U2020 Northbound Command Line Interface Developer Guide
U2020 Northbound Command Line Interface Developer Guide
V300R019C10
Issue 01
Date 2019-08-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: [email protected]
Overview
This document provides guidance on the northbound command line interface
(MML command interface) of U2020. It describes the meaning and
interconnection parameters, and interconnection and function of the northbound
MML command interface.
This document covers how to use and configure common functions of the product
rather than customized functions. For details about the customized functions,
contact Huawei to apply for and obtain relevant documents.
Product Version
The following table lists the product version related to this document.
U2020 V300R019C10
Intended Audience
This document is intended for:
Network management engineers
Change History
02 (2019-06-25)
Added the section How Do I Enable the SSL Connection Mode?
01 (2019-06-12)
Migrated the following functions to U2020: Setting an IP Address Whitelist for
the MML Command Interface, and (Optional) Hiding or Unhiding Security
Information in MML Command Output. Modified the operation procedure.
Organization
1 Introduction to Northbound MML Command Interface
Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
General Conventions
The general conventions that may be found in this document are defined as
follows.
Convention Description
Convention Description
Command Conventions
The command conventions that may be found in this document are defined as
follows.
Convention Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Keyboard Operations
The keyboard operations that may be found in this document are defined as
follows.
Format Description
Key Press the key. For example, press Enter and press
Tab.
Key 1, Key 2 Press the keys in turn. For example, pressing Alt, A
means the two keys should be pressed in turn.
Mouse Operations
The mouse operations that may be found in this document are defined as follows.
Action Description
Drag Press and hold the primary mouse button and move
the pointer to a certain position.
Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
General Conventions
Convention Description
Command Conventions
Convention Description
Convention Description
GUI Conventions
Convention Description
Keyboard Operation
Format Description
Key Press the key. For example, press Enter and press Tab.
Key 1+Key 2 Press the keys concurrently. For example, pressing Ctrl
+Alt+A means the three keys should be pressed
concurrently.
Key 1, Key 2 Press the keys in turn. For example, pressing "Alt, F"
means the two keys should be pressed in turn.
Mouse Operation
Action Description
Drag Press and hold the primary mouse button and move
the pointer to a certain position.
Contents
3.4.3 Simulating the Interconnection with the NMS in Unencrypted Connection Mode (MML Command
Interface).........................................................................................................................................................................................29
3.4.4 Simulating the Interconnection with the NMS in SSL Connection Mode (MML Command Interface)
............................................................................................................................................................................................................ 29
3.4.5 Checking the CloudEdge NE Interconnection Effect............................................................................................. 30
3.4.6 Setting an IP Address Whitelist for the MML Command Interface..................................................................32
3.5 (Optional) Hiding or Unhiding Security Information in MML Command Outputs....................................... 32
Implementation
Table 1-1 describes the process for implementation.
Log in to the U2020 server as user Currently, the northbound MML command
U2020. Establish the remote interface supports a maximum of 64
connection between the NMS and remote connections. If the number of
the U2020. connections is greater than 64, the system
denies the connection.
Users can query the list of all the For the direct running of scripts, the default
authorized NEs and select an NE operation object is the U2020.
to operate.
NOTE
For an CloudEdge NE, select a certain
VNFC to operate under it.
● Using a command, the NMS can switch to operate another NE at any time. The NMS,
however, can operate one NE at a time.
● For CloudEdge NEs, the NMS can operate only a certain VNFC under a single NE at a
time.
No. Operation
2 The NMS sends the name and password of the user who logs in to
the system to the U2020 for authentication.
9 If the connection fails, the U2020 replies the northbound with the
connection failure message.
No. Operation
Context
Strictly conform to the format of MML commands when using the MML
commands. The colon (:) and semicolon (;) are mandatory for the MML
commands. End each MML command with the newline character.
2.1 Connecting the Northbound MML Command Interface
2.2 Maintaining the Northbound MML Command Interface
2.3 Disconnecting the Northbound MML Command Interface
2.1.1 Login
The NMS remotely logs in to the U2020 server through the MML service port to
connect to the U2020 server.
Prerequisites
The U2020 user is created on the U2020 client. For details, see 3.3.1 Creating a
User and Assigning Rights.
Procedure
Step 1 Remotely log in to port 31114 of the U2020 server.
