authority, which
cannot be modified.

2) (Optional) Set the member of the user group. Click Select to open the Select
User dialog box, select desired users, and click OK.

Note:

Users are added to a user group in the following ways:


u Select desired users when creating a user group. These users belong to this
user group after creation.

u Select a desired user group when creating a user. This user belongs to the
selected user group after creation.

u An existing user can be bound with an additional user group on its User
Group tab. An existing user group can be added with more users on its
Member tab.

3. Set a management domain for the user group.

1) Click Select on the Management Domain tab of the Create User Group
dialog box.

2) In the Select Management Domain dialog box, select a management domain


for the user group, and click OK.

The management domain tree contains two global logical domains under different
nodes, which, if being selected, lead to different management domain ranges.

¡ Global logical domain under the Device node: Authorization to this domain
means authorization to existing devices in this domain. When a device is
added to this domain, it will not be dynamically added to the management
domain.

¡ Global logical domain under the Global logical domain node:


Authorization to this domain means authorization to all devices in this

Version: 01 33
UMC² Lite Unified Management Control Centre User Manual

domain. When a device is added to this domain, it will be dynamically


added to the management domain.

4. Set the operation authority of the user group.

1) On the Operation Authority tab of the Create User Group dialog box, click
Select.

2) Select desired authority in the Select Operation Authority dialog box, and click
OK.

Note:

u Authorized objects selected in the Authorized Object box determine


available operation authority displayed in the Optional Authority area.

u You can select an operation set in the Optional Authority area and click
on the top of the area to view operations included in this operation set.

5. After all settings are done, click OK in the Create User Group dialog box.

Related Operations

To adjust the authority of an existing user group, click Select at the lower right corner of
the Management Domain or Operation Authority tab. In the displayed dialog box,
adjust the management domain or operation authority of this user group.

5.1.5 Creating and Authorizing Users

You can create and authorize the UMC2 Lite users to play different roles.

Prerequisite

u You have the Security Administrator Group authority.

u User authority has been planned.

Background

u For clear authority / responsibilities and easy maintenance, it is recommended to


authorize users by binding them with user groups.

34 Version: 01
5 Security Management

u The username and password of a new user are required while its other attributes can
keep the defaults or be set later.

u The username and password of a new user should meet account and password policies.

Procedure

1. Select Security→NMS User Management from the main menu. Right-click User in
the left pane and select Create User from the shortcut menu.

2. In the Create User dialog box, set basic information, user group and other information
of the user referring to the table below, and click OK.

Table 5-1 Basic Information

Parameter Description
Username Sets the user name in the text box.
Real Name (Optional) Sets the real name of a user in the text box.

Employee Number (Optional) Sets the employee ID of a user in the text box.

Contact (Optional) Sets the employee ID of a user in the text box.

Description (Optional) Describes an account briefly to distinguish it from others.

Unit (Optional) Sets the name of the organization a user works for.

Sets one or more roles for a user. Default: Unm Account selected.
u Unm Account allows logging into the UMC² Lite and operating the system with proper
Role Type permissions.
u Interface Account allows logging into a northbound interface via the UMC² Lite and operating
the system with proper permissions.

Password Sets the password of a user following password policies set in System→Parameter Settings.

Confirm Password Reenter the user's password.

Modify Password on (Optional) If this item is selected, the current user will be requested to modify his / her password upon
Next Login next login.

User Cannot Modify


(Optional) If this item is selected, the current user cannot modify his / her password via a client.
the Password
Account Disabled
(Optional) If this item is selected, the current user cannot log into a client.
Temporarily

Sets the number of days during which a password is valid.


Password Valid Days u If Expire Days of System Password is selected, the number of valid days is 180.
u If Custom is selected, set the number of valid days in the range of 2 to 999 days.

Version: 01 35
UMC² Lite Unified Management Control Centre User Manual

Table 5-2 Basic Information (Advanced)

Parameter Description
(Optional) Sets the maximum number of concurrent online users.
Maximum Online u If Unlimited is selected, the system does not limit the number of concurrent online users.
Number u If Unlimited is deselected, set Maximum Online Number. Default: 30.
Value range: 0 to 255.

(Optional) Sets a waiting period before automatic logout, which is disabled by default.
u If Stop the Auto Exit is selected, a user will not be logged out automatically.
Exit after waiting for a
u If Stop the Auto Exit is deselected, set a waiting period before automatic logout. If a terminal is
period (minutes) of
not operated in a specified period, the user on the terminal will be automatically logged out.
Value range: 5 to 600 minutes.

(Optional) Sets the policy for handling accounts that do not log in for a long time. This policy is
disabled by default.
u If Enable is deselected, the policy is disabled.
Unlogged User Policy
u If Enable is selected, choose Disabled or Delete from the drop-down box and set the number of
inactive days. If the current account remains inactive for the specified number of days, it will be
disabled or deleted. Value range: 1 to 300 days.

(Optional) Sets the time range allowed for login. This policy is disabled by default.
u If Enable is deselected, login time is unlimited.
Login Time Range
u If Enable is selected, set a login time range, including date, time and days of the week. In this
case, the current user can log in only within the specified time range.

Table 5-3 User Group

Parameter Description

Select the User Group tab. The list below shows all user groups to which the user belongs. The user has
access to all management domains and operation authority of these groups.
u Click Select to open the Select User Group dialog box. Select desired user groups from the list and
User Group click OK to save the settings.
u Select one or more user groups in the User Group list and click Delete to unbind the user from these
groups. After deletion, the user no longer has access to management domains or operation authority of
these groups.

36 Version: 01
5 Security Management

Table 5-4 Management Domain

Parameter Description

Select the Management Domain tab. The list below shows all managed objects within a user's
management domain. The user can only manage these objects. A valid management domain is a union of
selected devices, device types, object sets and global logical domains.
u Click Select to open the Select Management Domain dialog box. Then select one or more NE
objects from the following to make up the user's Management Domain.

4 Device: Select one or more NEs and add them to the management domain of this user.
Management 4 Device type: Select one or more NE types. The UMC² Lite automatically adds NEs of such types
Domain to the management domain of this user.

4 Global logical domain: Select one or more logical domains. The UMC² Lite automatically adds
NEs in these domains to the management domain of this user.

4 Object set: Select one or more object sets. The UMC² Lite automatically adds NE objects in these
sets to the management domain of this user.

u Select one or more objects in the Management Domain list and click Delete. The user then has no
access to these deleted objects.

Table 5-5 Operation Authority

Parameter Description

Select the Operation Authority tab. The list below shows all operations available to the user.
u Click Select to open the Select Operation Authority dialog box and select NMS Application. Then
select one or more operations from the following to make up the user's Operation Authority.

Operation 4 Operation set: Select one or more operation sets. Then the UMC² Lite automatically adds
Authority operations in these sets to operation authority of this user.

4 Operation: Select one or more operations and add them to operation authority of this user.
u Select one or more operations in the Operation Authority list and click Delete to delete them from
this user. The user then has no permissions for these deleted operations.

Table 5-6 Access Control List

Parameter Description

Set Access Control List of the user. The user can log into the UMC² Lite only through IP addresses in this
list.
Access Control u If Use All Access Control Lists in the System is selected, the IP addresses set in System→
List Parameter Settings→Access Control List apply to this user automatically.
u If Use the Following Specified Access Control List is selected, specify IP addresses for this user
as desired.

Version: 01 37
UMC² Lite Unified Management Control Centre User Manual

5.2 Querying Authority

By querying authority, you can check authority of users after initial authorization or during
authority maintenance.

5.2.1 Viewing the Management Domain of a User or User


Group

A security administrator can view the management domain of a user or user group to
determine managed objects.

Prerequisite

You have the Security Administrator Group authority.

Procedure

1. Select Security→NMS User Management from the main menu.

2. On the NMS User Management browse tree, expand the User or User Group node,
and select a user or user group.

3. View managed objects on the right Management Domain tab.

The table below describes how to view a management domain by managed object.
Managed Object How to View

Device Expand the Device node and view managed devices.

Device Type Expand the Device Type node and view managed device types.

Expand the Global Logic Domain node and view selected global
Global Logic Domain
logical domains.

Expand the Object Set node and view selected object sets and
Object Set
specific managed objects in these sets.

5.2.2 Viewing Operation Authority of a User or User Group

A security administrator can view operation authority of a user or user group to determine
operation authority for managed objects.

38 Version: 01
5 Security Management

Prerequisite

You have the Security Administrator Group authority.

Procedure

1. Select Security→NMS User Management from the main menu.

2. On the NMS User Management browse tree, expand the User or User Group node,
and select a user or user group.

3. On the right Operation Authority tab, expand an object node to view operation
authority assigned to the user or user group.

Note:

If Display Authority of Attributed User Group is selected, displayed


operation authority includes the operation authority inherited from bound user
groups. Such inherited operation authority is greyed out and cannot be deleted
on this Operation Authority tab.

5.2.3 Viewing User Groups to Which a User Belongs

A security administrator can view user groups to which a user belongs and check his / her
authority inherited from these user groups.

Prerequisite

You have the Security Administrator Group authority.

Background

A user can belong to multiple user groups and inherit all the management domains and
operation authority of them.

Procedure

1. Select Security→NMS User Management from the main menu.

2. On the NMS User Management browse tree, expand the User node, and select a
user.

Version: 01 39
UMC² Lite Unified Management Control Centre User Manual

3. View the user groups to which the user belongs on the right User Group tab.

5.2.4 Viewing Users / User Groups Bound to an Operation Set

This section introduces how to check the users or user groups to which the operation
authority of an operation set is assigned.

Prerequisite

You have the Security Administrator Group authority.

Procedure

1. Select Security→NMS User Management from the main menu.

2. On the NMS User Management browse tree, expand the Operation Set node, and
select an operation set.

3. View the users / user groups bound to the operation set on the right Service For tab.

5.2.5 Viewing Operations Included in an Operation Set

A security administrator can view specific authority of an operation set to determine


whether such authority meets planning requirements.

Prerequisite

You have the Security Administrator Group authority.

Background

An operation set can include operation subsets. The authority of an operation set is a union
of its operation subsets and specific operations.

Procedure

1. Select Security→NMS User Management from the main menu.

2. On the NMS User Management browse tree, expand the Operation Set node, and
select an operation set.

40 Version: 01
5 Security Management

3. View specific authority in the operation set on the right Member tab.

Note:

If an operation set includes operation subsets, check specific operations in each


operation subset to learn about all the operations included in this operation set.

5.2.6 Viewing Objects in an Object Set

A security administrator can view objects in an object set to determine whether they meet
planning requirements.

Prerequisite

You have the Security Administrator Group authority.

Background

An object set can include object subsets. The valid management domain of an object set is a
union of selected devices, device types, global logical domains, and object subsets.

Procedure

1. Select Security→NMS User Management from the main menu.

2. On the NMS User Management browse tree, expand the Object Set node, and
select an object set.

3. View specific managed objects in the object set on the right Member tab.

The valid management domain of an object set is a union of selected devices, device
types, global logical domains, and object subsets.

4 Expand the Device node and view specific devices under the Device node.

4 Expand the Device Type node and view specific device types under the Device
Type node.

4 Expand the Global Logic Domain node and view global logical domains
included in the object set. Then go to the Main Topology tab, and view specific
devices included in these global logical domains.

Version: 01 41
UMC² Lite Unified Management Control Centre User Manual

4 Expand the Object Set node and view object subsets in the object set. To view
specific devices included in these object subsets, refer to Steps 2 to 3.

5.3 User Security Management

You can effectively improve the security of the UMC2 Lite and prevent unauthorized
operations by means of password management, lockout management, and active user
monitoring.

5.3.1 Logging Out Users

This section introduces how to log out the current user.

Procedure

1. Select System→Logout from the main menu.

2. In the dialog box that appears, click Yes. Then the current user is logged out, and the
UMC² Lite is restarted and displays a login dialog box.

Related Operations

To log out of a locked client, click Logout in the The window is locked dialog box. Then
click Yes in the alert box that appears.

5.3.2 Modifying User Passwords

To ensure secure access to the UMC2 Lite, it is recommended to modify your password
regularly.

Prerequisite

You have learned about password policies.

Procedure

1. Click and select User Settings from the drop-down menu.

42 Version: 01
5 Security Management

2. Click Modify next to Password Management, and set Old Password, New
Password and Confirm Password below.

Note:

u A new password must comply with password policies. Otherwise, the


system will display an error prompt.

u Old Password, New Password and Confirm Password support pasting


and are displayed in ciphertext.

3. Click OK.

5.3.3 Reminding Users to Modify Expired Passwords

When your password expires, the system will remind you to modify your password
manually.

Background

u You have set a password expiration reminder.

u You have set the lifespan of passwords.

Procedure

1. Log into the UMC² Lite using an expired password. An alert box appears, showing that
the password has expired.

2. Click Close in the alert box. In the Modify User Current Password dialog box that
appears, set a new password.

3. In the dialog box, enter the old password and new password (entered twice for
confirmation), and click OK.

4. Log in using the new password.

5.3.4 Resetting User Passwords

If a user password is forgotten, expired or denied access to the UMC 2 Lite, it can be reset by
a security administrator.

Version: 01 43
UMC² Lite Unified Management Control Centre User Manual

Background

u A user in Security Administrator Group can reset the passwords of all users except
admin, other security administrators, and himself / herself.

u The password of a security administrator can be reset by admin.

u The admin user cannot reset his / her own password, and hence should keep it
properly.

Procedure

1. Select Security→NMS User Management from the main menu.

2. On the NMS User Management browse tree, expand the User node. Right-click a
desired user and select Reset Password from the shortcut menu.

3. In the Reset Password dialog box, set New Password and Confirm Password,
and then click OK.

Note:

If the Modify the Password at Next Login check box is selected


(recommended for higher security), the user must change his or her password
upon next login.

5.3.5 Unlocking Users

If a user is automatically locked due to consecutive input of wrong passwords, he / she can
be automatically unlocked after Auto Unlock Time elapses, or manually unlocked by a
security administrator. Unlocked users can log into the UMC2 Lite.

Background

u A user is automatically locked after consecutive input of wrong passwords. Such


locked user cannot log into the UMC2 Lite.

u A user in Security Administrator Group can unlock all users except admin and
other security administrators.

u A security administrator can be unlocked by admin.

44 Version: 01
5 Security Management

u The admin user cannot be manually unlocked, and hence should keep his or her
password properly.

Procedure

Users can be unlocked in two modes on the UMC2 Lite.

Unlocking Modes Description

A user is manually unlocked as follows.


1. Select Security→NMS User Management from the main menu.
Manual unlocking
2. On the NMS User Management browse tree, expand the User node.
3. Right-click a desired user and select Unlock from the shortcut menu.

Automatic A locked user cannot log in until it is automatically unlocked after a specified
Note 1
unlocking time period.

Note 1: Auto Unlock Time is set in Account Policy.

5.3.6 Locking User Groups

Users in a locked user group cannot log into the UMC2 Lite.

Prerequisite

You have the Security Administrator Group authority or higher.

Procedure

1. Choose Security→NMS User Management from the main menu. Click User
Group in the left pane to expand the User Group node.

2. Right-click a user group such as Inspector Group and select Lock from the shortcut
menu.

Note:
If a user in a locked user group tries to log in, the UMC² Lite will prompt that
his or her user group is locked. That group needs to be unlocked to enable login.

Version: 01 45
UMC² Lite Unified Management Control Centre User Manual

5.3.7 Unlocking User Groups

A user group can be unlocked on the UMC2 Lite.

Prerequisite

You have the Security Administrator Group authority or higher.

Procedure

1. Choose Security→NMS User Management from the main menu. Click User
Group in the left pane to expand the User Group node.

2. Right-click a user group such as Inspector Group and select Unlock from the
shortcut menu.

5.3.8 Monitoring User Activities

This section introduces how to monitor user activities to prevent unauthorized operations.

Prerequisite

You have the Security Administrator Group authority.

Procedure

1. Select Security→NMS User Management from the main menu.

2. On the NMS User Management browse tree, expand the User node.

4 Check activity information of all users.

Click User, and check activity information of all users in the right pane.

4 Check activity information of a single user.

Click a user under the User node, and click Activity Info in the right pane to see
his or her activity information.

