UMC Lite User Manual
UMC Lite User Manual
User Manual
Version: 01
February 2023
Copyright © FiberHome Telecommunication Technologies Co., Ltd. All rights reserved.
No part of this document (including the electronic version) may be reproduced or transmitted in any form or by
any means without prior written permission from FiberHome.
General Disclaimer
All or part of the products, services and features described in this document may not be within your purchase
scope or usage scope. In case of inconsistency, the contract shall prevail.
The information in this document may contain predictive statements. Actual results may differ materially from
those expressed or implied in predictive statements due to numerous factors. Therefore, such information is
provided for reference purpose only and constitutes neither an offer nor an acceptance.
Information in this document is subject to change without notice due to upgrade or other needs.
Address: No.6, Gaoxinsilu, High-Tech Development Zone, Wuhan, Hubei Province, P. R. China
Postcode: 430205
Website: http://www.fiberhome.com
Tel: +86 800-8800787; +86 400-8890787
Preface
This manual introduces the UMC2 Lite Unified Management Control Centre in terms of
basic operations, online help and management functions, helping you get started with the
UMC2 Lite quickly.
This manual is intended for network management system engineers, network support
engineers, and network maintenance engineers.
Version
Version Description
01 Initial version for the UMC2 Lite
Symbol Conventions
Item Description
Place the UMC² Lite computer away from direct sunlight, electromagnetic interference,
heat source, humidity and dust, and with at least 8 cm distance from other objects to keep
good ventilation.
Ground the UMC² Lite computer case, UPS power supply and switch (or hub) reliably.
Keep the UMC² Lite computer dedicated for network management. Use secure memory
Exit the operating system before shutting down your UMC² Lite computer.
Perform service configuration or expansion through the UMC² Lite when service traffic is
at a relatively low volume.
Manage networks through either the UMC² Lite or the CLI system.
Do not install operating systems incompatible with the UMC² Lite version.
Do not change the system protocol, host name, and IP address without permissions.
Do not log into the database using tools and directly add, delete, or modify data in the
database.
Do not delete files of the UMC² Lite without permissions.
1 Overview ........................................................................................................1
1.1 Positioning.........................................................................................1
4.6 Setting the Time Zone and Time of the UMC² Lite Server....................... 15
This chapter introduces the positioning and functions of the UMC2 Lite.
1.1 Positioning
The UMC2 Lite Unified Management Control Centre is a small-scale terminal software
product developed by FiberHome Telecommunication Technologies Co., Ltd. (hereinafter
referred to as FiberHome) to manage and maintain FiberHome optical network access
devices locally. It features
u Lightweight design catering for enterprise users, able to manage 500 equivalent NEs or
less.
1.2 Functions
u NE configuration management
u Security management
u Alarm management
u Resource management
u Configuration management
u Log management
Version: 01 1
2 Installing the Software
Before installing the UMC2 Lite, make sure the hardware and software configurations of the
computer concerned meet the requirements.
Hardware Configuration
The UMC2 Lite is installed on a portable computer. Table 2-1 shows the recommended
hardware configurations of the computer concerned.
Network card GE
Software Configuration
Table 2-2 shows the recommended software configuration of the computer to be installed
with the UMC2 Lite.
2 Version: 01
2 Installing the Software
Background
u The UMC2 Lite is incompatible with the UNM2000 client. If the current computer
already has the UNM2000 client installed, uninstall it and enter the ie4uinit-show
command in the CLI to clear the icon cache. Then install the UMC2 Lite.
u The database is built into the UMC2 Lite, and can be used directly after the UMC2 Lite
is installed. Automatic database clearing and startup is allowed.
Prerequisite
u The hardware and software configurations of the computer concerned meet the
requirements.
u Firewall rules have been set, or the system firewall and anti-virus software have been
disabled.
Procedure
1. Double-click the installation program for the UMC2 Lite. In the dialog box that appears,
click Next.
Version: 01 3
UMC² Lite Unified Management Control Centre User Manual
3. Select an installation directory for the UMC2 Lite and click Next.
4 Version: 01
2 Installing the Software
5. Confirm the local ID obtained automatically by the installation program, and click
Next.
Note:
Version: 01 5
UMC² Lite Unified Management Control Centre User Manual
Prerequisite
u The UMC2 Lite services have all been started, and the UMC2 Lite Web can access the
database directly.
Procedure
1. Double-click the installation program for the UMC2 Lite Web. In the dialog box that
appears, click Next.
6 Version: 01
2 Installing the Software
3. Select an installation directory for the UMC2 Lite Web and click Next.
Version: 01 7
UMC² Lite Unified Management Control Centre User Manual
5. Confirm the local ID obtained automatically by the installation program, and click
Next.
Note:
6. Click Next.
8 Version: 01
2 Installing the Software
Version: 01 9
3 Verifying the Installation
This chapter introduces how to verify the installation of the UMC2 Lite and the UMC2 Lite
Web.
Prerequisite
u The UMC2 Lite client and the UMC2 Lite Web have been installed.
Note:
Procedure
1. Double-click the shortcut icon of the UMC2 Lite client to open the login dialog box.
2. Enter your username and password (both are admin by default), and the master server
IP address. Then click Login. If you can log in successfully, the UMC2 Lite has been
installed correctly.
3. Enter https://IP/ in the address bar of your browser, and press Enter to open the
UMC2 Lite Web page.
10 Version: 01
3 Verifying the Installation
Note:
4. Enter your username and password (same as those used on a client), and click Login.
If you can log in successfully, the UMC2 Lite Web has been installed correctly.
Version: 01 11
4 Getting Started
This chapter introduces common operations and GUIs of the UMC2 Lite to help you get
started quickly.
This section introduces how to log into and out of the UMC² Lite.
Prerequisite
u The UMC2 Lite server has been installed successfully and all services have been
started properly.
Procedure
1. Enter https://IP/ in the address bar of your browser, where IP is the IP address of the
UMC2 Lite server.
2. Enter your username and password, and click Login to log into the main screen of the
UMC2 Lite.
Note:
12 Version: 01
4 Getting Started
Procedure
1. Mouse over at the upper-right corner of the UMC2 Lite main screen.
2. Select Exit from the drop-down menu, and click OK in the displayed alert box to log
out.
A license controls available functions and management capabilities on the UMC 2 Lite.
Without a license, you cannot log into a UMC2 Lite client.
Background
u After the UMC2 Lite is installed, you should apply for an official license.
Note:
Prerequisite
Procedure
Version: 01 13
UMC² Lite Unified Management Control Centre User Manual
4. In the Open dialog box, select a desired license file and click Open.
5. In the License Comparison dialog box, check control items of the original and new
license files and then click Confirm to Update License.
Procedure
2. View license control items in the License Management dialog box that appears.
Background
Procedure
1. Select Help→License Management from the main menu to open the License
Management dialog box.
14 Version: 01
4 Getting Started
Procedure
This section introduces how to modify the time zone and time of the UMC² Lite server.
Operation steps may vary slightly with operating systems. Here Windows Server 2012 R2
OS is taken for example.
Procedure
3. In the Date and Time dialog box, click Change time zone or Change date and
time to modify the time zone and time of the server.
Version: 01 15
UMC² Lite Unified Management Control Centre User Manual
This section introduces how to set the GUI display effect according to preferences.
Procedure
1. Select System→Parameter Settings from the main menu to open the Parameter
Settings dialog box.
You can send consecutive ping commands or forward ping commands through the server to
check whether the UMC² Lite can communicate with an NE.
Prerequisite
Background
u When Consecutive Ping is not selected, the UMC² Lite sends ping commands four
times at most.
u When a client cannot ping an NE, you can select Forward Ping Packet via the
Server to further check whether the UMC² Lite can communicate with the NE.
u After ping parameters are set on a client, they take effect immediately.
Procedure
1. In the left pane of the Parameter Settings dialog box, select Local Settings→
Param Settings→Ping Parameter Config to open the Ping Parameter Config
dialog box.
2. Set ping parameters as required and click Apply. Then these settings take effect
immediately.
4 If Consecutive Ping is selected, the UMC² Lite will send ping commands
consecutively to an object after you right-click it and select Ping from the
shortcut menu.
16 Version: 01
4 Getting Started
4 If Forward Ping Packet via the Server is selected, ping commands are
forwarded by the server.
4 Set PING Time_Out, which is 4000 ms by default and ranges from 0 to 9999 ms.
When a UMC² Lite client cannot access devices directly, it can access them via Telnet /
SSH or access a Telnet / SSH proxy server to perform operations through CLI.
Prerequisite
Background
Procedure
1. In the left pane of the Parameter Settings dialog box, select Local Settings→
Param Settings→Telnet/SSH Proxy Server to open the Telnet/SSH Proxy
Server dialog box.
2. Select Enable Telnet/SSH Proxy Server, set the information of a proxy server as
required and click Apply. These settings take effect immediately.
You can customize the default page displayed after an NE manager is opened.
Background
This setting takes effect immediately on the current client. After logging into the server
from the current client, all users can see the setting result.
Version: 01 17
UMC² Lite Unified Management Control Centre User Manual
Procedure
1. In the left pane of the Parameter Settings dialog box, select Local Settings→
Switch Settings→Default Page Open Setting to open the Default Page Open
Setting dialog box.
3. Click Apply after all settings are done. Then the settings take effect immediately.
Other Operations
You can set the personalization switch to show vendor information in the ONU list.
Background
This setting takes effect immediately on the current client. After logging into the server
from the current client, all users can see the setting result.
Procedure
1. In the left pane of the Parameter Settings dialog box, select Local Settings→
Switch Settings→Personal Style Setting to open the Personal Style Setting
dialog box.
2. Select ONU vendor info show setting and click Apply. This setting takes effect
immediately.
Other Operations
You can set the unit of performance values to MBit or MByte as needed.
18 Version: 01
4 Getting Started
Background
This setting takes effect immediately on the current client. After logging into the server
from the current client, all users can see the setting result.
Procedure
1. In the left pane of the Parameter Settings dialog box, select Local Settings→
Switch Settings→PM Show Unit Setting to open the PM Show Unit Setting
dialog box.
2. Select the unit of performance values and click Apply. This setting takes effect
immediately.
Note:
Other Operations
You can set colors for different alarm levels to identify them easily.
Background
u After colors are set for different alarm levels, alarm icons in topology views, alarm
entries queried and indicators on the alarm panel are displayed in the set colors.
u The UMC2 Lite provides four alarm prompt colors by default: critical alarms ,
major alarms , minor alarms , and warning alarms .
Procedure
1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Local Settings→Alarm Color to open the Alarm Color dialog box.
Version: 01 19
UMC² Lite Unified Management Control Centre User Manual
2. In the Set a Color for the Alarm Level combo box, click the button on the right
side of each alarm level to select a desired color.
3. In the Set the Background Color of the List combo box, click the button on the
right of each alarm level to select a desired background color.
4. Set parameters as needed and then click Apply. This setting takes effect immediately.
Other Operations
You can set display modes of new alarms or events to get informed conveniently.
Background
Procedure
1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Local Settings→New Alarm / Event to open the New Alarm / Event dialog box.
2. Set parameters as needed and then click Apply. This setting takes effect immediately.
Other Operations
You can set the maximum number of monitoring / startup templates and the automatic alarm
report window to get alarm information quickly.
Background
20 Version: 01
4 Getting Started
u Startup template: After you log in, the UMC2 Lite will query alarms according to a
startup template and display a query result window automatically. You can set up to
five startup templates by default.
u Monitoring template: After you log in, the UMC2 Lite will collect alarms according to
a monitoring template. Only a current alarm query template can be selected as a
monitoring template. You can set up to five monitoring templates by default.
Procedure
1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Local Settings→Others to open the Others dialog box.
2. Set the parameters as needed and then click Apply. The settings take effect
immediately.
Other Operations
You can set a delay for converting current alarms to history alarms as needed.
Prerequisite
Background
After being acknowledged and cleared, current alarms are converted to history alarms when
the set delay time expires.
Procedure
2. Set a delay for converting current alarms to history alarms as needed. Click Apply, and
the settings will take effect immediately.
Version: 01 21
UMC² Lite Unified Management Control Centre User Manual
Note:
Value range: 1 to 30 days / 1 to 720 hours / 1 to 43200 minutes. When the delay
is set to 1 minute, current alarms are immediately converted to history alarms.
For easy maintenance, the UMC2 Lite allows automatic acknowledgment by alarm level or
by custom rule for unacknowledged but cleared alarms. You can set automatic
acknowledgment rules for cleared alarms as needed.
Prerequisite
Background
u The system default automatic acknowledgment rule cannot be deleted. You can only
modify its acknowledgment mode.
u After being automatically acknowledged, cleared alarms will turn to history alarms
when the preset delay time expires. For setting the delay time, see Setting Definition of
History Alarms.
Procedure
1. Select Alarm Settings→Server Settings→Auto Confirm from the left pane of the
Parameter Settings dialog box.
22 Version: 01
4 Getting Started
Operation Procedure
1. Select the Enable check box of an automatic alarm acknowledgment
rule and set Confirmation Mode.
Setting automatic 2. To set Delay Confirmation, you need to set the acknowledgment time
acknowledgment by and delay in the Delay Confirmation area. It is advised to set the
alarm level acknowledgment time to 02:00, and the delay to 1-2 days.
3. Click Apply.
4. Click OK.
1. Click New to open the Create Alarm Auto Confirmation Rule dialog
box.