NOTICE
Using SSL mode is recommended because of its higher security than Non-SSL
mode.
● SSL mode
For example, enter the following command in the system where the openssl
software is installed to simulate the client:
openssl s_client -CAfile CA trust certificate -cert device certificate on the
client -key private key of the device certificate on the client -port 31114 -
host floating IP address of the server -tls1_2 -quiet -crlf
The openssl parameter -tls1_2 corresponds to the TLSv1.2 version. During the
interconnection, use the openssl parameter based on the version value set in
SSLOption.xml. The SSLv3 protocol corresponds to the -ssl3 parameter.
If the TLSv1.2 protocol is used, the OpenSSL tool later than the 1.0.1p version must be used.
If you need to use a third-party certificate for the interconnection with the NMS, replace
the existing certificate with a third-party certificate by following the instructions provided in
Updating Certificates in U2020 Product Documentation. You must stop all U2020 services
before the replacement. After the replacement, start all U2020 services again.
The SSLv3 and TLSv1.0 protocols have security risks. If you do not need to use them, disable
them according to Disabling the SSLv3 Protocol Used on the U2020 and Disabling the
TLSv1.0 Protocol Used on the U2020 in U2020 Administrator Guide.
Since V200R018C10, SSLv3 and TLSv1.0 are disabled by default for security purposes in
new installation scenarios. You are advised not to enable SSLv3 and TLSv1.0. If you need to
enable them, see Enabling the SSLv3 Protocol Used on the U2020 and Enabling the
TLSv1.0 Protocol Used on the U2020 in U2020 Administrator Guide.
By default, the public key of the Diffie-Hellman algorithm contains 2048 bits. If the NMS
does not support the Diffie-Hellman algorithm with the 2048-bit public key, change the
default public key length of the Diffie-Hellman algorithm to 1024 bits, resulting in security
risks. For details, see 4.5 How Do I Change the Public Key Length of the Diffie-Hellman
Algorithm?
● Non-SSL mode
For example, enter telnet floating IP address of the U2020 server 31114 for
the remote login.
The possible reasons for the failure are as follows: The U2020 user is not
created, the U2020 user and password are incorrect, the U2020 user is locked,
and the password expires.
By default, the U2020 client locks on three incorrect password attempts. It is unlocked 30
minutes later. For details about client locking and unlocking, see the sections Parameters
for Setting an Account Policy and Unlocking an OM User under User Management in the
U2020 Online Help or the U2020 product documentation.
If the user password expires, you can log in to the server again after changing the
password. You can set the expiration duration of the password to 0 so that the password
will not expire. Consider of the security of system, it is not recommended to set the
expiration duration of the password to 0. For detailed operations, see U2020 Online Help.
----End
Procedure
Step 1 Log in to the MML port of the U2020. For details, see 2.1.1 Login.
If the NMS queries the NE list from the U2020, it executes the LST NEBYOMC:;
(recommended) or LST NE:; (not recommended) command, with all letters being
in uppercase.
NOTICE
● If the NMS is using the LST NE:; command and no error occurs, it can still use
the LST NE:; command. If the LST NE:; command is in conflict with the LST
NE:; of some NEs, the NMS uses the LST NEBYOMC:; command.
The packet returned to the NMS lists all NEs that can be operated by the current
user. The user can select an NE to maintain.
LST NE Info
-----------
----End
2.1.3 Registering an NE
When the user selects an NE from an NE list to maintain, the NMS sends a
registration command to the U2020.
Procedure
Step 1 Log in to the MML port of the U2020. For details, see 2.1.1 Login.
Step 2 Registering an NE.
When you register an NE managed by the CGPOMU, use the name rather than the IP
address of the NE because the IP addresses of the NE and the CGPOMU are the same.
● Registering an NE Through IP Address
The format of the command is as follows, with all letters being in uppercase:
REG NE:IP="10.161.198.243";
Based on the parameters in the REG NE command, the U2020 analyzes the IP
address of an NE and establishes the connection to the NE.
– If the connection is successful, a success message is sent to the NMS.
– If the connection fails, an error message is sent to the NMS.