46 Version: 01
5 Security Management

5.4 Log Management

By querying or collecting logs, you can learn about UMC2 Lite running status, system
security, and specific user operations.

5.4.1 Log Management Policies

Log management includes managing system logs, operation logs and security logs. With
log management, administrators can trace and review user operations, and learn about user
activities and system running status.

System Logs

By viewing system logs, you can identify the risks that affect the running of the UMC² Lite
and handle them promptly to keep the UMC² Lite working well.

Operation Logs

By viewing operation logs, you can trace and review the operations performed by users on
the UMC² Lite.

Security Logs

By viewing security logs, you can learn about security-related operations performed by
users on the UMC² Lite, and take actions accordingly to keep the UMC² Lite secure.

Log Exporting

Logs are periodically exported to servers to allow easy access. Logs can be exported in TXT,
CSV, XML, HTML, PDF and EXCEL formats.

5.4.2 Querying System Logs

By querying logs, you can learn about UMC2 Lite running status, system security, and
specific user operations.

System logs record operations automatically performed by the UMC² Lite.

Version: 01 47
UMC² Lite Unified Management Control Centre User Manual

Background

u Logs are queried based on existing data in the database. If the database is empty, no
data is shown in query results.

u System logs are queried based on authority and domain. That is, they are only
accessible to users having permissions to query system logs.

Procedure

1. Select Security→Query System Logs from the main menu to open the System
Logs tab. The table below describes related parameters.

Table 5-7 Parameters of System Logs

Parameter Description

No. Serial number of a log

Danger Level Danger level of a log, including Prompt, Normal and Danger

Source Module that performs an operation

Time Time when an operation is executed

Operation
Terminal where an operation is performed
Terminal
Result of an operation: Success, Failed and Partial Success
u Success: An operation is successful and all operation results are returned.
Operation
u Failed: An operation fails and an error code is returned.
Result
u Partial Success: An operation partially succeeds, and all operation results are
returned.
Details Other information of an operation

2. Click Query. Set query criteria in the displayed dialog box and click OK.

Other Operations

To query logs by template, click Query According to Template, and select a desired
template in the Select Template dialog box.

5.4.3 Querying Operation Logs

By querying logs, you can learn about UMC2 Lite running status, system security, and
specific user operations.

48 Version: 01
5 Security Management

Operation logs record all operations on clients except those affecting the security of the
UMC² Lite.

Background

u Logs are queried based on existing data in the database. If the database is empty, no
data is shown in query results.

u Operation logs are queried based on authority and domain.

4 The admin user or users in the Administrators group can query operation logs of
all users.

4 Users in Security Administrator Group with the authority of querying


operation logs can query operation logs of all users.

4 Ordinary users that have the authority of querying operation logs but belong to
neither the Administrators group nor Security Administrator Group can only
query their own operation logs.

u The operation logs of the users deleted from user groups can be queried and obtained
by filtering.

Procedure

1. Select Security→Query Operation Logs from the main menu to open the Operation
Logs tab. The table below describes related parameters.

Table 5-8 Parameters of Operation Logs

Parameter Description

No. Serial number of a log

Operation
Name of an operation
Name
Danger Level Danger level of an operation, including Prompt, Normal and Danger.

User Name Name of the user who performs an operation

Login Mode Login mode of a user


User Type Type of a user

Operation Time Time when an operation is performed

Operation
Terminal where an operation is performed
Terminal
Operation
Object on which an operation is performed
Object

Version: 01 49
UMC² Lite Unified Management Control Centre User Manual

Table 5-8 Parameters of Operation Logs (Continued)

Parameter Description

Result of an operation: Success, Failed and Partial Success


u Success: An operation is successful and all operation results are returned.
Operation
u Failed: An operation fails and an error code is returned.
Result
u Partial Success: An operation partially succeeds, and all operation results are
returned.
Details Detailed information of an operation

2. Click Query. Set query criteria in the displayed dialog box and click OK.

Other Operations

To query logs by template, click Query According to Template, and select a desired
template in the Select Template dialog box.

5.4.4 Querying Security Logs

By querying logs, you can learn about UMC2 Lite running status, system security, and
specific user operations.

Security logs record all security-related operations on clients.

Background

u Logs are queried based on existing data in the database. If the database is empty, no
data is shown in query results.

u Security logs are queried based on authority and domain.

4 Users in Security Administrator Group can query all users' security logs.

4 Users in Subdomain Security Administrator Group can query security logs of


their own and their managed users.

4 Users with the authority of querying security logs can query security logs of their
own.

50 Version: 01
5 Security Management

Procedure

1. Select Security→Query Security Logs from the main menu to open the Security
Logs tab. The table below describes related parameters.

Table 5-9 Parameter Description

Parameter Description

No. Serial number of a log

Security Event Name of a security event

Danger Level Danger level of an operation, including Prompt, Normal and Danger.

Username Name of the user who performs an operation

Login Mode Login mode of a user


User Type Type of a user

Operation Time Time when an operation is performed

Operation
Terminal where an operation is performed
Terminal
Operation
Object on which an operation is performed
Object

Result of an operation: Success, Failed and Partial Success


u Success: An operation is successful and all operation results are returned.
Operation
u Failed: An operation fails and an error code is returned.
Result
u Partial Success: An operation partially succeeds, and all operation results are
returned.
Details Other information of an operation

2. Click Query. Set query criteria in the displayed dialog box and click OK.

Other Operations

To query logs by template, click Query According to Template, and select a desired
template in the Select Template dialog box.

5.4.5 Setting Log Templates

By setting log templates, you can query system logs, operation logs, and security logs
quickly.

Version: 01 51
UMC² Lite Unified Management Control Centre User Manual

Background

u Select Security→Query System Logs from the main menu. Click Query
According to Template to set a template.

u Select Security→Query Operation Logs from the main menu. Click Query
According to Template to set a template.

u Select Security→Query Security Logs from the main menu. Click Query
According to Template to set a template.

Prerequisite

You have the Operator Group authority or higher.

Various log query and collection templates are set in a similar way. The following gives an
example of how to set a template for querying system logs.

Procedure

1. In the main menu, select Security→Query System Logs.

2. On the System Logs tab, perform the following operations as needed.

Operation Procedure
1. Click Query.
Creating a 2. In the Query System Logs dialog box, set filter criteria, and click Save as
template Template.
3. In the Save as Template dialog box, enter a template name and click OK.

1. Click Query.
2. In the Query System Logs dialog box, click Select Template.
Modifying a 3. In the Log Template Management dialog box, select a template, and click OK.
template 4. In the Query System Logs dialog box, adjust the query criteria of the log
template, and click Save.
5. In the Select an Item dialog box, click No and modify the template information.

1. Click Query.
Deleting a 2. In the Query System Logs dialog box, click Select Template.
template 3. In the Log Template Management dialog box, select a template, and click
Delete.

52 Version: 01
6 Alarm Management

The UMC2 Lite provides powerful alarm management. It monitors faults and exceptions in
real time during device operation, and provides detailed description and analysis of alarms,
helping you identify and clear faults quickly.

6.1 Setting Alarm Rules

With alarm rules configured, the UMC2 Lite processes alarms efficiently based on these
rules.

6.1.1 Setting Alarm Reporting Rules

By setting alarm reporting rules, you can enable devices to report important alarms and set
prompt tones for them. Then you can monitor them in the alarm report window.

Background

u The alarms meeting reporting rules can be monitored in the alarm report window.
These rules do not affect alarm report to the UMC² Lite.

u Alarm reporting rules are specific to users. After logging in, users can only view the
alarm reporting rules set by themselves.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select Alarm→Setting→Alarm Reporting Settings from the main menu to display


the Alarm Reporting Setting tab.

2. Perform the following operations as desired.

Version: 01 53
UMC² Lite Unified Management Control Centre User Manual

Operation Procedure
1. Click Report Rule in the left pane, and click Create in the right pane.
Creating alarm reporting 2. In the Create Alarm Report Rule dialog box, set alarm reporting rules
rulesNote 1 as planned.
3. Click OK.
1. Select a rule in the left pane, and modify its parameters as required in
Modifying alarm
the right pane.
reporting rules
2. Click Save All.
1. Click Report Rule in the left pane, and select a rule in the right pane.
Note 2
Deleting alarm reporting
rules 2. Click Delete and then click Yes in the Delete Rule alert box that
appears.

Enabling / disabling
Right-click a rule and select Enable / Disable from the shortcut menu.
alarm reporting rules
Note 1:

u Click Copy from Other Rule, and select a reporting rule in the Select the Report Rule
dialog box to copy its settings. This improves setting efficiency.

u If continuous reporting is enabled, the alarms meeting reporting rules will be reported
again after the set time interval expires.

u If you select Set a Sound on the Sound Settings tab and select a sound file, the system
plays the sound file when a matching alarm is reported.
Note 2: Hold down Shift or Ctrl to select multiple rules simultaneously.

6.1.2 Setting Alarm Masking Rules

You can set alarm masking rules to mask certain alarms. So you can focus on important
alarms and troubleshoot faults efficiently.

Prerequisite

u You have the Operator Group authority or higher.

4 Users in the Administrators group can view, modify and delete all rules.

4 Users in other groups can modify and delete the rules created by themselves, and
can only view the rules created by others.

u Alarm masking rules have been planned.

54 Version: 01
6 Alarm Management

Procedure

1. Select Alarm→Setting→Alarm Shield Rule from the main menu to open the Alarm
Shield Rule tab.

2. Perform the following operations as desired.

Table 6-1 Operation Description

Operation Procedure
1. Click Current Alarm Shield Rule in the left pane and click Create in
the right pane.
Creating a current alarm
2. In the Create Current Alarm Shield Rule dialog box, set parameters
masking rule
as planned. For details, see Table 6-2Note 1.
3. Click OK.
1. Select a rule in the left pane, and modify its parameters as required in
Modifying a current
the right pane.
alarm masking rule
2. Click Save All.
1. Click Current Alarm Shield Rule in the left pane, and select a rule in
Deleting a current alarm the right pane.Note 2
masking rule 2. Click Delete and then click Yes in the Delete Rule alert box that
appears.

Enabling / disabling a
current alarm masking Right-click a rule and select Enable / Disable from the shortcut menu.
rule
Note 1: You can click Copy from Other Rule, and select a rule in the Rule Select dialog box to copy
its settings. This improves setting efficiency.
Note 2: Hold down Shift or Ctrl to select multiple rules simultaneously.

Table 6-2 Parameters of Creating a Current Alarm Masking Rule

Parameter Description

Rule Name (Required) Sets the name of the current alarm masking rule.
Basic
Rule Type (Grayed out) It is Current Alarm Shield Rule by default.
Information
Rule Remarks Sets the remark information of the current alarm masking rule.

Enable Sets whether to enable the current alarm masking rule.

Version: 01 55
UMC² Lite Unified Management Control Centre User Manual

Table 6-2 Parameters of Creating a Current Alarm Masking Rule (Continued)

Parameter Description
Sets whether to clear existing current alarms on the UMC² Lite.
u If Clear current alarms that have occurred in the
network management system is selected,

4 Current alarms occurring after the alarm masking rule is


set are blocked.

4 Existing current alarms meeting the masking rule are


automatically cleared and acknowledged. After the set
delay expires, these current alarms are converted to
Clear Existing
history alarms.
Alarms
4 After existing current alarms are automatically cleared as
per the masking rule, such clearance is reported to a
northbound interface, and hence these alarms are cleared
on an upper-layer network management system as well.

u If Clear current alarms that have occurred in the


network management system is deselected, the system
only blocks the current alarms occurring after the alarm
masking rule is set.

Sets the way to handle masked alarms.


u Discard: Masked alarms are discarded. They are neither saved
into the database nor reported to a northbound interface.
u Set Mask Status:

Shield Alarm
4 By default, masked alarms are not reported to an upper-
layer network management system via a northbound
Handing WayNote 1
interface. Such report can be enabled through a
northbound interface switch.

4 By default, masked alarms are not displayed on the alarm


GUI. They can be queried through set alarm query
criteria.
Alarm Name Sets one or more alarm names to be masked.
Alarm Level Sets one or more alarm levels to be masked.
Shield
Alarm Type Sets one or more alarm types to be masked.
Conditions
ONU Service
Sets the service class of ONUs.
Level
Alarm Source Sets the type of alarm sources and adds alarm sources.

Effective Sets the start and end dates of the range during which the masking
Date Range
Time rule is effective.

56 Version: 01
6 Alarm Management

Table 6-2 Parameters of Creating a Current Alarm Masking Rule (Continued)

Parameter Description
Sets the start and end time of the range during which the masking
Time Range
rule is effective.
Weekdays Sets the week days on which the masking rule is effective.

Time Zone of the


Sets the time zone where the server is located.
Server
Sets the hold-off time (in seconds) for reporting a received alarm. If
Alarm Delay
an alarm is cleared in this period, it will be masked.

Note 1: If an alarm is set to Discard in one rule and set to Set Mask Status in another, it is discarded.

Other Operations

In the right pane of the Alarm Shield Rule Management tab, right-click an alarm
masking rule and select Copy, Refresh, Export or other operation options from the
shortcut menu.

6.2 Managing Alarm / Event Templates

You can set alarm / event templates on the UMC2 Lite to save alarm / event query or
collection criteria. These templates simplify operations and facilitate alarm / event query or
collection.

6.2.1 Alarm / Event Templates

This section introduces alarm / event templates, including the background, template types,
and available template states.

Background

The UMC2 Lite monitors alarms / events on all FiberHome devices. However, users
generally only care about some key alarms or events affecting their local networks. So they
need to identify and monitor these alarms or events efficiently in routine maintenance. In
this way, network exceptions can be detected, located and removed promptly, keeping
networks running well.

Version: 01 57
UMC² Lite Unified Management Control Centre User Manual

Functions

The system allows customizing alarm / event templates as follows.

u You can get the alarms or events you care about by specifying their names, levels and
types in a template. Various templates can be customized to cater for query or
collection demands in different scenarios. In routine maintenance, you can quickly
initiate alarm / event monitoring using custom templates, rather than spending a lot of
time in searching from massive data. This enhances OAM efficiency. The table below
describes the templates supported by the UMC2 Lite.

Table 6-3 Template Types

Template Function
Current alarm query Saves current alarm query criteria as a template, which can be used for
template querying current alarms later on.
Alarm query template
History alarm query Saves history alarm query criteria as a template, which can be used for
template querying history alarms later on.
Event report query Saves event report query criteria as a template, which can be used for
Event query template
template querying event reports later on.

u You can set template states to allow alarm monitoring and proactive warning from
different perspectives, so as to detect network exceptions promptly. The table below
describes the template states supported by the UMC2 Lite.

Table 6-4 Template States

Template State Description

Default alarm collection template applied after the UMC² Lite starts up. The Alarm Statistics
dialog box opened via the client toolbar displays alarm data according to this template.
Monitoring template
Only current alarm query templates can be set as monitoring templates. By default, up to five
monitoring templates can be configured.

Template applied when an alarm / event query or collection tab is opened. Each alarm / event
Default template
query or collection tab can be configured with only one default template.

6.2.2 Managing Alarm Templates

This section introduces how to manage alarm templates.

58 Version: 01
6 Alarm Management

6.2.2.1 Setting Other Alarm Parameters

This section introduces how to set the maximum number of monitoring templates, the
maximum number of startup templates and the startup rule of the automatic alarm reporting
window.

Procedure

1. Select System→Parameter Settings from the main menu to open the Parameter
Settings dialog box.

2. Select Alarm Settings→Local Settings→Others in the left pane.

3. Set parameters as required and click Apply. Then the settings take effect immediately.

4. Click OK.

6.2.2.2 Creating Alarm Templates

To create an alarm template, you can save query / collection criteria as a template in the
alarm query / collection window, or directly create one on the Alarm Query Template
Management tab. Various alarm templates are created in a similar way. This section
introduces how to create a current alarm query template for example.

Background

Different alarm query templates can be created by specifying alarm names, levels and states
to cater for varying alarm query requirements.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. In the main menu, select Alarm→Alarm Query Template to open the Alarm Query
Template tab.

2. Select Current Alarm Query Template in the left pane, and click Create Current
Alarm Query Template in the right pane.