2. Set parameters on the Basic information, Confirming Condition and
Setting automatic Alarm Source tabs respectively, and then click OK.
acknowledgment by 3. To set Delay Confirmation, you need to set the acknowledgment time
rule and delay in the Delay Confirmation area. It is advised to set the
acknowledgment time to 02:00, and the delay to 1-2 days.
4. Click Apply.
5. Click OK.
Other Operations
u Select a custom automatic alarm acknowledgment rule and click Edit to modify it.
u Select a custom automatic alarm acknowledgment rule and click Delete to delete it.
With automatic alarm synchronization, alarms will be automatically synchronized after the
UMC2 Lite restarts or recovers from an NE communication interruption. This keeps
consistent alarm data on the UMC2 Lite and NEs.
Prerequisite
Procedure
1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Server Settings→Auto Synchronization.
Version: 01 23
UMC² Lite Unified Management Control Centre User Manual
Note:
u For IPRAN and POTN devices, the UMC2 Lite issues forcible
synchronization commands to synchronize alarms with them.
Special alarm icons are displayed at the upper right corner of an NE icon. You can
configure special alarm icons for alarms of concern to identify them easily.
Prerequisite
Background
If multiple special alarms occur simultaneously, the alarms with higher priority (larger value)
will be displayed first.
Procedure
1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Server Settings→Special Icon of the Alarm.
2. Set display rules of special alarm icons and customize special alarms as needed.
24 Version: 01
4 Getting Started
Setting basic alarm parameters allows you to acknowledge and clear alarms with one click.
Background
After setting basic alarm parameters, you can acknowledge and clear current or history
alarms with one click. This makes OAM more efficient.
Procedure
1. In the left pane of the Parameter Settings dialog box, select Alarm Settings→
Server Settings→Alarm Basic Setting to open the Alarm Basic Setting dialog
box.
2. Select the Show Confirming and Clearing Alarm Function check box and click
Apply. Then this setting takes effect immediately.
Operation Result
On the Current Alarm and History Alarm tabs, select one or more alarms, right-click
them and select Confirm and Clear Alarm from the shortcut menu to acknowledge and
clear them.
Set an XFTP server and its parameters to transmit data between the UMC 2 Lite server and
clients.
Background
An XFTP server is used for NE software management. The UMC² Lite server and clients
transfer files such as NE software packages and NE configuration files by FTP via this
server.
Prerequisite
Version: 01 25
UMC² Lite Unified Management Control Centre User Manual
1. In the left pane of the Parameter Settings dialog box, select Service
Configurations→XFTP Server Settings to open the XFTP Server Settings tab.
2. Click Add to add a blank row on the tab. Then set XFTP server parameters according
to the following table.
Parameter Description
Host Name Name of the host running the XFTP server, which can be customized.
Click the Protocol Type field and select FTP (default), SFTP or TFTP
Protocol Type
from the drop-down list.
User Name User name for logging into the XFTP server.
Number of the port for logging into the XFTP server. It varies with protocol
types.
Port Number u Port 21 for FTP
u Port 22 for SFTP
u Port 69 for TFTP
Path for storing files on the XFTP server.
Path format:
u The symbol / denotes the root directory and ./ denotes the current
Path
directory.
u The path cannot contain a drive letter (e.g., D:) and illegal characters (?
>|"*:).
3. After all settings are done, click Apply. The new XFTP server appears on the tab.
4. Select the new XFTP server and click Test XFTP. If the prompt XFTP testing
succeeded appears, the XFTP server is properly connected.
1. In the left pane of the Parameter Settings dialog box, select Service
Configurations→XFTP Server Settings to view XFTP server settings.
2. Select the FTP User Management tab to view existing FTP user information.
3. Click Add to add a blank row on the tab and set FTP user parameters.
4. Enter the information of the new FTP user referring to the table below.
26 Version: 01
4 Getting Started
Parameter Description
Required. It is a string of 1 to 32 characters, which supports ASCII codes
User Name ranging from 0x21 to 0x7e.
You can add up to 50 FTP users.
Other Operations
Select an XFTP server no longer needed and click Delete to delete it.
Note:
To modify a user path, disconnect the current FTP server and log in again;
otherwise, the changes will not take effect.
You can set the volume size of exported files and split a large exported file into multiple
volumes of the set size.
Background
This setting takes effect immediately on the current client. After logging into the server
from the current client, all users can see the setting result.
Version: 01 27
UMC² Lite Unified Management Control Centre User Manual
Procedure
1. In the left pane of the Parameter Settings dialog box, select Service
Configurations→File Export Setting to open the File Export Setting dialog box.
3. Select a volume size from the drop-down list and click Apply. This setting takes effect
immediately.
Other Operations
The UMC2 Lite provides license expiration prompts, reminding you to update your license
in time.
Prerequisite
Procedure
1. In the left pane of the Parameter Settings dialog box, select License Settings→
License Expired Tip Setting.
2. Set The remaining days of the license according to the system reference value and
click Apply→OK.
28 Version: 01
5 Security Management
Security management prevents unauthorized network access and keeps network data secure.
It covers user security policies, authorization, logs and so on.
This section introduces how to create and authorize users according to authority planning.
The UMC2 Lite provides default user groups, object sets, and operation sets. If these default
groups and sets can be applied directly, skip the first three steps.
Version: 01 29
UMC² Lite Unified Management Control Centre User Manual
If custom object sets are planned, you should create them before authorizing user groups.
Prerequisite
Procedure
Set the name and description of an object set on the Basic Information tab of the
Create Object Set dialog box.
1) On the Member tab, click Select to open the Select Management Domain
dialog box.
Note:
u For easy authority maintenance, you are advised to copy members from an
existing object set to a new one as follows. Nesting an object set into a new
one should be avoided.
1) Click Copy Member from Object Set in the Create Object Set
dialog box.
2) Select one or more existing object sets in the Select Object Set
dialog box, and copy their members to the Member tab of the current
object set.
30 Version: 01
5 Security Management
Other Operations
To adjust members of an existing object set, click Select at the lower right corner of its
Member tab. In the displayed dialog box, adjust its members.
If custom operation sets are planned, you need to create them before authorizing user
groups.
Prerequisite
Procedure
On the Basic Information tab of the Create Operation Set dialog box, set the name,
type, and description of an operation set. Its type is NMS Application by default.
1) On the Member tab of the Create Operation Set dialog box, click Select to
open the Select Operation dialog box.
Version: 01 31
UMC² Lite Unified Management Control Centre User Manual
Note:
For easy authority maintenance, you are advised to copy members from an
existing operation set to a new one as follows. Nesting an operation set into a
new one should be avoided.
1. Click Copy Member from Operation Set in the Create Operation Set
dialog box.
2. In the Select Operation Set dialog box, select one or more existing
operation sets, and copy their members to the Member tab of the current
operation set.
Other Operations
To adjust members of an operation set, click Select at the lower right corner of its Member
tab. In the displayed dialog box, adjust its members.
If custom user groups are planned, you need to create them before authorizing new users.
Prerequisite
Procedure
1. Select Security→NMS User Management from the main menu. Right-click User
Group in the left pane and select Create User Group from the shortcut menu.
1) In the Create User Group dialog box, set the name, type, description and
maximum session count of a user group on the basic information tab.
32 Version: 01
5 Security Management
Note:
User group types include ordinary user groups and subdomain security
administrator groups. The latter only has security management authority, which
cannot be modified.
2) (Optional) Set the member of the user group. Click Select to open the Select
User dialog box, select desired users, and click OK.
Note:
u Select a desired user group when creating a user. This user belongs to the
selected user group after creation.
u An existing user can be bound with an additional user group on its User
Group tab. An existing user group can be added with more users on its
Member tab.
1) Click Select on the Management Domain tab of the Create User Group
dialog box.
The management domain tree contains two global logical domains under different
nodes, which, if being selected, lead to different management domain ranges.
¡ Global logical domain under the Device node: Authorization to this domain
means authorization to existing devices in this domain. When a device is
added to this domain, it will not be dynamically added to the management
domain.
Version: 01 33
UMC² Lite Unified Management Control Centre User Manual
1) On the Operation Authority tab of the Create User Group dialog box, click
Select.
2) Select desired authority in the Select Operation Authority dialog box, and click
OK.
Note:
u You can select an operation set in the Optional Authority area and click
on the top of the area to view operations included in this operation set.
5. After all settings are done, click OK in the Create User Group dialog box.
Related Operations
To adjust the authority of an existing user group, click Select at the lower right corner of
the Management Domain or Operation Authority tab. In the displayed dialog box,
adjust the management domain or operation authority of this user group.
You can create and authorize the UMC2 Lite users to play different roles.
Prerequisite
Background
34 Version: 01
5 Security Management
u The username and password of a new user are required while its other attributes can
keep the defaults or be set later.
u The username and password of a new user should meet account and password policies.
Procedure
1. Select Security→NMS User Management from the main menu. Right-click User in
the left pane and select Create User from the shortcut menu.
2. In the Create User dialog box, set basic information, user group and other information
of the user referring to the table below, and click OK.
Parameter Description
Username Sets the user name in the text box.
Real Name (Optional) Sets the real name of a user in the text box.
Employee Number (Optional) Sets the employee ID of a user in the text box.
Unit (Optional) Sets the name of the organization a user works for.
Sets one or more roles for a user. Default: Unm Account selected.
u Unm Account allows logging into the UMC² Lite and operating the system with proper
Role Type permissions.
u Interface Account allows logging into a northbound interface via the UMC² Lite and operating
the system with proper permissions.
Password Sets the password of a user following password policies set in System→Parameter Settings.
Modify Password on (Optional) If this item is selected, the current user will be requested to modify his / her password upon
Next Login next login.
Version: 01 35
UMC² Lite Unified Management Control Centre User Manual
Parameter Description
(Optional) Sets the maximum number of concurrent online users.
Maximum Online u If Unlimited is selected, the system does not limit the number of concurrent online users.
Number u If Unlimited is deselected, set Maximum Online Number. Default: 30.
Value range: 0 to 255.
(Optional) Sets a waiting period before automatic logout, which is disabled by default.
u If Stop the Auto Exit is selected, a user will not be logged out automatically.
Exit after waiting for a
u If Stop the Auto Exit is deselected, set a waiting period before automatic logout. If a terminal is
period (minutes) of
not operated in a specified period, the user on the terminal will be automatically logged out.
Value range: 5 to 600 minutes.
(Optional) Sets the policy for handling accounts that do not log in for a long time. This policy is
disabled by default.
u If Enable is deselected, the policy is disabled.
Unlogged User Policy
u If Enable is selected, choose Disabled or Delete from the drop-down box and set the number of
inactive days. If the current account remains inactive for the specified number of days, it will be
disabled or deleted. Value range: 1 to 300 days.
(Optional) Sets the time range allowed for login. This policy is disabled by default.
u If Enable is deselected, login time is unlimited.
Login Time Range
u If Enable is selected, set a login time range, including date, time and days of the week. In this
case, the current user can log in only within the specified time range.
Parameter Description
Select the User Group tab. The list below shows all user groups to which the user belongs. The user has
access to all management domains and operation authority of these groups.
u Click Select to open the Select User Group dialog box. Select desired user groups from the list and
User Group click OK to save the settings.
u Select one or more user groups in the User Group list and click Delete to unbind the user from these
groups. After deletion, the user no longer has access to management domains or operation authority of
these groups.
36 Version: 01
5 Security Management
Parameter Description
Select the Management Domain tab. The list below shows all managed objects within a user's
management domain. The user can only manage these objects. A valid management domain is a union of
selected devices, device types, object sets and global logical domains.
u Click Select to open the Select Management Domain dialog box. Then select one or more NE
objects from the following to make up the user's Management Domain.
4 Device: Select one or more NEs and add them to the management domain of this user.
Management 4 Device type: Select one or more NE types. The UMC² Lite automatically adds NEs of such types
Domain to the management domain of this user.
4 Global logical domain: Select one or more logical domains. The UMC² Lite automatically adds
NEs in these domains to the management domain of this user.
4 Object set: Select one or more object sets. The UMC² Lite automatically adds NE objects in these
sets to the management domain of this user.
u Select one or more objects in the Management Domain list and click Delete. The user then has no
access to these deleted objects.
Parameter Description
Select the Operation Authority tab. The list below shows all operations available to the user.
u Click Select to open the Select Operation Authority dialog box and select NMS Application. Then
select one or more operations from the following to make up the user's Operation Authority.
Operation 4 Operation set: Select one or more operation sets. Then the UMC² Lite automatically adds
Authority operations in these sets to operation authority of this user.
4 Operation: Select one or more operations and add them to operation authority of this user.
u Select one or more operations in the Operation Authority list and click Delete to delete them from
this user. The user then has no permissions for these deleted operations.
Parameter Description
Set Access Control List of the user. The user can log into the UMC² Lite only through IP addresses in this
list.
Access Control u If Use All Access Control Lists in the System is selected, the IP addresses set in System→
List Parameter Settings→Access Control List apply to this user automatically.
u If Use the Following Specified Access Control List is selected, specify IP addresses for this user
as desired.
Version: 01 37
UMC² Lite Unified Management Control Centre User Manual
By querying authority, you can check authority of users after initial authorization or during
authority maintenance.
A security administrator can view the management domain of a user or user group to
determine managed objects.
Prerequisite
Procedure
2. On the NMS User Management browse tree, expand the User or User Group node,
and select a user or user group.
The table below describes how to view a management domain by managed object.
Managed Object How to View
Device Type Expand the Device Type node and view managed device types.