If the connection is successful, the following packet is displayed by the
U2020:
+++ NMS SERVER 2006-03-02 11:57:11
O&M #2304
%% REG NE:IP="10.161.198.243";%%
RETCODE = 0 Success
Success
--- END
Success
--- END
----End
Prerequisites
You have registered a CloudEdge NE. For details, see 2.1.3 Registering an NE.
Procedure
Step 1 Log in to the MML port of the U2020. For details, see 2.1.1 Login.
Step 2 Run the following command to query operable VNFCs under a registered
CloudEdge NE.
LST VNFCBYNE:;
--- END
Error Message
--- END
The packet returned to the NMS lists all VNFCs that can be operated by the
current user under the registered CloudEdge NE. The user can select a VNFC to
maintain.
----End
Prerequisites
● You have registered a CloudEdge NE.
Procedure
Step 1 Log in to the MML port of the U2020. For details, see 2.1.1 Login.
Step 2 Query the VNFCs of the registered CloudEdge NE. For details, see 2.1.4 Listing
Operable VNFCs under a CloudEdge NE.
Step 3 Register a VNFC.
The command syntax is as follows, with all letters being in uppercase:
REG VNFC:NAME="VNFC name";
The U2020 analyzes parameters in the REG VNFC command to obtain the VNFC
name and sets up a connection with the VNFC.
If the registration is successful, the U2020 returns a success response to the NMS.
Otherwise, the U2020 returns an error response.
● If the registration is successful, the U2020 returns the following packet:
REG VNFC:NAME="gsc";
+++ NMS SERVER 2017-02-21 16:49:48
O&M #2304
%%REG VNFC:NAME="gsc";%%
RETCODE = 0 Success
Success
--- END
Error Message
--- END
----End
Prerequisites
● NEs must be registered before the execution of MML command transmission.
For details, see 2.1.3 Registering an NE.
● The MML command to be transmitted must be authorized in advance.
Procedure
Step 1 Log in to the MML port of the U2020. For details, see 2.1.1 Login.
Step 2 The NMS sends a command to an NE.
After receiving a command, the U2020 immediately forwards it to a specific NE,
The format of the command is as follows, with all letters being in uppercase:
GET OFI:;
+++ HW-MSOFTX 2008-09-12 10:40:25+08:00
O&M #969842
%%/*2881@CMM_SID=1@*/GET OFI:;%%
RETCODE = 0 Operation succeeded
--- End
----End
Prerequisites
● The script contains only the authorized MML commands for the
corresponding NEs.
● The script is uploaded to the /export/home/sysm/ftproot/itf_n/
nms_mml_server/script directory on the U2020 server by user ftpuser.
Context
● The script must be in the .txt format. The NMS needs to maintain the script
that is uploaded in ASCII mode and saved in the /export/home/sysm/
ftproot/itf_n/nms_mml_server/script directory.
● The name of the script file can contain only letters and digits. The character-
encoding scheme of the script file must be GBK.
● The file containing the script execution results is saved in the /export/home/
sysm/ftproot/itf_n/nms_mml_server/result directory. The U2020
automatically deletes the result files generated three days ago.
● The U2020 automatically names the result files. The naming convention is as
follows: name of the script to be activated_time when the script is
activated_name of the user that remotely logs in to the U2020 server for
using the MML service_random number.rst. The format of time when the
script is activated is YYYYMMDDHHMMSS. YYYY indicates year, MM indicates
month, DD indicates date, HH indicates hour (24-hour format), MM indicates
minute, and SS indicates second. For example, 20090511171950 indicates that
the script is activated at 17:19:50 on May 11, 2009. Multiple results files are
generated when multiple users remotely and simultaneously log in to the
U2020 server to active a certain script by using the same user account. In this
case, the random number parameter can be used to distinguish between
these results files.
● Only one script can be activated at a time. That is, if the current user is
activating a script, the user cannot activate another script at the same time.
● You can specify the NE on which the MML command is to be used in either
the activation command or the script. After you specify an NE in the
activation command, the MML command is to be used on this NE no matter
whether you specify the NE in the script or not. If you do not specify an NE in
the activation command, the MML command is to be used on the NE that is
specified in the script.