3. Set parameters in the Create Current Alarm Query Rule dialog box as needed.

Version: 01 59
UMC² Lite Unified Management Control Centre User Manual

Parameter DescriptionNote 1

Basic Information Sets the template name and remarks as needed. The name must be unique.

Sets alarm filtering criteria by selecting alarm names, levels, types, statuses,
Filter Info
and clearing types.

Alarm Source Sets alarm sources as needed.


Sets alarm filter criteria like user information, alarm acknowledgment time,
Advanced Filter Info
duration, and alarm project status.

Note 1: You can click Copy from Template to copy all settings except Template Name from
another template. This improves setting efficiency.

4. Click OK.

Other Operations

Operation Procedure
Select an alarm template under the Alarm Template node in the
Modifying an alarm template left pane, and modify its parameters in the right pane. Then click
Apply.

Right-click an alarm template under the Alarm Template node in


Deleting an alarm template the left pane, and select Delete from the shortcut menu. Click Yes
in the alert box that appears.

Right-click an alarm template under the Alarm Template node in


Setting / canceling a default
the left pane, and select Set admin Default Template or Cancel
templateNote 1
admin's Default Template from the shortcut menu.

Right-click an alarm template under the Alarm Template node in


Setting / canceling a monitoring
the left pane, and select Set to Monitor Template or Cancel
templateNote 2
Monitoring Template from the shortcut menu.

Note 1: The template icon indicates that the current template has been set as the admin user's
default template, which is used to query current alarms by default.
Note 2: Up to five monitoring templates can be set. After a template is set, the alarm panel at the upper
right corner of the UMC² Lite GUI counts alarms according to this template.

6.2.2.3 Setting Alarm Template States

On the UMC² Lite, you can set an alarm monitoring template to facilitate monitoring,
querying or collecting alarms.

60 Version: 01
6 Alarm Management

Background

The Alarm Statistics dialog box opened via the client toolbar displays alarm data
according to a monitoring template. A monitoring template must be a current alarm query
template. You can set up to five monitoring templates by default.

Note:

Click on the toolbar to open the Alarm Statistics dialog box. After a
monitoring template is set as the current template, the alarm indicators in four
colors on the toolbar display the number of alarms at each level according to
this current template.

Prerequisite

u You have the Operator Group authority or higher.

u You have created an alarm query template.

Procedure

1. Select Alarm→Alarm Query Template from the main menu.

2. Perform the following operations as desired.

Operation Procedure
1. In the left pane of the Alarm Query Template tab, select Monitor
Template Management.
2. Right-click a blank area of the right pane and select Select from the
Setting a monitoring shortcut menu, or click the Select button at the lower right corner.
template 3. In the Select Template dialog box, select a current alarm query
template and click OK to set it as a monitoring template.
4. Select a monitoring template and click Delete Template Settings to
clear the monitoring template settings.

In the left pane of the Alarm Query Template tab, right-click an existing
Setting an alarm
template and select Set ** Default Template / Cancel **'s Default
template as a default
Template from the shortcut menu. Here ** refers to the creator of this
template
template.

Version: 01 61
UMC² Lite Unified Management Control Centre User Manual

6.2.3 Managing Event Templates

This section introduces how to manage event templates.

6.2.3.1 Creating Event Templates

To create an event query template, you can save query criteria as a template in the event
query window, or directly create one in the Event Query Template Management
window. This section introduces the operation steps for the latter approach.

Background

u Different event query templates can be created by specifying event names, levels, and
generation time to cater for varying event query requirements.

u The UMC2 Lite provides a default All Objects event query template that cannot be
copied, deleted, and modified.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select Alarm→Event Query Template from the main menu.

2. Click Event Report Query Template in the left pane and click Create Event Query
Template in the right pane to open the New Event Query Template dialog box.

3. Set parameters on the Basic Information, Filter Info and Event Source tabs as
required, and click OK.

Parameter DescriptionNote 1
Sets the template name and remarks as needed. The name must be
Basic Information
unique.

Sets filter criteria such as event name, level, occurrence time, and line
Filter Info
information.
Event Source Sets the event source as needed.
Note 1: You can click Copy from Template to copy all settings except Template Name from
another template. This improves setting efficiency.

62 Version: 01
6 Alarm Management

Other Operations

u Modifying an event query template

Select a custom event query template in the left pane, and modify its parameters in the
right pane. Click Save All.

u Deleting an event query template

Right-click a custom event query template in the left pane and select Delete from the
shortcut menu. Then click Yes in the alert box.

6.2.3.2 Setting a Default Event Template

The UMC² Lite allows setting a default event query template. After you log in and query
events through the main menu, the UMC² Lite opens the Query Reported Events tab
based on the default template.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Choose Alarm→Event Query Template from the main menu.

2. In the left pane of the Event Query Template tab, right-click an event query template,
and select Set ** Default Template from the shortcut menu. Here ** refers to the
creator of the template.

6.3 Managing Alarm Configurations

The UMC2 Lite allows managing alarm reporting templates and binding them with devices.

6.3.1 Managing Alarm Reporting Templates

The UMC2 Lite supports creating, modifying and deleting alarm reporting templates.

Prerequisite

You have the Operator Group authority or higher.

Version: 01 63
UMC² Lite Unified Management Control Centre User Manual

Procedure

u Creating alarm reporting templates

1) In an NE manager, click .

2) In the operation tree, select Alarm Management→Alarm Report Manage


Profile and Bind→Alarm Report Manage Profile.

3) On the Alarm Report Manage Profile tab, click .

4) In the displayed dialog box, set the number of new alarm reporting templates and
click OK.

5) Set the template name and object type in the left pane.

6) Set whether to report new alarms in the right pane.

u Modifying templates in batches

1) Click .

2) Select desired templates in the Modify in a batch manner dialog box and
modify the parameters in the Configuration Item pane.

u Deleting a template

Select a template and click .

64 Version: 01
6 Alarm Management

6.3.2 Binding Alarm Reporting Templates

The UMC2 Lite can bind alarm reporting templates with objects.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. In an NE manager, click .

2. In the operation tree, select Alarm Management→Alarm Report Manage Profile


and Bind→Alarm Report Manage Profile Bind.

3. Select an object in the left device tree and select a template name from the drop-down
list in the right pane.

4. Click to deliver the configuration to the device.

5. (Optional) For batch configuration, select multiple objects, click and set a
template in the Configure Templates in a Batch Manner dialog box.

6.4 Monitoring Network Alarms

By monitoring network alarms, OAM engineers can learn running states of networks
promptly. The UMC2 Lite provides diverse access to alarms on different objects.

6.4.1 Synchronizing Alarms Automatically

After the UMC2 Lite restarts or restores communication with NEs, it automatically
synchronizes alarms with NEs (at an interval of three minutes by default) to keep consistent
alarm data.

u All alarms will be automatically synchronized when UMC² services start up: After
UMC² Lite services are started, the UMC² Lite synchronizes alarms with NEs and
alarm services.

Version: 01 65
UMC² Lite Unified Management Control Centre User Manual

u Auto Synchronize Equipment Alarm after Communication Interruption is Restored:


After recovering from a communication interruption, the UMC 2 Lite issues polling
commands to synchronize alarms with NEs.

Note:

For IPRAN and POTN devices, the UMC2 Lite issues forcible synchronization
commands to synchronize alarms with them.

6.4.2 Viewing Current Alarms

You can view current alarms of a specified object (network / logical domain / NE / link) to
analyze and troubleshoot faults.

Functions

u Alarms can be queried by frequency or duration, so that those excessively frequent and
long-lasting alarms can be quickly identified and easily analyzed.

u Current alarms are merged ones. When an object reports an alarm repeatedly, the
system displays the alarm as a single entry. That is, the alarm's ID remains unchanged,
but its frequency increases.

u Alarm logs record all alarms received by the UMC² Lite. Each alarm is displayed as
one entry.

u A new alarm meeting merging rules is merged into a current alarm entry regardless of
whether the alarm entry is acknowledged or cleared. In this case, the alarm entry's
frequency increases by 1 and its acknowledgment and clearing states are updated
according to the states of the new alarm.

u When the number of alarms exceeds the maximum number of rows allowed in a table,
only the latest current alarms are displayed. To query non-displayed alarms, you can
set filter criteria.

Procedure

u View current alarms through the main menu.

1) Select Alarm→Current Alarm from the main menu.

66 Version: 01
6 Alarm Management

2) Set query criteria in the Query Current Alarm dialog box and click OK.

¡ If a default current alarm query template is configured, the Query Current


Alarm dialog box will not be displayed. Instead, the system queries current
alarms using this default template. For details about how to set a default
alarm query template, see Creating Alarm Templates.

¡ To query current alarms using a template, click Select a Template.

¡ To save query criteria as a template, click Save as Template.

3) On the Current Alarm tab, view the current alarms that meet query criteria.

4) Right-click an alarm and select View Alarm Log from the shortcut menu to view
all its records.

u View current alarms through the shortcut menu.

4 View current alarms of all NEs in a logical domain.

a) Right-click a logical domain on the main GUI, and select Alarm And Event
→Current Alarm from the shortcut menu to open the Current Alarm tab.

b) On the Current Alarm tab, view current alarms in the logical domain.

c) Right-click an alarm and select View Alarm Log from the shortcut menu to
view all its records.

4 View current alarms of an NE.

a) Right-click an NE on the main GUI, and select Alarm And Event→


Current Alarm from the shortcut menu to open the Current Alarm tab.

b) On the Current Alarm tab, view current alarms on the NE.

c) Right-click an alarm and select View Alarm Log from the shortcut menu to
view all its records.

4 View current alarms of a link.

a) Right-click an alarmed link on the main GUI, and select View Related
Alarm from the shortcut menu.

b) On the Link Associated Alarm tab, view current alarms on the link.

c) Right-click an alarm and select View Alarm Log from the shortcut menu to
view all its records.

Version: 01 67
UMC² Lite Unified Management Control Centre User Manual

Other Operations

Perform the following operations as needed.

u Click the shortcut icons at the upper left corner of the Current Alarm tab to perform
the following operations.

4 Click to set whether to automatically report updated alarms.

4 Click to set whether to automatically scroll the alarm table when new alarms
are reported.

4 Click to select another template for query.

4 Click to only display critical alarms in the current table.

4 Click to only display major alarms in the current table.

4 Click to only display minor alarms in the current table.

4 Click to only display warning alarms in the current table.

4 Click to only display root alarms in the current table.

4 Identify root or derivative alarms by icons displayed in the alarm list.

u Click the buttons at the bottom right corner of the Current Alarm tab to perform the
following operations.

4 Click Query by Template and select another template in the Select Template
dialog box to query current alarms.

4 Click Query and set new query criteria in the Query Current Alarm dialog box
to query current alarms.

4 Select an alarm and click View Details to view its maintenance information,
detailed information and alarm correlation analysis result.

You can also enter alarm maintenance experience in the Maintenance


Information pane and click Save.

4 Select an alarm and click Confirm Alarm. Its Confirmation Status becomes
User Confirmation.

4 Select an alarm and click Clear Alarm. Its Clear Status becomes User
Clearance.

68 Version: 01
6 Alarm Management

6.4.3 Viewing History Alarms

You can view history alarms of a specified object (network / logical domain / NE / link) to
learn about and analyze history faults.

Background

u Alarms can be queried by frequency or duration, so that those excessively frequent and
long-lasting alarms can be quickly identified and easily analyzed.

u A current alarm that is cleared and acknowledged is converted into a history alarm
after a specified delay period expires.

u When the number of alarms exceeds the maximum number of rows allowed in a table,
only the latest history alarms are displayed. To query non-displayed alarms, you can
set filter criteria.

Procedure

u View history alarms through the main menu.

1) Select Alarm→History Alarm from the main menu.

2) Set query criteria in the Query History Alarm dialog box and click OK.

¡ If a default history alarm query template is configured, the Query History


Alarm dialog box will not be displayed. Instead, the system queries history
alarms using this default template. For details about how to set a default
alarm query template, see Creating Alarm Templates.

¡ To query history alarms according to a non-default template, click Select a


Template.

¡ To save query criteria as a template, click Save as Template.

3) On the History Alarm tab, view history alarms that meet query criteria.

u View history alarms through the shortcut menu.

4 View history alarms of all NEs in a logical domain.

a) Right-click a logical domain on the main GUI, and select History Alarm
from the shortcut menu to open the History Alarm tab.

b) On the History Alarm tab, view history alarms that meet query criteria.

4 View history alarms of an NE.

Version: 01 69
UMC² Lite Unified Management Control Centre User Manual

a) Right-click an NE on the main GUI, and select Alarm And Event→History


Alarm from the shortcut menu to open the History Alarm tab.

b) On the History Alarm tab, view history alarms of this NE.

4 View history alarms of a link.

a) Right-click an alarmed link on the main GUI, and select View Related
Alarm from the shortcut menu.

b) On the Link Associated Alarm tab, view history alarms of this link.

Other Operations

Perform the following operations as needed.

u Click the shortcut icons at the upper-left corner of the History Alarm tab to perform
the following operations.

4 Click to select a different template for query.

4 Click to only display critical alarms in the current table.

4 Click to only display major alarms in the current table.

4 Click to only display minor alarms in the current table.

4 Click to only display warning alarms in the current table.

4 Click to only display root alarms in the current table.

u Click the buttons at the bottom right corner of the History Alarm tab to perform the
following operations.

4 Click Refresh to refresh displayed alarms.

4 Click Query by Template, and select a desired template in the Select


Template dialog box to query history alarms.

4 Click Query and set new query criteria in the Query History Alarm dialog box
to query history alarms.

4 Select an alarm and click View Details to view its maintenance information,
detailed information and alarm correlation analysis result.

You can also enter alarm maintenance experience in the Maintenance


Information pane and click Save.

70 Version: 01
6 Alarm Management

6.4.4 Viewing Reported Alarms

By setting alarm reporting rules, you can enable devices to report important alarms and
monitor them in the alarm report window.

Prerequisite

Alarm reporting rules have been set and enabled as described in Setting Alarm Reporting
Rules.

Procedure

1. Select Alarm→View Reported Alarms from the main menu.

2. On the View Reported Alarm tab, view the information of alarms meeting reporting
rules.

3. (Optional) Click Report Setting at the bottom right of the tab to open the Alarm
Report Setting tab and re-configure alarm reporting rules.

Other Operations

u Click Clear All Records to clear all the records on the current tab. Then the tab
displays alarms reported after clearing.

u Select an alarm and click Confirm Alarm. Then its Confirmation Status becomes
User Confirmation.

u Select an alarm and click Clear Alarm. Then its Clear Status becomes User
Clearance.

6.4.5 Querying Reported Events

By querying reported events, you can learn running status of the system.

Version: 01 71
UMC² Lite Unified Management Control Centre User Manual

Procedure
Access Procedure
1. Select Alarm→Query Report Events from the main menu.
2. Set query criteria in the Query Report Events dialog boxNote 1 and click
Main menu
OK.
3. On the Query Report Events tab, view query results.

Note 1: If a default template is set, the Query Report Events dialog box will not appear. Instead, the
system uses this default template to query reported events. For details about how to set a default
event reporting template, see Setting a Default Event Template.

Other Operations

u Click the shortcut icons at the upper-left corner of the Query Report Events tab to
perform the corresponding operations.

4 Click to set whether to automatically report updated events.

4 Click to set whether to automatically scroll the event list when new events
are reported.

4 Click to select another template for query.

4 Click to only display critical events in the current table.

4 Click to only display major events in the current table.

4 Click to only display minor events in the current table.

4 Click to only display warning events in the current table.

u Click the buttons at the bottom of the Query Report Events tab to perform the
corresponding operations.

4 Click Query, set new query criteria in the Query Report Events dialog box and
click OK.

4 Click Query by Template, select a desired template in the Select Template


dialog box and then click OK.

4 Select an event and click View Details to view its detailed information.

6.5 Handling Alarms

Alarms should be handled following certain procedures to troubleshoot faults efficiently.

72 Version: 01
6 Alarm Management

6.5.1 NE Alarm Reporting Flow

Alarm Management Mechanism

The UMC2 Lite monitors NEs in real time through polling and proactive reporting. When
polling time conflicts with proactive reporting time, the UMC2 Lite calculates data based on
alarm receiving time and discards duplicated data.

u Polling: The UMC2 Lite calls each NE through polling and collects and stores alarm
information of each NE.

u Proactive reporting: When an alarm is generated on an NE, it is immediately reported


to the UMC2 Lite.