Expand the Global Logic Domain node and view selected global
Global Logic Domain
logical domains.
Expand the Object Set node and view selected object sets and
Object Set
specific managed objects in these sets.
A security administrator can view operation authority of a user or user group to determine
operation authority for managed objects.
38 Version: 01
5 Security Management
Prerequisite
Procedure
2. On the NMS User Management browse tree, expand the User or User Group node,
and select a user or user group.
3. On the right Operation Authority tab, expand an object node to view operation
authority assigned to the user or user group.
Note:
A security administrator can view user groups to which a user belongs and check his / her
authority inherited from these user groups.
Prerequisite
Background
A user can belong to multiple user groups and inherit all the management domains and
operation authority of them.
Procedure
2. On the NMS User Management browse tree, expand the User node, and select a
user.
Version: 01 39
UMC² Lite Unified Management Control Centre User Manual
3. View the user groups to which the user belongs on the right User Group tab.
This section introduces how to check the users or user groups to which the operation
authority of an operation set is assigned.
Prerequisite
Procedure
2. On the NMS User Management browse tree, expand the Operation Set node, and
select an operation set.
3. View the users / user groups bound to the operation set on the right Service For tab.
Prerequisite
Background
An operation set can include operation subsets. The authority of an operation set is a union
of its operation subsets and specific operations.
Procedure
2. On the NMS User Management browse tree, expand the Operation Set node, and
select an operation set.
40 Version: 01
5 Security Management
3. View specific authority in the operation set on the right Member tab.
Note:
A security administrator can view objects in an object set to determine whether they meet
planning requirements.
Prerequisite
Background
An object set can include object subsets. The valid management domain of an object set is a
union of selected devices, device types, global logical domains, and object subsets.
Procedure
2. On the NMS User Management browse tree, expand the Object Set node, and
select an object set.
3. View specific managed objects in the object set on the right Member tab.
The valid management domain of an object set is a union of selected devices, device
types, global logical domains, and object subsets.
4 Expand the Device node and view specific devices under the Device node.
4 Expand the Device Type node and view specific device types under the Device
Type node.
4 Expand the Global Logic Domain node and view global logical domains
included in the object set. Then go to the Main Topology tab, and view specific
devices included in these global logical domains.
Version: 01 41
UMC² Lite Unified Management Control Centre User Manual
4 Expand the Object Set node and view object subsets in the object set. To view
specific devices included in these object subsets, refer to Steps 2 to 3.
You can effectively improve the security of the UMC2 Lite and prevent unauthorized
operations by means of password management, lockout management, and active user
monitoring.
Procedure
2. In the dialog box that appears, click Yes. Then the current user is logged out, and the
UMC² Lite is restarted and displays a login dialog box.
Related Operations
To log out of a locked client, click Logout in the The window is locked dialog box. Then
click Yes in the alert box that appears.
To ensure secure access to the UMC2 Lite, it is recommended to modify your password
regularly.
Prerequisite
Procedure
42 Version: 01
5 Security Management
2. Click Modify next to Password Management, and set Old Password, New
Password and Confirm Password below.
Note:
3. Click OK.
When your password expires, the system will remind you to modify your password
manually.
Background
Procedure
1. Log into the UMC² Lite using an expired password. An alert box appears, showing that
the password has expired.
2. Click Close in the alert box. In the Modify User Current Password dialog box that
appears, set a new password.
3. In the dialog box, enter the old password and new password (entered twice for
confirmation), and click OK.
If a user password is forgotten, expired or denied access to the UMC 2 Lite, it can be reset by
a security administrator.
Version: 01 43
UMC² Lite Unified Management Control Centre User Manual
Background
u A user in Security Administrator Group can reset the passwords of all users except
admin, other security administrators, and himself / herself.
u The admin user cannot reset his / her own password, and hence should keep it
properly.
Procedure
2. On the NMS User Management browse tree, expand the User node. Right-click a
desired user and select Reset Password from the shortcut menu.
3. In the Reset Password dialog box, set New Password and Confirm Password,
and then click OK.
Note:
If a user is automatically locked due to consecutive input of wrong passwords, he / she can
be automatically unlocked after Auto Unlock Time elapses, or manually unlocked by a
security administrator. Unlocked users can log into the UMC2 Lite.
Background
u A user in Security Administrator Group can unlock all users except admin and
other security administrators.
44 Version: 01
5 Security Management
u The admin user cannot be manually unlocked, and hence should keep his or her
password properly.
Procedure
Automatic A locked user cannot log in until it is automatically unlocked after a specified
Note 1
unlocking time period.
Users in a locked user group cannot log into the UMC2 Lite.
Prerequisite
Procedure
1. Choose Security→NMS User Management from the main menu. Click User
Group in the left pane to expand the User Group node.
2. Right-click a user group such as Inspector Group and select Lock from the shortcut
menu.
Note:
If a user in a locked user group tries to log in, the UMC² Lite will prompt that
his or her user group is locked. That group needs to be unlocked to enable login.
Version: 01 45
UMC² Lite Unified Management Control Centre User Manual
Prerequisite
Procedure
1. Choose Security→NMS User Management from the main menu. Click User
Group in the left pane to expand the User Group node.
2. Right-click a user group such as Inspector Group and select Unlock from the
shortcut menu.
This section introduces how to monitor user activities to prevent unauthorized operations.
Prerequisite
Procedure
2. On the NMS User Management browse tree, expand the User node.
Click User, and check activity information of all users in the right pane.
Click a user under the User node, and click Activity Info in the right pane to see
his or her activity information.
46 Version: 01
5 Security Management
By querying or collecting logs, you can learn about UMC2 Lite running status, system
security, and specific user operations.
Log management includes managing system logs, operation logs and security logs. With
log management, administrators can trace and review user operations, and learn about user
activities and system running status.
System Logs
By viewing system logs, you can identify the risks that affect the running of the UMC² Lite
and handle them promptly to keep the UMC² Lite working well.
Operation Logs
By viewing operation logs, you can trace and review the operations performed by users on
the UMC² Lite.
Security Logs
By viewing security logs, you can learn about security-related operations performed by
users on the UMC² Lite, and take actions accordingly to keep the UMC² Lite secure.
Log Exporting
Logs are periodically exported to servers to allow easy access. Logs can be exported in TXT,
CSV, XML, HTML, PDF and EXCEL formats.
By querying logs, you can learn about UMC2 Lite running status, system security, and
specific user operations.
Version: 01 47
UMC² Lite Unified Management Control Centre User Manual
Background
u Logs are queried based on existing data in the database. If the database is empty, no
data is shown in query results.
u System logs are queried based on authority and domain. That is, they are only
accessible to users having permissions to query system logs.
Procedure
1. Select Security→Query System Logs from the main menu to open the System
Logs tab. The table below describes related parameters.
Parameter Description
Danger Level Danger level of a log, including Prompt, Normal and Danger
Operation
Terminal where an operation is performed
Terminal
Result of an operation: Success, Failed and Partial Success
u Success: An operation is successful and all operation results are returned.
Operation
u Failed: An operation fails and an error code is returned.
Result
u Partial Success: An operation partially succeeds, and all operation results are
returned.
Details Other information of an operation
2. Click Query. Set query criteria in the displayed dialog box and click OK.
Other Operations
To query logs by template, click Query According to Template, and select a desired
template in the Select Template dialog box.
By querying logs, you can learn about UMC2 Lite running status, system security, and
specific user operations.
48 Version: 01
5 Security Management
Operation logs record all operations on clients except those affecting the security of the
UMC² Lite.
Background
u Logs are queried based on existing data in the database. If the database is empty, no
data is shown in query results.
4 The admin user or users in the Administrators group can query operation logs of
all users.
4 Ordinary users that have the authority of querying operation logs but belong to
neither the Administrators group nor Security Administrator Group can only
query their own operation logs.
u The operation logs of the users deleted from user groups can be queried and obtained
by filtering.
Procedure
1. Select Security→Query Operation Logs from the main menu to open the Operation
Logs tab. The table below describes related parameters.
Parameter Description
Operation
Name of an operation
Name
Danger Level Danger level of an operation, including Prompt, Normal and Danger.
Operation
Terminal where an operation is performed
Terminal
Operation
Object on which an operation is performed
Object
Version: 01 49
UMC² Lite Unified Management Control Centre User Manual
Parameter Description
2. Click Query. Set query criteria in the displayed dialog box and click OK.
Other Operations
To query logs by template, click Query According to Template, and select a desired
template in the Select Template dialog box.
By querying logs, you can learn about UMC2 Lite running status, system security, and
specific user operations.
Background
u Logs are queried based on existing data in the database. If the database is empty, no
data is shown in query results.
4 Users in Security Administrator Group can query all users' security logs.
4 Users with the authority of querying security logs can query security logs of their
own.
50 Version: 01
5 Security Management
Procedure
1. Select Security→Query Security Logs from the main menu to open the Security
Logs tab. The table below describes related parameters.
Parameter Description
Danger Level Danger level of an operation, including Prompt, Normal and Danger.
Operation
Terminal where an operation is performed
Terminal
Operation
Object on which an operation is performed
Object
2. Click Query. Set query criteria in the displayed dialog box and click OK.
Other Operations
To query logs by template, click Query According to Template, and select a desired
template in the Select Template dialog box.
By setting log templates, you can query system logs, operation logs, and security logs
quickly.
Version: 01 51
UMC² Lite Unified Management Control Centre User Manual
Background
u Select Security→Query System Logs from the main menu. Click Query
According to Template to set a template.
u Select Security→Query Operation Logs from the main menu. Click Query
According to Template to set a template.
u Select Security→Query Security Logs from the main menu. Click Query
According to Template to set a template.
Prerequisite
Various log query and collection templates are set in a similar way. The following gives an
example of how to set a template for querying system logs.
Procedure
Operation Procedure
1. Click Query.
Creating a 2. In the Query System Logs dialog box, set filter criteria, and click Save as
template Template.
3. In the Save as Template dialog box, enter a template name and click OK.
1. Click Query.
2. In the Query System Logs dialog box, click Select Template.
Modifying a 3. In the Log Template Management dialog box, select a template, and click OK.
template 4. In the Query System Logs dialog box, adjust the query criteria of the log
template, and click Save.
5. In the Select an Item dialog box, click No and modify the template information.
1. Click Query.
Deleting a 2. In the Query System Logs dialog box, click Select Template.
template 3. In the Log Template Management dialog box, select a template, and click
Delete.
52 Version: 01
6 Alarm Management
The UMC2 Lite provides powerful alarm management. It monitors faults and exceptions in
real time during device operation, and provides detailed description and analysis of alarms,
helping you identify and clear faults quickly.
With alarm rules configured, the UMC2 Lite processes alarms efficiently based on these
rules.
By setting alarm reporting rules, you can enable devices to report important alarms and set
prompt tones for them. Then you can monitor them in the alarm report window.
Background
u The alarms meeting reporting rules can be monitored in the alarm report window.
These rules do not affect alarm report to the UMC² Lite.
u Alarm reporting rules are specific to users. After logging in, users can only view the
alarm reporting rules set by themselves.
Prerequisite
Procedure
Version: 01 53
UMC² Lite Unified Management Control Centre User Manual
Operation Procedure
1. Click Report Rule in the left pane, and click Create in the right pane.
Creating alarm reporting 2. In the Create Alarm Report Rule dialog box, set alarm reporting rules
rulesNote 1 as planned.
3. Click OK.
1. Select a rule in the left pane, and modify its parameters as required in
Modifying alarm
the right pane.
reporting rules
2. Click Save All.
1. Click Report Rule in the left pane, and select a rule in the right pane.
Note 2
Deleting alarm reporting
rules 2. Click Delete and then click Yes in the Delete Rule alert box that
appears.
Enabling / disabling
Right-click a rule and select Enable / Disable from the shortcut menu.
alarm reporting rules
Note 1:
u Click Copy from Other Rule, and select a reporting rule in the Select the Report Rule
dialog box to copy its settings. This improves setting efficiency.
u If continuous reporting is enabled, the alarms meeting reporting rules will be reported
again after the set time interval expires.
u If you select Set a Sound on the Sound Settings tab and select a sound file, the system
plays the sound file when a matching alarm is reported.
Note 2: Hold down Shift or Ctrl to select multiple rules simultaneously.
You can set alarm masking rules to mask certain alarms. So you can focus on important
alarms and troubleshoot faults efficiently.
Prerequisite
4 Users in the Administrators group can view, modify and delete all rules.
4 Users in other groups can modify and delete the rules created by themselves, and
can only view the rules created by others.
54 Version: 01
6 Alarm Management
Procedure
1. Select Alarm→Setting→Alarm Shield Rule from the main menu to open the Alarm
Shield Rule tab.
Operation Procedure
1. Click Current Alarm Shield Rule in the left pane and click Create in
the right pane.
Creating a current alarm
2. In the Create Current Alarm Shield Rule dialog box, set parameters
masking rule
as planned. For details, see Table 6-2Note 1.
3. Click OK.
1. Select a rule in the left pane, and modify its parameters as required in
Modifying a current
the right pane.
alarm masking rule
2. Click Save All.
1. Click Current Alarm Shield Rule in the left pane, and select a rule in
Deleting a current alarm the right pane.Note 2
masking rule 2. Click Delete and then click Yes in the Delete Rule alert box that
appears.
Enabling / disabling a
current alarm masking Right-click a rule and select Enable / Disable from the shortcut menu.
rule
Note 1: You can click Copy from Other Rule, and select a rule in the Rule Select dialog box to copy
its settings. This improves setting efficiency.