● In the script, different MML commands are located in different lines. {} is
added to each MML command to specify the NEs to which the command is to
be issued. If you do not need to specify any NE, {} is not required. For
example, if you need to issue the LST CELL:; command to the NEs named
rnc_l and rnc_2 and the LST PRACH:; command to the NE named rnc_l, but
need not specify any NE to which the LST BRD:; command is issued, the script
is as follows, with all letters being in uppercase:
LST CELL:; {rnc_l,rnc_2}
LST PRACH:; {rnc_l}
LST BRD:;
FILE Mandatory.
The script file whose extension name is .txt.
NELIST Optional.
The list of NEs to which MML commands are to be issued.
● If this parameter is contained in the command, MML
commands are to be issued to the NEs in the list rather than
the NEs specified in the MML script.
● Otherwise, MML commands are to be issued to the NEs
specified in the script.
● For CloudEdge NEs, you need to specify this parameter and
enter the name of the corresponding VNFC. In addition, the
MML script to be issued should not contain the names of
CloudEdge NEs.
Procedure
Step 1 Log in to the MML port of the U2020. For details, see 2.1.1 Login.
Step 2 Specify the NEs in the activation command or script. Run the following command
to activate the script, with all letters being in uppercase:
● Specify the NEs to which the MML commands are to be issued in the
activation command.
Run the following command to deliver the script named testMML2.txt to the
NEs rnc_1 and rnc_2. Save the execution results to the file Name of the script
to be activated_Time when the script is activated_Name of the user that
remotely logs in to the U2020 server for using the MML service_random
number.rst. For example, a file named
testMML2_20090511171950_UserName_102.rst.
S_ACTIVATE: FILE="testMML2.txt", NELIST="{rnc_1,rnc_2}";
If the system displays the following information, you can infer that the script
is executed successfully.
If the system displays the following information, you can infer that executing
the script failed. You can rectify the fault according to the error message.
S_ACTIVATE FAILED; REASON=insufficient privilege
● Specify the NEs to which the MML commands are to be issued in the script.
Run the following command to deliver the script test1.txt to the specified
NEs and save the execution results to the file named Name of the script to
be activated_Time when the script is activated_Name of the user that
remotely logs in to the U2020 server for using the MML service_Random
number.rst. For example, a file named
test1_20090511171950_UserName_102.rst.
S_ACTIVATE: FILE="test1.txt";
If the system displays the following information, you can infer that the script
is executed successfully.
S_ACTIVATE OK; RESULFILE=test1_20090511171950_UserName_102.rst
10% ACCOMPLISHED
50% ACCOMPLISHED
100% ACCOMPLISHED
S_ACTIVATE SUCCESS;
If the system displays the following information, you can infer that executing
the script failed. You can rectify the fault according to the error message.
S_ACTIVATE FAILED; REASON=insufficient privilege
----End
Procedure
Step 1 Log in to the MML port of the U2020. For details, see 2.1.1 Login.
Step 2 Run the following command, with all letters being in uppercase.
SHK HAND:;
Success
--- END
----End
Procedure
Step 1 The U2020 sends an NE disconnection message to the NMS.
----End
Prerequisites
You have register a CloudEdge NE and a certain VNFC.
Context
● You can deregister a registered VNFC using its name.
● You can run the UNREG NE command to deregister a registered CloudEdge
NE. The VNFC under the CloudEdge NE is also deregistered.
● The NMS can maintain only a VNFC at a time. You can run the REG VNFC
command to register another VNFC for maintenance, and the previously
registered VNFC is automatically deregistered.
Procedure
Step 1 Log in to the MML port of the U2020. For details, see 2.1.1 Login.
Success
--- END
Error Message
--- END
----End
2.3.2 Deregistering an NE
Registering an NE requires the system resource. Therefore, if the NMS does not
maintain an NE, you need to deregister the NE to release the resource.
Prerequisites
You have registered an NE and obtained the IP address or name of the NE.
Context
You can use the IP address or the name of an NE to deregister the NE.
Procedure
Step 1 Log in to the MML port of the U2020. For details, see 2.1.1 Login.
Success
--- END
----End
2.3.3 Logout
When you log out of the U2020 and disconnect the U2020, you need send the
LGO:OP="MMLUser"; command.
Prerequisites
You have logged in to port 31114 of the U2020 server.
Procedure
Step 1 Log in to the MML port of the U2020. For details, see 2.1.1 Login.
Step 2 In the login window, run the following command, with all letters being in
uppercase.