NE Alarm Reporting Flow

NE alarm reporting flow is a process from NE alarm reporting to the UMC 2 Lite to alarm
notification to users. Understanding this flow helps you handle alarms efficiently.
Figure 6-1 shows NE alarm reporting flow.

Version: 01 73
UMC² Lite Unified Management Control Centre User Manual

Figure 6-1 NE Alarm Reporting Flow

74 Version: 01
6 Alarm Management

6.5.2 Alarm Handling Flow

After obtaining alarm information, you can handle alarms referring to Figure 6-2. Table 6-5
describes alarm handling flow.

Figure 6-2 Alarm Handling Flow

Version: 01 75
UMC² Lite Unified Management Control Centre User Manual

Table 6-5 Description of Alarm Handling Flow

Step Operation Description


After an alarm is received, you can start the alarm handling flow.
Obtain alarm
1 See Setting Alarm Rules for how to configure alarm reporting
information.
rules.
View alarm details such as alarm source, location information,
2 View alarm details. generation cause, and handling suggestions. See Viewing Alarm
Details for specific operation steps.

To prevent duplication of effort, acknowledge the alarm to let


3 Acknowledge the alarm. others know that this alarm is being handled. See Acknowledging
Alarms for specific operation steps.

Collect fault By locating and querying alarms, collect information about fault
4
information. time and symptoms.

Analyze specific fault causes based on collected fault


5 Analyze fault causes.
information.
Prepare a fault handling plan referring to alarm maintenance
Prepare fault handling
6 experience and manuals covering the NEs corresponding to the
plans.
alarm source.
Carry out fault handling Eliminate the fault that triggers the alarm based on the prepared
7
plans. fault handling plan.

If faults are rectified, alarms can be automatically cleared. You


8 Clear the alarm. can also manually clear alarms referring to Clearing Alarms
Manually.

After faults are eliminated, verify the troubleshooting result by


Verify whether the fault
9 checking alarm indicators on devices or viewing current alarms
is eliminated.
of the alarm source on the UMC2 Lite.
Recording alarm After troubleshooting is done, record the handling experience in
10
maintenance experience the alarm experience database.

6.5.3 Viewing Alarm Details

You can view alarm details to learn alarm names, alarm sources, NE types, IP addresses and
so on.

Procedure

1. Open the Current Alarm or History Alarm tab referring to Viewing Current Alarms
and Viewing History Alarms.

76 Version: 01
6 Alarm Management

2. Double-click an alarm, or select an alarm and click View Details at the lower right
corner of the tab.

3. Select the Details tab and view the name, source, and NE type of this alarm.

6.5.4 Viewing Alarm Maintenance Information

You can learn about alarm causes and handling suggestions from alarm maintenance
information. You can add or modify alarm maintenance experience as needed. When the
same alarm reoccurs, you can refer to the past experience to handle.

Procedure

1. Open the Current Alarm or History Alarm tab referring to Viewing Current Alarms
and Viewing History Alarms.

2. Double-click an alarm, or select an alarm and click View Details in the lower right
corner of the tab.

3. Click the Maintenance Information tab to check the descriptions, causes and
handling suggestions of the alarm.

4. (Optional) To add or modify an entry of maintenance experience, type the content in


the Maintenance Experience text box and click Save.

Note:

You can only view maintenance experience on the Alarm Log tab.

6.5.5 Viewing Alarm Correlation Analysis

You can learn the relationship between a root alarm and derivative alarms through alarm
correlation analysis.

Prerequisite

u You have configured root and derivative alarms in an alarm analysis rule.

u You have configured alarm reporting rules.

Version: 01 77
UMC² Lite Unified Management Control Centre User Manual

Procedure

1. Open the Current Alarm or History Alarm tab referring to Viewing Current Alarms
and Viewing History Alarms.

2. Double-click an alarm, or select an alarm and click View Details in the lower right
corner of the tab.

3. Click the Alarm Relevance Analysis tab to view the correlation analysis result of the
alarm.

6.5.6 Acknowledging Alarms

The UMC² Lite allows manual and automatic acknowledgment of cleared alarms. Manual
acknowledgment of an alarm indicates that this alarm is being handled.

Background

You can acknowledge alarms in batches by specifying alarm names, levels, or types.

Prerequisite

You have the Operator Group authority or higher.

Procedure

u Acknowledging alarms manually

1) Open the Current Alarm or Alarm Log tab referring to Viewing Current
Alarms or Querying Alarm Logs respectively.

2) Acknowledge alarms manually via one of the following ways:

¡ Select an alarm and click Confirm Alarm in the lower right part of the tab,
or right-click an alarm and select Confirm Alarm from the shortcut menu.

¡ Right-click an alarm and select Confirm and Mark the Alarms from the
shortcut menu. In the displayed dialog box, enter remarks and click OK.

¡ Right-click an area on the current tab and select Batch Confirm Alarms
from the shortcut menu. In the displayed dialog box, set alarm
acknowledgment criteria and click OK.

78 Version: 01
6 Alarm Management

3) After manual acknowledgment, the alarm's Confirmation Status changes to


User Confirmation.

u Acknowledging alarms automatically

Set automatic acknowledgment rules for cleared alarms. By default, the system, at
00:00, automatically acknowledges the alarms that have been cleared for one day or
longer time. Acknowledged alarms' Confirmation Status changes to Auto Confirm.

Related Operations

To re-focus on an acknowledged alarm, right-click it and select Unconfirm the Alarm


from the shortcut menu. Then its Confirmation Status changes to Unconfirmed.

Note:

On the Alarm Log tab, you can only acknowledge alarms but cannot cancel any
alarm acknowledgment.

6.5.7 Locating Alarms

You can locate the card or port that generates an alarm.

Procedure

1. Open the Current Alarm or History Alarm tab referring to Viewing Current Alarms
and Viewing History Alarms.

2. Right-click an alarm and select Locate to Card or Port from the shortcut menu. In
the NE manager window that appears, the card or port that generates the alarm is
highlighted.

6.5.8 Masking Alarms on the UMC² Lite

You can set rules for masking alarms that you don’t care about, so that they will not be
displayed in the current alarm list on the UMC² Lite.

Version: 01 79
UMC² Lite Unified Management Control Centre User Manual

6.5.8.1 Setting Current Alarm Masking on the UMC² Lite

Alarms masked on the UMC² Lite will not be displayed in the current alarm list.

Prerequisite

u You have the Operator Group authority or higher.

u Alarm masking rules have been planned.

Procedure

u Set UMC² Lite-side alarm masking on the current alarm tab.

1) Open the Current Alarm tab referring to Viewing Current Alarms.

2) Right-click an alarm and select Ems Shield from the shortcut menu to open the
Shield Alarm dialog box.

Figure 6-3 Masking Alarms

3) In the Shield Alarm dialog box, set masking rules referring to Parameters of
Alarm Masking.

80 Version: 01
6 Alarm Management

Table 6-6 Parameters of Alarm Masking

Parameter Description

Shield Rule Name (Required) Sets the name of the alarm masking rule.

Sets the range of alarm masking.


If the TCM1_LTC alarm is clicked in step 2), its masking range is
as follows:
u Shield TCM1_LTC Alarm of 4TN2[05]:logical port-
-ODU2:1: Only the TCM1_LTC alarm on the object 4TN2
[05]:logical port- -ODU2:1 is masked.
u Shield All Alarms of 4TN2[05]:logical port- -ODU2:1: All
Shield Range
alarms on the object 4TN2[05]:logical port- -ODU2:1 are
masked.
u Shield TCM1_LTC Alarm of BOARD:4TN2_F1K:1: The
TCM1_LTC alarms on the object BOARD:4TN2_F1K:1 are
masked.
u Shield All Alarms of BOARD:4TN2_F1K:1: All the alarms
on the object BOARD:4TN2_F1K:1 are masked.

Sets whether to clear existing current alarms on the UMC² Lite.


Basic
u If Clear current alarms that have occurred in the
Information
network management system is selected,

4 Current alarms occurring after the alarm masking rule is


set are blocked.

4 Existing current alarms meeting the masking rule are


automatically cleared and acknowledged. After the set
delay expires, these current alarms are converted to
Clear Existing
history alarms.
Alarms
4 After existing current alarms are automatically cleared as
per the masking rule, such clearance is reported to a
northbound interface, and hence these alarms are cleared
on an upper-layer network management system as well.

u If Clear current alarms that have occurred in the


network management system is deselected, the system
only blocks the current alarms occurring after the alarm
masking rule is set.

Sets the start and end dates of the range during which the masking
Date Range
rule is effective.
Time
Sets the start and end time of the range during which the masking
Range Time Range
rule is effective.
Weekdays Sets the week days on which the masking rule is effective.

Version: 01 81
UMC² Lite Unified Management Control Centre User Manual

Table 6-6 Parameters of Alarm Masking (Continued)

Parameter Description
Time Zone of the
Sets the time zone where the server is located.
Server

4) Click OK to add an alarm masking rule.

Note:

New alarm masking rules can be viewed by accessing Alarm→Setting→


Alarm Shield Rule.

u Mask undesired alarms by creating a current alarm masking rule. For details, see
Setting Alarm Masking Rules.

6.5.8.2 Managing Alarm Masking on the UMC² Lite

You can manage alarm masking rules on the UMC² Lite, including viewing, modifying,
deleting and exporting these rules.

Prerequisite

u You have set current alarm masking on the UMC² Lite.

u You have the Operator Group authority or higher.

4 Users in the Administrators group can view, modify and delete all rules.

4 Users in non-administrator groups can only view rules created by others. They
cannot modify or delete existing rules.

Procedure

1. Select Alarm→Setting→Alarm Shield Rule from the main menu to open the Alarm
Shield Rule tab.

2. Perform the following operations as desired.

82 Version: 01
6 Alarm Management

Table 6-7 Operation Description

Operation Procedure
Viewing a current alarm
Select a rule in the left pane and view its configurations in the right pane.
masking rule

1. Select a rule in the left pane, and modify its parameters as required in
Modifying a current
the right pane.
alarm masking rule
2. Click Save All.
1. Click Current Alarm Shield Rule in the left pane, and select a rule in
Deleting a current alarm the right pane.Note 1
masking rule 2. Click Delete and then click Yes in the Delete Rule alert box that
appears.

1. Click Current Alarm Shield Rule in the left pane and right-click a rule
Exporting a current in the right pane.Note 1
alarm masking rule 2. Select Export→Export All Records or Export→Export Selected
Records to export masking rules to a local directory.

Enabling / disabling a
current alarm masking Right-click a rule and select Enable / Disable from the shortcut menu.
rule
Counting current alarm Select Alarm Shield Rule Management in the left pane, and view the
masking rules number of current alarm masking rules in the right pane.

Note 1: Hold down Shift or Ctrl to select multiple rules simultaneously.

6.5.9 Viewing Current Alarms of an NE

You can view current alarms of an NE to analyze alarm information and troubleshoot faults.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select Alarm→Current Alarm from the main menu.

2. Set query criteria in the Query Current Alarm dialog box and click OK.

3. On the Current Alarm tab, view the current alarms that meet query criteria.

4. Right-click an alarm and select View Current Alarm of Attributed NE from the
shortcut menu. On the Current Alarm-NE Name tab, view current alarms of the
associated NE.

Version: 01 83
UMC² Lite Unified Management Control Centre User Manual

6.5.10 Viewing History Alarms of an NE

You can view history alarms of an NE to analyze alarm information and troubleshoot faults.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select Alarm→Alarm History from the main menu.

2. Set query criteria in the Query History Alarm dialog box and click OK.

3. On the History Alarm tab, view history alarms that meet query criteria.

4. Right-click an alarm and select View NE Alarm History from the shortcut menu. On
the History Alarm-NE Name tab, view history alarms of the associated NE.

6.5.11 Clearing Alarms Manually

When device failures are eliminated, alarms will be cleared automatically. If some alarms
cannot be cleared automatically, you can clear them manually.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Open the Current Alarm tab referring to Viewing Current Alarms.

2. Select one or more alarms, right-click them and select Clear Alarm, or click Clear
Alarm at the lower right corner of the tab. Then their Clear Status changes to User
Clear.

Note:

If the fault triggering these alarms still exists, they will be reported again.

84 Version: 01
6 Alarm Management

6.5.12 Acknowledging and Clearing Alarms

When handling a device fault, you can acknowledge and clear alarms with one click.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select System→Parameter Settings→Alarm Settings→Server Settings→


Alarm Basic Setting from the main menu.

2. In the Alarm Basic Setting dialog box, select Show Confirming and Clearing
Alarm Function.

3. Open the Current Alarm or Alarm Log tab.

4. Select an alarm and click Confirm and Clear Alarm at the lower right part of the tab,
or right-click it and select Confirm and Clear Alarm from the shortcut menu.

6.5.13 Clearing Alarms From a Device

When device failures are eliminated, alarms will be cleared automatically. If some alarms
cannot be cleared automatically, you can clear them manually.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Open the Current Alarm tab.

2. Select one or more alarms, right-click them and select Clear Alarm From Device
from the shortcut menu.

6.5.14 Modifying Alarm Levels

You can modify alarm levels as needed to monitor alarms effectively.

Version: 01 85
UMC² Lite Unified Management Control Centre User Manual

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Open the Current Alarm tab referring to Viewing Current Alarms.

2. Right-click an alarm and select Modify the Level from the shortcut menu.

3. Set the modification range and alarm level in the Modify Alarm Level dialog box.

4. Click OK to add a custom alarm level rule.

Note:

The new custom alarm level rule can be viewed on the Customize Alarm
Level tab.

6.5.15 Editing Alarm Remarks

You can edit alarm remarks to record additional information about an alarm, facilitating
future maintenance.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Open the Current Alarm tab referring to Viewing Current Alarms.

2. Right-click an alarm and select Modify the Remark from the shortcut menu.

3. Enter alarm remarks in the Edit Alarm Remark dialog box.

4. Click OK. The alarm remarks are displayed in the Remark column.

6.5.16 Outputting Alarm Information

This section introduces how to print or export alarm information.

86 Version: 01
6 Alarm Management

Procedure

1. Open the Current Alarm or History Alarm tab referring to Viewing Current Alarms
and Viewing History Alarms.

2. Output alarm information.

4 Print alarm information.

a) In the alarm list, right-click to select Print from the shortcut menu.

b) In the Print Preview dialog box, set the page and other print options.

c) Click Print. In the displayed Print dialog box, select a printer and set other
printing parameters.

d) Click OK.

4 Export alarm information.

¡ Export all alarm entries. Right-click anywhere on the tab and select Export
→Export All Records from the shortcut menu to export all the alarm
entries in the format of TXT, XLS, CSV, XML, PDF or HTML.

¡ Export selected alarm entries. Select desired alarm entries, right-click them
and select Export→Export Selected Record from the shortcut menu to
export them in the format of TXT, XLS, CSV, XML, PDF or HTML.

Version: 01 87
7 Resource Management

Resource management refers to managing physical asset information and important logical
configuration of all devices in networks. The UMC2 Lite provides unified resource query
and statistics.

7.1 Opening NE Managers

NE managers are the main operation GUI for managing devices. In an NE manager window,
you can configure, manage, and maintain an NE and its cards and ports hierarchically.

An NE manager consists of a device tree and an operation tree. You can select a desired
object in the device tree and then select a function configuration option in the operation tree
to open the function configuration window.

Procedure

Double-click an NE in the left pane of the main topology tab to open its NE manager
directly.

GUI Layout

Note:

An NE manager can be opened as a window or tab. The figure below shows an


NE manager window.

88 Version: 01
7 Resource Management

(1) Shortcut toolbar (2) Device tree (3) Alarm prompt bar

(4) Subrack view (5) Operation tree (6) Object information pane

Figure 7-1 Layout of an NE Manager

7.2 Detecting Physical Configurations

Physical configuration detection enables discovery of physical cards, which can be updated
on the UMC² Lite automatically through synchronization. This function does not apply to
virtual NEs.

Prerequisite

You have the Operator Group authority or higher.