Note 2: Hold down Shift or Ctrl to select multiple rules simultaneously.
Parameter Description
Rule Name (Required) Sets the name of the current alarm masking rule.
Basic
Rule Type (Grayed out) It is Current Alarm Shield Rule by default.
Information
Rule Remarks Sets the remark information of the current alarm masking rule.
Version: 01 55
UMC² Lite Unified Management Control Centre User Manual
Parameter Description
Sets whether to clear existing current alarms on the UMC² Lite.
u If Clear current alarms that have occurred in the
network management system is selected,
Shield Alarm
4 By default, masked alarms are not reported to an upper-
layer network management system via a northbound
Handing WayNote 1
interface. Such report can be enabled through a
northbound interface switch.
Effective Sets the start and end dates of the range during which the masking
Date Range
Time rule is effective.
56 Version: 01
6 Alarm Management
Parameter Description
Sets the start and end time of the range during which the masking
Time Range
rule is effective.
Weekdays Sets the week days on which the masking rule is effective.
Note 1: If an alarm is set to Discard in one rule and set to Set Mask Status in another, it is discarded.
Other Operations
In the right pane of the Alarm Shield Rule Management tab, right-click an alarm
masking rule and select Copy, Refresh, Export or other operation options from the
shortcut menu.
You can set alarm / event templates on the UMC2 Lite to save alarm / event query or
collection criteria. These templates simplify operations and facilitate alarm / event query or
collection.
This section introduces alarm / event templates, including the background, template types,
and available template states.
Background
The UMC2 Lite monitors alarms / events on all FiberHome devices. However, users
generally only care about some key alarms or events affecting their local networks. So they
need to identify and monitor these alarms or events efficiently in routine maintenance. In
this way, network exceptions can be detected, located and removed promptly, keeping
networks running well.
Version: 01 57
UMC² Lite Unified Management Control Centre User Manual
Functions
u You can get the alarms or events you care about by specifying their names, levels and
types in a template. Various templates can be customized to cater for query or
collection demands in different scenarios. In routine maintenance, you can quickly
initiate alarm / event monitoring using custom templates, rather than spending a lot of
time in searching from massive data. This enhances OAM efficiency. The table below
describes the templates supported by the UMC2 Lite.
Template Function
Current alarm query Saves current alarm query criteria as a template, which can be used for
template querying current alarms later on.
Alarm query template
History alarm query Saves history alarm query criteria as a template, which can be used for
template querying history alarms later on.
Event report query Saves event report query criteria as a template, which can be used for
Event query template
template querying event reports later on.
u You can set template states to allow alarm monitoring and proactive warning from
different perspectives, so as to detect network exceptions promptly. The table below
describes the template states supported by the UMC2 Lite.
Default alarm collection template applied after the UMC² Lite starts up. The Alarm Statistics
dialog box opened via the client toolbar displays alarm data according to this template.
Monitoring template
Only current alarm query templates can be set as monitoring templates. By default, up to five
monitoring templates can be configured.
Template applied when an alarm / event query or collection tab is opened. Each alarm / event
Default template
query or collection tab can be configured with only one default template.
58 Version: 01
6 Alarm Management
This section introduces how to set the maximum number of monitoring templates, the
maximum number of startup templates and the startup rule of the automatic alarm reporting
window.
Procedure
1. Select System→Parameter Settings from the main menu to open the Parameter
Settings dialog box.
3. Set parameters as required and click Apply. Then the settings take effect immediately.
4. Click OK.
To create an alarm template, you can save query / collection criteria as a template in the
alarm query / collection window, or directly create one on the Alarm Query Template
Management tab. Various alarm templates are created in a similar way. This section
introduces how to create a current alarm query template for example.
Background
Different alarm query templates can be created by specifying alarm names, levels and states
to cater for varying alarm query requirements.
Prerequisite
Procedure
1. In the main menu, select Alarm→Alarm Query Template to open the Alarm Query
Template tab.
2. Select Current Alarm Query Template in the left pane, and click Create Current
Alarm Query Template in the right pane.
3. Set parameters in the Create Current Alarm Query Rule dialog box as needed.
Version: 01 59
UMC² Lite Unified Management Control Centre User Manual
Parameter DescriptionNote 1
Basic Information Sets the template name and remarks as needed. The name must be unique.
Sets alarm filtering criteria by selecting alarm names, levels, types, statuses,
Filter Info
and clearing types.
Note 1: You can click Copy from Template to copy all settings except Template Name from
another template. This improves setting efficiency.
4. Click OK.
Other Operations
Operation Procedure
Select an alarm template under the Alarm Template node in the
Modifying an alarm template left pane, and modify its parameters in the right pane. Then click
Apply.
Note 1: The template icon indicates that the current template has been set as the admin user's
default template, which is used to query current alarms by default.
Note 2: Up to five monitoring templates can be set. After a template is set, the alarm panel at the upper
right corner of the UMC² Lite GUI counts alarms according to this template.
On the UMC² Lite, you can set an alarm monitoring template to facilitate monitoring,
querying or collecting alarms.
60 Version: 01
6 Alarm Management
Background
The Alarm Statistics dialog box opened via the client toolbar displays alarm data
according to a monitoring template. A monitoring template must be a current alarm query
template. You can set up to five monitoring templates by default.
Note:
Click on the toolbar to open the Alarm Statistics dialog box. After a
monitoring template is set as the current template, the alarm indicators in four
colors on the toolbar display the number of alarms at each level according to
this current template.
Prerequisite
Procedure
Operation Procedure
1. In the left pane of the Alarm Query Template tab, select Monitor
Template Management.
2. Right-click a blank area of the right pane and select Select from the
Setting a monitoring shortcut menu, or click the Select button at the lower right corner.
template 3. In the Select Template dialog box, select a current alarm query
template and click OK to set it as a monitoring template.
4. Select a monitoring template and click Delete Template Settings to
clear the monitoring template settings.
In the left pane of the Alarm Query Template tab, right-click an existing
Setting an alarm
template and select Set ** Default Template / Cancel **'s Default
template as a default
Template from the shortcut menu. Here ** refers to the creator of this
template
template.
Version: 01 61
UMC² Lite Unified Management Control Centre User Manual
To create an event query template, you can save query criteria as a template in the event
query window, or directly create one in the Event Query Template Management
window. This section introduces the operation steps for the latter approach.
Background
u Different event query templates can be created by specifying event names, levels, and
generation time to cater for varying event query requirements.
u The UMC2 Lite provides a default All Objects event query template that cannot be
copied, deleted, and modified.
Prerequisite
Procedure
2. Click Event Report Query Template in the left pane and click Create Event Query
Template in the right pane to open the New Event Query Template dialog box.
3. Set parameters on the Basic Information, Filter Info and Event Source tabs as
required, and click OK.
Parameter DescriptionNote 1
Sets the template name and remarks as needed. The name must be
Basic Information
unique.
Sets filter criteria such as event name, level, occurrence time, and line
Filter Info
information.
Event Source Sets the event source as needed.
Note 1: You can click Copy from Template to copy all settings except Template Name from
another template. This improves setting efficiency.
62 Version: 01
6 Alarm Management
Other Operations
Select a custom event query template in the left pane, and modify its parameters in the
right pane. Click Save All.
Right-click a custom event query template in the left pane and select Delete from the
shortcut menu. Then click Yes in the alert box.
The UMC² Lite allows setting a default event query template. After you log in and query
events through the main menu, the UMC² Lite opens the Query Reported Events tab
based on the default template.
Prerequisite
Procedure
2. In the left pane of the Event Query Template tab, right-click an event query template,
and select Set ** Default Template from the shortcut menu. Here ** refers to the
creator of the template.
The UMC2 Lite allows managing alarm reporting templates and binding them with devices.
The UMC2 Lite supports creating, modifying and deleting alarm reporting templates.
Prerequisite
Version: 01 63
UMC² Lite Unified Management Control Centre User Manual
Procedure
1) In an NE manager, click .
4) In the displayed dialog box, set the number of new alarm reporting templates and
click OK.
5) Set the template name and object type in the left pane.
1) Click .
2) Select desired templates in the Modify in a batch manner dialog box and
modify the parameters in the Configuration Item pane.
u Deleting a template
64 Version: 01
6 Alarm Management
The UMC2 Lite can bind alarm reporting templates with objects.
Prerequisite
Procedure
1. In an NE manager, click .
3. Select an object in the left device tree and select a template name from the drop-down
list in the right pane.
5. (Optional) For batch configuration, select multiple objects, click and set a
template in the Configure Templates in a Batch Manner dialog box.
By monitoring network alarms, OAM engineers can learn running states of networks
promptly. The UMC2 Lite provides diverse access to alarms on different objects.
After the UMC2 Lite restarts or restores communication with NEs, it automatically
synchronizes alarms with NEs (at an interval of three minutes by default) to keep consistent
alarm data.
u All alarms will be automatically synchronized when UMC² services start up: After
UMC² Lite services are started, the UMC² Lite synchronizes alarms with NEs and
alarm services.
Version: 01 65
UMC² Lite Unified Management Control Centre User Manual
Note:
For IPRAN and POTN devices, the UMC2 Lite issues forcible synchronization
commands to synchronize alarms with them.
You can view current alarms of a specified object (network / logical domain / NE / link) to
analyze and troubleshoot faults.
Functions
u Alarms can be queried by frequency or duration, so that those excessively frequent and
long-lasting alarms can be quickly identified and easily analyzed.
u Current alarms are merged ones. When an object reports an alarm repeatedly, the
system displays the alarm as a single entry. That is, the alarm's ID remains unchanged,
but its frequency increases.
u Alarm logs record all alarms received by the UMC² Lite. Each alarm is displayed as
one entry.
u A new alarm meeting merging rules is merged into a current alarm entry regardless of
whether the alarm entry is acknowledged or cleared. In this case, the alarm entry's
frequency increases by 1 and its acknowledgment and clearing states are updated
according to the states of the new alarm.
u When the number of alarms exceeds the maximum number of rows allowed in a table,
only the latest current alarms are displayed. To query non-displayed alarms, you can
set filter criteria.
Procedure
66 Version: 01
6 Alarm Management
2) Set query criteria in the Query Current Alarm dialog box and click OK.
3) On the Current Alarm tab, view the current alarms that meet query criteria.
4) Right-click an alarm and select View Alarm Log from the shortcut menu to view
all its records.
a) Right-click a logical domain on the main GUI, and select Alarm And Event
→Current Alarm from the shortcut menu to open the Current Alarm tab.
b) On the Current Alarm tab, view current alarms in the logical domain.
c) Right-click an alarm and select View Alarm Log from the shortcut menu to
view all its records.
c) Right-click an alarm and select View Alarm Log from the shortcut menu to
view all its records.
a) Right-click an alarmed link on the main GUI, and select View Related
Alarm from the shortcut menu.
b) On the Link Associated Alarm tab, view current alarms on the link.
c) Right-click an alarm and select View Alarm Log from the shortcut menu to
view all its records.
Version: 01 67
UMC² Lite Unified Management Control Centre User Manual
Other Operations
u Click the shortcut icons at the upper left corner of the Current Alarm tab to perform
the following operations.
4 Click to set whether to automatically scroll the alarm table when new alarms
are reported.
u Click the buttons at the bottom right corner of the Current Alarm tab to perform the
following operations.
4 Click Query by Template and select another template in the Select Template
dialog box to query current alarms.
4 Click Query and set new query criteria in the Query Current Alarm dialog box
to query current alarms.
4 Select an alarm and click View Details to view its maintenance information,
detailed information and alarm correlation analysis result.
4 Select an alarm and click Confirm Alarm. Its Confirmation Status becomes
User Confirmation.
4 Select an alarm and click Clear Alarm. Its Clear Status becomes User
Clearance.
68 Version: 01
6 Alarm Management
You can view history alarms of a specified object (network / logical domain / NE / link) to
learn about and analyze history faults.
Background
u Alarms can be queried by frequency or duration, so that those excessively frequent and
long-lasting alarms can be quickly identified and easily analyzed.
u A current alarm that is cleared and acknowledged is converted into a history alarm
after a specified delay period expires.
u When the number of alarms exceeds the maximum number of rows allowed in a table,
only the latest history alarms are displayed. To query non-displayed alarms, you can
set filter criteria.
Procedure
2) Set query criteria in the Query History Alarm dialog box and click OK.
3) On the History Alarm tab, view history alarms that meet query criteria.
a) Right-click a logical domain on the main GUI, and select History Alarm
from the shortcut menu to open the History Alarm tab.
b) On the History Alarm tab, view history alarms that meet query criteria.
Version: 01 69
UMC² Lite Unified Management Control Centre User Manual
a) Right-click an alarmed link on the main GUI, and select View Related
Alarm from the shortcut menu.
b) On the Link Associated Alarm tab, view history alarms of this link.
Other Operations
u Click the shortcut icons at the upper-left corner of the History Alarm tab to perform
the following operations.
u Click the buttons at the bottom right corner of the History Alarm tab to perform the
following operations.
4 Click Query and set new query criteria in the Query History Alarm dialog box
to query history alarms.
4 Select an alarm and click View Details to view its maintenance information,
detailed information and alarm correlation analysis result.
70 Version: 01
6 Alarm Management
By setting alarm reporting rules, you can enable devices to report important alarms and
monitor them in the alarm report window.
Prerequisite
Alarm reporting rules have been set and enabled as described in Setting Alarm Reporting
Rules.
Procedure
2. On the View Reported Alarm tab, view the information of alarms meeting reporting
rules.