LGO:OP="MMLUser";
----End
NOTICE
If the EOX date of a third-party software release (such as the browser) you have
deployed on your PC is earlier than that of the product, upgrade the software to a
version that spans the product lifecycle to ensure network security.
Perform the following operations to check whether U2020 has the required
license:
Step 3 Click Devices, select All Objects, and select the device to be managed. Click Next.
Step 5 Choose Security Management > User Management. In the displayed page,
choose Users in the left pane. Click Create in the right page to create a user.
Select Local, and enter a user name and password. In the Advanced Settings
area, deselect Force password change at the first login and click Next.
----End
Procedure
Step 1 On the U2020 client, choose Security > NE User Management.
Step 2 In the navigation tree, choose MML Rights Manager.
Step 3 Select the role created in 3.3.1 Creating a User and Assigning Rights.
Select a device in the Managed Objects area, select an NE type under Command
Group, and select Command Group to select all MML commands.
Click Apply.
----End
Procedure
Step 1 Choose Security > NE User Management, the NE User Management window is
displayed.
Step 2 In the navigation tree, choose MML Rights Manager.
Step 3 In the right pane, query an authorized MML command.
----End
interface meets the conditions for interconnecting with the NMS based on the
interconnection result.
Overview
The configuration file SSLOption.xml is used to configure whether to use SSL
connection and, when SSL connection is used, configure SSL connection policies.
Connection Parameters
The configuration items in SSLOption.xml are used to configure connection
parameters related to northbound interface operations. Table 3-2 describes these
configuration items.
enc Encryption This parameter can be set to high or all. The default value is
ryp level high.
tLe The encryption levels are defined in the algorithm list
vel file /opt/oss/apps/IRPService/rtsp/iMAP_Common/
conf/ssl/cipherSuiteConfig.xml. You can select different
algorithm lists from this file to implement security and
performance control. The mapping relationships between
encryption levels and algorithm lists vary with SSL protocol
versions. The algorithm names in this file are consistent with
those defined by the SSL protocol.
ena Whether ● true: The server authenticates the client and an identity
ble to certificate must be deployed on the client. The server
Aut authentica determines whether the client identity certificate is valid
hP te the based on the trust certificate deployed on the server.
eer client. ● false: The server does not authenticate the client and no
identity certificate needs to be deployed on the client.
ena Whether ● true: SSL and non-SSL ports are automatically adapted.
ble to ● false: SSL and non-SSL ports are not automatically
SSL automatic adapted.
Por ally adapt
tAu to SSL and This parameter cannot be modified.
toA non-SSL
da ports.
pt
Prerequisites
You have logged in to the U2020 (active or master) server as user ossuser.
Context
After you modify SSLOption.xml, restart the IRPService service for the
modifications to take effect.
Perform the following operations on the U2020 master service node.
Procedure
Step 1 Edit the configuration file.
vi /export/home/ossshare/U2020/IRPService/etc/IRPService/NMSMMLServer/
SSLOption.xml>
(U2020 is an example product alias. You can run the ls /opt/cloud/ |grep (U2020
command to obtain the actual product alias.)
----End
Prerequisites
● The NMS has been licensed to use the MML command interface.
● The enableSSL is set to false in /export/home/ossshare/U2020/
IRPService/etc/IRPService/NMSMMLServer/SSLOption.xml.
(U2020 is an example product alias. You can run the ls /opt/cloud/ |grep
(U2020 command to obtain the actual product alias.)
Context
Perform the following operations on the U2020 master service node.
Procedure
Step 1 Remotely log in to port 31114 of the U2020 server.
For example, enter telnet floating IP address of the U2020 server 31114 for the
remote login.
Step 2 Log in to the port by using the information about the user that is already created.
----End
Prerequisites
● You have modified the configuration file /export/home/ossshare/U2020/
IRPService/etc/IRPService/NMSMMLServer/SSLOption.xml.
(U2020 is an example product alias. You can run the ls /opt/cloud/ |grep
(U2020 command to obtain the actual product alias.)
● The NMS has been licensed to use the MML command interface.
● When enableAuthPeer is set to true in SSLOption.xml, you have obtained
the certificates from the NMS, including the trust certificate, device certificate
on the client, and the private key of the device certificate on the client.
Context
Perform the following operations on the U2020 master service node.