Version: 01 89
UMC² Lite Unified Management Control Centre User Manual

Procedure

1. Select Resource→Detect Physical Configuration from the main menu.

2. Select a desired domain or NE in the left browse tree of the Detect Physical
Configuration tab, and click Detect Physical Configuration at the lower part of the
tab to run a detection command. Then you can view the information of detected cards.

3. Select a synchronization mode.

4 Incremental: Synchronizes only physical configurations of new cards to the


UMC² Lite.

4 Overwritten: Overwrites current configurations on the UMC² Lite with the latest
physical card configurations.

4. Synchronize physical configurations.

4 Synchronize all data: Click Synchronize All to synchronize all the detected data
to the UMC² Lite.

4 Synchronize selected NEs: Select one or more desired NEs from the detected data
and click Synchronize NE to synchronize all the data of these NEs to the UMC²
Lite.

4 Synchronize cards: If a detected slot has an actual device type but has no
configuration on the UMC² Lite, you can right-click the entry of this slot, and
select Synchronize Card from the shortcut menu.

7.3 Managing Logical Domains

This section introduces how to create, delete and move logical domains, and set their
attributes.

7.3.1 Creating Logical Domains

For easy management, place NEs in the same area or with similar attributes in one logical
domain.

Prerequisite

You have the Operator Group authority or higher.

90 Version: 01
7 Resource Management

Background

Creating logical domains only simplifies GUI display and has no impact on NE operation.

Procedure

1. Right-click an existing logical domain or a blank area in the Main Topology view,
and select Create Logical Domain from the shortcut menu.

2. In the displayed dialog box, set a name, alias name, and remark.

Note:

If an alias name is set, it will be displayed on the GUI.

3. Click OK. The new logical domain is displayed in the browse tree.

7.3.2 Deleting Logical Domains

A logical domain can be deleted if it is no longer needed. After deletion, objects in this
logical domain automatically move to an upper level rather than being deleted.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Right-click a logical domain in the left browse tree of the main topology, and select
Delete from the shortcut menu.

2. Click Yes in the Delete Selected Object alert box that appears.

7.3.3 Setting Attributes of a Logical Domain

You can modify the name, alias name, and remarks of a logical domain at any time as
needed. Such modification does not affect the running of NEs in the logical domain.

Version: 01 91
UMC² Lite Unified Management Control Centre User Manual

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Right-click a logical domain in the left browse tree of the main topology, and select
Attributes from the shortcut menu.

2. On Attributes Page, modify the attribute information and click to save the
configurations to the database.

7.4 Managing Access NEs

This section introduces how to manage access NEs.

7.4.1 Creating Access NEs

To manage access devices, access NEs should be created on the UMC² Lite.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Right-click a blank area in the main topology and select Create NE→Create Access
NE from the shortcut menu, or select Resource→Create Access NE from the main
menu to open the Create Access NE dialog box.

2. Set parameters referring to Table 7-1.

Table 7-1 Settings of Creating an Access NE

Parameter Description Remark


NE Type Type of an NE

Default Shelf Type Subrack type displayed automatically after an NE type is selected
Required
NE Name Name of an NE for easy identification

NE IP Address IP address of an NE
NE Mask Mask of an NE
Optional
NE Gateway IP address of an NE gateway

92 Version: 01
7 Resource Management

Table 7-1 Settings of Creating an Access NE (Continued)

Parameter Description Remark


Alias of an NE. If this item is configured, it is displayed on the
Alias Name
main topology; if not, an NE name is displayed instead.
NE SN
Manufacturer Name
Remark
Attribute information of an NE for easy identification
Area
Username
Password
Port Number Number of a port for NE communication. Default: 830.

Longitude Longitude and latitude of the physical area where a device


Latitude resides, used for easy location

Topology Layer Topology layer where an NE resides


Country

Province
Detailed address of a device for easy location
City

Detail Address
Manager that manages an NE. If this item is not configured, this
Manager NE is managed by the manager of its partition. If no such partition -
exists, the NE is managed by a default manager.
SNMP Parameter Template used for communication between the UMC2 Lite server
-
Template and an NE. Generally, the default template is selected.

3. After parameters are configured, click OK.

Operation Result

After an access NE is created, its icon is displayed in the left browse tree of the main
topology. Its information such as IP address, subnet mask and ID is automatically saved to
the UMC² Lite database.

7.4.2 Modifying Attributes of an Access NE

When an access NE changes in its attributes such as name and IP address, you can update
such data on its attribute page to ensure data consistency.

Version: 01 93
UMC² Lite Unified Management Control Centre User Manual

Prerequisite

You have the Operator Group authority or higher.

Background

u Modifying access NEs' attributes may interrupt their communication with the UMC²
Lite.

u Modifying access NEs' attributes does not affect services running on them.

Procedure

1. Right-click an access NE in the left browse tree of the main topology, and select
Attributes from the shortcut menu.

2. On Attributes Page, modify the attribute information and click .

Note:

Ensure that access NEs' attributes are kept consistent with planning data.

7.4.3 Deleting NEs

When an incorrect NE is created or a damaged NE cannot be restored, you can delete it on


the UMC² Lite. Deleting an NE removes all its data from the UMC² Lite, but does not affect
the running of the corresponding device.

Background

u Deleting an NE removes all its data from the UMC² Lite, but does not affect the
corresponding device.

u Deleting an NE removes all its related links together.

Deleting a transmission NE does not remove the ones copied from this NE. Deleting a
transmission NE copied from another does not remove its source NE and other NE copies.

Prerequisite

You have the Operator Group authority or higher.

94 Version: 01
7 Resource Management

To delete a transmission NE, it should not

u Have associated services.

u Be a gateway NE (GNE).

u Be an Ma with managed objects.

Procedure

1. Right-click an NE in the left browse tree of the main topology and select Delete from
the shortcut menu.

2. In the Delete Selected NE Or Not dialog box that appears, click Yes.

7.4.4 Searching for an NE in a Browse Tree

You can find an object quickly in a browser tree by the search function.

Background

Advanced search allows user-defined object types and search types.

u Object types include NEs, logical domains, optical NEs and cards.

u Search types include NE names, NE IDs, NE types, NE IP addresses, Alias names and
switch numbers.

Procedure

u Common search: Enter keywords or characters in the search box above Browse Tree
of the main topology. The system automatically displays matching NEs.

The keywords entered can be letters, numbers, initials, full spelling or an IP address
contained in an NE name.

Version: 01 95
UMC² Lite Unified Management Control Centre User Manual

Note:

u When searching for objects, the system uses dynamic fuzzy search. That is,
when you enter keywords, the drop-down list dynamically displays
matching results according to the current input.

u Multiple keywords or characters can be delimited by space for a fuzzy


search.

u If you mouse over a search result, a tooltip appears, showing complete


information. This avoids incomplete content display due to the length of
the text box.

u Advanced search: Click , set search criteria in the displayed Advanced Search
dialog box and click Search to display matching results.

7.5 Managing Switch NEs

This section introduces how to manage switch NEs.

7.5.1 Creating Switch NEs

To manage switches, switch NEs should be created on the UMC² Lite.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Right-click a blank area in the left pane of the main topology tab and select Create NE
→Create Switch NE from the shortcut menu, or select Resource→Create NE→
Create Switch NE from the main menu to open the Create Switch NE dialog box.

2. In the dialog box, configure NE attributes, which can be input manually or


automatically.

4 If Create Now is selected, configure NE attributes manually in the dialog box.

96 Version: 01
7 Resource Management

4 If Create By IP is selected, enter the IP address or IP address segment of a target


device, and click Search. Then the NE Type and Default Shelf Type fields are
filled in automatically according to search results.

3. Set parameters referring to Table 7-2.

Table 7-2 Settings of Creating a Switch NE

Parameter Description Remark


NE Type NE type of a switch

Default Shelf Type Subrack type displayed automatically after the NE type is selected
Required
NE Name Name of an NE for easy identification

NE IP Address IP address of an NE in IPv4 / IPv6 format


NE Mask Mask of an NE in IPv4 / IPv6 format
NE Gateway IP address of an NE gateway in IPv4 / IPv6 format
Optional
Alias of an NE. If this item is configured, it is displayed on the
Alias Name
main topology; if not, an NE name is displayed instead.
NE SN
Manufacturer Name Optional
Remark Attribute information of an NE for easy identification
Username
Optional
Password
Longitude Longitude and latitude of the physical area where a device
Optional
Latitude resides, used for easy location

Topology Layer Topology layer where an NE resides Optional

Manager that manages an NE. If this item is not configured, this


Manager NE is managed by the manager of its partition. If no such partition Optional
exists, the NE is managed by a default manager.
SNMP Parameter Template used for communication between the UMC2 Lite server
Required
Template and an NE. The default template is selected by default.

4. After parameters are configured, click OK.

Version: 01 97
UMC² Lite Unified Management Control Centre User Manual

Operation Result

After a switch NE is created, its icon is displayed in the left browse tree of the main
topology. Its information such as IP address, subnet mask and ID is automatically saved to
the UMC² Lite database.

Note:

After a switch NE is created, its subrack is automatically created, with a virtual


core switch card added by default to show ports on the switch panel. An S5800
series switch can house two 10GE cards on the backplane, which need to be
manually added in the NE manager.

7.5.2 Modifying Attributes of a Switch NE

When a switch NE changes in its attributes such as name and IP address, you can update
such data on its attribute page to ensure data consistency.

Prerequisite

You have the Operator Group authority or higher.

Background

u Modifying switch NEs' attributes may interrupt their communication with the UMC²
Lite.

u Modifying switch NEs' attributes does not affect the services running on them.

Procedure

1. Right-click a switch NE in the left browse tree of the main topology, and select
Attribute from the shortcut menu.

2. On Attributes Page, modify the attribute information and click .

Note:

Ensure that switch NEs' attributes are kept consistent with planning data.

98 Version: 01
7 Resource Management

7.6 Deleting NEs

When an incorrect NE is created or a damaged NE cannot be restored, you can delete it on


the UMC² Lite. Deleting an NE removes all its data from the UMC² Lite, but does not affect
the running of the corresponding device.

Background

u Deleting an NE removes all its data from the UMC² Lite, but does not affect the
corresponding device.

u Deleting an NE removes all its related links together.

Deleting a transmission NE does not remove the ones copied from this NE. Deleting a
transmission NE copied from another does not remove its source NE and other NE copies.

Prerequisite

You have the Operator Group authority or higher.

To delete a transmission NE, it should not

u Have associated services.

u Be a gateway NE (GNE).

u Be an Ma with managed objects.

Procedure

1. Right-click an NE in the left browse tree of the main topology and select Delete from
the shortcut menu.

2. In the Delete Selected NE Or Not dialog box that appears, click Yes.

7.7 Moving Topology Objects

An NE can be moved to a specified logical domain on the UMC2 Lite.

Prerequisite

You have the Operator Group authority or higher.

Version: 01 99
UMC² Lite Unified Management Control Centre User Manual

Procedure

1. Right-click an NE in the browse tree of the main topology, and select NE Edit→Move
to from the shortcut menu to open the Select Destination Logic Domain dialog box.

2. In this dialog box, select a desired logical domain and click OK.

Operation Result

In the browse tree of the main topology tab, the aforesaid NE and its icon are moved to the
specified logical domain.

7.8 Searching for an NE in a Browse Tree

You can find an object quickly in a browser tree by the search function.

Background

Advanced search allows user-defined object types and search types.

u Object types include NEs, logical domains, optical NEs and cards.

u Search types include NE names, NE IDs, NE types, NE IP addresses, Alias names and
switch numbers.

Procedure

u Common search: Enter keywords or characters in the search box above Browse Tree
of the main topology. The system automatically displays matching NEs.

The keywords entered can be letters, numbers, initials, full spelling or an IP address
contained in an NE name.

100 Version: 01
7 Resource Management

Note:

u When searching for objects, the system uses dynamic fuzzy search. That is,
when you enter keywords, the drop-down list dynamically displays
matching results according to the current input.

u Multiple keywords or characters can be delimited by space for a fuzzy


search.

u If you mouse over a search result, a tooltip appears, showing complete


information. This avoids incomplete content display due to the length of
the text box.

u Advanced search: Click , set search criteria in the displayed Advanced Search
dialog box and click Search to display matching results.

7.9 Managing Cards

This section introduces how to manage cards.

7.9.1 Adding Cards Manually

After creating an NE, you can add cards manually as required.

Prerequisite

u You have the Operator Group authority or higher.

u You have created NEs.

u The required card type has been added for a virtual NE to be added with cards.

Procedure

1. Double-click an NE in the browse tree of the main topology to open the NE manager
window.

2. Select a desired subrack in the left device tree.

3. Add cards.

Version: 01 101
UMC² Lite Unified Management Control Centre User Manual

4 Add a default card.

Right-click an idle slot in the subrack view and select Add *** Card[Default]
from the shortcut menu to add a default card.

4 Add other cards.

a) Right-click an idle slot in the subrack view and select Add Other Card from
the shortcut menu.

b) In the Add Other Card dialog box, select a desired card and click OK.

7.9.2 Replacing Cards

When a card is replaced on site due to failure or other causes, it needs to be replaced
accordingly on UMC2 Lite clients.

Card replacement is unavailable to virtual NEs.

Prerequisite

u The target slot is configured with a card.

u The replacement card type is obtained.

u Card replacement does not affect configured services.

u You have the Operator Group authority or higher.

Procedure

1. Double-click an NE in the browse tree of the main topology to open the NE manager
window.

2. Select the subrack where the target card belongs in the left device tree.

3. Right-click the target card in Subrack View, and select Replace Card from the
shortcut menu to adjust it.

Note:

If the desired card does not exist in the default list, choose Replace Card→
Change to Other Card from the shortcut menu. Search for the desired card in
the Change to Other Card dialog box.

102 Version: 01
7 Resource Management

7.9.3 Deleting Cards

When network configuration changes or the card configuration of an NE needs to be


modified, you can delete cards from an NE as needed.

Prerequisite

u You have the Operator Group authority or higher.

u Services have been migrated from to-be-deleted cards to spare ones.

Procedure

1. Double-click an NE in the browse tree of the main topology to open the NE Manager
window.

2. Select the subrack where the target card belongs in the left device tree.

3. Delete cards.

4 Delete all cards.

a) Right-click the subrack in the device tree and select Delete All Cards from
the shortcut menu.

b) Click Yes in the Are you sure you want to delete all the cards? alert
box.

4 Delete a single card.

a) Right-click the card to be deleted in the device tree or subrack view, and
select Delete Card from the shortcut menu.

b) Click Yes in the Are you sure you want to delete the selected cards?
alert box.

7.10 Setting UMC² Lite Attributes

By modifying UMC² Lite attributes, you can customize the UMC² Lite's name and remark
its IP address. This operation does not affect the running of the UMC² Lite.

Prerequisite

You have the Operator Group authority or higher.

Version: 01 103
UMC² Lite Unified Management Control Centre User Manual

Procedure

1. Right-click Local NMS in the Logical Tree pane of the main topology, and select
Attributes from the shortcut menu.

2. On Attributes Page, modify the attribute information and click .

Note:

The EMS IP field allows adding remarks on the UMC² Lite server's IP address,
which does not change IP address configuration.

7.11 Searching for Objects

You can find an object quickly via the search function.

Applicable object types include NEs, logical domains / optical NEs, cards and ONUs.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select Resource→Search Object from the main menu to open the Search Object
dialog box.

104 Version: 01
7 Resource Management

2. In this dialog box, set Object Type, Search Type and Search Content, and click
Search.

Note:

When setting search criteria, you can select Match whole word only, Case
sensitive and Real-time search as desired.

3. In the search result, select a desired object and click Localize. Then the system
automatically locates it in the browse tree of the main topology / ONU list / NE
manager.

Note:

You can select or clear the Close window after location check box as desired.

7.12 Querying Abnormal ONUs

You can set filter criteria to query offline ONUs.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select Resource→Query Abnormal ONU from the main menu to open the Query
Abnormal Offline ONU dialog box.

2. Set filter criteria in the dialog box.

1) Select desired objects.

¡ Select the All Objects radio button. All OLTs are queried by default.

¡ Select the Select Device radio button. Then click to open the Query
Abnormal Offline ONU dialog box, select one or more devices for query,
and click OK.