3. (Optional) Click Report Setting at the bottom right of the tab to open the Alarm
Report Setting tab and re-configure alarm reporting rules.
Other Operations
u Click Clear All Records to clear all the records on the current tab. Then the tab
displays alarms reported after clearing.
u Select an alarm and click Confirm Alarm. Then its Confirmation Status becomes
User Confirmation.
u Select an alarm and click Clear Alarm. Then its Clear Status becomes User
Clearance.
By querying reported events, you can learn running status of the system.
Version: 01 71
UMC² Lite Unified Management Control Centre User Manual
Procedure
Access Procedure
1. Select Alarm→Query Report Events from the main menu.
2. Set query criteria in the Query Report Events dialog boxNote 1 and click
Main menu
OK.
3. On the Query Report Events tab, view query results.
Note 1: If a default template is set, the Query Report Events dialog box will not appear. Instead, the
system uses this default template to query reported events. For details about how to set a default
event reporting template, see Setting a Default Event Template.
Other Operations
u Click the shortcut icons at the upper-left corner of the Query Report Events tab to
perform the corresponding operations.
4 Click to set whether to automatically scroll the event list when new events
are reported.
u Click the buttons at the bottom of the Query Report Events tab to perform the
corresponding operations.
4 Click Query, set new query criteria in the Query Report Events dialog box and
click OK.
4 Select an event and click View Details to view its detailed information.
72 Version: 01
6 Alarm Management
The UMC2 Lite monitors NEs in real time through polling and proactive reporting. When
polling time conflicts with proactive reporting time, the UMC2 Lite calculates data based on
alarm receiving time and discards duplicated data.
u Polling: The UMC2 Lite calls each NE through polling and collects and stores alarm
information of each NE.
NE alarm reporting flow is a process from NE alarm reporting to the UMC 2 Lite to alarm
notification to users. Understanding this flow helps you handle alarms efficiently.
Figure 6-1 shows NE alarm reporting flow.
Version: 01 73
UMC² Lite Unified Management Control Centre User Manual
74 Version: 01
6 Alarm Management
After obtaining alarm information, you can handle alarms referring to Figure 6-2. Table 6-5
describes alarm handling flow.
Version: 01 75
UMC² Lite Unified Management Control Centre User Manual
Collect fault By locating and querying alarms, collect information about fault
4
information. time and symptoms.
You can view alarm details to learn alarm names, alarm sources, NE types, IP addresses and
so on.
Procedure
1. Open the Current Alarm or History Alarm tab referring to Viewing Current Alarms
and Viewing History Alarms.
76 Version: 01
6 Alarm Management
2. Double-click an alarm, or select an alarm and click View Details at the lower right
corner of the tab.
3. Select the Details tab and view the name, source, and NE type of this alarm.
You can learn about alarm causes and handling suggestions from alarm maintenance
information. You can add or modify alarm maintenance experience as needed. When the
same alarm reoccurs, you can refer to the past experience to handle.
Procedure
1. Open the Current Alarm or History Alarm tab referring to Viewing Current Alarms
and Viewing History Alarms.
2. Double-click an alarm, or select an alarm and click View Details in the lower right
corner of the tab.
3. Click the Maintenance Information tab to check the descriptions, causes and
handling suggestions of the alarm.
Note:
You can only view maintenance experience on the Alarm Log tab.
You can learn the relationship between a root alarm and derivative alarms through alarm
correlation analysis.
Prerequisite
u You have configured root and derivative alarms in an alarm analysis rule.
Version: 01 77
UMC² Lite Unified Management Control Centre User Manual
Procedure
1. Open the Current Alarm or History Alarm tab referring to Viewing Current Alarms
and Viewing History Alarms.
2. Double-click an alarm, or select an alarm and click View Details in the lower right
corner of the tab.
3. Click the Alarm Relevance Analysis tab to view the correlation analysis result of the
alarm.
The UMC² Lite allows manual and automatic acknowledgment of cleared alarms. Manual
acknowledgment of an alarm indicates that this alarm is being handled.
Background
You can acknowledge alarms in batches by specifying alarm names, levels, or types.
Prerequisite
Procedure
1) Open the Current Alarm or Alarm Log tab referring to Viewing Current
Alarms or Querying Alarm Logs respectively.
¡ Select an alarm and click Confirm Alarm in the lower right part of the tab,
or right-click an alarm and select Confirm Alarm from the shortcut menu.
¡ Right-click an alarm and select Confirm and Mark the Alarms from the
shortcut menu. In the displayed dialog box, enter remarks and click OK.
¡ Right-click an area on the current tab and select Batch Confirm Alarms
from the shortcut menu. In the displayed dialog box, set alarm
acknowledgment criteria and click OK.
78 Version: 01
6 Alarm Management
Set automatic acknowledgment rules for cleared alarms. By default, the system, at
00:00, automatically acknowledges the alarms that have been cleared for one day or
longer time. Acknowledged alarms' Confirmation Status changes to Auto Confirm.
Related Operations
Note:
On the Alarm Log tab, you can only acknowledge alarms but cannot cancel any
alarm acknowledgment.
Procedure
1. Open the Current Alarm or History Alarm tab referring to Viewing Current Alarms
and Viewing History Alarms.
2. Right-click an alarm and select Locate to Card or Port from the shortcut menu. In
the NE manager window that appears, the card or port that generates the alarm is
highlighted.
You can set rules for masking alarms that you don’t care about, so that they will not be
displayed in the current alarm list on the UMC² Lite.
Version: 01 79
UMC² Lite Unified Management Control Centre User Manual
Alarms masked on the UMC² Lite will not be displayed in the current alarm list.
Prerequisite
Procedure
2) Right-click an alarm and select Ems Shield from the shortcut menu to open the
Shield Alarm dialog box.
3) In the Shield Alarm dialog box, set masking rules referring to Parameters of
Alarm Masking.
80 Version: 01
6 Alarm Management
Parameter Description
Shield Rule Name (Required) Sets the name of the alarm masking rule.
Sets the start and end dates of the range during which the masking
Date Range
rule is effective.
Time
Sets the start and end time of the range during which the masking
Range Time Range
rule is effective.
Weekdays Sets the week days on which the masking rule is effective.
Version: 01 81
UMC² Lite Unified Management Control Centre User Manual
Parameter Description
Time Zone of the
Sets the time zone where the server is located.
Server
Note:
u Mask undesired alarms by creating a current alarm masking rule. For details, see
Setting Alarm Masking Rules.
You can manage alarm masking rules on the UMC² Lite, including viewing, modifying,
deleting and exporting these rules.
Prerequisite
4 Users in the Administrators group can view, modify and delete all rules.
4 Users in non-administrator groups can only view rules created by others. They
cannot modify or delete existing rules.
Procedure
1. Select Alarm→Setting→Alarm Shield Rule from the main menu to open the Alarm
Shield Rule tab.
82 Version: 01
6 Alarm Management
Operation Procedure
Viewing a current alarm
Select a rule in the left pane and view its configurations in the right pane.
masking rule
1. Select a rule in the left pane, and modify its parameters as required in
Modifying a current
the right pane.
alarm masking rule
2. Click Save All.
1. Click Current Alarm Shield Rule in the left pane, and select a rule in
Deleting a current alarm the right pane.Note 1
masking rule 2. Click Delete and then click Yes in the Delete Rule alert box that
appears.
1. Click Current Alarm Shield Rule in the left pane and right-click a rule
Exporting a current in the right pane.Note 1
alarm masking rule 2. Select Export→Export All Records or Export→Export Selected
Records to export masking rules to a local directory.
Enabling / disabling a
current alarm masking Right-click a rule and select Enable / Disable from the shortcut menu.
rule
Counting current alarm Select Alarm Shield Rule Management in the left pane, and view the
masking rules number of current alarm masking rules in the right pane.
You can view current alarms of an NE to analyze alarm information and troubleshoot faults.
Prerequisite
Procedure
2. Set query criteria in the Query Current Alarm dialog box and click OK.
3. On the Current Alarm tab, view the current alarms that meet query criteria.
4. Right-click an alarm and select View Current Alarm of Attributed NE from the
shortcut menu. On the Current Alarm-NE Name tab, view current alarms of the
associated NE.
Version: 01 83
UMC² Lite Unified Management Control Centre User Manual
You can view history alarms of an NE to analyze alarm information and troubleshoot faults.
Prerequisite
Procedure
2. Set query criteria in the Query History Alarm dialog box and click OK.
3. On the History Alarm tab, view history alarms that meet query criteria.
4. Right-click an alarm and select View NE Alarm History from the shortcut menu. On
the History Alarm-NE Name tab, view history alarms of the associated NE.
When device failures are eliminated, alarms will be cleared automatically. If some alarms
cannot be cleared automatically, you can clear them manually.
Prerequisite
Procedure
2. Select one or more alarms, right-click them and select Clear Alarm, or click Clear
Alarm at the lower right corner of the tab. Then their Clear Status changes to User
Clear.
Note:
If the fault triggering these alarms still exists, they will be reported again.
84 Version: 01
6 Alarm Management
When handling a device fault, you can acknowledge and clear alarms with one click.
Prerequisite
Procedure
2. In the Alarm Basic Setting dialog box, select Show Confirming and Clearing
Alarm Function.
4. Select an alarm and click Confirm and Clear Alarm at the lower right part of the tab,
or right-click it and select Confirm and Clear Alarm from the shortcut menu.
When device failures are eliminated, alarms will be cleared automatically. If some alarms
cannot be cleared automatically, you can clear them manually.
Prerequisite
Procedure
2. Select one or more alarms, right-click them and select Clear Alarm From Device
from the shortcut menu.
Version: 01 85
UMC² Lite Unified Management Control Centre User Manual
Prerequisite
Procedure
2. Right-click an alarm and select Modify the Level from the shortcut menu.
3. Set the modification range and alarm level in the Modify Alarm Level dialog box.
Note:
The new custom alarm level rule can be viewed on the Customize Alarm
Level tab.
You can edit alarm remarks to record additional information about an alarm, facilitating
future maintenance.
Prerequisite
Procedure
2. Right-click an alarm and select Modify the Remark from the shortcut menu.
4. Click OK. The alarm remarks are displayed in the Remark column.
86 Version: 01
6 Alarm Management
Procedure
1. Open the Current Alarm or History Alarm tab referring to Viewing Current Alarms
and Viewing History Alarms.
a) In the alarm list, right-click to select Print from the shortcut menu.
b) In the Print Preview dialog box, set the page and other print options.
c) Click Print. In the displayed Print dialog box, select a printer and set other
printing parameters.
d) Click OK.
¡ Export all alarm entries. Right-click anywhere on the tab and select Export
→Export All Records from the shortcut menu to export all the alarm
entries in the format of TXT, XLS, CSV, XML, PDF or HTML.
¡ Export selected alarm entries. Select desired alarm entries, right-click them
and select Export→Export Selected Record from the shortcut menu to
export them in the format of TXT, XLS, CSV, XML, PDF or HTML.
Version: 01 87
7 Resource Management
Resource management refers to managing physical asset information and important logical
configuration of all devices in networks. The UMC2 Lite provides unified resource query
and statistics.
NE managers are the main operation GUI for managing devices. In an NE manager window,
you can configure, manage, and maintain an NE and its cards and ports hierarchically.
An NE manager consists of a device tree and an operation tree. You can select a desired
object in the device tree and then select a function configuration option in the operation tree
to open the function configuration window.
Procedure
Double-click an NE in the left pane of the main topology tab to open its NE manager
directly.
GUI Layout
Note:
88 Version: 01
7 Resource Management
(1) Shortcut toolbar (2) Device tree (3) Alarm prompt bar
(4) Subrack view (5) Operation tree (6) Object information pane
Physical configuration detection enables discovery of physical cards, which can be updated
on the UMC² Lite automatically through synchronization. This function does not apply to
virtual NEs.
Prerequisite
Version: 01 89
UMC² Lite Unified Management Control Centre User Manual
Procedure
2. Select a desired domain or NE in the left browse tree of the Detect Physical
Configuration tab, and click Detect Physical Configuration at the lower part of the
tab to run a detection command. Then you can view the information of detected cards.
4 Overwritten: Overwrites current configurations on the UMC² Lite with the latest
physical card configurations.
4 Synchronize all data: Click Synchronize All to synchronize all the detected data
to the UMC² Lite.
4 Synchronize selected NEs: Select one or more desired NEs from the detected data
and click Synchronize NE to synchronize all the data of these NEs to the UMC²
Lite.
4 Synchronize cards: If a detected slot has an actual device type but has no
configuration on the UMC² Lite, you can right-click the entry of this slot, and
select Synchronize Card from the shortcut menu.
This section introduces how to create, delete and move logical domains, and set their
attributes.
For easy management, place NEs in the same area or with similar attributes in one logical
domain.
Prerequisite
90 Version: 01
7 Resource Management
Background
Creating logical domains only simplifies GUI display and has no impact on NE operation.
Procedure
1. Right-click an existing logical domain or a blank area in the Main Topology view,
and select Create Logical Domain from the shortcut menu.
2. In the displayed dialog box, set a name, alias name, and remark.
Note:
3. Click OK. The new logical domain is displayed in the browse tree.
A logical domain can be deleted if it is no longer needed. After deletion, objects in this
logical domain automatically move to an upper level rather than being deleted.
Prerequisite
Procedure
1. Right-click a logical domain in the left browse tree of the main topology, and select
Delete from the shortcut menu.