Procedure
Step 1 The NMS remotely logs in to the specified port of the U2020 server to simulate
the interconnection with the U2020.
For example, run the following commands on the PC where OpenSSL is installed
to simulate the client:
● When enableAuthPeer is set to true, run the following commands:
openssl s_client -CAfile CA trust certificate -cert device certificate on the
client -key private key of the device certificate on the client -port 31114 -
host floating IP address of the server -tls1_2 -quiet -crlf
● When enableAuthPeer is set to false, run the following commands:
openssl s_client -port 31114 -host floating IP address of the server -tls1_2
-quiet -crlf
The OpenSSL parameter -tls1_2 corresponds to the TLSv1.2 version. During the
interconnection, use the OpenSSL parameter based on the version value set in
SSLOption.xml.
If the TLSv1.2 protocol is used, the OpenSSL tool later than the 1.0.1p version must be used.
If you need to use a third-party certificate for the interconnection with the NMS, replace
the existing certificate with a third-party certificate by following the instructions provided in
section "Certificate Management" in the product documentation. You must stop all U2020
services before the replacement. After the replacement, start all U2020 services again.
The SSLv3 and TLSv1.0 protocols have security risks. If you do not need to use them, disable
them according to Disabling the SSLv3 Protocol Used on the U2020 and Disabling the
TLSv1.0 Protocol Used on the U2020 in U2020 Administrator Guide.
Since V200R018C10, SSLv3 and TLSv1.0 are disabled by default for security purposes in
new installation scenarios. You are advised not to enable SSLv3 and TLSv1.0. If you need to
enable them, see Enabling the SSLv3 Protocol Used on the U2020 and Enabling the
TLSv1.0 Protocol Used on the U2020 in U2020 Administrator Guide.
By default, the public key of the Diffie-Hellman algorithm contains 2048 bits. If the NMS
does not support the Diffie-Hellman algorithm with the 2048-bit public key, change the
default public key length of the Diffie-Hellman algorithm to 1024 bits, resulting in security
risks. For details, see 4.5 How Do I Change the Public Key Length of the Diffie-Hellman
Algorithm?
Step 2 Log in to the port by using the information about the user that is already created.
For example, enter LGI:OP="MMLUser",PWD="OSSnbi_123"; for the login.
----End
Prerequisites
You have registered a VNFC.
Procedure
Step 1 Simulate the interconnection with the NMS in non-encryption mode. Remotely log
in to the U2020 server through port 31114.
Run the LST VNFCBYNE:; command with all letters being in uppercase:
Step 7 Simulate the NMS to send a command to the registered VNFC and view the
command output.
DSP DATETIME:;
----End
Procedure
Step 1 Start a browser and visit https://U2020 server IP address:31943.
Step 2 On the U2020 client, choose Maintenance > OSS Maintenance Tool > NBI
Management.
Step 4 Select Northbound Command Line Interface from the Northbound Interface
Name drop-down list.
Step 5 Select NmsMmlParam.xml from the Configuration file name drop-down list.
Separate multiple IP addresses with vertical bars (|). A maximum of 100 IP addresses can be
configured in a whitelist.
By default, the allowed ip list text box is empty, indicating no IP address restriction during
interconnection.
----End
Context
Northbound MML command outputs may contain plaintext security information,
for example, plaintext passwords. Plaintext security information can be hidden
(replaced by *) over the northbound MML command line interface.
By default, plaintext security information is not hidden. You can use either of the
following methods to hide plaintext security information:
Procedure
● Hiding plaintext security information by running commands
a. Log in to the U2020 server as user ossuser.
b. Run the following commands:
> . /opt/oss/apps/SystemService/svc_profile.sh
> SettingTool -cmd setparam -path /imap/nbi/nmsmml/
mmlSecInfoHide -value "true"
To unhide security information, run the following commands:
> . /opt/oss/apps/SystemService/svc_profile.sh
> SettingTool -cmd setparam -path /imap/nbi/nmsmml/
mmlSecInfoHide -value "false"
● Hiding plaintext security information on the U2020 client
a. Start a browser and visit https://U2020 server IP address:31943.
b. On the U2020 client, choose Maintenance > OSS Maintenance Tool > NBI
Management.
c. In the navigation tree, choose Parameters Settings.
d. Select Northbound Command Line Interface from the Northbound
Interface Name drop-down list.
e. Select Command Line Parameter Setting from the Configuration file
name drop-down list.
f. In the Command Line Parameter Setting area, set mmlSecInfoHide to
true.