Version: 01 105
UMC² Lite Unified Management Control Centre User Manual

Note:

When the Select Device radio button is selected, at least one device must be
specified.

2) Set filter criteria by defining Last Offline Duration or Repeated Data. The
value should be an integer.

Note:

Last Offline Duration = query time - last disconnection time

3) (Optional) Select the List of ONU that cannot get offline time check box.

3. Click OK to view the list of offline ONUs.

7.13 Querying ONUs

With the ONU query function, you can find a desired ONU quickly and view its parameters
such as the system it belongs to, slot number, PON port number and logical ID.

The UMC2 Lite allows querying ONUs by attributes, using fuzzy match or complete match.
ONU query criteria fall into two parts:

u Common query criteria: logical domain, device type, ONU PON type, device name,
alias name, logical ID, physical address, OLT IP address, management IP address,
voice service and data service (PPPoE name query allowed)

u Advanced query criteria: slot number, ONU number, ONU password, logical SN
password, optical splitter number, optical splitter port number, ONU identifier, ONU
user information, and ONU service level (ordinary or VIP)

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select Resource→Query ONU from the main menu.

2. Set query criteria in the Set ONU Query Conditions dialog box.

106 Version: 01
7 Resource Management

3. After all settings are done, click OK. Then the Query ONU tab displays matching
ONUs.

4. On the Query ONU tab, select an ONU entry and click Service Configuration at the
lower right corner to go to the NE manager window. Here you can view service
configurations of the ONU.

Subsequent Operations

Right-click an ONU, and select Service Configuration or Locate to ONU List from the
shortcut menu.

7.14 Querying ONUs in Batches

You can query ONU information in batches by importing an ONU identifier template. Then
you can handle the query result, including deauthorization and masking alarms, in a batch
manner.

Procedure

1. In the main menu, select Resource→Query→Batch Query ONU to open the Set
Query Condition dialog box.

2. Select an ONU identifier type and import a query template.

1) Select an ONU identifier type.

Note:

ONU identifiers fall into three categories: physical identifier, logical identifier,
and password. You can select one of them as needed.

2) Click Download Example Template to download the specified ONU identifier


template to the local host.

3) Enter the ONU identifiers to be queried in the template referring to the following
table. Then save the template file.

Version: 01 107
UMC² Lite Unified Management Control Centre User Manual

ONU Identifier Type Data Length (Byte) Value Range

u For a MAC address, the value ranges from 0 to


9 or from a to f.
Physical identifier 12 u For a physical SN, the first four digits are an
ASCII character string and the last 8 digits range
from 0 to 9 or from a to f.
It cannot start or end with the following characters:
u Special characters from NULL to / (0x00 to
Logical identifier 24 0x2f)
u Punctuation marks such as ;, : and ?
u Sign @ (0x40) and DEL (0x7f)

Password 10 No limit

4) Click Import Template and view importing results.

3. Click OK in the Set Query Condition dialog box.

4. View query results on the Batch Query ONU tab.

7.15 Querying Card SNs

You can query the serial number of a card to get the name and management IP address of
the OLT housing the card and the slot number of the card. The query range can cover all
OLTs in a network.

Prerequisite

The serial number of the card concerned has been obtained.

Procedure

1. In the main menu, select Resource→Query Board By Serial Number to open the
Set Query Conditions dialog box.

2. In the Set Query Conditions dialog box, enter the serial number of a card and select
one or more OLTs.

108 Version: 01
7 Resource Management

Note:

u If you select Full Field Matching, enter a complete serial number of a


card.

u If you deselect Full Field Matching, fuzzy query is supported.

3. Click OK. The Query Board by Serial Number tab displays query results.

7.16 Unauthorized ONU List

You can obtain the information of all unauthorized ONUs under one or more OLTs through
the UMC² Lite. The information of unauthorized ONUs includes NE name, NE IP address,
NE type, slot number, PON port number, ONU type, physical address, physical password,
and logical ID.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select Resource→Unauthorized ONU List from the main menu to open the Select
NE dialog box.

2. In the Select NE dialog box, select desired objects.

3. Click OK to query the unauthorized ONU list.

Version: 01 109
8 Configuration Management

Configuration management covers the operations of configuring networks and system


devices. It is the core management function of the UMC2 Lite.

8.1 Managing SNMP Parameter Templates

To keep smooth communication between the UMC² Lite and NEs, it is necessary to
configure SNMP parameters of NEs on the UMC² Lite.

You can directly configure SNMP parameters of NEs on the UMC² Lite, or use an
applicable SNMP parameter template to automatically apply SNMP parameters when
creating NEs manually or discovering NEs automatically.

8.1.1 Creating and Using SNMP Parameter Templates

You can manage SNMP parameter templates used for communication between the UMC 2
Lite server and NEs.

Prerequisite

You have the Operator Group authority or higher.

Background

The system provides default SNMP parameter templates as shown below. The SNMP
parameter template named default cannot be deleted or modified. If no SNMP parameter
template is set during NE creation, this default template will be used for access and switch
NEs by default.

110 Version: 01
8 Configuration Management

Procedure

1. Select Configure→SNMP Parameter Template Management from the main


menu to open the SNMP Parameter Template Management tab.

2. Click Create to open the SNMP Parameter Template dialog box, set various
parameters and click Create.

3. Right-click the target template and select Bind NE from the shortcut menu to open the
Select Bound NE dialog box. Select the NE to be bound and click OK.

4. After the NE is bound, the information of the NE bound with the SNMP parameter
template is displayed in the Binding State Information pane.

Other Operations

Change the SNMP parameter template bound with an NE.

1. In the browse tree of the main topology, right-click an NE and select Attributes from
the shortcut menu. The Attribute Page pane appears on the right.

Version: 01 111
UMC² Lite Unified Management Control Centre User Manual

2. In the Attribute Page pane, click the SNMP parameter template field and select a new
template from the drop-down list to change the SNMP parameter template bound with
the NE.

3. Click to save changes.

8.1.2 Modifying / Deleting SNMP Parameter Templates

You can manage SNMP parameter templates used for communication between the UMC 2
Lite server and NEs.

Prerequisite

You have the Operator Group authority or higher.

112 Version: 01
8 Configuration Management

Background

The SNMP parameter template named default is a default template and cannot be modified
or deleted.

Procedure

1. Select Configure→SNMP Parameter Template from the main menu to open the
SNMP Parameter Template Management tab.

2. On this tab, select the SNMP parameter template to be modified or deleted.

4 Modification: Click the Modify button, or right-click the template and select
Modify from the shortcut menu. In the SNMP Parameter Template dialog box
that appears, modify the template as required.

4 Deletion: Click the Delete button, or right-click the template and select Delete
from the shortcut menu to delete the template.

Note:

The SNMP parameter template bound with an NE cannot be deleted.

8.2 Managing NE Communication Routes

Correctly configuring NE communication routes is the prerequisite to ensure normal


communication between the UMC² Lite and NEs.

8.2.1 Managing NE Managers

This section introduces how to manage NE managers.

Version: 01 113
UMC² Lite Unified Management Control Centre User Manual

8.2.1.1 Creating a Manager

This section introduces how to create a manager.

Background

A manager can manage up to 500 NEs. For over 500 NEs, you need to add more managers.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select Configure→NE Communication Route Management from the main menu


to open the Communication Routing Management tab.

2. Right-click Communication Routing Management in the left object tree, and select
Create Manager from the shortcut menu. The Create the Manager dialog box
appears.

3. Set manager parameters as planned by referring to Table 8-1.

Table 8-1 Manager Parameters

ParameterNote 1 Description Remark


Two options:
Manager Type u Access: Manages PON devices. Required
u Transport: Manages OTN / PTN / IPRAN devices.

Default value: Not Set.


If active and standby UMC² Lite are installed, two
Service Instance
instances are configured during installation. In this Required
Name
case, you need to select different instances for active
and standby managers.

Name of a manager. It is selected during NE creation to


Manager Name Required
bind a manager with an NE.

Retain the default value.


Protocol u Access manager: SNMP by default -
u Transport manager: UDP by default

Device IP address of the network card for managing devices on


Required
Management IP the UMC² Lite server

114 Version: 01
8 Configuration Management

Table 8-1 Manager Parameters (Continued)

ParameterNote 1 Description Remark


IP Usage Select EMS Device Management IP Address. Required

Note 1: Retain default values for parameters not listed in the table.

8.2.1.2 Deleting Managers

This section introduces how to delete a manager.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select Configure→NE Communication Route Management from the main menu.

2. On the Communication Routing Management tab, right-click a manager in the left


pane, and select Manager Property from the shortcut menu. In the Manager
Properties dialog box, set the service instance name of the manager to Not Set.

3. On the Communication Routing Management tab, right-click the manager in the


left pane, and select Delete Manager from the shortcut menu.

4. In the displayed confirmation dialog box, click Yes.

Note:

You can delete custom managers only. Default managers cannot be deleted.

8.2.1.3 Modifying Managers

This section introduces how to modify a manager.

Prerequisite

You have the Operator Group authority or higher.

Version: 01 115
UMC² Lite Unified Management Control Centre User Manual

Procedure

1. Select Configure→NE Communication Route Management from the main menu.

2. On the Communication Routing Management tab, right-click a manager in the left


pane and select Manager Property from the shortcut menu.

3. In the displayed Manager Properties dialog box, modify the parameters.

4. Click OK.

8.3 ONU Capability Set Template

Adapting NEs by adding ONU type codes no longer meets fast adaptation requirements for
new terminal types.

To counter this, an ONU capability set template can be created on the UMC² Lite to
configure ONU parameters such as port quantity, port type and resource type as needed.
Then by delivering the template to the corresponding device, a new ONU type is supported
in real time. This allows fast adaptation without upgrading devices.

8.3.1 Creating ONU Capability Set Templates

You can create an ONU capability set template to configure ONU parameters such as port
quantity, port type and resource type and then deliver it to a device to quickly adapt to a
new ONU type.

Prerequisite

u You have the Operator Group authority or higher.

u The ONU capability set template function is enabled.

1) Open the server configuration file platform-options.ini in the directory D:


\unm2000\server\etc.

2) Modify the following parameter.


#ONU capability set template
[OnuCapability]
enable = true;
true-enable the ONU capability set function,
false-disable the ONU capability set function

116 Version: 01
8 Configuration Management

Note:

The UMC² Lite services should be restarted after the parameter is changed.

Procedure

1. Select Configure→ONU Capability Profile from the main menu to open the ONU
Capability Profile tab.

2. Click , or right-click in the blank area of the ONU Capability Profile tab and
select Create Profile from the shortcut menu.

3. In the displayed Create a ONU Capability Profile dialog box, set various parameters
and click OK.

Other Operations

Bind an ONU capability set template as follows.

1. On the ONU Capability Profile tab, right-click a desired template and select Binding
To NE from the shortcut menu to open the Select Bound NE dialog box.

2. Select the NE to be bound and click OK. Then its information is displayed in the NE
Bind State pane on the right.

Note:
The ONU capability set template bound with an NE cannot be deleted.

8.3.2 Modifying ONU Capability Set Templates

When existing ONU capability set templates cannot meet your requirements, you can
modify a template as needed.

Prerequisite

u You have the Operator Group authority or higher.

u The ONU capability set template function is enabled.

Version: 01 117
UMC² Lite Unified Management Control Centre User Manual

1) Open the server configuration file platform-options.ini in the directory D:


\unm2000\server\etc.

2) Modify the following parameter.


#ONU capability set template
[OnuCapability]
enable = true;
true-enable the ONU capability set function,
false-disable the ONU capability set function

Procedure

1. Select Configure→ONU Capability Profile from the main menu to open the ONU
Capability Profile tab.

2. Select an ONU capability set template and click , or right-click it and select
Modify Profile from the shortcut menu.

Note:
The ONU capability set template bound with an NE cannot be modified.

Other Operations

Delete an ONU capability set template as follows.

1. On the ONU Capability Profile tab, select an ONU capability set template and click

, or right-click it and select Delete Profile from the shortcut menu.

Note:
The ONU capability set template bound with an NE cannot be deleted.

8.4 Configuring NEs in Batches

The UMC2 Lite can configure access NEs in batches, including calibrating time,
synchronizing alarms and saving configurations to Flash in batches.

118 Version: 01
8 Configuration Management

8.4.1 Calibrating Time in Batches

The UMC2 Lite can calibrate NE time in batches, improving operation efficiency.

Prerequisite

You have configured the UMC² Lite server address in SNMP System Time Config for
NEs.

Procedure

1. Select Configure→OLT NE Batch Configuration→NE Batch Timing from the


main menu to open the NE Batch Timing page of the OLT NE Batch Configuration
tab.

2. Click Batch Timing in the right pane to open the Select NE dialog box.

3. In the Select NE dialog box, select a desired logical domain or desired NEs and click
OK.

4. Click Yes in the displayed alert box to deliver the batch time calibration command.

Note:

When a batch command is being executed, you can click Stop to suspend the
operation.

5. When the batch command is executed successfully, view the time calibration result on
the NE Batch Timing page.

6. (Optional) To calibrate NE time again, select desired objects and click Restart. Click
Yes in the displayed alert box.

8.4.2 Synchronizing Alarms in Batches

Due to network interruption or other failures, alarm data on the UMC² Lite can be
inconsistent with that on NEs. The UMC2 Lite can synchronize alarm data with NEs in
batches to ensure consistency.

Version: 01 119
UMC² Lite Unified Management Control Centre User Manual

Procedure

1. Select Configure→OLT NE Batch Configuration→NE Batch Alarm


Synchronization from the main menu to open the NE Batch Alarm
Synchronization page of the OLT NE Batch Configuration tab.

2. Click Batch synchronization in the right pane to open the Select NE dialog box.

3. In the Select NE dialog box, select a desired logical domain or desired NEs and click
OK to deliver the batch alarm synchronization command.

Note:

When a batch command is being executed, you can click Stop to suspend the
operation.

4. After the batch command is executed successfully, view the alarm batch
synchronization result on the NE Batch Alarm Synchronization page.

5. (Optional) To synchronize NE alarms again, select desired objects and click Restart.

8.4.3 Saving Configurations to Flash in Batches

The UMC2 Lite can save NE configurations to Flash in batches to improve operation
efficiency.

Procedure

1. Select Configure→OLT NE Batch Configuration→NE Batch Save To Flash from


the main menu to open the NE Batch Save To Flash page of the OLT NE Batch
Configuration tab.

2. Click Batch Save in the right pane to open the Select NE dialog box.

3. In the Select NE dialog box, select a desired logical domain or desired NEs and click
OK.

4. Click Yes in the displayed alert box to deliver the command of saving configurations
to Flash.

120 Version: 01
8 Configuration Management

Note:

When a batch command is being executed, you can click Stop to suspend the
operation.

5. When the batch command is executed successfully, view the configuration saving
result on the NE Batch Save To Flash page.

6. (Optional) To save NE configurations again, select desired objects and click Restart.
Click Yes in the displayed alert box.

8.4.4 Configuring VLANs for OLTs in Batches

Functions

The UMC2 Lite can configure VLANs for one or more OLTs in batches.

Supported Device Types

AN5116-06B, AN5516-04 / 06, AN6000-17 / 15 / 7 / 2, AN6001-G16

Prerequisite

You have the Operator Group authority or higher.

Binding VLANs with OLTs

1. Select Configure→OLT NE Batch Configuration→Batch Config VLAN Add to


Port from the main menu to open the Batch Config VLAN Add to Port page of the
OLT NE Batch Configuration tab.

2. Set parameters referring to the table below.

Parameter Settings
(Required) Set the start and end VLAN IDs to be bound.

Start VLAN / End u If the start and end VLAN IDs are different, all VLAN IDs in this VLAN
VLAN to Be VLAN segment will be bound.
Bound With
u If the start and end VLAN IDs are identical, only one VLAN will be bound.
Service
Tag/Untag Set whether to strip VLAN tags. Untag is selected by default.

Bind to All Slots Set whether to bind all slots. This check box is selected by default.