2. Click Yes in the Delete Selected Object alert box that appears.
You can modify the name, alias name, and remarks of a logical domain at any time as
needed. Such modification does not affect the running of NEs in the logical domain.
Version: 01 91
UMC² Lite Unified Management Control Centre User Manual
Prerequisite
Procedure
1. Right-click a logical domain in the left browse tree of the main topology, and select
Attributes from the shortcut menu.
2. On Attributes Page, modify the attribute information and click to save the
configurations to the database.
To manage access devices, access NEs should be created on the UMC² Lite.
Prerequisite
Procedure
1. Right-click a blank area in the main topology and select Create NE→Create Access
NE from the shortcut menu, or select Resource→Create Access NE from the main
menu to open the Create Access NE dialog box.
Default Shelf Type Subrack type displayed automatically after an NE type is selected
Required
NE Name Name of an NE for easy identification
NE IP Address IP address of an NE
NE Mask Mask of an NE
Optional
NE Gateway IP address of an NE gateway
92 Version: 01
7 Resource Management
Province
Detailed address of a device for easy location
City
Detail Address
Manager that manages an NE. If this item is not configured, this
Manager NE is managed by the manager of its partition. If no such partition -
exists, the NE is managed by a default manager.
SNMP Parameter Template used for communication between the UMC2 Lite server
-
Template and an NE. Generally, the default template is selected.
Operation Result
After an access NE is created, its icon is displayed in the left browse tree of the main
topology. Its information such as IP address, subnet mask and ID is automatically saved to
the UMC² Lite database.
When an access NE changes in its attributes such as name and IP address, you can update
such data on its attribute page to ensure data consistency.
Version: 01 93
UMC² Lite Unified Management Control Centre User Manual
Prerequisite
Background
u Modifying access NEs' attributes may interrupt their communication with the UMC²
Lite.
u Modifying access NEs' attributes does not affect services running on them.
Procedure
1. Right-click an access NE in the left browse tree of the main topology, and select
Attributes from the shortcut menu.
Note:
Ensure that access NEs' attributes are kept consistent with planning data.
Background
u Deleting an NE removes all its data from the UMC² Lite, but does not affect the
corresponding device.
Deleting a transmission NE does not remove the ones copied from this NE. Deleting a
transmission NE copied from another does not remove its source NE and other NE copies.
Prerequisite
94 Version: 01
7 Resource Management
u Be a gateway NE (GNE).
Procedure
1. Right-click an NE in the left browse tree of the main topology and select Delete from
the shortcut menu.
2. In the Delete Selected NE Or Not dialog box that appears, click Yes.
You can find an object quickly in a browser tree by the search function.
Background
u Object types include NEs, logical domains, optical NEs and cards.
u Search types include NE names, NE IDs, NE types, NE IP addresses, Alias names and
switch numbers.
Procedure
u Common search: Enter keywords or characters in the search box above Browse Tree
of the main topology. The system automatically displays matching NEs.
The keywords entered can be letters, numbers, initials, full spelling or an IP address
contained in an NE name.
Version: 01 95
UMC² Lite Unified Management Control Centre User Manual
Note:
u When searching for objects, the system uses dynamic fuzzy search. That is,
when you enter keywords, the drop-down list dynamically displays
matching results according to the current input.
u Advanced search: Click , set search criteria in the displayed Advanced Search
dialog box and click Search to display matching results.
Prerequisite
Procedure
1. Right-click a blank area in the left pane of the main topology tab and select Create NE
→Create Switch NE from the shortcut menu, or select Resource→Create NE→
Create Switch NE from the main menu to open the Create Switch NE dialog box.
96 Version: 01
7 Resource Management
Default Shelf Type Subrack type displayed automatically after the NE type is selected
Required
NE Name Name of an NE for easy identification
Version: 01 97
UMC² Lite Unified Management Control Centre User Manual
Operation Result
After a switch NE is created, its icon is displayed in the left browse tree of the main
topology. Its information such as IP address, subnet mask and ID is automatically saved to
the UMC² Lite database.
Note:
When a switch NE changes in its attributes such as name and IP address, you can update
such data on its attribute page to ensure data consistency.
Prerequisite
Background
u Modifying switch NEs' attributes may interrupt their communication with the UMC²
Lite.
u Modifying switch NEs' attributes does not affect the services running on them.
Procedure
1. Right-click a switch NE in the left browse tree of the main topology, and select
Attribute from the shortcut menu.
Note:
Ensure that switch NEs' attributes are kept consistent with planning data.
98 Version: 01
7 Resource Management
Background
u Deleting an NE removes all its data from the UMC² Lite, but does not affect the
corresponding device.
Deleting a transmission NE does not remove the ones copied from this NE. Deleting a
transmission NE copied from another does not remove its source NE and other NE copies.
Prerequisite
u Be a gateway NE (GNE).
Procedure
1. Right-click an NE in the left browse tree of the main topology and select Delete from
the shortcut menu.
2. In the Delete Selected NE Or Not dialog box that appears, click Yes.
Prerequisite
Version: 01 99
UMC² Lite Unified Management Control Centre User Manual
Procedure
1. Right-click an NE in the browse tree of the main topology, and select NE Edit→Move
to from the shortcut menu to open the Select Destination Logic Domain dialog box.
2. In this dialog box, select a desired logical domain and click OK.
Operation Result
In the browse tree of the main topology tab, the aforesaid NE and its icon are moved to the
specified logical domain.
You can find an object quickly in a browser tree by the search function.
Background
u Object types include NEs, logical domains, optical NEs and cards.
u Search types include NE names, NE IDs, NE types, NE IP addresses, Alias names and
switch numbers.
Procedure
u Common search: Enter keywords or characters in the search box above Browse Tree
of the main topology. The system automatically displays matching NEs.
The keywords entered can be letters, numbers, initials, full spelling or an IP address
contained in an NE name.
100 Version: 01
7 Resource Management
Note:
u When searching for objects, the system uses dynamic fuzzy search. That is,
when you enter keywords, the drop-down list dynamically displays
matching results according to the current input.
u Advanced search: Click , set search criteria in the displayed Advanced Search
dialog box and click Search to display matching results.
Prerequisite
u The required card type has been added for a virtual NE to be added with cards.
Procedure
1. Double-click an NE in the browse tree of the main topology to open the NE manager
window.
3. Add cards.
Version: 01 101
UMC² Lite Unified Management Control Centre User Manual
Right-click an idle slot in the subrack view and select Add *** Card[Default]
from the shortcut menu to add a default card.
a) Right-click an idle slot in the subrack view and select Add Other Card from
the shortcut menu.
b) In the Add Other Card dialog box, select a desired card and click OK.
When a card is replaced on site due to failure or other causes, it needs to be replaced
accordingly on UMC2 Lite clients.
Prerequisite
Procedure
1. Double-click an NE in the browse tree of the main topology to open the NE manager
window.
2. Select the subrack where the target card belongs in the left device tree.
3. Right-click the target card in Subrack View, and select Replace Card from the
shortcut menu to adjust it.
Note:
If the desired card does not exist in the default list, choose Replace Card→
Change to Other Card from the shortcut menu. Search for the desired card in
the Change to Other Card dialog box.
102 Version: 01
7 Resource Management
Prerequisite
Procedure
1. Double-click an NE in the browse tree of the main topology to open the NE Manager
window.
2. Select the subrack where the target card belongs in the left device tree.
3. Delete cards.
a) Right-click the subrack in the device tree and select Delete All Cards from
the shortcut menu.
b) Click Yes in the Are you sure you want to delete all the cards? alert
box.
a) Right-click the card to be deleted in the device tree or subrack view, and
select Delete Card from the shortcut menu.
b) Click Yes in the Are you sure you want to delete the selected cards?
alert box.
By modifying UMC² Lite attributes, you can customize the UMC² Lite's name and remark
its IP address. This operation does not affect the running of the UMC² Lite.
Prerequisite
Version: 01 103
UMC² Lite Unified Management Control Centre User Manual
Procedure
1. Right-click Local NMS in the Logical Tree pane of the main topology, and select
Attributes from the shortcut menu.
Note:
The EMS IP field allows adding remarks on the UMC² Lite server's IP address,
which does not change IP address configuration.
Applicable object types include NEs, logical domains / optical NEs, cards and ONUs.
Prerequisite
Procedure
1. Select Resource→Search Object from the main menu to open the Search Object
dialog box.
104 Version: 01
7 Resource Management
2. In this dialog box, set Object Type, Search Type and Search Content, and click
Search.
Note:
When setting search criteria, you can select Match whole word only, Case
sensitive and Real-time search as desired.
3. In the search result, select a desired object and click Localize. Then the system
automatically locates it in the browse tree of the main topology / ONU list / NE
manager.
Note:
You can select or clear the Close window after location check box as desired.
Prerequisite
Procedure
1. Select Resource→Query Abnormal ONU from the main menu to open the Query
Abnormal Offline ONU dialog box.
¡ Select the All Objects radio button. All OLTs are queried by default.
¡ Select the Select Device radio button. Then click to open the Query
Abnormal Offline ONU dialog box, select one or more devices for query,
and click OK.
Version: 01 105
UMC² Lite Unified Management Control Centre User Manual
Note:
When the Select Device radio button is selected, at least one device must be
specified.
2) Set filter criteria by defining Last Offline Duration or Repeated Data. The
value should be an integer.
Note:
3) (Optional) Select the List of ONU that cannot get offline time check box.
With the ONU query function, you can find a desired ONU quickly and view its parameters
such as the system it belongs to, slot number, PON port number and logical ID.
The UMC2 Lite allows querying ONUs by attributes, using fuzzy match or complete match.
ONU query criteria fall into two parts:
u Common query criteria: logical domain, device type, ONU PON type, device name,
alias name, logical ID, physical address, OLT IP address, management IP address,
voice service and data service (PPPoE name query allowed)
u Advanced query criteria: slot number, ONU number, ONU password, logical SN
password, optical splitter number, optical splitter port number, ONU identifier, ONU
user information, and ONU service level (ordinary or VIP)
Prerequisite
Procedure
2. Set query criteria in the Set ONU Query Conditions dialog box.
106 Version: 01
7 Resource Management
3. After all settings are done, click OK. Then the Query ONU tab displays matching
ONUs.
4. On the Query ONU tab, select an ONU entry and click Service Configuration at the
lower right corner to go to the NE manager window. Here you can view service
configurations of the ONU.
Subsequent Operations
Right-click an ONU, and select Service Configuration or Locate to ONU List from the
shortcut menu.
You can query ONU information in batches by importing an ONU identifier template. Then
you can handle the query result, including deauthorization and masking alarms, in a batch
manner.
Procedure
1. In the main menu, select Resource→Query→Batch Query ONU to open the Set
Query Condition dialog box.
Note:
ONU identifiers fall into three categories: physical identifier, logical identifier,
and password. You can select one of them as needed.
3) Enter the ONU identifiers to be queried in the template referring to the following
table. Then save the template file.
Version: 01 107
UMC² Lite Unified Management Control Centre User Manual
Password 10 No limit
You can query the serial number of a card to get the name and management IP address of
the OLT housing the card and the slot number of the card. The query range can cover all
OLTs in a network.
Prerequisite
Procedure
1. In the main menu, select Resource→Query Board By Serial Number to open the
Set Query Conditions dialog box.
2. In the Set Query Conditions dialog box, enter the serial number of a card and select
one or more OLTs.
108 Version: 01
7 Resource Management
Note:
3. Click OK. The Query Board by Serial Number tab displays query results.
You can obtain the information of all unauthorized ONUs under one or more OLTs through
the UMC² Lite. The information of unauthorized ONUs includes NE name, NE IP address,
NE type, slot number, PON port number, ONU type, physical address, physical password,
and logical ID.
Prerequisite
Procedure
1. Select Resource→Unauthorized ONU List from the main menu to open the Select
NE dialog box.
Version: 01 109
8 Configuration Management
To keep smooth communication between the UMC² Lite and NEs, it is necessary to
configure SNMP parameters of NEs on the UMC² Lite.
You can directly configure SNMP parameters of NEs on the UMC² Lite, or use an
applicable SNMP parameter template to automatically apply SNMP parameters when
creating NEs manually or discovering NEs automatically.
You can manage SNMP parameter templates used for communication between the UMC 2
Lite server and NEs.
Prerequisite
Background
The system provides default SNMP parameter templates as shown below. The SNMP
parameter template named default cannot be deleted or modified. If no SNMP parameter
template is set during NE creation, this default template will be used for access and switch
NEs by default.
110 Version: 01
8 Configuration Management
Procedure
2. Click Create to open the SNMP Parameter Template dialog box, set various
parameters and click Create.
3. Right-click the target template and select Bind NE from the shortcut menu to open the
Select Bound NE dialog box. Select the NE to be bound and click OK.
4. After the NE is bound, the information of the NE bound with the SNMP parameter
template is displayed in the Binding State Information pane.
Other Operations
1. In the browse tree of the main topology, right-click an NE and select Attributes from
the shortcut menu. The Attribute Page pane appears on the right.
Version: 01 111
UMC² Lite Unified Management Control Centre User Manual
2. In the Attribute Page pane, click the SNMP parameter template field and select a new
template from the drop-down list to change the SNMP parameter template bound with
the NE.
You can manage SNMP parameter templates used for communication between the UMC 2
Lite server and NEs.
Prerequisite
112 Version: 01
8 Configuration Management
Background
The SNMP parameter template named default is a default template and cannot be modified
or deleted.