To unhide security information, set it to false.
g. Click Save after the modification is complete.
You can view the operation result in Service Restarted Log. When the
operation is successful, the parameter setting takes effect.
Troubleshooting
For the common troubleshooting methods, see Table 4-1.
How to Handle the Closed See 4.3 How Do I Handle a Closed SSL
SSL Connection Problem Connection?.
Information Collection
If a fault not included in Table 4-1 occurs when the NMS is obtaining the data,
you need to collect relevant information for fault localization. Table 4-2 lists the
information to be collected and the collection methods.
Problem Description
The NMS fails to issue an MML command.
Troubleshooting
The NMS fails to issue the MML command possibly due to NE disruption.
Solution
Contact Huawei technical support.
Question
The SSL connection between the NMS and the U2020 server is closed.
Solution
SSL connection transmits data based on records and TCP/IP connection transmits data
based on streams. In SSL connection, a sending error occurs when the client end receives
data too slowly or even cannot receive data, or the data transmission times out.
Perform the following steps to determine whether the closed SSL connection
problem is caused by a sending error. When a sending error occurs, the U2020
server (server end of SSL connection) automatically closes the SSL connection.
3. In the Filter Criteria dialog box, click . In the displayed Source dialog box,
select a northbound interface. For example, select FMNotify for the alarm
streaming interface and NMSMMLServer for the MML command interface.
4. In the Basic Information area, select SSL connection is closed.
– There is a record: This problem is caused by a sending error. As a result,
the U2020 server automatically closes the SSL connection. In this
situation, the NMS needs to re-initiate the SSL connection to the U2020
server.
– There is no record: This problem is not caused by a sending error. In this
situation, contact Huawei technical support.
Question
The ping command cannot be stopped in the current NMS client.
Solution
The command line interface forwards MML commands to NEs without processing
and can forward MML commands to NEs in the same connection only after the
execution result is returned. If the command line interface forwards the ping
command and the number of times for performing ping operations has been
specified, the current NMS client keeps receiving the execution result of the ping
command and cannot be used to forward the command for stopping the ping
command. To stop the ping command, perform the following operations:
1. Restart a new NMS client and remotely log in to the U2020 through port
31114. For details, see 2.1.1 Login.
2. Register NEs. The registered NEs should be consistent with those registered
when the ping command is issued. For details, see 2.1.3 Registering an NE.
3. Forward the MML command (__STP:;) for stopping the ping command to NEs.
For details, see 2.2.1 Transmitting MML Commands.
4. Deregister NEs. For details, see 2.3.2 Deregistering an NE.
5. Disconnect the U2020. For details, see 2.3.3 Logout.
Prerequisites
You have logged in to the U2020 server as user ossuser.
Procedure
Step 1 Run the following command to open the configuration file SSLOption.xml and
modify the public key length of the Diffie-Hellman algorithm:
vi /export/home/ossshare/U2020/IRPService/etc/IRPService/NMSMMLServer/
SSLOption.xml>
(U2020 is an example product alias. You can run the ls /opt/cloud/ |grep (U2020
command to obtain the actual product alias.)
Add the public key length of the Diffie-Hellman algorithm between PARAS nodes.
The contents after the modification are as follows:
<?xml version="1.0" encoding="utf-8"?>
<COMMINIDATA>
<AREADESC areaname="ssl">
<DESC descname="options">
<PARAS>
..................................
<PARA name="secureDHLen" value="1024"/>
</PARAS>
</DESC>
</AREADESC>
</COMMINIDATA>
Step 2 Press Esc, input:wq and press Enter, save the file and quit.
Step 3 Run the following commands to restart the IRPService service for the
configuration to take effect: > . /opt/oss/apps/IRPService/tools/env_profile.sh>
nbi_adm -cmd restart IRPService
----End
Procedure
Step 1 Log in to the U2020 client and choose Maintenance > OSS Maintenance Tool >
NBI Management.
Step 3 In the right pane, set Northbound Interface Name to the Northbound
Command Line Interface, and Configuration file Name to SSLOption.xml.
For details about enableSSL and version, see the following table.
----End