Version: 01 121
UMC² Lite Unified Management Control Centre User Manual

Parameter Settings

Start VLAN of Specify service-bound VLANs to be filtered. This check box is cleared by default.
Service-Bound- If the check box is selected, enter the start VLAN ID to be filtered, which is smaller
Check the Ports
VLAN than or equal to the end VLAN ID.
of Service-
End VLAN of
Bound-VLAN If the check box is selected, enter the end VLAN ID to be filtered, which is equal to
Service-Bound-
or larger than the start VLAN ID.
VLAN
u To configure VLANs for a single OLT, select one NE in the device tree.
Choose Object u To configure VLANs for multiple OLTs, select multiple OLT NEs in the device
tree.

3. Click OK.

Other Operations

Operation Procedure
1. Select Configure→OLT NE Batch Configuration→Batch Config VLAN Add to Port from
the main menu to open the OLT NE Batch Configuration tab.
Modifying VLAN ports
in batches 2. Select one or more VLAN entries and click . In the Modify the Ports of VLAN dialog
box that appears, select the VLAN port numbers to be modified.
3. Click OK.
1. Select Configure→OLT NE Batch Configuration→Batch Config VLAN Add to Port from

Deleting bound VLANs the main menu to open the OLT Ne Batch Configuration tab.

in batches
2. Select one or more VLAN entries and click .
3. Click OK.

8.5 Synchronizing Configurations

The configuration synchronization function compares configuration data on the UMC2 Lite
with that on devices. If any difference is detected, the corresponding data will be
downloaded or uploaded to ensure consistency of configuration data.

Procedure

1. Select Configure→Configuration Synchronization from the main menu to display


the Configuration Synchronization tab.

122 Version: 01
8 Configuration Management

2. Click Add NE to open the Add NE dialog box, select the object to be compared and
click OK. The Configuration Synchronization tab displays the added NE whose
configurations are to be synchronized.

3. Select the object to be compared in the NE list, and click Configuration Comparison
to compare configurations.

4. View the comparison result in the lower part of the Configuration Comparison tab.

Subsequent Operations

When the comparison result shows inconsistency in configurations, you can click Upload
Configurations or Download Configurations to upload or download configurations
according to Table 8-2.

Table 8-2 Configuration Uploading / Downloading

Button Description
Uploads configuration data from devices to the UMC2 Lite
Upload Configurations
database.
Downloads configuration data from the UMC2 Lite database to
Download Configurations
devices.

Version: 01 123
9 Access NE Management and
Maintenance

The UMC² Lite provides easy management and maintenance of access NEs, such as
managing ONUs and ONU ports.

9.1 Configuring Local Services

This section introduces the access path and GUI layout of NE service configuration.

Access

In the NE Manager main menu, select Configuration→Local Service Configuration.

GUIs

The Local Service Configuration tab includes an operation tree pane, a service
configuration pane and an operation information pane, as shown in Figure 9-1.

(1) Operation tree pane (2) Service configuration pane (3) Operation information pane

Figure 9-1 Local Service Configuration GUI

124 Version: 01
9 Access NE Management and Maintenance

9.2 Viewing the ONU List

You can view ONU details and configure ONUs.

Procedure

1. In an NE manager, select the ONU List tab, or click in the menu bar to open the
ONU List tab.

Note:

The ONU list allows you to view the software / hardware version information of
ONUs.

2. Perform the following operations as needed.

Note:

Here take Port Service Config, Service Configuration and View Details for
example.

4 Port Service Config

On the ONU List tab, select an entry and click Port Service Config to view the
port type of the ONU service and the number of ports of different types.

4 Service Configuration

On the ONU List tab, select an entry and click Service Configuration to access
the designated ONU service configuration tab and perform the service
configuration of the ONU.

Version: 01 125
UMC² Lite Unified Management Control Centre User Manual

Note:

Right-click a configuration option in the operation tree and select Favorites


from the shortcut menu to add it to the favorite folder for ease of use. Select
Unsave from the shortcut menu to remove it from the favorite folder.

4 View Details

Click View Details to view the detailed information of a selected ONU,


including ONU Port Panel, ONU Information, ONU Service Information,
LAN Port Status Information, ONU MAC address, ONU Callback
Information and QINQ Domain Attach Information.

9.3 Managing ONUs

This section introduces how to copy / paste ONU port service configurations, deauthorize
ONUs, add users, mark ONUs and reset ONUs.

9.3.1 Copying / Pasting Port Service Configurations

This section introduces how to copy and paste ONU port service configurations.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. In an NE manager, select the ONU List tab, or click in the menu bar to open the
ONU List tab.

126 Version: 01
9 Access NE Management and Maintenance

2. Copy and paste port service configurations in one of the following two ways.

4 Copy and paste port service configurations between ONUs with the same model
but different slot numbers / PON port numbers / ONU numbers.

a) Right-click an ONU on the ONU List tab and select Assistant Functions
→Copy Service Config of the Port from the shortcut menu.

b) Right-click the ONU and select Assistant Functions→Paste Port


Service Configuration from the shortcut menu.

4 Copy and paste port service configurations between different ports.

a) On the ONU List tab, right-click an ONU and select OnuPort Service
Query from the shortcut menu to open the Port Service Config dialog box.

b) Expand Data Port or Voice Port in the left browse tree of the Port Service
Config tab.

c) Right-click a port and select Copy Port Configuration.

d) Right-click a port and select Paste the Port Config and send to device.

9.3.2 Resetting ONUs

This section introduces how to reset ONUs.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. In an NE manager, select the ONU List tab, or click in the menu bar to open the
ONU List tab.

2. Right-click an ONU and select ONU Reset from the shortcut menu.

3. Click Yes in the alert box that appears.

9.3.3 Replacing ONUs

This section introduces how to replace ONUs.

Version: 01 127
UMC² Lite Unified Management Control Centre User Manual

Background

Replace an ONU with another unauthorized ONU under the same PON port.

Prerequisite

u You have the Operator Group authority or higher.

u An unauthorized ONU is available under the same PON port.

Procedure

1. In an NE manager, select the ONU List tab, or click in the menu bar to open the
ONU List tab.

2. Right-click an ONU and select ONU Replace from the shortcut menu.

3. In the ONU Replace dialog box, set New Physic ID.

4. Click OK.

9.4 Setting Card Authorization

This section introduces how to authorize the cards of a device.

Procedure

1. In the menu bar of an NE manager, click to open the Set Card Authorization tab
and view the authorization information of cards.

2. Configure card authorization according to the parameter description in Table 9-1 and
button description in Table 9-2.

Table 9-1 Parameters

Parameter Description
EMS Config Type of a card configured on the UMC² Lite

Device Config Type of a card stored in a device RAM memory

Actual Config Type of a card physically inserted in a device

128 Version: 01
9 Access NE Management and Maintenance

Table 9-2 Buttons

Button Function

Applies UMC² Lite configurations.

Applies device configurations.

Applies actual configurations.

Adds all cards.

Deletes all cards.

Hides empty slots.

3. After cards are authorized, click to deliver the configurations to the


corresponding device.

9.5 Authorizing ONUs

You can authorize ONUs, including configuring the authentication mode of PON ports or
ONUs, authorizing ONUs, replacing ONU logical identifiers, and viewing the list of
authorized ONUs.

9.5.1 Configuring an ONU Whitelist

You can query information of authorized ONUs and pre-authorize unauthorized ONUs. The
ONUs in a white list can be authorized and provisioned with services, while those not in a
whitelist cannot.

Prerequisite

u You have the Operator Group authority or higher.

u PON port authorization types of OLTs have been configured.

Procedure

1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab and check authorized ONUs.

Version: 01 129
UMC² Lite Unified Management Control Centre User Manual

2. Modify ONU whitelist information: Select an entry, double-click Slot No., PON No.,
ONU Type, ONU No., or Enable/Disable, and select a value from the drop-down list
or manually enter a value.

Pre-authorizing ONUs

1. Click on the ONU Authorization View tab. In the displayed dialog box, enter the
number of ONUs to be pre-authorized and click OK.

2. Set parameters of these ONUs in new entries according to PON port authentication
modes.

3. Click on the ONU Authorization View tab to deliver pre-authorization data to


devices.

9.5.2 Managing ONU Authentication Modes

You can view and modify the authentication mode of the ONU connected to a single PON
port, card or device.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab.

2. Click ONU Authentication Mode at the bottom. In the Switch Objects (ONU
Authentication Mode) dialog box that appears, select an object and click OK.

3. To modify the authentication mode of an ONU, double-click the Authentication


Mode field of this ONU and select a desired authentication mode from the drop-down
list. Table 9-3 describes various authentication modes.

130 Version: 01
9 Access NE Management and Maintenance

Table 9-3 ONU Authentication Modes

Authentication Mode Description


Physical address
Authenticates an ONU based on its MAC address.
authentication
Logical SN authentication,
with automatic ONU MAC Converts SN authentication to MAC address authentication.
replacement enabled

Logical SN authentication,
with automatic ONU MAC Authenticates an ONU based on its SN only.
replacement disabled

GPON password
authentication, with Converts GPON password authentication to MAC address
automatic ONU MAC authentication.
replacement enabled

GPON password
authentication, with
Authenticates an ONU based on GPON password only.
automatic ONU MAC
replacement disabled

4. After all settings are done, click to deliver configurations to devices.

9.5.3 Managing PON Port Authentication Modes

You can view and modify the authentication mode of the ONU connected to a single PON
port.

Version: 01 131
UMC² Lite Unified Management Control Centre User Manual

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab.

2. Click PON Port Authentication Mode at the bottom.

3. To modify the authentication mode of an ONU, double-click the Auth Type field of
this ONU and select a desired authentication mode from the drop-down list.

4. After all settings are done, click to deliver configurations to devices.

9.5.4 Replacing ONU Logical Identifiers

When an ONU authenticated based on logical identifier is faulty, you can replace it with
another ONU of the same type, and set the logical identifier of the new ONU to that of the
faulty ONU. Hence, services on the faulty ONU will be automatically downloaded to the
new ONU, with no more service configuration required.

Procedure

1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab.

2. Click Replace the ONU Logic ID at the bottom.

132 Version: 01
9 Access NE Management and Maintenance

3. Click and enter the number of rows to be added in the dialog box that appears.
Then click OK.

4. Set the parameters accordingly.

5. After all settings are done, click to deliver configurations to devices.

9.5.5 Viewing Authorized ONU Information

You can view authorized ONU information.

Procedure

1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab.

2. Click Authorized ONU Information at the bottom. Then click to open the
Switch Object (Authorized ONU Information) dialog box.

3. Select a card or port and click OK to view the information of the authorized ONU
connected to the card or port. Table 9-4 describes the Status column on the ONU
Authorization View tab.

Version: 01 133
UMC² Lite Unified Management Control Centre User Manual

Table 9-4 ONU Authorization Status

Status Description

Authorized An ONU is connected and has received authorization information.


An ONU is disconnected, and its authorization information is stored in the UMC²
Preauthorized
Lite database.

Note:
You can select only one card in the Switch Object (Authorized ONU
Information) dialog box.

Other Operations

Switch objects for query.

1. On the ONU Authorization View tab, click .

2. In the displayed Switch Object (Authorized ONU Information) dialog box, select
another card or PON port and click OK. The ONU Authorization View tab displays
the information of authorized ONUs under this selected object.

134 Version: 01
9 Access NE Management and Maintenance

9.5.6 Enabling / Disabling Automatic ONU Discovery on PON


Ports

You can enable or disable automatic ONU discovery on PON ports.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab.

2. Click Switch of PON Auto Sense ONU at the bottom.

3. Double-click the Switch field of an ONU and select Enable or Disable from the
drop-down list.

4. After all settings are done, click to deliver configurations to devices.

9.6 Synchronizing ONUs Manually

You can manually synchronize ONU authorization information on devices to the UMC²
Lite.

Version: 01 135
UMC² Lite Unified Management Control Centre User Manual

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. In the menu bar of an NE manager, click . Then the system displays a


synchronization success prompt, showing that ONU authorization information on the
device has been synchronized to the UMC² Lite.

9.7 Obtaining Unauthorized ONU Data

You can obtain the information of unauthorized ONUs.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. In the menu bar of an NE manager, click to open the Switch Object


(Unauthorized ONU List) dialog box.

2. Select a desired PON port and click OK. The ONU Authorization View tab appears,
displaying the unauthorized ONUs.

Subsequent Operations

u Click to read the information of unauthorized ONUs from a device.

u Click to open the Switch Object (Unauthorized ONU List) dialog box and
select another PON port for query.

u Click , and select an ONU authentication mode in the displayed menu. Select a
range in the displayed Configure the Selection Range dialog box and click OK to
authorize the ONU on the displayed ONU Authorization tab.

9.8 Authorizing ONUs Manually

You can authorize ONUs manually.

136 Version: 01
9 Access NE Management and Maintenance

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. In the menu bar of an NE manager, click to open the Manually Authorize ONU
dialog box.

2. Configure the basic information and authentication information, and click Write
Database or Write Equipment according to Table 9-5 to authorize the ONU
manually.

Table 9-5 Buttons

Button Application
It is applied when an ONU is not physically connected. After an ONU is
Write Database connected, you can write the configuration in the database into the device
through Configuration Synchronization.

Write Equipment It is applied when an ONU is physically connected.

9.9 Managing Configuration Export Tasks

This section introduces how to view the data export task information, and how to create and
execute a new task.

9.9.1 Viewing Configuration Export Tasks

By viewing configuration export tasks, you can confirm whether exported data needs to be
saved externally.

Prerequisite

You have the Inspector Group authority or higher.

Procedure

1. Select System→Policy Task Management from the main menu to open the Policy
Task Management window.

Version: 01 137
UMC² Lite Unified Management Control Centre User Manual

2. Select Configuration Backup→Configuration Export Task in the left pane to view


existing configuration export tasks.

3. In the right pane, right-click a task and select View from the shortcut menu to query its
object information, status and file path.

Other Operations

In the right pane, right-click a task and select Enable, Disable, Execute Now, Delete,
View, Attribute or Export from the shortcut menu to perform the corresponding operation.

9.9.2 Creating Configuration Export Tasks

If existing configuration export tasks fail to meet backup requirements, you can create a
new configuration export task as required.

Prerequisite

You have the Operator Group authority or higher.

Procedure

1. Select System→Parameter Settings from the main menu to open the Parameter
Settings dialog box.

2. Select Service Configuration→XFTP Server Settings in the left pane to open the
XFTP Server Settings tab.

3. Click Add, set the parameters such as host name, username, password and path, and
click OK.

138 Version: 01
9 Access NE Management and Maintenance

4. Select System→Policy Task Management from the main menu to open the Policy
Task Management tab.

5. Right-click Configuration Export Task in the left pane or right-click in the right
pane and select Create from the shortcut menu to open the creation dialog box.

6. Set the parameters on the Basic Information, Object Source, and Extend
Information tabs as required, and click OK. The new task appears in the task list.

Note:

Click Copy from other tasks to copy all settings except Task Name from
another task. This improves setting efficiency.

7. Click a task in the left pane to view its object information, status and file path.

9.9.3 Executing Configuration Export Tasks

This section introduces how to execute configuration export tasks.

Prerequisite

u An FTP server has been configured.

u The service for transmitting files between the client and the server is running normally.

u You have the Operator Group authority or higher.

Version: 01 139
UMC² Lite Unified Management Control Centre User Manual

Procedure

1. Select System→Policy Task Management from the main menu to open the Policy
Task Management window.

2. Select Configuration Backup→Configuration Export Task in the left pane to view


existing configuration export tasks.

3. In the right pane, right-click a task and select View from the shortcut menu to query its
object information, status and file path and confirm whether it meets requirements.

4. Right-click the task again and select Execute Now from the shortcut menu, or select it
and click Execute Now at the lower right corner of the tab to export configurations.

140 Version: 01
10 System Maintenance and Management
This chapter introduces common operations in system maintenance and management in
typical OAM scenarios.

10.1 How to Use the NMS Management Tool

You can log into the NMS Management Tool rapidly through the main menu of the UMC 2
Lite. With this tool, you can manage the UMC2 Lite processes / resources / history data,
query the UMC2 Lite operation logs, set system warnings, and import / export the UMC 2
Lite configurations.

10.1.1 Login

This section introduces how to log into the NMS Management Tool.

Prerequisite

The UNMCMService and UNMCMAgent services have been started on the UMC² Lite
server.