Procedure
1. Select Configure→SNMP Parameter Template from the main menu to open the
SNMP Parameter Template Management tab.
4 Modification: Click the Modify button, or right-click the template and select
Modify from the shortcut menu. In the SNMP Parameter Template dialog box
that appears, modify the template as required.
4 Deletion: Click the Delete button, or right-click the template and select Delete
from the shortcut menu to delete the template.
Note:
Version: 01 113
UMC² Lite Unified Management Control Centre User Manual
Background
A manager can manage up to 500 NEs. For over 500 NEs, you need to add more managers.
Prerequisite
Procedure
2. Right-click Communication Routing Management in the left object tree, and select
Create Manager from the shortcut menu. The Create the Manager dialog box
appears.
114 Version: 01
8 Configuration Management
Note 1: Retain default values for parameters not listed in the table.
Prerequisite
Procedure
Note:
You can delete custom managers only. Default managers cannot be deleted.
Prerequisite
Version: 01 115
UMC² Lite Unified Management Control Centre User Manual
Procedure
4. Click OK.
Adapting NEs by adding ONU type codes no longer meets fast adaptation requirements for
new terminal types.
To counter this, an ONU capability set template can be created on the UMC² Lite to
configure ONU parameters such as port quantity, port type and resource type as needed.
Then by delivering the template to the corresponding device, a new ONU type is supported
in real time. This allows fast adaptation without upgrading devices.
You can create an ONU capability set template to configure ONU parameters such as port
quantity, port type and resource type and then deliver it to a device to quickly adapt to a
new ONU type.
Prerequisite
116 Version: 01
8 Configuration Management
Note:
The UMC² Lite services should be restarted after the parameter is changed.
Procedure
1. Select Configure→ONU Capability Profile from the main menu to open the ONU
Capability Profile tab.
2. Click , or right-click in the blank area of the ONU Capability Profile tab and
select Create Profile from the shortcut menu.
3. In the displayed Create a ONU Capability Profile dialog box, set various parameters
and click OK.
Other Operations
1. On the ONU Capability Profile tab, right-click a desired template and select Binding
To NE from the shortcut menu to open the Select Bound NE dialog box.
2. Select the NE to be bound and click OK. Then its information is displayed in the NE
Bind State pane on the right.
Note:
The ONU capability set template bound with an NE cannot be deleted.
When existing ONU capability set templates cannot meet your requirements, you can
modify a template as needed.
Prerequisite
Version: 01 117
UMC² Lite Unified Management Control Centre User Manual
Procedure
1. Select Configure→ONU Capability Profile from the main menu to open the ONU
Capability Profile tab.
2. Select an ONU capability set template and click , or right-click it and select
Modify Profile from the shortcut menu.
Note:
The ONU capability set template bound with an NE cannot be modified.
Other Operations
1. On the ONU Capability Profile tab, select an ONU capability set template and click
Note:
The ONU capability set template bound with an NE cannot be deleted.
The UMC2 Lite can configure access NEs in batches, including calibrating time,
synchronizing alarms and saving configurations to Flash in batches.
118 Version: 01
8 Configuration Management
The UMC2 Lite can calibrate NE time in batches, improving operation efficiency.
Prerequisite
You have configured the UMC² Lite server address in SNMP System Time Config for
NEs.
Procedure
2. Click Batch Timing in the right pane to open the Select NE dialog box.
3. In the Select NE dialog box, select a desired logical domain or desired NEs and click
OK.
4. Click Yes in the displayed alert box to deliver the batch time calibration command.
Note:
When a batch command is being executed, you can click Stop to suspend the
operation.
5. When the batch command is executed successfully, view the time calibration result on
the NE Batch Timing page.
6. (Optional) To calibrate NE time again, select desired objects and click Restart. Click
Yes in the displayed alert box.
Due to network interruption or other failures, alarm data on the UMC² Lite can be
inconsistent with that on NEs. The UMC2 Lite can synchronize alarm data with NEs in
batches to ensure consistency.
Version: 01 119
UMC² Lite Unified Management Control Centre User Manual
Procedure
2. Click Batch synchronization in the right pane to open the Select NE dialog box.
3. In the Select NE dialog box, select a desired logical domain or desired NEs and click
OK to deliver the batch alarm synchronization command.
Note:
When a batch command is being executed, you can click Stop to suspend the
operation.
4. After the batch command is executed successfully, view the alarm batch
synchronization result on the NE Batch Alarm Synchronization page.
5. (Optional) To synchronize NE alarms again, select desired objects and click Restart.
The UMC2 Lite can save NE configurations to Flash in batches to improve operation
efficiency.
Procedure
2. Click Batch Save in the right pane to open the Select NE dialog box.
3. In the Select NE dialog box, select a desired logical domain or desired NEs and click
OK.
4. Click Yes in the displayed alert box to deliver the command of saving configurations
to Flash.
120 Version: 01
8 Configuration Management
Note:
When a batch command is being executed, you can click Stop to suspend the
operation.
5. When the batch command is executed successfully, view the configuration saving
result on the NE Batch Save To Flash page.
6. (Optional) To save NE configurations again, select desired objects and click Restart.
Click Yes in the displayed alert box.
Functions
The UMC2 Lite can configure VLANs for one or more OLTs in batches.
Prerequisite
Parameter Settings
(Required) Set the start and end VLAN IDs to be bound.
Start VLAN / End u If the start and end VLAN IDs are different, all VLAN IDs in this VLAN
VLAN to Be VLAN segment will be bound.
Bound With
u If the start and end VLAN IDs are identical, only one VLAN will be bound.
Service
Tag/Untag Set whether to strip VLAN tags. Untag is selected by default.
Bind to All Slots Set whether to bind all slots. This check box is selected by default.
Version: 01 121
UMC² Lite Unified Management Control Centre User Manual
Parameter Settings
Start VLAN of Specify service-bound VLANs to be filtered. This check box is cleared by default.
Service-Bound- If the check box is selected, enter the start VLAN ID to be filtered, which is smaller
Check the Ports
VLAN than or equal to the end VLAN ID.
of Service-
End VLAN of
Bound-VLAN If the check box is selected, enter the end VLAN ID to be filtered, which is equal to
Service-Bound-
or larger than the start VLAN ID.
VLAN
u To configure VLANs for a single OLT, select one NE in the device tree.
Choose Object u To configure VLANs for multiple OLTs, select multiple OLT NEs in the device
tree.
3. Click OK.
Other Operations
Operation Procedure
1. Select Configure→OLT NE Batch Configuration→Batch Config VLAN Add to Port from
the main menu to open the OLT NE Batch Configuration tab.
Modifying VLAN ports
in batches 2. Select one or more VLAN entries and click . In the Modify the Ports of VLAN dialog
box that appears, select the VLAN port numbers to be modified.
3. Click OK.
1. Select Configure→OLT NE Batch Configuration→Batch Config VLAN Add to Port from
Deleting bound VLANs the main menu to open the OLT Ne Batch Configuration tab.
in batches
2. Select one or more VLAN entries and click .
3. Click OK.
The configuration synchronization function compares configuration data on the UMC2 Lite
with that on devices. If any difference is detected, the corresponding data will be
downloaded or uploaded to ensure consistency of configuration data.
Procedure
122 Version: 01
8 Configuration Management
2. Click Add NE to open the Add NE dialog box, select the object to be compared and
click OK. The Configuration Synchronization tab displays the added NE whose
configurations are to be synchronized.
3. Select the object to be compared in the NE list, and click Configuration Comparison
to compare configurations.
4. View the comparison result in the lower part of the Configuration Comparison tab.
Subsequent Operations
When the comparison result shows inconsistency in configurations, you can click Upload
Configurations or Download Configurations to upload or download configurations
according to Table 8-2.
Button Description
Uploads configuration data from devices to the UMC2 Lite
Upload Configurations
database.
Downloads configuration data from the UMC2 Lite database to
Download Configurations
devices.
Version: 01 123
9 Access NE Management and
Maintenance
The UMC² Lite provides easy management and maintenance of access NEs, such as
managing ONUs and ONU ports.
This section introduces the access path and GUI layout of NE service configuration.
Access
GUIs
The Local Service Configuration tab includes an operation tree pane, a service
configuration pane and an operation information pane, as shown in Figure 9-1.
(1) Operation tree pane (2) Service configuration pane (3) Operation information pane
124 Version: 01
9 Access NE Management and Maintenance
Procedure
1. In an NE manager, select the ONU List tab, or click in the menu bar to open the
ONU List tab.
Note:
The ONU list allows you to view the software / hardware version information of
ONUs.
Note:
Here take Port Service Config, Service Configuration and View Details for
example.
On the ONU List tab, select an entry and click Port Service Config to view the
port type of the ONU service and the number of ports of different types.
4 Service Configuration
On the ONU List tab, select an entry and click Service Configuration to access
the designated ONU service configuration tab and perform the service
configuration of the ONU.
Version: 01 125
UMC² Lite Unified Management Control Centre User Manual
Note:
4 View Details
This section introduces how to copy / paste ONU port service configurations, deauthorize
ONUs, add users, mark ONUs and reset ONUs.
This section introduces how to copy and paste ONU port service configurations.
Prerequisite
Procedure
1. In an NE manager, select the ONU List tab, or click in the menu bar to open the
ONU List tab.
126 Version: 01
9 Access NE Management and Maintenance
2. Copy and paste port service configurations in one of the following two ways.
4 Copy and paste port service configurations between ONUs with the same model
but different slot numbers / PON port numbers / ONU numbers.
a) Right-click an ONU on the ONU List tab and select Assistant Functions
→Copy Service Config of the Port from the shortcut menu.
a) On the ONU List tab, right-click an ONU and select OnuPort Service
Query from the shortcut menu to open the Port Service Config dialog box.
b) Expand Data Port or Voice Port in the left browse tree of the Port Service
Config tab.
d) Right-click a port and select Paste the Port Config and send to device.
Prerequisite
Procedure
1. In an NE manager, select the ONU List tab, or click in the menu bar to open the
ONU List tab.
2. Right-click an ONU and select ONU Reset from the shortcut menu.
Version: 01 127
UMC² Lite Unified Management Control Centre User Manual
Background
Replace an ONU with another unauthorized ONU under the same PON port.
Prerequisite
Procedure
1. In an NE manager, select the ONU List tab, or click in the menu bar to open the
ONU List tab.
2. Right-click an ONU and select ONU Replace from the shortcut menu.
4. Click OK.
Procedure
1. In the menu bar of an NE manager, click to open the Set Card Authorization tab
and view the authorization information of cards.
2. Configure card authorization according to the parameter description in Table 9-1 and
button description in Table 9-2.
Parameter Description
EMS Config Type of a card configured on the UMC² Lite
128 Version: 01
9 Access NE Management and Maintenance
Button Function
You can authorize ONUs, including configuring the authentication mode of PON ports or
ONUs, authorizing ONUs, replacing ONU logical identifiers, and viewing the list of
authorized ONUs.
You can query information of authorized ONUs and pre-authorize unauthorized ONUs. The
ONUs in a white list can be authorized and provisioned with services, while those not in a
whitelist cannot.
Prerequisite
Procedure
1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab and check authorized ONUs.
Version: 01 129
UMC² Lite Unified Management Control Centre User Manual
2. Modify ONU whitelist information: Select an entry, double-click Slot No., PON No.,
ONU Type, ONU No., or Enable/Disable, and select a value from the drop-down list
or manually enter a value.
Pre-authorizing ONUs
1. Click on the ONU Authorization View tab. In the displayed dialog box, enter the
number of ONUs to be pre-authorized and click OK.
2. Set parameters of these ONUs in new entries according to PON port authentication
modes.
You can view and modify the authentication mode of the ONU connected to a single PON
port, card or device.
Prerequisite
Procedure
1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab.
2. Click ONU Authentication Mode at the bottom. In the Switch Objects (ONU
Authentication Mode) dialog box that appears, select an object and click OK.
130 Version: 01
9 Access NE Management and Maintenance
Logical SN authentication,
with automatic ONU MAC Authenticates an ONU based on its SN only.
replacement disabled
GPON password
authentication, with Converts GPON password authentication to MAC address
automatic ONU MAC authentication.
replacement enabled
GPON password
authentication, with
Authenticates an ONU based on GPON password only.
automatic ONU MAC
replacement disabled
You can view and modify the authentication mode of the ONU connected to a single PON
port.
Version: 01 131
UMC² Lite Unified Management Control Centre User Manual
Prerequisite
Procedure
1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab.
3. To modify the authentication mode of an ONU, double-click the Auth Type field of
this ONU and select a desired authentication mode from the drop-down list.
When an ONU authenticated based on logical identifier is faulty, you can replace it with
another ONU of the same type, and set the logical identifier of the new ONU to that of the
faulty ONU. Hence, services on the faulty ONU will be automatically downloaded to the
new ONU, with no more service configuration required.
Procedure
1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab.
132 Version: 01
9 Access NE Management and Maintenance
3. Click and enter the number of rows to be added in the dialog box that appears.
Then click OK.
Procedure
1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab.
2. Click Authorized ONU Information at the bottom. Then click to open the
Switch Object (Authorized ONU Information) dialog box.
3. Select a card or port and click OK to view the information of the authorized ONU
connected to the card or port. Table 9-4 describes the Status column on the ONU
Authorization View tab.
Version: 01 133
UMC² Lite Unified Management Control Centre User Manual
Status Description
Note:
You can select only one card in the Switch Object (Authorized ONU
Information) dialog box.