Background

Users on the NMS Management Tool are classified into two types: Admin user and Query
user. Only one Admin user can log into the NMS Management Tool at a time.

Procedure

1. Log in using either of the following methods.

4 Select System→NMS Management Tool from the main menu to display the
login window.

4 Type in IP:22302/nmtool in the address bar of the browser to display the login
window.

Version: 01 141
UMC² Lite Unified Management Control Centre User Manual

2. Type in your username and password referring to Table 10-1, and click Login.

Table 10-1 Default Accounts

User Type Username Password

Admin user Admin Admin123!@#


Query user Query Query

10.1.2 Logout

This section introduces how to log out.

Prerequisite

You have logged into the NMS Management Tool (using the Admin user as an example).

Procedure

1. Click the drop-down button of the icon at the upper right corner of the
main GUI.

2. Click logoff from the drop-down menu.

Note:

If remaining idle for a specified period of time, the current user will be logged
out automatically.

142 Version: 01
10 System Maintenance and Management

10.1.3 Switching Languages

This section introduces how to switch languages.

Prerequisite

You have logged into the NMS Management Tool (using the Admin user as an example).

Procedure

1. Click the drop-down button of the icon at the upper right corner of the
main GUI.

2. Select Chinese or English from the drop-down menu.

10.1.4 Modifying Passwords

This section introduces how to modify your password.

Prerequisite

You have logged into the NMS Management Tool (using the Admin user as an example).

Procedure

1. Click the drop-down button of the icon at the upper right corner of the
main GUI.

2. Select modify password from the drop-down menu to open the modify password
dialog box.

3. Enter the old and new passwords, and then click OK.

Version: 01 143
UMC² Lite Unified Management Control Centre User Manual

4. In the system prompt window, click OK.

10.1.5 Checking Browser Compatibility

This section describes how to view the browser versions compatible with the NMS
Management Tool.

Prerequisite

You have logged into the NMS Management Tool (using the Admin user as an example).

Procedure

1. Click the drop-down button of the icon at the upper right corner of the
main GUI.

2. Select browser compatibility from the drop-down menu. In the browser


compatibility dialog box that appears, view the browser versions compatible with the
NMS Management Tool.

10.1.6 Resetting the Password of a Query User

Only the Admin user can reset the password of a Query user.

144 Version: 01
10 System Maintenance and Management

Prerequisite

u The password of the Query user concerned has been modified.

u You have logged into the NMS Management Tool as an Admin user.

Procedure

1. Click the drop-down button of the icon at the upper right corner of the
main GUI.

2. Select reset query user password from the drop-down menu to open the reset
query user password dialog box.

3. Enter your login password and click OK.

4. When the system shows the prompt reset query password success, click OK.

10.1.7 Managing Account Policies

Only the Admin user can manage account policies.

Prerequisite

You have logged into the NMS Management Tool as an Admin user.

Procedure

1. Click the drop-down button of the icon at the upper right corner of the
main GUI.

Version: 01 145
UMC² Lite Unified Management Control Centre User Manual

2. Select account strategy from the drop-down menu to open the account strategy
dialog box.

3. Set the parameters in the account strategy dialog box, and click OK.

Parameter Description
Auto unlock time (1-1440 Set a waiting period after which a locked account will be
minutes) automatically unlocked.

User illegal enter times (1-99 Set the number of illegal login attempts that triggers account
times) locking.

4. Click OK in the displayed success prompt box.

10.1.8 Managing Processes

The Process window lists the UMC² Lite processes in a table. The operation GUI and
operation items displayed vary with user types.

Process Management GUI

u Operation GUI for Admin users

146 Version: 01
10 System Maintenance and Management

u Operation GUI for Query users

Managing Processes

User Type Operation Item Procedure


Starting a service Select a service in the stop status and click start.

Select a service in the start or initialize status and click


Stopping a service
stop.
Admin user
Restarting a service Select a desired service and click restart.
Starting the UMC² Lite Click start all to start all UMC² Lite services.
Stopping the UMC² Lite Click stop all to stop all UMC² Lite services.

Version: 01 147
UMC² Lite Unified Management Control Centre User Manual

User Type Operation Item Procedure


Restarting the UMC²
Click restart all to restart all UMC² Lite services.
Lite
Select a desired service, and click One-click Export of
Exporting dump / log
Dump/Log to export dump / log files to a specified FTP
files with one click
server.
Click refresh to display the latest service status and
Refreshing
process details.

Filtering by status Click in the status column and select a desired


status type.
Admin / Query
user Filtering by manage
Click in the manage type column and select a
type
desired startup mode.

Querying details Click in the service column to view the details


of a specified process.

10.1.9 Managing Resources

The Resource page shows resource usages of the operating system, network management
system and database. Admin and Query users have the same management authority.

Resource Management GUI

Managing Resources

User Type Operation Item Procedure

1. Click the operation system tab to view the host


information, and CPU / memory / disk usage of an
Admin / Query Viewing resource usage
operating system.
user of an operating system
2. Click to view the usage details of disk
resources.

148 Version: 01
10 System Maintenance and Management

User Type Operation Item Procedure

Click the network management system tab to view the


Viewing resource usage
CPU usage, memory usage and handle quantity of UMC²
of the UMC² Lite
Lite services.
Viewing resource usage Click the database tab to view the total space, used
of databases space and utilization ratio of databases.

Refreshing Click refresh to display the latest resource usage details.

10.1.10 Managing History Data

You can set search criteria to query history data of operation system, network
management system, and database. The UMC² Lite displays queried history data in
curve charts. Admin and Query users have the same management authority.

History Data Management GUI

Managing History Data

User Type Operation Item Procedure

1. Click the operation system tab.


2. Select a time range from the time range drop-down
Querying history data of
list for query.
an operating system
3. Select a server from the server drop-down list.
4. Click search.
Admin / Query
1. Click the network management system tab.
user
2. Select a time range from the time range drop-down
Querying history data of list for query.
the UMC² Lite 3. Select service names (up to three items can be
selected at a time) from the service drop-down list.
4. Click search.

Version: 01 149
UMC² Lite Unified Management Control Centre User Manual

User Type Operation Item Procedure

1. Click the database tab.


2. Select a time range from the time range drop-down
list for query.
Querying history data of
3. Select database names (up to three items can be
databases
selected at a time) from the database drop-down
list.
4. Click search.
Zooming in the curve Press and hold the cursor to select a specified area on the
chart curve graph.

Reseting the curve chart Click reset to restore a curve chart to its default size.

10.1.11 Managing Logs

You can set search criteria to query operation logs of users who log into the NMS
Management Tool. Admin and Query users have the same management authority.

Log Management GUI

Managing Logs

User Type Operation Item Procedure

1. Select a time range from the time range drop-down


list for query.
Admin / Query Querying logs
2. Click refresh to display logs within the specified
user
time range.

Refreshing Click refresh to display the latest logs.

150 Version: 01
10 System Maintenance and Management

10.1.12 Setting Parameters

On the Settings page, an Admin user can set alarm thresholds for the operating system,
network management system and database, storage periods for history data and log data,
and auto exit time, while a Query user can only view data.

Settings GUI

Figure 10-1 Operation GUI for Admin Users

Figure 10-2 Operation GUI for Query Users

Version: 01 151
UMC² Lite Unified Management Control Centre User Manual

Management Parameter Settings

User Type Operation Item Procedure


Set warning and alarm thresholds in the corresponding
text boxes, and click save.
Setting warning and
alarm thresholds u Warning threshold: an integer ranging from 20 to 98

u Alarm threshold: an integer ranging from 21 to 99

Setting data storage In the data storage time text box, enter an integer ranging
Admin user periods from 1 to 90, and click save.
Reseting parameters Click reset to restore all parameters to default values.

Turn on the automatic exit switch and set the automatic


exit time. If the current user remains idle after the session
Setting automatic exit
times out, he / she is logged off automatically and the
login page is displayed.

Querying parameter
On the main GUI of the NMS Management Tool, click
Query user settings of the NMS
Settings.
Management Tool

10.1.13 Importing / Exporting Configuration Files

On the NMS Management Tool, an Admin user can import or export configuration files and
set relevant parameters to control export policies and path. A Query user can only export
configuration files.

Import/Export GUI

Figure 10-3 Operation GUI for Admin Users

152 Version: 01
10 System Maintenance and Management

Figure 10-4 Operation GUI for Query Users

10.1.13.1 Setting a Timer

After a timer is enabled, the NMS Management Tool automatically exports configuration
files at a specified time.

Prerequisite

You have logged into the NMS Management Tool as an Admin user.

Procedure

1. On the Import/Export page, click set timer.

2. Click the Edit button to open the following page.

3. Set timer parameters referring to the following table.

Parameter Settings

Interval time 1-364 days


Enable Yes
Execution time [0-23] h [0-59] min
timer
No - -

4. Click OK.

Version: 01 153
UMC² Lite Unified Management Control Centre User Manual

10.1.13.2 Setting a Backup Server

The NMS Management Tool can export a configuration file to a specified server.

Prerequisite

You have logged into the NMS Management Tool as an Admin user.

Procedure

1. On the Import/Export page, click set backup server to open the set backup
server page.

2. Set the parameters of a backup server referring to the following table.

Parameter Settings
Export file name Enter a custom export file name.

Local backup Enter a directory for storing backup files on the


folder UMC² Lite server.
Local
Maximum number
backup
of local backup Enter an integer ranging from 1 to 100.
files
Backup XFTP IP address Enter the IP address of an XFTP server.
type
Protocol type Select a protocol type from the drop-down list.
FTP Enter the communication port between an XFTP
Port
backup server and the UMC² Lite server.
FTP username Enter the username for logging into an XFTP server.

FTP password Enter the password for logging into an XFTP server.

3. Click OK.

10.1.13.3 Exporting Dump / Log Files with One Click

This section introduces how to set export parameters and export history dump / log files
manually.

Prerequisite

You have logged into the NMS Management Tool as an Admin user.

154 Version: 01
10 System Maintenance and Management

Procedure

1. On the Import/Export tab, click One-click Export of Dump/Log to open the One-
click Export of Dump/Log page.

2. Set export parameters by referring to the following table, and click OK.

Note:

After setting an XFTP server, click Test to detect the connectivity between the
UMC² Lite server and the XFTP server.

Parameter Settings
Export the file
Select a desired file type, Dump File or Log File.
Basic type manually
parameter Export the
Set whether to export dump / log files automatically. If it is selected,
settings switch
generated dump / log files will be automatically exported.
automatically
XFTP IP
Enter the IP address of an XFTP server.
address

XFTP server Protocol type Select a protocol type from the drop-down list.

parameter Enter the communication port between an XFTP server and the
Port
settings UMC² Lite server.
User Name Enter the username for logging into an XFTP server.

Password Enter the password for logging into an XFTP server.

3. (Optional) Click Export History dump/log Files. In the Export History dump/log
Files dialog box that appears, set the export file type and the start and end time range
of files. And then click OK.

Version: 01 155
UMC² Lite Unified Management Control Centre User Manual

10.1.13.4 Importing

This section introduces how to import a configuration file from a backup server.

Prerequisite

u You have logged into the NMS Management Tool as an Admin user.

u All UMC² Lite services have been stopped. For details, see Stopping the UMC² Lite
in Managing Processes.

Procedure

1. On the Import/Export page, click config detail to view detailed configurations.

2. Return to the Import/Export page and click import. The following page appears.

156 Version: 01
10 System Maintenance and Management

3. Click OK to go to the import parameter setting page.

4. Select local backup or FTP backup from the drop-down list of import type.

5. Select the configuration file to be imported in import file.

6. Click OK.

10.1.13.5 Exporting

This section introduces how to manually export a configuration file to a backup server.

Prerequisite

u You have logged into the NMS Management Tool.

u You have set a backup server.

Procedure

1. On the Import/Export page, click config detail to view detailed configurations.

2. Return to the Import/Export page and click export.

Version: 01 157
UMC² Lite Unified Management Control Centre User Manual

3. Enter the description information of the configuration file in the file description text
box.

4. Click OK.

10.2 Network Detection

The UMC² Lite provides network connectivity detection. It can check whether network
connections and hosts are accessible, provide security protocols for remote login sessions
and other network services, and test gateways through which packets are transmitted from a
host to a destination, and configure and maintain devices.

Function Description
Ping is used to send ping packets to a remote host and check whether the host is
Ping
accessible. It is used to check whether network connections or lines are faulty.

SSH is short for secure shell protocol established by the IETF network working
SSH group. It encrypts online packets through encryption technologies before sending
them. This guarantees the security of data transmission.

As a member of the TCP/IP protocol suite, Telnet is a standard protocol and a typical
Telnet approach for remote login through the Internet. It is used to log into a device
remotely for configuration and maintenance.

10.2.1 Ping

Ping checks whether the UMC² Lite is communicating well with NEs.

Prerequisite

Ping parameters have been configured.

Procedure

u For non-optical NEs

1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→Ping from the shortcut menu.

2) View the result on the Ping tab that appears.

u For optical NEs

158 Version: 01
10 System Maintenance and Management

1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→Ping from the shortcut menu.

2) In the Select NE dialog box that appears, select the sub-NEs under an optical NE
and click OK.

3) View the result on the Ping tab that appears.

Note:

If the system displays Request timed out, check the connection between the
UMC² Lite and the NE to eliminate possible faults and then ping the NE again.

10.2.2 Telnet

You can log into devices remotely through Telnet to configure and maintain them.

Prerequisite

u A Telnet / SSH proxy server has been configured.

u You have the Operator Group authority or higher.

Procedure

u For non-optical NEs

1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→Telnet from the shortcut menu.

2) After logging into the device through Telnet, enter desired commands on the
Telnet tab to operate the device.

u For optical NEs

1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→Telnet from the shortcut menu.

2) In the Select NE dialog box that appears, select the sub-NEs under an optical NE
and click OK.

3) After logging into the device through Telnet, enter desired commands on the
Telnet tab to operate the device.

Version: 01 159
UMC² Lite Unified Management Control Centre User Manual

10.2.3 SSH

This section introduces how to start the SSH command line tool.

Background

SSH is a remote login protocol developed based on the traditional Telnet protocol. It greatly
improves network security by encrypting and authenticating network data.

You can log into a specified NE via the SSH tool and manage NEs using command lines.

Prerequisite

u You have the Operator Group authority or higher.

u A Telnet / SSH proxy server has been configured.

u SSH has been enabled as follows.

1) Select Configuration→Local Service Configuration in the menu bar of an NE


manager to open the Local Service Configuration tab.

2) Select Common Config→SSH Config in the left operation tree to open the SSH
Config tab.

3) Set SSH Enable to Enable.

Procedure

1. For non-optical NEs

1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→SSH from the shortcut menu.

2) On the SSH tab, enter your username and password and click OK.

2. For optical NEs

1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→SSH from the shortcut menu.

2) In the Select NE dialog box that appears, select the sub-NEs under an optical NE
and click OK.

3) On the SSH tab, enter your username and password and click OK.

160 Version: 01
10 System Maintenance and Management

Other Operations

Manage NEs using command lines referring to CLI Configuration Guide of the
corresponding device.

Version: 01 161
Appendix A Abbreviations

ASON Automatically Switched Optical Network

BML Business Management Layer

BMS Business Management System

CORBA Common Object Request Broker Architecture

CPU Central Processing Unit

DCC Data Communication Channel


DCN Data Communication Network
DDN Digital Data Network

EML Element Management Layer

EMS Element Management System

EPON Ethernet Passive Optical Network

GPON Gigabit-Capable Passive Optical Network

FTP File Transfer Protocol


GE Gigabit Ethernet

GNE Gateway Network Element

GUI Graphical User Interface

IP Internet Protocol
International Telecommunication Union-
ITU-T
Telecommunication Standardization Sector
MSAN Multi-Service Access Network
NE Network Element
NEL Network Element Level
NML Network Management Layer

NMS Network Management System

OLT Optical Line Terminal

ONT Optical Network Terminal

ONU Optical Network Unit

REST Representational State Transfer

SML Service Management Layer

SMS Service Management System

TCP Transfer Control Protocol


TL1 Transaction Language 1

TMN Telecommunications Management Network

162 Version: 01
Appendix A Abbreviations

UDP User Datagram Protocol

XML Extensible Markup Language

Version: 01 163

You might also like