Other Operations
2. In the displayed Switch Object (Authorized ONU Information) dialog box, select
another card or PON port and click OK. The ONU Authorization View tab displays
the information of authorized ONUs under this selected object.
134 Version: 01
9 Access NE Management and Maintenance
Prerequisite
Procedure
1. In the menu bar of an NE manager, click to open the ONU Authorization View
tab.
3. Double-click the Switch field of an ONU and select Enable or Disable from the
drop-down list.
You can manually synchronize ONU authorization information on devices to the UMC²
Lite.
Version: 01 135
UMC² Lite Unified Management Control Centre User Manual
Prerequisite
Procedure
Prerequisite
Procedure
2. Select a desired PON port and click OK. The ONU Authorization View tab appears,
displaying the unauthorized ONUs.
Subsequent Operations
u Click to open the Switch Object (Unauthorized ONU List) dialog box and
select another PON port for query.
u Click , and select an ONU authentication mode in the displayed menu. Select a
range in the displayed Configure the Selection Range dialog box and click OK to
authorize the ONU on the displayed ONU Authorization tab.
136 Version: 01
9 Access NE Management and Maintenance
Prerequisite
Procedure
1. In the menu bar of an NE manager, click to open the Manually Authorize ONU
dialog box.
2. Configure the basic information and authentication information, and click Write
Database or Write Equipment according to Table 9-5 to authorize the ONU
manually.
Button Application
It is applied when an ONU is not physically connected. After an ONU is
Write Database connected, you can write the configuration in the database into the device
through Configuration Synchronization.
This section introduces how to view the data export task information, and how to create and
execute a new task.
By viewing configuration export tasks, you can confirm whether exported data needs to be
saved externally.
Prerequisite
Procedure
1. Select System→Policy Task Management from the main menu to open the Policy
Task Management window.
Version: 01 137
UMC² Lite Unified Management Control Centre User Manual
3. In the right pane, right-click a task and select View from the shortcut menu to query its
object information, status and file path.
Other Operations
In the right pane, right-click a task and select Enable, Disable, Execute Now, Delete,
View, Attribute or Export from the shortcut menu to perform the corresponding operation.
If existing configuration export tasks fail to meet backup requirements, you can create a
new configuration export task as required.
Prerequisite
Procedure
1. Select System→Parameter Settings from the main menu to open the Parameter
Settings dialog box.
2. Select Service Configuration→XFTP Server Settings in the left pane to open the
XFTP Server Settings tab.
3. Click Add, set the parameters such as host name, username, password and path, and
click OK.
138 Version: 01
9 Access NE Management and Maintenance
4. Select System→Policy Task Management from the main menu to open the Policy
Task Management tab.
5. Right-click Configuration Export Task in the left pane or right-click in the right
pane and select Create from the shortcut menu to open the creation dialog box.
6. Set the parameters on the Basic Information, Object Source, and Extend
Information tabs as required, and click OK. The new task appears in the task list.
Note:
Click Copy from other tasks to copy all settings except Task Name from
another task. This improves setting efficiency.
7. Click a task in the left pane to view its object information, status and file path.
Prerequisite
u The service for transmitting files between the client and the server is running normally.
Version: 01 139
UMC² Lite Unified Management Control Centre User Manual
Procedure
1. Select System→Policy Task Management from the main menu to open the Policy
Task Management window.
3. In the right pane, right-click a task and select View from the shortcut menu to query its
object information, status and file path and confirm whether it meets requirements.
4. Right-click the task again and select Execute Now from the shortcut menu, or select it
and click Execute Now at the lower right corner of the tab to export configurations.
140 Version: 01
10 System Maintenance and Management
This chapter introduces common operations in system maintenance and management in
typical OAM scenarios.
You can log into the NMS Management Tool rapidly through the main menu of the UMC 2
Lite. With this tool, you can manage the UMC2 Lite processes / resources / history data,
query the UMC2 Lite operation logs, set system warnings, and import / export the UMC 2
Lite configurations.
10.1.1 Login
This section introduces how to log into the NMS Management Tool.
Prerequisite
The UNMCMService and UNMCMAgent services have been started on the UMC² Lite
server.
Background
Users on the NMS Management Tool are classified into two types: Admin user and Query
user. Only one Admin user can log into the NMS Management Tool at a time.
Procedure
4 Select System→NMS Management Tool from the main menu to display the
login window.
4 Type in IP:22302/nmtool in the address bar of the browser to display the login
window.
Version: 01 141
UMC² Lite Unified Management Control Centre User Manual
2. Type in your username and password referring to Table 10-1, and click Login.
10.1.2 Logout
Prerequisite
You have logged into the NMS Management Tool (using the Admin user as an example).
Procedure
1. Click the drop-down button of the icon at the upper right corner of the
main GUI.
Note:
If remaining idle for a specified period of time, the current user will be logged
out automatically.
142 Version: 01
10 System Maintenance and Management
Prerequisite
You have logged into the NMS Management Tool (using the Admin user as an example).
Procedure
1. Click the drop-down button of the icon at the upper right corner of the
main GUI.
Prerequisite
You have logged into the NMS Management Tool (using the Admin user as an example).
Procedure
1. Click the drop-down button of the icon at the upper right corner of the
main GUI.
2. Select modify password from the drop-down menu to open the modify password
dialog box.
3. Enter the old and new passwords, and then click OK.
Version: 01 143
UMC² Lite Unified Management Control Centre User Manual
This section describes how to view the browser versions compatible with the NMS
Management Tool.
Prerequisite
You have logged into the NMS Management Tool (using the Admin user as an example).
Procedure
1. Click the drop-down button of the icon at the upper right corner of the
main GUI.
Only the Admin user can reset the password of a Query user.
144 Version: 01
10 System Maintenance and Management
Prerequisite
u You have logged into the NMS Management Tool as an Admin user.
Procedure
1. Click the drop-down button of the icon at the upper right corner of the
main GUI.
2. Select reset query user password from the drop-down menu to open the reset
query user password dialog box.
4. When the system shows the prompt reset query password success, click OK.
Prerequisite
You have logged into the NMS Management Tool as an Admin user.
Procedure
1. Click the drop-down button of the icon at the upper right corner of the
main GUI.
Version: 01 145
UMC² Lite Unified Management Control Centre User Manual
2. Select account strategy from the drop-down menu to open the account strategy
dialog box.
3. Set the parameters in the account strategy dialog box, and click OK.
Parameter Description
Auto unlock time (1-1440 Set a waiting period after which a locked account will be
minutes) automatically unlocked.
User illegal enter times (1-99 Set the number of illegal login attempts that triggers account
times) locking.
The Process window lists the UMC² Lite processes in a table. The operation GUI and
operation items displayed vary with user types.
146 Version: 01
10 System Maintenance and Management
Managing Processes
Version: 01 147
UMC² Lite Unified Management Control Centre User Manual
The Resource page shows resource usages of the operating system, network management
system and database. Admin and Query users have the same management authority.
Managing Resources
148 Version: 01
10 System Maintenance and Management
You can set search criteria to query history data of operation system, network
management system, and database. The UMC² Lite displays queried history data in
curve charts. Admin and Query users have the same management authority.
Version: 01 149
UMC² Lite Unified Management Control Centre User Manual
Reseting the curve chart Click reset to restore a curve chart to its default size.
You can set search criteria to query operation logs of users who log into the NMS
Management Tool. Admin and Query users have the same management authority.
Managing Logs
150 Version: 01
10 System Maintenance and Management
On the Settings page, an Admin user can set alarm thresholds for the operating system,
network management system and database, storage periods for history data and log data,
and auto exit time, while a Query user can only view data.
Settings GUI
Version: 01 151
UMC² Lite Unified Management Control Centre User Manual
Setting data storage In the data storage time text box, enter an integer ranging
Admin user periods from 1 to 90, and click save.
Reseting parameters Click reset to restore all parameters to default values.
Querying parameter
On the main GUI of the NMS Management Tool, click
Query user settings of the NMS
Settings.
Management Tool
On the NMS Management Tool, an Admin user can import or export configuration files and
set relevant parameters to control export policies and path. A Query user can only export
configuration files.
Import/Export GUI
152 Version: 01
10 System Maintenance and Management
After a timer is enabled, the NMS Management Tool automatically exports configuration
files at a specified time.
Prerequisite
You have logged into the NMS Management Tool as an Admin user.
Procedure
Parameter Settings
4. Click OK.
Version: 01 153
UMC² Lite Unified Management Control Centre User Manual
The NMS Management Tool can export a configuration file to a specified server.
Prerequisite
You have logged into the NMS Management Tool as an Admin user.
Procedure
1. On the Import/Export page, click set backup server to open the set backup
server page.
Parameter Settings
Export file name Enter a custom export file name.
FTP password Enter the password for logging into an XFTP server.
3. Click OK.
This section introduces how to set export parameters and export history dump / log files
manually.
Prerequisite
You have logged into the NMS Management Tool as an Admin user.
154 Version: 01
10 System Maintenance and Management
Procedure
1. On the Import/Export tab, click One-click Export of Dump/Log to open the One-
click Export of Dump/Log page.
2. Set export parameters by referring to the following table, and click OK.
Note:
After setting an XFTP server, click Test to detect the connectivity between the
UMC² Lite server and the XFTP server.
Parameter Settings
Export the file
Select a desired file type, Dump File or Log File.
Basic type manually
parameter Export the
Set whether to export dump / log files automatically. If it is selected,
settings switch
generated dump / log files will be automatically exported.
automatically
XFTP IP
Enter the IP address of an XFTP server.
address
XFTP server Protocol type Select a protocol type from the drop-down list.
parameter Enter the communication port between an XFTP server and the
Port
settings UMC² Lite server.
User Name Enter the username for logging into an XFTP server.
3. (Optional) Click Export History dump/log Files. In the Export History dump/log
Files dialog box that appears, set the export file type and the start and end time range
of files. And then click OK.
Version: 01 155
UMC² Lite Unified Management Control Centre User Manual
10.1.13.4 Importing
This section introduces how to import a configuration file from a backup server.
Prerequisite
u You have logged into the NMS Management Tool as an Admin user.
u All UMC² Lite services have been stopped. For details, see Stopping the UMC² Lite
in Managing Processes.
Procedure
2. Return to the Import/Export page and click import. The following page appears.
156 Version: 01
10 System Maintenance and Management
4. Select local backup or FTP backup from the drop-down list of import type.
6. Click OK.
10.1.13.5 Exporting
This section introduces how to manually export a configuration file to a backup server.
Prerequisite
Procedure
Version: 01 157
UMC² Lite Unified Management Control Centre User Manual
3. Enter the description information of the configuration file in the file description text
box.
4. Click OK.
The UMC² Lite provides network connectivity detection. It can check whether network
connections and hosts are accessible, provide security protocols for remote login sessions
and other network services, and test gateways through which packets are transmitted from a
host to a destination, and configure and maintain devices.
Function Description
Ping is used to send ping packets to a remote host and check whether the host is
Ping
accessible. It is used to check whether network connections or lines are faulty.
SSH is short for secure shell protocol established by the IETF network working
SSH group. It encrypts online packets through encryption technologies before sending
them. This guarantees the security of data transmission.
As a member of the TCP/IP protocol suite, Telnet is a standard protocol and a typical
Telnet approach for remote login through the Internet. It is used to log into a device
remotely for configuration and maintenance.
10.2.1 Ping
Ping checks whether the UMC² Lite is communicating well with NEs.
Prerequisite
Procedure
1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→Ping from the shortcut menu.
158 Version: 01
10 System Maintenance and Management
1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→Ping from the shortcut menu.
2) In the Select NE dialog box that appears, select the sub-NEs under an optical NE
and click OK.
Note:
If the system displays Request timed out, check the connection between the
UMC² Lite and the NE to eliminate possible faults and then ping the NE again.
10.2.2 Telnet
You can log into devices remotely through Telnet to configure and maintain them.
Prerequisite
Procedure
1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→Telnet from the shortcut menu.
2) After logging into the device through Telnet, enter desired commands on the
Telnet tab to operate the device.
1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→Telnet from the shortcut menu.
2) In the Select NE dialog box that appears, select the sub-NEs under an optical NE
and click OK.
3) After logging into the device through Telnet, enter desired commands on the
Telnet tab to operate the device.
Version: 01 159
UMC² Lite Unified Management Control Centre User Manual
10.2.3 SSH
This section introduces how to start the SSH command line tool.
Background
SSH is a remote login protocol developed based on the traditional Telnet protocol. It greatly
improves network security by encrypting and authenticating network data.
You can log into a specified NE via the SSH tool and manage NEs using command lines.
Prerequisite
2) Select Common Config→SSH Config in the left operation tree to open the SSH
Config tab.
Procedure
1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→SSH from the shortcut menu.
2) On the SSH tab, enter your username and password and click OK.
1) Right-click a desired NE in the browse tree of the Main Topology tab and select
Tools→SSH from the shortcut menu.
2) In the Select NE dialog box that appears, select the sub-NEs under an optical NE
and click OK.
3) On the SSH tab, enter your username and password and click OK.
160 Version: 01
10 System Maintenance and Management
Other Operations
Manage NEs using command lines referring to CLI Configuration Guide of the
corresponding device.
Version: 01 161
Appendix A Abbreviations
IP Internet Protocol
International Telecommunication Union-
ITU-T
Telecommunication Standardization Sector
MSAN Multi-Service Access Network
NE Network Element
NEL Network Element Level
NML Network Management Layer
162 Version: 01
Appendix A Abbreviations
Version: 01 163